Give us a call - (540) 808-2900

IT Consulting and Tech Support Blog

Category Archives: Security Products

Information related to computer security products.

Computers Cannot Survive By Anti-Virus Software Alone

Over the past few weeks, several widely knows companies have been competing for top spots in many of the major news headlines but, for all the wrong reasons. Retail giant Target, to offer just one recent example, could be forced to pay millions of dollars…

Also posted in Exploits, New River Computing News, Technology Trends, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , , , , , | Leave a comment

The CryptoLocker Virus is Spreading!!!

***IMPORTANT ANNOUNCEMENT FROM NEW RIVER COMPUTING REGARDING THE “CRYPTOLOCKER” VIRUS*** There’s a new type of malware that has been spreading like wildfire over the past couple of months called CryptoLocker. Most security researchers are claiming that this is one of the nastiest and most successful…

Also posted in Exploits, Microsoft Windows, New River Computing News, Technology Trends, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , , | Leave a comment

Cyber Crime vs. Cyber Defense

After reading an article on the Huffington Post the other day, I started thinking about the fact that we really ARE now living in a world where BIG DATA = BIG BUSINESS = BIG MONEY. With more and more people paying bills, shopping, banking and…

Also posted in Exploits, Technology Trends, Vulnerabilities, Web Security | Tagged , , , , , , , | Leave a comment

‘Microsoft tech support’ scam captured on video

For those of us working in the IT industry, we get used to removing viruses and malware from plenty of machines on a regular basis. Malware is a huge problem that seems to only be getting worse. Part of the problem is a lack of…

Also posted in Exploits, Microsoft Windows, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , , , | Leave a comment

Ransomware Attacks Appear To Be Getting Worse!

For those of you not familiar with exactly what Ransomware is/does, here’s the current Wikipedia definition: “Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order…

Also posted in Backups, Exploits, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , , , , | Leave a comment

Can You Tell The Difference Between Real vs. Rogue Security Software?

Rogue security software, also known as fake antivirus software or “scareware”, has been one of the most popular methods used by online criminals in recent years to fool computer users into installing malware and/or divulge confidential information.  Rogue AV software typically mimics the general look…

Also posted in Exploits, Microsoft Windows, Vulnerabilities, Web Security | Tagged , , , | Leave a comment

Microsoft Security Essentials Fails To Meet AV-TEST Standards

  Researchers at the independent anti-virus testing firm AV-TEST released their latest batch of tests in which they report Microsoft Security Essentials was only able to detect 64% of zero-day threats when running in Windows 7.

Also posted in Microsoft Windows, Web Security | Tagged , , , , , , , , , | Leave a comment

Fighting cybercrime

I recently stumbled across a fantastic article written by Marcin Kleczynsk that I’d like to share with our readers. Mr. Kleczynsk is the CEO of Malwarebytes, a provider of highly effective, award winning anti-malware solutions. Here’s the original article:   Fighting cybercrime: How to avoid malware and other computer viruses…

Also posted in Exploits, Vulnerabilities, Web Security | Tagged , , , , , | Leave a comment

DNS Check Tools

Time is running out! It’s VERY important to make sure your computers aren’t infected with the DNSChanger malware before the government shuts down the temporary servers. It’s easy to check and it only takes a few seconds. There are plenty of utilities available, and while The…

Also posted in Exploits, Virus Outbreak Alerts, Vulnerabilities, Web Security | Tagged , , | Leave a comment