Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

How Connected Are We?

The great contribution of social networking platforms like Facebook and Twitter is connectivity, social connectivity, that is. Although Internet users everywhere used a variety of network services to connect, social networking sites would have us believe that we simply were not fulfilling our social potential. Many of its 800 million view Facebook  as a fundamental social networking tool. According to HighTalk, a third of all people with access to a network service are on Facebook. In many ways, teens and young users are growing up believing that Facebook is the ultimate social network service, but is Facebook actually helping us become more socially connected?

When it comes to connecting with old, lost friends and relatives, social network services are a simple and fast resource. In a matter of minutes, you can look through a friend’s friend list, locate a common friend, search his or her friend list, and voila, high school sweetheart found. In fact, for many people, websites that offer social network services are a great way to combine business and pleasure.

Clearly, Facebook  and other social networking sites offer us some form of connectivity—they allow us to be in each others’ lives much more prominently (often excessively). The real issue, though, is the kind of connectivity that Facebook enables, not its strength. In other words, do social network services actually enhance our social interactions and connections or do they merely create a delusional, alternate world in which we all roam with complete disregard for our privacy and Internet security, taking pride in the fact that we have 500 + friends?

Even in real life social settings, almost everyone is constantly checking Facebook via smartphones and other devices. If the purpose of social network services is to enhance our social connections, why do we still log-in when we are in perfectly healthy social settings?

Still, if you are convinced of the unparalleled rewards of social network services, consider the threats that these network services pose to users’ Internet security. Using social network services comes at a cost to Internet security. A previous blog discusses how vulnerable users’ Internet security can become when social network services are granted permission to share users’ data. Some people might try to defend social network services like Facebook  by claiming that users have the option to limit apps, hence protect their Internet security. However, the choice to block all third party apps is similar to the choice not to use a cell phone! Sure, no one is forcing you to allow Facebook apps access to your information, but without such apps, Facebook becomes boring and limited.

On the surface, sure, Facebook is making us more connected, but in reality, it is isolating us, increasing our addiction to life on the web, and constantly threatening our Internet security. Perhaps it’s not that great after all…

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Smarter Malware is on the Rise

After a two-year investigation known as Operation Ghost, a group of Eastern European cyber thieves was caught by the FBI, according to an article by ABC News. The story is yet another reminder of some of the problems with global Internet security and the need to get professional virus removal. The group used a complex scheme that even infiltrated the computers of U.S. government agencies, which shows how susceptible Internet security can be even at the governmental level.

The group made $14 million in “illegitimate income” before the FBI put an end to the scheme, according to ABC News. The group infected over four million computers with malware that played an essential role in their advertising scheme. The seven hackers known as the Rove group compromised the Internet security of users and targeted sites like iTunes, Netflix and even the IRS, reports ABC News.

The malware that they used to infect the compromised computers sheds light on a serious Internet security and virus removal problem. According to the article, the malware prevented users from installing virus removal programs that could potentially defuse it. This is an example of an emerging challenge to virus removal programs, as it marks an increases level of stealth and sophistication on the part of malware. Not only are hackers writing malware to breach Internet security, but they are also programming it to strongly resist virus removal efforts. In other words, malware is becoming more conscious of the fact that it is malware, making basic virus removal much more difficult for the average user.

The hackers allegedly partnered with a variety of Internet advertisers to enact a scheme based on targeting users’ Internet security to generate profits, reports ABC News. Advertisers paid the hackers to generate traffic to certain advertisements and websites. They did this by using the malware that they designed to redirect casual Internet users to advertisement websites. By doing so, the hackers increased click results and generated profit from their partner advertisers.

This story also shows that threats to Internet security go beyond the programming level and into the field of international organized crime. Hackers frequently operate internationally, breaching users’ Internet security in one continent while operating in another.

