facebook linkedin twitter

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

0 Comments
Continue reading

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

ALERT: Your Business’ Infrastructure May Be Susceptible to Meltdown/Spectre Vulnerability

You’d think that Intel would make sure their firmware is of sound integrity, but unfortunately, a recently discovered vulnerability has revealed that it’s not as secure as previously thought. The issue involving Intel’s chips could potentially lead to a permanent nosedive for your CPU’s capacity to perform as intended, which could have disastrous implications for your business.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Workplace Tips Network Security Backup Managed Service Provider Productivity Business Hosted Solutions Email Malware IT Services Saving Money Efficiency Computer Google Productivity User Tips IT Support Innovation Small Business Smartphones Mobile Devices Quick Tips Data Backup VoIP Collaboration Microsoft Office Business Continuity communications Gadgets Social Media Android Network Data Recovery Disaster Recovery IT Support Server Upgrade Mobile Office Communication Virtualization Mobile Device Management Smartphone Miscellaneous Cybersecurity Phishing Ransomware Windows 10 Windows Tech Term Holiday Operating System Vendor Management Unified Threat Management Passwords Apps Facebook Outsourced IT Managed IT Services Remote Monitoring Automation BYOD Remote Computing Managed IT services Mobile Computing BDR Mobile Device Analytics Users WiFi Apple Internet of Things Artificial Intelligence The Internet of Things Data Management Marketing History Browser Save Money Firewall Alert App Big data Help Desk Cloud Computing IT Consultant Encryption Spam Office 365 Two-factor Authentication Business Technology Office Government Health Cybercrime Content Filtering Windows 10 Information Technology Going Green Training Bring Your Own Device Maintenance Printer Antivirus Gmail Bandwidth Managed Service Managed IT Employer-Employee Relationship Lithium-ion Battery Best Practice Information Cost Management Windows 8 Outlook Hiring/Firing Hard Drives Budget Wireless Technology Computers Saving Time Tech Support Search VPN Virus Travel Blockchain Data Loss Education Recovery Update Retail Phone System Networking Hacking IBM Money Document Management Healthcare Access Control Customer Service It Management Twitter Patch Management Intranet Mobility Website Conferencing Compliance Avoiding Downtime Data storage Risk Management iPhone Current Events Password Value Legal Save Time Hacker Downtime Regulations Augmented Reality PowerPoint SaaS Computing Running Cable Proactive IT Humor File Sharing Applications Administration Hard Drive Law Enforcement Google Maps DDoS Storage Solid State Drive Social Engineering Scam Flexibility Black Market Data Breach Cryptocurrency Monitoring Word Laptop Digital Business Intelligence Private Cloud Cortana Business Growth Project Management Digital Payment Websites Management Excel Telephony Router Customer Relationship Management Machine Learning Vulnerabilities Comparison Tablet Paperless Office Fax Server Telephone Systems Company Culture Vendor Sports User Computer Repair Disaster End of Support Social Networking Hosted Solution Windows 7 Social Robot Data Security Wireless Securty Downloads Entertainment Teamwork Heating/Cooling Politics Virtual Reality Emails Bluetooth Streaming Media Automobile Inbound Marketing Voice over Internet Protocol Redundancy Chromebook Computing Infrastructure Hack Meetings Pain Points Memory Evernote How To eWaste Google Docs Net Neutrality Co-managed IT Experience Chrome Virtual Assistant User Error Download Monitors Cleaning Wi-Fi Telephone Office Tips Start Menu Tech Terms Managed IT Service Mobile Technology Processors Computer Accessories Microchip Taxes YouTube Cooperation Software as a Service Lifestyle Distributed Denial of Service USB Presentation Gaming Console Unified Communications Settings Uninterrupted Power Supply Trending Processor Public Cloud Licensing Mouse Vulnerability Specifications Safety Text Messaging Bitcoin Virtual Desktop Webcam Programming Identity Theft Data Protection Statistics IT service Network Congestion Documents Distribution Data Analysis switches Employees Writing WannaCry Reliable Computing HTML 3D Ebay Professional Services Music Get More Done Business Metrics Computer Malfunction Fiber-Optic Database Thin CLient Printer Server Mobile Security GDPR Time Management Freedom of Information Turn Key In Internet of Things Telephone System Smart Phones SQL Server Upgrades Corporate Profile Software License Trends Tech LiFi Hypervisor Assessment SharePoint Analytic Multi-Factor Security PDF Cost Integration Recycling Trojan Leadership Fileless Malware Hybrid Cloud Google Calendar Product Reviews Organize Scalability Devices Adminstration Pirating Information Tip of the week Motion Sickness Fraud Best Available Tactics Keyboard VoIP Messenger Tracking UTM Content Domains Modem Work/Life Balance Touchscreen News Read Proxy Server Azure Deep Learning Rental Service IT Plan Enterprise Resource Planning Public Speaking Term Visible Light Communication Managed Services Provider Consultation Legislation Error Electronic Medical Records Transportation Knowledge Directions IT consulting Display Technology Tips Cabling Accountants A.I. Recording Device Management Web Server email scam Addiction Shortcut Free Resource Audit Business Managemenet Webinar Books Workers Multi-factor Authentication Troubleshooting SSID How To Content Management Fake News Administrator Entrepreneur Dark Web Supercomputer Migration HIPAA Connected Devices Upselling Processing Advertising Managed Services Flash Data Warehousing Wireless Headphones Environment Health IT CIO Employee/Employer Relationship Windows XP Wasting Time Access Worker Equifax Electronic Payment Fleet Tracking Video Surveillance Staffing Logistics Google Wallet Emergency online Currency Hard Drive Disposal Network Management Competition Bookmark Displays Computer Care Reading Samsung Device security Business Owner MSP Society Cyber security Microsoft Excel Saving ZTime Employer Employee Relationship Desktop Finance IP Address Google Play Telephone Service Google Drive Windows Server 2008 G Suite Nanotechnology Social Network Employer/Employee Relationships Micrsooft LinkedIn Service Level Agreement Application Harddrive Managing Costs Spyware Mobile Payment Startup Asset Tracking Human Resources Debate Microsoft 365 Drones Best Practives Hacks Physical Security Business Cards Browsers Electricity Printing Skype Relocation Tablets Username GPS Medical IT Archive Banking Botnet Unified Threat Management Backup and Disaster Recovery Gamification Security Cameras Permissions Threats Language Microserver Sync Screen Reader Customer Resource management External Harddrive User Tip Proactive Maintenance Piracy Digital Signature Upload Navigation Virtual Machine cache Point of Contact Television Smart Tech Solutions Notifications CCTV Managing Stress Managing Risk Printers CrashOverride Regulation Strategy 3D Printing Capital Personal Information Productuvuty Financial

toner1