Search the blog:
- Backups (2)
- Cloud Computing (1)
- Exploits (40)
- Microsoft Office (5)
- Microsoft Windows (26)
- New River Computing News (4)
- QuickBooks (2)
- Security Products (14)
- Social Networks (5)
- Technology Trends (17)
- Uncategorized (4)
- Virus Outbreak Alerts (25)
- Vulnerabilities (44)
- Web Security (49)
- Windows Server (1)
Popular Tagsanti-virus Anti-virus scam AVG AVG Free BlackHole Exploit Kit Blizzard Diablo DNSChanger Exploits F-Secure Fake AV Flash Free AV GFI Google Intuit Java Java Exploits Mac Trojan Malware Malwarebytes MBAM Microsoft Microsoft Security Essentials Microsoft Windows Oracle Patch Tuesday phone scam QuickBooks Ransomware Rogue AV scam Spam Symantec Trojan Twitter Vipre virus Windows 7 windows 8 Windows 8 Consumer Preview Windows Updates Windows Vulnerabilities windows xp World of Warcraft
Category Archives: Vulnerabilities
After reading an article on the Huffington Post the other day, I started thinking about the fact that we really ARE now living in a world where BIG DATA = BIG BUSINESS = BIG MONEY. With more and more people paying bills, shopping, banking…
For those of us working in the IT industry, we get used to removing viruses and malware from plenty of machines on a regular basis. Malware is a huge problem that seems to only be getting worse. Part of the problem is a lack of…
It’s a commonly held opinion among IT professionals that the reason Windows is so prone to virus and malware attacks is due to its popularity. Windows powers approximately 87% of the world’s computers. While this is true, Windows’ vulnerabilities can be attributed to more than…
For those of you not familiar with exactly what Ransomware is/does, here’s the current Wikipedia definition: “Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order…
Rogue security software, also known as fake antivirus software or “scareware”, has been one of the most popular methods used by online criminals in recent years to fool computer users into installing malware and/or divulge confidential information. Rogue AV software typically mimics the general look…
***ATTENTION: If you are a current New River Computing client covered under our RMM Service Plan, you need not worry about this vulnerability. We have automatically deployed the fix to your computers.*** Recently, there has been an Internet Explorer (zero-day) remote code execution vulnerability found…
Over 1 million customers are at risk of identity theft after online-criminals broke into servers belonging to Nationwide and Allied insurance companies. Victims include current policyholders and those who sought insurance quotes.
Here’s a great info-graphic from the security researchers at F-Secure that explains how cyber-criminals steal money from bank accounts. The original post can be found here.
ZeroAccess is a very large botnet, infecting millions of computers globally. According to researchers at Sophos Labs, ZeroAccess has been installed on computers over nine million times with the current number of infected PC’s topping out at over 1 million. That is a staggering number….
Yesterday, Microsoft announced that it would be issuing an out-of-band patch on Friday, in response to the latest zero-day Internet Explorer vulnerability discovered this past weekend.