Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

Halloween is a time when we celebrate what scares us, like ghosts, goblins, ghouls, and the like. For adults, the holiday becomes more lighthearted with each passing year, due to the understanding that such monsters are fictional. Yet, there exists real monsters who know how to play on people’s fears, namely, hackers.

Continue reading
0 Comments

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

Continue reading
0 Comments

New Ransomware Presents Users With 2 Equally-Terrible Options

New Ransomware Presents Users With 2 Equally-Terrible Options

The Petya ransomware, a particularly vicious monster of a threat, has reared its ugly head once again, only this time, it’s not alone. Petya now comes bundled together with Mischa, yet another ransomware that works well alongside Petya. The ransomware is delivered via an inconspicuous email disguised as a job application, with a resume attached. Once the user downloads the file, Petya encrypts the files located on the device.

Continue reading
0 Comments

CryptoLocker is the Worst Video Game Ever

b2ap3_thumbnail_gamers_pwned_400.jpgIt’s been two years since the world was introduced to CryptoLocker, a particularly-nasty ransomware that encrypts a computer’s data while giving the user a deadline to pay a ransom for the encryption key, or else have their data destroyed. What we’re seeing now is that the reach of CryptoLocker is extending beyond the average PC user; even gamers are getting owned by Cryptolocker.

Continue reading
0 Comments

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Computing Google Business Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips IT Support Communication Business Management VoIP Virtualization Smartphone Email Server Holiday Network Data Quick Tips Saving Money Save Money Disaster Recovery Apps Remote Computing Alert Operating System Social Media Upgrade Office Going Green Business Continuity Mobile Device Management Chrome Small Business Android Best Practice Employer-Employee Relationship Ransomware The Internet of Things WiFi Identity Theft Big Data Managed Service Provider Microsoft Office Mobility Antivirus Social Application Facebook Government Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Saving Time Lithium-ion battery Passwords Printer Law Enforcement Office Tips Analytics History Gmail Search Password BYOD Browser Current Events Encryption Education User Error communications Remote Monitoring Tech Support Computers Disaster Work/Life Balance Telephone Systems Humor intranet Net Neutrality Firewall Avoiding Downtime iPhone Phone System Laptop Router Collaboration Recovery Apple Network Security Automation Hard Drives Maintenance Gadgets Smartphones Users Fraud USB Data Management Money Wireless Streaming Media Content Filtering Internet Exlporer Point of Sale Managed IT Services Biometrics PowerPoint Social Engineering App Telephony Customer Service Cost Management Retail Virtual Reality BDR Google Drive IT Consultant Entertainment Fax Server Wi-Fi DDoS Data Loss Mobile Office Flexibility Benefits Wearable Technology Proactive IT Cybercrime IT Solutions Risk Management Online Currency Private Cloud Office 365 Managing Stress Wireless Technology Outlook Printer Server Update Personal Information Marketing Budget Administration VPN Transportation Shortcut Business Intelligence Phishing End of Support Automobile Running Cable Inbound Marketing Cleaning Robot Windows 8 Emails Networking Audit Advertising Worker Commute Twitter OneNote Save Time Data storage Video Games Vendor Management Human Resources Near Field Communication PDF Uninterrupted Power Supply OneDrive Hacker Computing Legal Bring Your Own Device Paperless Office Computer Accessories Text Messaging Internet of Things Bloatware Workplace Keyboard Prodcuctivity Applications IT consulting Miscelllaneous Mouse Artificial Intelligence Politics Distributed Denial of Service Sports Online Backup Hiring/Firing Touchpad Scalability Branding HIPAA Network Congestion Experience eWaste Travel Operating Sysytem How To Display Regulations WIndows 7 Storage ISP Music Television Files Two-factor Authentication 3D Printing Bluetooth Books Trending Chromecast Customer Relationship Management Black Market Cameras SharePoint User Data Theft Excel Electronic Medical Records Administrator HaaS Website RAM Reputation Instant Messaging Ebay Teamwork Best Available CloudSync Safety Amazon Access Blogging CPU Presentation Battery Meetings Hosted Solution Compliance Science Programming Emergency Smart Phones Slow

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code