Cybersecurity blog posts

Battling fake Microsoft Support scammers

Published November 10, 2014

Microsoft scam graphic
Screenshot of Netstat
Screenshot of CPU monitor
Screenshot of Event Viewer
Screenshot of fake warning

Fake antivirus support is a problem. We know fake “Microsoft representatives” call targeted Windows users to persuade them that their computers are inundated with warnings and errors as shown in the Windows Event Viewer, a legitimate Microsoft application that lists system information. We even watched Jerome Segura, a senior security researcher at Malwarebytes—catch some of these… Read more


The dangers of peer-to-peer-file sharing

Published April 25, 2014

Graphic illustrating peer to peer connections

Peer-to-Peer or P2P is a method of sharing of files between two or more computers on the Internet. Users share files via P2P by using peer-to-peer applications such as Gnutella, KaZaA, iMesh, LimeWire, Morpheus, SwapNut, WinMX, AudioGalaxy, Blubster, eDonkey, BearShare etc., and list goes on and on. How P2P Works The P2P application takes a piece of allotted data or sometimes whole directories… Read more


Computers cannot survive by anti-virus software alone

Published February 06, 2014

Over the past few weeks, several widely knows companies have been competing for top spots in many of the major news headlines but, for all the wrong reasons. Retail giant Target, to offer just one recent example, could be forced to pay millions of dollars to cover the direct damages incurred from the recent malware-related data breach that enabled cyber-criminals to steal credit card data from all… Read more


The CryptoLocker virus is spreading!!!

Published November 11, 2013

Screenshot of CryptoLocker demand screen
Screen shot of CryptoPrevent

There’s a new type of malware that has been spreading like wildfire over the past couple of months called CryptoLocker. Most security researchers are claiming that this is one of the nastiest and most successful computer viruses ever: CryptoLocker is currently infecting Windows operating systems all across the United States and in other parts of the world. The virus is part of a generically… Read more


Cyber Crime vs. Cyber Defense

Published June 03, 2013

After reading an article on the Huffington Post the other day, I started thinking about the fact that we really ARE now living in a world where BIG DATA = BIG BUSINESS = BIG MONEY. With more and more people paying bills, shopping, banking and socializing on the internet, there are going to be obvious financial losses to individuals and organizations. The article prompted some further sleuthing,… Read more


Get a quote!

Your request has been successfully submitted.

Thank you for contacting New River Computing. We will respond to you as soon as possible.