Posted on
October 8th, 2010 by
David
SYRACUSE, N.Y., October 8, 2010 – Stuxnet, the most sophisticated piece of malware ever, highlights the dangers of malware. Stuxnet’s method of infection and the likelihood of imitation put everyone’s Internet security at risk. RESCUECOM’s computer support experts explain what you need to know about Stuxnet, Internet security, and protecting yourself.
Most malware targets an individual’s Internet security, but Stuxnet worked on a much larger scale. Stuxnet targeted industrial computers, intent on compromising their Internet security and taking control of them. “It’s larger and more sophisticated than most other pieces of malware,” says RESCUECOM CEO David Milman. Read more »
Posted on
September 10th, 2010 by
David
A new Internet security attack spread through email Thursday, though it came in somewhat old packaging.
The attack, dubbed “Here you have” after the subject line of the phishing attack emails, was reminiscent of attacks from 2000 and 2001. Those attacks, the ILoveYou and Anna Kournikova worms, were the last significant mass email attacks, until now. The Kournikova worm even used the same “Here you have” subject line. Read more »
Posted on
August 20th, 2010 by
David
The number one cause for concern among Internet security and computer repair experts is malware. A little known threat just a few years ago, these malicious programs can slip past Internet security and bring on extensive computer repair costs.
But what is malware?
Malware involves several different kinds of programs:
- Trojan Horses
- Rootkits
- Viruses / Worms
- Data Thieves Read more »
Posted on
August 18th, 2010 by
David
SYRACUSE, N.Y., August 16, 2010 – McAfee, a top Internet security company, recently announced that malware attacks are at an all-time high. According to McAfee, 10 million new pieces of malware were cataloged during the first half of this year. With this Internet security threat reaching such significant heights, Rescuecom offers these tips to protect your computer from such an attack. Read more »
Posted on
August 12th, 2010 by
David
Internet Security News: Hackers Move to the Cloud
Earlier this week McAfee reported that malware has reached previously unheard of levels, with over 10 million new pieces of malware cataloged over the first half of this year.
Unfortunately, not only are hackers developing more and more new bits of malicious code, they’re also developing new ways to deliver them.
Late last month, database security company Imperva discovered a “master hacker” phishing attack that indicated the hackers has based their attack in the cloud. Read more »
Posted on
August 4th, 2010 by
David
Google is the “King of Search”. Now, it has another, less flattering title: “King of Malware.” Google search results have become an Internet security threat.
The Barracuda Labs 2010 Midyear Security Report studied search engine results for ‘trending’ topics, and showed significant flaws in Google’s Internet security.
According to Barracuda, Google searches resulted in far more malware infected links – 69% – than results for Yahoo, Bing, and Twitter combined. Read more »
Posted on
July 21st, 2010 by
David
Our desire for constant connectivity has given rise to free Wi-Fi networks in hotels, coffee shops, and airports. At home, many of us take extensive Internet security precautions, yet when it comes to free Wi-Fi, we don’t seem to realize the dangers we open ourselves up to such as malware, viruses, and even identity theft.
So what exactly is the difference in terms of Internet security, between the free Wi-Fi networks and those we use at home or work? It’s simple – there is no Internet security with Wi-Fi. Read more »
Posted on
July 20th, 2010 by
David
If you’ve ever been the victim of an Internet security attack, you’ve probably heard of the Windows registry. The registry is a prime target for the producers of malware. However, most of us have very little understanding of the registry or its connection to Internet security.
The Windows registry is the foundation of your computer. It is made up of thousands of folders called “keys” containing the basic instructions and information a computer needs to run. Because it’s so complex, most typical computer users stay clear of it. Read more »
Posted on
June 21st, 2010 by
David
Phishing attacks threaten our Internet security and can be hard to detect. They can lead to identity theft, viruses, or the need for computer repair. To help protect your Internet security, RESCUECOM’s computer repair experts offer five simple tips for detecting phishing attacks.
•1.) Avoid Action – Phishing attacks work when you take action. An email that requests information or features clickable links may be an attack against your Internet security. Legitimate emails include cut and past style links to help you avoid clicking. If there are only clickable links, the email is likely a phishing scam. Read more »
Posted on
June 14th, 2010 by
David
RESCUECOM reminds users to utilize only legitimate anti virus software, such as our Internet Security Suite.
A common cyber attack uses fake anti virus software as a means for infecting computers with malware. These attackers rely on fear to trick users into violating their own Internet security. Read more »