Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Third Party Software Can Be Risky Business

For software, the number of Internet security vulnerabilities is a key component in determining its quality and usability.  Software with multiple vulnerabilities causes constant nightmares for computer users and computer support specialists alike.

Recently, security company Secunia reported that Apple had the most Internet security vulnerabilities of any software company.  This was surprising, given Apple’s historically strong Internet security track record.

However, Secunia’s more important news was that most Internet security vulnerabilities come from third party software. Read more »


Internet Security: Wi-Fi is Vulnerable

Our desire for constant connectivity has given rise to free Wi-Fi networks in hotels, coffee shops, and airports.  At home, many of us take extensive Internet security precautions, yet when it comes to free Wi-Fi, we don’t seem to realize the dangers we open ourselves up to such as malware, viruses, and even identity theft.

So what exactly is the difference in terms of Internet security, between the free Wi-Fi networks and those we use at home or work?  It’s simple – there is no Internet security with Wi-Fi. Read more »


Internet Security: The AV Virus

RESCUECOM’s computer support specialists handle hundreds of calls every week, giving them a sense of what the biggest Internet security threats currently are.

“Right now,” says Stanley Memmelaar a member of RESCUECOM’s sales team, “the AV virus is the number one Internet security problem.” Read more »


Internet Security: Protect Your Children and Your Computer

Protecting your family’s Internet security is a major concern.  RESCUECOM offers some summertime tips for protecting against online dangers and computer repair.

Summer vacation means more time spent online, and more chances for kids to fall victim to scams or predators, jeopardizing your Internet security.

Imagine your child on Facebook, staring at a video link from a “friend”.  Which do you think wins out – your child’s concerns about Internet security, or curiosity over seeing the “hot” new video?

Online scammers thrive on that curiosity.  That Facebook video link might hide a damaging virus.  Every click your child makes risks your Internet security.

So what can you do? Read more »


Rescuecom Releases 5 Tips to Detect Phishing

Phishing attacks threaten our Internet security and can be hard to detect.  They can lead to identity theft, viruses, or the need for computer repair.  To help protect your Internet security, RESCUECOM’s computer repair experts offer five simple tips for detecting phishing attacks.

•1.) Avoid Action – Phishing attacks work when you take action.  An email that requests information or features clickable links may be an attack against your Internet security.  Legitimate emails include cut and past style links to help you avoid clicking.  If there are only clickable links, the email is likely a phishing scam. Read more »


Internet Security: Fake Anti Virus Programs

RESCUECOM reminds users to utilize only legitimate anti virus software, such as our Internet Security Suite.

A common cyber attack uses fake anti virus software as a means for infecting computers with malware.  These attackers rely on fear to trick users into violating their own Internet security.  Read more »


Internet Security: Browser Hijack!

RESCUECOM offers suggestions to prevent browser hijacking, protect your computer, and utilize computer support.

A common Internet security threat is browser hijacking.  Malware programs can hijack your Internet browser, changing your home page, altering your settings, and decreasing functionality.   There are ways to prevent this Internet security violation.  Read more »


71-80 of 1857
© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending