This website uses cookies in order to offer you the most relevant information. Please accept cookies for the most optimal performance. 

80

Blog

Computerware Blog

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpg
Today’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

0 Comments
Continue reading

Tip of the Week: Here’s Our Checklist to Know if You’ve Been Hacked

b2ap3_thumbnail_identifying_hackers_400.jpg
Businesses that have online dealings should always be aware of how much danger their operations are in, especially with the omnipresent threat of hackers. Depending on the severity of the hacking attack, some organizations might not even know they’ve been hacked until it’s far too late. It’s critical that your business is able to identify potential threats before they’ve caused irreparable damage to your infrastructure.

0 Comments
Continue reading

How Data You’ve Forgotten About Can Come Back to Bite You

b2ap3_thumbnail_dark_web_is_back_400.jpg
Businesses utilize a ton of data in order to keep operations running smoothly, but what happens to data that’s unused? Are they files that are potentially sensitive in nature? If your dark data isn’t being stored securely, it could be at risk of data compromisation, or worse. Therefore, it becomes critical to address your business’s dark data issue before it becomes an even bigger problem.

0 Comments
Continue reading

Study: 2015 Saw a 27.3% Increase In New Malware

b2ap3_thumbnail_malware_everywhere_400.jpg
Cyber security continues to be a major pain point for small and medium-sized businesses, even if they’re taking the fight to the latest threats with solutions like antivirus and firewalls. Significant progress has been made, yet new threats are born every day. In fact, you might be surprised to find out that a monstrous 27.3 percent of all malware in the world was created just last year. 

0 Comments
Continue reading

Tip of the Week: Know What Email Spoofing is So You Don’t Get Taken

b2ap3_thumbnail_email_spoofing_400.jpg
Have you ever been the target of an email spoofer? This can be a difficult question to answer, especially if you don’t know what you’re looking for. Email spoofing can appear to be from legitimate sources, but the most important indicator is if the message looks like spam or fishy in general. If you ever receive a message like this, you might wonder why your spam filter didn’t catch such an obvious trap.

0 Comments
Continue reading

Hackers Take the Law Into Their Own Hands, Is This a Good Thing?

b2ap3_thumbnail_vigilante_hackers_400.jpg
In 2015, we saw countless hacking attacks against major corporations, from health insurance providers like Blue Cross Blue Shield and Anthem, to government offices, like the United States Office of Personnel. Due to the stigma associated with hacking, we often forget that there are a lot of hackers out there who try to use their skills for good--or, at least, less awful purposes.

0 Comments
Continue reading

Alert: Don’t Call Fake Technical Support Hotlines Provided By Malware

b2ap3_thumbnail_tech_support_bomb_400.jpg
Computer users, beware; there’s an intrusive malware spreading across the Internet that’s capable of locking users out of their web browsers and redirecting them to fake IT support phone numbers. The hacker’s goal is likely to steal sensitive information from users, so it’s especially important that you don’t call this fake phone number.

0 Comments
Continue reading

Tip of the Week: 5 Giveaways that You’re Being Baited With a Phishing Scam

b2ap3_thumbnail_phishing_scams_400.jpg
Phishing attacks grow more common every day, particularly because it’s so challenging to know who’s for real and who’s a fake on the Internet. The anonymity of the Internet has fostered an environment where hackers can extort money with little fear of getting caught, under the right circumstances. How can you protect yourself and your business from being targeted by phishing attacks?

0 Comments
Continue reading

3 Reasons Why Your Small Business May Be In a Hacker’s Crosshairs

b2ap3_thumbnail_comprehensive_cynersecurity_400.jpg
Here’s a surprising fact for October’s Cyber Security Month: small businesses are at a greater risk of a hacking attack. Many small organizations feel that they’re not a target for hackers due to their size, but this is what hackers want you to think so you’ll focus less on securing your network.

0 Comments
Continue reading

Forget Malware: Hackers Are Crafty Enough to Trick You Without It

b2ap3_thumbnail_do_not_get_hacked_400.jpg
Behind the safety of a firewall and antivirus solution, it’s easy to forget that the Internet, and the online community in general, can be a dangerous place. It’s not until you fall prey to a hacking attack, virus infection, or similar threat that you become aware of the dangers that lie in the virtual darkness. However, these threats are only part of a more dangerous problem; social engineering hacks.

