Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

Halloween is a time when we celebrate what scares us, like ghosts, goblins, ghouls, and the like. For adults, the holiday becomes more lighthearted with each passing year, due to the understanding that such monsters are fictional. Yet, there exists real monsters who know how to play on people’s fears, namely, hackers.

Continue reading
0 Comments

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

Continue reading
0 Comments

New Ransomware Presents Users With 2 Equally-Terrible Options

New Ransomware Presents Users With 2 Equally-Terrible Options

The Petya ransomware, a particularly vicious monster of a threat, has reared its ugly head once again, only this time, it’s not alone. Petya now comes bundled together with Mischa, yet another ransomware that works well alongside Petya. The ransomware is delivered via an inconspicuous email disguised as a job application, with a resume attached. Once the user downloads the file, Petya encrypts the files located on the device.

Continue reading
0 Comments

CryptoLocker is the Worst Video Game Ever

b2ap3_thumbnail_gamers_pwned_400.jpgIt’s been two years since the world was introduced to CryptoLocker, a particularly-nasty ransomware that encrypts a computer’s data while giving the user a deadline to pay a ransom for the encryption key, or else have their data destroyed. What we’re seeing now is that the reach of CryptoLocker is extending beyond the average PC user; even gamers are getting owned by Cryptolocker.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Business Software Business Computing Google Workplace Tips Windows 10 Miscellaneous Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing User Tips IT Support Communication VoIP Business Management Network Data Quick Tips Virtualization Smartphone Email Server Holiday Business Continuity Mobile Device Management Saving Money Save Money Apps Disaster Recovery Remote Computing Alert Operating System Social Media Upgrade Office Going Green Small Business Android Chrome Social Facebook Mobility Application The Internet of Things WiFi Best Practice Identity Theft Big Data Managed Service Provider Microsoft Office Employer-Employee Relationship Antivirus Ransomware History Analytics Search Gmail BYOD Browser Current Events Government Law Enforcement Information Technology Spam Office Tips Password Bandwidth Unified Threat Management Hacking Tablet Saving Time Lithium-ion battery Passwords Printer Recovery Network Security Automation Streaming Media Encryption Education User Error Remote Monitoring Disaster Tech Support Computers intranet Avoiding Downtime Net Neutrality Firewall Data Management iPhone Phone System Money Laptop Router Collaboration Apple Wireless communications Hard Drives Maintenance Gadgets Telephone Systems Smartphones Humor Users Fraud Work/Life Balance USB Printer Server Benefits Wi-Fi Flexibility Marketing Administration VPN Cybercrime Risk Management Content Filtering Point of Sale Managing Stress Private Cloud App PowerPoint Wireless Technology Cost Management Office 365 Retail Update BDR IT Consultant Entertainment Fax Server Data Loss Budget Mobile Office Personal Information Business Intelligence Wearable Technology Transportation Shortcut Internet Exlporer Proactive IT Biometrics IT Solutions Social Engineering Telephony Managed IT Services Customer Service Online Currency Virtual Reality Google Drive DDoS Outlook Data Theft Internet of Things Legal Bloatware IT consulting Website RAM Applications Artificial Intelligence Keyboard Distributed Denial of Service Mouse Ebay CloudSync Sports Branding Amazon Blogging CPU Touchpad Politics Hiring/Firing eWaste Network Congestion Compliance Scalability Programming WIndows 7 Smart Phones Slow Operating Sysytem Experience Television Storage Inbound Marketing Files How To Two-factor Authentication Audit Bluetooth Windows 8 Emails Music Trending Twitter Chromecast OneNote Customer Relationship Management Books SharePoint User Vendor Management Excel Administrator Black Market OneDrive Electronic Medical Records Bring Your Own Device Teamwork Best Available Computing Reputation Paperless Office HaaS Presentation Access Instant Messaging Workplace Safety Meetings Prodcuctivity Miscelllaneous Hosted Solution Science Online Backup Battery Emergency Running Cable Phishing End of Support HIPAA Travel Robot Automobile Networking Cleaning Display Regulations Advertising ISP 3D Printing Near Field Communication Data storage Worker Commute Human Resources Save Time PDF Uninterrupted Power Supply Video Games Text Messaging Hacker Computer Accessories Cameras

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code