
News, Articles and
Best Practices
Current Article
Past Articles
Newsletter for May 2025
SCAMS, and How to Avoid Them
Two Factor Authentication – 2FA:
This is a method to verify your login credentials (user and passwords) for websites you visit. If you have an account, meaning you have logged into this site before and entered your email and gave it a password, you want 2FA.
Basically, what happens is the website you are attempting to access wants to be sure it is you and not some scammer. When you initially set up the website it would have asked you for your cell phone number. The website will send you a text message with a one-time login code. Enter the proper code and you have just verified you are legitimate.
Alternative to 2FA:
Some websites use an authentication code, similar to the 2FA process above. The only difference for the user is how the code is sent to you. Rather than your text message they use an app.Download and install an app called an authenticator. In the app you tell it which website you want to authenticate. A one-time log in code is sent to the authenticator and you enter it into the website for access.
Check Washing:
Let’s say you sent a check for a payment on a book for $39.99. If some crook steals that check, they can dip it into a solution (solvent) and remove the ink that shows the legitimate payee line and the amount. Once the check is washed, they replace the payee line with their name and write in any amount, say $1039.99, go the bank and cash it. You have been scammed by washing scam. Best defense is a Sharpie marker, or other permanent marker. You are likely familiar with the fat Sharpie marker for making notes, signs, etc. However, they also make one that is pen sized. Just as good, create all your checks from a printer. Call your bank if this happens to you, then call us.
The Billing Scam:
You received an email that says you have a new invoice from McAfee, PayPal, Best Buy, etc. and they are about to charge your credit card. This is one of the worst scams ever because people react to it as if it is a mistake and want to immediately correct the error. The scammer wants you to call the attached phone number and a friendly rep will review your account. Stop and think. The scammer wants access to your computer by a remote connection, and they will fix the situation.Your first line of defense is to delete the email. Don’t answer it, don’t reply to it, don’t tell them anything – Just delete the email! If you fail the first line of defense the last line of defense is deny them access to your computer. If you do call the phone number provided in the fake email you are in trouble. The scammer will try and convince you the only way to fix the problem is a remote session whereby they can access your computer to fix it. BUNK! Never let a stranger into your computer. If you don’t know who they are just say, “fuhgeddaboutit” and hang up. Really, you are allowed to be rude. If you do let them in, they now have access to your bank accounts, trading accounts, and credit cards and will install more scam programs to keep hurting you. You are so screwed.
​
Time Travel – To the Past:
The term "time-traveling hackers" refers to a cyberattack technique where hackers manipulate a system's internal clock to bypass security measures,” according to Microsoft. Real live time travel into the past is a real thing, for computers that is. Did you know scammers can force your computer to time travel to the past and when they do that, they bypass current preventions of some anti-virus software? Yup they set your clock back a few days to circumvent your active anti-virus. This works on traditional anti-virus, but not AI enabled software. “The FBI has issued warnings about this tactic, advising individuals and organizations to implement strong cybersecurity measures, such as two-factor authentication, endpoint protection, and monitoring for unusual system time changes,” per Microsoft. Avoid this problem with SentinelOne EDR (End Point Protection and Remediation – I.E. delete it) software. We have it, you need it. Forget McAfee, Norton, or any foreign manufacturer. SentinelOne is a Silicon Valley, CA product. Way to go USA geeks!
Passwords:
The word “Password” is not a password, but it is an invitation to be the next hacker victim. Use a password manager, not the “lamo” one that is in your Internet browser.
Woops! Wrong Number:
Ever get an email with someone else’s name on it? I recently received one addressed to “Steve” that landed in my inbox. It’s a scam. They have my email address but deliberately started with Hello Steve. They want you to open the email and tell them you are not Steve. Big mistake if I answered, now they know my email address is real and if I open the attached file they would try to infect me. Don’t fall for this wrong number scam.
In Conclusion It’s Stats:
Per Copilot, “In 2024, there were 3,158 data compromises, including 2,850 data breaches, 18 data exposures, 2 data leaks, and 288 unknown compromises. The number of victims affected by data breaches skyrocketed, with over 1.7 billion individuals having their personal data compromised.Some of the biggest breaches included incidents at Change Healthcare, Advance Auto Parts, and Ticketmaster Entertainment, each affecting hundreds of millions of people. Cyberattacks were responsible for 80% of all data compromises, making them the dominant threat.It was a tough year for cybersecurity—what are your thoughts on this?” Call me: 925-672-9989 – Will the Geekologist.
Blatant Plug for Great Anti-Virus:
There are three types of anti-virus. Blacklist, whitelist and AI.Whitelist is the worst as the user must decide if a website is trustworthy of visiting. So how the heck do you know which website is good or bad? You don’t.The second is a blacklist that is old fashion, can you say “buggy whips”? The way it works involves downloading a list of virus definitions then compare that list with every-single-program and data to that list, if a match it is “likely” a virus. That list contains, “…millions of signatures…,” according to Copilot.Comparing these lists against your stored data and programs can take hours to run. Not good. (Geddy-up horsee?)Modern threat detection isn’t just anti-virus but a holistic approach to detecting threats. We have it, you need it.Want to know more? Ask Copilot this, “how does holistic AI enabled anti-virus work?” Or call Will the Geekologist at 925-672-9989.
FYI – Windows 10 Must End:
October, fast approaching, means you need to upgrade to Windows 11, Now!We sell, upgrade, migrate data and apps to new custom built or branded computers. Call us 925-672-9989.
April 2025
VPN – A New Scheff in Town
For years we have been touting the benefits of Virtual Private Networks (VPN) as it is used to secure traffic from the user (you) to your chosen web site. Through it all, in our opinion our customers’ experiences have not produced acceptable results. Various issues have resulted from our tests and user results. For example, VPNs have interrupted some anti-virus applications, others will experience a loss of Wi-Fi access, and the largest problems occur with the loss of Internet connection speed while using it.
​
If Internet security is needed for you (think: stock day trader, bank transactions, etc.), there’s a new option in the Microsoft Edge browser. We haven’t finished our testing yet, but it looks like this applet will do the trick. If you decide to give it a try, please let us know your results.
​
To access the benefits of this VPN offering use the EDGE Internet Browser and is not available for Chrome, Safari, Duck-Duck-Go or any other method of surfing the web.
“Microsoft offers a VPN service called Edge Secure Network, which is integrated into the Microsoft Edge browser. Here are some key features:
-
Privacy and Security: It encrypts your internet connection, hides your IP address, and protects your browsing activity from third parties and hackers.
-
Automatic Activation: The VPN activates automatically when needed, such as when connecting to unsecured Wi-Fi networks or visiting non-HTTPS websites.
-
Free Data Allowance: Users signed into Edge with a Microsoft account receive 5 GB of free VPN data per month.
-
Built-in Convenience: Since it's part of the Edge browser, there's no need for additional software or extensions
-
Location Obfuscation: It obscures your specific location while still allowing access to geographically relevant content,” according to Microsoft Copilot.
​
Optional setup help is available. No monthly charges. Locally supported through CUSA Care.
So, What’s Wrong with This Picture?
Let’s say you just received a bill from the Geek Squad, PayPal, Netflix or Amazon and the bill says you just purchased something from them. And you know you didn’t, scam alert!
In a panic you call the “support” number to “fix” the error. The guy on the other end says he needs access to your computer to fix the error, and you let them in. What are you nuts? Some guy you never met, from a country you never heard of wants access to your computer and you let them in to see your passwords, bank accounts and personal information. You may as well open your front door leave the house and hang a sign on it saying, “Help yourself to anything.”
​
No. If you need help, call us. Paste this number on your forehead 925-672-9989 for ComputersUSA! We speak English, we fix problems, you know where we live. Get a clue.
Decoder Rings and TikTok
Boomers likely remember those cool decoder rings circa 1950's with Captain Midnight Badges, Ovaltine Decoder Rings with Little Orphan Annie and Lone Ranger Decoder Rings.
I remember watching the mailbox with gleeful and pensive anticipation and that I was going to be a part of some secret society. As the weeks went by, waiting, wondering, dreaming of things that could be. When they finally arrived, my excitement peaked as I decoded secret messages. I felt so included, so special.
If you’re not a Boomer, then I am sure you have had some similar experiences. Fast forward to today’s fascination with social media and TikTok in particular. According to Copilot, “TikTok's magnetic pull lies in its unique blend of entertainment, creativity, and connection,” which is like the fascination of a decoder ring, don’t you think?
I have been outspoken about the privacy issues with TikTok that reports on everything you do to the Chinese Communist Party. I didn’t like it years ago when I railed against it publicly. And I was right to be concerned. Unlike the decoder rings of the past that hid your messages TikTok outright shatters that privacy. But times may be a-chang’n.
The Feds have stepped in and mandated a change of ownership to continue to exist as a company operating in the US.That’s why I have instructed my crew to sign up and be part of the TikTok insanity, remembering the old saw, if you can’t lick-um, join-um. I hereby surrender.
March 2025
Scareware Blocker Defined
According to Microsoft, “Scareware is a type of malicious software designed to trick users into thinking their computer has a security threat, like a virus or malware. It often presents alarming messages or pop-up ads claiming that the user's system is infected, urging them to purchase or download unnecessary, potentially harmful software. The goal is to scare users into taking actions that benefit the scammers, either by stealing money or installing more malicious software.” This goes for that 800 number they want you to call. DON’T CALL IT.
It's always a good idea to use trusted antivirus software and stay cautious of unsolicited alerts or pop-ups. If you ever encounter scareware, don't panic, we recommend calling us if you suspect the message is suspicious.
Archived
Your Computer - In Dog Years

How old is your computer and should you try and keep it? If you purchased your computer, tablet or laptop before 2017 it’s time for a new one. Sad but true, they age faster than dog-years. (Examples, Dog-years: 1 human year = 7 dog-years. Computer-years: 1 human year = 14 Computer-years.)
Support for Windows 10 ends October 2025.
Windows 11 requires a CPU that is an Intel 8th Generation or higher, or if you have a CPU that is an AMD Ryzen 3 3100 or higher. In order to stay current with the latest technology in security and advanced features it’s time to upgrade and migrate your data to your new device (computer, etc.).