Give us a call - (540) 808-2900

IT Consulting and Tech Support Blog

Category Archives: Exploits

Information regarding exploits.

HIPAA security – keeping data secure

If you are a “covered entity” under the HIPAA Security rule, then you already know that your company (and thus your employees) collect a lot of protected health information (aka PHI). PHI is basically information about another person that is not for public knowledge but…

Also posted in Mobile Security, Technology Trends, Uncategorized, Vulnerabilities, Web Security | Leave a comment

5 Ways to Avoid a Phishing Attack

Here at New River Computing, we like to share interesting infographics as we come across them. Our main goal is to try and disseminate intricate IT related information quickly and clearly, to as many users as possible. This particular one deals with Phishing Attacks. We…

Also posted in Vulnerabilities, Web Security | Tagged , , , , , , , | Leave a comment

Craigslist Resume Scam Spreads Trojan Virus

Reports of “Craigslist résumé” viruses have skyrocketed in recent months. Some of our clients here at New River Computing have unfortunately fallen victim to this recent outbreak. Thankfully, we’ve been successful at cleaning up the aftermath, but often the remediation process is long and arduous…

Also posted in Microsoft Office, Microsoft Windows, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , | Leave a comment

Battling Fake Microsoft Support Scammers

Fake antivirus support is a problem. We know fake “Microsoft representatives” call targeted Windows users to persuade them that their computers are inundated with warnings and errors as shown in the Windows Event Viewer, a legitimate Microsoft application that lists system information. We even watched…

Also posted in Microsoft Windows, Security Products, Technology Trends, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , | Leave a comment

The Dangers of Peer-to-Peer File Sharing

Peer-to-Peer or P2P is a method of sharing of files between two or more computers on the Internet. Users share files via P2P by using peer-to-peer applications such as Gnutella, KaZaA, iMesh, LimeWire, Morpheus, SwapNut, WinMX, AudioGalaxy, Blubster, eDonkey, BearShare etc., and list goes on…

Also posted in Technology Trends, Vulnerabilities, Web Security | Tagged , , , , , , , , , , | Leave a comment

Computers Cannot Survive By Anti-Virus Software Alone

Over the past few weeks, several widely knows companies have been competing for top spots in many of the major news headlines but, for all the wrong reasons. Retail giant Target, to offer just one recent example, could be forced to pay millions of dollars…

Also posted in New River Computing News, Security Products, Technology Trends, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , , , , , | Leave a comment

The CryptoLocker Virus is Spreading!!!

***IMPORTANT ANNOUNCEMENT FROM NEW RIVER COMPUTING REGARDING THE “CRYPTOLOCKER” VIRUS*** There’s a new type of malware that has been spreading like wildfire over the past couple of months called CryptoLocker. Most security researchers are claiming that this is one of the nastiest and most successful…

Also posted in Microsoft Windows, New River Computing News, Security Products, Technology Trends, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , , | Leave a comment

Cyber Crime vs. Cyber Defense

After reading an article on the Huffington Post the other day, I started thinking about the fact that we really ARE now living in a world where BIG DATA = BIG BUSINESS = BIG MONEY. With more and more people paying bills, shopping, banking and…

Also posted in Security Products, Technology Trends, Vulnerabilities, Web Security | Tagged , , , , , , , | Leave a comment

‘Microsoft tech support’ scam captured on video

For those of us working in the IT industry, we get used to removing viruses and malware from plenty of machines on a regular basis. Malware is a huge problem that seems to only be getting worse. Part of the problem is a lack of…

Also posted in Microsoft Windows, Security Products, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , , | Leave a comment

Ransomware Attacks Appear To Be Getting Worse!

For those of you not familiar with exactly what Ransomware is/does, here’s the current Wikipedia definition: “Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order…

Also posted in Backups, Security Products, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , | Leave a comment