Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

Alert: Even Chip-Based Cards Can’t Protect You From This New ATM Scam

If we told you that automated teller machines, or ATMs, were susceptible to hacking attacks, would you believe us? You should; there are a plethora of ways for hackers to infiltrate and steal money from ATMs, with the latest being so dangerous that even the Secret Service has issued warnings about it.

Continue reading
0 Comments

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Hacking Group Claims to Have Stolen NSA Cyber Weapons

Every security professional’s worst nightmare consists of the National Security Agency (NSA) being hacked. While there’s no proof that the NSA itself has been hacked, there is some evidence to suggest that some of the exploits used by the agency are up for grabs on the black market. What this means is that a lucky group of hackers could potentially get their hands on some very dangerous tools.

Continue reading
0 Comments

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

Continue reading
0 Comments

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

Continue reading
0 Comments

Alert: 27 Vulnerabilities Patched in Latest Round of Windows Updates

Alert: 27 Vulnerabilities Patched in Latest Round of Windows Updates

27 vulnerabilities: The amount of vulnerabilities that were resolved with the round of security patches in Microsoft’s latest Patch Tuesday. Windows, Microsoft Office, Internet Explorer, the Edge browser, and more, were all affected. It’s important to patch these vulnerabilities as soon as possible, especially if you haven’t done so already.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Data Quick Tips Smartphone Virtualization Email Holiday Server Network Remote Computing Mobile Device Management Operating System Saving Money Social Media Upgrade Apps Disaster Recovery Alert Office Going Green Save Money Business Continuity Chrome Small Business Android Application The Internet of Things Big Data Best Practice Managed Service Provider Microsoft Office Employer-Employee Relationship Ransomware Social WiFi Mobility Facebook Identity Theft Antivirus Bandwidth Office Tips Unified Threat Management Password Hacking Tablet Passwords Analytics History Search Gmail Saving Time Browser Lithium-ion battery Current Events Printer Government Information Technology Spam Law Enforcement BYOD Work/Life Balance Avoiding Downtime Phone System Router Encryption Money Data Management Apple Remote Monitoring Tech Support Gadgets communications Smartphones intranet Users Net Neutrality USB Firewall Telephone Systems iPhone Laptop Humor Collaboration Recovery Hard Drives Network Security Streaming Media Maintenance Automation Education Fraud Wireless User Error Computers Disaster Entertainment Update VPN Mobile Office Budget Wi-Fi Transportation Flexibility App Shortcut Business Intelligence Internet Exlporer IT Solutions Biometrics Social Engineering Customer Service IT Consultant Telephony Fax Server Data Loss Virtual Reality Outlook Google Drive Office 365 Printer Server Wearable Technology DDoS Benefits Proactive IT Marketing Administration Online Currency Content Filtering Cybercrime Personal Information Risk Management Point of Sale PowerPoint Private Cloud Cost Management Managing Stress Wireless Technology Retail Managed IT Services BDR Amazon Save Time Bring Your Own Device Blogging CPU Excel Paperless Office Administrator Video Games Reputation Workplace Teamwork Best Available Smart Phones Hacker Slow Access Legal Presentation Miscelllaneous Meetings Science Keyboard Windows 8 Hosted Solution HIPAA Travel End of Support Politics Running Cable Phishing Regulations Hiring/Firing Vendor Management Robot Scalability ISP Networking Advertising Experience 3D Printing Computing Data storage How To Human Resources Near Field Communication PDF Music Cameras Prodcuctivity Uninterrupted Power Supply Data Theft Text Messaging Books Online Backup Computer Accessories Bloatware Internet of Things Applications Black Market IT consulting CloudSync Artificial Intelligence Electronic Medical Records Distributed Denial of Service Mouse Display Sports HaaS Touchpad Instant Messaging Programming Branding Compliance Safety eWaste Network Congestion Operating Sysytem Battery WIndows 7 Inbound Marketing Emails Emergency Audit Television Storage Two-factor Authentication Files Twitter Automobile OneNote Bluetooth Cleaning Website Trending RAM Customer Relationship Management Ebay Chromecast Worker Commute OneDrive SharePoint User

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code