Tech experts are raising urgent warnings about AI, describing it as a looming threat to online security in 2025. Cybercriminals are applying AI generated impersonations to proven scam techniques like email phishing, financial fraud scams, and...
Tech experts are raising urgent warnings about AI, describing it as a looming threat to online security in 2025. Cybercriminals are applying AI generated impersonations to proven scam techniques like email phishing, financial fraud scams, and...
In last month’s blog, I explored everything you need to know about how much SSD storage you should have. Although I touched on external SSD drives in the blog, I didn’t elaborate on what situations and for whom an external...
Everyone has received a phishing email with enough hooks to fool them into taking some type of action, like clicking into a familiar-looking, yet malicious website. Many phishing scams are easy to spot and avoid, but increasingly,...
7 years ago, I wrote a blog sounding the alarm about ransomware cybercriminals targeting local businesses. Before this time, ransomware cybercriminals were primarily targeting corporate America, NOT Main Street America. In the blog, I...
Many of RB’s Computer Service customers began using a computer in the 1990’s. Back then, most malware targeted Microsoft users and was primarily designed to infect and compromise its functionality. In 1991, Norton...
Recently, there have been a lot of news reports about AI. On top of that, at RB’s Computer Service, we have had several customers inquire about using some new AI features in Windows 11. This month’s blog seemed...
Several times a month someone stops by the shop at RB’s Computer Service looking for help to get their iPad to work like their laptop. It seems simple enough, just get a keyboard and mouse that works with their iPad, plus some apps...
When I was a kid, we would occasionally get a phone call from someone who dialed the wrong number. After the caller learned that whomever they were looking for was not associated with our home, they usually apologized and hung up. ...
If you want to avoid a cyberattack and getting your computer or network hacked, one thing you can do today is to stop ignoring those pesky software updates. Almost everyone has experienced software update pop-ups. They seem to appear...
A multi-stage remote access malware trojan called ZuoRAT is currently being deployed against a wide variety of small office/home office routers (also called SOHO’s) in the United States and Europe. Security analysts believe this malware...