Home Info Services Rates SubmitIT
Good Morning

Who We Are
Manhattan computer repair service
NYC Geeks is the premier computer repair and technology service provider for homes and businesses in the New York metropolitan area. We are certifiable geeks with years of hands on experience and proven techniques for a broad array of products & services.

What We Do
Manhattan computer repair service
We are ready to resolve all of your technical problems. Our think-tank of technicians offer an extensive array of services to repair or advance your technology platform.

Contact Us
Manhattan computer repair service
Available on-site or remote: 7 days a week. Talk to an expert or schedule service contact us online via our SubmitIT page or phone: (877) 311 - GEEK (4335).

Technology News
Manhattan computer repair service

Spy Agencies Planned to Corrupt Google Play - Posted on Wednesday December 31, 1969

The United States and its leading Western allies, known as the "Five Eyes," reportedly planned to hack into smartphones through their links to Google and Samsung's app stores. They wanted to infect apps with spyware and find ways to send misinformation to targets, according to documents released to the media by National Security Agency whistle-blower Edward Snowden.

Simplicity Linux Makes Good on Its Easy-Peasy Promise - Posted on Wednesday December 31, 1969

The latest edition of Simplicity Linux, version 15.4, recently became available for download. Simplicity Linux delivers just what its name suggests: It is a simpler way to run a fully powered Linux desktop on any computer you touch. Simplicity lets you carry your entire desktop, favorite installed applications, and complete collection of documents and files in your pocket everywhere you go.

DoT: Time to Get Serious About Car Talk - Posted on Wednesday December 31, 1969

United States Department of Transportation Secretary Anthony Foxx recently called for accelerating the timetable to develop technology allowing communication between cars and highway infrastructures. The end goal is to effect a shift in automotive safety goals: Rather than improving the odds of surviving a crash, the goal will be to avoid crashes completely.

Apple Fiddles With MacBook Pro, iMac Features and Pricing - Posted on Wednesday December 31, 1969

Apple on Tuesday announced performance enhancements for the MacBook Pro and a new configuration and price changes for the iMac. The new 15-inch MacBook Pro with its Force Touch trackpad and improved flash storage, battery and graphics performance is available immediately online, starting at $1,999. The Force Touch trackpad first appeared in the latest 13-inch MacBook.

Fove VR Headset Locks Onto Your Gaze - Posted on Wednesday December 31, 1969

Fove is the first virtual reality headset to feature eye-tracking -- meaning, among other things, that characters you view on screen can look right back at you. So far, close to 500 people have pledged nearly $200,000 to bring the Fove VR headset to fruition. Just a day into its 45-day Kickstarter campaign, the Fove appears certain to reach its $250,000 goal.

Russia Aims to Build US-Free Mobile OS - Posted on Wednesday December 31, 1969

Russia wants to develop alternatives to proprietary or partly closed mobile operating systems by using open source tools as a foundation, Minister of Telecom and Mass Communications Nikolay Nikiforov said last week. "Success would make a fairly significant impact on the go-to market plans of numerous IT vendors," said Charles King, principal analyst at Pund-IT.

Venom Less Toxic Than Heartbleed - Posted on Wednesday December 31, 1969

It was a little over a year ago that the Heartbleed bug shocked the Internet with its potential for mischief. Now another flaw in open source code has sent network administrators into damage control mode. The bug, called "Venom" for "Virtualized Environment Neglected Operations Manipulation," allows an intruder to jump out of a virtual machine and execute malicious code on its host.

Cossacks 3 Could Revive RTS Game Genre - Posted on Wednesday December 31, 1969

GSC Game World has announced it will release Cossacks 3, a new version of the popular real-time strategy title Cossacks: European Wars. It will be available for PC, Mac and Linux machines later this year. Cossacks 3 is a modern remake of the original game that debuted in 2001, which was unique in that players could control hundreds of individual units at a time.

The Rampant, Risky Babbling of Android Apps - Posted on Wednesday December 31, 1969

Eurecom researchers recently developed an Android app that can monitor the network traffic of other apps to alert users of suspicious or malicious activity. With more than 1.2 million applications in the Google Play store, there are multiple programs for performing a particular task. That can make choosing an app a chore for users, they noted in a report released last month.

Researcher's Airplane-Hacking Claims May Not Fly - Posted on Wednesday December 31, 1969

A security researcher who last month bragged he'd hacked into a passenger jet's internal computer systems while in flight appears to have performed the act more than a dozen times over a three-year period. Chris Roberts, founder and CTO of One World Labs, told FBI investigators earlier this year that he'd hacked into the flight systems of commercial passenger aircraft from 15-20 times.

NASA's $2.25M Challenge: 3D-Print a Space Base - Posted on Wednesday December 31, 1969

NASA and America Makes have challenged innovators in the additive construction market to design a habitat for deep space exploration for the first stage of the competition and to fabricate such facilities in the second phase. The organizations will award a $50,000 prize and a pair of $1.1 million purses for the winners of the multistage challenge. Registration opened for phase one on Saturday.

Makulu Gives Unity a Good Name - Posted on Wednesday December 31, 1969

Makulu Linux now is one of the first major distros to integrate the Unity desktop. It was more than worth the wait! The Unity desktop is Ubuntu's flagship desktop environment. Canonical pushed through its development several years ago as a way of introducing users to its "unifying" computing platform for all devices. It removed the traditional panel bar and two-column application menu.

Will Apple TV Be Busting Out All Over? - Posted on Wednesday December 31, 1969

I want to believe that Apple will launch a new Apple TV hardware device in June at its Worldwide Developers Conference -- but holy macaroni, it's been more than three years since Apple introduced the third-generation Apple TV. Of course, Apple made a barely noticeable hardware tweak more than two years ago, but I'm begging for an Apple TV that's far more than just a utilitarian tool.

The Future According to Qualcomm - Posted on Wednesday December 31, 1969

I was at the Qualcomm Internet of Things event in San Francisco last week during what was a major IoT event in the city. What is kind of amazing is the larger event was just a small part of the applications show that used to go on at the same time. This year it is twice the size of that older show. Companies are flocking to this IoT concept like ducks to water.

Google's Driverless Cars to Leave the Nest - Posted on Wednesday December 31, 1969

Google on Friday announced it will begin testing prototypes of its fully autonomous self-driving cars on public roads. The vehicles won't roam too far from their Mountain View, California, home -- but this latest phase of testing could be critical both for cultivating positive consumer perceptions, and influencing future legislation affecting the nascent sector.

Gadget Ogling: A Tracking Camera Drone, a Rockin' Speaker and a Water-Boiling Efficiency Expert - Posted on Wednesday December 31, 1969

Camera drones certainly are growing in popularity -- or further polluting the sky, depending on your perspective. A new model plans to follow your every move, thanks to a tracker on your wrist. After you throw Lily, it will fly up to 50 feet in the air and 100 feet away from you, knowing where you are and keeping its lens focused on whatever you're doing.

Reddit Flaps Gums at Harassers - Posted on Wednesday December 31, 1969

Reddit has announced a new policy prohibiting personal attacks. "We are updating how we apply existing policies to address new types of harassment on Reddit," said company spokesperson Heather Wilson. However, Reddit did not indicate what action it would take against harassers. Instead, it promised a thorough investigation by the company and a response based on the nature of the harassment.

FireEye, Microsoft Outsmart Clever Chinese Malware - Posted on Wednesday December 31, 1969

FireEye and Microsoft have scotched a scheme by a group of cybercriminals based in China to use an IT pro forum to hide malicious activity, according to a report released Thursday. The Chinese gang known as "APT17" devised the scheme, which uses forum pages and profiles on Microsoft's TechNet, to cover traffic from machines infected with the group's Black Coffee malware.

Consumer Group Worries Over Safety of Google's Self-Driving Cars - Posted on Wednesday December 31, 1969

Even though Google's self-driving technology was not at fault in any of 11 minor accidents involving the cars over six years of testing, Consumer Watchdog has raised an alarm over the vehicles' safety, even releasing a video that simulates a serious crash in a tech-failure scenario. The group frequently accuses Google of privacy violations and exerting undue influence on the U.S. government.

Venom Vulnerability Could Violate Virtual Machines - Posted on Wednesday December 31, 1969

Crowdstrike on Wednesday made public its discovery of yet another long-buried Linux vulnerability. "Venom," as it has been dubbed, was unearthed by the firm's senior security researcher, Jason Geffner. It is listed as vulnerability CVE-2015-3456. Venom exists in the virtual floppy drive code used by virtualization platforms based on QEMU, or quick emulator. It has been around since 2004.

Security Alerts
Manhattan computer repair service

IC3 Issues Internet Crime Report for 2014 - Posted on Friday May 22, 2015

Original release date: May 22, 2015

The Internet Crime Complaint Center (IC3) has released its Internet Crime Report for 2014, indicating that scams relating to social media — including doxing, click-jacking, and pharming — have increased substantially over the past five years.

US-CERT encourages users to review the IC3 Alert for details and refer to the US-CERT Tip ST04-014 for information on social engineering and phishing attacks.


This product is provided subject to this Notification and this Privacy & Use policy.


Google Releases Security Update for Chrome - Posted on Tuesday May 19, 2015

Original release date: May 19, 2015

Google has released Chrome version 43.0.2357.65 for Windows, Mac, and Linux to address multiple vulnerabilities. Exploitation of one of these vulnerabilities could allow a remote attacker to take control of an affected system.

US-CERT encourages users and administrators to review the Google Chrome blog entry and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Cisco Releases Security Advisories for TelePresence Products - Posted on Thursday May 14, 2015

Original release date: May 14, 2015

Cisco has released two security advisories to address multiple vulnerabilities in TelePresence products. Successful exploitation could allow an attacker to bypass system authentication, execute arbitrary code with elevated privileges, or cause a denial-of-service condition.

Users and administrators are encouraged to review Cisco Advisories cisco-sa-20150513-tc and cisco-sa-20150513-tp and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Mozilla Releases Security Updates for Firefox, Firefox ESR, and Thunderbird - Posted on Tuesday May 12, 2015

Original release date: May 12, 2015

The Mozilla Foundation has released security updates to address vulnerabilities in Firefox, Firefox ESR, and Thunderbird. Exploitation of one of these vulnerabilities may allow a remote attacker to cause a denial-of-service condition or steal sensitive information.

Available updates include:

  • Firefox 38
  • Firefox ESR 31.7
  • Thunderbird 31.7

US-CERT encourages users and administrators to review the Security Advisories for Firefox, Firefox ESR, and Thunderbird and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Adobe Releases Security Updates for Flash Player, Reader, and Acrobat - Posted on Tuesday May 12, 2015

Original release date: May 12, 2015

Adobe has released security updates to address multiple vulnerabilities in Flash Player, Reader, and Acrobat. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.

Users and administrators are encouraged to review Adobe Security Bulletins APSB15-09 and APSB15-10 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Microsoft Releases May 2015 Security Bulletin - Posted on Tuesday May 12, 2015

Original release date: May 12, 2015

Microsoft has released 13 updates to address vulnerabilities in Microsoft Windows. Some of these vulnerabilities could allow elevation of privilege, denial of service, remote code execution, information disclosure, or security feature bypass.

US-CERT encourages users and administrators to review Microsoft Security Bulletins MS15-043 - MS15-055 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Cisco UCS Central Software Vulnerability - Posted on Friday May 08, 2015

Original release date: May 08, 2015

Cisco has released a security advisory to address a vulnerability in the web framework of Cisco Unified Computing System (UCS) Central Software. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system.

US-CERT encourages users and administrators to review the Cisco Security Advisory and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


WordPress Security and Maintenance Release - Posted on Thursday May 07, 2015

Original release date: May 07, 2015

WordPress 4.2 and prior versions contain critical cross-site scripting vulnerabilities. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected website.

Users and administrators are encouraged to review the WordPress Security and Maintenance Release and upgrade to WordPress 4.2.2.


This product is provided subject to this Notification and this Privacy & Use policy.


Apple Releases Security Updates for Safari - Posted on Thursday May 07, 2015

Original release date: May 07, 2015

Apple has released security updates for Safari to address multiple vulnerabilities. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of the affected system.

Available updates include:

  • Safari 8.0.6 for OS X Yosemite v10.10.3
  • Safari 7.1.6 for OS X Mavericks v10.9.5
  • Safari 6.2.6 for OS X Mountain Lion v10.8.5

US-CERT encourages users and administrators to review Apple security update HT204826 and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.


Nepal Earthquake Disaster Email Scams - Posted on Thursday April 30, 2015

Original release date: April 30, 2015

US-CERT warns users of potential email scams citing the earthquake in Nepal. The scam emails may contain links or attachments that may direct users to phishing or malware infected websites. Phishing emails and websites requesting donations for fraudulent charitable organizations commonly appear after these types of natural disasters.

US-CERT encourages users to take the following measures to protect themselves:

  • Do not follow unsolicited web links or attachments in email messages.
  • Maintain up-to-date antivirus software.
  • Review the Federal Trade Commission's Charity Checklist.
  • Verify the legitimacy of the email by contacting the organization directly through a trusted contact number. Trusted contact information can be found on the Better Business Bureau National Charity Report Index.
  • Refer to the Security Tip (ST04-014) on Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

This product is provided subject to this Notification and this Privacy & Use policy.


- Posted on Wednesday December 31, 1969

- Posted on Wednesday December 31, 1969

- Posted on Wednesday December 31, 1969

- Posted on Wednesday December 31, 1969

- Posted on Wednesday December 31, 1969

- Posted on Wednesday December 31, 1969

- Posted on Wednesday December 31, 1969

- Posted on Wednesday December 31, 1969

- Posted on Wednesday December 31, 1969

- Posted on Wednesday December 31, 1969