Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

The Catch-22 Of The Cloud

When Harry Potter And The Deathly Hallows, Part 2 dropped on DVD, a big part of the advertising campaign was that the fully-loaded version included an UltraViolet Digital Copy. UltraViolet uses the Cloud platform and with popular movies streaming from it, this is becoming many consumers’ first experience with the Cloud. While the idea of the Cloud may seem like a strong one, it has a number of risks to consumers.

The Cloud, as it pertains to media, is a form of online storage where companies produce material and give access to it to paying customers.  As a form of online storage, users have access to files without downloading or uploading them.  For those who buy the DVD and Blu-Rays that have UltraViolet copies, they access the online storage vault from UltraViolet when they want to watch their movie.  The file then streams from the online storage point in the Cloud to your computer, smartphone or other cloud-connected device.

The Cloud is banking on customers not wanting to use up hard drive space for digital copies of their media.  Companies using the Cloud see online storage as a way to prevent pirating.

Consumers have many reasons to be wary.  Because the online storage of the Cloud requires a connection, Internet security issues are a very real concern for users.  Threats to Internet security through viruses may be easier to control with the Cloud, but they are also easier to disseminate.  As soon as the Cloud-based version of a file is corrupted, every computer using that file may be infected.  To date, Internet security providers have neither illustrated such a problem nor a defense against it.  Users who are unsure of their own Internet security measures are wary of online storage like the Cloud.

The vendors using Cloud-based media are also are arguing that the Cloud-based media will not wear or scratch the way traditional DVDs, CDs and Blu-Ray discs do.  But Cloud-based vendors are neglecting the basic psychology of ownership.  For sure, an online storage vault is a convenient idea, but it leaves consumers without something physical to feel they own.  The Cloud-based online storage concept suffers the same defect as the MiniDisc in the area of the psychology of ownership; consumers pay more for something they do not see and cannot feel, making them feel like they overpaid.

Internet security issues aside, Cloud users have every reason to doubt the long-term viability of the scheme.  Technology changes fast, and paying more money for a service or company that may not exist in a few years makes consumers less likely to try new technologies.  The music store The Wall used to guarantee CDs with their sticker on them for life.  Those who still have CDs from The Wall now have a worthless guarantee.  Between the Internet security issues and the fact that online storage methods like the Cloud have not been tested in the long-term, users have every reason to remain wary of spending the extra money now.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Internet Security for Santa

Using your network service to do your holiday shopping has many advantages.  There are no lines or crowds.  If you want to see another store’s price for a product, that information is a click away.  Even better, you don’t have to worry about parking at the mall – shopping has become as easy as turning on your computer and starting the network service. Shoppers who used their network service to buy gifts accounted for more than thirty billion dollars in sales last year.  Taking some quick and easy precautions will ensure that you can participate in this exciting new marketplace without compromising your Internet security.

Read more »


Too Young to be on Facebook?

A study appearing this week in First Monday highlights a serious threat to users’ Internet security—underage users, that is. Millions of kids under the age of 13 are on Facebook, according to the study. One of the most significant findings is that parents willingly help their children join Facebook, despite the dangers this practice poses to children’s privacy and Internet security.

According to a CNN article on the study, 95 percent of parents of 10-year olds know that their children are on Facebook. In fact, they helped their children create the account. Though this is not necessarily a surprising finding, it should certainly be an upsetting one. Parents are essentially desensitizing their children to the need to have strong Internet security while online. By helping kids join at such an early age, parents are telling their kids that it’s ok to share pictures and other personal information, that being vigilant about Internet security isn’t necessary.

Perhaps one cause of this growing disregard for Internet security is the fact that people take Internet security for granted. Users assume that there is no imminent threat to their children’s—or their—Internet security because they’re using a secure home network service or because they have firewalls and other kinds of protection set up that. However, the main Internet security threat is not one that comes from network services. The most imminent Internet security threat facing younger users is the loss of privacy.

Last year, Consumer Reports found that 7.5 million children under 13 were Facebook members. Such a figure may not seem too significant relative to Facebook’s 800 million users, but in reality it is very alarming. There are almost as many underage kids on Facebook as there are people in the greater Boston area. Shouldn’t kids be playing outside or reading Harry Potter instead of slowly becoming naturalized to ignoring Internet security, living in a cyber world that cannot substitute for healthy, real social interactions?

