West Chester Computer Doctors

Your Chester County Professional Computer Support Team

About Us

West Chester Computer Doctors is dedicated to providing the highest level of service and customer satisfaction at affordable prices.

We have been providing end to end IT support for our customers throughout the mid–atlantic region since 1992. Our highly skilled team has several years of support experience working for both large and small corporations and home users.

What We Offer

  • Virus + Spyware Removal
  • Website creation/modification/hosting
  • Software/Hardware Upgrades
  • Data Recovery
  • New PC/Laptop sales
  • Custom Computer Builds
  • PC and MAC support for Small Business and Home Users

  • Protect Your Data!

    Posted on April 6, 2016 By WCPCMD

    We’ve partnered with Carbonite to keep your irreplaceable personal data safe and secure.  Click on the logo below to find a plan that’s right for you.

    Carbonite

    Continue reading →
  • Zeus Malware Users Steal Millions: Caught and Charged

    Posted on April 25, 2014 By WCPCMD

    Nine members of a group that used Zeus malware for attacks were charged by the US Department of Justice. The malware was used to siphon money from Bank of America, First National Bank of Omaha, and other banks into over-sea accounts.
    The group installed Zeus malware on computers associated the banks. They then used the banking information garnered from the compromised computers to pretend to be employees of the victims. They then contacted the banks and convinced them they had authority to transfer the funds to other accounts.

    Out of the nine charged, the Department of Justice notes that four are still at large.

    US takes out gang that used Zeus malware to steal millions- Network World

    Continue reading →
  • Verizon Releases 2014 Data Breach Report

    Posted on April 25, 2014 By WCPCMD

    Verizon Releases 2014 Data Breach Report

    Verizon just recently released their 2014 Data Breach Investigation Report with a slew of interesting statistics. The reports states to two thirds of data breach attacks used stolen credentials at some point in the process. It makes sense, as an attacker with valid credentials does not need to compromise a system to gain access, they only need to log in.

    The report also noted 92 percent of attacks in the past decade use one of nine different attack methods. The report pointed out that, contrary to current media attention from the Target breach, Point of Sale attacks have actually decreased in frequency.

    Stolen Passwords Used In Most Data Breaches- Dark Reading by Newsweek

    Continue reading →
  • Satellite Communications Not Very Secure

    Posted on April 18, 2014 By WCPCMD

    Satellite communications, a critical part of many everyday functions, are not as secure as we might think they are. These communications are critical for organizing mass transit, military communications, emergency services, and more.
    The attacks that could compromise a single satellite are very simple, some as simple as sending an SMS. And once one is compromised, a whole network could be brought down.

    Apparently, recent research indicates that satellite firmware often has hardcoded credentials, backdoors, and weak protocols. While an attacker would have to have some knowledge of the firmware to accurately exploit it, gaining access would not be a problem for them.

    Satellite Communications Wide Open To Hackers- Dark Reading by Information Week

    Continue reading →
  • Microsoft No Longer Supporting Windows 8.1

    Posted on April 18, 2014 By WCPCMD

    Microsoft will be ceasing support to Windows 8.1 in May ,2014. This means that the software giant will no longer distributing security updates to 8.1 users. Microsoft plans to continue supporting Windows 8 and Windows 8.1 Update.

    What does this mean for users? It means that if you currently have Windows 8.1 installed, you must get the 8.1 Update installed as well by May 2014. This will ensure that there is no gap in your security coverage. If you only have Windows 8, Microsoft assures us that they will continue 8 security updates.

    Microsoft confirms it’s dropping Windows 8.1 support- InfoWeek

    Continue reading →
  • Chrome Bug Allows Websites Unauthorized Use of Microphone

    Posted on April 11, 2014 By WCPCMD

    Recently a bug has been discovered in Google’s web browser, Chrome, that can allow websites to listen on a user through their computers microphone. While the defect cannot directly record audio, it can record a transcript of anything it hears using Chrome’s speech-to-text function. This bug has a potential to reach many people, as Chrome is used by more than half of web users.

    The bug was originally reported to Google by Israel-based developer, Guy Aharonovsky, who discovered it while working with the speech recognition aspects of Chrome. Google, while have acknowledged the defect, has currently designated it as “low-severity”, which means there will be no immediate fix for the issue.

    In the mean time, it does not seem that anyone is using this bug for malicious reasons yet.

    Google Chrome Bug Could Allow Websites To Snoop On Conversations- International Business Times

    Continue reading →
  • Heartbleed Vulnerability in OpenSSL

    Posted on April 8, 2014 By WCPCMD

    A major flaw has been found in the OpenSSL library, compromising a large number of websites that use OpenSSL to encrypt web data. Almost one-third of major websites use OpenSSL to encrypt user information (like credit card numbers and sensitive information) that is being passed to their servers. Unfortunately, this vulnerability allows someone to potentially capture important information about the server, making it possible to infiltrate it. Once infiltrated, an attack can pose as the server and intercept any data sent over the SSL connection.
    Open SSL has released a patch on Monday to correct the issues. Current users of OpenSSL should either upgrade to OpenSSL 1.0.1g or disable the heartbeat function of the library. The vulnerability has existed for two years, and attack are completely silent and unnoticeable. Experts are also recommending that users of OpenSSL replace their security certificates and keys.
    Emergency SSL/TSL Patch Underway- Dark Reading by Information Week

    Continue reading →
  • Malware Targeting Job Search Sites

    Posted on April 4, 2014 By WCPCMD

    The malware known as “Gameover” is currently targeting employment websites. This trojan is used to redirect users to a fake login page for Monster.com where it collects the targeted victims data. They do this be injecting a fake login button on Monster.com on infected computers. Other than the fake login button, the Monster page looks completely normal. Not only does the trojan collect login data, but it also asks the user to select and answer a security question.

    Gameover had previously targeted CareerBuilder.com, but the Monster development is a new one.

    Regular users of employment sites are recommended to pay attention to their login pages and make sure nothing seems out of the ordinary or different before logging in.

    Gameover Malware Targets Accounts on Employee Websites- ITWorld.com

    Continue reading →
  • Experts Concerned About the Lack of Security Around “The Internet of Things”

    Posted on April 3, 2014 By WCPCMD

    More and more people are using devices that connect to the internet to improve their home. It’s nice to be able to control your thermostat from your phone or receive a tweet when your refrigerator detects that your milk has gone bad. Unfortunately, with the rise of internet connected things, or “The Internet of Things”, security experts are questioning the security of these devices. The fact of the matter is, there is minimal protection of the internet connected things.

    An example would be the fact the 95% of the worlds ATMs are running Windows XP (an operating system that will no longer be supported as of April 8th, 2014). Other creators of internet connected things do not include or have minimal methods of issuing patches or updates. Studies show that even when a system does have a patch available, consumers are not likely to apply it.

    ‘Thingularity’ Triggers Security Warnings- Information Week’s Dark Reading

    Continue reading →
  • Android Malware Found in Apps

    Posted on March 27, 2014 By WCPCMD

    At least two apps available in the Google Play store have been found to contain an interesting form of malware. The apps Songs and Prized each contain malware, now known as KageCoin, that utilizes the device as a crypto-currency mining device. Crypto-currency mining is when a device uses a part of its processing power to facilitate crypto-currency transactions, and in return earns the owner (or malware attacker) a portion of the currency.
    While annoying, the malware isn’t as bad as it could be. It only performs its mining actions while the device is charging. Because of this, its power consumption is less noticeable.

    Android Apps Hide Crypto-Currency Mining Malware- DarkReading.net

    Continue reading →