New computer recommendations

Updated 1/26/26:

There’s been a global supply shortages for RAM and SSDs that have caused a dramatic increase in prices over the past few months. RAM and SSDs are major and expensive components that are used in computers. Therefore, inventory of computers that were built by manufacturers a few months ago before the dramatic increase in prices are now being sold through, and we expect prices of computers to rise dramatically in the next few months.

You may be reading this because the operating system on your existing computer is no longer supported. Since you’ll likely be spending the next 5-10 years or more with your next computer, please take a few minutes now to make an informed decision about what to look for in a new computer and accessories – and get the best deal. 

Our recommended minimum new computer specifications are:

  • Intel Core i3/AMD Ryzen 5 processor or better. For an Apple Mac computer we recommend getting Apple’s “M” series processor rather than an Intel processor.
  • 8 GB RAM or more
  • 256GB Solid State Drive (SSD) or larger
  • Please read New Computer Buying Guide for more detailed information.

If you’re thinking about trying to save money by buying a refurbished computer – we don’t recommend it. Typically they won’t last as long as a new computer, and are less secure due to unpatched processor flaws and some cannot be upgraded to more recent secure operating systems.

We’ve seen the best reliability with HP and Dell brands. Keep in mind that cheaper laptops and all-in-ones typically only have a vertical screen resolution of 768 pixels, whereas higher quality and clearer screens are 1080 pixels or higher.

Click on the links below to view recommended computers meeting the minimum recommended specifications noted above at the respective retailer’s website. Some models may be available in-store. If you come across a good deal elsewhere, remember to look for specifications that are a minimum of what’s listed above.

[Read more…]

Beware: The Latest Tech Scams You Need to Know About

Updated 3/26/26:

Cybercriminals are always looking for new ways to trick people, and we at Computer Techs are seeing an uptick in scams that target computer and internet users. These scams often look convincing on the surface, but with a little extra caution, you can spot the red flags before becoming a victim.

Fake Invitations and Social Security Statements

One of the most dangerous scams making the rounds is an email that appears to come from someone you know—a neighbor, friend, professional service provider or even a family member. The message might say something like “RSVP for the celebration (of life)” ,“Click here to view the invitation.”, “Check out this important document”, “Check out the pictures”, “We’re updating our records”.

If you click the link, it discreetly downloads a remote access trojan onto your computer. Once installed, scammers can take control of your system, access your online accounts, steal data, or even lock you out completely.

Since the re-named file is a legitimate remote support tool often used by businesses, antivirus programs do not detect it as malicious. But what scammers can do via remote access to your computer can be very dangerous and impact your finances and identity.

This same method of a disguised remote support tool has also been seen as a fake Social Security Statement, fake email from a lawyer, and will likely evolve into other methods of deceptive delivery.

👉 How to protect yourself:

  • Never click unexpected links, even if they appear to come from someone you trust.
  • If the email feels suspicious, call the person directly to confirm they really sent it.

Read: The most dangerous new threat on your computer is not a virus, and may come from someone you know

Fake Invoice Scams (McAfee, Geek Squad, and More)

Another common scam involves fake invoices seemingly from big-name companies such as McAfee, Geek Squad, Norton or PayPal. These emails claim you’ve been charged for a subscription renewal and provide a phone number to call if you want to cancel.

Of course, the invoice is fake. If you call, scammers may trick you into giving them remote access to your computer or your credit card details.

👉 How to protect yourself:

  • Legitimate companies don’t send invoices out of the blue for services you didn’t order.
  • Check your bank account or official account page directly instead of trusting an email.
  • Don’t call the number in the email—go to the company’s official website for real contact information.

Fake cloud storage notices

Unfortunately, cybercriminals have found ways to exploit the popularity of cloud services through phishing scams. A recent surge in email and text message scams involves messages that claim:

  • Your cloud storage is full.
  • Your cloud account is about to expire.
  • You’ve exceeded your storage quota and must pay to continue accessing your files.
  • Your files will be deleted.

These messages often include a link that leads to a fake login page or payment form, which can steal your login credentials or credit card information. Some variants will even try to sell you an alternative bogus cloud storage service. The scammers may even spoof legitimate services like Google, Apple, or Dropbox, making the messages look authentic.

Read more info here…

How to Spot a Scam Message

Scammers rely on urgency, fear, or curiosity to get you to click. Before responding to any unexpected email, text, or phone call – even if it appears to come from someone you know – take a step back and look for these signs:

  • Bogus addresses or phone numbers – Hover over (but don’t click) an email address or link to see where it really leads.
  • Bad grammar and spelling mistakes – Billion-dollar corporations don’t send sloppy emails.
  • Generic greetings – Messages that start with “Dear Customer” instead of your actual name are suspicious.
  • Pressure to act quickly – “Act now or lose your account!” is a classic scam tactic.
  • Think about the situation – Why would a friend send you something out of the blue? Why would you get an email from PayPal or McAfee if you don’t even have an account with them?

The Golden Rule: Don’t Click

Above all, never open unexpected email links or attachments. Downloaded files and attachments on Windows with “.exe” or “.msi” extension/suffix can be dangerous from an unverified or untrustworthy source. If something looks even a little off, call the person or company using a number you trust—not one displayed in the suspicious message.

Click here to view examples of the latest phishing and scams that we’re seeing.

Final Thoughts

Scams are becoming more sophisticated, but with a little vigilance you can stay safe. When in doubt, remember: slow down, verify, and never click blindly.

What You Need to Know About the End of Support for Windows 10

  • Microsoft ended support for Windows 10 on October 14, 2025. There’s no more free updates*, security patches, or technical support available from Microsoft – unless you take action.
  • Most users have 3 options: upgrade to Windows 11, get a new computer with Windows 11, or extend Windows 10 security updates until October 2026.
  • Upgrading to Windows 11 is recommended for most users for its advanced security, improved performance, and new features.

Updated 11/1/25:

Now that Microsoft’s Windows 10 operating system has reached the end of mainstream support, computer users that haven’t taken action yet to address their out-of-date operating system should do so as soon as possible and definately before the end of 2025. One option is to enroll in Microsoft’s first-time ever “Extended Security Updates” program for personal computers using Windows 10, that will extend security updates for an additional year – until October 13, 2026. Continue reading below to become more informed about all of the options.

The Start button taskbar icons for Windows 10 vs Windows 11.

What Are Your Options?

If you haven’t already taken action, it’s time to do so now. Windows 10 users have three primary options:

  1. Upgrade your existing computer to Windows 11 for free
  2. Get a new computer with Windows 11
  3. Enroll in the Extended Security Updates program for free to Continue using Windows 10 until October 2026

Let’s explore these options and why ultimately upgrading to Windows 11 is probably your best choice.

[Read more…]

Why YOU are your best antivirus

In the early days of computing, the primary digital threat was the “computer virus”—malicious code designed to disrupt your system or delete files. Today, however, the digital landscape has shifted dramatically. While traditional viruses still exist, modern threats have evolved into sophisticated phishing and social engineering scams that target the user rather than the software. Because these scams rely on human psychology rather than technical exploits, your own vigilance is now the most critical layer of defense for your computer.

The Evolution of the Threat

For years, antivirus software was the “silver bullet” for security. However, cybercriminals have become increasingly clever, realizing it is often easier to trick a person into granting access than it is to hack through a firewall. Modern scams frequently use social engineering, a tactic that utilizes urgency, fear, or curiosity to manipulate you into taking action, such as clicking a malicious link or revealing a password.

Why Your Antivirus Can’t Save You

A major reason why you are your own best protection is that antivirus programs frequently fail to detect modern threats. This is because scammers have moved away from traditional “malware” in favor of Remote Access Tools (RATs).

Remote Access Tools are actually legitimate software applications used by IT departments every day to monitor devices used by employees. Because these tools are legal and widely used by businesses, antivirus software identifies them as safe. Scammers exploit this “blind spot” by renaming these tools and tricking users into installing them.

The “Friend” in Your Inbox: How Scams Spread

One of the most dangerous new methods involves an email that appears to come from someone you know, such as a neighbor, a friend, or a professional service provider like a lawyer. These messages are carefully crafted to look like common information requests or invitations, using hooks such as:

  • “RSVP for the celebration (of life)”
  • “Click here to view the invitation”
  • “Review this important document” or “Check out the pictures”
  • “We’re updating our records” or a “Social Security Statement”

If you click the link in these emails, it discreetly downloads the remote access tool onto your computer.

The Consequences of a Breach

Once a scammer has remote access to your system, the impact is far more dangerous than a simple virus. They often wait until you are away from your computer or asleep to go through your web browser, password manager, and personal files. They may attempt to:

  • Transfer money out of your financial accounts.
  • Purchase gift cards using saved payment information on sites like Amazon.
  • Steal your identity by copying your address book and using your familiar name to send the same scam to your contacts.

Protecting Your Digital Life

To stay safe, you must treat every unexpected message as “guilty” until proven innocent.

  • Never click on links or attachments in unexpected emails, even if they appear to come from a trusted source.
  • Verify independently by calling the person or company directly using a known, trusted phone number to confirm they actually sent the message.
  • Slow down and look for red flags like bad grammar, generic greetings, or a high pressure to act quickly.

Technology provides many tools to help, but in 2026, the most powerful security feature is your own informed judgment and caution.

Computer Techs technicians can help you find any Remote Access Tools on your computer that may be hiding from antivirus software, and help secure passwords that may be accessible to scammers and hackers. Contact us today for assistance.