Windows 10 Start Menu stopped working

Windows 10 as an upgrade has had a few glitches. The latest issue has been the inability for the Start Menu to operate properly. While adding the Start Menu back into the operating system was a welcome site for many it didn't come without its own issues. There has been a reoccurring issue where it stops working. Some of the files relating to the Start Menu can become corrupt and render it useless. Here is a simple fix. Press CTRL ALT DEL then select the Task Manager - Press the [Ctrl] + [Alt] + [Del] keys on the keyboard at the same time, or right click the Taskbar, and select Task manager. Run a new Windows Task after clicking on FILE - When the Task manager window opens, click the More details option to expand it, then select Run new task from the File menu. Run Windows PowerShell - When the Run new task dialog box opens, type powershell, tick the box for Create this task with administrative privileges and click OK.   Run the System File Checker - Type sfc /scannow into the window and press the [Return] key. The scan may take some time and will end with one of three results. Windows did not find any integrity violations and Windows Resource Protection found corrupt files and repaired them mean there are now no corrupt files, but Windows Resource Protection found corrupt files but was unable to fix some (or all) of them indicates a problem. In this latter case, type (or copy and paste) DISM /Online /Cleanup-Image /RestoreHealth into the PowerShell window and press the [Return] key. This will download files from Windows Update to replace the corrupt ones and, again, this may take some time. If you have gotten this far and the issue still has not been resolved call us at 973-248-9500. We will be glad to fix this for you.  

New Computer Scam. Dell is NOT calling you

Reposted from Cyberheist News   A number of people using Dell PCs have been contacted by scammers claiming to be Dell Tech Support who actually had specific data that only Dell could have had. We're talking the customer service tag number, a support number printed on a sticker on every Dell computer. I have used Dell machines for 20 years and am very familiar with that sticker. This is a variant on the Microsoft tech support scam where they call PC users and claim they have detected a problem with the person's computer and need to fix it. End-users gullible enough to give access to their workstations (usually via remote software), are billed hundreds of dollars on their credit card but the scammers of course don't fix anything — and in some cases their PCs are infected with ransomware until they pay up. Last week, there was a story where a man said he called Dell about a problem with his optical drive, and soon after he got a call from a scammer who knew about his specific problem and had his service tag number and other customer information. In October the company posted a warning about this type of telephone scam on its website, but it doesn't mention a service tag number hack. Dell does not seem to know what exactly is going on and is investigating. To me it seems that one or more of their servers have been compromised and support data has been infiltrated and used by scammers. Dell needs to fix the leak. In the meantime I suggest you send this to your employees, friends and family: "There is a new tech support scam doing the rounds. This time it is cyber criminals with foreign accents calling you, claiming they are from Dell and they even have the correct service tag of your Dell PC. They will try to manipulate you into giving them access to your computer so that they can "fix the problem" and charge your credit card or worse, infect your computer with ransomware.  

Ransomware 2016

Computrs Inc welcomes the New Year with a warning for all computer users. This year will be known as the year of Cyberterrorism. On all fronts home users or small to medium computer network we will be seeing a substantial increase in cyber threats.   Last year the FBI threw up their hands and announces it was unable to protect the American Public from the threat known as CYRPTOWALL aka CRYPTOLOCKER.   For anyone who has not followed this infection it encrypts all of the files on a computer or network. The encryption key is then held for ransom starting at $500.00 on the first day and doubling the amount each day. Unfortunately there is no work around or fix for Cryptowall short of paying the ransom. If your computer backup is connected to the infected computer the backup will also become encrypted.   We have protected our clients for nearly 30 years from various computer issues. While the latest security issues are challenging we strive to help our clients maintain a healthy computer system.  Whether you’re running Microsoft or Apple computers we support new and outdated operating systems.  
Ransomware In 2016: What To Look Out For
It is clear that a ransomware crime wave will surge across America and Canada. Here is what we expect will happen in 2016 and what you need to look out for:
It is clear that a ransomware crime wave will surge across America and Canada. Here is what we expect will happen in 2016 and what you need to look out for:Ransomware attacks doubled in 2015 and will double again in 2016. The U.K. is to some extent a bell-weather for the U.S. as they function as a beta test site for Eastern European cyber mafias who can test malicious code in their own time zone. Well, over half (54%) of all malware targeting UK users in 2015 contained some form of ransomware. Buckle up.   The use of Cryptowall 4.0 will explode, and Cryptowall V5.0 will add an actual working "feature" that the TeslaCrypt strain only threatened with: extortion by potentially publishing private personal or sensitive business files on the Internet.   Cryptowall will be the first strain of ransomware to hit a billion dollars in total damages.   Ransomware is the new APT: "Annoying Persistent Threat", as it will be increasingly used in double-payload attacks combined with other scams.   Ransomware-as-a-service hosted on the TOR network and using Bitcoin for ransom payment enables a new generation of cybercrime newbies to make their mark.   Cyber mafias will focus on professional services firms and local government using Cryptowall as their tool and extort tens of thousands of dollars from organizations that don't want their business disrupted or their intellectual property compromised.   A new sleeper ransomware variant will start to stealthily encrypt data, pull your critical files onto a C&C Server, and wait until a backup been made. At that point they will yank the encryption key and demand a much larger amount of ransom than the current 500 bucks.   Bonus Wild-Ass Guess: Ransomware gets bundled with worm-like malware to "brick" all the Windows endpoints and servers of a targeted organization. Cybercriminals will use this technique on a large scale, demanding millions in Bitcoins from their victims and may even offer "innovative" payment plans with protection terms.