Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Email Appearing to Be From Microsoft about Windows 10 Upgrade is Really Ransomware

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor many Windows users, the fact that Microsoft is issuing Windows 10 incrementally came as a shock for those who patiently waited for its release date. While users wait, however, hackers are taking advantage of those who are less patient by creating a ransomware that disguises itself as a launcher for a Windows 10 download. So, while you sit and wait for your version of the latest OS, don’t fall prey to deals that seem too good to be true.

Continue reading
0 Comments

CryptoLocker and GameOver Zeus: When Bad Meets Ugly

b2ap3_thumbnail_alert_malware_96.jpgIt's been a few weeks since we've reported on the GameOver Zeus virus, and a few months since we first told you about the nasty ransomware known as Cryptolocker. Now, we're seeing the two threats merge into one code-red-mega threat that your business needs to be prepared for!

Continue reading
0 Comments

Alert: New Botnet Thunders Into View For Windows Users"

b2ap3_thumbnail_go_zeus_400.jpgGameOver Zeus, a member of the Zeus family of malware, has been discovered and disrupted by the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice. But, this is only a temporary respite from the danger the malware poses - in two weeks, the threat will be back, and very much alive.

Continue reading
0 Comments

Ebay Hacked - Hold Onto Your Shopping Cart (And Your Password)!

b2ap3_thumbnail_ebay_400.jpgeBay issued an official declaration on Wednesday, May 21, 2014 that one of its databases had been hacked. The worst part? This database, which housed users' passwords, was compromised. But, there is a silver lining to all of this - no information has been stolen.

None that they know of, anyway. The auctioning website is still cautioning users to change their passwords in light of the attack.

Continue reading
0 Comments

New iPhone Vulnerability: Lock Screen Can Leak Your Contacts!

b2ap3_thumbnail_ios_siri_400.jpgThink your data is safe when you lock your phone? Thanks to a newly discovered vulnerability with iOS 7.1.1 (the latest version), a hacker has the ability to bypass your lock screen and easily access your contact information.

Continue reading
0 Comments

DANGER! Vulnerability in Internet Explorer Not Patched Yet, No Fix for XP

b2ap3_thumbnail_alert_one_400.jpgInternet Explorer is one of the most used web browsers. Despite this, there have been various security problems with it, and another one has just been found - a zero-day vulnerability that leaves IE users at the mercy of hackers. We will cover what you need to know to keep your business safe.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips Communication IT Support VoIP Business Management Network Data Quick Tips Smartphone Email Virtualization Holiday Server Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Disaster Recovery Office Apps Alert Going Green Save Money Chrome Small Business Android Ransomware The Internet of Things Big Data Managed Service Provider Mobility Microsoft Office Social Application WiFi Facebook Identity Theft Best Practice Antivirus Employer-Employee Relationship Bandwidth BYOD Unified Threat Management Hacking Tablet Passwords Law Enforcement Analytics History Office Tips Search Gmail Password Saving Time Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Humor Avoiding Downtime Phone System Router Recovery Apple Encryption Network Security Automation Remote Monitoring Tech Support Gadgets Smartphones USB Users intranet Firewall Net Neutrality iPhone Collaboration Laptop Wireless Data Management Money Streaming Media Maintenance Hard Drives Education communications User Error Fraud Work/Life Balance Disaster Computers Telephone Systems Google Drive Entertainment DDoS Flexibility Mobile Office Benefits VPN Cybercrime Risk Management IT Solutions App Office 365 Managing Stress Private Cloud Wireless Technology IT Consultant Fax Server Outlook Data Loss Update Printer Server Personal Information Wearable Technology Marketing Budget Administration Proactive IT Business Intelligence Transportation Shortcut Managed IT Services Content Filtering Online Currency Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Cost Management Telephony Customer Service Retail BDR Wi-Fi Virtual Reality Bring Your Own Device Ebay Keyboard Paperless Office Computer Accessories Text Messaging Blogging CPU Internet of Things Politics Bloatware Amazon Workplace IT consulting Applications Hiring/Firing Distributed Denial of Service Scalability Miscelllaneous Mouse Artificial Intelligence Slow Sports Experience Smart Phones Touchpad Branding eWaste How To HIPAA Network Congestion Windows 8 Music Travel Regulations WIndows 7 Operating Sysytem Television Storage ISP Vendor Management 3D Printing Files Books Two-factor Authentication Bluetooth Trending Black Market Computing Chromecast Electronic Medical Records Customer Relationship Management Cameras SharePoint HaaS User Instant Messaging Data Theft Excel Prodcuctivity Administrator Safety Teamwork Best Available Reputation Online Backup Battery CloudSync Presentation Access Emergency Meetings Hosted Solution Automobile Compliance Science Programming Display Cleaning Running Cable Phishing End of Support Worker Commute Inbound Marketing Audit Robot Save Time Emails Networking Video Games Advertising Twitter OneNote Near Field Communication Data storage Hacker Human Resources Legal PDF Website RAM Uninterrupted Power Supply OneDrive

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code