Browsing Made Easier and Safer: What’s New in Your Web Browser

The internet is always changing, and so are the tools we use to explore it—our web browsers (like Chrome, Edge, and Safari). In 2025, you might notice some exciting new features designed to make your time online easier, safer, and smarter, especially when it comes to logging in and protecting you from tricky scams.

🤖 Smart Helpers: The New AI Features

Artificial Intelligence (AI) is like a clever assistant built right into your browser now. These new AI tools are designed to help you understand and interact with the web more efficiently.

  • Quick Summaries: If you open a long article or a complicated page about a topic, the AI can read it and provide a short, easy-to-understand summary for you. This saves you time and gets you the main points right away.
  • Ask Questions: Instead of searching for something and clicking through many links, you can sometimes just ask your browser a direct question about the page you’re looking at. For example, if you’re on a recipe website, you could ask the AI, “How many calories are in this dish?”
  • Better Accessibility: The AI is also making the web easier for everyone. It can now describe images for those with vision impairments or offer new tools that let you easily adjust the color, contrast, and text size of a webpage to reduce eye strain.

🛡️ Stronger Protection Against Scams (Scareware)

Scammers often try to trick you with alarming, fake messages called scareware. These are those shocking pop-ups that suddenly appear, flashing warnings that your computer is infected with a virus and urging you to call a fake “tech support” number right away.

In 2025, web browsers like Microsoft Edge are building in powerful new features to spot and stop these scams before they can trick you.

  • Automatic Blocking: The browser now uses its own “smart sensors” to look for the signs of a fake warning page (like the screen suddenly going full-size or blocking your “Back” button).
  • Shutting it Down: When the browser detects one of these scary scams, it will automatically block or shut down the malicious page, often before the fake warning even finishes loading. This prevents you from seeing the scary message or accidentally calling the scammer’s number.

🔑 Say Goodbye to Passwords with Passkeys!

One of the biggest changes is a new way to log into your favorite websites called Passkeys. Think of Passkeys as a digital “key” that is much more secure and easier to use than your old passwords.

  • No More Remembering: You won’t have to remember long, complicated combinations of letters and numbers anymore.
  • Simple Log-in: To use a Passkey, you simply unlock your device (your phone, tablet, or computer) the way you normally do—using your fingerprint, your face (Face ID), or your device’s simple PIN.
  • Super Safe: Passkeys are much harder for scammers to steal because the “key” stays locked on your personal device. They can’t trick you into giving away your fingerprint or PIN over the phone or email.

Tip: You don’t need to switch all at once! Most websites will still let you use your old password as a backup. When you see a site ask you to “Create a Passkey,” you can give it a try for better security.

These new changes are all about making the internet a more comfortable, convenient, and most importantly, safer place for you to explore.

Beware: The Latest Tech Scams You Need to Know About

Updated 3/26/26:

Cybercriminals are always looking for new ways to trick people, and we at Computer Techs are seeing an uptick in scams that target computer and internet users. These scams often look convincing on the surface, but with a little extra caution, you can spot the red flags before becoming a victim.

Fake Invitations and Social Security Statements

One of the most dangerous scams making the rounds is an email that appears to come from someone you know—a neighbor, friend, professional service provider or even a family member. The message might say something like “RSVP for the celebration (of life)” ,“Click here to view the invitation.”, “Check out this important document”, “Check out the pictures”, “We’re updating our records”.

If you click the link, it discreetly downloads a remote access trojan onto your computer. Once installed, scammers can take control of your system, access your online accounts, steal data, or even lock you out completely.

Since the re-named file is a legitimate remote support tool often used by businesses, antivirus programs do not detect it as malicious. But what scammers can do via remote access to your computer can be very dangerous and impact your finances and identity.

This same method of a disguised remote support tool has also been seen as a fake Social Security Statement, fake email from a lawyer, and will likely evolve into other methods of deceptive delivery.

👉 How to protect yourself:

  • Never click unexpected links, even if they appear to come from someone you trust.
  • If the email feels suspicious, call the person directly to confirm they really sent it.

Read: The most dangerous new threat on your computer is not a virus, and may come from someone you know

Fake Invoice Scams (McAfee, Geek Squad, and More)

Another common scam involves fake invoices seemingly from big-name companies such as McAfee, Geek Squad, Norton or PayPal. These emails claim you’ve been charged for a subscription renewal and provide a phone number to call if you want to cancel.

Of course, the invoice is fake. If you call, scammers may trick you into giving them remote access to your computer or your credit card details.

