We specialize in home and small business support, we are a friendly, family owned and operated business which offers professional PC and network support at affordable rates. We're here to help with all your computer needs. Computer help without the hi-tech jargon! In most cases we can get your PC up and running the same day. No waiting for six weeks for someone to have a look at it or relying on your friend or neighbor for help.

Welcome!

Be Cool - Shop @ Geeks.com Welcome to our online presence. We hope you find this site helpful. Here you can find free information in the computer industry, free "how to's", the latest software reviews and more. You can also shop our links. We encourage you subscribe to our site so you don't miss anything. As always, we welcome your suggestions!

New Computers & Parts

In need of a new computer, laptop or computer parts? We got you covered! Shop Now!

Need Computer Help? Check our forum.

Sunday, May 29, 2011

Lockheed-Martin compromised. Info from PC World.

The network of defense contractor Lockheed-Martin was attacked using counterfeit electronic keys. Since the RSA Security network was hacked and the keys to its SecurID tokens were compromised a few months ago, the world has been waiting for the proverbial other shoe to drop. Well, it dropped.

In an analysis of the breach at RSA Security, NSS Labs predicted, "This was a strategic move to grab the virtual keys to RSA's customers--who are the most security conscious in the world. One or several RSA clients are likely the ultimate target of this attack. Military, financial, governmental, and other organizations with critical intellectual property, plans and finances are at risk."

Cyber attacks have evolved into precision tools for corporate and government espionage. Since the compromise of the SecurID keys, there have been malware and phishing campaigns probing for specific data connecting RSA tokens to the end-user, suggesting that those attacks were being conducted by the original RSA Security attackers with a goal in mind.

Most crimes are crimes of opportunity, and most crimes of opportunity can be avoided. Stay in populated, well-lit areas, and you're relatively safe. Walk down dark, deserted alleys and your odds of getting mugged go up. Lock your car doors and keep valuable hidden, and you probably won't get things stolen. Leave your car unlocked with your iPad sitting on the passenger seat and it probably won't be there when you get back.

However, avoiding a targeted attack--a stalker dedicated to trailing you specifically--is much more difficult. The attack against RSA Security does not appear to have been a random crime of opportunity, but rather a targeted attack calculated with the goal of acquiring the keys necessary to tackle larger prey like Lockheed-Martin.

I am sure that Lockheed-Martin and the United States government have information security experts much smarter than me investigating these incidents and connecting the dots, but it certainly seems at face value like either a state-sponsored attack, or an attack by well-funded hackers with the intent to market whatever information can be extracted internationally to other governments.

Thankfully, Lockheed-Martin detected the attack and acted quickly to thwart it. A spokesperson for Lockheed-Martin reports that no customer, program, or employee data has been compromised as a result of this attack.

But, the entire incident--starting from the RSA Security attack and compromise of the SecurID tokens, and ending at Lockheed-Martin--illustrates that malware and cyber-crime are becoming more insidious. Malware has evolved from a trivial, script-kiddie nuisance, to a professional crime syndicate, and now into a tool for precision corporate and government espionage.

Wednesday, November 17, 2010

Gartner's Top 10 Technologies for 2011

October 20, 2010

1: Cloud computing

This group of technologies has been on the top 10 lists for a few years. Now everything as a service will alter business models and IT procurement. Gartner analyst David Cearley said what has changed is that there are multiple services. Companies will probably need cloud computing brokers. Things to watch:

Monday, November 8, 2010

Tech Myths Debunked!

By Mark Tiongco - November 7, 2010


In this tech tip, we expose the myth and reality surrounding some of the biggest trends in our technology-oriented world. Hopefully, this will shed some light which can help you better understand how these crazy gadgets work!

Thursday, November 12, 2009

Facebook Invasion: Beware of New 'Smart' Worm - PC World

Facebook Invasion: Beware of New 'Smart' Worm - PC World

Monday, November 2, 2009

Windows 7 upgrade problems vex users | The Money Times

Windows 7 upgrade problems vex users | The Money Times

Friday, October 23, 2009

Ten free Windows apps no one should be without!


To view and download...click here.

Monday, October 12, 2009

Store Cam