The fact that a group of seven hackers made approximately $14 million dollars by spreading malware is a scary reminder that the incentives to target Internet security is real and, for many, great. That is all the more reason to make every effort to protect our Internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Internet Security for Santa

Using your network service to do your holiday shopping has many advantages.  There are no lines or crowds.  If you want to see another store’s price for a product, that information is a click away.  Even better, you don’t have to worry about parking at the mall – shopping has become as easy as turning on your computer and starting the network service. Shoppers who used their network service to buy gifts accounted for more than thirty billion dollars in sales last year.  Taking some quick and easy precautions will ensure that you can participate in this exciting new marketplace without compromising your Internet security.

Read more »


Too Young to be on Facebook?

A study appearing this week in First Monday highlights a serious threat to users’ Internet security—underage users, that is. Millions of kids under the age of 13 are on Facebook, according to the study. One of the most significant findings is that parents willingly help their children join Facebook, despite the dangers this practice poses to children’s privacy and Internet security.

According to a CNN article on the study, 95 percent of parents of 10-year olds know that their children are on Facebook. In fact, they helped their children create the account. Though this is not necessarily a surprising finding, it should certainly be an upsetting one. Parents are essentially desensitizing their children to the need to have strong Internet security while online. By helping kids join at such an early age, parents are telling their kids that it’s ok to share pictures and other personal information, that being vigilant about Internet security isn’t necessary.

Perhaps one cause of this growing disregard for Internet security is the fact that people take Internet security for granted. Users assume that there is no imminent threat to their children’s—or their—Internet security because they’re using a secure home network service or because they have firewalls and other kinds of protection set up that. However, the main Internet security threat is not one that comes from network services. The most imminent Internet security threat facing younger users is the loss of privacy.

Last year, Consumer Reports found that 7.5 million children under 13 were Facebook members. Such a figure may not seem too significant relative to Facebook’s 800 million users, but in reality it is very alarming. There are almost as many underage kids on Facebook as there are people in the greater Boston area. Shouldn’t kids be playing outside or reading Harry Potter instead of slowly becoming naturalized to ignoring Internet security, living in a cyber world that cannot substitute for healthy, real social interactions?

The trouble is, as network services become abundant everywhere, it’s hard to prevent children from wanting to join Facebook or going online 5 hours a day. In fact, as the study shows, parents tend to allow their children to join Facebook precisely because it has become a standard communication tool across network services. The rising complexity of network services makes it hard to separate online media and stick with one form of communication only. Email, chat, Facebook, and calendars are increasingly becoming one large network service, which makes it hard to limit online activity to only email, for instance.

For parents, there’s no easy solution to the problem. Balancing the need for strong Internet security and protecting kids’ privacy with the need to be involved in an increasingly interconnected online world is just one of the many perks of parenting.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Is your computer really secure?

Most people have some form of virus removal software on their computer.  Despite that fact, a significant proportion of those users will have to deal with an Internet security issue at some point in their computing career.  This is because the threat environment online is dynamic; it evolves constantly, trying to outfox the Internet security providers and get to your data.  How can you be sure that your virus removal software is providing the most comprehensive protection?  Here are some questions you should ask in shopping for virus removal software:

1)  Is the virus removal software you’re considering from an established, reputable provider?  It’s important that you be able to trust your virus removal software.  Most brands will have reviews posted online, which can help you decide if that particular program will fit your needs.  Conversely, choosing a virus removal program without investigation carries many risks, not least among them the risk of having your Internet security compromised by a bogus “diagnostic scan.”

2)  What happens when the software detects a threat?  It is important to make a distinction between virus detection software and virus removal software.  Virus detection software will find a threat and then notify the user, leaving them to deal with the threat by themselves.  Virus removal software will detect the threat, isolate it, and then remove it from the computer, usually with little or no input from the user.

3)  How often does the software update its threat registry?  As mentioned above, the ways in which hackers test your Internet security are constantly changing.  It is important, therefore, to make sure that your virus removal software updates its threat registry regularly and often.  These updates will allow your virus removal software to detect and cope with the newest Internet security threats as they appear.

4)  Exactly what features does your virus removal software offer?  Before committing to a particular program, take a look at what it can offer you.  While it is true that some Internet security companies offer only bare-bones virus removal packages, others include things like personal firewalls for added security, or spam filters for your email accounts.  Just as with any other purchase, the goal when shopping for Internet security programs is to get the most value for your dollar.

