IT Consulting and Tech Support Blog

Author Archives: Matthew

Cyber Crime vs. Cyber Defense

After reading an article on the Huffington Post the other day, I started thinking about the fact that we really ARE now living in a world where BIG DATA = BIG BUSINESS = BIG MONEY. With more and more people paying bills, shopping, banking and…

Posted in Exploits, Security Products, Technology Trends, Vulnerabilities, Web Security | Tagged , , , , , , , | Leave a comment

Will Microsoft Bring Back The Start Button?

When Microsoft first revealed Windows 8, complaints started rolling in almost immediately. The lack of the traditional Start Menu and the fact that Windows would no longer be booting directly to the Windows desktop were just a couple examples of the many complaints that continue…

Posted in Microsoft Windows, Technology Trends | Tagged , , , , | Leave a comment

‘Microsoft tech support’ scam captured on video

For those of us working in the IT industry, we get used to removing viruses and malware from plenty of machines on a regular basis. Malware is a huge problem that seems to only be getting worse. Part of the problem is a lack of…

Posted in Exploits, Microsoft Windows, Security Products, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , , | Leave a comment

How is AOL Still Earning Most of its Money from “AOL Connect” Subscribers?

I remember when I received my first “internet capable” computer; it was a long time ago on my birthday in July. If you know anything about July in the southeast, you know it’s typically hot, humid and sticky. This weather is far too miserable to…

Posted in Technology Trends | Tagged , , , , , , , | Leave a comment

New River Computing featured in The Burgs

New River Computing was recently featured in The Burgs section of The Roanoke Times. NRC’s Jeff Wynn and Hansen Ball were interviewed by Roanoke Times reporter Travis Williams to get some background about New River Computing’s past, present, and future. The Q&A covers the beginnings…

Posted in New River Computing News | Tagged , , , , , , | Leave a comment

Microsoft Report: Most Common Malware on Operating Systems

It’s a commonly held opinion among IT professionals that the reason Windows is so prone to virus and malware attacks is due to its popularity. Windows powers approximately 87% of the world’s computers. While this is true, Windows’ vulnerabilities can be attributed to more than…

Posted in Microsoft Windows, Technology Trends, Vulnerabilities | Tagged , , , | Leave a comment

Ransomware Attacks Appear To Be Getting Worse!

For those of you not familiar with exactly what Ransomware is/does, here’s the current Wikipedia definition: “Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order…

Posted in Backups, Exploits, Security Products, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , | Leave a comment

Can You Tell The Difference Between Real vs. Rogue Security Software?

Rogue security software, also known as fake antivirus software or “scareware”, has been one of the most popular methods used by online criminals in recent years to fool computer users into installing malware and/or divulge confidential information.  Rogue AV software typically mimics the general look…

Posted in Exploits, Microsoft Windows, Security Products, Vulnerabilities, Web Security | Tagged , , , | Leave a comment

Internet Explorer 8 Zero-Day Vulnerability

***ATTENTION: If you are a current New River Computing client covered under our RMM Service Plan, you need not worry about this vulnerability. We have automatically deployed the fix to your computers.*** Recently, there has been an Internet Explorer (zero-day) remote code execution vulnerability found…

Posted in Exploits, Microsoft Windows, Vulnerabilities, Web Security | Tagged , , , , | Leave a comment

Nationwide Insurance Breach Puts Over 1 Million Customers Risk

Over 1 million customers are at risk of identity theft after online-criminals broke into servers belonging to Nationwide and Allied insurance companies. Victims include current policyholders and those who sought insurance quotes.

Posted in Vulnerabilities, Web Security | Tagged , , , , , | Leave a comment