facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Dogecoin Hacked! Such Loss.

b2ap3_thumbnail_docecoin_wow_400.jpgDoge, the Internet meme of a grammatically-challenged Shiba Inu dog that prefers comic sans, is so popular that it has its own online currency called Dogecoin. The fact that Dogecoin exists may be news to you, but it's also news that Dogecoin is temporarily stopping its service after its database (the Doge Vault) was hacked.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Email Hosted Solutions Malware Saving Money IT Services Efficiency Google IT Support Small Business User Tips Computer Mobile Devices Smartphones Innovation Quick Tips Business Continuity Gadgets Microsoft Office Network Disaster Recovery VoIP Social Media Android Productivity Data Backup Collaboration Communication Mobile Office Virtualization Server Smartphone Data Recovery Mobile Device Management communications Miscellaneous Upgrade Tech Term Cybersecurity IT Support Ransomware Windows 10 Unified Threat Management Windows Phishing Operating System Vendor Management Holiday Passwords Remote Monitoring Facebook BYOD Automation Remote Computing Managed IT services Apps Mobile Computing Analytics WiFi BDR Users Outsourced IT Internet of Things Apple Mobile Device Marketing Data Management The Internet of Things Artificial Intelligence Firewall History App Alert Browser Managed IT Services Save Money IT Consultant Encryption Cloud Computing Big data Health Two-factor Authentication Gmail Bandwidth Content Filtering Office Going Green Windows 10 Bring Your Own Device Maintenance Spam Office 365 Printer Antivirus Saving Time Business Technology Managed IT Lithium-ion Battery Best Practice Information Technology Cybercrime Windows 8 Outlook Cost Management Help Desk Wireless Technology Tech Support Hiring/Firing Search Virus Budget Hard Drives Training Access Control Computers Phone System It Management VPN Travel Education Recovery Blockchain Employer-Employee Relationship IBM Update Hacking Money Healthcare Document Management Running Cable Proactive IT Customer Service Law Enforcement Applications File Sharing Hard Drive iPhone Twitter Government Compliance Intranet Managed Service Website Data storage Mobility Risk Management Augmented Reality Legal Networking PowerPoint Save Time Information Humor Regulations Administration SaaS Computer Repair Hosted Solution End of Support Social Networking Avoiding Downtime Social Robot Wireless Securty DDoS Data Security Solid State Drive Current Events Google Maps Patch Management Excel Data Loss Black Market Social Engineering Flexibility Scam Cryptocurrency Word Retail Customer Relationship Management Laptop Password Cortana Data Breach Business Growth Value Fax Server Business Intelligence Digital Payment Management Digital Hacker Project Management Router Downtime Telephony Websites Paperless Office Vulnerabilities Machine Learning Comparison Tablet Telephone Systems Sports Disaster Company Culture User Computing Specifications Safety Uninterrupted Power Supply Virtual Desktop Mouse Public Cloud Vulnerability Inbound Marketing IT service Identity Theft Documents Programming Bitcoin Statistics Entertainment Data Protection Network Congestion Heating/Cooling Windows 7 Distribution Pain Points Storage Bluetooth Conferencing Virtual Reality Co-managed IT Politics User Error Automobile Streaming Media Emails Chromebook Voice over Internet Protocol Monitoring Computing Infrastructure Hack eWaste Google Docs Redundancy How To Experience Lifestyle Net Neutrality Cleaning Download Gaming Console Evernote Chrome Monitors Private Cloud Office Tips Virtual Assistant Webcam Processors Text Messaging Start Menu Tech Terms Microchip Taxes USB Computer Accessories YouTube Unified Communications Settings Distributed Denial of Service Mobile Technology Presentation Cooperation Vendor Software as a Service Trending Licensing Microsoft 365 Printer Server Business Cards Service Level Agreement Hacks Physical Security Processor Turn Key Google Drive Windows Server 2008 Startup Asset Tracking Smart Phones Permissions Skype Language Unified Threat Management Backup and Disaster Recovery Banking Botnet Browsers Spyware Mobile Payment Archive Username Relocation Tablets Medical IT Trojan Screen Reader Customer Resource management Sync Leadership User Tip Organize Electricity Printing Gamification Adminstration Pirating Information Digital Signature Security Cameras Solutions Point of Contact Music Piracy Upload Notifications CCTV Teamwork Navigation switches Writing Smart Tech Fiber-Optic Database Business Metrics Computer Malfunction Data Analysis cache Television Upgrades HTML Reliable Computing Professional Services LiFi Telephone System In Internet of Things PDF WannaCry Downloads Mobile Security GDPR Integration Webinar Corporate Profile Analytic Software License Trends Best Available Tech Keyboard Time Management Freedom of Information Recycling Multi-Factor Security Cost Domains Product Reviews Work/Life Balance Fraud Tactics Upselling Motion Sickness Fileless Malware Assessment SharePoint Deep Learning Devices Scalability Visible Light Communication Memory Proxy Server Google Calendar Read UTM Content Messenger Tracking Video Surveillance Modem Public Speaking Tip of the week Saving ZTime Electronic Medical Records VoIP IT Plan Enterprise Resource Planning Rental Service Meetings Term Shortcut Touchscreen News IT consulting Legislation Error Troubleshooting Recording Knowledge email scam Addiction Web Server Directions Entrepreneur Consultation Device Management Accountants A.I. Cabling Advertising Business Managemenet Flash Wi-Fi Harddrive Administrator Dark Web Environment Technology Tips CIO Content Management Multi-factor Authentication Books Workers Debate HIPAA SSID Best Practives Telephone Health IT Electronic Payment Audit Staffing Google Wallet Migration Connected Devices GPS Supercomputer Processing Competition Fake News Windows XP Wireless Headphones Business Owner Logistics Society Network Management Managed IT Service Microserver Data Warehousing online Currency Displays Equifax Fleet Tracking External Harddrive Worker Emergency Hard Drive Disposal Bookmark Access Micrsooft Device security MSP Reading Samsung IP Address Nanotechnology Social Network G Suite Thin CLient Human Resources Computer Care Drones Desktop Finance 3D Employer Employee Relationship Ebay Google Play Application Get More Done Microsoft Excel LinkedIn Printers Managing Stress Regulation CrashOverride 3D Printing Capital Productuvuty