The trouble is, as network services become abundant everywhere, it’s hard to prevent children from wanting to join Facebook or going online 5 hours a day. In fact, as the study shows, parents tend to allow their children to join Facebook precisely because it has become a standard communication tool across network services. The rising complexity of network services makes it hard to separate online media and stick with one form of communication only. Email, chat, Facebook, and calendars are increasingly becoming one large network service, which makes it hard to limit online activity to only email, for instance.

For parents, there’s no easy solution to the problem. Balancing the need for strong Internet security and protecting kids’ privacy with the need to be involved in an increasingly interconnected online world is just one of the many perks of parenting.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Smartphone Virus Removal is Still Budding

The way the smartphone market is heading, those things that once allowed us to make phone calls and send text messages (what where they called again?) will quickly be forgotten. In their place (oh, that’s right, phones) the standard communication device will be the smartphone. Smartphones are becoming more like computers and less like phones. Apple’s iPhone and Google’s Android, the two systems currently dominating the market, already work like mini computers. Given this slow but inevitable shift in the functionality of phones, it is important to remember that they are becoming more susceptible to Internet security issues and may encounter problems that require virus removal.

As browsing capabilities on smartphones become more sophisticated, users are able to access more websites, many of which pose a risk to a smartphone’s Internet security. Downloading email attachments, for example, carries Internet security risks. Internet security is also threatened by using unsafe networks. The biggest threat to Internet security, though, is mobile apps. According to an article in The Telegraph, malicious software attacks on smartphones are on the rise.

Cyber criminals are rushing to write new virus software that can breach smartphones’ Internet security and record private and sensitive user data such as bank account information or login passwords. Such increasing threats require users to employ the necessary measures to ensure their phones’ Internet security.

Unfortunately, sometimes even the best Internet security precautions fail, causing smartphones to require virus removal efforts. Virus removal for smartphones is relatively new territory, which is why users shouldn’t gamble with their devices and risk losing valuable data and money because of amateurish virus removal. Smartphone users should seek out professionals in virus removal, like Rescuecom who have a long history of providing Internet security services, as well as virus removal services for a variety of computers and computer-based devices.

The transformation of the phone into the smartphone marks an exciting and important time in the development of technology. It signals the marriage of complex technology and basic tools. But while we drool over the potential that these devices bring with them, we should remember that as computers, they require more advanced tech support to stay healthy. They also require us to pay more attention to Internet security and to get the right kind of virus removal if that ever becomes necessary.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Is your computer really secure?

Most people have some form of virus removal software on their computer.  Despite that fact, a significant proportion of those users will have to deal with an Internet security issue at some point in their computing career.  This is because the threat environment online is dynamic; it evolves constantly, trying to outfox the Internet security providers and get to your data.  How can you be sure that your virus removal software is providing the most comprehensive protection?  Here are some questions you should ask in shopping for virus removal software:

1)  Is the virus removal software you’re considering from an established, reputable provider?  It’s important that you be able to trust your virus removal software.  Most brands will have reviews posted online, which can help you decide if that particular program will fit your needs.  Conversely, choosing a virus removal program without investigation carries many risks, not least among them the risk of having your Internet security compromised by a bogus “diagnostic scan.”

2)  What happens when the software detects a threat?  It is important to make a distinction between virus detection software and virus removal software.  Virus detection software will find a threat and then notify the user, leaving them to deal with the threat by themselves.  Virus removal software will detect the threat, isolate it, and then remove it from the computer, usually with little or no input from the user.

3)  How often does the software update its threat registry?  As mentioned above, the ways in which hackers test your Internet security are constantly changing.  It is important, therefore, to make sure that your virus removal software updates its threat registry regularly and often.  These updates will allow your virus removal software to detect and cope with the newest Internet security threats as they appear.

4)  Exactly what features does your virus removal software offer?  Before committing to a particular program, take a look at what it can offer you.  While it is true that some Internet security companies offer only bare-bones virus removal packages, others include things like personal firewalls for added security, or spam filters for your email accounts.  Just as with any other purchase, the goal when shopping for Internet security programs is to get the most value for your dollar.

5)  Does the software company stand by their product?  Let’s be clear: no matter how comprehensive your virus removal software is, no matter how careful you are with your permissions, there is still a chance that you will eventually have to deal with a breach of your Internet security.  Another important question when shopping for virus removal software is: what happens then?  Does the Internet security company have support personnel standing by, or is it up to the user to fix the problem?

These are just some of the important questions you should ask yourself when shopping for Internet security software.  Answering these questions before you buy will ensure that you get the best possible protection for your computer.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Watch out for the Phishing Bait

Sometimes, ensuring strong Internet security depends on more than just a secure home or office network service or even a strong anti-virus program. Sometimes, strong Internet security depends on human vigilance, not just firewalls and virus software. This is because phishing, which is one of the most common threats to casual users’ Internet security, can occur even in the most secure network service. Though some Internet security programs or email features can prevent phishing, for example, it still poses a stealthy threat, since it relies on human naiveté.

Phishing is the attempt to breach Internet security and steal your passwords, usernames, and other information by tricking you into giving them up in some form or another. According to Wikipedia, the term “phishing” relates to the idea of falling for bait, the way fish do. So hackers and cybercriminals trying to compromise your privacy via your network service are metaphorically fishing along the river of network services for your information.

Phony or fraudulent emails that try to lure users into giving out their passwords are a common phishing technique. Phishing emails can look like they’re from a bank, a business, or even a government agency. Some emails present users with a phony story and ask them to respond with information that can be used to target their private online accounts.

Phishing emails are getting increasingly sophisticated, which makes them an even bigger threat to Internet security. Because some emails still reach our inboxes, it is important to look for the warning signs. These include poorly written emails with obvious typos or nonsensical information. Also, vague emails that don’t include any specific information about their recipient are usually scams. For example, an email from a financial institution that start with “Dear Customer” instead or your name is clearly trying to breach your Internet security.

Cybercriminals also try to trick users to log into a webpage that looks like an authentic page that actually records the submitted data and exploits it. Even when using a trusted network service, you could be susceptible to this form of phishing. If your Facebook or email login page looks subtly different, be cautious before you enter your username and password as it might be an Internet security scam.

Stay on the lookout for small details that predict phishing scams and threats to your network service like typos, vagueness, unprofessional appearance and tone, sloppy design, and nonsensical requests. But remember that threats to your Internet security aren’t always obvious—many are sophisticated. Change your password often as a regular means of protecting your network service and Internet security. Most importantly, remember that phishing doesn’t force you to give out your information; it tricks you, so don’t fall for the bait.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Laptop and Smartphone Thieves, Beware!

PREY is a free open-source program that’s a great way to track lost or stolen laptops and smartphones. PREY is quite brilliant. PREY anti-theft software lets owners play private investigator for free. The software helps users keep track of their phones or laptops and can help users find their devices if they are ever stolen.

The software, described as silent but deadly by its creators, works by remaining dormant on its host device until it is activated by a signal. Disgruntled victims of thefts can activate PREY on a lost laptop by logging into the connected PREY account online. Those who want to track their lost smartphones can do so by sending a text message to the phone to activate its resident PREY. The standard activation message is “GO PREY,” though this can be customized.

According to PREY’s website, once the software is activated, it allows users to gather information about their lost or stolen devices’ location, hardware and network status. Users can also trigger specific actions on the device. Outlook or Thunderbird data on a missing laptop can be remotely hidden. Users who use PREY to track a stolen laptop, for example, can remotely activate the missing device’s webcam and use it to take pictures of the culprit. A user can also see how his or her stolen device is being used, and look at the screen. Ideally, a PREY user would get a glance of the thief logging into a facebook page or email account to get his or her information.

PREY is designed to automatically connect to the Internet to allow its host device to be tracked. When no Internet network service is available, the software tries to connect to the nearest Wi-Fi hotspot. PREY takes advantage of its smartphone’s GPS to send information about the device’s location. In laptops, the software uses the nearest Wi-Fi hotspot to triangulate and narrow in on its location according to preyproject.com.

As a free, open-source software, PREY is quite remarkable. For one thing, it works everywhere! There are no geographical limitations on where it can work. Right now though, PREY is only compatible with Android phones and does not work with iPads or iPhones. However, its developers say they’re working on these compatibility issues.

