301-571-5040    Get SUPPORT

Washington Works Blog

Washington Works has been serving the Bethesda area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

0 Comments
Continue reading

Hitman Email Scam Threatens Your Life, Instead of Your Data

Hitman Email Scam Threatens Your Life, Instead of Your Data

Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target to entice them to comply: their life.

Tags:
0 Comments
Continue reading

Why ROBOT is a Risk After Nearly 20 Years

Why ROBOT is a Risk After Nearly 20 Years

The Internet is rife with potential threats. Some are situational, but most are deliberate actions made by malicious entities who are trying to obtain any semblance of value from you or your company. Some of these exploits have been around longer than you’d imagine possible. This has been made evident by huge Internet-based companies such as PayPal and Facebook testing positive for a 19-year-old vulnerability that once allowed hackers to decrypt encrypted data.

0 Comments
Continue reading

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

0 Comments
Continue reading

Would You Share Your Browser History? This Ransomware Will

Ransomware is a tricky piece of malware that locks down the precious files located on a victim’s computer, then (in theory) will return access to them when a ransom has been paid. Depending on the files stored on a victim’s computer, they might simply blow it off and not worry too much about losing access to a couple of pictures or videos--but what if this ransomware threatened to expose your web browsing history?

0 Comments
Continue reading

Tip of the Week: Today is National Clean Out Your Computer Day. 5 Ways to Show Your PC Some Love

Tip of the Week: Today is National Clean Out Your Computer Day. 5 Ways to Show Your PC Some Love

It’s National Clean Out Your Computer Day! To kick off this important day, we’d like to remind business owners that this is a valuable opportunity to make sure that you’re taking good care of one of your greatest assets: your company’s technology. Let’s go over some of the best ways that you can optimize the performance of your office computers.

0 Comments
Continue reading

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

Alert: Was Your Device One of Over a Million Breached By New Android Malware?

The branch of malware known as Ghost Push now has a new component, Gooligan, and it certainly lives up to its name. Google was struck by an attack that infected over one million Android users, with over 13,000 additional devices adding to that total on a daily basis.

0 Comments
Continue reading

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

Your New Galaxy Note 7 Has a 1 in 42,000 Chance of Exploding

If you have the most recent addition to Samsung’s growing collection of smartphones, we hope you haven’t grown too attached to it. The company is recalling the Galaxy Note 7 on reports that the batteries explode. This event is largely considered one of the more high-profile recalls in the history of consumer technology.

0 Comments
Continue reading

Alert: Android Malware Can Control Your Phone Through Twitter

Alert: Android Malware Can Control Your Phone Through Twitter

Hackers continue to innovate and cause trouble for businesses of all industries and sizes. One of the more interesting recent tactics includes utilizing a malicious Twitter account to command a botnet of Android devices to do its bidding. Twitoor is considered to be the first real threat to actively use a social network in this manner, making this a major cause for concern.

0 Comments
Continue reading

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the way that this ransomware is distributed.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Hackers Privacy Business Computing Malware Business Network Security Microsoft Backup Productivity Ransomware User Tips Software Email Smartphone Android Windows 10 Internet Managed IT Services Computer Office 365 Small Business Google Business Continuity Managed Service Provider IT Services Mobile Devices Hosted Solutions Efficiency Browser Social Media Encryption Cloud Computing Data Management Data Recovery Remote Monitoring Smartphones Work/Life Balance Hardware Workplace Tips Tip of the week Outsourced IT Productivity Holiday Big Data Hosted Solution Word Unified Threat Management Money Facebook Phishing Communication Disaster Recovery Risk Management How To IT Support Business Management Windows SaaS Government Cybersecurity Password Windows 10 Save Money Apps App Mobile Device IT Management Computing Innovation Employer-Employee Relationship Telephone Systems Taxes Politics Virtual Private Network Firewall Websites Artificial Intelligence Wi-Fi Botnet Virtual Reality Automation Antivirus Hacker Data Backup Physical Security Twitter Managed IT Services Collaboration Office Paperless Office Computer Care Robot Maintenance BYOD Saving Money Training Recovery File Sharing Two-factor Authentication Bandwidth Automobile Data Alert Scam Health Samsung Vulnerability G Suite Networking Legislation Electronic Medical Records Servers Uninterrupted Power Supply Dark Web VPN YouTube WiFi Motion Sickness Data Security Mouse Legal Quick Tips Server Management Office Tips Upgrade Microsoft Excel Notifications Social Settings GPS Virtualization IT Consultant Wireless Tablet Sports Google Drive Statistics Solid State Drive Search Internet of Things Meetings Mail Merge Digital Tracking Server Techology Comparison VoIP Bluetooth Hard Disk Drive Administrator Blockchain Webcam Passwords Address Spyware Document Management Cortana Education Machine Learning Unified Threat Management Specifications Avoiding Downtime Black Market IBM Permissions Point of Sale Crowdsourcing Printer Cleaning Microsoft Office Relocation User Error Black Friday Time Management Fraud Customer Relationship Management Access Control Personal Information How To Identity Theft Private Cloud Cyber Monday Update Network Management Mobile Security Managed IT Downtime IT Solutions Web Server Business Technology SharePoint Analytics Supercomputer Touchscreen IT Support Error Smart Technology Hotspot Remote Computing Outlook Corporate Profile IT Budget Upgrades Cameras Mobile Device Management Lenovo Downloads Computer Repair Chrome Cabling Communications Distributed Denial of Service Chromebook Language Processors Shortcut WannaCry Cybercrime Digital Payment CCTV Law Enforcement Superfish Multi-Factor Security Firefox Infrastructure Managed IT Service Tech Support Computing Infrastructure Patch Management Monitors Staffing Gadget Google Calendar Vendor Management Heating/Cooling Disaster Break Fix Emoji Budget Alerts Gadgets Data loss Network Travel Competition Fun Licensing Users Miscellaneous VoIP Presentation 5G Wireless Technology Marketing CrashOverride IP Address Emergency Website Customer Service Mobile Office Domains Spam Hard Drives Public Speaking Lithium-ion battery Augmented Reality Safety The Internet of Things Hiring/Firing