Posts

Each Challenge is Different

Image
 What ??? Like Rick of Pawn Star says, you don't know what comes in through the door, We too are always challenged with what comes through the door. Laptop been through the accident came in for data recovery. Lucky for the customer, we could successfully recover the data from this crushed piece of once a laptop. These kinds of accidents can really save one's skin if proper data backup strategy is implemented. We are here to help for any such situations and to guide you to establish Bullet Proof Backup.

FBI Warning

Image
New Warning from FBI FBI warns of search engine ads pushing malware, phishing. The FBI warns that threat actors are using search engine advertisements to promote websites distributing ransomware or stealing login credentials for financial institutions and crypto exchanges. In today's public service announcement, the federal law enforcement agency said threat actors purchase advertisements that impersonate legitimate businesses or services. These ads appear at the top of search result pages and link to sites that look identical to the impersonated company's website. "When a user searches for that business or service, these advertisements appear at the very top of search results with minimum distinction between an advertisement and an actual search result," warns the FBI. "These advertisements link to a webpage that looks identical to the impersonated business's official webpage." When searching for software, the FBI says advertisements will link to websit

Geek Squad Paypal Scam

Image
Scammers try it on me So this morning my Gmail inbox had a genuine email from PayPal that said someone has requested money as attached. Since it was from PayPal, Gmail spam filters didn't block it and as you can see it's legit email. The sender, reason & the content of it were suspicious. So be careful with this new kind of campaign from the scammers who are always trying new tactics to scam the innocents.

How to Fight Planned Obsolescence & Save the Planet ???

Image
What to do with old functioning hardware ? In todays world we see many products which are being phased out/discontinued/declared vintage for reasons best we all know - Corporate Greed. Be it Apple, Microsoft, Intel and so on, they all discontinue old models and release new one with the new Operating System which would work only with the new hardware. Has anyone ever thought of environmental impact of making old hardware useless ? We at CompuGuru have always worked with clear objective of salvaging any old piece of hardware and stopping it from going to landfill. So what we do to use such discontinued hardware?? Well there are other people who think alike and develop workarounds to these situations and we are happy to join hands with them. We provide various services to breath life in to such old hardware, bringing them up to date with the latest Operating Systems be it old Mac or PC. What we offer is upgrading them saving all your data & making them at par with the latest models fo

Neighborhood Favorite Award Goes To..

Image
We are honored to be voted a 2023 @Nextdoor Neighborhood Fave. Thank you to our neighbors! We are honored to be voted a 2023 @Nextdoor Neighborhood Fave. This award means so much for our business and helps us continue to grow in our community!
Be Careful !!! - Sneaky Amazon Google ad leads to Microsoft support scam. https://www.bleepingcomputer.com/news/security/sneaky-amazon-google-ad-leads-to-microsoft-support-scam/
Simple Cybersecurity Rules for Individuals 1. Don't Panic - If you get an email alerting you that your credit card's about to be charged $480 to renew your non-existent Purchase or that your computer is infected with ransomware, you might be tempted to call the toll-free number in that email. Simply try to remember and ask around in the household or relatives & friends about such a thing but DO NOT CALL that number. Scammers thrive by making people panic. Take the time you need to figure out what the real threat is before you do anything. 2. Don't Open Unknown Attachments - Many potential security threats arrive in the form of email attachments. Sometimes they're executable files, but these days they're just as likely to be Word documents, PDFs, or HTML files. They might be capable of running exploit code, or they might be simply an attempt to convince you to enter credentials for an email or bank account. 3. Don't Click Unsolicited Links in Email or Text -