Welcome to the Holland Computers Support portal.
 
Please register using the register button in the upper right corner, if you haven't done so already.  You may submit a support ticket here or by email.  Email submissions should be sent to support[at]hollandcomputers.com.  All submissions by the portal or via email require a verified email address. 
 
If you have not verified your email address yet, please log on, then click on your name in the upper right corner, then click "My Settings".  You will see a resend email button on the page that will help you get the verification process completed.

Search the Portal

Recent Articles

AUG3
Criminals Continue to Defraud and Extort Funds from Victims Using CryptoWall Ransomware Schemes

Internet Crime complaint Center (FBI)
JUL31
Compromised site serves Nuclear exploit kit together with fake BSOD

Support scammers not lying about a malware infection for a change. During our work on the development of the VBWeb tests, which will be started soon, we came across an interesting case of an infected website that served not only the Nuclear exploit kit, but also a fake blue screen of death (BSOD) that attempted to trick the user into falling for a support scam. When a (legitimate) website includes (legitimate) advertisements, these ads themselves are rarely included in the HTML code...

The Virus Bulletin
JUL30
Throwback Thursday: Riotous Assembly

This Throwback Thursday, we turn the clock back to January 1994, shortly after Cyber Riot had emerged as the first virus capable of infecting the Windows kernel. Today, malware that affects the Windows kernel is ubiquitous - the majority of sophisticated attacks against Windows users have at least one component executing in the operating system kernel. But in 1993, the Windows kernel remained untouched by malware - and indeed Windows viruses were somewhat cumbersome and technically quite...

The Virus Bulletin
JUL28
Stagefright vulnerability leaves 950 million Android devices vulnerable to remote code execution

The operating system has been patched, but it is unclear whether users will receive those patches. Researchers at mobile security firm Zimperium have discovered a remote code execution flaw in the Stagefright media library used on Android phones. The vulnerability allegedly means it could, for instance, take one MMS message for an attacker to run code on a targeted device. In some cases, if the device is old, this code could even be run with elevated system privileges. Few technical...

The Virus Bulletin
JUL23
Throwback Thursday: Sizewell B: Fact or Fiction?

This Throwback Thursday, we turn the clock back to 1993, when VB asked the key question: could a virus compromise safety at one of Britain's nuclear power plants? 2010 saw the discovery of Stuxnet, which targeted industrial control systems in general, with the specific target of a particular Iranian nuclear facility — but 2010 wasn't the first time VB had reported on a virus infection at a nuclear facility. In 1993, one of the UK's nuclear power plants, Sizewell B, fell victim to the...

The Virus Bulletin
JUL21
Call for last-minute papers for VB2015 announced

Ten speaking slots waiting to be filled with presentations on 'hot' security topics. There's never a dull moment in the world of IT security. Whether you think the breach of spyware maker Hacking Team is the most important story of the past few months, that the breach at Ashley Madison was at least as embarrassing for those affected, or you feel that the fact that anti-virus companies were found to be targeted by a piece of sophisticated malware as well as by intelligence agencies...

The Virus Bulletin
JUL20
Spam levels fall below 50% for the first time in 12 years

Decline not necessarily good news for spam filters. For the first time in 12 years, less than half of email traffic is spam, Symantec reports in the latest issue of its monthly Intelligence Report (pdf). Spam is notoriously hard to measure, and different methodologies, definitions and spam sources can give significantly different numbers. On top of that, spam also differs greatly between recipient users and organizations. So the fact that spam has dropped to less than 50 per cent of...

The Virus Bulletin
JUL20
'NOMORE' attack makes RC4 a little weaker again

No good reason to continue using the stream cipher, yet attacks remain impractical. Researchers from the KU Leuven have presented a new attack against the RC4 stream cipher called 'NOMORE', which is short for Numerous Occurrence MOnitoring & Recovery Exploit. While it is really good research, and while it re-emphasises the point that the cipher should be avoided wherever possible, the attack against HTTPS is of little to no practical use. Bruce Schneier has called RC4 a...

The Virus Bulletin