Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

RESCUECOM Warns of Stuxnet Dangers

SYRACUSE, N.Y., October 8, 2010 – Stuxnet, the most sophisticated piece of malware ever, highlights the dangers of malware.  Stuxnet’s method of infection and the likelihood of imitation put everyone’s Internet security at risk. RESCUECOM’s computer support experts explain what you need to know about Stuxnet, Internet security, and protecting yourself.

Most malware targets an individual’s Internet security, but Stuxnet worked on a much larger scale.  Stuxnet targeted industrial computers, intent on compromising their Internet security and taking control of them.  “It’s larger and more sophisticated than most other pieces of malware,” says RESCUECOM CEO David Milman.  Read more »


“Here You Have” Illustrates Internet Security Failures

A new Internet security attack spread through email Thursday, though it came in somewhat old packaging.

The attack, dubbed “Here you have” after the subject line of the phishing attack emails, was reminiscent of attacks from 2000 and 2001.  Those attacks, the ILoveYou and Anna Kournikova worms, were the last significant mass email attacks, until now.  The Kournikova worm even used the same “Here you have” subject line. Read more »


The How’s and Why’s of Malware

The number one cause for concern among Internet security and computer repair experts is malware.  A little known threat just a few years ago, these malicious programs can slip past Internet security and bring on extensive computer repair costs.

But what is malware?

Malware involves several different kinds of programs:

  • Trojan Horses
  • Rootkits
  • Viruses / Worms
  • Data Thieves Read more »

RESCUECOM Releases Top 5 Tips for Defending Against Malware

SYRACUSE, N.Y., August 16, 2010 – McAfee, a top Internet security company, recently announced that malware attacks are at an all-time high.  According to McAfee, 10 million new pieces of malware were cataloged during the first half of this year.  With this Internet security threat reaching such significant heights, Rescuecom offers these tips to protect your computer from such an attack.  Read more »


NEWS: Hackers Move to the Cloud

Internet Security News:  Hackers Move to the Cloud

Earlier this week McAfee reported that malware has reached previously unheard of levels, with over 10 million new pieces of malware cataloged over the first half of this year.

Unfortunately, not only are hackers developing more and more new bits of malicious code, they’re also developing new ways to deliver them.

Late last month, database security company Imperva discovered a “master hacker” phishing attack that indicated the hackers has based their attack in the cloud. Read more »


Internet Security: Safe Searching with Google

Google is the “King of Search”.  Now, it has another, less flattering title: “King of Malware.”  Google search results have become an Internet security threat.

The Barracuda Labs 2010 Midyear Security Report studied search engine results for ‘trending’ topics, and showed significant flaws in Google’s Internet security.

According to Barracuda, Google searches resulted in far more malware infected links – 69% – than results for Yahoo, Bing, and Twitter combined.  Read more »


Internet Security: Wi-Fi is Vulnerable

Our desire for constant connectivity has given rise to free Wi-Fi networks in hotels, coffee shops, and airports.  At home, many of us take extensive Internet security precautions, yet when it comes to free Wi-Fi, we don’t seem to realize the dangers we open ourselves up to such as malware, viruses, and even identity theft.

So what exactly is the difference in terms of Internet security, between the free Wi-Fi networks and those we use at home or work?  It’s simple – there is no Internet security with Wi-Fi. Read more »


Internet Security: Malware Targets the Windows Registry

If you’ve ever been the victim of an Internet security attack, you’ve probably heard of the Windows registry.  The registry is a prime target for the producers of malware.  However, most of us have very little understanding of the registry or its connection to Internet security.

The Windows registry is the foundation of your computer.  It is made up of thousands of folders called “keys” containing the basic instructions and information a computer needs to run.  Because it’s so complex, most typical computer users stay clear of it.  Read more »


Rescuecom Releases 5 Tips to Detect Phishing

Phishing attacks threaten our Internet security and can be hard to detect.  They can lead to identity theft, viruses, or the need for computer repair.  To help protect your Internet security, RESCUECOM’s computer repair experts offer five simple tips for detecting phishing attacks.

•1.) Avoid Action – Phishing attacks work when you take action.  An email that requests information or features clickable links may be an attack against your Internet security.  Legitimate emails include cut and past style links to help you avoid clicking.  If there are only clickable links, the email is likely a phishing scam. Read more »


Internet Security: Fake Anti Virus Programs

RESCUECOM reminds users to utilize only legitimate anti virus software, such as our Internet Security Suite.

A common cyber attack uses fake anti virus software as a means for infecting computers with malware.  These attackers rely on fear to trick users into violating their own Internet security.  Read more »


© 1997-2025 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending