GeekSquad.com | About Us | Careers | News & Press | Contact Us | Find a Location

The Archives

Archive for the ‘Wireless Networking’ Category

Connecting Your Laptop to Your TV with WiDi

Tuesday, April 15th, 2014

With the explosion of video content on the Web, many of us are using our computers, at least some of the time, to just watch TV. Video sharing services like YouTube, Web broadcasting sites like Hulu and Netflix, and pay-for-play services like Amazon Prime and iTunes have made our computers a key source of video entertainment in the modern home.

But anyone who has tried to watch a long video with someone else on a laptop knows, all that closeness is, well, close.

Fortunately, Intel and the television industry have solved this problem for you. Many newer TVs come with a WiDi (wireless display) connection that will allow you to connect your laptop to it wirelessly. I recently teamed with the Best Buy video production team to put together a short instructional video on how to link your Windows 8 laptop to a WiDi-enabled TV. Take a look at the video here:

Send What’s on Your Laptop to Your TV

If you are struggling to link the big screen in your house to your computer, chat with an Agent or visit a Precinct at your local Best Buy store.

Agent Gernbacher has been wrangling misbehaving and unruly Home Theater, PC, and Car Audio technology for the last 15 years. When he is not out saving the world as a Secret Weapon for the Geek Squad, he is preparing his little ones to take over the world, making people laugh with his ridiculous eyebrows and personality, pretending to moonlight as a chef or raging to whatever sounds he can find on the internet.

Routers & Malware: No Longer Just Your Computer That's Vulnerable

Thursday, February 20th, 2014

Warning: it isn’t just your computer at risk from hackers. Some recently discovered issues with wireless routers from two different companies show that they too can be vulnerable to hacker exploits that can leave your data exposed to online evildoers. In one case, the affected routers allowed hackers to access data on the victim’s network, while in the other the router was used to distribute a self-replicating worm onto other users’ networks.

Users of Asus RT routers have reported that a router flaw allows hackers access to data on external USB hard drives attached to the router. Although some security experts believe that only users who have turned on the https service (part of the router’s AICloud feature) were affected, some users have reported their systems were compromised even though they never enabled that feature.

The best way to secure these potentially hackable routers is to update the router’s firmware, make sure all default passwords have been changed, and deactivate any remote access options. For more details on this, check out the excellent article about the situation on ARS Technica.

Dear Asus Router User: You’ve Been Pwned, Thanks to Easily Exploited Flaw (Ars Technica)

Security experts have also identified activity online indicating a persistent attack on networks using Linksys routers, particularly those of the Linksys E series. The attack involves the distribution of malware designed to seek out and hijack other networks connected to the Internet by vulnerable devices. Although experts have not been able to identify the purpose of the attack, it is consuming significant bandwidth in specific IP ranges. Some speculate the attackers may be testing their ability to assemble a botnet (a network of compromised computers) that could exploit the Linksys router vulnerability.

Observers say simply restarting the router appears to remove the malware. However, this does not prevent the router from being reinfected. It appears that routers using updated firmware do not become infected, so it is suspected that the vulnerablity must be part of earlier versions of the firmware. Users with Linksys routers in the E series should go to the Linksys website and look for the 2.1 version of the software.

For more on this router-based vulnerability, check out this detailed article on ARS Technica:

Bizarre Attack Infects Linksys Routers With Self-Replicating Malware (Ars Technica)

If you think your system may have been compromised, we offer a Virus and Spyware Removal Service online, on-site and at Precincts in Best Buy stores.

Agent Williams joined the ranks of Geek Squad in 2007, earning the badge number #13337 and the alias “Agent Leeet Sauce”. Now Agent Williams protects the internetz from the Geek Squad Magic Castle. When he’s not policing unruly technology (or eating cookies) he can be found making music, chasing down his badge (it’s been on a trip to the stratosphere) or riding his imaginary pet unicorn.

Online Shopping During the Holidays, Part 2: Scamming in the Wireless World

Wednesday, December 18th, 2013

With the increasing use of Wi-Fi technology and the adoption of social media tools at all levels, we are starting to see some new scams and pirating techniques. Be aware of the following when you are transacting business online.

 

Fake hotspots

In the wireless world, web access is something we all take for granted. Our tablets and smartphones are able to find available wireless networks so easily that we can get lulled into a false sense of security. One of the dangers of connecting to a public wireless network is that it might be set up solely to give some scammer access to your computer.

