360Advisor - Page 10 of 10 - IT360
Attack of the third party programs
There are four primary “attack” vectors that allow viruses onto your computer: Internet Explorer, Flash, Acrobat Reader, and Java. As of late, there have been many vulnerabilities associated with these programs and virus writers have been successful in exploiting them. The best way to protect yourself is to make sure these programs are updated to […]
Posted: April 25, 2011 | View More »Technology Company Outwits Thief, Locates Laptop
When Ron Schroeder’s laptop was stolen in early 2010 he reported it to the Peoria police department. Peoria Police Detective Craig Willis was assigned to the case. Schroeder also informed IT360 that his computer was lost. Because they provided technology services to Schroeder’s business, IT360 had also installed a monitoring agent in his personal computer, […]
Posted: April 18, 2011 | View More »