Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Email Appearing to Be From Microsoft about Windows 10 Upgrade is Really Ransomware

b2ap3_thumbnail_windows_10_email_scam_400.jpgFor many Windows users, the fact that Microsoft is issuing Windows 10 incrementally came as a shock for those who patiently waited for its release date. While users wait, however, hackers are taking advantage of those who are less patient by creating a ransomware that disguises itself as a launcher for a Windows 10 download. So, while you sit and wait for your version of the latest OS, don’t fall prey to deals that seem too good to be true.

Continue reading

CryptoLocker and GameOver Zeus: When Bad Meets Ugly

b2ap3_thumbnail_alert_malware_96.jpgIt's been a few weeks since we've reported on the GameOver Zeus virus, and a few months since we first told you about the nasty ransomware known as Cryptolocker. Now, we're seeing the two threats merge into one code-red-mega threat that your business needs to be prepared for!

Continue reading

Alert: New Botnet Thunders Into View For Windows Users"

b2ap3_thumbnail_go_zeus_400.jpgGameOver Zeus, a member of the Zeus family of malware, has been discovered and disrupted by the Department of Homeland Security, Federal Bureau of Investigation, and Department of Justice. But, this is only a temporary respite from the danger the malware poses - in two weeks, the threat will be back, and very much alive.

Continue reading

Ebay Hacked - Hold Onto Your Shopping Cart (And Your Password)!

b2ap3_thumbnail_ebay_400.jpgeBay issued an official declaration on Wednesday, May 21, 2014 that one of its databases had been hacked. The worst part? This database, which housed users' passwords, was compromised. But, there is a silver lining to all of this - no information has been stolen.

None that they know of, anyway. The auctioning website is still cautioning users to change their passwords in light of the attack.

Continue reading

New iPhone Vulnerability: Lock Screen Can Leak Your Contacts!

b2ap3_thumbnail_ios_siri_400.jpgThink your data is safe when you lock your phone? Thanks to a newly discovered vulnerability with iOS 7.1.1 (the latest version), a hacker has the ability to bypass your lock screen and easily access your contact information.

Recent comment in this post
When you connect your phone to the internet its no more safe zone you have on your data to make secure your data you have to learn... Read More
Wednesday, 18 March 2020 23:43
Continue reading
1 Comment

DANGER! Vulnerability in Internet Explorer Not Patched Yet, No Fix for XP

b2ap3_thumbnail_alert_one_400.jpgInternet Explorer is one of the most used web browsers. Despite this, there have been various security problems with it, and another one has just been found - a zero-day vulnerability that leaves IE users at the mercy of hackers. We will cover what you need to know to keep your business safe.

Continue reading

Sign Up for Our Newsletter


Powered by ChronoForms -

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips IT Support Communication Business Management VoIP Virtualization Smartphone Email Server Holiday Network Data Quick Tips Saving Money Save Money Apps Disaster Recovery Remote Computing Alert Operating System Social Media Upgrade Office Going Green Business Continuity Mobile Device Management Chrome Small Business Android Application Best Practice Employer-Employee Relationship The Internet of Things WiFi Ransomware Big Data Identity Theft Managed Service Provider Microsoft Office Mobility Antivirus Social Facebook Password Information Technology Spam Bandwidth Unified Threat Management Hacking Saving Time Tablet Lithium-ion battery Passwords Printer History Analytics Search Gmail BYOD Browser Law Enforcement Current Events Office Tips Government Education Data Management User Error Money Work/Life Balance Remote Monitoring Tech Support Computers Disaster communications intranet Net Neutrality Firewall Avoiding Downtime Phone System iPhone Telephone Systems Collaboration Laptop Router Humor Apple Hard Drives Recovery Maintenance Gadgets Smartphones Network Security Users Automation USB Fraud Wireless Streaming Media Encryption Point of Sale Budget PowerPoint App Cost Management Business Intelligence Transportation Shortcut Retail Wi-Fi Internet Exlporer BDR Biometrics Fax Server Entertainment IT Consultant Social Engineering Flexibility Telephony Customer Service Data Loss Mobile Office Wearable Technology Virtual Reality Google Drive DDoS Proactive IT IT Solutions Benefits Online Currency Office 365 Cybercrime Outlook Risk Management Printer Server Managing Stress Private Cloud Personal Information Wireless Technology Marketing Administration Update VPN Content Filtering Managed IT Services Worker Commute Inbound Marketing Presentation Save Time Access Emails Windows 8 Audit Meetings Video Games Hosted Solution Twitter Science OneNote Hacker Vendor Management Running Cable Phishing End of Support Legal OneDrive Keyboard Robot Computing Networking Bring Your Own Device Paperless Office Advertising Politics Workplace Near Field Communication Hiring/Firing Data storage Prodcuctivity Human Resources Miscelllaneous PDF Scalability Experience Uninterrupted Power Supply Online Backup HIPAA Computer Accessories Text Messaging How To Music Internet of Things Travel Bloatware IT consulting Applications Regulations Display Distributed Denial of Service Mouse ISP Artificial Intelligence Books Sports 3D Printing Touchpad Branding eWaste Network Congestion Black Market Electronic Medical Records WIndows 7 Operating Sysytem HaaS Cameras Instant Messaging Television Data Theft Storage RAM Safety Files Two-factor Authentication Website Ebay Bluetooth Battery Trending CloudSync CPU Emergency Chromecast Amazon Customer Relationship Management Blogging SharePoint User Automobile Compliance Excel Programming Slow Cleaning Administrator Smart Phones Teamwork Best Available Reputation

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...