Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Looks like Spam’s Here to Stay

Approximately 300 billion spam messages go out everyday according to a recent Cisco Annual Security report. Over the course of a year, spam emails make up 90 percent of the world’s emails. Given such absurdly large figures, it is essential to maintain strong Internet security practices and to use secure network services.

Spam continues to thrive because it is an easy and cheap marketing tool for advertisers and other parties using it. Even when the vast majority of spam emails are ignored, the small percentage that actually reaches people can help improve the sender’s sales. Not all spam is advertising, though. A great deal of spam is laden with viruses and malware that can compromise a user’s Internet security and network services. In fact, most spam originates from network services infected with spam malware. So strong Internet security is essential to prevent machines from becoming spam hosts.

According to the Spamhaus Project, approximately 100 spam gangs taking advantage of the globalization of network services produce the vast majority of spam targeting the North America and Europe. The computers and network services that generate the highest spam emails are in Brazil, according to Cisco. Approximately 7.7 trillion spam emails originate in Brazil every year. The U.S. is a close second with 6.6 trillion.

Users can try to limit the amount of spam that they get by employing good Internet security practices, but even then, getting some spam is inevitable. The best Internet security measure to fight against spam is to be selective in giving out your email address. Just as you don’t go around telling random strangers where you live, you should protect your email address the same way. If you had to give out your address to a list of criminals every time you wanted a service, wouldn’t you say no? So why do we so readily give out our email addresses to facebook apps and other services?

It’s hard to say whether spam will actually disappear anytime in the foreseeable future. Spammers are already indifferent to laws governing Internet security, so it is unlikely that they will suddenly become concerned about their actions’ legality. Network service providers try to reduce spam, but their attempts are usually futile because of the dangerously simplistic nature of spam. Internet security services that are readily available in email, for example, have limitations. Even advanced ones like Gmail’s spam filter let spam through sometimes. On the other hand, spam filters often perceive harmless or real emails as spam, which can prevent authentic mail from getting through.

Spam is not only annoying, but it can pose a threat to your Internet security and harm your network services in the attempt to produce more spam. Improving Internet security against spam requires action on your part. No one is completely immune to getting spam, but safeguarding your email address is the clear-cut first step towards getting less of it!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Laptop and Smartphone Thieves, Beware!

PREY is a free open-source program that’s a great way to track lost or stolen laptops and smartphones. PREY is quite brilliant. PREY anti-theft software lets owners play private investigator for free. The software helps users keep track of their phones or laptops and can help users find their devices if they are ever stolen.

The software, described as silent but deadly by its creators, works by remaining dormant on its host device until it is activated by a signal. Disgruntled victims of thefts can activate PREY on a lost laptop by logging into the connected PREY account online. Those who want to track their lost smartphones can do so by sending a text message to the phone to activate its resident PREY. The standard activation message is “GO PREY,” though this can be customized.

According to PREY’s website, once the software is activated, it allows users to gather information about their lost or stolen devices’ location, hardware and network status. Users can also trigger specific actions on the device. Outlook or Thunderbird data on a missing laptop can be remotely hidden. Users who use PREY to track a stolen laptop, for example, can remotely activate the missing device’s webcam and use it to take pictures of the culprit. A user can also see how his or her stolen device is being used, and look at the screen. Ideally, a PREY user would get a glance of the thief logging into a facebook page or email account to get his or her information.

PREY is designed to automatically connect to the Internet to allow its host device to be tracked. When no Internet network service is available, the software tries to connect to the nearest Wi-Fi hotspot. PREY takes advantage of its smartphone’s GPS to send information about the device’s location. In laptops, the software uses the nearest Wi-Fi hotspot to triangulate and narrow in on its location according to preyproject.com.

As a free, open-source software, PREY is quite remarkable. For one thing, it works everywhere! There are no geographical limitations on where it can work. Right now though, PREY is only compatible with Android phones and does not work with iPads or iPhones. However, its developers say they’re working on these compatibility issues.

PREY is not a foolproof method of catching thieves and restoring stolen devices, though. The developers recommend contacting the police as the final step in the recovery process.

Finally, users who are concerned about privacy can rest assured because PREY is not a malware, and it does not behave like one. PREY’s website explains that unless the software is activated, it remains dormant with no activity. The developer states that PREY does not collect any private information about its users, nor does it store the information that passes through its servers, so the software doesn’t pose a threat to its users’ Internet security. Now, if only the facebook people would learn to be this nice.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Is your Password Guessable?

Using the same password for most or all online activities may be convenient, but it is a dangerous Internet security practice that we should all avoid. Sure, recycling passwords makes remembering them easier, but it also makes it easier for cybercriminals to steal that information. Even when you’re using a trusted network service like your home network, having weak or recurring passwords is an unnecessary threat to your Internet security.

Along with monitoring how you use public network services and keeping your anti-virus updated, consider using a different and difficult password for each of your accounts. Varying your passwords is an easy way to increase the level of your Internet security. When cybercriminals learn one of your passwords, they may try to use it to gain access to your other accounts. Using significantly different passwords can drastically limit the damage to your overall Internet security.

To check the strength of a password (or even just for fun), consider searching for a list of the worst passwords and making sure yours isn’t on it! One online list includes the 500 worst passwords of all time, and among these are: 123456, password, eric, gandalf, rainbow, barney, and butter!

Even when passwords are not as ridiculous as these (barney?), Microsoft’s Safety and Security Center suggests changing them periodically. When coming up with passwords, keep in mind that you may have to enter them while using public network services where Internet security is not very high. The Security Skeptic also offers some easy ways to create better passwords to improve your Internet security.

To test a password’s Internet security level use an online service, and keep these tips in mind:

  • Avoid common words
  • Don’t use personal information such as a telephone number, address or birthday
  • Use at least eight characters, the more the merrier
  • Combine upper and lowercase characters
  • Include numbers and symbols (%4#3*1)
  • Start with a sentence and change it around (Somewhere over the rainbow/ SomeWhereOverDaR@inbow22)

If you’re worried about forgetting a password, write it down! Storing your passwords on paper isn’t necessarily a threat to your Internet security. Cybercriminals will try to target your information through your online network, not your desk. Still, keep your password in a safe place.

Prevent cybercriminals from infiltrating your Internet security, personal accounts, and network services by changing your passwords often and making them difficult. If a password is too difficult for you to remember, then it’ll certainly be difficult for a hacker or virus to figure out.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for Free Wi-Fi

Watch out for Free Wi-Fi

Many people find it hard to go even a few hours without an Internet connection. Shops, restaurants and a variety of other venues are adapting to this need by providing free Wi-Fi. Whether you’re at your favorite coffee shop, shopping at the grocery store, or waiting in an airport lounge, you’ll probably find that you have access to a free Wi-Fi network. If you decide to use it though, you should be aware of the dangers of using a network service without proper Internet security.

It may be tempting to quickly connect to a public network service and log into a social networking site such as facebook or check your bank account, but unless you can trust the network service provider’s Internet security, you should only do casual surfing. If you find yourself using a questionable network, avoid logging into websites and services that require you to type a username and password. Faulty Internet security leaves room for cyber thieves or hackers to infiltrate your network service and steal your private information without your knowledge.

Good Internet security practices can spare you potentially disastrous outcomes like identity theft. So when choosing a public network, always make sure you select a secure connection. If you’re at a Starbucks, for example, ask an employee to verify the name of the network service before connecting. Avoid using unsecured network services because they are easily prone to Internet security breaches.

Keeping your anti-virus software up to date and your computer’s firewall turned on are just two of the basic principles of achieving Internet security and using public networks safely. Besides, having anti-virus software does not guarantee your device’s safety; it’s merely a basic component of Internet security.

Another common Internet security problem occurs when cyber thieves record keystrokes, giving them access to your usernames and passwords. Changing your passwords periodically can help counter this kind of threat, especially if you use a public network regularly.

Even with these precautions, the strength of your Internet security can be hard to gauge, and networks that appear safe can still place your device at risk.  If you do suspect that a virus or malware has breached your Internet security, get professional help immediately.  Some viruses can seriously damage your device if they’re not caught quickly. In fact, because the average user cannot detect malware, it is essential to have a computer or network services specialist look at your system from time to time.

Always try to balance the advantages of using public network services and the potential threats to your Internet security that accompany them. What appears to be a free Wi-Fi service could end up costing you a lot in virus removal costs and privacy breaches.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Illegal Download Site Targeted by Hackers

Threats to Internet security continue appearing in the form of cybercriminals seeking profits from the ignorance of users.  Downloading files from the web, though we do it all the time, involves the risk of infecting your computer with a virus.  A clever hacker may exploit even excellent Internet security.  This necessitates virus removal to clean your system.  Average users suffer through Internet security problems regularly.  Over the past year, the Internet security systems of a number of high profile targets, including American defense contractors, Sony, Google, and many others, fell victim to cyber attacks.  A very recent example is that cybercriminals compromised the internet security of the file-sharing giant BitTorrent.

Widely known as one of the world’s largest illegal file-sharing sites, BitTorrent also hosts a large number of legal downloads.  This time BitTorrent was the victim of illegal activity.  Hackers broke through the site’s Internet security, injecting a type of malicious software known as “scareware” into the download software that powers file transfers.  Virus removal of scareware is potentially difficult, depending on the user’s level of expertise.  The internet security implications of such an intrusion are that they can render the files of a familiar website vulnerable to a hacker’s program access to information which unsuspecting users consider safe.  This requires immediate virus removal action.

