West Chester Computer Doctors is dedicated to providing the highest level of service and customer satisfaction at affordable prices.
We have been providing end to end IT support for our customers throughout the mid–atlantic region since 1992. Our highly skilled team has several years of support experience working for both large and small corporations and home users.
We’ve partnered with Carbonite to keep your irreplaceable personal data safe and secure. Click on the logo below to find a plan that’s right for you.Continue reading →
We have moved our West Chester office from 28 to 40 South High Street. Just a few doors away from our original location, West Chester Computer Doctors has moved to a newer facility with expanded capacity. Come stop in and see our new digs. We ARE the computer shop on the corner of High and Miner Street!Continue reading →
Nine members of a group that used Zeus malware for attacks were charged by the US Department of Justice. The malware was used to siphon money from Bank of America, First National Bank of Omaha, and other banks into over-sea accounts.
The group installed Zeus malware on computers associated the banks. They then used the banking information garnered from the compromised computers to pretend to be employees of the victims. They then contacted the banks and convinced them they had authority to transfer the funds to other accounts.
Out of the nine charged, the Department of Justice notes that four are still at large.Continue reading →
Verizon Releases 2014 Data Breach Report
Verizon just recently released their 2014 Data Breach Investigation Report with a slew of interesting statistics. The reports states to two thirds of data breach attacks used stolen credentials at some point in the process. It makes sense, as an attacker with valid credentials does not need to compromise a system to gain access, they only need to log in.
The report also noted 92 percent of attacks in the past decade use one of nine different attack methods. The report pointed out that, contrary to current media attention from the Target breach, Point of Sale attacks have actually decreased in frequency.Continue reading →
Satellite communications, a critical part of many everyday functions, are not as secure as we might think they are. These communications are critical for organizing mass transit, military communications, emergency services, and more.
The attacks that could compromise a single satellite are very simple, some as simple as sending an SMS. And once one is compromised, a whole network could be brought down.
Apparently, recent research indicates that satellite firmware often has hardcoded credentials, backdoors, and weak protocols. While an attacker would have to have some knowledge of the firmware to accurately exploit it, gaining access would not be a problem for them.Continue reading →
Microsoft will be ceasing support to Windows 8.1 in May ,2014. This means that the software giant will no longer distributing security updates to 8.1 users. Microsoft plans to continue supporting Windows 8 and Windows 8.1 Update.
What does this mean for users? It means that if you currently have Windows 8.1 installed, you must get the 8.1 Update installed as well by May 2014. This will ensure that there is no gap in your security coverage. If you only have Windows 8, Microsoft assures us that they will continue 8 security updates.Continue reading →
Recently a bug has been discovered in Google’s web browser, Chrome, that can allow websites to listen on a user through their computers microphone. While the defect cannot directly record audio, it can record a transcript of anything it hears using Chrome’s speech-to-text function. This bug has a potential to reach many people, as Chrome is used by more than half of web users.
The bug was originally reported to Google by Israel-based developer, Guy Aharonovsky, who discovered it while working with the speech recognition aspects of Chrome. Google, while have acknowledged the defect, has currently designated it as “low-severity”, which means there will be no immediate fix for the issue.
In the mean time, it does not seem that anyone is using this bug for malicious reasons yet.Continue reading →
A major flaw has been found in the OpenSSL library, compromising a large number of websites that use OpenSSL to encrypt web data. Almost one-third of major websites use OpenSSL to encrypt user information (like credit card numbers and sensitive information) that is being passed to their servers. Unfortunately, this vulnerability allows someone to potentially capture important information about the server, making it possible to infiltrate it. Once infiltrated, an attack can pose as the server and intercept any data sent over the SSL connection.
Open SSL has released a patch on Monday to correct the issues. Current users of OpenSSL should either upgrade to OpenSSL 1.0.1g or disable the heartbeat function of the library. The vulnerability has existed for two years, and attack are completely silent and unnoticeable. Experts are also recommending that users of OpenSSL replace their security certificates and keys.
Emergency SSL/TSL Patch Underway- Dark Reading by Information Week
The malware known as “Gameover” is currently targeting employment websites. This trojan is used to redirect users to a fake login page for Monster.com where it collects the targeted victims data. They do this be injecting a fake login button on Monster.com on infected computers. Other than the fake login button, the Monster page looks completely normal. Not only does the trojan collect login data, but it also asks the user to select and answer a security question.
Gameover had previously targeted CareerBuilder.com, but the Monster development is a new one.
Regular users of employment sites are recommended to pay attention to their login pages and make sure nothing seems out of the ordinary or different before logging in.Continue reading →