facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Take the Law Into Their Own Hands, Is This a Good Thing?

b2ap3_thumbnail_vigilante_hackers_400.jpgIn 2015, we saw countless hacking attacks against major corporations, from health insurance providers like Blue Cross Blue Shield and Anthem, to government offices, like the United States Office of Personnel. Due to the stigma associated with hacking, we often forget that there are a lot of hackers out there who try to use their skills for good--or, at least, less awful purposes.

Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Hosted Solutions Managed Service Provider Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Computer Google User Tips Small Business Innovation IT Support Collaboration IT Support VoIP Data Backup Smartphones Quick Tips Network Mobile Devices Business Continuity communications Microsoft Office Gadgets Data Recovery Android Social Media Upgrade Disaster Recovery Mobile Office Communication Server Cybersecurity Virtualization Smartphone Phishing Mobile Device Management Miscellaneous Ransomware Holiday Vendor Management Passwords Windows Tech Term Outsourced IT Windows 10 Operating System Unified Threat Management Apps Facebook Internet of Things Mobile Device Users Managed IT Services Remote Monitoring Automation BDR Remote Computing Apple Analytics Managed IT services Mobile Computing Data Management BYOD Windows 10 WiFi The Internet of Things Marketing Artificial Intelligence Cloud Computing History Firewall Training Browser Save Money App Alert Help Desk Big data Encryption Two-factor Authentication Information Technology Business Technology Bandwidth Office Health IT Consultant Office 365 Spam Budget Access Control Hard Drives Content Filtering Gmail Windows 7 Going Green Government Cybercrime Maintenance Managed IT Printer Bring Your Own Device Antivirus Hiring/Firing Healthcare Outlook Best Practice Windows 8 Lithium-ion Battery Computers Saving Time VPN Recovery Employer-Employee Relationship Managed Service Retail Virus Tech Support Wireless Technology Cost Management Search Information Money Document Management iPhone Customer Service Computing It Management IBM Blockchain Travel Data Loss Humor Augmented Reality Education Update Hacking Project Management Phone System Networking Avoiding Downtime Current Events Regulations Computer Repair Running Cable Proactive IT Wireless Data Security SaaS Applications Storage Website Patch Management Customer Relationship Management Intranet Law Enforcement Twitter File Sharing Conferencing Solid State Drive Hard Drive PowerPoint Compliance Data storage Data Breach Mobility Value Password Risk Management Flexibility Administration Hacker Save Time Downtime Legal Private Cloud Software as a Service Vulnerabilities User Wi-Fi Comparison Tablet Virtual Desktop Company Culture Paperless Office Telephony Remote Work Machine Learning Sports Social Disaster Cooperation Telephone Systems Social Networking Fax Server Hosted Solution Covid-19 DDoS Excel Vendor End of Support Robot Securty Scam Word Google Maps Black Market Cortana Monitoring Digital Cryptocurrency Net Neutrality Social Engineering Business Intelligence Websites Laptop Voice over Internet Protocol Business Growth Digital Payment Management Router Meetings Presentation Computer Accessories Inbound Marketing Office Tips Download Telephone User Error Co-managed IT Uninterrupted Power Supply Managed Services Specifications Safety Vulnerability Trending YouTube Employee/Employer Relationship Pain Points Unified Communications Managed IT Service Settings Bitcoin Mouse Microchip Taxes Distributed Denial of Service Documents Data Protection Teamwork Heating/Cooling Lifestyle Programming Entertainment Statistics Downloads Network Congestion Processor Public Cloud Licensing IT service Distribution Identity Theft Gaming Console Streaming Media Redundancy Bluetooth Professional Services eWaste Politics Evernote Text Messaging Virtual Reality Webcam Smart Devices Automobile Virtual Assistant Integration Emails Memory Chrome Google Docs Chromebook Experience Computing Infrastructure Hack Processors Start Menu Tech Terms USB Mobile Technology Cleaning Managed Services Provider How To Multi-factor Authentication Monitors Computer Care Advertising Directions Flash Display Internet Service Provider Cabling Migration Connected Devices IP Address Microsoft Excel online Currency CIO Recording Optimization Web Server Wireless Headphones IT Assessment Books Workers Network Management Application Google Drive Windows Server 2008 Adminstration Pirating Information Staffing Google Wallet SSID How To Administrator Equifax Fleet Tracking Human Resources Leadership Windows XP Dark Web Free Resource Spyware Mobile Payment Society Processing Remote Working Device security MSP Webinar LinkedIn Health IT Displays Supercomputer Electricity Printing Wasting Time Worker Desktop Finance Micrsooft Logistics Virtual Machines Nanotechnology Social Network Electronic Health Records Reading Samsung Business Cards Digital Signature Service Level Agreement Archive Drones Cyber security Startup Asset Tracking Skype Bookmark Employer Employee Relationship Unified Threat Management Backup and Disaster Recovery cache Television Google Play Telephone Service G Suite Username Employer/Employee Relationships Memes Customer Resource management WannaCry Upselling Point of Contact Permissions Language Managing Costs Managing IT Services Gamification Microsoft 365 Hacks Physical Security Screen Reader Browsers Surveillance Relocation Tablets Piracy Upload Best Practives Time Management Freedom of Information Video Surveillance Medical IT Trend Micro Banking Botnet Smart Tech PDF Corporate Profile Fiber-Optic Best Available Database Keyboard Assessment SharePoint Music Security Cameras Threats Remote Workers Sync HTML Saving ZTime switches User Tip Writing Proactive Maintenance IT Telephone System Microserver Google Calendar Analytic Navigation Virtual Machine Virtual Private Network Mobile Security Domains Tip of the week Recycling Upgrades Solutions Notifications CCTV Harddrive Product Reviews LiFi Data Analysis Employees Development Reliable Computing Software License Trends Public Speaking Touchscreen News Debate eCommerce Business Metrics Computer Malfunction Multi-Factor Security Cost VoIP Fraud Tactics Shortcut Get More Done Consultation GPS Read GDPR Managing Risk In Internet of Things Devices Knowledge SQL Server Entrepreneur Turn Key Technology Tips Tech Work/Life Balance Hypervisor Procurement UTM Troubleshooting Content Printer Server External Harddrive Deep Learning Audit Visible Light Communication Fileless Malware Hybrid Cloud Video Conferencing Scalability IT Plan HIPAA Enterprise Resource Planning Trojan Fake News Device Management Holidays Motion Sickness Legislation Environment Error Communitications Messenger Tracking email scam Addiction Competition Data Warehousing 3D Content Management Ebay Modem Strategy Accountants Electronic Payment A.I. Organize Thin CLient Business Managemenet IT consulting Proxy Server Azure Access Term Supply Chain Management Business Owner Emergency Smart Phones Hard Drive Disposal Electronic Medical Records Transportation Rental Service Productuvuty Personal Information Financial CrashOverride Managing Stress Regulation Printers Capital 3D Printing