Contact us today!
(518) 203-2110

Evolve IT Blog

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Bitcoin Use Reaches Record Levels, Despite Its 2014 Fiasco

b2ap3_thumbnail_new_bitcoin_400.jpgBitcoin, a cryptocurrency used for anonymity on the web, was once the hottest thing on the cyber market. Everyone thought it was a great innovation that allowed for improved online privacy for transactions. Thanks to some rather complicated matters, though, Bitcoin took a nosedive and has needed some time to get back on its feet. Now, it seems people are finally using Bitcoin again, and in a never before seen quantity.

Continue reading
0 Comments

Alert: Hackers Targeting ATMs to Get At Your Cash

b2ap3_thumbnail_atm_malware_400.jpgATMs are probably everyone’s favorite kind of computer. You swipe your card, enter in your PIN, and withdraw cash immediately. Many people forget that an ATM is simply a computer in disguise, though; one that can be infected with malware just as easily as any old PC can. A new type of ATM malware, GreenDispenser, is making its rounds in Mexico, and could potentially make its way to other countries if left unchecked.

Continue reading
0 Comments

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Business Malware Software Business Computing User Tips Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Google Windows 10 IT Support Mobile Devices Innovation Smartphone Gmail Ransomware Hardware Network Security Bandwidth Facebook Microsoft Office Office Backup Apps Operating System Business Continuity Disaster Recovery Communication Hacking The Internet of Things Social Media WiFi Networking Data storage Small Business Phishing Windows App Data Experience Mobile Computing communications Big Data Safety Unified Threat Management Quick Tips Mobile Device Management Money Network Smartphones Managed Service Provider Outlook Firewall Content Filtering Cybercrime Wireless Technology Website Android Apple Best Practice Employer-Employee Relationship Alert Two-factor Authentication History Monitors Music Router Office 365 Cryptocurrency Laptop IBM Displays Google Docs Education Saving Money Analytics Lithium-ion battery Cleaning intranet Holiday YouTube Processors End of Support Black Market Office Tips LiFi Staffing BYOD Social Networking Downtime Streaming Media Help Desk Writing Public Speaking Passwords Micrsooft Virtualization Visible Light Communication Disaster IP Address Data Management Business Growth Government Augmented Reality Robot Keyboard Advertising Recovery Search User Society Sports Spam Retail Hard Drives Google Wallet Remote Computing Shortcut Information Technology Running Cable DDoS Windows 8 Internet of Things Word Windows XP IT Services Managed IT services Heating/Cooling Hosted Solution Artificial Intelligence Documents Tech Support Compliance Drones Business Management Bluetooth Social Browser Automation Competition Printer Entrepreneur Virtual Desktop Wireless Memory Presentation Domains Unified Communications Securty Encryption Deep Learning Document Management Law Enforcement SaaS VoIP BDR Hacker Cortana Vendor Management Application Proactive IT Network Congestion Customer Service Save Money
QR-Code