Archive for August, 2012

Java 7 Exploit

Java 7 Exploit

Java is used almost everywhere – in cars, on smart phones and it’s used in your browser (Internet Explorer, etc.).  Millions of websites make use of Java programming.  If you’re one of our Remote Technical Support customers, we make...

By on Aug 30, 2012

Category: Security

Man-In-The-Middle

Man-In-The-Middle

Just this week, Microsoft acknowledged that known cryptographic weaknesses in the MS-CHAP v2 protocol could allow a man-in-the-middle attack on a wireless connection or even a VPN (Virtual Private Network). We’re not going to address the issue itself here...

By on Aug 22, 2012

Category: Security

September Webinars Announced

September Webinars Announced

Today, we’re announcing our free webinars for September.  We hope you’ll join us and tell your friends and neighbors about them, too.  Here’s the schedule: Friday, September 14, 2012 10:00 a.m. Hotmail Is Gone: Welcome To Outlook.com In this...

By on Aug 21, 2012

Category: Training

“Windows” Is Not Calling, Either

“Windows” Is Not Calling, Either

This past May, we blogged about a scam where someone calls and claims to be from Microsoft.  We’re talking about it again because we continue to receive calls about this issue. Just this week alone (it’s only Tuesday), we’ve...

By on Aug 21, 2012

Category: Security

The FBI Doesn’t Want Your Money!

The FBI Doesn’t Want Your Money!

We’ve already had a customer who had this happen to her computer:  She was just surfing the Internet when, suddenly, her computer locked up and she received a notice purportedly from the FBI.  The notice told her that child...

By on Aug 21, 2012

Category: Security

Recent Comments

Links

Archive