Watch out for fake Microsoft Windows 10 update email – Malware Warning!

With all the excitement about Microsoft Windows 10 being a FREE update, some people signed up for the “Get Windows 10” promotion as prompted in their taskbar, to be put on a waiting list. So it’s not surprising that when an email comes in that looks legit, that someone might follow the link and attempt to install it.   Unfortunately for …

Adobe out of band patch fixes flash vulnerability (Windows / Mac / Linux)

Adobe has released an out of band patch that corrects a flaw in Flash player which could permit an attacker to take control of an exploited system. This is actively being exploited by hackers and we recommend that the patch be applied immediately. More information about this security issue can be found on Adobe’s security website. If you require any …

Greenville Computer Virus Cleanup and Removal Experts

If you see mention of “Greenville Virus Experts”, that’s us! We have created a new website especially designed to attract the eye of someone who might be experiencing a computer security issue such as a virus, worm, trojan or other malware.  Searching for “Greenville virus cleanup” might result in a person finding the Homeland Secure IT site, but our home …

A Plethora of Patches for Microsoft’s Patch Tuesday – March 2015

On Monday 2015-03-09, Apple released a slew of updates to address security issues, and on the regularly scheduled “Patch Tuesday” 2015-03-10, Microsoft made a rather large bundle of security updates available. Many security experts did not believe Microsoft would correct the FREAK vulnerability during this batch of patches, however it appears that they did. It is estimated that the FREAK …

Don’t FREAK out – Apple has fixed their vulnerabilities

There’s a major web encryption flaw that has been documented and widely covered in the media which permits a “man in the middle” type attack to occur from your web browser How does it work? It allows an attacker to intercept HTTPS traffic between vulnerable clients and servers, and then forces them to use an export-grade cryptography, which can then …

Lenovo issues statement to partners concerning Superfish debacle

If you have been watching the news or reading about computer security, you probably are already aware of the fact that Lenovo, one of the top computer manufacturers, has included a malicious piece of software called Superfish with new computers. Being a Lenovo dealer and having sold many of their products, we want to make sure you are aware of …

Is your business ready for Microsoft Server 2003 End of Support?

Windows Server 2003 Support Ends in: [tminus t=”14-07-2015 01:00:00″ id=”<p>End of Support</p>”  omitweeks=”true” style=”TIE-fighter” /] Windows Server 2003 End of Support Microsoft has scheduled the End of Support for their Server 2003 product to for July 14th, 2015, after which, there will be no support, no updates, and no patches to help protect your business from security issues. That’s right, any of your …

We offer Greenville computer virus removal and cleanup services

Our number one phone call question is, “Can you remove a virus from my computer?” The short answer is, “yes”.  The long answer is, “it depends on the severity of the infection.” While most malware occurrences may be nothing more than annoying, some of them will include a much more sinister payload, one that installs keylogging, or rootkits with complete …

Microsoft Patch Tuesday should be taken seriously this time (Sept 2014)

FORTY-ONE vulnerabilities have been addressed in this edition of Microsoft’s Patch Tuesday. There are 37 security flaws in Microsoft Internet Explorer alone which are being corrected. These range from “Important” all the way up to the “Critical” level, and include one fix for a “zero day vulnerability” that attackers have been exploiting. It is recommended that you apply the patches …

CryptoLocker victims may have some hope

Some victims of the CryptoLocker ransomware / malware / trojan may have hope for recovering their files thanks to a site that has gone live in the last few days. The way CryptoLocker works is that once it has run on your computer, it will begin encrypting the files on it (and potentially on file shares on your servers) and …