Computer Support Blog

Please enter a valid ZIP code.

Tech Support Blog

Tech Support Blog

“Here You Have” Illustrates Internet Security Failures

A new Internet security attack spread through email Thursday, though it came in somewhat old packaging.

The attack, dubbed “Here you have” after the subject line of the phishing attack emails, was reminiscent of attacks from 2000 and 2001.  Those attacks, the ILoveYou and Anna Kournikova worms, were the last significant mass email attacks, until now.  The Kournikova worm even used the same “Here you have” subject line. Read more »


How to Choose a Quality Computer Repair Service

SYRACUSE, N.Y., August 27, 2010 – Any time you seek out computer repair or computer support services, you are putting a great deal of trust in someone.  To help you choose only a quality and reputable computer repair service, Rescuecom offers these tips.  Read more »


iTunes Users Victimized by Phishing Scams

Users of Apple’s iTunes store have been victimized yet again, but not because of Apple.

A series of ongoing phishing scams have tricked users of Apple’s online service into revealing login information.  In turn, this has allowed hackers to bypass the Internet security of those users with ease.

Once logged into the account, hackers have rung up hundreds or even thousands of dollars in charges.

Most of the attacks have happened with accounts linked to PayPal.  In many cases, hackers have used the stolen funds to purchase iTunes gift codes – online gift cards – which they can then resell on the Internet for a profit.

Unlike many Internet security attacks which originate with a security breach on the part of the vendor, this attack seems to be largely caused by trusting users being victimized by phishing emails.

These sorts of fraudulent emails are sent to users, often requesting that they verify login information.  Because the emails appear to be legitimate, many users click on the links within them or enter their private account information.

Once hackers posses that info, they simply log in.  The account, and everything linked to it, is easy pickings.

To protect yourself and your iTunes and PayPal accounts, follow these simple Internet security tips:

  • Never provide your login information via email
  • iTunes and other legitimate businesses will not request such information through email
  • If you suspect an email is a phishing attack, report it to the merchant, your ISP, and/or your email provider
  • Verify the legitimacy of an email by contacting the supposed sender at the email address or website you know is real

 

For more information on protecting yourself, read Rescuecom’s 5 Tips to Detect Phishing.

About RESCUECOM:

RESCUECOM provides computer repair and computer support, 24/7: Meeting every tech support need including data recovery, virus removal, networking, wireless services, and computer support for all brands of hardware and software. For computer support or information on products, services, or computer repair, visit https://www.rescuecom.com or call 1-800-RESCUE-PC.

For More Information, Contact:

David Milman, CEO

315-882-1100

david@rescuecom.com


The How’s and Why’s of Malware

The number one cause for concern among Internet security and computer repair experts is malware.  A little known threat just a few years ago, these malicious programs can slip past Internet security and bring on extensive computer repair costs.

But what is malware?

Malware involves several different kinds of programs:

  • Trojan Horses
  • Rootkits
  • Viruses / Worms
  • Data Thieves Read more »

RESCUECOM Releases Top 5 Tips for Defending Against Malware

SYRACUSE, N.Y., August 16, 2010 – McAfee, a top Internet security company, recently announced that malware attacks are at an all-time high.  According to McAfee, 10 million new pieces of malware were cataloged during the first half of this year.  With this Internet security threat reaching such significant heights, Rescuecom offers these tips to protect your computer from such an attack.  Read more »


Clickjacking Strikes Again

Facebook users may have been victimized by yet another scam.

Internet security firm Sophos has release information on another ‘clickjacking’ scam that hackers recently used to defraud Facebook users out of $5 a week.

While that may not sound like a very big scam, multiply $5 by even a fraction of Facebook’s 500 million users, and the totals add up quickly. Read more »


Viral Content: A Hidden Threat

Those funny videos on Facebook can actually be a major cause of computer repair problems.  Accessing viral content increases your chances of needing computer repair or computer support.

Just how extensive has the “viral video” craze gotten?

This week, a website called The Chive posted a series of pictures of a young woman quitting her job via dry erase board messages emailed to her co-workers. Read more »


Rescuecom Releases Top 5 Tips for Mobile Device Security

Rescuecom Releases 5 Tips for Mobile Device Security

SYRACUSE, N.Y., August 9, 2010 – Mobile devices are extremely popular, but also extremely vulnerable.   Internet security is no longer just a concern at home or the office, and phone data recovery is more than a solution for users.  To help you understand the issues of Internet security and phone data recovery for your mobile devices, RESCUECOM offers these 5 tips.     Read more »


Tips on Making a Budget Wise Technology Purchase

With many of us tightening our belts because of the recession, every purchase needs to be made with our budgets in mind. However, making a budget purchase when it comes to technology can sometimes turn into a budget buster once the high costs of computer repair and computer support are factored in.

Purchasing a budget minded product can be a short term cost savings.  Unfortunately, those cost savings are often offset by additional costs for computer repair and computer support that these devices incur. Read more »


Computer Support Tips: Making the Most of Patches

A key component in keeping your Internet security up to date is the free form of computer support provided by many major software companies – patches.

For example, Microsoft releases Internet security patches, along with non security computer support updates, on the second Tuesday of every month or “Patch Tuesday.”

Tomorrow’s Patch Tuesday will feature 14 bulletins with patches for thirty-four Internet security vulnerabilities in Microsoft’s products including Windows, Office, and Internet Explorer. Read more »


181-190 of 1857
© 1997-2024 RESCUECOM Corporation
Patented - Patent Numbers: 6,898,435, 8,832,424 and 9,477,488
Additional Patents Pending