September 4th, 2013
The growing trend of BYOD, Bring Your Own Device, means that more and more employees are using their personal smartphones on company networks. The initial concern surrounding BYOD is that sensitive and valuable information will be stored on personal devices and potentially lost or stolen. But, as Sam Narisi points out for IT Manager Daily, there’s another significant threat to consider.
A security researcher for Tripwire recently demonstrated how a single compromised Android device could be used to hack into a company’s IT infrastructure. This is possible through Google apps, which many companies use for cloud computing and email.
Android uses a “single sign-on” feature, which means that users aren’t asked to continuously authenticate their Google account with a password. Instead, the Android device stores a cookie the first time you authenticate your account and remembers that your device and your account are linked.
The problem is similar to forgetting to log-out of your email or social media account on a shared computer. For example, if you’ve ever checked your Facebook page at a computer lab or library and forgotten to sign-out when you left, you probably ended up with some joke statuses on your account. College students know exactly what we’re talking about.
For this Android flaw, when an employees device is lost or stolen, their accounts remain active. Whoever holds that device has access to everything stored in Google apps, including the employee’s email account.
An intelligent hacker, however, doesn’t even need to physically hold the Android to access Google apps. If they are able to infect the device with malware, they could also gain similar access to Google accounts.
The simplest fix for this security flaw is to keep anyone from accessing corporate Google apps with their Android device. Failing that, keep from downloading any extraneous apps, especially outside of the Play Store. That will go a long way in keeping malware off your smartphone.
For more help keeping your smartphone or other device safe and secure, contact Geek Rescue ta 918-369-4335. We offer a variety of security solutions for both home and business.
September 4th, 2013
When it comes time to replace your current laptop or tablet, you may find yourself wondering which device you should get. Should you replace your laptop with a tablet, or replace your tablet with a laptop?
Brian Westover, of PC Mag, dove into this issue to help you decide what type of device is right for you. Here are some key points to consider.
What do you need to do with your new device? Laptops have the clear edge on pure power. They handle internet browsing, streaming video, gaming and even photo, video and audio editing. Many also feature Blu-ray compatible disk drives. But, don’t pay for power you don’t need. Tablets are well-equipped to allow you to surf the internet, stream video and audio.
Tablets have touchscreens and no keyboard, although you can add one to almost any tablet. If you plan to use your device to type a lot, or use programs with heavy-mouse usage, a tablet’s form might be frustrating. Laptops, however, offer built-in keyboards and touchpads.
Both devices are able to be packed up and taken with you. However, tablets have the edge in mobility because of their light-weight and excellent battery life. Even the laptop with the best battery life will struggle to keep up with a tablet.
This is a no brainer. If price is the only factor you care about, you’re getting a tablet. An efficient, capable tablet will cost you less than $300. Even top of the line iPad’s are well under $1-thousand. Conversely, a top of the line laptop gets extremely pricey. But, you’re paying for quite a bit more power.
Many people decide not to make the choice between laptop and tablet and instead own both devices. If you’d rather opt for one device to keep up with, however, it comes down to personal preference.
For maintenance and fixes on your laptop or tablet, call Geek Rescue at 918-369-4335. We fix all of your devices and offer fast, friendly service.
September 4th, 2013
If you own a computer, or any device really, you’re likely to encounter problems from time to time. But, as Ben Kim of CIO points out, some of the more common problems have easy fixes that you can handle yourself.
Regardless of the problem and before you try anything else, restart your computer. There’s a reason this is cliched advice. For many issues, a restart will put everything right.
Your system will slow down when your hard drive gets too full. If you’ve noticed a sluggish performance, try clearing some space. Windows users will also want to use Microsoft’s System Configuration tool to trim down the number of applications that open automatically on start-up. To access it, press Windows-R, type “msconfig” and hit Enter.
If your downloads are taking longer than they should, test your connection speed. You can do this on a number of websites. Resetting your modem and router is also a good idea before contacting your Internet Service Provider.
If you’re seeing a high number of pop-ups ads, you’ll want to make sure you have a pop-up blocker enabled in your browser. If they appear when you aren’t even surfing the internet, you’ve got adware. This usually stems from you installing a program that had adware hidden in it. To remove it, try running any security software you may have, or installing new adware-specific programs.
If you’re sitting in range of your wireless router, but you still get a weak signal or constant disconnects, there are a couple of fixes. First, try resetting the modem and router. Then, let Windows troubleshoot the problem for you by right-clicking on the Wi-Fi icon in the taskbar and selecting ‘Diagnose Problem” or “Troubleshoot Problems”.
We’ve all had our share of printer-related headaches. Check to make sure there’s enough ink, toner and paper and the notification light isn’t blinking. Turn the printer off, then back on. You can even completely unplug the power supply and wait a few seconds before plugging it back in. If you still can’t print, check to see if the “Use Printer Offline” option is enabled. Windows will switch this automatically in some circumstances so make sure to uncheck it.
If these fixes don’t work or you have a more serious issue, call Geek Rescue at 918-369-4335. Our team of techs fix any problem your device may have. Give us a call, or bring your device to one of our convenient locations.
September 3rd, 2013
If you’ve had your iPhone or iPad for over a year, chances are it’s running a little slower than it should. If so, you have two options. You can buy the newest model from Apple, or you can get the most out of your old model with a few tricks.
Whitson Gordon, of Lifehacker, suggests using some tricks to speed up your old Apple device before giving in and buying a new one.
Your favorite app might prompt you to update to the latest version, but don’t be too hasty. That latest version may have more features and demand more resources than your old device can handle. That could make your favorite app nearly unusable on your phone or tablet. If you are a couple of generations behind, apps and even the iOS updates will begin to leave your device behind. If it works well now, consider sitting the updates out.
The apps that Apple included on your device usually work best. So, while you may prefer a different internet browser, that third-party app won’t run as fast as the included Safari. This isn’t a big deal for newer devices, but if you want to milk as much speed out of an old device as you can, it helps to use the native apps.
The more storage space being used on your device, the slower it will get. You’ll even be at risk of crashes. So, clean up that storage space by deleting anything you don’t need or use. Apps you rarely use are usually the first to go. This may also mean you need to trim down your music library and find another place to store pictures and videos. It’s also a good idea to delete old text messages.
You may have decided to jailbreak your device to be able to customize it better or to gain new features, but that may also cause it to slow down over time. If you have an older device that’s gotten too sluggish, consider unjailbreaking and uninstalling all of those custom features. This may get your device back to working order.
At Geek Rescue, we fix broken devices and help to keep them running well for longer. If your device is broken, or just not working as well as it should, bring it in for a tune-up. Come by or call us at 918-369-4335.
September 3rd, 2013
Apple offers a valuable trade-in program for customers who are upgrading to the newest iPhone model. The catch is that your phone has to be in working order. Fixing your phone is certainly worth it when it means potentially getting more than $200 towards your next iPhone.
Amazon, Best Buy and Verizon are just a few of the other options you have when looking to get some money back on your used phone. Those options include Android phones as well. But, a working phone will always get more money than one that can only be salvaged for parts.
Joshua Brustein, of Business Week, published some common smartphone problems and how to fix them.
We all know someone, maybe it’s you, who has dropped their phone in a toilet, washing machine, pool or spilled water all over it. Putting a wet phone into a bag of rice is a commonly known solution, but there are some problems. The phone needs to be put into rice immediately after coming in contact with water and should not be turned on. Rice also probably isn’t a solution if the phone is soaked. A hair dryer is helpful, but blowing hot air on electronics can be just as harmful as the water, so use the lowest setting and use it in short bursts.
- Headphone jack doesn’t work
This is a common occurrence because lint from your pocket or dust gets caught in the headphone jack. Cleaning out these foreign particles usually fixes the problem. Many people suggest cutting down a q-tip, then dipping it in alcohol. For the record, Apple doesn’t recommend this treatment because alcohol is corrosive if it contacts certain parts of your smartphone.
- Physical buttons stop working
Maybe the home button on your iPhone is stuck, or you can’t use the back button on your Android anymore. Once again, this is a problem that can be cleaned away. While alcohol is again a popular solution, be careful not to use much and watch where you put it. If you just want your phone to be usable again, there are workarounds such as iPhone’s “assistive touch”, which allows you to use the touchscreen for everything your broken physical buttons usually do.
Though there are some who consider a cracked smartphone screen to be a fashion statement, most would prefer to have it fixed. There are kits available online that include tiny tools so you can fix your own phone. While they will give you the tools necessary to complete the job, they don’t guarantee success. For this common problem, it’s usually best to rely on professionals.
Geek Rescue fixes all of the common problems listed here and more. Whatever the problem with your smartphone, we’ll get it in working order. Call us at 918-369-4335, or bring your device in to Geek Rescue today.
August 30th, 2013
Protecting your security and keeping your privacy online is possible. It takes more of a commitment than just keeping your antivirus software updated, however.
John Okoye, of Techopedia, suggests that your own browsing habits have as much to do with security as your security software. Here are some of the ways you can protect yourself.
Do a little research and discover how the internet browser you’re using stores your data. It may be tracking your history and selling it to advertisers without your knowledge. However, many browsers have options to surf privately without saving your history or data.
Even if you are extremely careful about who you give your email address out to, you’ll still receive your fair share of spam emails. When one appears in your inbox, don’t respond. That includes following the ‘unsubscribe’ link. Once spammers learn that your email is active, you’ll actually receive more spam than before. Also, be sure to mark the email as spam, rather than just deleting. it. If you find that more spam emails are making through your spam filter, consider adding additional rules, or changing email providers.
- Be Careful With Social Networks
Social media profiles are a resource for hackers. By learning your birthday, address, phone number and email address, they can intelligently hack into other accounts, or send you phishing scams. Be sure to take advantage of security options to keep your information private and don’t over share. There’s usually no reason to include a phone number on your Facebook page.
Do some research and find an secure email provider. One that protects you from spam and doesn’t save your emails in a log. Your email should also be encrypted to ensure that no one but the intended recipient is reading them. You may also consider having multiple email accounts. That way, when registering for accounts on ecommerce sites or anywhere that you don’t want to have your primary or business email, you can use a secondary account.
These are just some of the ways you can take action to stay safer and more secure online. To beef up the security for your home PC or your business network, call Geek Rescue at 918-369-4335.
August 30th, 2013
Windows 8 offers users a unique password option when users sign in. Rather than a text password, users are able to use an image from the Pictures folder to keep their PC secure. Although this is an interesting idea that personalizes a user’s device, it is proving to fail in the security department.
As Thomas Claburn reports for Information Week, a group of researchers created a method for breaking the Windows 8 picture passwords. Their model was successful in hacking a password 48-percent of the time during one test.
To set a picture password, users choose an image, then draw circles, lines or tap different places on the image. When they log-in, they just need to take the same actions in the same order. It’s similar to smartphones that lock with a pattern, rather than a pass code.
Windows 8 does take some precautions to make this method more secure. Most notably, a user is limited to 5 log-in attempts. After a fifth failed attempt, the device is locked down. This means hackers can’t launch a purely automated attack, or brute force attack, that tries every combination possible. During testing, a purely automated attack was only successful about 1-percent of the time.
That is still a significant number of users at risk, and researchers suggested that a higher success rate is likely with a little training. Beyond the technical capabilities of picture passwords, what makes them insecure is how most people use them. When manipulating an image, most people will circle, or tap the eyes and draw a line on the mouth. These tendencies make it much easier for a password to be hacked.
What’s lacking from picture passwords is a strength meter. When you make a password for an online account, most sites will tell you if the password is strong, weak or unacceptable. Windows 8 included no such meter for picture passwords.
Since this is a new log-in method for most people, users won’t know what a strong picture password consists of. A password meter could help ensure that users have a password strong enough to hold up to a hacking attempt.
To keep your machine more secure, contact Geek Rescue at 918-369-4335. We have a variety of security solutions to keep you safe.
August 29th, 2013
The instances of phishing attacks is on an aggressive rise. Over the past 12-months, the number of users who have experienced a phishing attack has risen 87-percent, from 19.9-million to 37.3-million.
During that time, there have also been multiple high-profile attacks, whose victims have included Twitter and the New York Times. Anyone can be a victim to a phishing attack and the rise in victims seems to indicate an increase in the number of threats online. It also suggests that more users need to understand the risks and how to avoid them.
Brian Clark Howard delved into this topic for National Geographic to help educate users so they may be able to avoid phishing attacks in the future.
A phishing attack refers specifically to an online scam use social engineering to coerce users in giving up personal information like social security numbers, bank account information and phone numbers. The most common means of phishing comes through spam emails. These emails are sent to hundreds or thousands of recipients and made to look like official correspondence from banks, service providers or even government agencies. Some include the threat of termination of service, while others will promise money or deals.
Spear phishing is an attack specifically targeting an individual or organization. By using information gleaned from other places, a hacker will put together an email that seems more legitimate because it will include information about you that a random person shouldn’t know.
This is usually how large-scale enterprises get hacked. They’re specifically targeted and employees are tricked into giving out their log in information, which opens the door for hackers to access the company’s network.
Anyone using email is at risk of a phishing scam. Trusting your spam filters helps to avoid many of the lazier phishing attempts, but you’ll also need to be wary of unsolicited emails asking for information you wouldn’t feel comfortable giving out to just anyone. Attachments, links, misspelled words and bad grammar are all signs that the email isn’t legitimate. In nearly every case, it’s better to contact a company by phone instead of replying to an email with personal information.
If you do fall for a phishing scam, you should immediately take action to change your passwords and monitor accounts closely for strange activity.
For help keeping your email secure and beefing up spam filters, contact Geek Rescue at 918-369-4335. We’ll help keep hackers out and your information secure.
August 29th, 2013
What would happen if you lost everything that is currently being stored on your Android device? You may initially think it wouldn’t be a big deal because you don’t have any vital or valuable data stored on your smartphone or tablet, but consider how much personal value is stored there.
Pictures, videos, text messages, contact information and potentially much more information that isn’t available anywhere else would be lost if something happened to your smartphone or tablet. Geek Rescue is often able to restore previously lost information from broken devices, but in some cases the information is lost forever. That’s why you should always have a back-up plan.
Jill Duffy, of PC Mag, describes how to back up your Android device in case the worst scenario plays out. She accurately points out “the key to backing up is redundancy”, which means you should have important information saved in multiple places.
- Copy the SD card to your PC
This is the first step because it’s the easiest, most complete and it’s free. You’ll want to go through your device and make sure everything you want to back up is saved to your SD card, and not just to your hard drive. Once you connect your device to your PC with a USB cable, you’ll be able to copy everything from your SD card to a folder on your PC. You’ll want to make a note of the date you made this back-up and try to keep it updated as much as possible.
- Automated back up in the cloud
There are a number of apps to help you keep your data backed up regularly. These usually cost money for the apps themselves, and sometimes charge a regular fee for storage space. The upside is it takes minimal effort to back-up your data and it is regularly scheduled in advance so you always have an up-to-date copy of your information.
The previous two methods don’t create back-ups of your text messages. If you’re the type that regularly wipes out all of their text messages, then you won’t have a need to back them up. If you’re the more sentimental type, however, you might want a record of your texts. There are a number of paid third-party apps that make this process simple. You’ll be able to save texts to your Gmail account, or to the cloud.
Again, the more copies you have saved and the more places you save them, the better off you’ll be in case of disaster. This article applies specifically to Android devices, but remains true for any device you use to store information that holds value to you.
For help with data storage, back-ups, or to recover lost data, contact Geek Rescue at 918-369-4335.
August 29th, 2013
The most used mobile operating system in the world is Android. If you own an Android device, you’re also the most likely to be the victim of a malicious attack.
The BBC reports that Android users were 79-percent of attacks on mobile devices in 2012. Apple’s iOS, on the other hand, suffered less than 1-percent of attacks.
The simple fact that more users are available through Android than iOS plays a role in why hackers dedicate more time to that operating system. Another reason is chalked up to Android’s very architecture. The same thing that makes Android so developer friendly and customizable also makes it susceptible to malware.
There have been many security vulnerabilities exposed in older version of Android operating systems. Since many users are still using devices with those systems installed, they are still at risk. Apple, on the other hand, reports that more than 93-percent of their users have the latest operating system installed on their device.
Two key threats have been identified as the main sources of malware infections. One, Text trojans, sends unsolicited SMS messages to users containing harmful links. The other are fake sites that appear to be the legitimate Google Play store, but actually contain harmful apps.
Although older versions of the Android operating system are most at risk, newer version have displayed vulnerabilities as well. Recently, the so-called ‘Master Key’ bug allowed hackers in China to take control of a number of Android phones.
To keep your device safe, you need a combination of security apps and smart surfing practices. To increase the security on your device, be it Android, iOS, mobile or desktop, call Geek Rescue at 918-369-4335.