0 Comments
Continue reading

Your Identity Can Sell On the Black Market For Somewhere Between $1-$500

b2ap3_thumbnail_black_market_dark_web_400.jpg
October is Cybersecurity Awareness Month! With the number of data breaches growing every day, one has to wonder what hackers do with all of the information they steal. In some cases, the hackers go public with the information, as seen by the recent Ashley Madison and Sony hacks. Other times, however, hackers just want to use the information as a bargaining chip on the black market. The theft of passwords, usernames, Social Security numbers, and other sensitive information is a very lucrative market for hackers.

0 Comments
Continue reading

Warning: CryptoWall Targets Businesses and It’s Just as Nasty as Its Cousin, CryptoLocker

b2ap3_thumbnail_cryptowall_400.jpg
In the wake of a ransomware takeover, it seems like the world can’t go a few months without some sort of data loss disaster occurring. The antics of hackers grow more dangerous and difficult to dodge, and IT departments have their hands full dealing with the fallout. What’s keeping you from contracting this ransomware, and how can you keep your business from suffering its consequences?

0 Comments
Continue reading

You Don’t Want to Get Caught in the Middle of a Hacking War [VIDEO]

b2ap3_thumbnail_hacker_wars_400.jpg
When you see the results of a major hacking campaign on the news, you might tend to sympathize with the victim. While most hacks target individuals or high-profile businesses, hackers have, for the first time, intentionally targeted each other. The attack in question occurred between Naikon, a cyberespionage group, and another group called Hellsing.

0 Comments
Continue reading

Hackers Turn to Radio Signals to Get the Data They Want

b2ap3_thumbnail_radio_signal_400.jpg
You should never assume that your data is safe from a hacking attack. Just like how the technology industry is working toward new ways to protect the public from hacks, those who lurk in the gutters of the Internet are trying to undermine these developments by any means possible. Some security professionals believe that even radio signals can undermine network security.

0 Comments
Continue reading

How to Delete the Smelly Superfish App From Your Computer

b2ap3_thumbnail_superfish_one_400.jpg
Normally, you can trust the software that comes preinstalled on a new computer. Unfortunately, this isn’t the case with the shopping-search app Superfish, which came installed on every Lenovo device sold between September and December 2014. If you’ve got the Superfish app on your computer, then you need to remove it before it does some superbad damages. Here’s how you do it.

0 Comments
Continue reading

911: “What is Your Emergency?” You: “I’ve Been Hacked!”

b2ap3_thumbnail_rescue_911_from_hackers_400.jpg
Believe it or not, there are horror stories told of innocent people being abandoned by 911 dispatchers when they need help the most. This mainly isn’t due to incompetence on the dispatchers’ part, but because there are malicious forces that aren’t taken into consideration. Often, victims of 911 mishaps are misled by the odd hacker.

0 Comments
Continue reading

4 Signs You Might Be Dealing with a Hack

b2ap3_thumbnail_you_have_been_hacked_400.jpg
A digital virus infection can hit when you least expect it, and sometimes it’s too late to prevent it from getting into your system. Just like dealing with a biological virus, it’s important to minimize the damage that’s done before it has a chance to spread to other parts of your network. Thankfully, there are symptoms you can look for when you need to know whether or not your PC is infected. Here are four signs your computer is most-likely hacked.

0 Comments
Continue reading

What Flu Season Can Teach Us about Cyberdefense

b2ap3_thumbnail_protect_yourself_against_viruses_400.jpg
It’s flu season, and just like office workers around the country are taking preventive health measures like stocking up on tissues and vitamin C, so too are IT technicians doing everything they can to stop the spread of computer viruses on their company’s network. Although, unlike the flu, computer viruses are more than a seasonal threat.

0 Comments
Continue reading

4 Ways to Tell if You’re Dealing with a Software Bug Infestation

b2ap3_thumbnail_bugs_in_business_software_400.jpg
Since the inception of software, there have always been software bugs. These nuisances can cause major problems for businesses, especially in numbers. You might think that years upon years of technological developments have eradicated the threats from the world, but that's not necessarily the case.

0 Comments
Continue reading

Warning: Updated Cryptowall Ransomware Strikes Again

b2ap3_thumbnail_ransomware_attack_400.jpg
As a business owner, you want to take every precaution against the latest threats that can affect your way of life. An updated threat called Cryptowall 2.0 (previously known as Cryptolocker) has been cut loose by malware developers, and it's capable of dealing irreparable damage to your business's network and data. This spear-phishing variant has the power to grind your network's files to dust, and in turn, your productivity.

0 Comments
Continue reading

News & Updates

Computerware is proud to announce the launch of our new website at ww.cwit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Computerware can do for your business.

Computerware, Inc.
8480 Tyco Road Suite I
Vienna, Virginia 22182

Copyright 2025 Computerware. All Rights Reserved.

FPS
106 FPS (106-106)