Having trouble finding a particular photo from your family trip four years ago? Finding yourself with multiple copies of the same document and not sure which edits are the latest? February 13th just happens to be National Clean Out Your Computer Day.
on 08-28-201508:30 AM - last edited on 07-28-201609:47 AM by rstyle
As summer winds down, students everywhere are looking for school supplies and picking out the perfect backpack. But just having enough pens and notebooks isn’t enough anymore. Students of all ages are finding they need some tech in their backpacks too. Now is a good time to ensure all that technology is ready to go back to school as well.
Symantec’s Intelligence report for June shows a marked drop in spam received by business email users worldwide. Their metrics show businesses received a little less than half the spam they usually receive over a month. Perhaps the spammers are taking vacation days as well?
Agent Alex has been following news about the Cryptowall, Cyptolocker and Crowti malware as part of his service as a member of our Technical Tools Team. He reached out to say that there have been some recent developments to which we should pay attention. Let’s let him tell it.
It can happen in an instant. You click on an attachment from Granny and the next thing you know you are watching your files getting locked up before your eyes. Then an important-looking message pops up on your desktop demanding you pay a substantial fee to a group you’ve never heard of using a online payment method. They make it clear – pay now or you’ll never see the precious photos of your Chihuahuas again.
For many, the most important thing on their computer is their data. Whether it’s photos of family events, small business financial records or a music library, your data is usually more valuable than any other files or software on your computer.
byAgent-TanyaB07-14-201410:08 PM - edited 07-14-201611:19 AM
In honor of Geek Squad’s 20th birthday, Commissioner Chris Askew, a number of Agents from across the country and a couple of Best Buy Blueshirts rang the opening bell at the New York Stock Exchange (NYSE) on Monday, July 14.
In the United States, the vast majority of adults drive cars. But most of us don’t really know how they work. Sure, we know to fill it with gas occasionally and how to operate them, but when it comes down to how the engine engages the drivetrain, most of us are at a loss. (That’s why we all have mechanics, right?)
Google – owners of the the most popular website in the world (according to Alexa) – has never been satisfied being just the primary search engine to the Web. Between mapping the Earth through Google Maps and attempting to make everyone a data input via Google Glass, Larry Page and Sergey Brin have converted Google into one of the main forces driving innovation in the world.
Has this ever happened to you? You open an “official-looking” email that looks like it’s from your bank, credit card, etc. The message is dire — someone may be messing around with your account, and only clicking on a link to “correct” or “verify” your account information will save you. Hurry! Quick! Do it now! Without even thinking about it, fear of loss drives you to click on the link and supply the information requested (and breaking one of the cardinal rules of online security in the process).
Warning: it isn’t just your computer at risk from hackers. Some recently discovered issues with wireless routers from two different companies show that they too can be vulnerable to hacker exploits that can leave your data exposed to online evildoers. In one case, the affected routers allowed hackers to access data on the victim’s network, while in the other the router was used to distribute a self-replicating worm onto other users’ networks.
Long distance relationships (LDRs) are not for the faint of heart. The late-night phone calls, frantic searching for low-cost airfares, the random text messages in the middle of the day, the joyous reunions and sad separations can take a lot out of a person. No matter how strong the connection between you and your loved one is, the miles between you can take their toll. Sometimes all you want to do is see his or her face.
A couple weeks ago, I wrote a post encouraging everyone to make backing up their data their New Years’ resolution. As I was reviewing the different ways to create data backups, it struck me how many devices we use on a daily basis now create and store digital files.
on 01-09-201402:59 PM - last edited on 05-04-201610:41 PM by Crystal-BBY
If experience has taught us anything, it’s that computer-related scammers are persistent. By the time law enforcement catches on and alerts the public, the con-artists are already on to their latest scheme to separate you from your hard-earned cash.
It’s that time of the year again – time to take a good hard look at yourself and resolve to be better next year. And yes, time for magazines, TV news shows and blogs to suggest a New Year’s resolution for you. Yeah, irritating, we know. But this is one you should pay attention too. It’s not that hard and could save you a lot of grief when the inevitable happens.
byAgent-TanyaB12-12-201303:17 PM - edited 07-14-201611:14 AM
As the holiday shopping season ramps up, a lot of us are on the lookout for good deals on gifts for family and friends. With all the shopping available online these days, maximizing your gift budget is as easy as firing up your smartphone and hitting your favorite shopping site.
According to an Information Week Report, the adoption rate of public cloud services has expanded consistently for the past four years. In a recent survey, 30 percent of respondents said they were using a cloud provider, and an additional 40 percent said they were planning on using or evaluating cloud sevices.
Imagine this – you are sitting at home minding your own business when you receive a phone call from an official sounding person telling you that your computer is seriously infected with viruses. They say they will help you out and eliminate the viruses if you will provide a credit card number.
Becoming technologically dependent is an almost unavoidable hazard of living in the modern world. The PC you are reading this post with is probably the most important (and least appreciated) piece of technology in your life. And, like other significant aspects of our lives (grandparents, dental health, houseplants), we often neglect the care and upkeep those things we will really miss when they’re gone.
The makers of the Opera web browser announced recently that their internal network was “breached” earlier this month. The company says they have resolved the issue, and that it doesn’t appear that any user information was touched. However, the intruder was able to infect the browser update file, and some Windows users of Opera may have downloaded the infected update.
So you splurged over the holidays and bought a brand-spanking-new laptop. Or you decided to pool all those gift cards and upgrade your home computing hardware. Let’s face it – you needed to put that old desktop that was still running Windows XP out to pasture. Feels better, doesn’t it?
Security experts have issued several warnings about security holes in recent versions of the Java software from Oracle. Java is used in web browsers across operating systems like Microsoft Windows and Mac OS X, and is primarily used by websites to display dynamic content on your browser and some downloadable applications.
The holiday season is fast approaching and more people than ever are purchasing gifts for friends and family online. Unfortunately, ’tis also the season for online crime, and cybercriminals are on the lookout for ways to interfere with your online shopping. Whether it’s your smartphone, tablet, or computer, you need to protect your personal information in order to shop safely and securely online.
Have you ever had that sick feeling in your gut when you think you deleted a really important file and aren’t sure if you can get it back? Trust me – I’ve been there, and it is the worst. Since that fateful day, I learned to back up duplicates of all my data on external drives.