Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

If we told you that automated teller machines, or ATMs, were susceptible to hacking attacks, would you believe us? You should; there are a plethora of ways for hackers to infiltrate and steal money from ATMs, with the latest being so dangerous that even the Secret Service has issued warnings about it.

Continue reading
0 Comments

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Continue reading
0 Comments

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

Continue reading
0 Comments

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

Continue reading
0 Comments

Alert: 27 Vulnerabilities Patched in Latest Round of Windows Updates

Alert: 27 Vulnerabilities Patched in Latest Round of Windows Updates

27 vulnerabilities: The amount of vulnerabilities that were resolved with the round of security patches in Microsoft’s latest Patch Tuesday. Windows, Microsoft Office, Internet Explorer, the Edge browser, and more, were all affected. It’s important to patch these vulnerabilities as soon as possible, especially if you haven’t done so already.

Recent comment in this post
Jael Sargent
Windows are the only way to get started your computer of the laptops in the easiest ways and the installation and updating is nece... Read More
Sunday, 07 April 2019 23:15
Continue reading
1 Comment

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Computing Business Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Server Smartphone Network Data Email Quick Tips Holiday Virtualization Alert Save Money Remote Computing Operating System Going Green Social Media Upgrade Business Continuity Mobile Device Management Office Saving Money Disaster Recovery Apps Android Chrome Small Business Mobility WiFi Identity Theft Application Antivirus Best Practice The Internet of Things Big Data Managed Service Provider Employer-Employee Relationship Microsoft Office Ransomware Social Facebook Current Events Government Law Enforcement Saving Time Office Tips Information Technology Password Spam Lithium-ion battery Bandwidth Printer Unified Threat Management Hacking Tablet BYOD Passwords History Analytics Search Gmail Browser intranet Streaming Media Firewall Net Neutrality iPhone Education Collaboration Laptop User Error Disaster Computers Wireless Maintenance Data Management Money Hard Drives Avoiding Downtime Phone System Fraud Router Apple communications Work/Life Balance Telephone Systems Gadgets Humor Smartphones Encryption Users USB Recovery Remote Monitoring Network Security Tech Support Automation Office 365 IT Consultant Fax Server Content Filtering Managing Stress Data Loss Private Cloud Wireless Technology Point of Sale PowerPoint Wearable Technology Cost Management Update Proactive IT Personal Information Retail BDR Online Currency Entertainment Budget Business Intelligence Mobile Office Transportation Shortcut Managed IT Services Internet Exlporer Biometrics Social Engineering Telephony Customer Service IT Solutions Wi-Fi Virtual Reality Google Drive VPN DDoS Flexibility Outlook Benefits Printer Server App Cybercrime Marketing Risk Management Administration Computing Television Compliance Storage Programming Files Books Two-factor Authentication Bluetooth Prodcuctivity Trending Black Market Inbound Marketing Audit Chromecast Electronic Medical Records Emails Customer Relationship Management SharePoint HaaS User Online Backup Instant Messaging Twitter Excel OneNote Administrator Safety Teamwork Best Available Reputation Battery Display OneDrive Bring Your Own Device Presentation Access Emergency Meetings Paperless Office Hosted Solution Automobile Science Workplace Cleaning Running Cable Miscelllaneous Phishing End of Support Worker Commute Robot Save Time Networking Video Games Website HIPAA RAM Advertising Ebay Travel Near Field Communication Data storage Hacker Regulations Human Resources Amazon Legal Blogging CPU ISP PDF 3D Printing Uninterrupted Power Supply Keyboard Smart Phones Computer Accessories Slow Text Messaging Internet of Things Politics Bloatware IT consulting Applications Hiring/Firing Cameras Distributed Denial of Service Scalability Windows 8 Data Theft Mouse Artificial Intelligence Sports Experience Touchpad Branding eWaste How To Vendor Management CloudSync Network Congestion Music WIndows 7 Operating Sysytem

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code