PREY is not a foolproof method of catching thieves and restoring stolen devices, though. The developers recommend contacting the police as the final step in the recovery process.

Finally, users who are concerned about privacy can rest assured because PREY is not a malware, and it does not behave like one. PREY’s website explains that unless the software is activated, it remains dormant with no activity. The developer states that PREY does not collect any private information about its users, nor does it store the information that passes through its servers, so the software doesn’t pose a threat to its users’ Internet security. Now, if only the facebook people would learn to be this nice.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Balanced Social Networking?

What’s with all the ranting and raving in the social networking scene?  Facebook, Delicious, Pinboard, Diigo, Digg?   Why can my friends not contact me directly?  Who is deciding what is “appropriate” content?  Well, of course you have to be a digital social networker to care, and you have to be pretty involved in the social networking scene to really care.  Still, the cries are in the air from users all over the social networking world.  FOUL!  You are messing with OUR sites.  But what seems to be at stake here is not the social networking sites themselves, rather the Internet security issues surrounding them.

It does seem as if the administrators of the social networking sites have become more and more controlling, and this annoys their users who essentially have no say in the changes other than to complain after the fact.  Turns out though, that many of the changes say, Facebook, has made over time and most recently, have to do with Internet security and protecting their users from exploitation and inundation by spammers.  Social networking is a wonderful thing, and we want to feel free to express ourselves and communicate openly, but unless some basic Internet security is in place, social networking will become a huge mess of exploiters and spammers.

Internet security is always an important issue, and it is, frankly, a real problem when it comes to social networking.  Meantime, here we have these FREE, wonderful sources of keeping in touch with friends and families.  It seems as if the hassle of a few well-intentioned changes is tolerable given the alternative: little or no social networking and less Internet security.

As for the competition AMONG the social networking sites?  That seems like healthy competition.  And as for the Internet security concerns coming to light through the social networking sites, again, that’s healthy stuff.  We need to know what to protect ourselves from.

Rock on, social networking!

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Smartphone Users: Beware the Fraud

Fraud is not new to humanity.  Impostors and counterfeiters are as old as the idea of property.  The only new developments occur in the scams we see and the venues where they are attempted.  The birth of the World Wide Web created a digital world loaded with sensitive information where clever con artists could ply their trade.  Today, Internet security is paramount to protecting financial information from theft by nefarious individuals.  Everyone needs to consider seeking computer support to ensure effective Internet security.

Internet security as a way to identify and prevent fraud, started simply.  Over time, increased Internet security and the computer support it requires have become more and more a priority for people doing business on the Internet.  As Internet security becomes more sophisticated, so do the methods used to steal information.  Internet security, cybercrime, and the constant computer support needed to help in this conflict represent a daily battleground.  Personal users, out of concern and genuine fear, need the help of expert computer support, and they need continuous education in effective ways to maintain their own Internet security.  As an example, banks and private companies have begun offering identity protection to consumers worried about the safety of their transactions.

The most current and troubling threat to Internet security is the growing number of mobile web users.  Smartphones and tablets alter the digital landscape once again, and wireless options and expanded coverage are right alongside them.  Knowledgeable computer support is all the more important as threats to the Internet security of mobile users multiply due to the lack of anti-virus software on many devices.

Improving Internet security against mobile fraud continues as a top priority for commercial entities and the computer support personnel they employ.  Simple prevention is still the best solution to reduce the possibility of a cybercrime affecting you, and effective, reliable computer support is the key to peace of mind.  Take the time to install protective software on that smartphone.  Do your shopping while on the go, but wait until you get home to make that purchase.  The Internet security of your home machine is probably far superior to your mobile device.  A little education and proactive computer support can help prevent the huge hassles caused by a breach in your internet security.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


Sources of Malicious Software Show Some Change

The growing importance of the Internet to everyday life creates an ever-larger target for cyber criminals.  Internet security against cyber crime is vital for businesses and individuals alike.  Malicious software corrupts systems, destroys data, and allows the theft of identities or banking information.  Hackers looking to make a quick buck by exploiting weak Internet security are nothing new.  A recently released report about malicious software and where it is housed online brings the issue into sharper focus.

Read more »


© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending