Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

If we told you that automated teller machines, or ATMs, were susceptible to hacking attacks, would you believe us? You should; there are a plethora of ways for hackers to infiltrate and steal money from ATMs, with the latest being so dangerous that even the Secret Service has issued warnings about it.

Continue reading
0 Comments

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Continue reading
0 Comments

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

Continue reading
0 Comments

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

Continue reading
0 Comments

Alert: 27 Vulnerabilities Patched in Latest Round of Windows Updates

Alert: 27 Vulnerabilities Patched in Latest Round of Windows Updates

27 vulnerabilities: The amount of vulnerabilities that were resolved with the round of security patches in Microsoft’s latest Patch Tuesday. Windows, Microsoft Office, Internet Explorer, the Edge browser, and more, were all affected. It’s important to patch these vulnerabilities as soon as possible, especially if you haven’t done so already.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing IT Support Communication User Tips Business Management VoIP Smartphone Server Email Network Holiday Data Quick Tips Virtualization Save Money Alert Remote Computing Operating System Social Media Upgrade Going Green Office Business Continuity Mobile Device Management Saving Money Disaster Recovery Apps Chrome Small Business Android Mobility WiFi Identity Theft The Internet of Things Application Big Data Antivirus Managed Service Provider Best Practice Microsoft Office Employer-Employee Relationship Social Ransomware Facebook Information Technology Spam Law Enforcement Bandwidth Saving Time Unified Threat Management Office Tips Password Hacking Tablet Lithium-ion battery Printer Passwords BYOD Analytics History Search Gmail Browser Current Events Government Computers Disaster intranet Net Neutrality Firewall iPhone Collaboration Laptop Avoiding Downtime Phone System Router Wireless Apple Data Management Money Hard Drives Maintenance Fraud Gadgets Smartphones Work/Life Balance communications USB Users Telephone Systems Humor Encryption Streaming Media Recovery Remote Monitoring Education Network Security Tech Support Automation User Error IT Consultant Cost Management Fax Server Managing Stress Data Loss Private Cloud Retail Wireless Technology BDR Entertainment Wearable Technology Personal Information Update Proactive IT Mobile Office Online Currency Budget Managed IT Services Transportation Shortcut IT Solutions Business Intelligence Internet Exlporer Biometrics Social Engineering Telephony Customer Service Wi-Fi Outlook Printer Server Flexibility Virtual Reality Google Drive VPN DDoS Marketing Administration Benefits App Content Filtering Office 365 Cybercrime Point of Sale PowerPoint Risk Management Television OneNote Storage Twitter Computing Black Market Files Two-factor Authentication Electronic Medical Records Bluetooth HaaS Trending OneDrive Prodcuctivity Instant Messaging Chromecast Bring Your Own Device Customer Relationship Management User Online Backup Safety Paperless Office SharePoint Workplace Excel Battery Administrator Best Available Emergency Reputation Miscelllaneous Teamwork Display Automobile Access Presentation Cleaning HIPAA Meetings Hosted Solution Science Travel Regulations Worker Commute Phishing Save Time End of Support Running Cable ISP Video Games 3D Printing Robot Networking Website RAM Hacker Advertising Legal Ebay Cameras Data storage Human Resources Near Field Communication Blogging CPU Keyboard PDF Data Theft Amazon Uninterrupted Power Supply Politics Computer Accessories Slow Hiring/Firing Text Messaging CloudSync Smart Phones Scalability Internet of Things Bloatware Experience Applications IT consulting Distributed Denial of Service Programming Windows 8 Mouse Artificial Intelligence Compliance How To Sports Music Touchpad Branding eWaste Vendor Management Network Congestion Inbound Marketing Emails Audit WIndows 7 Books Operating Sysytem

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code