Computek

Blog

Many Android VPN Apps Contain Malware Or Exploitable Weaknesses

If you’re like many seasoned ‘Netizins, you probably rely on some type of VPN to help ensure your digital privacy. Unfortunately, based on research conducted by Simon Migliano, you could very […]

CyberCriminals Are Attacking Real Estate & Construction Industries

Are you in the real estate or construction industry?  Cybercriminals are increasingly attacking the real estate and construction industries – and according to a new FBI report, the real estate sector […]

Flaws In Several Adobe Products Could Let Attackers In 

Two new critical flaws have been discovered in Adobe Acrobat and Reader that require your urgent attention. In fact, the flaws were rated as so severe that the company broke […]

New Amazon Order Confirmation Emails Could Be Phishing Attempts

According to Alexa, Amazon is the 4th most visited website in the United States and ranks 8th worldwide.  To say that it gets a lot of traffic every day would […]

New Internet Explorer Exploit Currently Being Used By Attackers

Are you still using Internet Explorer?  Now you have a new reason to consider switching to a more up to date browser. As most people know, Microsoft essentially gave up […]

Time To Plan – Windows 7 won’t be supported 1 year from today!

On January 14, 2020 Windows 7,  along with Server 2008,  will officially be EOL (end of life) and will no longer receive security updates and patches.  Seems like only yesterday […]

Browser Security Symbols Don’t Mean Websites Are Legitimate

Most people use Google Chrome.  In fact, according to the latest statistics, Chrome has more than half the browser market share, with the rest dividing the smaller portion of the […]

Google Continues To Battle With Malware In Play Store

In recent months, Google has taken steps to tighten up its processes so that fewer poisoned apps find their way into the Google Play Store.  In addition to that, the […]

You Should Be Worried About Cryptocurrency Mining Malware

In the world of data security, cryptocurrency mining software is often overlooked or discounted as a threat because it doesn’t do serious harm to the infected system. It bleeds off […]

Officials Want To Know If Wireless Carriers Are Throttling Video

Remember earlier this year when net neutrality got killed off and everybody said it wouldn’t matter? Well, it seems it might have mattered after all. Recently, three US Senators sent […]