store time
9AM - 5PM
Need help?
(276) 880-8900
New Apple voice phishing scam looks just like a real support call
05
January

New Apple voice phishing scam looks just like a real support call

A new voice phishing scam is going after iPhone users in a clever new way: by making calls seem like they are coming directly from Apple  Support. Brian Krebs reported today that a user, Jody Westby, got a call from Appl

Read more

Facebook Flaw Exposed Photos Belonging To Millions Of Users

Recently Facebook fessed up to a bug in their photo API that exposed the photos belonging to nearly seven million of the company’s users to app developers. The way the photo API is supposed to work is as follows: 

Read more
New Phishing Attacks Look Like Emails From Apple
02
January

New Phishing Attacks Look Like Emails From Apple

There’s a new, widespread phishing campaign underway that you need to be aware of if you use the Apple App store at all.  At this time, no one knows who’s behind the campaign, but already, a surprising number

Read more
What Is The Microsoft 365 Freelance Toolkit
02
January

What Is The Microsoft 365 Freelance Toolkit

Companies today are increasingly relying on freelancers to support one-time or ongoing projects. The growing need for freelance support can create complex challenges for companies. How, for example, can companies manage proje

Read more
Breaking Down Social Engineering
02
January

Breaking Down Social Engineering

Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud, in fact, it’s

Read more
Phantom Fest
30
December

Phantom Fest

It’s my honor to announce that Meade’s PC Repair Shop, Inc will be working with PhantomFest as the Event Host. Our CEO Joshua Meade will be working as the Event Director. Our team will be live streaming along with pro

Read more
Millennials and Cybercrime
08
October

Millennials and Cybercrime

Image Source Cybercrime has cost victims $126 billion worldwide and it has indeed established itself as a criminal enterprise. Every day, we see headlines on security and data breaches, invasion of privacy, and hacking. Cyber

Read more

The 3 Necessities of True collaboration: A Primer

    The 3 Necessities of True collaboration: A Primer   Today’s blog is a basic primer on what a complete File, Sync, and Share (FSS) solution includes. Very simply, FSS is a software service that allows you to share all

Read more

Check for Gaps When It Comes to Sharing Files

    Check for Gaps When It Comes to Sharing Files   Every technology department is keenly aware of the risks of data breaches. Maintaining digital security is a key priority for CTO/CIOs. Technical departments launch fake

Read more

Do you want to repair your mobile phone?