Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

Internet Security: Wi-Fi is Vulnerable

Our desire for constant connectivity has given rise to free Wi-Fi networks in hotels, coffee shops, and airports.  At home, many of us take extensive Internet security precautions, yet when it comes to free Wi-Fi, we don’t seem to realize the dangers we open ourselves up to such as malware, viruses, and even identity theft.

So what exactly is the difference in terms of Internet security, between the free Wi-Fi networks and those we use at home or work?  It’s simple – there is no Internet security with Wi-Fi. Read more »


Internet Security: Malware Targets the Windows Registry

If you’ve ever been the victim of an Internet security attack, you’ve probably heard of the Windows registry.  The registry is a prime target for the producers of malware.  However, most of us have very little understanding of the registry or its connection to Internet security.

The Windows registry is the foundation of your computer.  It is made up of thousands of folders called “keys” containing the basic instructions and information a computer needs to run.  Because it’s so complex, most typical computer users stay clear of it.  Read more »


Rescuecom Releases 5 Tips to Detect Phishing

Phishing attacks threaten our Internet security and can be hard to detect.  They can lead to identity theft, viruses, or the need for computer repair.  To help protect your Internet security, RESCUECOM’s computer repair experts offer five simple tips for detecting phishing attacks.

•1.) Avoid Action – Phishing attacks work when you take action.  An email that requests information or features clickable links may be an attack against your Internet security.  Legitimate emails include cut and past style links to help you avoid clicking.  If there are only clickable links, the email is likely a phishing scam. Read more »


Internet Security: Fake Anti Virus Programs

RESCUECOM reminds users to utilize only legitimate anti virus software, such as our Internet Security Suite.

A common cyber attack uses fake anti virus software as a means for infecting computers with malware.  These attackers rely on fear to trick users into violating their own Internet security.  Read more »


31-40 of 1857
© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending