ReportWire

Tag: Android

  • Google’s new Call Reason feature marks calls as urgent

    NEWYou can now listen to Fox News articles!

    Sometimes you need someone to answer right away. Maybe you are locked out. Maybe those concert tickets are about to go on sale. Android users are about to get a helpful upgrade that gives their calls more context when time matters.

    Google is rolling out a beta feature called Call Reason in the Phone by Google app that lets you mark a call as urgent before you dial.

    When you use it, the person receiving your call sees the urgent label on their screen. If they miss it, the same note shows up in their call history. That quick hint can give your call priority without you needing to send a separate message.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON

    Call Reason lets you flag a call as urgent before you dial, giving your contacts a clear signal that your call needs quick attention. (Google)

    How the Call Reason feature works

    Call Reason appears inside the Phone by Google app on Android devices. The feature only works when both people use Google’s default calling app and the contact is saved in your phone. Many Android phones ship with Phone by Google preinstalled, especially Pixel models, while others like Samsung may use their own dialer instead. If your device does not use Phone by Google by default, you may not see the feature until you install or switch to the Google version. Once marked as urgent, your call displays a clear indicator that tells the other person the conversation should not wait.

    This simple tool helps friends and family answer faster. It also gives them a reminder if they miss the call. Since the note stays in the call log, it nudges them to call back sooner.

    Why this Call Reason feature on Android can help you

    Missed calls are common. Many people silence their phones while working or driving. Call Reason bridges that gap with a small but meaningful alert that adds context. You can give someone a heads-up that the call needs quick attention without creating extra steps or confusion.

    Right now, Call Reason only supports the urgent label. Google has hinted that more options could come later, like short custom messages or emoji-style indicators. That could add even more clarity when your call is tied to a specific topic.

    5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOW

    A Google phone call with the notify button highlighted

    Both people need to use the Phone by Google app for the urgent label to work, which helps your calls stand out when timing matters most.  (Google)

    How to check if you have ‘Phone by Google’ on your Android

    Not every Android phone shows ‘Phone by Google’ in its settings. Some manufacturers, especially Samsung, use their own Phone app. Here is a quick way to confirm if you have the Google version on your device.

    Check the Play Store

    Open Google Play Store

    Search for Phone by Google

    If you see Open or Update, it is installed

    If you see Install, your phone does not have it yet.

    If the Install button appears, you can download it with one tap.

    After installing the Google Phone app

    Once it is installed, your phone may prompt you to set it as your default calling app. If it does not, you can change it manually.

    Switch to Phone by Google as your default

    Once Phone by Google is installed, you need to make it your main calling app. Call Reason only works when Phone by Google is set as your default calling app. Installing it is not enough. You must switch your phone to use the Google dialer for the feature to appear. Here’s how to enable it by following these steps.

    On Pixel devices

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap Default apps

    Tap Phone app

    Select Phone by Google, which uses a blue icon with a white phone handset

    On Samsung Galaxy phones

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap the three dots

    Tap Choose default apps

    Tap Phone app

    Select Phone by Google if available. It uses a blue icon with a white phone handset, which looks different from Samsung’s green Phone icon

    Samsung may block or hide the Google Phone app on some carrier models. If you do not see it after installation, your device may not support switching. 

    How to use the Call Reason urgent label on Android

    Once you have Phone by Google set as your default calling app, using Call Reason is very simple. Both you and the person you are calling must use the Phone by Google app for the urgent label to appear.

    How to mark your call as urgent

    When you are ready to call someone:

    Open the Phone by Google app

    Go to your Contacts or Recents

    Tap the contact you want to call

    Before you press the call button, look for the Call Reason option on the screen

    Tap Urgent to attach the urgent label

    Then tap the call button to place your call

    The urgent badge is sent with your outgoing call so the person knows your call needs attention.

    What the other person sees

    When your call reaches them, they will see:

    Your name and number

    A bold “Urgent” label under your name on the incoming call screen

    If they miss the call:

    The urgent label appears in their call history

    They can tap your missed call to return it quickly

    No extra steps are needed on their end. They do not need to press anything special to receive an urgent call. Their only requirement is that they also use Phone by Google as their default calling app.

    What both people must have for it to work

    For the urgent label to show:

    Both people must use Phone by Google

    Both devices must support the Call Reason beta rollout

    The person must be saved in your Contacts

    If any of those pieces are missing, the option will not appear.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    A Google phone call with the notify and urgent buttons highlighted

    When someone receives an urgent call, the label appears on their screen and in their call history if they miss it, making it easier to call back fast. (Google)

    Tips for getting the most out of Call Reason

    Use the urgent label only for situations that need fast attention

    Keep your contacts list updated so the feature works as intended

    Encourage close friends or family to use the Phone by Google app for full compatibility

    Check your call history for urgent notes if you miss an important call  

     Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Call Reason feels like one of those small upgrades that can make everyday calling a little smoother. It gives your friends a quick sense of why you’re reaching out and helps cut through the guesswork when timing matters. As the feature expands, it could turn into an even more helpful way to share context before someone taps Accept.

    What situation in your life would make you use the urgent label first? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Find a lost phone that is off or dead

    NEWYou can now listen to Fox News articles!

    Losing your phone can leave you in panic mode, especially when the battery dies. The good news is that both Apple and Android offer built-in tools that help you track a missing device even when it is powered off or offline.

    With an iPhone, you can use the Find My network on another Apple device or sign in from a browser. With Android, you can use Google’s Find My Device system to see the last known location and secure your phone fast.

    This guide walks you through clear steps for iPhone and Android so you know exactly what to do next.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    You can still find your lost Apple device even when it’s dead. (Apple)

    Does Find My work when your iPhone is dead?

    Yes, it does. Your iPhone uses low power mode in the background so it stays findable for a period after powering off. If other Apple devices are nearby, your phone can still send out a Bluetooth signal that helps pinpoint the last known location.

    You can check this location from any Apple device or a browser.

    Use Find My from another Apple device

    If you have an iPad, Mac, or another iPhone, you can look up your missing device in seconds. Family Sharing works too, so you can track a shared device even if it is offline. Here is how to do it:

    • Open the Find My app
    • Tap the Devices tab
    • Swipe up to see your full list of devices
    • Select your missing iPhone
    • View the location on the map
    • Tap Directions to navigate to it
    • Tap Play Sound if the phone is on and nearby
    Steps to enable Find My on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    • Turn on Lost Mode by tapping continue at the bottom of the screen to lock it and show a message with a callback number.
    • Enter a phone number that can be used when someone finds your iPhone and wants to contact you. Then, tap Next. 
    • If the screen icon is black, the phone is dead. You will still see the last known location, so you know where to start looking.
    Steps to enable Find my on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    Find your iPhone from a web browser

    If you only have access to a computer or an Android phone, use iCloud.com to locate your device. The browser version gives fewer tools, but it still shows your iPhone on the map. Follow these steps:

    • Go to iCloud.com/find
    • Sign in with your Apple ID
    • Approve two-factor if needed
    A Find Devices sign in screen

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Select All Devices
    • Choose your missing iPhone
    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Use Play Sound if the device is on
    • Turn on Lost Mode to lock the phone

    Use this method when you have no Apple hardware nearby.

    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    Use the Help a Friend feature in Find My

    If you need to borrow another person’s iPhone, avoid signing in to their device directly. That triggers security checks you cannot complete without your missing phone. Instead, use Help a Friend inside the Find My app:

    • Open Find My on your friend’s iPhone
    • Scroll to Help a Friend
    • Sign in with your Apple ID
    • View the last known location of your iPhone

    This tool bypasses two-factor prompts so you can get your location without any issues.

    Help a Friend feature on iPhone

    Steps to use the Help a Friend feature in Find My. (Kurt “CyberGuy” Knutsson)

    Can you find an iPhone without Find My

    If ‘Find My’ was never enabled, you must retrace your steps. You can check ‘Your Timeline’ in Google Maps if you use that app and have location history on.

    Without ‘Find My,’ there is no way to remotely lock, track, or erase the device.

    Once you recover your phone, turn on ‘Find My’ and enable ‘Send Last Location’ so you are covered next time.

    Best iPhone settings to turn on before your device goes missing

    Before your iPhone ever goes missing, take a minute to set up these key protections.

    1) Turn on Find My iPhone

    This keeps your device trackable whether it is on or off. Go to Settings, then tap your name, then click Find My, then Find My iPhone and enable it. 

    2) Enable Send Last Location

    Go to Settings, then tap your name, then click Find My, then Find My iPhone and scroll down and enable Sent Last Location. 

    Your phone will save its final location before the battery dies.

    3) Turn on Find My network

    Go to Settings, tap your name, click Find My, then tap Find My iPhone and enable Find My network.
    This keeps your iPhone discoverable through nearby Apple devices even when it is off or offline.

    4) Keep two-factor authentication on

    Go to Settings, tap your name, tap Sign-In & Security, select Two-Factor Authentication (2FA), then tap your iPhone and make sure 2FA is turned on.
    This blocks anyone from accessing your Apple ID without approval.

    5) Use a strong passcode

    Go to Settings, then tap Face ID & Passcode, then enter your current passcode.
    Tap Change Passcode and follow the prompts to set a unique passcode that is hard to guess.

    6) Add a recovery contact

    Go to Settings, tap your name, tap Sign-In & Security, then tap Recovery contacts. Then, click Add Recovery Contact. 
    Add a trusted person as your recovery contact so you can verify your identity if you ever lose your iPhone. 

    CAN’T FIND YOUR ANDROID PHONE? HERE’S WHAT TO DO TO TRACK IT DOWN

    How to find an Android phone that is off or dead

    Android users can also track a missing device using Google’s Find My Device system. While you cannot see live location when the phone is powered off, you can view the last known location, lock the phone, or display a message for anyone who finds it. Here is how to track it:

    Find your Android from a browser

    Settings may vary depending on your Android phone’s manufacturer.

    • Go to android.com/find
    • Sign in with your Google account
    • Select your missing device
    • View the last known location on the map
    • Select Secure Device to lock it and display a callback message
    • Select Play Sound if the phone is on and nearby

    Find your Android from another phone

    Settings may vary depending on your Android phone’s manufacturer.

    • Download the Find My Device app on another Android
    • Sign in with your Google account
    • Tap your missing phone to view its last known location

    If the phone is off or dead, the map will show its last saved location. You can still lock the device or leave a message for whoever finds it.

    Best Android settings to turn on before your device goes missing

    Before your Android phone ever goes missing, take a minute to set up these key protections.

    Settings may vary depending on your Android phone’s manufacturer.

    1) Turn on Find My Device

    This lets you track your phone or lock it from any browser.
    Go to Settings, tap Security & privacy, tap Find My Device or Device Finders and turn it on.
    (Names may vary by manufacturer.)

    2) Enable Location Services

    This improves accuracy and helps Google save your phone’s last known location.
    Go to Settings, tap Location and turn on Use Location.

    3) Turn on Google Location History

    This allows Google to show past locations even when your phone is off.
    Go to Settings, tap Location, tap Location Services, then choose Google Location History or Google Location Sharing and turn it on.

    4) Add a recovery phone number or email

    This helps you verify your identity and recover your account fast.
    Go to Settings, tap Google, tap Manage your Google Account, then open the Security tab and add a recovery phone number or email.

    5) Use a strong screen lock

    Choose a secure lock to keep your data safe.
    Go to Settings, tap Security, then Screen lock, and select a PIN, pattern, or password that is hard to guess.

    6) Turn on “Send last location” (If available)

    Some Android models save the phone’s last known location before the battery dies.
    Go to Settings, tap Security & privacy, tap Find My Device and enable Send last location if your device supports it.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    A dead or powered-off phone does not have to stay lost. Apple’s Find My network and Google’s Find My Device system both give you a last known location and fast tools that help you lock or secure your phone. With the right settings in place before anything happens, you can recover your device sooner and protect your personal data.

    What would you do first if your phone went missing today? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • New Android malware can empty your bank account in seconds

    NEWYou can now listen to Fox News articles!

    Android users have been dealing with a steady rise in financial malware for years. Threats like Hydra, Anatsa and Octo have shown how attackers can take over a phone, read everything on the screen and drain accounts before you even notice anything wrong. Security updates have helped slow some of these strains, but malware authors keep adapting with new tricks. 

    The latest variant spotted in circulation is one of the most capable yet. It can silence your phone, take screenshots of banking apps, read clipboard entries, and even automate crypto wallet transactions. This threat is now known as Android BankBot YNRK, and it is far more advanced than typical mobile malware.

    Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    How the malware infiltrates devices

    HOW ANDROID MALWARE LETS THIEVES ACCESS YOUR ATM CASH

    Android banking malware is getting harder to spot as attackers use new tricks to take over phones and drain accounts. (Thomas Trutschel/Photothek via Getty Images)

    BankBot YNRK hides inside fake Android apps that appear legitimate when installed. In the samples analyzed by researchers at Cyfirma, the attackers used apps that impersonated official digital ID tools. Once installed, the malware begins profiling the device by collecting details such as brand, model and installed apps. It checks whether the device is an emulator to avoid automated security analysis. It also maps known models to screen resolutions, which helps it tailor its behavior to specific phones.

    To blend in, the malware can disguise itself as Google News. It does this by changing its app name and icon, then loading the real news.google.com site inside a WebView. While the victim believes the app is genuine, the malware quietly runs its background services.

    One of its first actions is to mute audio and notification alerts. This prevents victims from hearing incoming messages, alarms or calls that could signal unusual account activity. It then requests access to Accessibility Services. If granted, this allows the malware to interact with the device interface just like a user. From that point onward, it can press buttons, scroll through screens and read everything displayed on the device.

    BankBot YNRK also adds itself as a Device Administrator app. This makes it harder to remove and helps it restart itself after a reboot. To maintain long-term access, it schedules recurring background jobs that relaunch the malware every few seconds as long as the phone is connected to the internet.

    What does the malware steal

    Once the malware receives commands from its remote server, it gains near-complete control of the phone. It sends device information and installed app lists to the attackers, then receives a list of financial apps it should target. This list includes major banking apps used in Vietnam, Malaysia, Indonesia and India, along with several global cryptocurrency wallets.

    With Accessibility permissions enabled, the malware can read everything shown on the screen. It captures UI metadata such as text, view IDs and button positions. This helps it reconstruct a simplified version of any app’s interface. Using this data, it can enter login details, swipe through menus or confirm transfers. It can also set text inside fields, install or remove apps, take photos, send SMS, turn call forwarding on and open banking apps in the background while the screen appears inactive.

    In cryptocurrency wallets, the malware acts like an automated bot. It can open apps such as Exodus or MetaMask, read balances and seed phrases, dismiss biometric prompts, and carry out transactions. Because all actions happen through Accessibility, the attacker never needs your passwords or PINs. Anything visible on the screen is enough.

    The malware also monitors the clipboard, so if users copy OTPs, account numbers or crypto keys, the data is immediately sent to the attackers. With call forwarding enabled, incoming bank verification calls can be silently redirected. All of these actions happen within seconds of the malware activating.

    Google search

    BankBot YNRK hides inside fake apps that look legitimate, then disguises itself as Google News while it runs in the background. (AP Photo/Don Ryan, File)

    7 steps you can take to stay safe from banking malware

    Banking trojans are getting harder to spot, but a few simple habits can reduce the chances of your phone getting compromised. Here are seven practical steps that help you stay protected. 

    FBI WARNS OVER 1 MILLION ANDROID DEVICES HIJACKED BY MALWARE

    1) Install strong antivirus software

    Strong antivirus software helps catch trouble early by spotting suspicious behavior before it harms your Android device or exposes your data. It checks apps as you install them, alerts you to risky permissions and blocks known malware threats. Many top antivirus options also scan links and messages for danger, which adds an important layer of protection when scams move fast.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    2) Use a data-removal service to shrink your digital footprint

    Data brokers quietly collect and sell your personal details, which helps scammers target you with more convincing attacks. A reputable data-removal service can find and delete your information from dozens of sites so that criminals have less to work with. This reduces spam, phishing attempts and the chances of ending up on a malware attack list.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    3) Install apps only from trusted sources

    Avoid downloading APKs from random websites, forwarded messages or social media posts. Most banking malware spreads through sideloaded apps that look official but contain hidden code. The Play Store is not perfect, but it offers scanning, app verification and regular take-downs that greatly reduce the risk of installing infected apps.

    4) Keep your device and apps updated

    System updates often patch security issues that attackers exploit to bypass protections. Updating your apps is just as important, since outdated versions may contain weaknesses. Turn on automatic updates so that your device stays protected without you having to check manually.

    5) Use a strong password manager

    A password manager helps you create long, unique passwords for every account. It also saves you from typing passwords directly into apps, which reduces the chance of malware capturing them from your clipboard or keystrokes. If one password gets exposed, the rest of your accounts remain safe.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    man working on cellphone

    Once active, the malware can read your screen, steal financial data, automate crypto transfers and intercept OTPs within seconds. (Kurt “CyberGuy” Knutsson)

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    6) Enable two-factor authentication wherever possible

    2FA adds a confirmation step through an OTP, authenticator app or hardware key. Even if attackers steal your login details, they still need this second step to get in. It cannot stop malware that takes over your device, but it significantly limits how far an attacker can go with stolen credentials.

    GOOGLE ISSUES WARNING ON FAKE VPN APPS

    7) Review app permissions and installed apps regularly

    Malware often abuses permissions such as Accessibility or Device Admin because they allow deep control over your phone. Check your settings to see which apps have these permissions and remove anything that looks unfamiliar. Also, look through your installed apps and uninstall any tool or service you do not remember adding. Regular reviews help you spot threats early before they can steal data.

    Kurt’s key takeaway

    BankBot YNRK is one of the most capable Android banking threats discovered recently. It combines device profiling, strong persistence, UI automation and data theft to gain full control over a victim’s financial apps. Because much of its activity relies on Accessibility permissions, a single tap from the user can give attackers complete access. Staying safe means avoiding unofficial APKs, reviewing installed apps regularly and being cautious of any sudden request to enable special permissions.

    Do you think Android phone makers like Samsung or Google are doing enough to protect you from malware? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • How Android malware lets thieves access your ATM cash

    NEWYou can now listen to Fox News articles!

    Smartphone banking has made life easier, but it has also opened new opportunities for cybercriminals.

    Over the past few years, we have seen Android malware steal passwords, intercept OTPs and even take remote control of phones to drain accounts. Some scams focus on fake banking apps, while others rely on phishing messages that trick you into entering sensitive details.

    Security researchers have now discovered a new threat that goes a step further. Instead of simply stealing login information, this malware gives thieves the ability to walk up to an ATM and withdraw your money in real time.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Android malware like NGate tricks users into downloading fake banking apps that steal sensitive data. (Kurt “CyberGuy” Knutsson)

    How the NGate malware works

    The Polish Computer Emergency Response Team (CERT Polska) discovered a new Android malware called NGate that uses NFC activity to access a victim’s bank account. This malware monitors contactless payment actions on the victim’s phone and forwards all transaction data, including the PIN, directly to a server controlled by attackers. It does not just copy card details. Instead, it waits until the victim taps to pay or performs a verification step, then captures the fresh, one-time authentication codes that modern Visa and Mastercard chips generate.

    To pull this off, attackers need to infect the phone first. They typically send phishing messages claiming there is a security problem with the victim’s bank account. These messages often push people to download a fake banking app from a non-official source. Once the victim installs it, the app walks them through fake verification prompts and requests permissions that allow it to read NFC activity. As soon as the victim taps their phone or enters their PIN, the malware captures everything the ATM needs to validate a withdrawal.

    MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON

    A Google phone

    Once installed, the malware captures NFC tap-to-pay codes and PINs the moment the victim uses their phone. (Kurt “CyberGuy” Knutsson)

    What attackers do with the stolen data at the ATM

    The attackers rely on speed. The one-time codes generated during an NFC transaction are valid for only a short period. As soon as the infected phone captures the data, the information is uploaded to the attacker’s server. An accomplice waits near an ATM, holding a device capable of emulating a contactless card. This could be another phone, a smartwatch or custom NFC hardware.

    When the data arrives, the accomplice presents the card-emulating device at the ATM. Since the information contains fresh, valid authentication codes and the correct PIN, the machine treats it like a real card. The ATM authorizes the withdrawal because everything appears to match a legitimate transaction. All of this happens without the criminal ever touching the victim’s physical card. Everything depends on timing, planning and getting the victim to unknowingly complete the transaction on their own phone.

    A man holds a Google phone, powered by Android

    Criminals use the stolen, time-limited codes at an ATM to make real withdrawals without the victim’s card. (Kurt “CyberGuy” Knutsson)

    7 steps you can take to stay safe from Android NGate malware

    As attacks like NGate become more sophisticated, staying safe comes down to a mix of good digital habits and a few simple tools that protect your phone and your financial data.

    1) Download apps only from the Play Store

    Most malicious banking apps spread through direct links sent in texts or emails. These links lead to APK files hosted on random servers. When you install apps only from the Play Store, you get Google’s built-in security checks. Play Protect regularly scans apps for malware and removes harmful ones from your device. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Even if attackers send convincing messages, avoid installing anything from outside the official store. If your bank wants you to update an app, you will always find it on the Play Store.

    2) Use strong antivirus software

    One careless tap on a fake bank alert can hand criminals everything they need. Strong antivirus software can stop most threats before they cause damage. It scans new downloads, blocks unsafe links and alerts you when an app behaves in ways that could expose your financial data. Many threats like NGate rely on fake banking apps, so having real-time scanning turned on gives you an early warning if something suspicious tries to install itself.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    ATM ‘JACKPOTTING’ CRIME WAVE GROWS AFTER THIEVES WALK AWAY WITH HUNDREDS OF THOUSANDS IN CASH

    3) Keep your device and apps updated

    Security patches fix vulnerabilities that attackers use to hijack permission settings or read sensitive data. Updates also improve how Android monitors NFC and payment activity. Turn on automatic updates for both the operating system and apps, especially banking and payment apps. A fully updated device closes many of the holes that malware tries to exploit.

    4) Use a password manager to avoid phishing traps

    Phishing attacks often direct you to fake websites or fake app login pages that look identical to the real thing. A password manager saves your credentials and fills them in only when the website or app is authentic. If it refuses to autofill, it is a clear sign that you are on a fake page. Consider using a password manager to generate and store complex passwords.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Turn on two-factor authentication for all financial services

    Two-factor authentication gives you a second layer of protection, even if your password is compromised. App-based authenticators are more secure than SMS codes because they cannot be intercepted as easily. For banking apps, enabling 2FA adds friction for attackers trying to perform unauthorized actions. Combined with strong passwords from a password manager, it significantly reduces the chance of account takeover.

    6) Ignore suspicious texts, emails and calls

    Attackers rely on urgency to trick you. They often claim that your card is blocked, your account is frozen or a payment needs verification. These messages push you to act fast and install a fake app. Always pause and check your bank’s official channels. Contact the bank through verified customer care numbers or the official app. Never click links or open attachments in unsolicited messages, even if they look legitimate.

    7) Review app permissions

    Most people install apps and forget about them. Over time, unused apps pile up with unnecessary permissions that increase risk. Open your phone’s permission settings and check what each app can access. If a simple tool asks for access to NFC, messages or accessibility features, uninstall it. Attackers exploit these excessive permissions to monitor your activity or capture data without your knowledge.

    Kurt’s key takeaway

    Cybercriminals are now combining social engineering with the secure hardware features inside modern payment systems. The malware does not break NFC security. Instead, it tricks you into performing a real transaction and steals the one-time codes at that moment. This makes the attack difficult to spot and even harder to reverse once the withdrawal goes through. The best defense is simple awareness. If a bank ever urges you to download an app from outside the Play Store, treat it as an immediate warning sign. Keeping your phone clean is now as important as keeping your physical card safe.

    Have you ever downloaded an app from outside the Play Store? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Fake ChatGPT apps are hijacking your phone without you knowing

    NEWYou can now listen to Fox News articles!

    App stores are supposed to be reliable and free of malware or fake apps, but that’s far from the truth. For every legitimate application that solves a real problem, there are dozens of knockoffs waiting to exploit brand recognition and user trust. We’ve seen it happen with games, productivity tools and entertainment apps. Now, artificial intelligence has become the latest battleground for digital impostors.

    The AI boom has created an unprecedented gold rush in mobile app development, and opportunistic actors are cashing in. AI-related mobile apps collectively account for billions of downloads, and that massive user base has attracted a new wave of clones. They pose as popular apps like ChatGPT and DALL·E, but in reality, they conceal sophisticated spyware capable of stealing data and monitoring users.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    OPENAI ACCUSES NY TIMES OF WANTING TO INVADE MILLIONS OF USERS’ PRIVACY IN PAPER’S LAWSUIT AGAINST TECH GIANT

    Fake AI apps pose as trusted tools like ChatGPT and DALL·E while secretly stealing user data. (Kurt “CyberGuy” Knutsson)

    What you need to know about the fake AI apps

    The fake apps flooding app stores exist on a spectrum of harm, and understanding that range is crucial before you download any AI tools. Take the “DALL·E 3 AI Image Generator” found on Aptoide. It presents itself as an OpenAI product, complete with branding that mimics the real thing. When you open it, you see a loading screen that looks like an AI model generating an image. But nothing is actually being generated.

    Network analysis by Appknox showed the app connects only to advertising and analytics services. There’s no AI functionality, just an illusion designed to collect your data for monetization.

    Then there are apps like WhatsApp Plus, which are far more dangerous. Disguised as an upgraded version of Meta’s messenger, this app hides a complete malware framework capable of surveillance, credential theft and persistent background execution. It’s signed with a fake certificate instead of WhatsApp’s legitimate key and uses a tool often used by malware authors to encrypt malicious code.

    Once installed, it silently requests extensive permissions, including access to your contacts, SMS, call logs, device accounts and messages. These permissions allow it to intercept one-time passwords, scrape your address book and impersonate you in chats. Hidden libraries keep the code running even after you close the app. Network logs show it uses domain fronting to disguise its traffic behind Amazon Web Services and Google Cloud endpoints.

    Not every clone is malicious. Some apps identify themselves as unofficial interfaces and connect directly to real APIs. The problem is that you often can’t tell the difference between a harmless wrapper and a malicious impersonator until it’s too late.

    ChatGPT app

    Clones hide spyware that can access messages, passwords and contacts. (Kurt “CyberGuy” Knutsson)

    Users and businesses are equally at risk

    The impact of fake AI apps goes far beyond frustrated users. For enterprises, these clones pose a direct threat to brand reputation, compliance and data security.

    When a malicious app steals credentials while using your brand’s identity, customers don’t just lose data but also lose trust. Research shows customers stop buying from a brand after a major breach. The average cost of a data breach now stands at 4.45 million dollars, according to IBM’s 2025 report. In regulated sectors like finance and healthcare, such breaches can lead to violations of GDPR, HIPAA and PCI-DSS, with fines reaching up to 4% of global turnover.

    A folder labeled "AI" is seen on a smartphone.

    These impostors harm both users and brands, leading to costly data breaches and lost trust. (Kurt “CyberGuy” Knutsson)

    8 steps to protect yourself from fake AI apps

    While the threat landscape continues to evolve, there are practical measures you can take to protect yourself from malicious clones and impersonators.

    1) Install reputable antivirus software

    A quality mobile security solution can detect and block malicious apps before they cause damage. Modern antivirus programs scan apps for suspicious behavior, unauthorized permissions and known malware signatures. This first line of defense is especially important as fake apps become more sophisticated in hiding their true intentions.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Use a password manager

    Apps like WhatsApp Plus specifically target credentials and can intercept passwords typed directly into fake interfaces. A password manager autofills credentials only on legitimate sites and apps, making it significantly harder for impostors to capture your login information through phishing or fake app interfaces.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Consider identity theft protection services

    Given that malicious clones can steal personal information, intercept SMS verification codes and even impersonate users in chats, identity theft protection provides an additional safety net. These services monitor for unauthorized use of your personal information and can alert you if your identity is being misused across various platforms and services.

    Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    PROTECTING KIDS FROM AI CHATBOTS: WHAT THE GUARD ACT MEANS

    4) Enable two-factor authentication everywhere

    While some sophisticated malware can intercept SMS codes, 2FA still adds a critical layer of security. Use authenticator apps rather than SMS when possible, as they’re harder to compromise. Even if a fake app captures your password, 2FA makes it significantly more difficult for attackers to access your accounts.

    5) Keep your device and apps updated

    Security patches often address vulnerabilities that malicious apps exploit. Regular updates to your operating system and legitimate apps ensure you have the latest protections against known threats. Enable automatic updates when possible to stay protected without having to remember manual checks.

    6) Download only from official app stores

    Stick to the Apple App Store and Google Play Store rather than third-party marketplaces. While fake apps can still appear on official platforms, these stores have security review processes and are more responsive to removing malicious applications once they’re identified. Third-party app stores often have minimal or no security vetting.

    7) Verify the developer before downloading

    Check the developer name carefully. Official ChatGPT apps come from OpenAI, not random developers with similar names. Look at the number of downloads, read recent reviews and be suspicious of apps with few ratings or reviews that seem generic. Legitimate AI tools from major companies will have verified developer badges and millions of downloads.

    8) Use a data removal service

    Even if you avoid downloading fake apps, your personal information may already be circulating on data broker sites that scammers rely on. These brokers collect and sell details like your name, phone number, home address and app usage data, information that cybercriminals can use to craft convincing phishing messages or impersonate you.

    A trusted data removal service scans hundreds of broker databases and automatically submits removal requests on your behalf. Regularly removing your data helps reduce your digital footprint, making it harder for malicious actors and fake app networks to target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    The AI boom has driven massive innovation, but it has also opened new attack surfaces built on brand trust. As adoption grows across mobile platforms, enterprises must secure not only their own apps but also track how their brand appears across hundreds of app stores worldwide. In a market where billions of AI app downloads have happened, the clones aren’t coming. They’re already here, hiding behind familiar logos and polished interfaces.

    Have you ever downloaded a fake AI app without realizing it? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    Source link

  • Google steps up AI scam protection in India, but gaps remain | TechCrunch

    Google is bringing more AI muscle to India’s fight against digital fraud, rolling out on-device scam detection for Pixel 9 devices and new screen-sharing alerts for financial apps.