5)  Does the software company stand by their product?  Let’s be clear: no matter how comprehensive your virus removal software is, no matter how careful you are with your permissions, there is still a chance that you will eventually have to deal with a breach of your Internet security.  Another important question when shopping for virus removal software is: what happens then?  Does the Internet security company have support personnel standing by, or is it up to the user to fix the problem?

These are just some of the important questions you should ask yourself when shopping for Internet security software.  Answering these questions before you buy will ensure that you get the best possible protection for your computer.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


SmartSwipe Your Way to Safer Online Shopping

If you’ve ever been in a small pizzeria or a local family diner that has just recently started accepting credit cards, you might have seen a little gadget that’s attached to the checkout computer—a small credit card reader. With the advances in network services, it has become very easy to attach a credit card reader to almost any computer with an Internet connection. In fact, if you’d like to swipe away your credit cards at home, then by all means, go for it. SmartSwipe is a small, very cool personal credit card reader that can be used to read credit cards at home or in the office.

SmartSwipe isn’t just a cool way of playing shop at home. Sure, you can swipe away your credit cards when shopping online to get a more commercial feel for your transactions, but there’s more to this credit card reader than fun. SmartSwipe adds an entire new dimension of security to your online financial activities that involve using credit cards. No matter how secure you think your Internet connection is, and regardless of how advanced your anti-virus software is, when you enter your credit card information, you still face some Internet security risks. SmartSwipe reduces (or maybe even eliminates) these risks by encrypting your credit card data before it reaches the information field. This way, if a hacker is trying to monitor your keystrokes or remotely observe your screen, he or she will not be able to see the information you enter.

Under normal circumstances, when you use a credit card to make an online purchase, the website you’re using scrambles (encrypts) your data to prevent hackers from seeing it in its raw form. However, if your device is infected with spyware, for example, that program will have access to the data before it is encrypted. SmartSwipe encrypts the data in its external hardware so that by the time it reaches your computer, it’s protected.

The safe credit card reader is an essential tool for people who regularly enter their credit card information online, whether it’s for online shopping or other financial transactions. As Identity theft problems increase, it’s essential for users to safeguard their private information.

The device is easy to use and connects to your computer via a USB port. Additionally, it is compatible with all major credit cards including Visa, MasterCard, American Express, Discover, and JCB.

SmartSwipe doesn’t come with hidden fees, according to its manufacturer, and using it is completely free after you have purchased the product. The device also helps protect you from accidentally buying the same product twice as it only accepts one purchase per transaction.

To investigate how well the card reader actually works, CBS affiliate, KUTV, independently put it to the test. The show’s producers attempted to get access to a volunteer’s credit information as she completed two transactions, one with SmartSwipe and one without it. Sure enough, when she used SmartSwipe, the (friendly) hacker wasn’t able to see any of her information. On the other hand, when she didn’t use the device, all her data was visible.

Costliness aside, the SmartSwipe looks elegant, connects to your computer easily, and, most importantly, adds a priceless level of security to your online financial transactions, and really, can you put a price tag on that?

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for the Phishing Bait

Sometimes, ensuring strong Internet security depends on more than just a secure home or office network service or even a strong anti-virus program. Sometimes, strong Internet security depends on human vigilance, not just firewalls and virus software. This is because phishing, which is one of the most common threats to casual users’ Internet security, can occur even in the most secure network service. Though some Internet security programs or email features can prevent phishing, for example, it still poses a stealthy threat, since it relies on human naiveté.

Phishing is the attempt to breach Internet security and steal your passwords, usernames, and other information by tricking you into giving them up in some form or another. According to Wikipedia, the term “phishing” relates to the idea of falling for bait, the way fish do. So hackers and cybercriminals trying to compromise your privacy via your network service are metaphorically fishing along the river of network services for your information.

Phony or fraudulent emails that try to lure users into giving out their passwords are a common phishing technique. Phishing emails can look like they’re from a bank, a business, or even a government agency. Some emails present users with a phony story and ask them to respond with information that can be used to target their private online accounts.

Phishing emails are getting increasingly sophisticated, which makes them an even bigger threat to Internet security. Because some emails still reach our inboxes, it is important to look for the warning signs. These include poorly written emails with obvious typos or nonsensical information. Also, vague emails that don’t include any specific information about their recipient are usually scams. For example, an email from a financial institution that start with “Dear Customer” instead or your name is clearly trying to breach your Internet security.

Cybercriminals also try to trick users to log into a webpage that looks like an authentic page that actually records the submitted data and exploits it. Even when using a trusted network service, you could be susceptible to this form of phishing. If your Facebook or email login page looks subtly different, be cautious before you enter your username and password as it might be an Internet security scam.

Stay on the lookout for small details that predict phishing scams and threats to your network service like typos, vagueness, unprofessional appearance and tone, sloppy design, and nonsensical requests. But remember that threats to your Internet security aren’t always obvious—many are sophisticated. Change your password often as a regular means of protecting your network service and Internet security. Most importantly, remember that phishing doesn’t force you to give out your information; it tricks you, so don’t fall for the bait.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Ignorance is not Bliss When it Comes to Viruses

Computer viruses and virus removal can cost you more than just time and money; they can cost you valuable data or even a physical hard drive. The problem is that we’re often careless when it comes to getting the right kind of protection against computer viruses. In fact, even after we suspect that some kind of malware has infected our device, we often put off virus removal either because we think it’s not necessary or because we think it’s too much work. Well, both approaches are wrong.

If your device is infected with malware, letting the virus just sit there should never be an option. You should start virus removal immediately. The longer you wait before getting virus removal, the longer your private data is subjected to risks. Additionally, with many viruses, delaying getting virus removal allows them time to brew, so to speak. Think of computer diseases the same way you think of human diseases.

First, this means that prevention is the best cure. So protect your device with the right kind of anti-virus software to avoid the need for virus removal in the first place. Secondly, if your machine does get a virus or malware, don’t wait and be aggressive with your removal efforts. Seek out a virus removal specialist to avoid the risks of amateurish virus removal efforts. This is especially important if you’re worried about the data on your machine. Data recovery can be complicated and expensive, and it can be made worse by poor virus removal techniques.

A crude way of handling virus removal is erasing the entire hard drive and reinstalling Windows. Though his amateurish method of virus removal is relatively easy, it usually means that your data will be lost and that you’ll need a professional data recovery service. One way of avoiding this hassle is backing up your data regularly using a secure service like that offered by Rescuecom.

Getting professional virus removal can make data recovery efforts much easier as professionals can target the threats to your computer while protecting your data. Instead of having to pay for virus removal and data recovery, be cautious, and protect your device to avoid viruses. When you do get them, get them off as soon as possible.

Remember, viruses are not only a threat to your privacy and security; they are also a threat to your valuable data, since they can erase or damage it. In some cases, viruses can damage a hard drive so badly that extensive and complicated data recovery is the only solution left. In fact, sometimes even the most advanced data recovery efforts fail.

Given the risks to your data and to your wallet, the best way to avoid needing extensive data recovery efforts and complicated virus removal services, it is best to stay protected and vigilant. Don’t let viruses destroy your device just because you can’t see any imminent harm. This is one case where ignorance is certainly not bliss.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Looks like Spam’s Here to Stay

Approximately 300 billion spam messages go out everyday according to a recent Cisco Annual Security report. Over the course of a year, spam emails make up 90 percent of the world’s emails. Given such absurdly large figures, it is essential to maintain strong Internet security practices and to use secure network services.

Spam continues to thrive because it is an easy and cheap marketing tool for advertisers and other parties using it. Even when the vast majority of spam emails are ignored, the small percentage that actually reaches people can help improve the sender’s sales. Not all spam is advertising, though. A great deal of spam is laden with viruses and malware that can compromise a user’s Internet security and network services. In fact, most spam originates from network services infected with spam malware. So strong Internet security is essential to prevent machines from becoming spam hosts.

