facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s a Reason Some Scams are Painfully Transparent

There’s a Reason Some Scams are Painfully Transparent

“Hello sir/ma’am, I am a member of royal [sic] family and I am in grave danger in my country. If you send me money to get out safely, I will share my great riches with you as reward.”

Scams like this one have become a punchline for many, which makes you wonder why they are still commonly used by cybercriminals. As it turns out, there’s a very compelling reason that they do so, one that’s been known for years.

0 Comments
Continue reading

VoIP Has a Spam Problem

VoIP Has a Spam Problem

Robocalls plague the world’s smartphone users, but have you ever stopped to ask why you receive them in the first place? Why are robocallers able to hide behind a local number so that you pick up the phone? Scammers are actually using a business tool you may have heard of… Voice over Internet Protocol, or VoIP, a modern phone solution that in the hands of anyone else is extremely helpful.

0 Comments
Continue reading

How to Identify If an Email is a Security Risk

How to Identify If an Email is a Security Risk

There’s one major reason why email is the preferred method of spreading threats like ransomware and other types of malicious software. The sheer number of messages that can be sent through email on its own increases the odds that a user will click on the wrong link or download the wrong attachment. How can you know the legitimacy of any message you receive in your email inbox?

0 Comments
Continue reading

Tip of the Week: A URL Can Help Give Away A Phishing Attack

b2ap3_large_phishing_status_400

Back in 1995, scammers pulled the first phishing attack. They took the identity of AOL employees and requested the billing information of users through instant messaging. More sophisticated phishing attempts have evolved over the years, culminating in the commonly-seen email phishing attack, which tricks users into handing over personal or sensitive information. Phishing attacks can be seen through, so we’ll show you how you can identify threats before they become a problem.

0 Comments
Continue reading

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

27 Million Spam Messages Earns Man the Title of “Spam King,” and 2.5 Years in Prison

The man who, between 2008 and 2009, stole the log-in credentials of Facebook users to spread his credential-stealing web links, has been sentenced to some hard time.

0 Comments
Continue reading

Don’t Let Spam and a Messy Inbox Hinder Productivity

b2ap3_thumbnail_manage_your_email_400.jpgEmail is a communication solution that clearly shows its age, but it’s still a vital component of the modern office. Despite your best efforts to find a better way to communicate, email is a staple that’s proving to be difficult, if not impossible, to adequately replace. Therefore, it makes the most sense to make using email as painless as possible. Here’s how it’s done.

0 Comments
Continue reading

78% of Phishing Scams are Hackers Impersonating IT Staff

b2ap3_thumbnail_phishing_emails_400.jpgWhen it comes to protecting your business from hackers, having a strong firewall is important, but it isn’t enough to fully keep the bad guys out of your network. If they can’t hack their way through a system vulnerability, they will try another, more devious way; namely, by tricking your staff with phishing tactics.

0 Comments
Continue reading

4 Signs that You’ve Received an Email Scam

b2ap3_thumbnail_avoid_phishing_scams400.jpgThe most common way malware spreads is through phishing emails. These messages are essentially traps designed to trick you into downloading a malicious virus. How do you know if you've got a phishing email on hand? The best way to avoid a phishing scam is to know what the bait looks like.

0 Comments
Continue reading

Where Did Internet Spam Come From?

