In some cases, the hard-coded secrets could allow an attacker to steal or
delete data. Read
If an app infested with Gooligan is installed, or if a user clicks on a link delivered by a phishing attack text message, the malware roots the device and steals email addresses and authentication tokens, which can be used to access the user's Google account (think Gmail, Google Photos, Google Drive, and so on). Read More
A new email scam campaign by cybercriminals purporting to be from 'Microsoft
Security Office' is infecting its victims with Neutrino exploit kit malware.
The email warns the recipients that their bank accounts are being used for
suspicious activity as a result of a virus. Read
A 'PowerCube' and a plug for a power adapter have been recalled over the last few weeks. Here's what to do if you have one. Read more:
We see quite a number of cheap illegal power products, If you are in any doubt as to the safety of your electrical goods, we have Professional Test & Tag service available.
The malware family, which targets everything from Windows to Mac machines, executes procedures to encrypt files and disks before demanding a ransom payment in return for keys to decrypt and unlock compromised machines Read More
|Dr Peter Caska|
|Jo Olley Earcandles|
|Nat Ferfoglia Artworks|
with your PC?
and part-time computer users will appreciate the understanding and
patience of our mature support personnel
call 43 444 974 or e-mail here after hours call 0414 856 254
FREE VIRUS and SECURITY SUPPORT
when you purchase or renew your AVG Security from SINCE Computers and
|Latest Australian News|