According to the Spamhaus Project, approximately 100 spam gangs taking advantage of the globalization of network services produce the vast majority of spam targeting the North America and Europe. The computers and network services that generate the highest spam emails are in Brazil, according to Cisco. Approximately 7.7 trillion spam emails originate in Brazil every year. The U.S. is a close second with 6.6 trillion.

Users can try to limit the amount of spam that they get by employing good Internet security practices, but even then, getting some spam is inevitable. The best Internet security measure to fight against spam is to be selective in giving out your email address. Just as you don’t go around telling random strangers where you live, you should protect your email address the same way. If you had to give out your address to a list of criminals every time you wanted a service, wouldn’t you say no? So why do we so readily give out our email addresses to facebook apps and other services?

It’s hard to say whether spam will actually disappear anytime in the foreseeable future. Spammers are already indifferent to laws governing Internet security, so it is unlikely that they will suddenly become concerned about their actions’ legality. Network service providers try to reduce spam, but their attempts are usually futile because of the dangerously simplistic nature of spam. Internet security services that are readily available in email, for example, have limitations. Even advanced ones like Gmail’s spam filter let spam through sometimes. On the other hand, spam filters often perceive harmless or real emails as spam, which can prevent authentic mail from getting through.

Spam is not only annoying, but it can pose a threat to your Internet security and harm your network services in the attempt to produce more spam. Improving Internet security against spam requires action on your part. No one is completely immune to getting spam, but safeguarding your email address is the clear-cut first step towards getting less of it!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Tune into Music and a Little Social Networking with Jango

If you’re looking for more music variety than what your MP3 player or iPod/iPhone can provide, consider tuning into the radio. Not just any radio, though—Internet radio. In fact, if you’re already one of the 13 percent of weekly American Internet radio lovers, you’ve probably heard of big names like Pandora and NPR. Many Internet radio stations offer streaming services that allow you to customize your music preferences and listen to unlimited music all day for free, albeit with some ads. One particularly interesting Internet radio provider is Jango, a service that combines free music with social networking and a comprehensive listening experience that includes artist bios, videos, and relevant links.

For users concerned with Internet security, Jango’s biggest advantage is that it doesn’t require any risky or potential harmful downloads. The interface is entirely online, and listeners can even listen to music without creating an account. Of course, creating an account has its advantages, not to mention that it’s safe and easy; Jango states that emails are not shared or spammed.

To start using Jango, you need to create a station based on an artist or song preference. Next, Jango asks you a few quick questions like how frequently to play the selected song or artist. The website also suggests similar artists in a tag cloud form. When it comes to giving you the music you want, Jango seems to do a better job than Pandora; it’s more straightforward. For example, if you want to listen to songs by Adele and create an Adele station, Jango seems to play Adele—as opposed to similar artists— more frequently than Pandora would. The more artists you add to a station, the “smarter” it gets, guaranteeing that your actual selections play more frequently than merely similar ones. You can also ban artists that you don’t want to hear, as well as rate the songs you do like.

Another cool Jango feature that doesn’t exist in Pandora is the ability to tune into other users’ stations. This feature, among others, is what makes Jango a more interactive site than Pandora. On Jango, you can see who shares your music taste (called “Like-Minds”), invite friends, and talk to other users.

If you’re an independent or rising artists, then add Jango to your list of favorite places immediately. Jango gives emerging artists the chance to directly submit their music online and have it play along with the mainstream music that appears on the website.

As of 2008, Jango had a million users, compared to Pandora’s 80 million, but those numbers are bound to change as legal battles over royalties, copyright issues and antitrust issues move forward.

Jango has been highly praised by the Wall Street Journal, PCWorld, WIRED Magazine, USA Today, and CNET. The interface works in many countries (where Pandora currently only works in the US), and seems to have extensive tech support. Jango’s website offers an extremely helpful Q&A section that covers many things from how Jango works to privacy and security issues. Jango is also available in app form for Apple OS and Android phones.

Overall all, despite a clunky interface and occasionally annoying ads, the website offers so many fresh features that it’s definitely worth a listen.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending