Thursday, October 24, 2013

Holiday Safety



The Holidays are right around the corner. The Mall will be packed. People will be using their credit cards more and more. Online shopping will hit its peak for the year. And many people will become victims of identity theft. 

I was a police officer prior to my career as a geek. I know first hand that Identity Theft victims are desperate, frustrated and often times do not find the help they are looking for. It is a long road to repair the damage done by identity theft. What can you do this holiday season to make sure you aren't the low hanging fruit?

  • Be very careful shopping online and be extra wary of any online store you haven't used before or unfamiliar with. Pay with something like Paypal when it is available. This prevents you from having to enter your credit card information.
  • Turn bluetooth off on your mobile devices, especially in crowded places. It is the #1 way that electronic thieves get into your phone and walk away with your data. 
  • Pay very close attention to your credit card when you hand it over (think of it like watching a magician doing a card trick). Temporary holiday help are not always vetted as carefully, and they can easily capture your card information with a "skimmer" (personal swipe device) or by simply taking a photo of it. 
  • Don't use public/open Wi-Fi for any online shopping, transactions or banking. The best policy with these connections is to not use them at all unless you absolutely have to, and even then, turn it off as soon as you are done. 
  • Be on the lookout for viruses. Viruses that are designed to steal information or log your keystrokes aren't new, but the increase in credit card use online will increase your risk of identity theft by a large margin. 

Stay safe out there! If you have any questions or concerns about identity theft during the holiday season, contact Jon at SuperGeeks! We offer a Safe Computing Seminar which covers more safe browsing habits as well as an affordable Identity Theft Protection Plan!

(806) 722 0770


Wednesday, May 29, 2013

Pop Ups 101



Here at SuperGeeks we see a lot of sick computers. Viruses, unwanted toolbars and other types of malware are common issues with a variety of symptoms. We have developed seminars around what we observe coming in the door, and one of the most common causes for these infections is the owner's lack of confidence in regard to pop ups. Some see a pop up or installation prompt and since they aren't sure about it, they ignore it completely. Others take the opposite approach and click "yes" to almost everything just to get it off the screen. Neither one of these is a good approach.

Over the last few weeks I have received phone calls from customers asking if something is safe to click on, and unfortunately, other customers have been tricked into re-installing malware on their computers. Here are just a few tips to help you recognize when to say yes, and when to be suspicious.


VIP List


There are several items on a Windows PC that will constantly need updating. Most legitimate "updates" are critical for the security of your computer, while others increase stability of the program or provide new functionality. If one of these programs has an update available, it is safe AND very important! Add to this list any programs that you know you have installed that ask for updates (Navica, Google Chrome, Dropbox, Skype etc).


- Windows Updates
-Manufacturer Updates (Toshiba, HP, Dell, etc)
- Java Updates (popup may say Oracle or JRE)*
- Adobe Updates (Reader, Flash Player)
- iTunes Updates (or Quicktime)
- Antivirus Software Updates

You should only have one antivirus program on your PC. Take a look at it from time to time so you recognize what the program looks like. If something pops up and says you are infected, but doesn't have your Antivirus Software program's name on it, and doesn't look the same, "it's a trap!"   

*Be aware that even programs on the VIP List may try to get you to install unwanted programs! For example, Java needs to be updated, but you do not need (or want) the Ask Toolbar it tries to sneak in. Slow down and read what you are agreeing to during installations and updates. 


Suspicious Items

While you should always be aware of what you are clicking, if it isn't on the VIP list, take a little extra time. 

- Pop ups telling you are infected or have problems.
- Pop ups from a program name you don't recognize
- Pop ups with NO program name.
- Any online pop ups
- Anything not on the VIP List or a Program you don't recognize.



Never click directly on any suspicious pop ups. Even though you may be clicking on an "X" or "No", the code behind that button might really say "Install a Virus for me please." Right click on the item on your taskbar, and close it from there.  

When in doubt, do a quick web search for what you are seeing, or call us at SuperGeeks (806 722 0770) and we will walk you through it! If you think you might already be infected, bring it by for a no obligation, $35 Diagnostic!

All of this and much more is included in our Safe Computing Seminar! Head to our training calendar for our complete schedule. Happy Computing!

Tuesday, April 23, 2013

Virus Symptoms






Sometimes an unexpected behavior from your computer is just a fluke; other times, it's an outward and visible sign of an inward and terrible malware infestation. If you notice any of these security warning signs, your system may well be compromised even if you are using an anti-virus and/or anti-malware program. How is that possible you ask? Well the best answer is that sometimes the bad guys just get ahead of the software makers (it’s hard to prepare for a virus that didn't exist yesterday). You also may not have updated your anti-virus program or operating system or you simply may have inadvertently opened a door by clicking a box, opening an email link, downloading a picture or visiting a questionable website.  If that has happened here are just a few examples of what you may see (aside from just really slow performance) and what may be causing it;

1. Popup ads appear even when no browser is open. While not as common as they used to be, adware programs bombard their victims with advertisements and sometimes they contain links to malicious websites; sites that will attempt to drop more malware on your PC.

2. Browser navigation gets redirected. Not every site redirect is malicious, but if you find that trying to reach Google takes you to an unfamiliar search site, you've almost certainly got a problem. One example is a banking Trojan which might divert your browser to a fraudulent site that looks just like your bank's real site.

3. A security program you never installed pops up scary warnings. Creating and distributing fake antivirus programs is a lucrative business. Naturally you have to register a payment before the fraudulent tool will "fix" the problem (which never really existed) and likely leave behind more bad news in the form of one or more virus or malware variants.

4. You send emails, tweets and post on facebook while you sleep. It isn't sleepwalking (well, probably not). Malware focused on Email, Facebook and other social media sites spreads by generating fake posts and messages. Typically these posts include an inflammatory statement of some kind, like "How drunk were you last night? or Who was that man/woman hanging all over you? Look at this picture!" Clicking on that picture or link will make you the next victim and possibly all of your “friends” as well.

5. A program holds you or your PC for ransom. Some malware programs literally hold your PC or data for ransom. Overt ransom ware threats may encrypt all your pictures and documents and demand that you pay to get them back. They may display a warning supposedly from the FBI stating that your computer was used to send spam, you downloaded child pornography or committed some other crime and demands that you pay a fine before you're allowed to use it again. Some versions will even hijack your computer’s camera to snap a picture of you and place it in a “Wanted” poster which is displayed in the demand for payment. Remember to smile!

6. Suddenly you can't use common system tools and programs. An experienced user, suspecting the presence of malware, might run certain programs or check settings. If you find that trying to use these or other system tools triggers an error message, or doesn't work at all, it may be an attempt at self-defense by malware on your system.

If you see a pop-up, an email or a system error that you are unsure of, call or come by and we can help you determine what is causing it, and if need be, reclaim your computer from malware.

Wednesday, April 3, 2013

Phone Pilaf




So, you've dropped your cell phone in the toilet, spilled a drink on your laptop or taken a bath with your iPad and gotten it cleaner than you intended. It’s done, dead and kaput, right? Well, maybe not, but there are many myths, misconceptions and intentional misinformation that pervades the water (liquid) electronic restoration market to the point that it is often difficult to separate fact from fiction. The below will hopefully put to rest some common misconceptions and be informative if you are ever in a "wet phone" situation! We hope you find it useful.

MYTH:
Turn your device off immediately and do not turn back on until dry, and put it in a sealed bag of rice for at least 24 hours. 
Have you ever heard the old adage that the best lies contain at least some truth? This one actually contains a lot of truth, but rice is not the answer.  The phone should be turned off immediately, and battery removed if possible (this requires a special tool on most iPhones). 

What about the rice? Rice is a starch based grain that only becomes water absorbing at 158 degrees F. Ever wonder why people don’t sit around eating raw rice as a snack? A couple of swirls around the mouth and its yummy and soft? I don’t think so. Several studies have actually shown that rice tends to increase the humidity levels inside a closed container. When your phone dries out (mostly on it's own) the rice will have transferred dirt and starch into your phone! This can, and will, interfere with electrical contacts. 

What you SHOULD do if your device gets wet:

Turn your device off immediately, and do NOT turn it back on (#1 cause of wet devices being damaged beyond repair)
- Take the battery out (if possible)
- Wrap it in a towel, paper towels or any absorbent material (there are many excellent commercial products available - but most of us don’t plan that far ahead) 
- Take it, as soon as possible, to a reputable water damage repair facility. Even when dry, the contacts will need to be cleaned to prevent devastating corrosion
- DO NOT use a blow dryer (on cold or hot setting), DO NOT put in rice, and DO NOT put it in the microwave.

Let us know if you have any comments or questions!