West Chester Computer Doctors

Offering 2 Convenient Locations in West Chester & Exton

About Us

West Chester Computer Doctors is dedicated to providing the highest level of service and customer satisfaction at affordable prices.

We have been providing end to end IT support for our customers throughout the mid–atlantic region since 1992. Our highly skilled team has several years of support experience working for both large and small corporations and home users.

What we offer

  • Virus + Spyware Removal
  • Website creation/modification/hosting
  • Software/Hardware Upgrades
  • Data Recovery
  • Remote Assistance
  • New PC/Laptop sales
  • Custom Computer Builds
  • PC and MAC support for Small Business
    and Home Users

We ARE the Computer Shop on the Corner

We have moved our West Chester office from 28 to 40 South High Street.  Just a few doors away from our original location, West Chester Computer Doctors has moved to a newer facility with expanded capacity.  Come stop in and see our new digs.  We ARE the computer shop on the corner of High and Miner Street!

shop-on-the-corner

West Chester Computer Doctors EXTON location now open!!!

Located at 319 North Pottstown pike between the Fairfield Shopping Center and Target, our new showroom and expansive repair facility will offer FREE parking, the same hours, and all of the same services provided in our original West Chester office.

Thanks to all of our employees for their hard work, dedication, and effort helping get this new location off the ground.

Our West Chester borough location at 28 South High street will continue with business as usual… providing the best PC&Mac repair and business networking services. No matter which location you bring your equipment to for repair, you are always guaranteed the most honest, prompt, professional, fair, and in-your-best-interest support available.

We look forward to seeing everyone soon!

Exton Computer Doctors   Exton Computer Repair Service

Zeus Malware Users Steal Millions: Caught and Charged

Nine members of a group that used Zeus malware for attacks were charged by the US Department of Justice. The malware was used to siphon money from Bank of America, First National Bank of Omaha, and other banks into over-sea accounts.
The group installed Zeus malware on computers associated the banks. They then used the banking information garnered from the compromised computers to pretend to be employees of the victims. They then contacted the banks and convinced them they had authority to transfer the funds to other accounts.

Out of the nine charged, the Department of Justice notes that four are still at large.

US takes out gang that used Zeus malware to steal millions- Network World

Verizon Releases 2014 Data Breach Report

Verizon Releases 2014 Data Breach Report

Verizon just recently released their 2014 Data Breach Investigation Report with a slew of interesting statistics. The reports states to two thirds of data breach attacks used stolen credentials at some point in the process. It makes sense, as an attacker with valid credentials does not need to compromise a system to gain access, they only need to log in.

The report also noted 92 percent of attacks in the past decade use one of nine different attack methods. The report pointed out that, contrary to current media attention from the Target breach, Point of Sale attacks have actually decreased in frequency.

Stolen Passwords Used In Most Data Breaches- Dark Reading by Newsweek

Satellite Communications Not Very Secure

Satellite communications, a critical part of many everyday functions, are not as secure as we might think they are. These communications are critical for organizing mass transit, military communications, emergency services, and more.
The attacks that could compromise a single satellite are very simple, some as simple as sending an SMS. And once one is compromised, a whole network could be brought down.

Apparently, recent research indicates that satellite firmware often has hardcoded credentials, backdoors, and weak protocols. While an attacker would have to have some knowledge of the firmware to accurately exploit it, gaining access would not be a problem for them.

< a href="http://www.darkreading.com/vulnerabilities---threats/satellite-communications-wide-open-to-hackers/d/d-id/1204539?" target="new"> Satellite Communications Wide Open To Hackers- Dark Reading by Information Week