The intrusion reportedly occurred at 4:20 am Pacific Standard Time on September 13, 2011 as BitTorrent and uTorrent.com services became compromised.  The company reported this intrusion itself later that day on the company’s blog.  The false download files were only in place for two hours before BitTorrent employees took servers offline and corrected their Internet security flaws.  Virus removal is necessary for anyone who accidently downloaded the fake files.  The scareware installed on users’ systems is a fake anti-virus program called Security Shield.  Infected systems see a notification pop up informing users that their computer is infected with a virus.  It offers virus removal if the program is paid for by credit card.

Users suffering from this malicious software should attempt to utilize their virus removal programs to restore Internet security.  If you are unable to remove the program, consider contacting your proven reliable computer support company.  Their knowledge and expertise could save a lot of time and headaches.  Downloading anything from the web tests your Internet security.  Always keep anti-virus and virus removal software up to date to protect your system from harmful software.  The thieves and bandits are out there, and we have to be careful.  However, we can handle a virus intrusion in a timely manner with experts trained  in quick restoration of internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Smartphone Users: Beware the Fraud

Fraud is not new to humanity.  Impostors and counterfeiters are as old as the idea of property.  The only new developments occur in the scams we see and the venues where they are attempted.  The birth of the World Wide Web created a digital world loaded with sensitive information where clever con artists could ply their trade.  Today, Internet security is paramount to protecting financial information from theft by nefarious individuals.  Everyone needs to consider seeking computer support to ensure effective Internet security.

Internet security as a way to identify and prevent fraud, started simply.  Over time, increased Internet security and the computer support it requires have become more and more a priority for people doing business on the Internet.  As Internet security becomes more sophisticated, so do the methods used to steal information.  Internet security, cybercrime, and the constant computer support needed to help in this conflict represent a daily battleground.  Personal users, out of concern and genuine fear, need the help of expert computer support, and they need continuous education in effective ways to maintain their own Internet security.  As an example, banks and private companies have begun offering identity protection to consumers worried about the safety of their transactions.

The most current and troubling threat to Internet security is the growing number of mobile web users.  Smartphones and tablets alter the digital landscape once again, and wireless options and expanded coverage are right alongside them.  Knowledgeable computer support is all the more important as threats to the Internet security of mobile users multiply due to the lack of anti-virus software on many devices.

Improving Internet security against mobile fraud continues as a top priority for commercial entities and the computer support personnel they employ.  Simple prevention is still the best solution to reduce the possibility of a cybercrime affecting you, and effective, reliable computer support is the key to peace of mind.  Take the time to install protective software on that smartphone.  Do your shopping while on the go, but wait until you get home to make that purchase.  The Internet security of your home machine is probably far superior to your mobile device.  A little education and proactive computer support can help prevent the huge hassles caused by a breach in your internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Sources of Malicious Software Show Some Change

The growing importance of the Internet to everyday life creates an ever-larger target for cyber criminals.  Internet security against cyber crime is vital for businesses and individuals alike.  Malicious software corrupts systems, destroys data, and allows the theft of identities or banking information.  Hackers looking to make a quick buck by exploiting weak Internet security are nothing new.  A recently released report about malicious software and where it is housed online brings the issue into sharper focus.

Read more »


Malicious Software Finally Hits Your iPad

Hackers continue attempting to exploit the Internet security of the growing population of iPad owners.  Analysts’ estimate over five million iPads and iPad 2s sold in the first quarter of 2011 alone. It is obvious why malicious software programmers seek to take advantage with those sales figures.  Apple’s normally excellent Internet security is occasionally breached, and the iPad, iPhone and iPod Touch are currently vulnerable to the latest malicious software abuse.

Read more »


Even Google Gets Hacked Sometimes

Hackers continue grabbing headlines with high profile attacks against the Internet security of governments and major corporations.  Hacktivists (hacker activists) attempting to make statements attacked various targets this year, again showing the importance of good virus removal and protection in a digital world.  Targets have ranged from PayPal and Visa to FBI associate Infragard, not always with obvious reasons.  Recent hacker arrests in the United States and Europe are attempts to combat the problem.   Google announced on Wednesday, July 20, they were the latest victim as hackers compromised their Internet security.

Read more »


Increased Corporate Victimization Highlights Need for Better Internet Security

A recent survey has revealed some troubling data for corporate technology users when it comes to Internet security.

According to the Sixth Annual Enterprise IT Security Survey, conducted by Amplitude Research, 67% of large companies (minimum of 5,000 employees) reported at least one significant security intrusion.

That was over 25% higher than the year before.

Companies cited various potential reasons for the increase, ranging from significant Internet security weaknesses to employee Internet usage.  No matter the reason, one thing is clear:  large corporations are coming under increased attack. Read more »


© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending