Broken Smartphones: Fix These Common Problems

September 3rd, 2013

Broken smartphone

Apple offers a valuable trade-in program for customers who are upgrading to the newest iPhone model. The catch is that your phone has to be in working order. Fixing your phone is certainly worth it when it means potentially getting more than $200 towards your next iPhone.

Amazon, Best Buy and Verizon are just a few of the other options you have when looking to get some money back on your used phone. Those options include Android phones as well. But, a working phone will always get more money than one that can only be salvaged for parts.

Joshua Brustein, of Business Week, published some common smartphone problems and how to fix them.

  •  Water damage

We all know someone, maybe it’s you, who has dropped their phone in a toilet, washing machine, pool or spilled water all over it. Putting a wet phone into a bag of rice is a commonly known solution, but there are some problems. The phone needs to be put into rice immediately after coming in contact with water and should not be turned on. Rice also probably isn’t a solution if the phone is soaked. A hair dryer is helpful, but blowing hot air on electronics can be just as harmful as the water, so use the lowest setting and use it in short bursts. 

  • Headphone jack doesn’t work

This is a common occurrence because lint from your pocket or dust gets caught in the headphone jack. Cleaning out these foreign particles usually fixes the problem. Many people suggest cutting down a q-tip, then dipping it in alcohol. For the record, Apple doesn’t recommend this treatment because alcohol is corrosive if it contacts certain parts of your smartphone. 

  • Physical buttons stop working

Maybe the home button on your iPhone is stuck, or you can’t use the back button on your Android anymore. Once again, this is a problem that can be cleaned away. While alcohol is again a popular solution, be careful not to use much and watch where you put it. If you just want your phone to be usable again, there are workarounds such as iPhone’s “assistive touch”, which allows you to use the touchscreen for everything your broken physical buttons usually do. 

  • Cracked screen

Though there are some who consider a cracked smartphone screen to be a fashion statement, most would prefer to have it fixed. There are kits available online that include tiny tools so you can fix your own phone. While they will give you the tools necessary to complete the job, they don’t guarantee success. For this common problem, it’s usually best to rely on professionals. 

Geek Rescue fixes all of the common problems listed here and more. Whatever the problem with your smartphone, we’ll get it in working order. Call us at 918-369-4335, or bring your device in to Geek Rescue today.

Don’t Forget To Back-up Your Android Device

August 29th, 2013

Back up plan

What would happen if you lost everything that is currently being stored on your Android device? You may initially think it wouldn’t be a big deal because you don’t have any vital or valuable data stored on your smartphone or tablet, but consider how much personal value is stored there.

Pictures, videos, text messages, contact information and potentially much more information that isn’t available anywhere else would be lost if something happened to your smartphone or tablet. Geek Rescue is often able to restore previously lost information from broken devices, but in some cases the information is lost forever. That’s why you should always have a back-up plan.

Jill Duffy, of PC Mag, describes how to back up your Android device in case the worst scenario plays out. She accurately points out “the key to backing up is redundancy”, which means you should have important information saved in multiple places.

  • Copy the SD card to your PC

This is the first step because it’s the easiest, most complete and it’s free. You’ll want to go through your device and make sure everything you want to back up is saved to your SD card, and not just to your hard drive. Once you connect your device to your PC with a USB cable, you’ll be able to copy everything from your SD card to a folder on your PC. You’ll want to make a note of the date you made this back-up and try to keep it updated as much as possible. 

  • Automated back up in the cloud

There are a number of apps to help you keep your data backed up regularly. These usually cost money for the apps themselves, and sometimes charge a regular fee for storage space. The upside is it takes minimal effort to back-up your data and it is regularly scheduled in advance so you always have an up-to-date copy of your information. 

  • Backing up text messages

The previous two methods don’t create back-ups of your text messages. If you’re the type that regularly wipes out all of their text messages, then you won’t have a need to back them up. If you’re the more sentimental type, however, you might want a record of your texts. There are a number of paid third-party apps that make this process simple. You’ll be able to save texts to your Gmail account, or to the cloud. 

Again, the more copies you have saved and the more places you save them, the better off you’ll be in case of disaster. This article applies specifically to Android devices, but remains true for any device you use to store information that holds value to you.

For help with data storage, back-ups, or to recover lost data, contact Geek Rescue at 918-369-4335.

 

 

Android Users Have Highest Risk Of Malicious Attacks

August 29th, 2013

Android Smartphone malware

The most used mobile operating system in the world is Android. If you own an Android device, you’re also the most likely to be the victim of a malicious attack.

The BBC reports that Android users were 79-percent of attacks on mobile devices in 2012. Apple’s iOS, on the other hand, suffered less than 1-percent of attacks.

The simple fact that more users are available through Android than iOS plays a role in why hackers dedicate more time to that operating system. Another reason is chalked up to Android’s very architecture. The same thing that makes Android so developer friendly and customizable also makes it susceptible to malware.

There have been many security vulnerabilities exposed in older version of Android operating systems. Since many users are still using devices with those systems installed, they are still at risk. Apple, on the other hand, reports that more than 93-percent of their users have the latest operating system installed on their device.

Two key threats have been identified as the main sources of malware infections. One, Text trojans, sends unsolicited SMS messages to users containing harmful links. The other are fake sites that appear to be the legitimate Google Play store, but actually contain harmful apps.

Although older versions of the Android operating system are most at risk, newer version have displayed vulnerabilities as well. Recently, the so-called ‘Master Key’ bug allowed hackers in China to take control of a number of Android phones.

To keep your device safe, you need a combination of security apps and smart surfing practices. To increase the security on your device, be it Android, iOS, mobile or desktop, call Geek Rescue at 918-369-4335.

How Cloud Computing Helps Your Business

August 27th, 2013

Cloud computing for business

Over the past few months, cloud computing has become one of the hottest buzzwords of 2013. Many are still unsure of exactly what cloud computing is, however. Many more are unsure how to implement a cloud system into their business.

Cloud Business Review posted six advantages afforded to businesses who implement cloud computing to help those who are still wary of the technology.

  • Speed of Deployment

A cloud system is implemented usually within 24-hours. A network this powerful would require an IT-team and weeks to finish, but the cloud accelerates and simplifies the whole process. As a cloud provider, Geek Rescue customizes your cloud system based on your needs and gets you up and running almost immediately. There’s no need to add hardware or personnel. 

  • Minimal Downtime

The nature of the cloud allows it to be uploaded to a server quickly. This means that when a server hosting the cloud goes down, your system is moved to a working server with hardly any downtime. This means costly outages when employees stop working are a thing of the past. 

  • Mobility and Sharing

Even for small businesses, ensuring that the right employees have access to vital files is difficult. The cloud makes sharing much easier and allows for employees to access files for virtually anywhere. With mobile access, your employees work from anywhere and always have access to the files or applications they need. 

  • Easy Upgrades

Over time, your needs will likely change. A cloud network is highly scalable and allows you to increase memory or data storage quickly. While a physical network would require days of work and probable downtime to finish upgrades, the cloud effectively increases your capabilities in no time. 

The uses for cloud computing are practically limitless. Regardless of your industry, call Geek Rescue at 918-369-4335 to discover how the cloud could help you do business more efficiently.

Testing Reveals Many Effective Mobile Security Apps

August 27th, 2013

Mobile security

Adding security software to your smartphone or tablet is a necessity. Just as you need protection from malware on your home computer, you mobile device needs protection too. In fact, since you’ll be traveling around and possibly using unsecured networks, security on your mobile device may be even more important.

One major concern for many users, however, is how much battery will be drained by effective mobile security apps. As Paul Lilly writes for Maximum PC, AV-Comparitives, an independent testing lab, put 16 of the top security apps to the test to find out which one you should consider for your mobile device.

Surprisingly, for the leading apps battery usage isn’t much of a concern. Even the security apps that drain your battery the most won’t take more than about 3-percent.

Most of the apps were also incredibly effective detecting malware. In fact, all but one detected at least 98-percent of almost 3-thousand malicious applications collected for the test.

The lesson here is that there are a number of effective mobile security apps available to keep your device safe without hurting performance. There are even free options that perform as well as some of their paid counterparts.

Without these apps, your mobile device could be infected by malware, which results in a loss in performance and the monitoring or harvesting of your data. Some malware is even capable of taking over functions of your device, like sending texts or taking pictures.

For help keeping your devices secure or to clean or fix a device, call Geek Rescue at 918-369-4335. Like we always say, if it boots up or turns on, we fix it.

Smartphone’s Anti-Theft Tool Renders Phone Useless

August 26th, 2013

Smartphone bricked

When your phone is stolen, there are a number of things to worry about beyond just getting a new phone. All of our smartphones carry personal information that is used to access our online accounts when it falls into the wrong hands. Before getting a new phone, our first concern should be to lock down access to our old phone.

As Jaeyeon Woo reports for the Wall Street Journal, Samsung and LG are taking measures to not only prevent smartphone theft, but also to keep your data safe after theft. Their new anti-theft tool, or “kill switch”, would completely disable a phone that’s been reported stolen. This means the device becomes inoperable, even with a new SIM card or hacking procedures.

A growing business overseas is to ship and sell stolen smartphones to the U.S. This “kill switch” feature would take a tremendous bite out of that industry. However, users will have to register their devices before they are stolen in order to use the kill switch function.

Samsung and LG’s efforts build on the recently publisized developments for Android phones to help find and lock lost and stolen phones. Those using iOS devices also have similar functions to protect their lost and stolen devices.

The kill switch, however, is seemingly the first tool that bricks a device in any circumstance. Since the phone is rendered useless, the hope is that thefts will drop dramatically. In any event, users won’t have to worry that the theft of their smartphone will also lead to the theft of their identity.

To keep your smartphone or other device more secure, contact Geek Rescue at 918-369-4335. We offer a variety of security options and also fix broken devices and devices with infected with malware.

How Many People Knowingly Open Spam?

August 23rd, 2013

Spam email frustration

When spam email arrives in your inbox, it’s easy to ignore it, delete it and forget about it, right? Well, maybe not so easy for many of us.

As Chris Matyszczyk, of CNet, reports, a recent study found that about 30-percent of people knowingly, willingly opened an email that they knew, or at least strongly suspected, was spam. Why? Sometimes, the promise of something too good to be true is too good to pass up.

To make matters worse, about 9-percent of people willingly downloaded attachments included in the spam email. So, they thought it was spam, opened it anyway and downloaded the attachment. Sometimes, we make it too easy for the hackers.

Those hackers, however, don’t make it easy for users. It’s because of the social engineering they employ that it’s so enticing to open messages we know we shouldn’t. The most popular tactics are the promise of money, sex or a new friend.

This behavior is why having antivirus software installed on your computer isn’t enough to keep you fully secure. It is this human error that often causes viruses and malware to infect your PC and steal your data.

These tempting spam attacks extend beyond your email inbox, as well. You’ll see similar tactics used on social media and in text messages. You’ve likely already received a text from an unknown number informing you that you’ve won some money or are entitled to a free gift card. When those arrive on our smartphones, it’s easy to identify them as spam, but sometimes it’s much more difficult to delete them and move on.

If you’d like to improve the security on your email, or need to clean and fix a device that’s infected with malware, contact Geek Rescue at 918-369-4335. We understand spam is tricky, but we will fix whatever harm has been done.

Scam Text Claims Your Email’s Been Hacked

August 23rd, 2013

Scam text message

Imagine your text alert on your smartphone goes off. You eagerly check your new message and find that it’s from an unknown number telling you that your email account has been hacked. The message informs you that you’ll need to text back a word or phrase that they give you, likely to verify your identity or something. What do you do next?

The Federal Trade Commission is warning the public not to text back. These text messages are part of a new scam and the target is your personal information.

When you reply to these texts, the scammers gain information about you and your smartphone. This gives them the tools they need to access your data and compromise your accounts.

Even though plenty of people around they world learn the unfortunate news that their email has been hacked, there probably aren’t many, if any at all, that are warned via text message from their email provider. If you are contacted about a compromised account, be it your email, bank account or credit card, the company will likely do it on a more secure channel.

These text messages may also include a link for you to follow for more information or continue the process of fixing your email. These links are tempting as you want to find out more information, but don’t click them. Just by following the link, you’ll likely be installing malware onto your device, which hackers use to monitor your activity and steal your data.

What you can do is alert your phone’s provider about the message. Most of the large providers have a spam number you can call, or forward these text messages to.

If you feel that malware, or any other type of malicious software, has been installed on your phone or your smartphone is just not performing like it should, contact Geek Rescue at 918-369-4335. We fix smartphones.

Retina Display: What Does It Mean?

August 22nd, 2013

Retina display

You’ve no doubt heard the term “retina display” but do you really understand what that means and why it’s desirable?

Retina is an Apple trademark and used for displays on the iPhone and iPad. Apple uses it to convey to consumers that anything that’s not Retina isn’t good enough.

Whitson Gordon explored this for Lifehacker. Retina is really a term that just sounds better than saying your display is good enough.

When Apple tells you your display is Retina, they’re telling you that the resolution is high enough for your screen size that you won’t be able to see individual pixels. The pixel density, or PPI, which stands for pixels per inch, doesn’t need to be as high on a small iPhone screen as it would be for an iPad or television. So, all Retina displays are not created equal.

When you’re buying an Apple device that has Retina display, however, you can be sure that you’re getting the best display needed for that device. Anything higher would be hardly noticeable and be a drain on performance.

Regardless of whether you have an Apple device or not, you can test your display to find out if it’s up to the Retina, or good enough not to see pixels, standard. Use this handy calculator to find out what the PPI is and measure it against the size of your device.

If you encounter problems with your display or any other aspect of your smartphone, tablet, mp3 player or computer, contact Geek Rescue at 918-369-4335. If it boots up or turns on, we’ve got you covered.

Google’s Latest Innovation To Protect Your Smartphone

August 22nd, 2013

Smartphone security

Everyone is clamoring for an upgrade in security for their smartphone and Google has applied for a patent that seemingly will do just that.

Alex Colon, of GigaOM, writes that Google patented a “location-based security system for portable electronic devices.” So how will this help keep your smartphone safe?

You’re already letting Google know where you are all the time. Using Google Maps or just leaving location based searches on, your GPS and Google already have a close relationship.

This new technology builds off of that to change the settings on your phone based on where you currently are. For example, when you’re at home, the security settings will be set to low because there is little chance of anyone swiping your phone from your coffee table. However, when you venture outside and into public, your phone will automatically beef up security due to potentially more dangerous surroundings.

Without you having to physically change anything, your phone will demand a password to advance past the lockscreen. Other security measures may be put in place, as well.

We’ll have to wait and see exactly how Google plans to use this new patent. In the meantime, contact Geek Rescue at 918-369-4335 to discover all of your options for keeping your smartphone safe and secure. We protect devices from hacks, viruses and malware and also fix broken devices.