👉 How to protect yourself:

  • Legitimate companies don’t send invoices out of the blue for services you didn’t order.
  • Check your bank account or official account page directly instead of trusting an email.
  • Don’t call the number in the email—go to the company’s official website for real contact information.

Fake cloud storage notices

Unfortunately, cybercriminals have found ways to exploit the popularity of cloud services through phishing scams. A recent surge in email and text message scams involves messages that claim:

  • Your cloud storage is full.
  • Your cloud account is about to expire.
  • You’ve exceeded your storage quota and must pay to continue accessing your files.
  • Your files will be deleted.

These messages often include a link that leads to a fake login page or payment form, which can steal your login credentials or credit card information. Some variants will even try to sell you an alternative bogus cloud storage service. The scammers may even spoof legitimate services like Google, Apple, or Dropbox, making the messages look authentic.

Read more info here…

How to Spot a Scam Message

Scammers rely on urgency, fear, or curiosity to get you to click. Before responding to any unexpected email, text, or phone call – even if it appears to come from someone you know – take a step back and look for these signs:

  • Bogus addresses or phone numbers – Hover over (but don’t click) an email address or link to see where it really leads.
  • Bad grammar and spelling mistakes – Billion-dollar corporations don’t send sloppy emails.
  • Generic greetings – Messages that start with “Dear Customer” instead of your actual name are suspicious.
  • Pressure to act quickly – “Act now or lose your account!” is a classic scam tactic.
  • Think about the situation – Why would a friend send you something out of the blue? Why would you get an email from PayPal or McAfee if you don’t even have an account with them?

The Golden Rule: Don’t Click

Above all, never open unexpected email links or attachments. Downloaded files and attachments on Windows with “.exe” or “.msi” extension/suffix can be dangerous from an unverified or untrustworthy source. If something looks even a little off, call the person or company using a number you trust—not one displayed in the suspicious message.

Click here to view examples of the latest phishing and scams that we’re seeing.

Final Thoughts

Scams are becoming more sophisticated, but with a little vigilance you can stay safe. When in doubt, remember: slow down, verify, and never click blindly.

Using Webmail for Reliable Email Troubleshooting

In today’s digital world, many people access their email through email clients or apps installed on their mobile devices or computers. Popular email clients include the Mail app on Mac and iOS, Microsoft Outlook and Thunderbird on Windows, and Samsung Email on Samsung Android devices. These applications provide a convenient, organized way to view and respond to email from one or multiple accounts in a single interface.

However, when encountering email problems such as missing messages, sending or receiving errors, or synchronization issues, it is best to troubleshoot by going directly to the source of your email — known as webmail. Webmail is the online interface or website hosted by your email provider where your email is stored on their servers. From a webmail interface, you interact directly with the email server, bypassing the email client or device-specific issues.

Why Check Webmail?

  • Source of Truth: Since webmail interfaces connect directly to the email server, they show the true state of your inbox and messages without local app caching or syncing delays.
  • Bypasses Device Issues: If an email client or app is misconfigured or experiencing software problems, your webmail will still show your emails correctly.
  • Larger Screen Advantage: Using webmail on a computer or large-screen device offers better visibility, navigation, and options for managing complex email tasks.
  • Settings and Configurations: Many webmail portals offer comprehensive settings and diagnostic tools that can help identify issues such as filters, blocked addresses, or forwarding rules.

Common Webmail Services

Below are links to the most popular webmail services where users can log in to directly access their email accounts:

  • Yahoo Mail: A popular webmail service with a clean interface and organizational tools.
  • Gmail: Google’s widely used email service known for its powerful search and spam filtering.
  • AOL Mail: The classic free email provider is still around and popular with seniors.
  • Outlook.com Mail: Microsoft’s webmail for personal accounts including Outlook, Hotmail, and Live.com.
  • AT&T/Yahoo Mail: AT&T’s partnership with Yahoo offers a simplified version of Yahoo Mail branded for AT&T internet subscribers. Also accessible from the Mail button on AT&Ts Currently.com.
  • Spectrum Email: Spectrum’s webmail accessible for Charter/Spectrum internet subscribers.

Troubleshooting Tips Using Webmail

  • Log into your webmail account on a desktop or laptop browser.
  • Verify that new emails are arriving and old emails appear as expected.
  • Check your spam, trash, and other folders for misplaced or redirected emails.
  • Review account settings, filters, forwarding rules, and security notifications.
  • Test sending and receiving emails directly from webmail to isolate client-specific issues.
  • Reset passwords or security settings if login problems exist.

By starting troubleshooting at the source with webmail, users ensure they understand the true status of their email accounts before adjusting device or app settings. This approach simplifies diagnosing issues and often highlights whether the problem resides with the email provider or your local email client.

If you’re having problems with accessing all of your emails, contact Computer Techs for personal help.

Using the Same Password Everywhere Is Like Using Your House Key for All of Your Locks

Imagine if one single key unlocked your house, your car, your office, and even your safety deposit box at the bank. Convenient? Sure. Safe? Absolutely not. If you were to lose that key—or if someone were to steal it—they would instantly have access to everything important in your life.

That’s exactly what happens when you reuse the same password across multiple accounts.

The Convenience Trap

It’s easy to see why people reuse passwords. With dozens of logins for banking, shopping, email, and social media, it feels impossible to remember them all. One strong password used everywhere seems like the simplest solution. But that convenience comes at a steep cost.

The Domino Effect of a Breach

When a website suffers a data breach—and millions do every year—your password may end up exposed. If that password is the same one you use for your bank or email, cybercriminals can walk right in without resistance. Just like losing your universal key, one compromised password means every part of your digital life could be unlocked.

This is known as credential stuffing, where hackers try stolen email and password pairs across hundreds of sites until they find matches. It works disturbingly well when people reuse the same password everywhere.

Building a Better Lock System

Instead of one “master key,” you should think of your online security like a set of different, specialized locks:

The Bottom Line

Using the same password everywhere may feel easier, but it’s the digital equivalent of handing out a single key that opens your entire life. A smarter approach is to use different keys for different locks—keeping your most valuable accounts protected even if one password gets lost.

Check the Source to Help Stop Phishing and Scams

In today’s digital world, phishing and online scams remain some of the most common ways criminals trick people into giving up sensitive information. These attacks often look convincing—emails that appear to be from your bank, websites that resemble popular retailers, or texts that mimic delivery services. However, most phishing attempts can be uncovered with a simple habit: checking the source email address or website before taking action.

Why Source Details Matter

Scammers rely on urgency and trust. They want you to act quickly—click a link, download a file, or share personal information—before you pause to think. The messages might use official logos, professional language, or even the names of real employees. But what they cannot fully hide is where the message came from.

Spotting these differences is one of the easiest ways to recognize a scam.

Common Red Flags in Email Addresses and Websites

  1. Misspellings or substitutions – “paypaI.com” with a capital “i” instead of “paypal.com.”
  2. Unnecessary prefixes or suffixes – “login-verification-yourbank.com.”
  3. Free email providers – If “Apple Support” emails you from @gmail.com, it’s fake.
  4. Non-matching links – Hovering over a link shows the true URL. If the text says “www.bankofamerica.com” but the link points somewhere else, don’t click.

Simple Steps to Protect Yourself

  • Always hover before you click. Place your mouse over a link (without clicking) to see where it really leads.
  • Check the sender. If the email claims to be from your bank, but the address isn’t from the official domain, delete it.
  • Look for HTTPS. Secure sites start with https://. While not foolproof, a missing “s” is a red flag.
  • When in doubt, go directly. Instead of clicking a link in an email, open your browser and type the official website address yourself.

The Bottom Line

Phishing and scams succeed when people act without verifying. By taking just a few seconds to check the source email address or website, you can avoid most of these traps. It’s a simple but powerful defense that costs nothing and protects everything.

Check out our public album on Google Photos of screenshots from phishing and scam texts, emails and websites – which can help you know what to look for in every unsolicited message. Click here: Phishing and scam examples.

What You Need to Know About Backup and Cloud Storage – And How to Avoid Recent Scams

In today’s digital world, the importance of backing up your data cannot be overstated. Whether it’s precious family photos, important documents, notes, contacts, or your calendar/reminders, losing data can be devastating. Cloud storage has become one of the most popular and convenient ways to ensure that your files are safe, accessible, and recoverable in case of loss. However, as the use of cloud services has grown, so too has the number of scams targeting unsuspecting users.

Understanding Cloud Storage and Backups

Cloud storage is a service that lets you save data on remote servers accessed via the internet. Major providers like Google Drive, Apple iCloud, Microsoft OneDrive, and Amazon Drive offer users the ability to store files securely and sync them across multiple devices.

Backup refers to the process of copying data from your devices and storing it elsewhere (such as in the cloud or on an external hard drive), so you can restore it in case the original is lost, damaged, or compromised.

Some common uses for cloud storage and backup include:

  • Automatic photos, messages, device settings uploads from smartphones.
  • Syncing of contacts, calendars, files between devices.
  • Document sharing and collaboration for work or school.
  • Restoring data after device failure, theft, or ransomware attacks.
  • Archiving important files you don’t need every day but don’t want to lose.

For more information about cloud backup, read “What is the Cloud?”.

Recent Cloud Storage Scams: What You Should Know

[Read more…]

Why Senior Citizens Shouldn’t Be Afraid of AI – How It’s Used in Their Everyday Lives

Artificial Intelligence, or AI, is becoming a part of everyday life—but for many senior citizens, it still feels like something to fear. Negative headlines, privacy concerns, and the mystery of how it all works can be intimidating. However, the truth is that AI is already helping seniors in simple, supportive ways—often without them even realizing it.

From health reminders and voice assistants to easier Google searches and improved home safety, AI is designed to enhance independence, not take it away. This article will show you why there’s no need to fear AI and how it can make daily life easier, safer, and even more enjoyable.

💡 Why Seniors Shouldn’t Be Afraid of AI

1. You’re Probably Already Using AI Without Realizing It

If you’ve ever used Siri, Alexa, or even a GPS app on your phone—you’ve already used AI. Other common tools include:

  • Smart TVs that suggest shows you might like
  • Smartphones that correct typos or block spam calls
  • Voice assistants that can set reminders or answer questions

AI isn’t some complex robot—it’s a helpful background feature in many devices you already own.

2. AI Helps, But You Stay in Control

Some worry that AI will “take over” their choices. But AI doesn’t make decisions for you—it simply provides suggestions, reminders, or shortcuts. Think of it like a helpful assistant who follows your instructions, not a boss.

You can also turn AI features on or off as you wish. You’re always in the driver’s seat.

3. Privacy and Safety Controls Are Built In

Modern AI tools often include strong privacy features:

  • You can mute or disable microphones and cameras.
  • You choose what to share and when.
  • Trusted brands like Apple, Google, and Amazon have security settings you or a family member can easily review.

If you’re ever unsure, a family member, friend, or tech help center can walk you through it step by step.

✅ How AI Is Already Helping Seniors Today

[Read more…]

A Beginner’s Guide to Passkeys: How to Set Them Up, Use Them, and Sync Across Devices

Updated 12/31/25 – clarified platform and browser support:

If you’re tired of remembering complex passwords or worrying about phishing attacks, passkeys offer a simpler, safer alternative. Major platforms like Google, Microsoft, Apple and Yahoo now support passkeys, and they’re designed to replace passwords entirely. In this guide, we’ll explain what passkeys are, how to set them up, and how you can use them across multiple devices—even for the same account.

A passkey is a modern, more secure alternative to traditional passwords. Instead of remembering a string of characters, you use the same methods you already use to unlock your devices to sign in to websites and apps — such as your fingerprint, facial recognition, or screen lock PIN/password.

How It Works

Passkeys are built on the WebAuthn standard and use public-key cryptography. When you create a passkey, your device generates a unique pair of cryptographic “keys”:

  • The Public Key: Shared with the website or app you’re using.
  • The Private Key: Stored securely on your device (and never shared).

When you sign in, the website sends a digital “challenge” to your device. Your device uses the private key to sign the challenge and sends it back. Since the website has the matching public key, it can verify your identity without ever seeing your actual biometrics or a password.

Why Passkeys Are Better

  • Phishing Resistant: Since there is no password to type or steal, hackers can’t trick you into giving it away on a fake website.
  • Less Worry About Data Breaches: If a company’s passkey database is hacked, they only have your public keys, which are useless to attackers without your physical device.
  • Simplicity vs Passwords: You only have to know your account username – which is typically your email address. During account creation you don’t have to abide by complex password rules (like “must be unique and include a symbol and a number”), nor write down or manually save the passkey for the account.

Where Are They Stored?

Most passkeys are stored on your device and synced through your cloud account (like Microsoft Password Manager, Apple/iCloud Keychain, Google Password Manager, or passkey managers such as LastPass or Bitwarden). This means if you get a new computer or device, your passkeys move with you automatically with your cloud account, so you aren’t locked out of your accounts. They are then available for signing into your accounts via supported web browsers and apps. See chart below for specifics.

What websites support Passkeys?

Major email providers Google, Microsoft and Yahoo now support passkeys. Many major retailers such as amazon.com, besybuy.com and costco.com also support passkeys. However, banks and brokerages – likely where most of your money is kept – have been slow to adopt passkeys. Here’s a non-comprehensive list of websites that support passkeys: passkeys.directory

How to set up a passkey for each of your online accounts

[Read more…]

The Anxiety of Data Breaches and Dark Web PII Exposure: What You Can and Cannot Do

In today’s digital world, data breaches are no longer rare events—they are a near-constant threat. From social media platforms to healthcare providers to internet service providers, major organizations have seen their systems compromised, often resulting in personally identifiable information (PII), being leaked onto the dark web. Understandably, this has created a new wave of anxiety for individuals—many of whom have no idea their data has been exposed until it’s too late.

But while the fear is real, and in many ways justified, it’s important to know where your control begins and ends. In this article we’ll discuss what you can and cannot do when it comes to dealing with PII leaks on the dark web—and how to manage the anxiety that comes with them.

Why Data Breaches Cause Anxiety

PII includes names, addresses, Social Security numbers, birthdates, login credentials, and financial account numbers—data that, in the wrong hands, can be used to commit identity theft, financial fraud, and more. The dark web, a hidden part of the internet accessible through anonymizing tools like Tor, acts as a marketplace where this stolen data is bought and sold.

For victims, the emotional fallout can be intense:

  • Loss of control over who sees and uses your information.
  • Fear of future harm, like fraudulent loans, damaged credit or being scammed.
  • Lack of visibility into how deep the breach goes.
  • Confusion over what steps to take and whether any actions will even help.

What You Can Do About It

[Read more…]

Why Retirees Are Targets for Identity Theft or Credit Fraud

When people retire, it’s easy to assume that certain financial concerns fade away—especially the fear of identity theft or credit fraud. After all, if you’re no longer applying for loans or opening new credit cards, why would anyone want to target your credit file?

In reality, seniors remain prime targets for identity thieves, and freezing your credit can be one of the simplest and most effective ways to guard against potential financial harm. Here’s why even retirees should seriously consider placing a credit freeze.

Retirees Still Have Active Credit Files

Even if you’re no longer working or making big purchases on credit, your credit reports still exist—and they contain valuable information. Identity thieves can use your Social Security number, address, and other details to open fraudulent accounts, take out loans, or even commit medical or tax fraud in your name.

A credit freeze makes it much harder for bad actors to do this. It blocks access to your credit reports, preventing new credit inquiries unless you lift the freeze yourself.

Seniors Are Prime Targets for Scammers

Unfortunately, older adults are frequent targets for scammers. The FBI’s Internet Crime Complaint Center (IC3) has consistently reported high financial losses among seniors due to fraud. Criminals may assume that retirees are less likely to monitor their credit actively or to notice small irregularities in financial statements—making them easier prey.

A credit freeze serves as a protective barrier. If someone attempts to open a credit card or loan using your name, they’ll be denied access to your credit file, effectively shutting down the scam before it starts.

Credit Freezes Are Free and Reversible

Thanks to federal legislation, placing and lifting a credit freeze is free through the major credit bureaus—Equifax, Experian, and TransUnion. If you ever do need to apply for credit, you can temporarily lift the freeze online or by phone in just minutes.

This flexibility makes freezing your credit a low-hassle, high-reward action, especially if you’re not regularly opening new credit accounts.

A Freeze Offers More Protection Than Credit Monitoring Alone

Credit monitoring services notify you after suspicious activity has occurred. While useful, they are reactive by nature. A credit freeze, on the other hand, is proactive. It prevents the activity from happening in the first place.

For retirees who want peace of mind without having to keep a constant eye on their credit report, freezing credit can be a set-it-and-forget-it security measure.

It Protects Your Legacy and Estate

If you’re managing a large estate, or simply trying to preserve your financial health for heirs, protecting your credit is part of protecting your legacy. Identity theft doesn’t just impact you—it can complicate estate management, trusts, and beneficiary distributions after death.

In some cases, deceased individuals are even targeted by fraudsters. Taking steps now to lock down your credit while you’re alive helps ensure fewer headaches for your loved ones later.

Final Thoughts: A Simple Step for Serious Peace of Mind

Even in retirement, you’re not off the radar of cybercriminals. In fact, you may be more vulnerable than ever. Freezing your credit is a powerful tool in the fight against identity theft, and it costs nothing but a few minutes of your time.

If you haven’t already, consider visiting the official sites for Equifax, Experian, and TransUnion to place a freeze on your credit reports. It’s a smart, simple way to help safeguard your golden years. If you need help navigating the process of setting up a credit freeze, you can contact Computer Techs for help.