Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Clickjacking Strikes Again

Facebook users may have been victimized by yet another scam.

Internet security firm Sophos has release information on another ‘clickjacking’ scam that hackers recently used to defraud Facebook users out of $5 a week.

While that may not sound like a very big scam, multiply $5 by even a fraction of Facebook’s 500 million users, and the totals add up quickly. Read more »


Facebook to Make Location Services Announcement

Facebook, the world’s number one social networking site, will hold a news event tomorrow at its corporate headquarters, to announce its new location-based service.

While Facebook has confirmed little, it has been rumored that the social networking site might be partnering with Foursquare, which Facebook attempted to buy earlier this year. Read more »


Facebook ‘dislike button’ really a viral attack

A new scam has begun spreading virally through Facebook, based on the often requested ‘dislike’ button.

Facebook, which allows users to ‘like’ posts, pages, and other content, has yet to create or approve a ‘dislike’ button.

Now a new scam spreading throughout the site tricks users into installing a rogue application which claims to be a dislike button.

Instead, the application uses each user’s account to virally spread itself, much like the “hot” and “funny” video scams which have plagued the social networking site in recent months.

Those attacks were designed to steal information from users, including their login credentials.

Protect yourself from this scam by avoiding any links, even from friends, that claim to provide a dislike button.  If you’ve already been victimized, deactivate the application, delete all posts referencing it from your wall, and eliminate it from your ‘likes’ and ‘interests’ in your profile.

As with the previous scams of this sort, changing your Facebook password is also recommended.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Viral Content: A Hidden Threat

Those funny videos on Facebook can actually be a major cause of computer repair problems.  Accessing viral content increases your chances of needing computer repair or computer support.

Just how extensive has the “viral video” craze gotten?

This week, a website called The Chive posted a series of pictures of a young woman quitting her job via dry erase board messages emailed to her co-workers. Read more »


NEWS: Hackers Move to the Cloud

Internet Security News:  Hackers Move to the Cloud

Earlier this week McAfee reported that malware has reached previously unheard of levels, with over 10 million new pieces of malware cataloged over the first half of this year.

Unfortunately, not only are hackers developing more and more new bits of malicious code, they’re also developing new ways to deliver them.

Late last month, database security company Imperva discovered a “master hacker” phishing attack that indicated the hackers has based their attack in the cloud. Read more »


Computer Support Tips: Making the Most of Patches

A key component in keeping your Internet security up to date is the free form of computer support provided by many major software companies – patches.

For example, Microsoft releases Internet security patches, along with non security computer support updates, on the second Tuesday of every month or “Patch Tuesday.”

Tomorrow’s Patch Tuesday will feature 14 bulletins with patches for thirty-four Internet security vulnerabilities in Microsoft’s products including Windows, Office, and Internet Explorer. Read more »


Internet Security: Safe Searching with Google

Google is the “King of Search”.  Now, it has another, less flattering title: “King of Malware.”  Google search results have become an Internet security threat.

The Barracuda Labs 2010 Midyear Security Report studied search engine results for ‘trending’ topics, and showed significant flaws in Google’s Internet security.

According to Barracuda, Google searches resulted in far more malware infected links – 69% – than results for Yahoo, Bing, and Twitter combined.  Read more »


Third Party Software Can Be Risky Business

For software, the number of Internet security vulnerabilities is a key component in determining its quality and usability.  Software with multiple vulnerabilities causes constant nightmares for computer users and computer support specialists alike.

Recently, security company Secunia reported that Apple had the most Internet security vulnerabilities of any software company.  This was surprising, given Apple’s historically strong Internet security track record.

However, Secunia’s more important news was that most Internet security vulnerabilities come from third party software. Read more »


Internet Security: Wi-Fi is Vulnerable

Our desire for constant connectivity has given rise to free Wi-Fi networks in hotels, coffee shops, and airports.  At home, many of us take extensive Internet security precautions, yet when it comes to free Wi-Fi, we don’t seem to realize the dangers we open ourselves up to such as malware, viruses, and even identity theft.

So what exactly is the difference in terms of Internet security, between the free Wi-Fi networks and those we use at home or work?  It’s simple – there is no Internet security with Wi-Fi. Read more »


Internet Security: Malware Targets the Windows Registry

If you’ve ever been the victim of an Internet security attack, you’ve probably heard of the Windows registry.  The registry is a prime target for the producers of malware.  However, most of us have very little understanding of the registry or its connection to Internet security.

The Windows registry is the foundation of your computer.  It is made up of thousands of folders called “keys” containing the basic instructions and information a computer needs to run.  Because it’s so complex, most typical computer users stay clear of it.  Read more »


101-110 of 1857
© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending