Laptops and the Risk of "Evil Maid" Attacks | Victorville Computer Repair

Laptops and the Risk of “Evil Maid” Attacks

In computer security circles, there is a growing consensus about the growing complexity of modern exploits and vectors of attack. There was a time when IT security experts could easily determine or detect if someone had tampered with a laptop; however, the sophisticated threats in use these days make this determination more difficult, particularly in…

How to Tell When You've Been Hacked | High Desert Computer Repairs

How to Tell When You’ve Been Hacked

Ransomware attacks, one of the latest trends in cybercrime, are not subtle at all. Hackers who intrude upon networks for the purpose of infecting them with ransomware make it a point of letting their victims know that their data has been compromised and that it could be destroyed unless a ransom payment is made. [su_note…

Ransomware is the New 21st Century Extortion Industry | Victorville Computers

Ransomware is the New 21st Century Extortion Industry

Ransomware infections were the most painful headaches that information security experts had to deal with in 2017, and the same can be said about this particular cyber threat in 2018. Ransomware has proven to be one of the most profitable revenue channels for malicious hackers and cybercrime groups, and there are various reasons why computer…

Computer Virus Report for July 2017 | Apple Valley PC Repair

Computer Virus Report for July 2017

The year 2017 has been very active in terms of malware. Aside from the spectacular data breaches and cyber attacks such as the WannaCry ransomware scare in May, multiple virus propagations have been reported by security researchers over the last few weeks. Here are some of the most active pieces of malware reported as being…

Smart Homes in 2017: Why Security Matters | Apple Valley Home Networking

Smart Homes in 2017: Why Security Matters

At the recent Consumer Electronics Show in Las Vegas, tech journalists were excited by the prospect of smart home automation, which is set to have its breakthrough year in 2017. If you have thought about welcoming smart appliances and other devices into your Apple Valley home, 2017 would be a good starting point; nonetheless, you…

New Year, New Cyber Threats: How to Stay Safe in 2017 | Victorville PC Repairs

New Year, New Cyber Threats: How to Stay Safe in 2017

Of all the New Year’s resolutions you can think about for 2017, one of the most important should be to make your personal and business computing devices safer throughout the year. Here are some useful recommendations from the computer security specialists at A Plus Computers in Apple Valley: Tech Support Phone Calls from Microsoft Since…

The New Generation of Computer Trojan Attacks | Victorville Computer Safety

The New Generation of Computer Trojan Attacks

Information security (infosec) analysts are seeing a major shift from modern ransomware strikes to old-fashioned Trojan attacks. According to the most recent edition of Microsoft’s Security Intelligence Report (SIR), hackers are using Trojan-style attacks more than ever, and this uptick in activity is largely due to an increase in potential vectors. [su_note note_color=”#F4f4f4″]The infosec community…

How Computer Users in California Are Falling Prey to Repair Scams | Apple Valley

How Computer Users in California Are Falling Prey to Repair Scams

A malware attack that masquerades as an antivirus notification or as a system maintenance utility is defrauding computer users in the central region California. [su_note note_color=”#F4f4f4″]According to local news reports published in mid-April, this particular cyber attack has been serious enough to get the attention of the Santa Cruz County District Attorney.[/su_note] Understanding Scams &…

Hard Drive Encryption and Permanent File Deletion | Victorville Data Backup

Hard Drive Encryption and Permanent File Deletion

Electronic file encryption is a topic that has been making news headlines lately. Apple Valley and Victorville residents who have been following the outcome of the horrific terrorist attack in nearby San Bernardino are by now familiar with the efforts by law enforcement to access the files inside the computers and mobile devices left behind…