b2ap3_thumbnail_spammy400.jpgSpam in your email inbox is extremely annoying. Email spam is always an eyesore, and swallows up valuable time wasted on sifting through your inbox. Have you ever wondered how email spam got its name? You may be surprised to find the answer. Here's a hint: it has something to do with Vikings, a diner, canned meat, and a British comedy.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Data Hackers Business Management Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration IT Support VoIP IT Support Smartphones Data Backup Quick Tips Network Mobile Devices communications Business Continuity Microsoft Office Gadgets Cybersecurity Disaster Recovery Data Recovery Android Social Media Upgrade Mobile Office Server Communication Virtualization Phishing Smartphone Mobile Device Management Miscellaneous Ransomware Holiday Vendor Management Outsourced IT Passwords Apps Operating System Managed IT Services Windows 10 Windows Tech Term Internet of Things Facebook Unified Threat Management Users Mobile Device Remote Monitoring Automation BDR BYOD Remote Computing Apple Managed IT services Data Management Mobile Computing Analytics Windows 10 WiFi The Internet of Things History Marketing Cloud Computing Artificial Intelligence Training Firewall Browser Save Money Spam Business Technology App Encryption Alert Big data Help Desk Two-factor Authentication Bandwidth Information Technology Office Office 365 Health IT Consultant Antivirus Access Control Gmail Government Hard Drives Windows 7 Managed IT Cybercrime Maintenance Content Filtering Printer Going Green Bring Your Own Device Budget Managed Service Search Hiring/Firing Outlook Windows 8 Recovery Employer-Employee Relationship Saving Time Computers Retail VPN Information Best Practice Lithium-ion Battery Cost Management Virus Tech Support Healthcare Wireless Technology Customer Service Remote Work Money Document Management Data Security It Management Blockchain iPhone Humor Data Loss Travel Education Hacking Networking IBM Update Project Management Augmented Reality Phone System Computing Downtime Administration File Sharing Wireless Hard Drive Law Enforcement Covid-19 Vendor Conferencing Storage Website Compliance Computer Repair Running Cable Mobility Avoiding Downtime Solid State Drive Proactive IT Data storage Flexibility Patch Management Twitter Value Intranet Password Voice over Internet Protocol Data Breach Hacker Legal Customer Relationship Management Risk Management Regulations PowerPoint Current Events Applications SaaS Save Time Social Router End of Support Software as a Service Hosted Solution Cooperation Robot Securty Comparison Tablet DDoS Company Culture Google Maps Fax Server Social Networking Social Engineering Monitoring Black Market Word Cryptocurrency Laptop Scam Meetings Management Cortana Business Growth Excel Private Cloud Wi-Fi Vulnerabilities Telephony Digital Machine Learning Telephone Systems Websites Net Neutrality Paperless Office Sports Business Intelligence User Disaster Digital Payment Virtual Desktop User Error Distribution Managed IT Service Co-managed IT Identity Theft Uninterrupted Power Supply Computer Accessories Documents Vulnerability Teamwork Heating/Cooling IT service Entertainment Cost Processor Trending Bitcoin Lifestyle Virtual Reality Data Protection Inbound Marketing Politics Mouse Automobile Emails Bluetooth Solutions Chromebook Downloads Programming Statistics Professional Services Computing Infrastructure Hack Network Congestion Pain Points eWaste How To Multi-factor Authentication Google Docs Smart Devices Memory Experience Redundancy Integration Download Telephone Streaming Media Monitors Cleaning Office Tips Evernote Processors Virtual Assistant USB Microchip Taxes Managed Services Provider Distributed Denial of Service YouTube Presentation Gaming Console How To Start Menu Tech Terms Unified Communications Chrome Settings Public Cloud Licensing Text Messaging Employee/Employer Relationship Webcam Mobile Technology Specifications Safety Managed Services Logistics Virtual Machines Banking Botnet Smart Tech External Harddrive Computer Care Wasting Time Relocation Tablets Piracy Upload Microsoft Excel Cyber security Sync HTML Financial Data Digital Signature Bookmark Webinar Fiber-Optic Google Drive Database Permissions Windows Server 2008 Electronic Health Records online Currency Language Mobile Security 3D Ebay Employer/Employee Relationships Notifications CCTV Spyware Mobile Payment Telephone System Memes Thin CLient Google Play Telephone Service Microsoft 365 Business Metrics Computer Malfunction Electricity Multi-Factor Security Smart Phones switches Printing Writing Managing Costs Reliable Computing Software License Trends Music Managing IT Services LinkedIn Medical IT Trend Micro In Internet of Things Devices Upgrades Telework Browsers Fraud Tactics Surveillance PDF UTM Content Adminstration Remote Workers Skype Pirating Information Best Available Keyboard User Tip Proactive Maintenance cache LiFi Television IT Archive Leadership Security Cameras Threats Virtual Private Network Best Practives Motion Sickness WannaCry Legislation Error Domains Navigation Virtual Machine Scalability IT Plan Enterprise Resource Planning eCommerce Corporate Profile Accountants A.I. Point of Contact Deep Learning FinTech Public Speaking Data Analysis Employees Messenger Tracking email scam Time Management Addiction Freedom of Information Development Work/Life Balance Microserver Data Storage Shortcut SQL Server Rental Service Assessment Visible Light Communication SharePoint GDPR Managing Risk Migration Connected Devices Tip of the week Procurement Entrepreneur Web Server Wireless Headphones IT consulting Google Calendar Troubleshooting Tech Hypervisor Cabling Holidays Get More Done Administrator VoIP Equifax Fleet Tracking Analytic HIPAA Fileless Malware Hybrid Cloud Books Workers Touchscreen Network Management Recycling Upselling News Video Conferencing Environment Strategy Turn Key Device security CIO Knowledge MSP PCI DSS Product Reviews Video Surveillance Competition Proxy Server Azure Printer Server Supercomputer Consultation Advertising Communitications Flash Electronic Payment Modem Worker Desktop Staffing Finance Google Wallet Supply Chain Management Electronic Medical Records Transportation Trojan Nanotechnology Windows XP Technology Tips Social Network Saving ZTime Read Business Owner Term Recording Optimization Startup Audit Asset Tracking Displays IP Address Directions Display Organize Reading Samsung Business Cards Service Level Agreement Society Fake News Internet Service Provider SSID G Suite Username Micrsooft Regulations Compliance Debate Application Dark Web Free Resource Employer Employee Relationship Unified Threat Management Backup and Disaster Recovery Device Management Harddrive Data Warehousing IT Assessment Human Resources Emergency Gamification GPS Drones Hard Drive Disposal Remote Working Business Managemenet Health IT Hacks Physical Security Access Screen Reader Customer Resource management Content Management Processing Productuvuty Personal Information Managing Stress Regulation Financial Printers CrashOverride 3D Printing Capital

toner1