Blog

Buckle May Have Had Credit Cards Exposed For Six Months

Have you shopped at a clothing store called Buckle? If you were a patron of any of their 450+ stores during the period spanning from October 28, 2016 to April 14, 2017, ...

Three Ways to Keep Your Mobile Device Secure

  Mobile devices have transformed the way we communicate, do business, and even relax. Because of this mobile devices have become an attractive target for hackers. The manufacturers of both Android and Apple devices are constantly looking ...

Even Google Can Get Hacked

Google has a rock-solid reputation and an almost uncanny ability to ward off hacking efforts, but even they aren’t infallible. Even they can be hacked, as a recent incident involving Google News ...

‘Choose Your Own Adventure’ Shows Make TV Watching Interactive

It’s a trend that has been flitting at the edges of the entertainment industry for a few years now: the idea of interactive storytelling in TV and movies. The concept was born ...

Majority Of Businesses Aren’t Prepared For IT Risks

Does your IT staff include personnel who are dedicated to compliance or cybersecurity? How confident are you that your team is prepared to take today’s security threats head on? How likely are ...

Can Your Car Be Hacked Just With A USB Stick?

Jay Turla has been a very busy man since purchasing his new Mazda vehicle. He’s been spending time researching hacks to his car’s infotainment system, and as with most other “smart” products ...

Are Hackers Testing The Waters For A Power Grid Attack?

Ever since the discovery of the dreaded Stuxnet worm in the wild, security experts have been concerned that a devastating cyberattack could be launched against critical infrastructure, causing signal lights to go ...

Apple Is Having A Big Problem With Fake In-App Purchases

It’s been long-held conventional wisdom that the safest place you can purchase apps is either the Google Play Store if you have an Android device, or the Apple Store if you’ve got ...

PowerPoint File Can Install Malware On Your System

The fact that Microsoft Office Products (Word, PowerPoint and Excel) can be used to install malware onto an unsuspecting user’s computer has been common knowledge for years. But recently, security researchers at ...

New Malware Called Fireball Infecting PCs, Macs At Alarming Rate

If you haven’t heard of a company called Rafotech, you’re not alone. But the simple truth is that they control an enormous network of infected computers, numbering more than 250 million devices. ...

Contact

Mid-Atlantic Computer SolutionsMid-Atlantic Computer Solutions Logo $$$
  • 2034 Eisenhower Ave Ste 101
    Alexandria, VA 22314
  • Phone: 703-236-5800
  • Phone: 703-236-5800
Contact Us