How to Survive one of the Worst Internet Attack Tactics

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

What is Ransomware and how do I Recover from It?

Using the Internet safely may seem like a simple thing, but many have discovered that this is not always the case. Almost everyone knows about the dangers of malware, spyware, and viruses, but there is one Internet threat on the rise that can be extremely difficult for technical services to deal with called “Ransomware.” Read more »


PixelPin Creates an Alternative to Standard Passwords by Using Images

Internet security concerns seem to grow more and more problematic every year.  Many people find themselves deeply concerned about phishing attempts and hackers gaining unwanted access to their PC or service accounts.  This also means large amounts of people constantly worry about the quality and security of their passwords.  PixelPin is a cool product in technology that allows users to replace the password function on their PC with picture passwords.  A picture password forgoes the usual text-based procedure for an authentication system where users click on four “passpoints” within an image to gain access to their computer or digital service accounts.  Users choose a picture from their computer to use for authentication.  Leaving the picture choice in the hands of the user is deliberate.  It allows people to choose an image where they are most likely to remember the specific four passpoints that they need to click on to get by PixelPin’s protection.  Users can sign up for PixelPin directly.  Service providers and manufacturers do not have to partner with the company directly for someone to use PixelPin to access accounts or devices.  Read more »


Warning! Devastating new Windows virus locks your files forever – unless you pay a ransom.

The cyber-criminals behind a threatening malware called CryptoLocker have infected computers around the world – from large company systems to home use computers.  The virus has been hitting hard for the past six weeks or so, and, due to state-of-the-art encryption used, the only ones who have the key to unlock the files are the criminals themselves. Read more »


This Device Would Do It In a Heartbeat – the Nymi

How far has identity authentication come?  From formerly high tech methods such as face unlock to retinal scanners in action-packed spy movies, technology is moving toward a system that requires “putting your heart into it.”  Imagine coming home and, without any action on your part, pulling into an unlocked garage, entering your unlocked home, and entering a room where your music of choice and even your room temperature of choice welcome you home.  Add having your favorite dinner on the table and the candles lit and you’d have the perfect picture! Read more »


Brian Kennish Wants Google and Facebook to Stop Tracking You

Privacy is becoming a more and more frequently discussed topic these days.  This is likely because online services like Facebook and Google continue to collect large amounts of data on their users.  Some users do not seem to mind trading a bit of their privacy for free online services. Others have been less than enthusiastic about the way users seem to be paying these companies with their personal data instead of cash for their services.  Brian Kennish, cofounder of Disconnect, is most certainly in the latter camp.

Brian Kennish formerly worked at Google as a software developer.  However, in 2010, Kennish left Google due to increasing dissatisfaction with their mass data collection and the secrecy around how that data is used.  That is part of the reason Kennish developed Disconnect, a browser extension that blocks third-party sites from tracking you when you use the web.  Disconnect is available to download for four different browsers—Chrome, Firefox, Opera, and Safari.  If you have trouble installing Disconnect, you can always ask computer support for assistance.  Read more »


NSA’s PRISM Program Reportedly Spies on Everyone’s Online Activity

There have been reports in recent days that the National Security Agency is collecting data from multiple Internet communication giants in a broad surveillance measure where the government collects e-mails, social media data, and other communications.  The report has stemmed from a leak of an NSA employee’s internal presentation on the surveillance program, which the NSA named PRISM.  The leaked slides claim that the NSA was receiving data from the servers of Microsoft, Yahoo, Google, Facebook, Apple, Paltalk and others.  These companies have all publicly claimed that they the NSA does not have direct access to their servers.  They also claim only to provide customer data if presented with a court order.  However, if reports about the surveillance program are true, all of these companies would be legally required to deny knowledge of PRISM, as it is a classified program.  Read more »


Malicious Browser Extension Targets Google Chrome and Firefox Users

Recently, there has been a malicious browser extension discovered that is threatening the Internet security of Google Chrome and Mozilla Firefox users.  The browser extension has been hijacking users’ Facebook accounts and gaining access to many people’s personal information.  However, the extension doesn’t only access your information.  It also actively takes complete control of your Facebook account and performs multiple actions without your consent.

This Trojan, identified as Trojan:JS/Febipos.A, can perform many actions when it gains access to your Facebook profile.  These actions include liking pages, commenting on pages, sharing links, inviting friends to new groups and even directly chatting with your friends through Facebook Messenger.  The Trojan uses these capabilities make posts that link other Facebook users to malicious websites.  People have also reported this software as posting links to a website for automobile sales on infected users’ profiles.  Read more »


Phishing Attacks on Apple Users and Twitter Accounts Cause Concern

Phishing attacks have become an increasing problem as of late both for everyday computer users and even major publications.  In the last month, there have been widespread phishing attacks aimed at both Apple and Twitter accounts.  These attacks come in the form of e-mails or web pages that seem as if they were from a service the recipient uses.  These e-mails trick recipients into giving over information, which then lets the cybercriminals access their accounts.

The phishing attacks aimed at Apple users mimicked an account verification page from Apple and prompted users to give their e-mail, credit card information, and account password.  This particular attack compromised over one hundred websites, which displayed the page that tricked Apple users into handing over their information.  Without proper Internet security service or software, it would be difficult to detect the attack for most people.  The intent of such attacks is to gain access to people’s Apple accounts.  Criminals will then sell the information or use it to compromise the accounts themselves. Read more »


Google Further Personalizes Search by Integrating “App Activities”

Google recently announced that they have integrated app activities into their desktop web search service.  This means that when Google users search for specific sites or services that use web apps—such as popular movie site Fandango—they will see aggregate information related to the web app.  For example, if you search for Fandango, promotional posters from popular movies among Google users at that time will appear to the right of your search results.  Clicking on one of these movie posters will link you directly to the film’s Fandango page.  If your search is more specific, the aggregate data will also be more specific.  Google means for the function to erase some steps when you’re searching for content in certain web apps.  Read more »


Real Security For Your Android-Driven Device: Reliaty55!

Security is a concern in the tech sector that only continues to grow.  The growth of security services pertaining to computers, smartphones and mobile computing devices is not a reflection on the industry’s unwillingness to adapt; technology continues to change at such a fast rate and hackers continue to adapt as well, necessitating an almost-constant development of new security-related products and services.  While many computers have been protected by the most robust anti-viral software ever created, as hackers take on smartphones and mobile computing devices, many of the major software developers have been slow to react.  Instead, consumers are discovering the benefits of mobile computing protection software, like Reliaty55. Read more »


1-10 of 1857
© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending