facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hackers Take the Law Into Their Own Hands, Is This a Good Thing?

b2ap3_thumbnail_vigilante_hackers_400.jpgIn 2015, we saw countless hacking attacks against major corporations, from health insurance providers like Blue Cross Blue Shield and Anthem, to government offices, like the United States Office of Personnel. Due to the stigma associated with hacking, we often forget that there are a lot of hackers out there who try to use their skills for good--or, at least, less awful purposes.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Cloud Internet Software Business Management Data Hackers Hardware Microsoft Workplace Tips Backup Network Security Managed Service Provider Productivity Hosted Solutions Business Email Malware IT Services Saving Money Efficiency Computer Google Productivity IT Support User Tips Innovation Small Business Smartphones Mobile Devices VoIP Quick Tips Data Backup communications Microsoft Office Business Continuity Gadgets Social Media Collaboration Disaster Recovery Data Recovery IT Support Android Network Upgrade Server Mobile Office Communication Virtualization Cybersecurity Mobile Device Management Smartphone Miscellaneous Phishing Ransomware Tech Term Windows 10 Windows Outsourced IT Operating System Holiday Unified Threat Management Vendor Management Passwords Apps Facebook Automation Managed IT Services Remote Monitoring Users BYOD Remote Computing Managed IT services Mobile Computing Mobile Device BDR Analytics Internet of Things WiFi Apple History Artificial Intelligence Marketing Data Management The Internet of Things Browser Save Money Firewall Help Desk App Alert Big data Office 365 Two-factor Authentication Business Technology IT Consultant Cloud Computing Encryption Spam Bring Your Own Device Training Maintenance Printer Antivirus Gmail Bandwidth Health Government Office Content Filtering Cybercrime Information Technology Going Green Windows 10 Hiring/Firing Wireless Technology Hard Drives Budget Virus Tech Support Search Saving Time Computers VPN Managed Service Managed IT Employer-Employee Relationship Lithium-ion Battery Best Practice Outlook Cost Management Windows 8 Information Document Management Healthcare Access Control Customer Service It Management Travel Blockchain Education Data Loss Recovery Phone System Update Retail IBM Networking Hacking Money Humor Proactive IT Administration SaaS Computing Running Cable File Sharing Law Enforcement Applications Hard Drive Avoiding Downtime Twitter Intranet Compliance Mobility Website Patch Management iPhone Data storage Conferencing Current Events Risk Management Value Password Legal Save Time Hacker Augmented Reality Downtime Regulations PowerPoint Telephone Systems Comparison Tablet Paperless Office Vulnerabilities Sports Company Culture User Computer Repair Vendor Disaster End of Support Social Networking Hosted Solution Robot Social Securty Windows 7 Wireless Data Security Google Maps DDoS Storage Solid State Drive Social Engineering Flexibility Scam Black Market Word Cryptocurrency Data Breach Excel Laptop Monitoring Business Intelligence Private Cloud Cortana Business Growth Digital Customer Relationship Management Digital Payment Project Management Telephony Websites Router Management Fax Server Machine Learning Distributed Denial of Service USB Managed IT Service Mobile Technology YouTube Webcam Trending Presentation Cooperation Software as a Service Text Messaging Unified Communications Settings Mouse Public Cloud Licensing Uninterrupted Power Supply Virtual Desktop Processor Specifications Safety Vulnerability Statistics Bitcoin Programming Identity Theft IT service Network Congestion Documents Data Protection Teamwork Heating/Cooling Distribution Entertainment Inbound Marketing Downloads Politics Virtual Reality Emails Bluetooth Streaming Media Automobile Chromebook Pain Points User Error Co-managed IT Voice over Internet Protocol Redundancy Computing Infrastructure Hack Google Docs Net Neutrality Meetings Memory How To eWaste Chrome Download Evernote Experience Monitors Virtual Assistant Cleaning Wi-Fi Office Tips Lifestyle Computer Accessories Microchip Taxes Gaming Console Telephone Processors Start Menu Tech Terms Best Practives Wasting Time Access Harddrive Displays Equifax Fleet Tracking Reading Samsung Business Owner Logistics Emergency Hard Drive Disposal Debate Society Network Management Bookmark Computer Care Micrsooft LinkedIn Device security MSP Employer Employee Relationship IP Address Microsoft Excel GPS G Suite Drones Desktop Finance Hacks Physical Security Application Google Play Telephone Service Google Drive Windows Server 2008 Nanotechnology Social Network Microserver Human Resources Employer/Employee Relationships External Harddrive Service Level Agreement Banking Botnet Managing Costs Spyware Mobile Payment Skype Startup Asset Tracking Relocation Tablets Microsoft 365 Archive Business Cards Browsers Electricity Printing Thin CLient Username Medical IT 3D Ebay Permissions Language Unified Threat Management Backup and Disaster Recovery Sync Get More Done Gamification Notifications CCTV Printer Server Digital Signature Security Cameras Threats Point of Contact Screen Reader Customer Resource management Turn Key User Tip Proactive Maintenance Smart Phones Piracy Upload Business Metrics Computer Malfunction Trojan Navigation Virtual Machine cache Television switches Writing Smart Tech Reliable Computing Solutions Music Data Analysis Employees WannaCry Leadership Upgrades HTML Organize Professional Services Adminstration Pirating Information Fiber-Optic Database In Internet of Things Recycling Mobile Security GDPR Time Management Freedom of Information LiFi Analytic Telephone System PDF SQL Server Corporate Profile Software License Trends Motion Sickness Best Available Keyboard Tech Hypervisor Assessment SharePoint Product Reviews Multi-Factor Security Cost Scalability Integration Fileless Malware Hybrid Cloud Google Calendar Deep Learning Devices Messenger Tracking Domains Tip of the week Work/Life Balance Read Fraud Tactics VoIP UTM Content Rental Service Webinar Public Speaking Modem Touchscreen News Visible Light Communication Proxy Server Azure IT Plan Enterprise Resource Planning Web Server Shortcut Term Managed Services Provider Consultation Upselling IT consulting Legislation Error Cabling Electronic Medical Records Transportation Knowledge Device Management Administrator Entrepreneur Directions Display Technology Tips Business Managemenet Accountants A.I. Books Workers Troubleshooting Recording Video Surveillance Content Management email scam Addiction Free Resource Audit Saving ZTime CIO Multi-factor Authentication Supercomputer HIPAA SSID How To Fake News Advertising Flash Environment Dark Web online Currency Migration Connected Devices Competition Processing Managed Services Data Warehousing Windows XP Wireless Headphones Worker Electronic Payment Health IT Employee/Employer Relationship Staffing Google Wallet Personal Information Productuvuty Cyber security Financial Managing Stress Managing Risk Printers CrashOverride Regulation Strategy 3D Printing Capital

toner1