Computer Support Blog

Please enter a valid .

Tech Support Blog

Tech Support Blog

Facebook ‘dislike button’ really a viral attack

A new scam has begun spreading virally through Facebook, based on the often requested ‘dislike’ button.

Facebook, which allows users to ‘like’ posts, pages, and other content, has yet to create or approve a ‘dislike’ button.

Now a new scam spreading throughout the site tricks users into installing a rogue application which claims to be a dislike button.

Instead, the application uses each user’s account to virally spread itself, much like the “hot” and “funny” video scams which have plagued the social networking site in recent months.

Those attacks were designed to steal information from users, including their login credentials.

Protect yourself from this scam by avoiding any links, even from friends, that claim to provide a dislike button.  If you’ve already been victimized, deactivate the application, delete all posts referencing it from your wall, and eliminate it from your ‘likes’ and ‘interests’ in your profile.

As with the previous scams of this sort, changing your Facebook password is also recommended.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Viral Content: A Hidden Threat

Those funny videos on Facebook can actually be a major cause of computer repair problems.  Accessing viral content increases your chances of needing computer repair or computer support.

Just how extensive has the “viral video” craze gotten?

This week, a website called The Chive posted a series of pictures of a young woman quitting her job via dry erase board messages emailed to her co-workers. Read more »


Computer Support Tips: Making the Most of Patches

A key component in keeping your Internet security up to date is the free form of computer support provided by many major software companies – patches.

For example, Microsoft releases Internet security patches, along with non security computer support updates, on the second Tuesday of every month or “Patch Tuesday.”

Tomorrow’s Patch Tuesday will feature 14 bulletins with patches for thirty-four Internet security vulnerabilities in Microsoft’s products including Windows, Office, and Internet Explorer. Read more »


Internet Security: Safe Searching with Google

Google is the “King of Search”.  Now, it has another, less flattering title: “King of Malware.”  Google search results have become an Internet security threat.

The Barracuda Labs 2010 Midyear Security Report studied search engine results for ‘trending’ topics, and showed significant flaws in Google’s Internet security.

According to Barracuda, Google searches resulted in far more malware infected links – 69% – than results for Yahoo, Bing, and Twitter combined.  Read more »


Third Party Software Can Be Risky Business

For software, the number of Internet security vulnerabilities is a key component in determining its quality and usability.  Software with multiple vulnerabilities causes constant nightmares for computer users and computer support specialists alike.

Recently, security company Secunia reported that Apple had the most Internet security vulnerabilities of any software company.  This was surprising, given Apple’s historically strong Internet security track record.

However, Secunia’s more important news was that most Internet security vulnerabilities come from third party software. Read more »


Internet Security: Wi-Fi is Vulnerable

Our desire for constant connectivity has given rise to free Wi-Fi networks in hotels, coffee shops, and airports.  At home, many of us take extensive Internet security precautions, yet when it comes to free Wi-Fi, we don’t seem to realize the dangers we open ourselves up to such as malware, viruses, and even identity theft.

So what exactly is the difference in terms of Internet security, between the free Wi-Fi networks and those we use at home or work?  It’s simple – there is no Internet security with Wi-Fi. Read more »


Internet Security: Malware Targets the Windows Registry

If you’ve ever been the victim of an Internet security attack, you’ve probably heard of the Windows registry.  The registry is a prime target for the producers of malware.  However, most of us have very little understanding of the registry or its connection to Internet security.

The Windows registry is the foundation of your computer.  It is made up of thousands of folders called “keys” containing the basic instructions and information a computer needs to run.  Because it’s so complex, most typical computer users stay clear of it.  Read more »


101-110 of 1857