Contact us today!
(469) 567-0181
(903) 458-9400
facebooktwitterlinkedinA PC Geek RSS Feed

A PC Geek Blog

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

This Halloween, Remember to Check Your Kids’ Mobile Devices for Ransomware

Halloween is a time when we celebrate what scares us, like ghosts, goblins, ghouls, and the like. For adults, the holiday becomes more lighthearted with each passing year, due to the understanding that such monsters are fictional. Yet, there exists real monsters who know how to play on people’s fears, namely, hackers.

Continue reading
0 Comments

When DDoS Attacks and Ransomware Combine, the Results are Ugly

When DDoS Attacks and Ransomware Combine, the Results are Ugly

Ransomware, the malware variant that has appeared more and more frequently has struck again, this time targeting users of Microsoft Outlook in a zero-day attack. A malware variant of Cerber (a ransomware) was recently utilized in a large scale attack on users of the messaging program, sent via phishing emails to corporate users.

Continue reading
0 Comments

New Ransomware Presents Users With 2 Equally-Terrible Options

New Ransomware Presents Users With 2 Equally-Terrible Options

The Petya ransomware, a particularly vicious monster of a threat, has reared its ugly head once again, only this time, it’s not alone. Petya now comes bundled together with Mischa, yet another ransomware that works well alongside Petya. The ransomware is delivered via an inconspicuous email disguised as a job application, with a resume attached. Once the user downloads the file, Petya encrypts the files located on the device.

Continue reading
0 Comments

CryptoLocker is the Worst Video Game Ever

b2ap3_thumbnail_gamers_pwned_400.jpgIt’s been two years since the world was introduced to CryptoLocker, a particularly-nasty ransomware that encrypts a computer’s data while giving the user a deadline to pay a ransom for the encryption key, or else have their data destroyed. What we’re seeing now is that the reach of CryptoLocker is extending beyond the average PC user; even gamers are getting owned by Cryptolocker.

Continue reading
0 Comments

Sign Up for Our Newsletter

captcharefresh

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Internet Microsoft Productivity Hackers Malware Business Computing Google Business Software Miscellaneous Workplace Tips Windows 10 Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Computing IT Services Health Mobile Devices User Tips Communication IT Support VoIP Business Management Email Virtualization Holiday Server Network Data Quick Tips Smartphone Disaster Recovery Office Apps Alert Going Green Save Money Remote Computing Business Continuity Mobile Device Management Operating System Saving Money Social Media Upgrade Android Chrome Small Business Managed Service Provider Mobility Microsoft Office Social Application WiFi Facebook Identity Theft Best Practice Antivirus Employer-Employee Relationship Ransomware The Internet of Things Big Data Passwords Law Enforcement Analytics History Office Tips Search Gmail Password Saving Time Browser Current Events Government Lithium-ion battery Printer Information Technology Spam Bandwidth BYOD Unified Threat Management Hacking Tablet Remote Monitoring Tech Support Gadgets Smartphones USB Users intranet Firewall Net Neutrality iPhone Collaboration Laptop Wireless Data Management Money Streaming Media Maintenance Hard Drives Education communications User Error Fraud Work/Life Balance Disaster Computers Telephone Systems Humor Avoiding Downtime Phone System Router Recovery Apple Encryption Network Security Automation IT Solutions App Risk Management Office 365 Managing Stress Private Cloud Wireless Technology IT Consultant Fax Server Outlook Data Loss Update Printer Server Personal Information Wearable Technology Marketing Budget Administration Proactive IT Business Intelligence Transportation Shortcut Managed IT Services Content Filtering Online Currency Internet Exlporer Biometrics Point of Sale PowerPoint Social Engineering Cost Management Telephony Customer Service Retail BDR Wi-Fi Virtual Reality Google Drive Entertainment DDoS Flexibility Mobile Office Benefits VPN Cybercrime WIndows 7 Operating Sysytem Regulations Television Storage ISP Vendor Management 3D Printing Files Books Two-factor Authentication Bluetooth Trending Black Market Computing Chromecast Electronic Medical Records Customer Relationship Management Cameras SharePoint HaaS User Instant Messaging Data Theft Excel Prodcuctivity Administrator Safety Teamwork Best Available Reputation Online Backup Battery CloudSync Presentation Access Emergency Meetings Hosted Solution Automobile Compliance Science Programming Display Cleaning Running Cable Phishing End of Support Worker Commute Inbound Marketing Audit Robot Save Time Emails Networking Video Games Advertising Twitter OneNote Near Field Communication Data storage Hacker Human Resources Legal PDF Website RAM Uninterrupted Power Supply OneDrive Bring Your Own Device Ebay Keyboard Paperless Office Computer Accessories Text Messaging Blogging CPU Internet of Things Politics Bloatware Amazon Workplace IT consulting Applications Hiring/Firing Distributed Denial of Service Scalability Miscelllaneous Mouse Artificial Intelligence Slow Sports Experience Smart Phones Touchpad Branding eWaste How To HIPAA Network Congestion Windows 8 Music Travel

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code