Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Sources of Malicious Software Show Some Change

The growing importance of the Internet to everyday life creates an ever-larger target for cyber criminals.  Internet security against cyber crime is vital for businesses and individuals alike.  Malicious software corrupts systems, destroys data, and allows the theft of identities or banking information.  Hackers looking to make a quick buck by exploiting weak Internet security are nothing new.  A recently released report about malicious software and where it is housed online brings the issue into sharper focus.

Read more »


Malicious Software Finally Hits Your iPad

Hackers continue attempting to exploit the Internet security of the growing population of iPad owners.  Analysts’ estimate over five million iPads and iPad 2s sold in the first quarter of 2011 alone. It is obvious why malicious software programmers seek to take advantage with those sales figures.  Apple’s normally excellent Internet security is occasionally breached, and the iPad, iPhone and iPod Touch are currently vulnerable to the latest malicious software abuse.

Read more »


© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending