GeekSquad.com | About Geek Squad | Careers | Media/PR | Contact Us | Store Locator

The Geek Squad Blog

RSS Subscribe to RSS

No Comments
Tuesday, April 15, 2014

Gallery Image

Connecting Your Laptop to Your TV with WiDi

By Agent Gernbacher

With the explosion of video content on the Web, many of us are using our computers, at least some of the time, to just watch TV. Video sharing services like YouTube, Web broadcasting sites like Hulu and Netflix, and pay-for-play services like Amazon Prime and iTunes have made our computers a key source of video entertainment in the modern home.

But anyone who has tried to watch a long video with someone else on a laptop knows, all that closeness is, well, close.

Fortunately, Intel and the television industry have solved this problem for you. Many newer TVs come with a WiDi (wireless display) connection that will allow you to connect your laptop to it wirelessly. I recently teamed with the Best Buy video production team to put together a short instructional video on how to link your Windows 8 laptop to a WiDi-enabled TV. Take a look at the video here:

Send What’s on Your Laptop to Your TV

If you are struggling to link the big screen in your house to your computer, chat with an Agent or visit a Precinct at your local Best Buy store.

Agent Gernbacher has been wrangling misbehaving and unruly Home Theater, PC, and Car Audio technology for the last 15 years. When he is not out saving the world as a Secret Weapon for the Geek Squad, he is preparing his little ones to take over the world, making people laugh with his ridiculous eyebrows and personality, pretending to moonlight as a chef or raging to whatever sounds he can find on the internet.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: Computing | Digital Television | Home Remedies | Home Theater | Wireless Networking

No Comments
Thursday, April 10, 2014

Gallery Image

HeartBleed: The latest threat to our security on the web

By Agent Tanya B.

The web can be a dangerous place for computer users and sometimes the latest news can be scary — much as is the case with the recent news around the recently discovered “HeartBleed” security bug in OpenSSL, a common form of encryption on many websites today.



How do I know if I’m affected?

Unfortunately, as a user there is no way to really know for sure if you’re affected unless your favorite websites explicitly tell you they were affected. Here at Best Buy and Geek Squad, our web sites dealing with your personal data and accounts were not affected by HeartBleed, so your user accounts are safe. However, when it comes to security online, we always recommend being proactive and protecting yourself first and foremost, so here are a few action items that you should take today to protect your data.

Immediately change all your passwords

This is the first step no matter what the security risk. Anytime you feel your data has been compromised, your first step should always be to change all your passwords. This includes your emails, banking, social media — literately any website that has a password that you use frequently needs to be changed. Because the HeartBleed bug may have exposed your login credentials, we recommend immediately changing all of them to ensure no one else has access to any of your accounts. This article on mashable.com identifies some popular accounts and whether or not they were impacted. Choosing strong passwords and changing regularly is still the best practice and this should prompt you to be safe and change all of your passwords even if only as a precaution.

Monitor your identity and personal accounts closely

As with any potential theft of personal data, you should closely monitor all your accounts moving forward. Watch activity on your all your accounts from credit reports, bank and credit statements as well as any other personal accounts like emails for any suspicious activity. Since the HeartBleed bug may have allowed people to see the data you were submitting on secured forms, potentially, they could have gained enough information to steal your identity. Closely monitoring your accounts will help you take quick action in the event your personal details were compromised.

Be vigilant for phishing attempts

Phishing attempts have been a favorite of con artists for a while now and they are constantly looking for ways to make their attempt seem more legitimate. If they were able to use the HeartBleed bug to gain some personal information, like a bank account number or password, they may use it in an attempt to gain more information from you. Never respond to unsolicited emails asking for your personal information and always ensure you only update information on the legitimate websites. Banks and credit card companies will never ask for information via email, only on secured forms.

If you’d like more information on the “HeartBleed” or “HeartBeat” OpenSSL bug, you can read all about it at techcrunch.com.

You can find out more about OpenSSL and their see their April 7th “Security Advisory: Heartbeat overflow issue.” announcement at OpenSSL.org.

Agent Tanya B. has been a woman of technology since 2009. When she steps away from her role maintaining the Geeksquad.com website, Tanya is either at the gym, walking her dog or gaming with the other Agent B. Having moved to corporate from Florida last spring, she’s trying really hard to not complain about the cold too much.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: Technology

No Comments
Friday, April 4, 2014

Gallery Image

Support for Windows XP Ends Tuesday

By Agent Tanya B.

I know we’ve said this before, but it’s kind of a big deal if you are still using Windows XP – Microsoft will stop supporting the XP operating system next Tuesday (4/8/14). Agent Devin Collins gives some advice in our YouTube video.

If you think you are using Windows XP, we suggest you check on a few things:

  1. Confirm that you are using XP. Microsoft has a web site that will detect if you are running XP. To use the service, go to amirunningxp.com
  2. Can you keep running XP. If you are currently using XP and would like to continue with it, there will be a number of things you should take into account. The primary concern is the system itself will be less and less secure as time goes on without security updates from Microsoft. For a good summary of these and other issues brought about by the sunsetting of XP support, visit the Microsoft Stops Supporting Windows XP page on our main website. If you want to go ahead using the system anyway, be sure to visit the What to Do If You Want to Keep Windows XP After Support Ends page on our site.
  3. If you want to upgrade to a newer version of Windows but have an older machine, check to see if you can upgrade to Windows 8 by downloading the Windows Upgrade Assistant from this page. Microsoft is selling the Windows 8 system for users of XP or Vista, but does not sell the older versions of the sytem through their normal channels. Although you may be able to find a merchant willing to sell you a copy of the Windows Vista or Windows 7 operating system, be careful that the merchant selling you the software will back it up. Some legitimate resellers may still have valid copies of the system available, but do your due dilligence whenever you deal with software resellers.

As we said in our earlier posts about the subject, continuing to use XP after Microsoft stops supporting is can leave you open to a myriad of challenges, not the least of which exposing your data to cybercriminals. If would like help dealing with the process, we have Agents standing by.

Geek Squad will continue to support clients that stay on XP to the best of our ability and while we recommend moving to a modern operating support that is supported my the manufacturer, for those that are going to stay with XP should follow some instructions we collected to try to minimize the risk as much as possible.

It is hard to walk away from a system that has served us so well, but, to everything, turn, turn, turn….

Agent Tanya B. has been a woman of technology since 2009. When she steps away from her role maintaining the Geeksquad.com website, Tanya is either at the gym, walking her dog, or gaming with the other Agent B. Having moved to corporate from Florida last spring, she’s trying really hard to not complain about the cold too much.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: Computing | Data | Laptop | News and Events

No Comments
Monday, March 31, 2014

Gallery Image

More on the Retirement of Windows XP

By Agent Tanya B.

As we mentioned in a post last week, Microsoft will stop updating and supporting its Windows XP operating system beginning April 8, 2014.

Our web team collected some information about the sunsetting of XP, and what users should do to improve their network security if they choose to continue using XP. Stopping support of Windows XP means that Microsoft will stop fixing new bugs discovered in the system — providing new opportunities for hackers waiting to take advantages of XP’s new vulnerabilities. Basically, XP will become increasingly insecure as time goes on, and users’ data will be more in jeopardy as time passes without updates.

For more on what this means to people currently using XP and what they can do about it, visit our “Microsoft Stops Supporting Window XP page” on Geeksquad.com.

We also dug around and developed a few recommendations for users who aren’t ready to let go of Windows XP. If you are planning on using XP on your computer after April 8, you should really check out our “What to Do If You Want to Keep Windows XP After Support Ends page” on Geeksquad.com.

If you have questions on how you should handle this, we have Agents standing by.

Agent Tanya B. has been a woman of technology since 2009. When she steps away from her role maintaining the Geeksquad.com website, Tanya is either at the gym, walking her dog, or gaming with the other Agent B. Having moved to corporate from Florida last spring, she’s trying really hard to not complain about the cold too much.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: Computing | How To | News and Events

No Comments
Wednesday, March 26, 2014

Gallery Image

So long, Windows XP (Microsoft Says Farewell to an Old OS Workhorse)

By Agent Williams

It’s official — beginning April 8, 2014, Microsoft will no longer provide updates for that old, faithful workhorse of the masses - the Windows XP operating system.

First launched in October of 2001, XP was a huge leap forward for Microsoft — being a more secure, stable and effective system compared to earlier versions of Windows. While they replaced with Windows Vista six years later, and have released two more OS versions to date (Windows 7 in 2009 and Windows 8 in 2013), lots of people still use the old OS. Now, Microsoft seems ready to put their old XP horse out to pasture.

When Windows XP was originally released, I was initially reluctant to make the switch — mostly due to the amount of money I earned on my paper route, and the hefty price tag for XP at the time. (Plus, Windows 98 was doing everything I needed it to do: mainly play Doom and Age of Empires.) When I finally got my hands on a copy of XP, I realized all the changes made for a much more enjoyable Windows experience.

Windows XP helped me achieve a great deal: build my first web page, compose and record my first song, create my first logo, and (of course) fix dozens of interesting tech issues for my friends and neighbors. So while I moved on from Windows XP long ago, I’ll always have the fond memories of those early days.

So, for you XP lovers out there – never fear. XP isn’t going to “turn off” on April 8. It will keep working on your machine once support ends. What’s going to happen is this: Microsoft will stop sending out security updates and bug fixes for the OS. In turn, this makes the OS increasingly vulnerable to malware and hacker exploits. If you keep using XP, you run an ever-growing risk of exposing your private data to hackers, and the potential for identity theft grows right along with it. Don’t want to take that risk? Then Geek Squad strongly recommends you update your operating system to one that is supported (Windows Vista, 7, 8 or 8.1) that have the latest security updates needed to help keep your data safe and secure.

If you are using XP because your computer is old and cannot accommodate a newer version of Windows… well, that’s a bit of a problem. Your only solution may be to retire the old machine and buy somthing newer. (When it comes to your financial data, better safe than sorry.)

We are preparing some content for our web site about the XP shutdown. Keep an eye on this space, and we will link to it when we get it published.

Agent Williams joined the ranks of Geek Squad in 2007, earning the badge number #13337 and the alias “Agent Leeet Sauce”. Now Agent Williams protects the internetz from the Geek Squad Magic Castle. When he’s not policing unruly technology (or eating cookies) he can be found making music, chasing down his badge (it’s been on a trip to the stratosphere) or riding his imaginary pet unicorn.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: Computing | News and Events | Technology

No Comments
Thursday, March 13, 2014

Gallery Image

Beware the Netflix Phishing Scam

By Agent Derek M

Last week we published an blog post about how to avoid being a victim of a phishising scam. We hope you took a minute to read it. Although some think the identity theft that happens on the Internet is techie wizardry, nearly all of it can be thrwarted by just being a little more aware of what you’re doing when you’re out on the big bad Web. Skepticism is always the best first line of defense against cyber criminals.

I recently ran across a story on the Malwarebytes Unpacked blog, a site maintained by a computer security company dedicated to the belief that “everyone has a fundamental right to a malware-free existence.” The story brings to our attention a new flavor of the ‘computer support – you have malware -let me unlock your computer for you scam’ that was the subject of a post I did last summer. Although the scam itself is similar to the ones we have been talking about here lately, I wanted to bring it to your attention because of the hook this one uses.

In this instance, a potential victim goes to the Netflix home page to log in to their account and, after putting in their login information, are presented with a pop-up informing the user that Netflix had suspended their account because some suspicious activity had been detected. The pop-up displays a phone number and instructs the user to call that number to regain access to your account.

It’s a pretty typical fake tech support center scam when it comes down to it. But because so many of us are regular Netflix users, I wanted to get this out their to help you protect yourself.

Here’s what the pop-up looks like:

netflix scam popup

Here’s an article about the scam from the British version of Wired.com:
Watch out for this Netflix ‘tech support’ scam

Here’s the original Malware Unpacked blog post about it:
Netflix Phishing Scam leads to Fake Microsoft Tech Support

As always, be careful out there on the Interwebs.

Agent Derek has been removing techno-stress from the lives of his Geek Squad clients since 2005. When not providing remote help as an Online Support Agent, he likes to take to the road on a vintage motorcycle for adventures through Ohio country highways.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: Computing | Security Threat Alert | Technology

No Comments
Wednesday, March 12, 2014

Gallery Image

Geek Squad Takes Over the YALSA Twitter Feed

By Agent Tanya B.

As part of their Teen Tech Week celebration (March 9 – 15), the Young Adult Library Services Association asked us to take over their Twitter stream for a day. We will be posting tweets about tech on the YALSA feed today from 8:00 AM to 8:00 PM.

Find the YALSA page on Twitter @YALSA

Agent Tanya B. has been a woman of technology since 2009. When she steps away from her role maintaining the Geeksquad.com website, Tanya is either at the gym, walking her dog, or gaming with the other Agent B. Having moved to corporate from Florida last spring, she’s trying really hard to not complain about the cold too much.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: News and Events

No Comments
Thursday, March 6, 2014

Gallery Image

Google Does "Takeout":
Your Data is Now Easier to Download

By Agent Ron G.

Google – owners of the the most popular website in the world (according to Alexa) – has never been satisfied being just the primary search engine to the Web. Between mapping the Earth through Google Maps and attempting to make everyone a data input via Google Glass, Larry Page and Sergey Brin have converted Google into one of the main forces driving innovation in the world.

 

Nowadays, Google looks like a company moving beyond it’s original mission of managing the internet’s data. With the development of their free software services (Gmail, Google Calendar, Blogger, etc.), Google has revolutionized the way people interact online. Their light, mobile-friendly applications provide standard tools anyone can use to write documents, share pictures, schedule appointments and stay in touch. As computing becomes more mobile, the availability of small, standardized cloud-based applications will become even more important to the public – and Google seems well-positioned in this regard.

However… there is also the issue of portability. A serious criticism of free software programs is this: many of them are proprietary and files generated by these tools often can only be read and edited by that tool. Worse yet, many web-based apps don’t allow users direct access to their own data. (For some of us, that’s kinda hard to live with.) I don’t feel good unless I know where my data is and can manipulate it as I see fit.

This was originally true of many of the Google Data Tools. But then a group of Google developers banded together to form “The Data Liberation Front” and that all changed.

Beginning in June 2009, Google began making data generated by their applications available for download by account users. The “Google Takeout” project was started as a way to give Google users the control over their data they wanted. They started by making available data from Google Buzz, Google Contacts, Google Streams and Picasa Albums. The project shortly added Google Plus and Google Voice to the list of available data. Over the next two years, data from other Google applications was added based on user request.

But it wasn’t until December 2013 that the project was able to make available arguably their most popular and most sensitive data – messages from Gmail accounts. (Seriously, who doesn’t have a gmail account by now?) Now, your emails are no longer stuck on the Google servers.

At this time, the Takeout project supports 14 Google products, ranging from documents stored on Google Drive to events you are tracking on your Google Calendar. Takeout allows users to select the data they would like to have by application, converts it into a single ZIP file and makes it available for download through the user’s Google account.

To find out more, visit the Google Takeout page here.

Agent Ron G. has been battling the forces of unruly technology run amok since 2001, prior to Geek Squad’s acquisition of Best Buy. When not busy creating video & technical training content for Geek Squad Agents in the field, Agent Ron enjoys home brewing, international travel, sketch writing, and learning how to cook new cuisines.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: Computing | How To | News and Events

No Comments
Friday, February 28, 2014

Gallery Image

Phished In! (How to Avoid Being Hooked By a Phishing Scam)

By Agent Patrick B.

Has this ever happened to you? You open an “official-looking” email that looks like it’s from your bank, credit card, etc. The message is dire — someone may be messing around with your account, and only clicking on a link to “correct” or “verify” your account information will save you. Hurry! Quick! Do it now! Without even thinking about it, fear of loss drives you to click on the link and supply the information requested (and breaking one of the cardinal rules of online security in the process).

SNAP! You’ve just been reeled in… by a phishing scam. (Don’t feel too bad… lots of smart people fall for the same thing all of the time.) Why?

Phishing scammers — people attempting to harvest your valuable, private information (like passwords or credit card information) by posing as trustworthy organizations or businesses – are all over the Internet. Everyone with an email account has probably seen a phishing email, which often looks uncannily like something from your bank, company, etc. Common to all of them is an inciting message — something requires your action NOW, or there will be problems.

The good news is that, although some phishing scams create pretty convincing email layouts, there are usually clues that you can find that all is not right with their request. We recently ran across a blog post on CNET that discusses ways to tell if an email is part of a phishing scam. It’s got some really good tips in it to help you avoid falling victim to these scams. Take a look at it here:

Spot a Phishing Email in 2014

One of the keys to keeping your identity safe online is to never give up your information easily. In the fast-paced rhythm of today’s world, is easy to rush from one task to the next without much thought. Fraudsters running phishing scams rely on that — distracted users are easy targets.

Phishing relies on people’s predilection toward following rules, and being helpful and cooperative. Online hustlers are skilled social engineers, manipulating people to turn their natural tendencies and good intentions into profit. So, when responding to a “your data has been stolen” or “click here for a prize” email, remember to slow down and ask yourself one question – why do they need it? Legitimate outfits won’t ask you for information they already have, so any such request is a dead giveaway that something isn’t right.

Be careful if an email offers an easy fix to your information being compromised. If a legitimate organization had their customer database compromised, they will be very careful about reestablishing contact with customers. They will also go out of their way to assure you that they are who they say they are, and will take care to protect your information — and definitely will not deploy a one-click solution to this problem.

For more on phishing and online scams, check out some of our recent blog posts:

Phone Scams and Computer Repair: Know Your Facts to Protect Your Computer

Online Shopping During the Holidays, Part 1: Let’s Be Safe Out There

Online Shopping During the Holidays, Part 2: Scamming in the Wireless World

Agent Patrick B. has been an Agent with the Geek Squad since 2005. When he isn’t overseeing the Geek Squad Web and Social Media presence, he can be found wandering the streets of Minneapolis in search of a fresh source of caffeine to fuel his all night gaming sessions.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: Computing | Data | How To | Security Threat Alert

No Comments
Thursday, February 20, 2014

Gallery Image

Routers & Malware: No Longer Just Your Computer That's Vulnerable

By Agent Williams

Warning: it isn’t just your computer at risk from hackers. Some recently discovered issues with wireless routers from two different companies show that they too can be vulnerable to hacker exploits that can leave your data exposed to online evildoers. In one case, the affected routers allowed hackers to access data on the victim’s network, while in the other the router was used to distribute a self-replicating worm onto other users’ networks.

Users of Asus RT routers have reported that a router flaw allows hackers access to data on external USB hard drives attached to the router. Although some security experts believe that only users who have turned on the https service (part of the router’s AICloud feature) were affected, some users have reported their systems were compromised even though they never enabled that feature.

The best way to secure these potentially hackable routers is to update the router’s firmware, make sure all default passwords have been changed, and deactivate any remote access options. For more details on this, check out the excellent article about the situation on ARS Technica.

Dear Asus Router User: You’ve Been Pwned, Thanks to Easily Exploited Flaw (Ars Technica)

Security experts have also identified activity online indicating a persistent attack on networks using Linksys routers, particularly those of the Linksys E series. The attack involves the distribution of malware designed to seek out and hijack other networks connected to the Internet by vulnerable devices. Although experts have not been able to identify the purpose of the attack, it is consuming significant bandwidth in specific IP ranges. Some speculate the attackers may be testing their ability to assemble a botnet (a network of compromised computers) that could exploit the Linksys router vulnerability.

Observers say simply restarting the router appears to remove the malware. However, this does not prevent the router from being reinfected. It appears that routers using updated firmware do not become infected, so it is suspected that the vulnerablity must be part of earlier versions of the firmware. Users with Linksys routers in the E series should go to the Linksys website and look for the 2.1 version of the software.

For more on this router-based vulnerability, check out this detailed article on ARS Technica:

Bizarre Attack Infects Linksys Routers With Self-Replicating Malware (Ars Technica)

If you think your system may have been compromised, we offer a Virus and Spyware Removal Service online, on-site and at Precincts in Best Buy stores.

Agent Williams joined the ranks of Geek Squad in 2007, earning the badge number #13337 and the alias “Agent Leeet Sauce”. Now Agent Williams protects the internetz from the Geek Squad Magic Castle. When he’s not policing unruly technology (or eating cookies) he can be found making music, chasing down his badge (it’s been on a trip to the stratosphere) or riding his imaginary pet unicorn.

1 Star2 Stars3 Stars4 Stars5 Stars
(No Ratings Yet)
Loading ... Loading ...

Digg Digg      Delicious Delicious      Technorati Technorati

Categories: Computing | Data | Security Threat Alert | Wireless Networking

Note: Comments are moderated and will be handled as per our privacy policy. Please keep your comments on-topic and free of profanity. For more information, please view our Blogging Terms of Use.

Recent Posts

Categories

Archives

Blog Roll

Tech Sites

Tag Cloud