    Digital fraud continues to rise in India as more people come online for the first time and increasingly rely on smartphones for payments, shopping, and accessing government services. Fraud involving digital transactions accounted for more than half of all reported bank fraud in 2024 — 13,516 cases resulting in losses of ₹5.2 billion (about $58.61 million), according to the Reserve Bank of India (RBI). Online scams caused an estimated ₹70 billion (roughly $789 million) in losses in the first five months of 2025, the Ministry of Home Affairs said. Many incidents likely go unreported, either because victims are unsure how to file a complaint or wish to avoid additional scrutiny.

    On Thursday, Google announced the expansion of its real-time scam-detection feature, which uses Gemini Nano to analyze calls on-device and flag potential fraud without recording audio or sending data to Google’s servers. The feature is off by default and applies only to calls from unknown numbers, and it plays a beep during the conversation to notify participants. It debuted in the U.S. in March as a beta for English-speaking Pixel 9 users.

    Google confirmed to TechCrunch that its on-device scam detection will initially work only on Pixel 9 and later models in India and will be limited to English-speaking users, with its warning also English only. That restricts its reach in a market where Android accounts for nearly 96% of smartphones, per Statcounter, but Pixel devices held less than 1% share in 2024. The language limitation is also notable in a country where most users primarily rely on non-English languages — an audience that Google and others like Amazon have acknowledged by adding support for Indian languages across their services in recent years.

    Image Credits:Google

    The tech giant did say it was working to bring scam detection to non-Pixel Android phones, as well, without offering a timeline.

    Google also announced a pilot in India with financial apps Navi, Paytm, and Google Pay aimed at limiting screen-sharing scams, in which fraudsters persuade victims to share their screens to obtain one-time passwords, PINs, and other credentials during a call. The feature was first announced at Google I/O in May and initially tested in the U.K.

    Users with devices running Android 11 or later will be able to access the alerts, which include a one-tap option to end the call and stop screen sharing. Google confirmed to TechCrunch that it plans to add more app partners and the feature will display alerts in Indian languages as well but did not provide details.

    Techcrunch event

    San Francisco
    |
    October 13-15, 2026

    For several months, Google has also been using its Play Protect service to restrict predatory loan apps in India by blocking the sideloading of third-party apps that request sensitive permissions often exploited for fraud. The company said the service blocked more than 115 million such installation attempts this year. Google Pay, meanwhile, surfaces more than a million warnings each week for transactions flagged as potentially fraudulent, according to the company.

    Google is also running its DigiKavach awareness campaign on digital fraud, which it said has reached more than 250 million people. The company has worked with the Reserve Bank of India to publish a public list of authorized digital lending apps and their associated non-banking financial companies to help limit malicious actors.

    Earlier this year, Google launched a Safety Charter in India to expand its AI-driven fraud detection and security efforts, part of a broader plan to deploy more AI tools in the country to address rising fraud.

    Yet Google still faces significant gaps in curbing digital fraud in India. The company — like Apple — has been questioned for allowing fake and misleading apps to appear on its app store despite review processes meant to block fraudulent submissions.

    In recent years, police and security researchers have flagged investment and loan apps used in scams that remained available on the Play Store until intervention. These cases underscore the challenges Google faces in policing an ecosystem that dominates the country’s smartphone market.

    Jagmeet Singh

    Source link

  • Holy Sh*t, Google Made Android Play Nice With iPhone’s AirDrop

    I want you to brace yourself, because, despite what I’m about to tell you, the world (to my knowledge) is not ending. Are you ready? Okay… Google made Android and Apple’s AirDrop play nice with each other. Deep breaths, everyone.

    In a blog post from Google, the company said Quick Share, the Android equivalent of AirDrop, can now send files via Bluetooth to an iPhone just like it can between two Android devices. The same goes the other way, too; iOS users can now AirDrop to Android devices by discovering the device as they normally would on their iPhones. They both just… work now.

    There is one slight catch at this juncture in time, and that’s the fact that only Google Pixel 10 owners have this ability for the time being. Google says it plans to bring the functionality to other Android devices in the future—that is, if Apple doesn’t have a total meltdown first.

    As reported by The Verge, to make matters even more intriguing, Google says that this sudden interoperability was not done in concert with Apple. Rather, Google went ahead and cracked this code all on its own, through “its own implementation,” adding that its security process has been vetted by a third party. Given the lack of cooperation, there’s a definitive chance that all of this will come crashing down. Trust me, I’ve seen how these iOS workarounds go (looking at you, Nothing Chats), and they’re not as simple as they’re made to sound.

    Nothing CEO Carl Pei, which makes phones like the Nothing Phone 3 and Phone 3a Lite, said on X his company is “already exploring how to bring this to Nothing phones as soon as we can.”

    If you’re curious how this all works in action, here’s a video demonstration from Google below, and Google also has official support documentation of how the process happens here. From what I can tell through the documentation and the video, it looks about as intuitive as it gets. For the record, we weren’t able to get the feature to work at Gizmodo, but folks over at Bloomberg seem to have had more success.

    It’s been a slow process, but Apple’s walled garden is definitely a lot more scalable than it used to be. First, there was RCS support, which allowed certain feature interoperability between iOS and Android, like tapbacks, read receipts, and better picture/video messaging and group chats. That process, which was actually sanctioned by Apple, was a long time coming and was more a product of external pressure on Apple to make iOS more friendly with other ecosystems, or, to put it another way, less anti-competitive. Additionally, there was the whole European Union forcing Apple to adopt USB-C thing, which… thank god.

    While better functionality between AirDrop and Quick Share doesn’t appear to have been the product of the same pressure, there’s a chance that it could still stick, given the fact that regulators seem to be more acutely aware of potential anti-competitiveness. In the event that Apple puts its foot down, would Google appeal its case? I don’t know, maybe. Or maybe Apple won’t even try, knowing full well it’s lost similar battles in recent years.

    For now, all we have is speculation and a little hope. Maybe our mobile computing just actually, for real, and for good, got a little bit easier.

    James Pero

    Source link

  • Got a Pixel 10? Google’s Android Phone Can Now Share Files With Apple’s AirDrop

    The caveat is that the iPhone user will need to switch AirDrop into the “Everyone for 10 Minutes” mode instead of “Contacts Only” mode. Google says this isn’t some kind of workaround solution. It’s a direct, peer-to-peer connection; your data isn’t routed through a server, shared content isn’t logged, and no extra data is shared. Naturally, iPhone owners will be able to send data back to Pixel 10 phones as well.

    Google has not worked with Apple on this cross-compatibility, as the company says it “welcomes the opportunity” to work with Apple so that this sharing function can work in the Contacts Only mode. “We accomplished this through our own implementation,” a Google spokesperson tells WIRED. “Our goal is to provide an easy and secure file-sharing experience for our users, regardless of who they are communicating with.”

    In a security blog post, Google says the underlying strategy for what makes this new synergy between Quick Share and AirDrop work is the memory-safe Rust programming language. “These overlapping protections on both platforms work in concert with the secure connection to provide comprehensive safety for your data when you share or receive,” writes Dave Kleidermacher, vice president of Google’s platforms security and privacy.

    Google tapped NetSPI, a third-party and independent penetration testing firm, to validate the security of the new sharing feature. The findings? The interoperability is “notably stronger” than other industry implementations. That’s pretty important, considering what happened the last time someone tried to improve cross-compatibility between iOS and Android without Apple: the startup Beeper tried to make texts from Android phones show up as blue bubbles on iPhones and caused all kinds of drama.

    The number of people who can actually use this feature is limited because it’s only available on Google’s latest Pixel 10 smartphones, which just launched this past August. However, Google says it’s looking to expand the feature to more Android devices in the future.

    This new feature in Quick Share is rolling out starting today to the Pixel 10 series, which includes the Google Pixel 10, Pixel 10 Pro, Pixel 10 Pro XL, and Pixel 10 Pro Fold. As it’s rolling out, you may not see it immediately on your device. To use it, all you need to do is select something to share, whether it’s a file, contact, or photo, choose Quick Share in the sharing menu, and make sure the iPhone owner has their AirDrop set to “Everyone for 10 Minutes Only.” The iPhone will be able to see the Pixel 10 device and can receive or send data.

    Julian Chokkattu

    Source link

  • Manage Android apps with the new ‘Uninstall’ button

    NEWYou can now listen to Fox News articles!

    If you use more than one Android device with the same Google account, you know how messy things can get.

    Tracking which apps are installed on which phone or tablet can quickly become confusing. The Google Play Store already showed how many of your devices had a particular app, but uninstalling apps across multiple devices required digging through several menus.

    That’s changing now, thanks to Google’s latest Play Store update.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

    A new Play Store update makes it easier to manage apps across all your Android devices. (Kurt “CyberGuy” Knutsson)

    The new uninstall button rolls out

    Google is rolling out version 48.8 of the Play Store, and it introduces a new ‘Uninstall’ button right on each app’s listing. You can now remove an app from any of your devices directly from your main phone. This eliminates the need to pick up each device and remove the app one by one. According to Android Authority and other reliable tech outlets, this feature appears beside each Android device listed under your account, making it faster to keep your devices organized and clutter-free.

    The update replaces the older process that required navigating through ‘Profile,’ then ‘Manage Apps and Devices,’ then applying a device filter before uninstalling. That long-winded method still works, but the new shortcut saves time and effort. The feature is rolling out gradually, so you might not see it right away, but it should appear soon as part of the stable update.

    Why this update matters

    For anyone juggling a phone, tablet or even a work device, this new feature makes a real difference. Over time, unused apps pile up, taking up storage space and slowing down performance. Being able to remove them remotely helps keep every device clean and efficient without switching between screens.

    The change also improves digital hygiene. Many people forget about apps on old phones that still have access to personal data or permissions. Now you can easily remove those apps before they become a privacy or security risk. The update also makes it simpler for parents managing family devices to stay in control of what’s installed on their kids’ phones.

    How to use the new uninstall button on Android 

    Settings may vary depending on your Android phone’s manufacturer. 

    • Open the Play Store app on your device.
    • Navigate to the listing of an app that you know is installed on another device signed in to your account.
    • Under the “Installed on X devices” section, you may see a new ‘Uninstall’ button next to each listed device.
    • Tap Uninstall next to the one you want to remove from your Android.

    Then click This Device.

    GOOGLE CHROME AUTOFILL NOW HANDLES IDS

    An Android screen tutorial

    Steps to use the new uninstall button on Android. (Kurt “CyberGuy” Knutsson)

    How to uninstall Android apps when the new Play Store button isn’t showing

    Wait for the update to roll out if key features aren’t showing yet. If the button isn’t present, you can still uninstall an app with these steps:

    Settings may vary depending on your Android phone’s manufacturer.

    • Click Profile.
    • Tap Manage apps & devices.
    • Click Manage.
    • Use the device filter to select the target device.
    • Press the app you want to uninstall.

    Click uninstall.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    A tutorial on how to uninstall apps from Android across multiple devices

    The new feature saves time and improves organization across a user’s Android devices. (Kurt “CyberGuy” Knutsson)

    What this means to you

    This feature saves time, improves organization and helps you keep your Android devices running smoothly. By uninstalling unused apps remotely, you free up valuable storage and reduce unnecessary background activity that can drain battery life. You also make your devices more secure by removing older apps that might not be receiving updates anymore. It’s a thoughtful update that shows how Google is paying attention to everyday usability rather than adding flashy new tools. Even if it seems like a small change, the impact adds up for people who live in a multi-device world.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    The new ‘Uninstall’ button in Play Store version 48.8 is a quiet but powerful improvement for Android users. It makes it easier to manage your apps and maintain a cleaner digital environment across all your devices. Once this update reaches your phone, it’s worth exploring which apps you no longer need and removing them in just a few seconds.

    Do you plan to tidy up your devices using the new Google Play Store feature, or do you prefer to manage apps directly from each phone? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • The OnePlus 15 Has Two-Day Battery Life. ’Nuff Said

    On days with light use, I have 70 percent left by bedtime. When I spent more time on the phone, using it for music streaming, navigation, and Instagram Reels-ing, I often ended with around 60 or 50 percent. I’d leave it on my nightstand without bothering to plug it in, a refreshing change of pace. Over the course of two days, I hit an amazing 10.5 hours of screen-on time.

    This might be the best battery life on a flagship smartphone today in the US, especially when you pair it with the incredibly fast recharge times. OnePlus remains one of the only companies to include a charger in the box—mostly because it’s the only way to take advantage of its SuperVooc fast-charging technology. I was able to ramp from 15 to 80 percent in 30 minutes (50 percent in 15 minutes). It’s hard to worry about a dead phone if you don’t mind keeping the bulky charger on your person (is a folding prong too much of an ask?).

    But there’s always a compromise somewhere. If you’re a fan of wireless charging and are especially interested in Qi2 smartphones that use magnets (like Apple’s MagSafe) for more convenient and faster charging, you’ll be disappointed here. The OnePlus 15 supports wireless charging, but only the standard Qi technology. OnePlus is selling magnetic cases as a salve, but unlike Samsung’s current crop of top-end phones, this doesn’t even turn it into a Qi2 Ready phone. It will only charge at slow Qi wireless charging speeds. (You can buy OnePlus’ proprietary wireless charger to fast-charge, but that’s a separate purchase, and that wireless charger will only recharge select OnePlus devices quickly.)

    The beefy battery and super-fast wired charging may outshine the lackluster wireless charging, but now it’s time to talk about the second most impressive feat of the OnePlus 15: performance.

    Power Play

    Photograph: Julian Chokkattu

    This is the first smartphone in the US to employ Qualcomm’s Snapdragon 8 Elite Gen 5, a processor we’ll see in most high-end Android phones in 2026. The benchmark numbers are excellent. In a Geekbench 6 test, the OnePlus 15 is officially the first phone to pass 10,000 in multi-core CPU performance, even besting the iPhone 17 Pro Max. However, the iPhone still had a slight leg up in single-core performance (it’s also generally more efficient).

    Julian Chokkattu

    Source link

  • Nothing’s Budget-Friendly Phone (3a) Lite Is a Diluted Disappointment

    The 5,000-mAh battery is ample for most days, and the Nothing Phone (3a) Lite could maybe even last two days of light use. You’ll have to plug in when it runs low (there’s no wireless charging), and the rate tops out at 33 watts. That’s not bad, enabling you to go from zero to 80 percent in less than an hour. There’s 5G, Wi-Fi 6, and Bluetooth 5.3 support, but expect the battery to drain much faster on 5G networks.

    Where the MediaTek Dimensity 7300 Pro chipset and 8 GB of RAM really struggled for me was the camera. On several occasions, it took seconds to open, and I had to reboot the phone at one point to get the camera app to load at all. I encountered occasional lag on opening and switching apps, but the camera performance was jarring because general use feels relatively slick for a budget phone.

    It doesn’t help that the camera system is disappointing. The main 50-megapixel shooter is capable, if a little slow, with a large-ish 1/1.57-inch sensor and an f/1.8 aperture that handles a range of scenarios quite well. But the 8-megapixel ultrawide is poor, and the 2-megapixel macro is a complete waste of time. Comparing a close-up with the macro and the main camera (see the flower photos) shows how useless it is. There’s a 16-megapixel shooter around front that’s fine for selfies and video calls.

    You’d think a design-led company like Nothing would be more calculated in adding features that only add value. If the ultrawide and macro are only going to offer lackluster results, cut them and stick with a single, solid primary camera.

    Simon Hill

    Source link

  • Turn on 3 Settings Before Taking Screenshots in Color OS 16 Phones

    • Now, in my line of work, I take a lot of screenshots on a regular basis, and in between continuous screenshots, I have to wait for a couple of seconds because of the preview window.
    • I had the chance to experience it on the Oppo X9, and I discovered something that no one has talked about, and it is actually useful.
    • Once you tap on Software, you will see the OS version your phone is running on, and if there is any update, it will be reflected at the bottom.

    ColourOS 16 is now live, and there are a lot of positive reviews. I had the chance to experience it on the Oppo X9, and I discovered something that no one has talked about, and it is actually useful. Now, in my line of work, I take a lot of screenshots on a regular basis, and in between continuous screenshots, I have to wait for a couple of seconds because of the preview window. This is something that has bothered me for a while, but now I can disable it along with the screenshot notification. Let me tell you all about it.

    Why Should You Enable These Settings?

    The simple answer is that these settings will change the way you take screenshots. Meaning I will have control of the sound, animation, preview, and notification. Not only this, but I can also hide the notification and navigation bar from the screenshots. Giving me a much cleaner screengrab. This can be very useful when you are collecting data for presentations or your case studies. Here is how I enabled these settings.

    Steps to Enable Screenshot Settings

    Head over to the device’s settings and follow the steps mentioned below.

    1. Open Settings and scroll down to Accessibility & Convenience.

    Accesibility & Convinence

    2. In the next menu, tap on Screenshots.

    screenshot options in settings

    3. From the next menu, scroll down, and you will see multiple options.

    4. You can toggle on and off according to your choices.

    Screenshot settings - 1

    5. If you want to automatically delete the original screenshot after you have edited it, you can also do that.

    Screenshot settings - 2

    FAQs

    Q. Will the Reno series from Oppo receive the ColorOS 16 update?

    Yes, both the Reno 13 and 14 series will be getting the latest ColourOS 16 update in November. So if you have a device of either series, then keep checking for updates.

    Q. How can I check for updates on my Oppo device?

    To check for software updates, you need to go to Settings> System > Software. Once you tap on Software, you will see the OS version your phone is running on, and if there is any update, it will be reflected at the bottom.

    Wrapping Up

    This article talks about a few useful features that are centered around screenshots. These features allow you to control many things, such as previewing screenshots, adjusting sound, enabling notifications, and editing. You can play around and change the settings to your liking.

    Have any questions related to our how-to guides, or anything in the world of technology? Check out our new GadgetsToUse AI Chatbot for free, powered by ChatGPT.

    You can also follow us for instant tech news at Google News or for tips and tricks, smartphones & gadgets reviews, join the GadgetsToUse Telegram Group, or subscribe to the GadgetsToUse Youtube Channel for the latest review videos.

    Was this article helpful?

    YesNo

    Dev Chaudhary

    Source link

  • Capturing the northern lights: How to take the best photos of auroras

    Multiple parts of the United States were treated to mesmerizing colors from the aurora borealis, or northern lights, in the sky Tuesday night. This is because of a severe geomagnetic storm triggered by solar flares. Related video above: Weather Talk — How do I know if we can see the Northern Lights?The lights can appear faint when looked at with the naked eye, but with the right camera settings, the different colors and waves can be seen in photos.Forecasters say there is still a chance that some regions would get to catch the lights on Wednesday night. Here’s how to take the best photos of them:Using nighttime picture-taking settingsMost newer versions of iPhone and Android phones have a setting for taking pictures in low light. This slows the shutter speed, allowing more light in and taking a clearer picture. Here’s how to adjust settings on iPhone and Android devices like Samsung phones or Google Pixel phones. It’s important to hold your phone steady or use a tripod so your image does not end up blurry.Video below: Check out these dazzling photos of Tuesday night’s northern lights in IowaThere’s an app for that, tooThere are also apps available that are specifically designed to help you take pictures of the northern lights. Check the app stores on your iPhones or Android devices.Be in the right place at the right timeArtificial light pollution can decrease your chances of catching the best colors, so it is best to get away from cities and into rural areas for picture-taking. There will be more visibility the farther north you can get. Any time after it gets dark outside and before midnight will be the best opportunity. Related video below: What causes the colors you see with the northern lights?

    Multiple parts of the United States were treated to mesmerizing colors from the aurora borealis, or northern lights, in the sky Tuesday night. This is because of a severe geomagnetic storm triggered by solar flares.

    Related video above: Weather Talk — How do I know if we can see the Northern Lights?

    The lights can appear faint when looked at with the naked eye, but with the right camera settings, the different colors and waves can be seen in photos.

    Forecasters say there is still a chance that some regions would get to catch the lights on Wednesday night. Here’s how to take the best photos of them:

    Using nighttime picture-taking settings

    Most newer versions of iPhone and Android phones have a setting for taking pictures in low light. This slows the shutter speed, allowing more light in and taking a clearer picture. Here’s how to adjust settings on iPhone and Android devices like Samsung phones or Google Pixel phones.

    It’s important to hold your phone steady or use a tripod so your image does not end up blurry.

    Video below: Check out these dazzling photos of Tuesday night’s northern lights in Iowa

    There’s an app for that, too

    There are also apps available that are specifically designed to help you take pictures of the northern lights. Check the app stores on your iPhones or Android devices.

    Be in the right place at the right time

    Artificial light pollution can decrease your chances of catching the best colors, so it is best to get away from cities and into rural areas for picture-taking.

    There will be more visibility the farther north you can get. Any time after it gets dark outside and before midnight will be the best opportunity.

    Related video below: What causes the colors you see with the northern lights?

    Source link

  • Capturing the northern lights: How to take the best photos of auroras

    Multiple parts of the United States were treated to mesmerizing colors from the aurora borealis, or northern lights, in the sky Tuesday night. This is because of a severe geomagnetic storm triggered by solar flares. Related video above: Weather Talk — How do I know if we can see the Northern Lights?The lights can appear faint when looked at with the naked eye, but with the right camera settings, the different colors and waves can be seen in photos.Forecasters say there is still a chance that some regions would get to catch the lights on Wednesday night. Here’s how to take the best photos of them:Using nighttime picture-taking settingsMost newer versions of iPhone and Android phones have a setting for taking pictures in low light. This slows the shutter speed, allowing more light in and taking a clearer picture. Here’s how to adjust settings on iPhone and Android devices like Samsung phones or Google Pixel phones. It’s important to hold your phone steady or use a tripod so your image does not end up blurry.Video below: Check out these dazzling photos of Tuesday night’s northern lights in IowaThere’s an app for that, tooThere are also apps available that are specifically designed to help you take pictures of the northern lights. Check the app stores on your iPhones or Android devices.Be in the right place at the right timeArtificial light pollution can decrease your chances of catching the best colors, so it is best to get away from cities and into rural areas for picture-taking. There will be more visibility the farther north you can get. Any time after it gets dark outside and before midnight will be the best opportunity. Related video below: What causes the colors you see with the northern lights?

    Multiple parts of the United States were treated to mesmerizing colors from the aurora borealis, or northern lights, in the sky Tuesday night. This is because of a severe geomagnetic storm triggered by solar flares.

    Related video above: Weather Talk — How do I know if we can see the Northern Lights?

    The lights can appear faint when looked at with the naked eye, but with the right camera settings, the different colors and waves can be seen in photos.

    Forecasters say there is still a chance that some regions would get to catch the lights on Wednesday night. Here’s how to take the best photos of them:

    Using nighttime picture-taking settings

    Most newer versions of iPhone and Android phones have a setting for taking pictures in low light. This slows the shutter speed, allowing more light in and taking a clearer picture. Here’s how to adjust settings on iPhone and Android devices like Samsung phones or Google Pixel phones.

    It’s important to hold your phone steady or use a tripod so your image does not end up blurry.

    Video below: Check out these dazzling photos of Tuesday night’s northern lights in Iowa

    There’s an app for that, too

    There are also apps available that are specifically designed to help you take pictures of the northern lights. Check the app stores on your iPhones or Android devices.

    Be in the right place at the right time

    Artificial light pollution can decrease your chances of catching the best colors, so it is best to get away from cities and into rural areas for picture-taking.

    There will be more visibility the farther north you can get. Any time after it gets dark outside and before midnight will be the best opportunity.

    Related video below: What causes the colors you see with the northern lights?

    Source link

  • Google and Epic Games reach settlement for antitrust lawsuit

    Google and Epic Games have reached a settlement that would bring their years-long court battle to a close. The companies have filed a proposal in the federal court of San Francisco, asking US District Judge James Donato to approve a modified version of the order he originally imposed on Google when it lost the case. “Together with Epic Games we have filed a proposed set of changes to Android and Google Play that focus on expanding developer choice and flexibility, lowering fees, and encouraging more competition all while keeping users safe,” said Sameer Samat, the President of Android Ecosystem at Google, on X.

    Epic Games CEO Tim Sweeney praised the proposal for “genuinely [doubling] down on Android’s original vision as an open platform to streamline competing store installs globally, reduce service fees for developers on Google Play and enable third-party in-app and web payments.” Epic Games sued Google in 2020, accusing it of an illegal monopoly on app distribution and in-app billing services for Android devices.

    The court sided with Epic Games in late 2023, and Google lost its appeal in July this year. Google tried to ask the Supreme Court to block the injunction Donato handed down, which required the company to make major changes to the Play Store, while it appealed the case again. But the Supreme Court denied its request. That means Google will be prohibited from paying manufacturers and app developers to exclusively install and distribute on the Play Store, respectively. It will also be prohibited from forcing developers to only use its payment system, and it will have to allow third-party app stores to be installed on Android devices.

    Google will still have to follow most of Donato’s orders under the proposal, but the companies made some modifications. To start with, they’ve worked out how to “allow developers and users to seamlessly use alternative payment mechanisms,” both in-app and via external links, while adhering to Google’s security and safety standards. They’ve also specified the maximum fees Google can charge for both in-app and linked transactions, which are 9 percent or 20 percent, depending on the type of transaction. This fee cap also depends on when the app in question was installed. Specifically, the commission caps on third party in-app payment systems would only apply to new app installs.

    The companies have identified “reasonable, neutral criteria” that third-party stores would be required to meet, as well. Users will easily be able to download stores that meet those criteria so they can compete against the Play Store and each other around the world.

    Samat said that the companies are meeting with Judge Donato on Thursday, and if he approves of the proposal, it “would resolve [the] litigations.”

    Update, November 5, 2025, 2:22PM ET: This story has been updated with more details on how the fee caps for in-app purchases and linked transactions work.

    Mariella Moon

    Source link

  • The Pixel 10 Family Is Marked Down on Amazon

    If you’re a part of the Pixel crew like I am, you know that discounts on the latest generation are few and far between. That’s why I’m pleased to share that the entire family of Pixel 10 phones, from the regular Pixel 10 all the way up to the recently-released Pixel 10 Pro Fold, are all marked down by various amounts on Amazon.

    • Photograph: Julian Chokkattu

    • Photograph: Julian Chokkattu

    • Photograph: Julian Chokkattu

    Pixel 10, Pixel 10 Pro, and Pixel 10 Pro XL

    Starting with the base model Pixel 10, you’ll save $200 on both the 128 GB and 256 GB models in all four colors, bringing the prices down to $599 and $699, respectively. The base version of the Pixel 10 makes a few compromises to bring the price down, like foregoing the Pro model’s vapor chamber for cooling, and opting for a smaller camera sensor. It’s still an excellent choice for casual Android enjoyers, particularly at the price, but power users and mobile gamers may want to think about upgrading to the Pro.

    Like the regular 10, the Pixel 10 Pro is marked down by $250 across all sizes, but color availability does change a bit, particularly on the 1 TB model. The biggest difference between the two models are the higher-resolution screen, more memory, and the bigger and better camera sensors. You can also get the higher storage models, while the regular Pixel 10 only goes up to 256 GB. The Pixel 10 Pro XL, which has the same specs as the 10 Pro but with a larger screen, is marked down by $300, again with some varying availability between color and storage size.

    • Photograph: Julian Chokkattu

    • Photograph: Julian Chokkattu

    • Photograph: Julian Chokkattu

    • Photograph: Julian Chokkattu

    Finally, we have the Pixel 10 Pro Fold, which just recently became available for purchase, and is already marked down by a not-insignificant $300 for both the 256 GB and 512 GB models, and I even spotted both colors in stock at both sizes. It has not one, but two excellent displays, and feels premium and sturdy, even if it is missing some of the features found on the 10 Pro.

    With discounts on a variety of Pixel 10 series phones, you might need a little more help deciding which one is for you. We have a handy guide that compares all the currently available Pixel phones, including the Pixel 9a, which is currently discounted as well. We also have an in-depth review comparing the Pixel 10, Pixel 10 Pro, and Pixel 10 Pro XL specifically, which is worth a read for the extra details.

    Brad Bourque

    Source link

  • Stop foreign-owned apps from harvesting your personal data

    NEWYou can now listen to Fox News articles!

    You might not think twice about that flashlight app you downloaded or the cute game your grandkids recommended. Yet with a single tap, your private data could travel halfway across the world into the hands of people who profit from selling it. A growing threat is emerging as foreign-owned apps quietly collect massive amounts of personal data about you, and older Americans are among the most vulnerable.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    The hidden cost of ‘free’ apps

    We all love free apps. Whether it’s a shopping deal finder, a weather tracker or a photo editor, they make life easier. But many of these “free” tools aren’t really free; they just don’t charge you money. Instead, they collect your personal information and sell it to make their profit.

    A recent study revealed that over half of the most popular foreign-owned apps available in U.S. app stores collect sensitive user data, including your location, contacts, photos and even keystrokes.

    Many “free” apps secretly collect personal data from users, sending private information to foreign servers without consent. (Kurt “CyberGuy” Knutsson)

    Some of the worst offenders are apps that seem completely harmless:

    • Flashlight and weather apps that track your GPS location 24/7.
    • Shopping apps that collect purchase history, payment preferences and home addresses.
    • Casual games that request access to your camera and contacts for no logical reason.

    These apps often share data with data brokers and ad networks overseas, where privacy laws are weaker and accountability is nearly impossible.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Why retirees are prime targets

    If you’re retired, you may already be on dozens of public databases like voter rolls, real estate listings and charity donor lists. Combine that with information harvested from apps, and scammers can build a frighteningly detailed profile of your life.

    Young woman types on smartphone

    Flashlight, weather and shopping apps often request unnecessary access to your camera, contacts and location to track you around the clock. (Portra/Getty Images)

    They can see:

    • Where you live and who lives with you.
    • What medications you search for.
    • What causes you support or charities you donate to.
    • What devices you own and which banks you use.

    From there, they can craft highly convincing scams like fake donation requests, Medicare scams or phishing texts that look eerily personal. Some even use your social media photos to mimic family members in “grandparent scams.” And it all starts with what you allowed that “harmless” app to access.

    Signs your data might already be exposed

    You don’t need to be a tech expert to spot the warning signs. Here’s what to look for:

    • Unfamiliar charges or new accounts in your name.
    • An increase in scam calls or texts, especially with personal details like your city or bank.
    • Emails from foreign domains claiming to offer rewards or urgent account updates.
    • Ads that seem to “read your mind,” which show up right after you talk about something offline.

    If you’ve noticed any of these, your information is likely circulating through data brokers who purchased it from app networks.

    A smartphone displays apps.

    Older Americans are prime targets, but simple steps like deleting risky apps and reviewing permissions can help protect your privacy. (Kurt “CyberGuy” Knutsson)

    How to stop the data drain

    You can take back control of your data starting right now.

    1) Audit your apps

    Go through your phone and delete any apps you don’t use regularly, especially free ones from unfamiliar developers.

    2) Stop data brokers from trading your info

    Even after deleting risky apps, your personal information may already be circulating online. This is where a data removal service can make a massive difference. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    3) Check permissions

    Open your settings and review which apps have access to your location, contacts or camera. Revoke any unnecessary permissions immediately.

    TEA APP HACKED AS WOMEN’S PHOTOS, IDS & EVEN DMS LEAKED ONLINE

    4) Avoid “foreign-owned” apps that request extensive access without a clear reason.

    Always read the privacy policy (yes, it’s tedious but eye-opening). If an app asks for permissions that do not match its purpose, like a calculator wanting your location or a flashlight needing camera access, that is a major red flag. Many foreign-owned apps hide behind vague privacy terms that allow data to be transferred to overseas servers where U.S. privacy laws do not apply.

    5) Use official stores only

    Stick to the Apple App Store or Google Play Store for downloads. Avoid third-party sites that host cloned or tampered versions of popular apps. Look for verified developers and check privacy ratings in reviews before installing anything new.

    6) Keep your device and apps updated

    Updates close security holes that hackers exploit through malicious apps. Turn on automatic updates so your phone and apps stay protected without you having to remember.

    7) Turn off ad tracking

    Limit how much of your activity is shared with advertisers. 

    On iPhone:

    Go to Settings Privacy & Security Tracking and toggle off “Allow Apps to Request to Track.” 

    On Android: 

    (Settings may vary depending on your Android phone’s manufacturer) 

    Go to Settings → Google → Ads (or Settings → Privacy → Ads) and choose “Delete advertising ID” or “Reset advertising ID.” This action removes or replaces your unique ID so apps and advertisers can no longer use it for personalized ad tracking.

    This step stops apps from following you across other platforms and building data profiles about your habits.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Foreign-owned apps are the new front line in data harvesting, and retirees are the easiest targets. But you don’t have to accept that your private life is public property. It’s time to take back control. Delete the apps you don’t need. Lock down your permissions. And let a data removal service erase your data trail before scammers can use it against you.

    Have you checked which of your apps might be secretly sending your personal data overseas? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    Source link

  • 5 phone safety tips every parent should know

    NEWYou can now listen to Fox News articles!

    Kids today are growing up in a world where screens, apps and social platforms are part of everyday life. From homework to gaming to group chats, their digital lives can move faster than parents can keep up. But behind every app and device are settings and systems that can impact their privacy, safety, and focus.

    Whether you’re trying to set healthy limits, track screen time or just understand what your child’s phone can do, knowing a few key tech terms can make parenting in the digital age a lot less stressful. Here’s a quick guide to help you stay informed, confident and in control.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Setting healthy screen time limits helps kids learn balance and keeps tech use from taking over family time. (Kurt “CyberGuy” Knutsson)

    1) Screen time limits

    The boundary that helps restore balance

    Screen time limits let you manage how long your child spends on apps, games or devices each day. It’s not about punishment, it’s about setting healthy boundaries that help kids disconnect and recharge.

    Why it matters: Too much screen time has been linked to reduced focus, sleep disruption and overstimulation. Setting limits helps your child create a better balance between online fun and real-world rest.

    How to set screen time limits

    On iPhone:

    • Go to Settings
    • Tap Screen Time
    • Click App Limits
    • Select Add Limit, choose categories or specific apps and set daily time limit

    On Android:

    Settings may vary depending on your Android phone’s manufacturer

    • Go to Settings
    • Tap Digital Wellbeing & Parental Controls. If you don’t see it right away, try searching “Digital Wellbeing” in the Settings search bar
    • Open the Dashboard or App Timers section. On some phones (like Samsung), it may appear as “App Timers”. On others (like Google Pixel), tap Dashboard to view your app usage list
    • Tap the hourglass icon next to the app you want to limit
    • Set a daily time limit, then tap OK or Done
    • The timer resets every night at midnight

    Pro tip: Make it a family routine. Review screen time reports together so kids feel involved in the process rather than restricted. 

    TEENS HACK SCHOOL CELL PHONE BANS WITH CREATIVE WORKAROUNDS

    2) Parental controls

    Your built-in safety net

    Parental controls are tools that let you manage what your child can see and do on their devices – from blocking explicit content to approving downloads and monitoring usage. Every major device, app and streaming service has its own version.

    Why it matters: Parental controls can help prevent exposure to inappropriate content, manage purchases and set up age-appropriate experiences.

    Woman using Iphone

    Built-in parental controls make it easier to guide what kids can see and do on their devices. (Kurt “CyberGuy” Knutsson)

    How to turn parental controls on

    On iPhone:

    • Go to Settings
    • Click Screen Time 
    • Tap Content & Privacy Restrictions
    • Turn it on so the toggle turns green.
    • Within Content & Privacy Restrictions you can go to sections like Allowed AppsiTunes & App Store Purchases, etc, to set filters and restrict what apps the device can do.

    On Android:

    Settings may vary depending on your Android phone‘s manufacturer

    • Go to Settings
    • Tap Digital Wellbeing & Parental Controls
    • Select Parental Controls, then follow the steps to set up a supervised account through Google Family Link, which lets you manage screen time on a child’s device remotely

    Pro tip: Most streaming apps, like YouTube, Netflix and Disney+, also have parental settings, so make sure you adjust those separately.

    3) Geolocation

    The invisible map in your child’s pocket

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    Geolocation allows apps and devices to track physical location in real time. It powers navigation and “Find My” features but can also share more than you intend if left unchecked.

    Why it matters: While location sharing helps families stay connected, it can pose privacy and safety concerns if apps broadcast your child’s whereabouts.

    How to manage location access

    On iPhone:

    • Go to Settings
    • Click Privacy & Security
    • Then, click Location Services
    • Tap each app and change “Always” to “While Using the App” or “Never”

    On Android:

    Settings may vary depending on your Android phone’s manufacturer

    • Go to Settings
    • Tap Location (or “Location & security” or “Privacy → Location” depending on device)
    • Tap App location permissions (or “Permission manager → Location”)
    • Select an app from the list
    • Change the app permission from, “Allow all the time” to “Allow only while using the app” or “Don’t Allow”

    Pro tip: For younger kids, use “Share My Location” within Family Sharing (iPhone) or Google Family Link (Android) instead of third-party tracking apps to ensure safer monitoring.

    4) Private browsing

    The mode that hides – but doesn’t erase

    Private browsing, also called Incognito Mode, lets users browse the internet without saving history, cookies or logins. While it may sound harmless, it can make it harder for parents to see what kids are accessing online.

    Why it matters: Private browsing prevents history tracking on the device, but your internet provider, school or router may still record activity. It’s a reminder that no browsing mode is completely private.

    TEENS FACE NEW PG-13 LIMITS ON INSTAGRAM

    How to disable private browsing

    On iPhone (Safari):

    • Open Settings
    • Tap Screen Time
    • Tap Content & Privacy Restrictions
    • If prompted, enter or set a Screen Time passcode
    • Turn on Content & Privacy Restrictions (toggle to green)
    • Tap App Store, Media & Purchases (or similarly named) and optionally set limits
    • Click Web Content 
    • Choose one of the options such as, Limit Adult Websites (this will disable Private Browsing in Safari) or Only Approved Websites 

    On Android (Chrome):

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Family Link app on your Android phone (or download it if it isn’t installed)
    • Select your child’s profile
    • Tap Controls
    • Click Google Chrome & Web
    • Choose Try to block explicit sites (or select “Only allow approved sites” for stricter filtering)
    • This setting automatically disables Incognito Mode in Chrome for your child’s supervised account
    • (Optional) You can also review SafeSearch and YouTube restrictions under the same section for extra protection
    Worried young mother watching teen girl using smartphone.

    Conversations about online safety matter more than rules alone because openness builds digital trust. (iStock)

    SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

    Pro tip: Talk to your child about why transparency matters. Turning off private browsing is most effective when paired with open, ongoing conversations about online safety.

    5) Digital footprint

    The trail your child leaves behind

    Every post, comment or photo shared online becomes part of your child’s digital footprint, a permanent record of their online presence. Even deleted posts can live on through screenshots, data archives or algorithms.

    Why it matters: Colleges, employers and even peers can access public digital traces. Teaching kids to think before posting helps them build a positive and professional online reputation.

    How to check what’s out there

    • Search your child’s name on Google and image results
    • Review old accounts or unused apps that may still contain personal info
    • Help them make their social media profiles private and share selectively

    Pro tip: You can also set up Google Alerts for your child’s name to get notified whenever new content appears online, a simple, free way to stay aware of their digital footprint as it evolves. 

    Also, you may want to consider using a data removal service to help clean up your child’s personal information that may appear on people-search sites or data-broker platforms. These tools scan the web for outdated profiles, cached pages and databases containing sensitive details like addresses, phone numbers and photos. They can automatically submit takedown requests and continue monitoring for new exposures over time.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    Parenting in the digital age doesn’t mean knowing every app or trend. It means understanding the fundamentals that shape your child’s online experience. From screen time limits to digital footprints, these five terms give you the language to set boundaries, foster trust and keep your family safer online.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Want more help building healthy digital habits at home? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com. All rights reserved.  

    Source link

  • 5 hidden battery drainers you can fix right now

    NEWYou can now listen to Fox News articles!

    You plug in your phone overnight, but by lunchtime, it’s already gasping for charge. Sound familiar? Hidden background features, sneaky settings and apps you forgot existed can quietly drain your battery faster than you think. The good news is a few quick tweaks can help your device stay powered all day, without sacrificing performance or convenience.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    1) Turn off background app refresh

    Stop apps from sapping power when you’re not using them. Even when you’re not actively scrolling or tapping, many apps continue running in the background, fetching updates, refreshing data and sending notifications. It’s convenient, but it drains your battery faster than you realize.

    For iPhone 

    • Go to Settings.
    • Tap General.
    • Click Background App Refresh.
    • Tap Background App Refresh again.
    • Select Off, or choose Wi-Fi to limit data use and battery drain.
    • You can also toggle off refresh for individual apps if you still want certain ones to run.

    WHY WI-FI CALLING MAY BE KILLING YOUR PHONE’S BATTERY LIFE

    Stop background apps from quietly draining your battery. (Kurt “CyberGuy” Knutsson)

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer. 

    • Open Settings.
    • Tap Battery (or Battery & device care, Power management, or similar).
    • Select Background usage limitsApp battery management, or Battery optimizationwording depends on your device.
    • Choose the apps you rarely use, then set them to Restricted or Optimized, or Put unused apps to sleep.
    • To let Android manage this automatically, turn on Adaptive Battery (found under Settings › Battery › Adaptive Battery).

    Pro tip: Keep essential apps, such as messaging, navigation, or weather, active so they can update in real time. Restricting background activity for apps you don’t open often can extend battery life by several hours a day.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    3 phones are plugged in with dark screens

    Turn off background refresh to stop unused apps from quietly draining your battery. (Kurt Knutsson)

    2) Disable Always-in Display

    That sleek clock on your screen might look cool, but it’s constantly using power. Always-On Display keeps your screen partially lit, even when you’re not touching it, to show time, notifications or widgets. Over time, that adds up, especially overnight.

    For iPhone (14 Pro and later)

    • Go to Settings.
    • Tap Display & Brightness.
    • Click Always On Display.
    • Toggle Off next to Always On Display to stop your phone from lighting up when locked.

    For Android

    Settings may vary, depending on your Android phone’s manufacturer. 

    • Open Settings.
    • Tap Lock screen (sometimes labeled “Lock screen & security,” “Lock screen & AOD,” “Display & lock screen,” etc.).
    • Look for Always On Display (AOD) (or similar, such as “Always show time & info”, “Ambient display”, “Screen always on when locked”).
    • Toggle Off to disable the AOD entirely, or choose an alternative mode (for example: “Tap to show” / “Show on tap” so the AOD only appears when you tap the screen) if available.
    • (Optional) Some devices allow scheduling of AOD or limiting it to when notifications are present. If you want more control, explore the sub-options under the AOD setting.

    Turning off Always-On Display can extend standby battery life by up to 10 to 15%.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    Samsung Galaxy S23 Ultra smartphone is seen in South Korea

    Turn off Always-On Display to save more power each day.  (SeongJoon Cho/Bloomberg via Getty Images)

    3) Limit location access

    GPS is one of the biggest hidden battery drains. Apps that track your location in the background, from ride-sharing to retail, can quietly sap your phone’s power even when you’re not using them. Adjusting permissions keeps your phone secure and efficient.

    For iPhone 

    • Go to Settings.
    • Tap Privacy & Security.
    • Click Location Services.
    • Tap each app individually and change Always to While Using the App or Never.
    • Now, scroll to the bottom and tap System Services.
    • Tap Significant Locations, then toggle it Off to stop your iPhone from storing detailed location and travel history. (You can also tap “Clear History” here to erase past entries.)

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Location (or sometimes Privacy & Security → Location).
    • Tap App permissions (or App location permissionsLocation permissions for apps).
    • Select an app, then choose the appropriate permission, such as “Allow only while using the app” (or “Allow only when in use”) or “Don’t allow” (or “Deny”).
    • On the same screen (for that app), you may see a toggle for “Use precise location”. If the app doesn’t need GPS accuracy, toggle Off to let it use only an approximate location.

    Apps like Maps and Weather need access, but most don’t. Tightening this setting not only boosts battery life, it also improves your privacy by limiting background tracking.

    Pro tip: Leaving essential features like Find My iPhone or Emergency Calls & SOS enabled under System Services ensures your phone can still help locate or protect you if it’s lost, even with other location options turned off.

    CLICK HERE TO GET THE FOX NEWS APP

    Limit location tracking to protect privacy and extend battery life.

    Limit location tracking to protect privacy and extend battery life. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)

    4) Turn off Raise to Wake and Tap to Wake

    Ever notice your screen lighting up when you simply pick up your phone? Those quick flashes add up. Every time your display activates — even for a second, it consumes battery power. Turning off these motion-activated features can reduce unnecessary screen wake-ups.

    For iPhone

    • Go to Settings.
    • Tap Display & Brightness.
    • Turn off Raise to Wake.

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Display (or Lock screen & security, or Advanced features, depending on your device).
    • Look for Lift/ Raise to wakeTap to wake, or Double tap to wake (sometimes found under Gestures or Motion settings).
    • Turn off “Lift/Raise to wake” and “Tap/Double tap to wake” (or choose to disable whichever is active).
    • If you want a simpler way to wake your phone only when you intend to, rely on the power-button wake (which is the default on nearly all phones).

    5) Review battery usage and spot the culprits

    If your phone is dying faster than usual, the Battery Usage tool can reveal the exact cause. You’ll see which apps are using the most power, both on screen and in the background, so you can take action.

    For iPhone

    • Go to Settings.
    • Tap Battery.
    • Scroll to view the battery usage graph and list of apps and system processes that are using power.
    • Look for any highlighted items (indicating unusually high usage).
    • Tap an app or process to view more details about its usage and background activity.
    • If you notice an app draining power in the background on an ongoing basis, consider limiting its background activity or uninstalling it if it’s not needed.

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Battery (or Battery & device carePower & battery, depending on your device).
    • Tap Battery usage or Battery usage by app (or similar).
    • Look through the list of apps and sort or filter by App usage or Screen time, if available, to identify top battery consumers.
    • Tap a high-drain app, then choose something like Restrict background usageOptimize, or Disallow background activity (depending on the options your phone offers).

    Common battery-draining culprits include social media apps, streaming apps, location-based apps and apps with heavy background update behavior. Reviewing this every few weeks can help catch new drains early. 

    Bonus: Check your battery health

    If your phone still drains quickly after these fixes, your battery might be aging. Both iPhones and Android devices offer built-in diagnostics to check battery health and capacity.

    For iPhone

    • Go to Settings.
    • Tap Battery.
    • Tap Battery Health & Charging (on some older versions, it may simply be “Battery Health”).
    • On the Battery Health screen, look at the Maximum Capacity percentage. This tells you how the battery’s current capacity compares to when it was new.
    • If the percentage is well below ~80%, it may be a good time to replace the battery to restore performance and capacity. (Apple notes that batteries are designed to retain around 80 % of their original capacity at 500 full charge cycles under ideal conditions.)

    For Android

    Settings may vary, depending on your Android phone’s manufacturer.

    • Go to Settings.
    • Tap Battery (or “Battery & device care,” “Power & battery,” depending on your phone).
    • Look for an option called Battery healthBattery capacityBattery status or Battery Information. Note: this may not appear on all phones.
    • If the built-in health indicator isn’t available, you can open the hidden test menu by dialing *#*#4636#*#* in the Phone app. If “Battery information” appears, you may see stats such as health, capacity, or cycle count.
    • If your battery health or capacity is shown as “Reduced” or significantly lower than expected, consider replacing the battery for better performance and longevity.

    Replacing an aging battery can dramatically improve performance and lifespan, often more than any software tweak.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    With a few quick tweaks, your phone can finally keep up with you all day. Adjusting settings, limiting background activity and checking battery health really do make a difference. You’ll spend less time stressing about a low battery and more time actually using your phone. Stay proactive, and your device will stay powered when you need it most.

    Got a tip you’d like to share, and/or what other everyday tech challenges would you like help solving? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Zoom Uncomfortably Close With Oppo’s Crazy New Telephoto Lens

    For several years, the top Chinese smartphone brands have been duking it out for photography dominance. Even though year-over-year changes are often minuscule, these companies try to one-up one another. Take Oppo’s latest flagship, the Find X9 Pro, as an example.

    It boasts a 200-megapixel telephoto lens developed with camera manufacturer Hasselblad, so you can zoom in on a subject from afar. If that wasn’t enough, Oppo sells a bonkers Hasselblad Teleconverter Kit, a proper 3.28X telephoto lens that slots onto a special case providing more optical zoom than I’ve ever seen in a smartphone.

    The Find X9 Pro, launching alongside the slightly more modest Find X9, already launched in China, but will soon be landing in the UK and Europe (not the US). As you might expect, it is an absolute unit in terms of specs. Alongside the versatile camera system with pro software tools, there’s a lovely 6.78-inch screen, and a truly enormous 7,500 mAh silicon-carbon battery.

    Close Up

    Photograph: Simon Hill

    I love a telephoto lens in my phone. While I rarely bother with the ultrawide, the option to zoom in from a distance often proves useful. You can get close-ups at gigs and other stage-based events, pick up on cool architectural details, and sometimes figure out what the hell that distant thing is. Aptly-named zoomers don’t realize how good they’ve got it; you used to need a DSLR with a huge lens to get as close as your average phone can now.

    The Oppo Find X9 Pro has a 200-megapixel telephoto lens that supports 3X optical zoom, and it can take excellent shots at 6X zoom by cropping 200-megapixel images down to 50 megapixels. Oppo claims it’s capable of 13.2X lossless zoom using computational photography; I’m not sure about that number, but the Find X9 Pro certainly takes great photos of any distant subject. Technically, the digital zoom goes up to 120X, but anything beyond 30X starts to look like an oil painting.

    Impressive as it is, there have been other phones with 200-megapixel telephoto lenses, so Oppo kicked things up a notch with the optional Hasselblad Teleconverter Kit. Used in conjunction with its Magnetic Photographer Case, there’s a sliding attachment that slots over the camera module, then the lens twists and clicks securely into place over the telephoto lens, adding another 3.28X zoom.

    Simon Hill

    Source link