It is fairly easy for a criminal to use a laptop to broadcast a fake Wi-Fi hotspot masquerading as the access zone of a coffee shop or the login page of a popular wireless service provider like Verizon or AT&T. Once an unsuspecting user is connected to this hotspot, the criminal can mine the user’s computer for banking, credit card or password information. Fake hotspots are a growing concern for wireless users, especially in busy public spaces like airports, coffee shops and libraries.

The best way to avoid being a victim of one of these wireless scams is to make sure your device is not set to connect automatically to non-preferred networks. That way, you’ll see a list of available networks when you boot up your computer and be able to choose a legitimate one (if one is available). If you have any questions about which is the right network, check with someone who works at the location you are logging in from.  Also, avoid doing any banking or shopping on public Wi-Fi networks. If you absolutely must, make sure the network is secure.

Links in messages

Most of us have learned to be careful about clicking on a link sent to us via email. With the growing popularity of social media platforms, email is no longer the only way for our friends and colleagues to send us messages. Facebook instant messages, Instagram “likes,” and “tweets” on Twitter allow us to interact with others in new, convenient and immediate ways.

Unfortunately, the scammers are on social media too — and they use it to distribute “bots” to take over users’ computers in order to send spam email. How do bots get on your computer? Well, remember that irresistable link you clicked on the other day? Yep, that’s the culprit. Because messaging on social media platforms is so instantaneous and mobile, many of us don’t think before we click.

Treat links in tweets and Facebook instant messages the same way you would treat a link in an email. The URL-shortening services that let Twitter users share links give the bad guys the opportunity to hide their original URL, making it even harder to identify malicious addresses. If you get a tweet with what looks like an interesting link for a “free iPad” or some other unbelievable offer, go check the profile of the person who sent it out. If that person is following thousands of people and no one is following them, it’s a bot.

You should always be careful with links in Facebook messages. We’ve all had FB friends who have had their accounts hacked. Treat links in instant messages the same way you treat links in emails – confirm the source and make sure the link is safe.

Banks don’t send texts

Speaking of instantaneous messaging, text messages are increasingly used by fraudsters to gain access to people’s financial information. Scammers will send messages out pretending to be from the recipient’s bank or credit card company, asking them to call “right away” to resolve some issue. When the person responds to the “special” number in the email, they are asked to “confirm their identity” by revealing account information that the scammer will then use to access the person’s account.

Other texts may appear to be from major retailer telling the recipient that they have won a gift card to the store. When they call to claim their prize, the scammer asks for an account address or social security number to confirm the winner’s identity. Or, they might ask for a credit card to pay the “shipping and handling” to have the prize sent to them.

These cons are new approaches to “phishing” scams that been around the online world practically since the first email was sent. These “smishing” scams (SMS Phishing) use the brief, ubiquitous nature of texting to nudge the unsuspecting and harried consumer to put themselves in a position to be pressured by the con artist to reveal important information.

Banks and retailers might send your offers by text message, but they would never ask for your account number or personal information as part of that transaction. If you receive a message that says it’s from your bank or a big name store, it is always best to call source directly at a number that is publicly available. It is also a good idea to check with the Better Business Bureau to see if this scam shows up on their database. The folks at snopes.com also maintain a list of current scams. Their website is a necessary stop for anyone who suspects they have been targeted by scammers. (Plus, it’s kind of fun to read.)

In general, be very careful about volunteering information about you, your location and any financial institutions you use to make online payments when you are out in cyberspace. And keep an eye on your accounts. Don’t wait for the end-of–the-month statement. Get in the habit of checking your bank account or credit card statement online every day or so, particularly when you’ve been doing a lot of shopping, to make certain all the charges are correct.

Resources

Agent Tanya B. has been a woman of technology since 2009. When she steps away from her role maintaining the Geeksquad.com website, Tanya is either at the gym, walking her dog, or gaming with the other Agent B. Having moved to corporate from Florida last spring, she’s trying really hard to not complain about the cold too much.

Your Tablet Sure Is Handy – But Is It Secure?

Tuesday, June 11th, 2013

Mobile computing devices are letting us access the Web (and take care of business) from just about anywhere. Wireless technology now lets us pay our bills at the coffee shop, check our email while waiting for the kids after soccer practice, or take a conference call while getting our oil changed. Tablets and smartphones make it easy to manage our lives and stay in touch with the office while we are out and about.

All of this mobility comes at a price. Identity theft is becoming a real concern, as mobile devices used on open wireless networks could expose your valuable private data to hackers out trolling for their next victim.

Unfortunately, it’s easy to approach security issues a bit too casually when using our tablets — like leaving it sticking out of our backpack while going to the counter for a refill or on the seat of an unlocked car. The very thing that makes these device so convenient also makes it more vulnerable to theft. If you use it to access your bank account, a resourceful thief could figure out how to follow the path into your account.

Our friends at the Naked Security blog recently posted a very handy article on steps you can take to make your tablet more secure. We think all tablet users would benefit from checking themselves against the advice here:

Securing a Tablet for Web Browsing in Six Easy Steps

If you need help setting up your new tablet or mobile email account, we’re here to help.

Agent Ron G. has been battling the forces of unruly technology run amok since 2001, prior to Geek Squad’s acquisition of Best Buy. When not busy creating video & technical training content for Geek Squad Agents in the field, Agent Ron enjoys home brewing, international travel, sketch writing, and learning how to cook new cuisines.

Tips to Get the Most Out of Your Gear

Thursday, May 16th, 2013

“Cool. I didn’t know it could do that!”

That’s a phrase Agents hear every week. Most customers spend a good deal of time preparing for their major tech purchases – comparing features, checking system compatibilities, measuring dimensions and reading product reviews. The strange thing is that many seem to forget how their new gizmos can simplify their lives between the time they say “I’ll take it” and they get it out of the box at home. Yeah, it’s all in the manual, but who has time to read the manual?

We do.

Here are some tips and tricks you may have forgotten since the salesperson mentioned them back at the store. Never hurts to be reminded…

Outsmart Your Smartphone

There’s so much more you can do with a smartphone beyond making calls.

  • Most smart phones include a lot of functionality. Apps are available that will let your phone do many things you used to need your computer for – create spreadsheets, edit text documents, even display PowerPoint presentations. Syncing files and data between your computer and phone is very easy, allowing you to work on the same files using multiple devices. You can also back up or transfer all the data from your smartphone onto your computer, so you do not lose all your contact lists and pictures.
  • If you have an iPhone and Apple TV, you can download the Remote app (iPhone/iPad, free), that will let you use your smartphone as an fully functioning remote control. There are plenty of apps for both Android and iPhone devices (DirecTV, DISH Anywhere and Verizon FiOS) that allow you to browse through channels, control your DVR and more.

Making the Most of your eReader or Tablet

So many people said technology would kill reading as a pastime. But e-readers and tablets have only increased our appetite for the printed word. Here are some steps you can take to help your devices help you.

  • Touch screens, MP3 players and WiFi can reduce the battery life. To make your battery last longer, remember to:
    • Turn off the WiFi when you’re not using it
    • Lower the screen’s brightness, and
    • Turn off auto adjust brightness
  • You don’t have to carry all your content with you. Many tablets and eReaders have wireless capabilities, so you can stream content rather than saving it to your device and taking up memory. Speaking of memory, some tablet and eReader brands have expansion slots, so you can add more memory, on microSD cards for example, as needed.
  • Some eBook stores, like Amazon and Barnes & Noble, have iPhone, Android and PC apps available that will sync eBook purchases Syncing your content allows you to read your ebook on all your devices (smartphone, e-reader, laptop or desktop.)

You’ve Got to See It to Believe It!

These days televisions are for more than watching shows and movies. High-definition displays and internet connectivity mean getting the most out of your TV is a bit more complicated than making sure all the cables are hooked up correctly. Here are some things to keep in mind.

  • Cables are important. While regular cables may work, HD TVs and Blu-ray players work best when connected with HDMI cables. You cannot get a high-definition picture without HDMI cables.
  • Blu-ray players, gaming systems and other devices will need occasional firmware updates to keep them working their best. Frimware is the software that runs your device and updates are available from the device manufacturer’s website. Devices with an Internet connection can be updated directly. Some older devices may need to have the updates transferred to a thumbdrive and updated that way. For more information on firmware and how to update it, check out the 2 Minute Miracle videos we have posted on our YouTube channel.
  • Connecting your Blu-ray player and gaming system to the Internet will give your access to streaming video and other features not available without a connection. Most of these devices will be Web-ready and be able to connect to your wireless network.
  • Most new televisions can be used to display photos and videos from your camera, computer, memory card or smartphone. Many allow you to easily connect your gadgets via USB or insert a memory card to share your photos and videos instantly on a large screen for everyone to enjoy.

Game On for your Gaming Systems

Web connectivity has made gaming systems more fun than that old Nintendo machine you grew up playing.

  • PlayStation 3 and 4, Xbox 360 and Wii all have the capability to connect to wireless networks.By connecting to the Internet, you will be able to download special gaming features, play video games against people anywhere, rent videos and access music.
  • Most gaming consoles are designed to make it easy to meet up with other players online. The Xbox 360 with Kinect adds video to the mix – the system allows users to , video chat with other Xbox 360 Kinect owners and PC users running the free Windows Live Messenger program.It’s a great simple teleconferencing system.
  • With all the connectivity, it can be tough to keep track of what the kids are doing when on the system. Be sure to check the parental control settings on the system to make sure the young ones are going places on the Internet they shouldn’t be.

If you aren’t sure that you are getting everything out of your new computer, home theater or gaming system, we can help.

Agent Ron G. has been battling the forces of unruly technology run amok since 2001, prior to Geek Squad’s acquisition of Best Buy. When not busy creating video & technical training content for Geek Squad Agents in the field, Agent Ron enjoys home brewing, international travel, and learning how to cook new cuisines.

Cooking & Technology: Making Meal Prep Easier

Thursday, April 4th, 2013

The digital age has revolutionized everything around us — including cooking dinner. Whether you’re a novice in the kitchen or a skilled chef, there are a number of smartphone apps, online resources and gadgets that can make your time in the kitchen much less frantic, and much more productive and fun.

 

 And the Iron Chef of the Year Goes to… Your Smartphone Apps

  • What’s for dinner? One too many nights of staring into the refrigerator and dreading another night of leftovers? Fret not, true believers — help is on the way! The AllRecipes.com Dinner Spinner (a free app for Android, iPhone, Windows Phone and Kindle Fire) can provide you with some inspiration. Just enter your meal type (breakfast, lunch, main course, snack, etc.), any ingredients you have available, and preparation time, and voila! A meal is suggested. (You can even turn on filters to specify vegetarian, non-dairy, non-wheat dishes and more.)
  • Managing multitasking mania. From starting the water boiling, to deboning the chicken, to keeping an eye on the buns in the oven, cooking often involves juggling several things at the same time in order to get everything to come out right. Before chucking it all and heading to the local  drive thru, check out the 5 in 1 Kitchen Timer (Blackberry, iPhone $1.99). This handy tool lets you set up multiple timers for each step in the cooking process, reminding you exactly when to flip, fry, frappé and fricassee.
  • Check your labels… digitally! For calorie counters and health-conscious cooks, the USDA Food Database App (Android, $0.99) helps users find the nutritional information for food items based on serving size, covers more than 7,500 food items and dishes, and organizes them by categories for quick searching.
  • It’s 5 o’clock somewhere! Dinner is done, and it’s time to relax with a cocktail. The 8500+ Drink & Cocktail Recipes (iPhone, Android free) is exactly that – a veritable mixed-drink cornucopia, with more entries than you’ll ever need. Pick a new drink to find its recipe or enter the ingredients you have on hand and let it suggest one. Bottoms up!

Keeping Track of Cooking Trends

Keeping up on the latest recipes, techniques and events from your favorite cooking sites can mean a lot of clicking and digging through things. This is where RSS (Really Simple Syndication) comes in very handy. RSS lets you create a newsfeed from the sites you are interested in, letting you keep up on new content from those sites without digging through them one-by-one. Most websites and blogs offer RSS feeds and there are a number of free RSS readers available free.

Another option are services like Pocket (http://getpocket.com) — a internet browser add-in that allows you to bookmark a page for reading later. Adding Pocket (Android, iOS: free) on your smartphone, tablet, and computer makes it easy for you to check out your recipes wherever you go.

Cooking and Video: The 101 Approach to Cooking

Cooking shows are popular today. So is internet video. Put them together, and bam — you’ve got a world of culinary options.

The old tried-and-true method for finding videos of your favorite cuisine prep is Youtube — and why not, since it has such a huge base of contributors? But if you are looking for something with a little better quality (no shaky cam, lighting, good sound and smooth cuts), then check out HowCast & VideoJug — two DIY based video sites that both have a wide range of recipes & quick, helpful tips demonstrated by experts. And if you want to take a master class in a subject? Check out Craftsy — where world renowned experts like Peter Reinhart and others hold online seminars on artisan bread baking, cheese making, cake decoration and more – for around the same cost as your average cookbook today.  

Feasting with Your Eyes

Want to drink in the latest and greatest of cooking online, before you make the plunge on a recipe? Foodgawker and Tastespotting are here for you, providing colorful rows upon rows of pictures from the latest in food blogging beauty. See something you like? Click through to the food blog, with recipes and ample pictures to guide you through duplicating that recipe in your home.

Cook and Dine With the Family – Virtually

Video conferencing software is making it easy to visually connect with family and friends in real time. So whether you need tips on doing mom’s turkey gravy or just cannot make it across the country to a reunion dinner with your friends from school, it is easier than ever to be there using Skype, Google+ Hangouts and FaceTime.

Agent Ron G. has been battling the forces of unruly technology run amok since 2001, prior to Geek Squad’s acquisition of Best Buy. When not busy creating video & technical training content for Geek Squad Agents in the field, Agent Ron enjoys home brewing, international travel, and learning how to cook new cuisines.

Tech Help for You and Your Holiday Guests

Thursday, December 6th, 2012

It’s that time of year again. Time for togetherness and fellowship, Holiday parties and Open Houses, seeing old friends, entertaining relatives and sitting down for large, traditional meals. In today’s world, your guests will bring more than cheese balls and fruit cakes – many will be visiting with their own devices and special technology needs.

Knowing this, isn’t it better to be ready to deal with them? Don’t let technical hiccups involving visiting relatives and their devices add the blues to your holiday festivities. Let Geek Squad help you, with some tips and tricks on how to wrangle those unruly devices and make them behave.

Toward that end, Agent Laura M. put together a three part series last holiday called “Holiday Tech Tips.” We thought it might be a good idea to rerun the series, so let’s start at the beginning:

Holiday Tech Tips: Welcoming Guests Into Your Home and Network

10 Reasons Your Computer May Be Running Slowly

Friday, November 9th, 2012

Frustrated with your computer or cell phone? Embarrassed to ask your kids/grandkids for tech help? You’re not alone. According to AARP, 33 percent of Boomers report frustration with technology.  Here’s some tips to help you take control of your technology.

 

One of the most popular computer questions people have about their computer is “Why is it running slowly?” Through the years, we have narrowed down the list of possible reasons to ten:

1) Too many programs are running at the same time.
It is common for users to download utilities, applications, and other programs that run in the background. The more programs that are running – whether you see them or not – the less “attention span” your computer has to do other things you are asking it to do.

Avoid downloading web browser-helpers, more than one anti-malware program, or applications that claim to “speed up” your internet or your computer, as each one added will slow down your performance. (It’s also a good idea to uninstall programs that you do not use to increase your machine’s processing speed.)

2) There’s not enough free RAM.
Random-access memory (RAM) is what your computer uses for temporary working and thinking space. The more programs running at time, the more RAM is used. If your computer is running slowly, it could be because too many programs are running, and not enough RAM. To make your computer run faster, run fewer programs at a time or upgrade your RAM.

3) You have a virus/malware infection.
Internet slowdowns and slow computer operation can be a symptom of an infection. To find out if you have a malware problem, use an anti-virus and anti-spyware application to find it – like the free scanning tool we have available in the Self-Help area of our website.

4) You have low hard drive space.
Lack of hard drive space often affects older computers, or computers that do a lot of video editing or design work. Hard drives, which store all of your computer’s information, have a finite amount of space. Once they’re filled up, the computer no longer has the ability to manipulate files. The computer will slow down, eventually becoming unusable.

Generally, Windows will alert you to “low disk space” if this is the case. Moving some of your less-used files – such as pictures, music, and movies – to an external hard drive would free up some of your computer’s hard drive space and make it run faster. Deleting temporary files and performing a disk cleanup are also good ways to reclaim wasted space. Another solution? Install a bigger hard drive.

5) Restart your computer.
Every once in a while, it is a good idea to restart your computer. A computer cannot complete some of its updates until you restart. Restarting your computer can also free up memory resources tied up by buggy programs.

6) Sharing a wireless network.
If your internet is running slowly, but your computer is running quickly, you could have a lot of activity on your wireless network. Check to see if anyone else on your network is doing something that uses a lot of bandwidth (like streaming video or playing online games), as this can make your computer run slowly. You should also make sure your wireless network is secure so someone else isn’t using your Internet bandwidth. If your wireless network is not secure, Geek Squad recommends you create a password to secure your data and ensure strangers don’t join your network.

7)  Too many “bells and whistles.”
Animated pointers and hi-resolution images of your favorite vacation spot may look nice, but they can also slow your computer down. Since animations and images  load into memory every time you start your PC , there is less processing power available for more important tasks.

8) You have a scanning program running.
When a scanning program such as an anti-virus, anti-spyware, or automatic backup is running, your computer may respond slowly. We don’t recommend disabling these, as they are an important part of your computers safety. These programs should be run at least once a week, but don’t plan on using your machine while they are running.

9) Your computer barely meets your software’s minimum requirements.
Software usually has a list of requirements for things like processor speed, operating system, memory (RAM) and hard drive space. These specifications are the absolute minimum levels needed to make the software run. If your computer just meets the requirements, the software will run, but it might not run well. Try to meet or surpass the system “recommendations” of your software, rather than just meeting the bare “requirements.”

10) You have a fragmented hard drive.
It’s important to defragment your hard drive to help the computer organize itself better and make sure it runs smoothly. Think of your hard drive as someone who really likes to be organized but is always in a big hurry. Because you hard drive is low on time, it might save bits of a file here and pieces of it there, rather than all together. This works fine for a while, but eventually everything is scattered, and it takes your hard drive longer to find everything and get moving. Defragmenting is like a really big clean up. Your hard drive will put everything back in the right place and, as a result, will be able to move more quickly.

That’s it! If you’ve follow these ten steps, it should help you resolve a decent amount of your slow computer problems. There’s always more to learn, and lots to do in order to keep your computer running smoothly. Of course, there’s always help from Geek Squad, if you need it, but don’t be afraid to try some things on your own as well. We’ll always be available for you at www.geeksquad.com, at 1-800-GEEKSQUAD (1-800-433-5778), or at a Geek Squad precinct in a Best Buy store near you.

Agent Wiebusch carries badge number #3881, and has thwarted rogue technology issues since 2004, helping clients in store, in their home or business, and now online. When away from computers, he enjoys playing sports, playing videogames, and tinkering with motorcycles, classic cars, and anything else fast.

Security Alert: TRENDNet IP Camera Firmware Update Required

Friday, February 10th, 2012

TRENDNet, maker of several IP Cameras, recently discovered a vulnerability in several of their SecurView cameras that allowed for online access in real-time by hackers. Fortunately the company released a quick firmware update to resolve the issue.

 

Was that just the sound of your jaw dropping? Yes, even digital cameras aren’t safe online. This should serve as a handy wake-up call that — in our Web-connected world — it’s not just your computer and phone  that need security updates!

 

Almost every device that connects to your network, from your TV and DVD player to your security system, run on basic software called “Firmware”. This software controls all functionality of the device – kind of like an operating system, like Windows or MAC OS. In the case of networked devices, it controls how your devices communicate with the network and can allow you to access the device remotely.

 

As technology changes, this firmware sometimes needs to be updated. Occasionally a security threat is found that makes your device (and the network it is connected to) vulnerable to a hacker attack or manipulation. Manufacturers usually take care of this problem by releasing a free firmware update for your device, and making it available through their websites.  It is important to check for these updates on a regular basis to ensure you always have the latest firmware.

 

If you own a TRENDNet IP Camera, TRENDnet has released the following information on their website on how to update the camera’s firmware, where to obtain the update, and how to get in touch with them if needed:

 

 

* * * * * * * * * *

TORRANCE, Calif.–February 7, 2012–TRENDnet, today announces the release of new IP Camera firmware which eliminates a documented security threat. A recent product hack revealed a vulnerability present in several TRENDnet SecurView IP cameras.

 

TRENDnet’s security team understands that video from some TRENDnet IP SecurView cameras may be accessed online in real time. Upon awareness of the issue, TRENDnet initiated immediate actions to quantify the scope of the issue, initiate corrective actions, and publish updated firmware which resolves the issue.

Only select cameras purchased between April of 2010 and the present may be affected and require a firmware update. Eighteen camera models have been identified. A list of the identified products is available on TRENDnet’s homepage: http://www.trendnet.com

 

How can Consumers Upload new Firmware?
Updating firmware takes a few minutes. New firmware for all of the listed models is available at the following link:http://www.trendnet.com/downloads

 

How can Consumers Contact TRENDnet?
TRENDnet has created the following dedicated email for all inquires related to this reported issue. Customers with any questions related to this issue such as how to update your camera’s firmware are invited to contact TRENDnet at the following email: ipcam@trendnet.com

 

For more than 20 years, TRENDnet has built a reputation for offering trusted, security IP camera solutions to consumers worldwide. We have worked hard to create a brand delivering network solutions that people trust. TRENDnet extends its deepest apologies to consumers which may be impacted by this issue.

* * * * * * * * * *
 

To find updated drivers for major brands, check out our driver Do-It-Yourself page. For a quick tutorial on how to update firmware, check out our 2 Minute Miracle at http://gslink.us/KcM0E1. For assistance in updating firmware, or additional questions, chat with an Agent at http://www.geeksquad.com, call 1-800-GEEK-SQUAD, or visit a Geek Squad Precinct at Best Buy store near you for a consultation.

 

-Agent Patrick B.

 

Agent Patrick B. has been an Agent with the Geek Squad since 2005.  When he isn’t overseeing the Geek Squad Intelligence Blog or the Geek Squad’s Social Media presence, he can be found wandering the streets of Minneapolis for a fresh new source of caffeine to fuel his all night gaming sessions.

Holiday Tech Tips: Welcoming Guests Into Your Home and Your Network

Monday, December 19th, 2011

In this, the first post of a three-part series of this week, we will discuss how to make it easy to keep your visiting family connected with a dedicated guest wireless network.  A guest network not only makes connecting all those devices a snap, but also separates your personal network from the family’s devices.  This helps keep your data, and your peace of mind, safe and secure.

 

Connect for the Holidays

So, how did you spend your Holiday Season last year?  Trying to connect the 10 different devices of 10 different relatives to your home network?  Wrestling with a new digital camera or smartphone?  Trying to understand what you’re going to do with an iPad?  If you’re tired of being overwhelmed by an onslaught of new technology every year, we have glad tidings. It is our mission to help the holidays go smoothly and help the excitement of your shiny new toys last beyond reading the first page of that poorly written instruction manual.

 

“Grandma, I want to use the internet.”

Every year more and more devices are designed to connect to the internet.  Handheld gaming devices, iPods, laptop computers, and digital cameras are just a few of gadgets your extended family may be bringing to your house this holiday season.

Let your relatives share their ugly sweaters on Facebook, watch their favorite YouTube videos after dinner, and keep things simple and secure by creating a wireless network specifically designed for visitors.  A “Guest Network” is a small section of your home’s wireless network that is set up for use by temporary guests in your home.  Perfect for your holiday gathering!

 

What do I Need? 

Setting up guest networks can be easy, but you have to have the right gear.  Almost all dual-band routers support guest networks, as well as a few newer routers that do not have dual band capability.  You’ll want to check your wireless router’s specifications to verify it supports a guest network.

 

What do I do?

Setting up a guest network is actually easier than configuring a wireless router, and routers that support guest networks have all the tools you’ll need, already built in! To start your guest network, you’ll need to visit your router’s configuration page, specifically the page for wireless settings.  IF your router supports guest networks, you’ll see an option under the wireless settings to enable a guest network.  You’ll be able to turn on a guest network, set up a password to control who is allowed to connect to it, and even limit the number of users connected simultaneously.  By setting up this guest network, utilizing a simple password, you won’t need to share your encryption key with your family.  This second network will keep your network isolated, protecting the information on your computers, and helping to keep everything safe and secure.

 

If diving into your router’s configuration doesn’t sound like something you want to try, fret not!  Geek Squad Agents are standing by 24/7/365 to configure it for you.  For help with setting up your guest network, contact us at 1-800-GEEK-SQUAD or visit GeekSquad.com.  We set up guest networks in our sleep and would be glad to help!

 

-Agent Laura M.

 

Every day, Counter Intelligence Agent Laura M, of Precinct 329, heroically removes malware and saves the personal lives of computer users in Maple Grove, MN.  She has a vitamin D deficiency from playing too many video games.  She likes animals and books.

 

Note: Comments are moderated and will be handled as per our privacy policy. Please keep your comments on-topic and free of profanity. For more information, please view our Blogging Terms of Use.

Archives

Tag Cloud

Categories