facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Take the Law Into Their Own Hands, Is This a Good Thing?

b2ap3_thumbnail_vigilante_hackers_400.jpgIn 2015, we saw countless hacking attacks against major corporations, from health insurance providers like Blue Cross Blue Shield and Anthem, to government offices, like the United States Office of Personnel. Due to the stigma associated with hacking, we often forget that there are a lot of hackers out there who try to use their skills for good--or, at least, less awful purposes.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Hackers Software Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Network Security Business Saving Money Email Malware Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer User Tips Quick Tips Mobile Devices Smartphones Innovation Gadgets Business Continuity Microsoft Office Disaster Recovery VoIP Social Media Android Network Collaboration Productivity Mobile Office Data Backup Virtualization Server Mobile Device Management Communication Smartphone Data Recovery Miscellaneous Ransomware Windows 10 communications Tech Term Upgrade Unified Threat Management Windows IT Support Holiday Remote Monitoring Passwords Facebook Operating System Vendor Management Mobile Computing Apps Phishing Managed IT services Cybersecurity BYOD Remote Computing WiFi BDR Automation Users Mobile Device Analytics Data Management The Internet of Things Marketing Apple Outsourced IT Firewall History App Alert Browser Artificial Intelligence Save Money Internet of Things Managed IT Services IT Consultant Big data Encryption Cloud Computing Office Content Filtering Health Going Green Bandwidth Spam Bring Your Own Device Office 365 Antivirus Maintenance Gmail Printer Business Technology Cybercrime Lithium-ion Battery Best Practice Information Technology Cost Management Managed IT Training Windows 10 Help Desk Windows 8 Outlook Hiring/Firing Wireless Technology Hard Drives Budget Search Two-factor Authentication Saving Time Tech Support Virus Travel Recovery Employer-Employee Relationship Blockchain Update Phone System IBM Healthcare Hacking Money Document Management Computers Access Control VPN Regulations Government Intranet Website Twitter It Management Education SaaS Information Risk Management Law Enforcement Save Time Augmented Reality Compliance PowerPoint Data storage Applications Administration File Sharing Running Cable Proactive IT Hard Drive Managed Service Humor Customer Service Legal Mobility Networking Paperless Office Data Security iPhone Sports Computing Word Management Patch Management Disaster Hosted Solution Data Loss End of Support Excel Current Events Value Scam Robot Password Cortana Business Intelligence Customer Relationship Management Securty Machine Learning Telephone Systems Hacker Data Breach Digital Payment Router Solid State Drive Downtime Project Management Digital Websites Black Market Fax Server Comparison Flexibility Tablet Cryptocurrency Company Culture User Computer Repair Laptop Social Business Growth Google Maps Social Networking Wireless Avoiding Downtime Social Engineering DDoS Chromebook Monitoring Bitcoin Storage Computing Infrastructure Hack Data Protection YouTube Streaming Media Unified Communications Settings Pain Points How To Download Retail Private Cloud eWaste Telephony Vulnerabilities Net Neutrality IT service Co-managed IT Microchip Taxes Redundancy Chrome User Error Distributed Denial of Service Evernote Gaming Console Processors Bluetooth USB Computer Accessories Public Cloud Lifestyle Text Messaging Presentation Webcam Start Menu Tech Terms Trending Identity Theft Virtual Desktop Mouse Google Docs Specifications Safety Mobile Technology Conferencing Software as a Service Experience Cleaning Programming Politics Cooperation Uninterrupted Power Supply Statistics Monitors Documents Virtual Reality Network Congestion Heating/Cooling Emails Office Tips Inbound Marketing Entertainment Automobile Vendor Leadership Motion Sickness Processor Staffing Google Wallet Adminstration Get More Done Pirating Information Scalability UTM Content Electricity Printing Windows XP Browsers Legislation Error Windows 7 Society Turn Key Messenger Tracking Medical IT IT Plan Enterprise Resource Planning Displays Printer Server PDF cache Television Analytic Best Available Keyboard Rental Service Meetings Security Cameras email scam Addiction Recycling Micrsooft Trojan User Tip Accountants A.I. Product Reviews Organize Web Server Navigation Drones Domains Cabling Multi-factor Authentication WannaCry Downloads Wi-Fi Administrator Data Analysis Wireless Headphones Telephone Time Management Freedom of Information Read Public Speaking Books Workers Professional Services Migration Connected Devices Corporate Profile Fleet Tracking Assessment SharePoint Permissions Language Upselling Shortcut Supercomputer GDPR Network Management Equifax Entrepreneur Tech Tip of the week Device Management Video Surveillance Troubleshooting Worker Device security MSP Google Calendar Environment Fileless Malware Nanotechnology Social Network Touchscreen News Content Management Music HIPAA Reading Samsung Voice over Internet Protocol Desktop Finance VoIP switches Business Managemenet Writing Saving ZTime Webinar Startup Asset Tracking Consultation Competition Employer Employee Relationship Modem Business Cards Service Level Agreement Knowledge Upgrades Electronic Payment G Suite Proxy Server LiFi Harddrive Hacks Physical Security Term Unified Threat Management Backup and Disaster Recovery Virtual Assistant online Currency Debate Business Owner Electronic Medical Records Licensing Username Technology Tips Banking Botnet Directions Screen Reader Customer Resource management Fake News GPS IP Address Relocation Tablets Recording Gamification Audit Smart Tech Distribution Data Warehousing Work/Life Balance Application SSID Piracy Upload LinkedIn Deep Learning External Harddrive Human Resources Sync Dark Web Visible Light Communication Memory Notifications CCTV Processing Fiber-Optic Database Emergency Hard Drive Disposal Best Practives Health IT HTML Access Thin CLient Business Metrics Computer Malfunction Managed IT Service Telephone System Microsoft Excel Archive 3D Ebay Reliable Computing Mobile Security Computer Care IT consulting Skype In Internet of Things Bookmark Multi-Factor Security Cost Google Drive Windows Server 2008 Microserver Digital Signature Software License Trends Smart Phones Mobile Payment Point of Contact Advertising Flash Teamwork Google Play Fraud Tactics Vulnerability CIO Devices Spyware Printers CrashOverride Capital Managing Stress Productuvuty 3D Printing Regulation