West Chester Computer Doctors

Your Chester County Professional Computer Support Team

About Us

West Chester Computer Doctors is dedicated to providing the highest level of service and customer satisfaction at affordable prices.

We have been providing end to end IT support for our customers throughout the mid–atlantic region since 1992. Our highly skilled team has several years of support experience working for both large and small corporations and home users.

What We Offer

  • Virus + Spyware Removal
  • Website creation/modification/hosting
  • Software/Hardware Upgrades
  • Data Recovery
  • Remote Assistance
  • New PC/Laptop sales
  • Custom Computer Builds
  • PC and MAC support for Small Business and Home Users

  • COVID-19 Procedures

    Posted on June 18, 2020 By WCPCMD

    Continue reading →
  • Protect Your Data!

    Posted on April 6, 2016 By WCPCMD

    We’ve partnered with Carbonite to keep your irreplaceable personal data safe and secure.  Click on the logo below to find a plan that’s right for you.

    Carbonite

    Continue reading →
  • We ARE the Computer Shop on the Corner

    Posted on December 14, 2015 By WCPCMD

    We have moved our West Chester office from 28 to 40 South High Street.  Just a few doors away from our original location, West Chester Computer Doctors has moved to a newer facility with expanded capacity.  Come stop in and see our new digs.  We ARE the computer shop on the corner of High and Miner Street!

    shop-on-the-corner

    Continue reading →
  • Zeus Malware Users Steal Millions: Caught and Charged

    Posted on April 25, 2014 By WCPCMD

    Nine members of a group that used Zeus malware for attacks were charged by the US Department of Justice. The malware was used to siphon money from Bank of America, First National Bank of Omaha, and other banks into over-sea accounts.
    The group installed Zeus malware on computers associated the banks. They then used the banking information garnered from the compromised computers to pretend to be employees of the victims. They then contacted the banks and convinced them they had authority to transfer the funds to other accounts.

    Out of the nine charged, the Department of Justice notes that four are still at large.

    US takes out gang that used Zeus malware to steal millions- Network World

    Continue reading →
  • Verizon Releases 2014 Data Breach Report

    Posted on April 25, 2014 By WCPCMD

    Verizon Releases 2014 Data Breach Report

    Verizon just recently released their 2014 Data Breach Investigation Report with a slew of interesting statistics. The reports states to two thirds of data breach attacks used stolen credentials at some point in the process. It makes sense, as an attacker with valid credentials does not need to compromise a system to gain access, they only need to log in.

    The report also noted 92 percent of attacks in the past decade use one of nine different attack methods. The report pointed out that, contrary to current media attention from the Target breach, Point of Sale attacks have actually decreased in frequency.

    Stolen Passwords Used In Most Data Breaches- Dark Reading by Newsweek

    Continue reading →
  • Satellite Communications Not Very Secure

    Posted on April 18, 2014 By WCPCMD

    Satellite communications, a critical part of many everyday functions, are not as secure as we might think they are. These communications are critical for organizing mass transit, military communications, emergency services, and more.
    The attacks that could compromise a single satellite are very simple, some as simple as sending an SMS. And once one is compromised, a whole network could be brought down.

    Apparently, recent research indicates that satellite firmware often has hardcoded credentials, backdoors, and weak protocols. While an attacker would have to have some knowledge of the firmware to accurately exploit it, gaining access would not be a problem for them.

    Satellite Communications Wide Open To Hackers- Dark Reading by Information Week

    Continue reading →
  • Microsoft No Longer Supporting Windows 8.1

    Posted on April 18, 2014 By WCPCMD

    Microsoft will be ceasing support to Windows 8.1 in May ,2014. This means that the software giant will no longer distributing security updates to 8.1 users. Microsoft plans to continue supporting Windows 8 and Windows 8.1 Update.

    What does this mean for users? It means that if you currently have Windows 8.1 installed, you must get the 8.1 Update installed as well by May 2014. This will ensure that there is no gap in your security coverage. If you only have Windows 8, Microsoft assures us that they will continue 8 security updates.

    Microsoft confirms it’s dropping Windows 8.1 support- InfoWeek

    Continue reading →
  • Chrome Bug Allows Websites Unauthorized Use of Microphone

    Posted on April 11, 2014 By WCPCMD

    Recently a bug has been discovered in Google’s web browser, Chrome, that can allow websites to listen on a user through their computers microphone. While the defect cannot directly record audio, it can record a transcript of anything it hears using Chrome’s speech-to-text function. This bug has a potential to reach many people, as Chrome is used by more than half of web users.

    The bug was originally reported to Google by Israel-based developer, Guy Aharonovsky, who discovered it while working with the speech recognition aspects of Chrome. Google, while have acknowledged the defect, has currently designated it as “low-severity”, which means there will be no immediate fix for the issue.

    In the mean time, it does not seem that anyone is using this bug for malicious reasons yet.

    Google Chrome Bug Could Allow Websites To Snoop On Conversations- International Business Times

    Continue reading →
  • Heartbleed Vulnerability in OpenSSL

    Posted on April 8, 2014 By WCPCMD

    A major flaw has been found in the OpenSSL library, compromising a large number of websites that use OpenSSL to encrypt web data. Almost one-third of major websites use OpenSSL to encrypt user information (like credit card numbers and sensitive information) that is being passed to their servers. Unfortunately, this vulnerability allows someone to potentially capture important information about the server, making it possible to infiltrate it. Once infiltrated, an attack can pose as the server and intercept any data sent over the SSL connection.
    Open SSL has released a patch on Monday to correct the issues. Current users of OpenSSL should either upgrade to OpenSSL 1.0.1g or disable the heartbeat function of the library. The vulnerability has existed for two years, and attack are completely silent and unnoticeable. Experts are also recommending that users of OpenSSL replace their security certificates and keys.
    Emergency SSL/TSL Patch Underway- Dark Reading by Information Week

    Continue reading →
  • Malware Targeting Job Search Sites

    Posted on April 4, 2014 By WCPCMD

    The malware known as “Gameover” is currently targeting employment websites. This trojan is used to redirect users to a fake login page for Monster.com where it collects the targeted victims data. They do this be injecting a fake login button on Monster.com on infected computers. Other than the fake login button, the Monster page looks completely normal. Not only does the trojan collect login data, but it also asks the user to select and answer a security question.

    Gameover had previously targeted CareerBuilder.com, but the Monster development is a new one.

    Regular users of employment sites are recommended to pay attention to their login pages and make sure nothing seems out of the ordinary or different before logging in.

    Gameover Malware Targets Accounts on Employee Websites- ITWorld.com

    Continue reading →