Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

“Here You Have” Illustrates Internet Security Failures

A new Internet security attack spread through email Thursday, though it came in somewhat old packaging.

The attack, dubbed “Here you have” after the subject line of the phishing attack emails, was reminiscent of attacks from 2000 and 2001.  Those attacks, the ILoveYou and Anna Kournikova worms, were the last significant mass email attacks, until now.  The Kournikova worm even used the same “Here you have” subject line. Read more »


Rescuecom Computer Reliability Report – 2nd QT 2010

What is reliability?

When it comes to manufacturing a reliable computer, it means more than just putting together something that works.  It’s about putting together a computer that holds up and functions well over the long haul.  It’s about providing computer service when that computer doesn’t hold up, and about ensuring that a customer gets the fixes they need to get up and running again. Read more »


How to Choose a Quality Computer Repair Service

SYRACUSE, N.Y., August 27, 2010 – Any time you seek out computer repair or computer support services, you are putting a great deal of trust in someone.  To help you choose only a quality and reputable computer repair service, Rescuecom offers these tips.  Read more »


iTunes Users Victimized by Phishing Scams

Users of Apple’s iTunes store have been victimized yet again, but not because of Apple.

A series of ongoing phishing scams have tricked users of Apple’s online service into revealing login information.  In turn, this has allowed hackers to bypass the Internet security of those users with ease.

Once logged into the account, hackers have rung up hundreds or even thousands of dollars in charges.

Most of the attacks have happened with accounts linked to PayPal.  In many cases, hackers have used the stolen funds to purchase iTunes gift codes – online gift cards – which they can then resell on the Internet for a profit.

Unlike many Internet security attacks which originate with a security breach on the part of the vendor, this attack seems to be largely caused by trusting users being victimized by phishing emails.

These sorts of fraudulent emails are sent to users, often requesting that they verify login information.  Because the emails appear to be legitimate, many users click on the links within them or enter their private account information.

Once hackers posses that info, they simply log in.  The account, and everything linked to it, is easy pickings.

To protect yourself and your iTunes and PayPal accounts, follow these simple Internet security tips:

  • Never provide your login information via email
  • iTunes and other legitimate businesses will not request such information through email
  • If you suspect an email is a phishing attack, report it to the merchant, your ISP, and/or your email provider
  • Verify the legitimacy of an email by contacting the supposed sender at the email address or website you know is real

 

For more information on protecting yourself, read Rescuecom’s 5 Tips to Detect Phishing.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Rescuecom Releases Top 5 Tips for Handling a Technology Crisis

SYRACUSE, N.Y., August 19, 2010 – Any computer malfunction is a nerve wracking experience.  Whether it’s a situation that requires significant computer repair, or only minimal computer support, every computer crisis can seem like a catastrophe.  Rescuecom’s computer support specialists offer theses 5 tips for handling your next technology crisis.  Read more »


40 Windows Apps Feature Critical Vulnerabilities

For users of Windows and its associated applications, the news is not good this morning.

Noted Internet security researcher HD Moore, of Rapid 7, reported Wednesday that 40 different Windows applications have serious security vulnerability.

The vulnerabilities are, according to Moore, similar to one found in Apple’s iTunes for Windows.  Apple has patched the vulnerability in that program. Read more »


RESCUECOM Releases Top 5 Tips for Defending Against Malware

SYRACUSE, N.Y., August 16, 2010 – McAfee, a top Internet security company, recently announced that malware attacks are at an all-time high.  According to McAfee, 10 million new pieces of malware were cataloged during the first half of this year.  With this Internet security threat reaching such significant heights, Rescuecom offers these tips to protect your computer from such an attack.  Read more »


Viral Content: A Hidden Threat

Those funny videos on Facebook can actually be a major cause of computer repair problems.  Accessing viral content increases your chances of needing computer repair or computer support.

Just how extensive has the “viral video” craze gotten?

This week, a website called The Chive posted a series of pictures of a young woman quitting her job via dry erase board messages emailed to her co-workers. Read more »


Tips on Making a Budget Wise Technology Purchase

With many of us tightening our belts because of the recession, every purchase needs to be made with our budgets in mind. However, making a budget purchase when it comes to technology can sometimes turn into a budget buster once the high costs of computer repair and computer support are factored in.

Purchasing a budget minded product can be a short term cost savings.  Unfortunately, those cost savings are often offset by additional costs for computer repair and computer support that these devices incur. Read more »


Computer Support Tips: Making the Most of Patches

A key component in keeping your Internet security up to date is the free form of computer support provided by many major software companies – patches.

For example, Microsoft releases Internet security patches, along with non security computer support updates, on the second Tuesday of every month or “Patch Tuesday.”

Tomorrow’s Patch Tuesday will feature 14 bulletins with patches for thirty-four Internet security vulnerabilities in Microsoft’s products including Windows, Office, and Internet Explorer. Read more »


131-140 of 1857
© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending