ReportWire

Tag: Cybercrime

  • Google dismantles 9M-device Android hijack network

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Free apps are supposed to cost you nothing but storage space. But in this case, they may have cost millions of people control over their own internet connections.

    Google says it has disrupted what it believes was the world’s largest residential proxy network, one that secretly hijacked around 9 million Android devices, along with computers and smart home gadgets. Most people had no idea their devices were being used since the apps worked normally, and nothing looked broken.

    But behind the scenes, those devices were quietly routing traffic for strangers, including cybercriminals.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE
     

    Google says it disrupted a massive residential proxy network that secretly hijacked about 9 million Android and smart devices. (AaronP/Bauer-Griffin/GC Images)

    How your device became part of a proxy network

    According to Google’s Threat Intelligence Group, the network was tied to a company known as IPIDEA. Instead of spreading through obvious malware, it relied on hidden software development kits, or SDKs, that were embedded inside more than 600 apps. These apps ranged from simple utilities to VPN tools and other free downloads. When you installed one, the app performed its advertised function. But it also enrolled your device into a residential proxy network.

    That means your phone, computer or smart device could be used as a relay point for someone else’s internet traffic. That traffic might include scraping websites, launching automated login attempts or masking the identity of someone conducting shady online activity. From the outside, it looked like that activity came from your home IP address. You wouldn’t see it happening, and in many cases, you wouldn’t notice any major performance issues.

    Google says in a single seven-day period earlier this year, more than 550 separate threat groups were observed using IP addresses linked to this infrastructure. That includes cybercrime operations and state-linked actors. Residential proxy networks are attractive because they make malicious traffic look like normal consumer activity. Instead of coming from a suspicious data center, it appears to come from someone’s living room.

    What Google did to shut it down

    Google says it took legal action in a U.S. federal court to seize domains used to control the infected devices and route proxy traffic. It also worked with companies like Cloudflare and other security firms to disrupt the network’s command-and-control systems. Google claims it also updated Play Protect, the built-in Android security system, so that certified devices would automatically detect and remove apps known to include the malicious SDKs.

    However, Google also warned that many of these apps were distributed outside the official Play Store. That matters because Play Protect can only scan and block threats tied to apps installed through Google Play. Third-party app stores, unofficial downloads and uncertified Android devices carry far greater risk.

    IPIDEA has claimed its service was meant for legitimate business use, such as web research and data collection. But Google’s research suggests the network was heavily abused by criminals. Even if some users knowingly installed bandwidth-sharing apps in exchange for rewards, many did not receive clear disclosure about how their devices were being used.

    Google’s investigation also found significant overlap between different proxy brands and SDK names. What looked like separate services were often tied to the same infrastructure. That makes it harder for consumers to know which apps are safe and which are quietly monetizing their connection.

    300,000 CHROME USERS HIT BY FAKE AI EXTENSIONS
     

    Samsung phones sit on display.

    Hidden software inside more than 600 apps allegedly turned phones and computers into internet relays for cybercriminals. (David Paul Morris/Bloomberg via Getty Images)

    7 ways you can protect yourself from Android proxy attacks

    If millions of devices can be quietly turned into internet relay points, the big question is, how do you make sure yours isn’t one of them? These steps reduce the risk that your phone, TV box or smart device gets pulled into a proxy network without you realizing it.

    1) Stick to official app stores

    Only download apps from the Google Play Store or other trusted app marketplaces. Some apps hide small pieces of code that can secretly use your internet connection. These are often spread through third-party app stores or direct app files called “APKs,” which are Android app files installed manually instead of through the Play Store. When you sideload apps this way, you bypass Google’s built-in security checks. Sticking to official stores helps keep those hidden threats off your device.

    2) Avoid “earn money by sharing bandwidth” apps

    If an app promises rewards for sharing your unused internet bandwidth, that’s a major red flag. In many cases, that is exactly how residential proxy networks recruit devices. Even if it sounds legitimate, you are effectively renting out your IP address. That can expose you to abuse, blacklisting or deeper network vulnerabilities.

    3) Review app permissions carefully

    Before installing any app, check what permissions it requests. A simple wallpaper app should not need full network control or background execution privileges. After installation, go into your phone’s settings and audit which apps have constant internet access, background activity rights or special device permissions.

    4) Install strong antivirus software

    Today’s mobile security tools can detect suspicious app behavior, unusual internet activity and hidden background services. Strong antivirus software adds an extra layer of protection beyond what’s built into your device, especially if you’ve installed apps in the past that you’re unsure about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Keep your devices updated

    Android security updates patch vulnerabilities that proxy operators may exploit. If you’re using an older phone, tablet or Android TV box that no longer receives updates, it may be time to upgrade. Unpatched devices are easier targets for hidden SDK abuse and botnet enrollment.

    6) Use a strong password manager

    If your device ever becomes part of a proxy network or is otherwise compromised, attackers often try to pivot into your accounts next. That’s why you should never reuse passwords. A password manager generates long, unique passwords for every account and stores them securely, so one breach does not unlock your email, banking or social media. Many password managers also include breach monitoring tools that alert you if your credentials appear in leaked databases, giving you a chance to act before real damage is done. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    7) Remove apps you don’t fully trust

    Go through your installed apps and delete or uninstall anything you don’t recognize or haven’t used in months. The fewer apps running on your device, the fewer opportunities there are for hidden SDKs to operate. If you suspect your device has been compromised, consider a full reset and reinstall only essential apps from trusted sources.

    ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP

    A person uses a laptop with a Google search tab open on the screen.

    Threat groups and state-linked actors allegedly used compromised devices to mask online activity and automate attacks. (Photo Illustration by Serene Lee/SOPA Images/LightRocket via Getty Images)

    Kurt’s key takeaway

    Residential proxy networks operate in a gray area that sounds harmless on paper but can quickly become a shield for cybercrime. In this case, millions of everyday devices were quietly enrolled into a system that attackers used to hide their tracks. Google’s takedown is a major move, but the broader market for residential proxies is still growing. That means you need to be cautious about what you install and what permissions you grant. Free apps are rarely truly free. Sometimes, the product being sold is you and your internet connection.

    Have you ever installed an app that promised rewards for sharing bandwidth, or used a free VPN without thinking twice about it? Let us know your thoughts by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    Related Article

    Stop Google from following your every move

    [ad_2]

    Source link

  • 300,000 Chrome users hit by fake AI extensions

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Your web browser may feel like a safe place, especially when you install helpful tools that promise to make your life easier. But security researchers have uncovered a dangerous campaign in which more than 300,000 people installed Chrome extensions pretending to be artificial intelligence (AI) assistants. Instead of helping, these fake tools secretly collect sensitive information like your emails, passwords and browsing activity.

    They used familiar names like ChatGPT, Gemini and AI Assistant. If you use Chrome and have installed any AI-related extension, your personal information may already be exposed. Even worse, some of these malicious extensions are still available today, putting more people at risk without their knowing.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    More than 300,000 Chrome users installed fake AI extensions that secretly harvested sensitive data. (Kurt “CyberGuy” Knutsson)

    What you need to know about fake AI extensions

    Security researchers at browser security company LayerX discovered a large campaign involving 30 malicious Chrome extensions disguised as AI-powered assistants (via BleepingComputer). Together, these extensions were installed more than 300,000 times by unsuspecting users.

    Some of the most popular extensions included names like AI Sidebar with 70,000 users, AI Assistant with 60,000 users, ChatGPT Translate with 30,000 users, and Google Gemini with 10,000 users. Another extension called Gemini AI Sidebar had 80,000 users before it was removed.

    These extensions were distributed through the official Chrome Web Store, which made them appear legitimate and trustworthy. Even more concerning, researchers found that many of these extensions were connected to the same malicious server, showing they were part of a coordinated effort.

    While some extensions have since been removed, others remain available. This means new users could still unknowingly install them and expose their personal data. Here’s the list of the affected extensions:

    • AI Assistant
    • Llama
    • Gemini AI Sidebar
    • AI Sidebar
    • ChatGPT Sidebar
    • Grok
    • Asking ChatGPT
    • ChatGBT
    • Chat Bot GPT
    • Grok Chatbot
    • Chat With Gemini
    • XAI
    • Google Gemini
    • Ask Gemini
    • AI Letter Generator
    • AI Message Generator
    • AI Translator
    • AI For Translation
    • AI Cover Letter Generator
    • AI Image Generator ChatGPT
    • Ai Wallpaper Generator
    • Ai Picture Generator
    • DeepSeek Download
    • AI Email Writer
    • Email Generator AI
    • DeepSeek Chat
    • ChatGPT Picture Generator
    • ChatGPT Translate
    • AI GPT
    • ChatGPT Translation
    • ChatGPT for Gmail

    FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

    A fake AI app in the Google Play Store

    These malicious tools were listed in the official Chrome Web Store, making them appear legitimate and trustworthy. (LayerX)

    How the fake AI Chrome extension attack works

    These fake extensions pretend to offer helpful AI features, such as translating text, summarizing emails, or acting as an AI assistant. But behind the scenes, they quietly monitor what you are doing online.

    Once installed, the extension gains permission to view and interact with the websites you visit. This allows it to read the contents of web pages, including login screens where you enter your username and password.

    In some cases, the extensions specifically targeted Gmail. They could read your email messages directly from your browser, including emails you received and even drafts you were still writing. This means attackers could access private conversations, financial information and sensitive personal details.

    The extensions then sent this information to servers controlled by the attackers. Because they loaded content remotely, the attackers could change their behavior at any time without needing to update the extension.

    Some versions could also activate voice features through your browser. This could potentially capture spoken conversations near your device and send transcripts back to the attackers.

    If you installed one of these extensions, attackers may already have access to extremely sensitive information. This includes your email content, login credentials, browsing habits and possibly even voice recordings.

    We reached out to Google for comment, and a spokesperson told CyberGuy that the company “can confirm that the extensions from this report have all been removed from the Google Web Store.”

    BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK

    Woman sitting on the floor with her laptop.

    Once installed, the extensions could read emails, capture passwords, monitor browsing activity and send the data to attacker-controlled servers. (Bildquelle/ullstein bild via Getty Images)

    7 ways you can protect yourself from malicious Chrome extensions

    If you have ever installed an AI-related Chrome extension, taking a few simple precautions now can help protect your accounts and prevent further damage.

    1) Remove any suspicious or unused browser extensions

    On a Windows PC or Mac, open Chrome and type chrome://extensions into the address bar. Review every extension listed. If you see anything unfamiliar, especially AI assistants you don’t remember installing, click “Remove” immediately. Malicious extensions depend on going unnoticed. Removing them stops further data collection and cuts off the attacker’s access to your information.

    2) Change your passwords

    If you installed any suspicious extension, assume your passwords may be compromised. Start by changing your email password first, since email controls access to most other accounts. Then update passwords for banking, shopping and social media accounts. This prevents attackers from using stolen credentials to break into your accounts.

    3) Use a password manager to create and protect strong passwords

    A password manager generates unique, complex passwords for each account and stores them securely. This prevents attackers from accessing multiple accounts if one password is stolen. Password managers also alert you if your login credentials appear in known data breaches, helping you respond quickly and protect your identity. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    4) Install strong antivirus software and keep it active

    Good antivirus software can detect malicious browser extensions, spyware, and other hidden threats. It scans your system for suspicious activity and blocks harmful programs before they can steal your information. This adds an important layer of protection that works continuously in the background to keep your device safe. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    5) Use an identity theft protection service

    Identity theft protection services monitor your personal data, including email addresses, financial accounts, and Social Security numbers, for signs of misuse. If criminals try to open accounts or commit fraud using your information, you receive alerts quickly. Early detection allows you to act fast and limit financial and personal damage. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    6) Keep your browser and computer fully updated

    Software updates fix security vulnerabilities that attackers exploit. Enable automatic updates for Chrome and your operating system so you always have the latest protections. These updates strengthen your defenses against malicious extensions and prevent attackers from taking advantage of known weaknesses.

    7) Use a personal data removal service

    Personal data removal services scan data broker websites that collect and sell your personal information. They help remove your data from these sites, reducing what attackers can find and use against you. Less exposed information means fewer opportunities for criminals to target you with scams, identity theft or phishing attacks.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Kurt’s key takeaway

    Even tools designed to make your life easier can become tools for cybercriminals. Malicious extensions often hide behind trusted names and convincing features, making them difficult to spot. You can significantly reduce your risk by reviewing your browser extensions regularly, removing anything suspicious and using protective tools like password managers and strong antivirus software.

    Have you checked your browser extensions recently? Let us know your thoughts by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    Related Article

    Malicious browser extensions hit 4.3M users

    [ad_2]

    Source link

  • Apple app password scam email warning

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You open your inbox and see a subject line from Apple. It says an app-specific password was generated for your account. Then your stomach drops.

    The email claims you authorized a $2,990.02 PayPal payment. It even includes a confirmation number. It urges you to call a support number right away. There is just one problem. You never did any of this.

    If that sounds familiar, you are likely looking at a classic Apple impersonation scam.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Scammers are using Apple branding and urgent language to trick victims into calling a fake support number. (Kevin Carter/Getty Images)

    What the fake Apple email says

    The message claims:

    • An app-specific password was generated
    • A large PayPal payment was approved
    • You should call the listed phone number to report an unauthorized transaction

    At first glance, it looks polished. It uses Apple branding. It mentions Apple Support. It includes a confirmation code. However, once you slow down and read it carefully, the red flags jump out.

    Red flags in the Apple app-specific password scam email

    Before you panic or pick up the phone, take a closer look at these warning signs that expose this Apple app-specific password scam email.

    1) The ‘To’ address is not you

    The “To” field shows an email address that is not the recipient’s actual address. That is a huge warning sign. Legitimate Apple security emails are sent directly to the Apple ID email on file. If the visible recipient address is different from yours, the message was likely mass-mailed or spoofed. Scammers blast these emails to thousands of addresses at once. They do not customize the recipient line properly. That mismatch alone is enough to treat the message as fraudulent.

    2) The sudden $2,990 charge

    Scammers love big numbers. A charge close to $3,000 is designed to trigger panic. When people feel fear, they act fast. That is exactly what the criminals want.

    3) The ‘call this number now’ trick

    The email pushes you to call a specific phone number. That number does not belong to Apple. Real Apple security emails tell you to visit your account directly. They do not pressure you to call a random support line.

    If you call, the scammer may:

    • Ask for your Apple ID password
    • Request remote access to your computer
    • Tell you to move money to “secure” your account

    That is how the real damage begins.

    4) Bold links that push you to click

    The email includes bold links such as Apple Account and Apple Support. They are designed to look official and trustworthy. However, scammers often hide malicious URLs behind legitimate-looking text. When you hover over the link, the actual destination may be a completely different website. That is why you should never click links inside a suspicious email. Instead, open a new browser window and type the official website address yourself.

    5) Mixed messages about passwords and payments

    The subject mentions an app-specific password. The body suddenly talks about a PayPal transaction. That mismatch is a major warning sign. Scammers often combine multiple fears into one message to increase urgency.

    6) Generic greeting

    The email opens with “Dear Customer.” Apple typically addresses you by your name. Generic greetings are common in bulk phishing emails.

    SPYWARE CAN HIGHJACK YOUR PHONE IN SECONDS

    A man looks at his phone in front of an Apple logo

    A fake Apple email claiming a $2,990 PayPal charge is targeting inboxes in a new impersonation scam. (Qilai Shen/Bloomberg via Getty Images)

    More subtle signs this is a scam

    There are several additional details that help confirm this is not real.

    The reply-to address may look legitimate at first glance

    In this case, the Reply-To field shows appleid-usen@email.apple.com, which appears to be an official Apple domain. However, a familiar-looking domain does not automatically prove an email is legitimate. Scammers can spoof visible sender information. They can manipulate display names and certain header fields so a message appears to come from a trusted company. Most people never see the deeper technical authentication details, such as SPF, DKIM or DMARC validation. That means a legitimate-looking sender address can still appear in a fraudulent message. When evaluating a suspicious Apple app-specific password email, weigh all the red flags together, not just the reply-to address.

    If the email also includes:

    • A mismatched “To” field
    • A large unexpected payment
    • An urgent phone number
    • Mixed messaging about passwords and PayPal

    Those warning signs matter far more than a familiar-looking domain.

    The payment language feels forced

    The email says: “You authorized a USD 2,990.02 payment to apple.com using PayPal.” That wording feels stiff and unnatural. Apple receipts usually reference specific products, subscriptions or invoice details. They do not vaguely reference a large PayPal payment tied to a password notification. The mismatch between a password alert and a major payment should raise suspicion immediately.

    The masked email formatting looks odd

    The message shows a masked address with dots and an unusual domain, such as relay.quickinvoicesus.com. That is not standard Apple formatting. Apple typically references your Apple ID directly, not an unrelated invoice-style domain. That strange domain inclusion is another strong indicator that this email is fraudulent.

    The pressure to act fast

    The message urges you to call immediately to report an unauthorized transaction. High urgency is a hallmark of phishing. Legitimate companies encourage you to log in securely to your account. They do not rush you into calling a third-party phone number. When you feel rushed, pause. Scammers rely on speed and emotion.

    What this scam is really trying to do

    This is a refund scam disguised as a security alert.

    The goal is simple. Get you to call the fake support number. Once you are on the phone, the scammer may:

    • Ask for your Apple ID password
    • Request remote access to your computer
    • Guide you through fake refund steps
    • Steal banking or PayPal information

    In many cases, victims lose far more than the fake $2,990 charge mentioned in the email.

    How to check your Apple account safely

    If you receive this type of message, pause. Then take control. Instead of clicking links in the email:

    • Open a new browser window
    • Type appleid.apple.com directly into the address bar
    • Log in and review your account activity

    If you did not generate an app-specific password and you see no suspicious charges, you are safe. You can also check your PayPal account directly by typing paypal.com into your browser. Never rely on links or phone numbers inside a suspicious email.

    Apple app-specific password scam email checklist

    Use this simple checklist the next time you get a scary email:

    • The “To” field does not match your email
    • The greeting says Dear Customer
    • There is a large unexpected charge
    • You are told to call a number immediately
    • The topic feels mismatched, such as password plus payment

    If several of these appear together, you are almost certainly dealing with a scam.

    Why Apple and PayPal impersonation scams keep working

    Apple has billions of users. PayPal has hundreds of millions more. Both brands are trusted, widely used and connected to sensitive financial information. When criminals attach Apple’s name to a message, people pay attention. When they add PayPal and a large dollar amount, the fear intensifies. That combination is powerful. It blends account security concerns with financial panic. Many people react before they pause to verify the details. That split second of fear is exactly where scammers make their money.

    “PayPal does not tolerate fraudulent activity, and we work hard to protect our customers from evolving phishing scams,” a PayPal spokesperson told CyberGuy. “We always encourage consumers to practice vigilance online and to learn how to spot the warning signs of common fraud. We recommend reviewing our best practice tips for avoiding phishing schemes on the PayPal Newsroom, and contacting Customer Support directly through the PayPal app or our Contact page for assistance if you believe you have been targeted by a scam.”

    CyberGuy also reached out to Apple for comment.

    TAX SEASON SCAMS 2026: FAKE IRS MESSAGES STEALING IDENTITIES

    An elderly person uses an Apple iPad.

    The fraudulent message combines an app-specific password alert with a PayPal charge to create panic. (Christian Charisius/picture alliance via Getty Images)

    How to protect yourself from Apple phishing emails

    You can reduce your risk from an Apple app-specific password scam email with a few smart habits. These steps protect more than just your Apple account. They protect your entire digital life.

    1) Use two-factor authentication

    Enable two-factor authentication (2FA) on your Apple ID, PayPal and email accounts. Even if someone guesses your password, they still cannot log in without the second verification step. That extra layer blocks most account takeover attempts.

    2) Never click links or call numbers in suspicious emails

    If an email tells you to call support or click a link, stop. Instead, open a new browser window and type the official website address yourself. Go directly to appleid.apple.com or paypal.com. Also, make sure you have strong antivirus software installed on your devices. Strong antivirus tools can detect malicious links, block phishing sites and warn you before you land on a fake login page. That protection matters because one click on the wrong link can expose login credentials or install hidden malware. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    3) Watch for urgency and fear tactics

    Scammers push urgency. They use large dollar amounts and phrases like unauthorized transaction to rush you. Pause when you feel panic. Review the details carefully. Legitimate companies do not pressure you into instant action.

    4) Keep your devices updated

    Install software updates on your phone and computer as soon as they become available. Security patches fix vulnerabilities that attackers exploit. Outdated software makes phishing and malware attacks easier to pull off.

    5) Use a password manager and strong, unique passwords

    Do not reuse passwords across accounts. If one site gets breached, reused passwords put everything else at risk. A password manager generates long, complex passwords and stores them securely. That way, even if scammers trick you into entering one password somewhere, it will not unlock your other accounts. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    6) Reduce your exposed personal information

    Scammers often find your email address and personal details through data broker sites. Using a reputable data removal service can reduce how much of your personal information is publicly available online. When less of your data floats around the internet, criminals have fewer tools to target you with convincing phishing emails. Less exposure means fewer personalized scams landing in your inbox. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    7) Report the phishing email

    Forward suspicious Apple impersonation emails to reportphishing@apple.com. You can also mark the message as phishing in your email provider. Reporting scams helps improve filters and protect other people from falling victim.

    8) Monitor your financial accounts

    Even if you did not click anything or call the number, review your bank, PayPal and Apple accounts for unusual activity over the next few days. Early detection limits damage. The faster you spot fraud, the easier it is to reverse.

    9) Consider freezing your credit if information was exposed

    If you entered personal information or downloaded anything suspicious, consider placing a free credit freeze with Equifax, Experian and TransUnion. A credit freeze prevents criminals from opening new accounts in your name. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    Kurt’s key takeaways

    If you received an Apple app-specific password email with a $2,990 charge you did not authorize, trust your instincts. It is almost certainly a scam. Do not call the number. Do not click the links. Go directly to your official account pages and check for yourself. A few calm minutes can save you thousands of dollars and hours of stress.

    When phishing scams use trusted brands like Apple so easily, is the tech industry truly staying ahead of cybercriminals? Let us know your thoughts by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    Related Article

    Don't ignore Apple's urgent security update

    [ad_2]

    Source link

  • Why a credit freeze isn’t the end of identity theft

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most U.S. data breach disclosures explain what information was leaked and any protective steps available to consumers.

    At the federal level, the Federal Trade Commission advises that after a breach involving sensitive personal information, consumers may consider placing a credit freeze to help prevent new credit accounts from being opened in their name.

    Many people place that credit freeze and assume they’re protected. But a credit freeze is not a comprehensive block against identity theft. It stops most new credit applications, but it doesn’t prevent the misuse of your Social Security number or account takeovers.

    7 SIMPLE WAYS TO PROTECT YOUR CREDIT CARDS WHILE TRAVELING

    A credit freeze limits access to your credit report, which can stop most new credit accounts from being opened in your name.  (Felix Zahn/Photothek via Getty Images)

    Sign up for my FREE CyberGuy Report: Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    What a credit freeze actually does

    A credit freeze, also called a security freeze, limits access to your credit report at Equifax, Experian, and TransUnion. Under federal law, placing a freeze is free. When a freeze is in place, most lenders can’t access your credit file to evaluate applications for new credit cards or lines of credit. If a creditor can’t see your credit report, the application will usually be denied.

    You can manage your credit freeze with each bureau individually. With Experian, for example, you sign in to your free online account at Experian’s credit freeze page and then place, lift, or schedule a thaw; you can also call Experian’s toll-free number (888-397-3742). If you plan to apply for credit, you must lift the freeze beforehand.

    A credit freeze blocks most new accounts that require a credit check. It does not extend beyond your credit file.

    Some identity protection services offer a credit lock feature that allows you to restrict access to your credit file through a mobile app. Like a freeze, it can limit new credit checks. The main difference is convenience, as you can typically turn it on or off quickly without logging into a bureau’s website or calling by phone.

    Credit freezes can’t stop every form of identity theft

    A credit freeze blocks new credit accounts, but it does not stop many common forms of identity theft that do not require a credit check.

    • Account takeovers: If someone has access to an existing credit card or bank account, they don’t need to open a new line of credit. They can change the email address, phone number, or mailing address tied to the account and begin making charges.
    • Tax identity theft: A fraudulent federal tax return does not need a credit check. If someone files a return using your SSN before you do, the IRS may reject your legitimate filing.
    • Employment fraud: If your SSN is used for employment, it will not appear as a credit inquiry. Instead, the earnings may be recorded under your Social Security record.
    • Government benefits fraud: Unemployment insurance and other state-administered benefits do not require a traditional credit check.
    • Medical identity theft: A stolen identity can be used to get medical treatment. Bills may not appear until the provider sends the account to collections.

    HOW TO SAFELY VIEW YOUR BANK AND RETIREMENT ACCOUNTS ONLINE

    Elderly man using smarphone and credit card

    Identity theft like tax fraud, account takeovers and government benefits abuse does not require a credit check. (iStock)

    What happens when the fraud doesn’t involve a credit inquiry?

    When identity theft happens outside the credit approval process, there is no automatic reversal. Each category of fraud is handled by a different agency or company.

    • If a fraudulent tax return is filed, you must work directly with the IRS and submit Form 14039, Identity Theft Affidavit. The IRS may require identity verification before releasing a refund.
    • If your SSN is used for employment, you must contact the Social Security Administration to correct your earnings record.
    • If government benefits are fraudulently claimed in your name, the state agency is involved. There is no federal clearinghouse.
    • If medical debt appears in collections, you must dispute it with both the provider and the collection agency, often in writing.

    There is no single agency coordinating these corrections. You’re responsible for identifying the fraud, filing the appropriate reports, and tracking responses across agencies.

    If a freeze isn’t the end, what is?

    A credit freeze addresses risks tied to new credit applications. Identity theft often goes beyond that. Comprehensive identity protection typically includes credit monitoring across all three major bureaus, alerts for new inquiries or accounts, and monitoring for exposed personal information such as Social Security numbers, driver’s license numbers, passport details, email addresses, and passwords.

    Some services also monitor public records, address changes, identity verification activity, and even suspicious financial transactions when accounts are linked. Early alerts can help you spot fraud before it spreads.

    If identity theft does occur, recovery can be complicated. Some identity protection plans provide access to fraud resolution specialists who help contact creditors, place fraud alerts, dispute unauthorized accounts, and prepare required documentation. Many also include identity theft insurance to help cover eligible recovery expenses, such as lost wages or legal fees.

    No service can prevent every form of identity theft. But layered monitoring, fast alerts, and guided recovery support can make the damage easier to contain and resolve.

    See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.

    Kurt’s key takeaways

    Man paying for his purchase.

    When fraud happens outside your credit file, you must work directly with each agency to correct the damage. (Leonie Asendorpf/picture alliance via Getty Images)

    A credit freeze is a smart move after a data breach, but it is only one layer of protection. Many forms of identity theft do not involve a credit check, which means they can happen quietly and take time to fix. Real protection comes from understanding the gaps, monitoring your accounts, and acting quickly if something looks wrong. The more proactive you are, the easier recovery becomes.

    Have you placed a credit freeze, and did you know it does not protect against every type of identity theft? Let us know your thoughts by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report: Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Panera Bread data breach exposes 5.1M customers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Another major consumer brand has joined the growing list of companies hit by serious data breaches. Panera Bread has confirmed a cybersecurity incident after the hacking group ShinyHunters claimed it stole millions of customer records.

    The breach exposes a wide range of personal details, raising real concerns for anyone who has ever placed an order, created an account or shared contact information with the popular bakery chain.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SUBSTACK DATA BREACH EXPOSES EMAILS AND PHONE NUMBERS

    Panera Bread confirmed a data breach after hackers claimed they stole millions of customer records containing contact information.  (AP Photo)

    What happened in the Panera Bread data breach?

    ShinyHunters added Panera Bread to its data leak site earlier this year, initially claiming it had stolen more than 14 million customer records. According to the group, the stolen data includes names, email addresses, phone numbers, home addresses and account-related information.

    Panera Bread has since confirmed a cybersecurity incident. In a statement to media outlets, the company described the exposed data as customer “contact information” and said it has contacted law enforcement and taken steps to address the incident. Panera has not shared technical details about how the attack occurred or whether customers need to take specific actions.

    Even “contact information” can be dangerous in the wrong hands. When combined, these details can be used for identity theft, targeted phishing and highly convincing social-engineering scams.

    ShinyHunters claims the attackers accessed Panera’s systems through Microsoft Entra single sign-on (SSO). While Panera has not confirmed that claim, it closely mirrors recent warnings from Okta about a surge in voice-phishing attacks targeting SSO platforms.

    In these attacks, criminals pose as IT or helpdesk staff and call employees directly. They pressure targets to approve authentication requests or enter login credentials on fake SSO pages. Once attackers capture session tokens or credentials, they can bypass some forms of multifactor authentication and move laterally through company systems. This approach relies on human trust rather than technical exploits, making it increasingly effective.

    How many people were actually affected?

    At first glance, claims that 14 million customers were affected suggested an enormous breach. However, researchers at Have I Been Pwned? later clarified that the attackers stole 14 million records, not data tied to 14 million unique individuals.

    After reviewing the leaked dataset, researchers now estimate the breach affected approximately 5.1 million unique people. The exposed information includes email addresses along with associated names, phone numbers, and physical addresses.

    That distinction matters, but it does not eliminate risk. Once stolen data is released publicly, it can spread quickly across criminal forums and be reused for years.

    149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

    The hacking group ShinyHunters leaked stolen Panera customer data online after an attempted extortion failed.

    The hacking group ShinyHunters leaked stolen Panera customer data online after an attempted extortion failed. (Panera Bread)

    Hackers leaked the data after extortion failed

    ShinyHunters reportedly attempted to extort Panera Bread before publishing the stolen data. When those efforts failed, the group released a 760MB archive containing millions of customer records on its leak site.

    This reflects a broader shift in cybercrime. Instead of locking systems with ransomware, many groups now focus on quietly stealing data and threatening public exposure. These attacks are faster, harder to detect, and often just as profitable.

    ShinyHunters has used similar tactics in other high-profile incidents involving Bumble, Match Group, Crunchbase and other consumer platforms.

    Lawsuits filed after Panera breach disclosure

    The breach has already triggered legal fallout. Multiple class-action lawsuits have been filed in U.S. federal court, alleging that Panera failed to adequately protect customer data.

    The lawsuits claim Panera knew or should have known about security weaknesses and seek damages, improved security practices, and long-term identity theft protection for affected customers. Panera has not publicly commented on the litigation.

    A troubling pattern for Panera Bread

    This is not Panera Bread’s first major security lapse. In 2018, a cybersecurity researcher revealed that Panera had left millions of customer records exposed online in plain text. That incident later led to lawsuits and settlements.

    Repeated breaches often point to deeper challenges. Large organizations can struggle to secure cloud services, identity systems, and employee access at scale. When attackers target identity platforms instead of infrastructure, a single mistake can expose millions of records.

    We reached out to Panera Bread for a comment, but did not hear back before our deadline. 

    GRUBHUB CONFIRMS DATA BREACH AMID EXTORTION CLAIMS

    Person typing on their laptop.

    Exposed contact details like names, emails, and addresses can fuel phishing scams and identity theft long after a breach becomes public. (Donato Fasano/Getty Images)

    7 steps you can take to protect yourself following the Panera data breach

    When a major consumer brand suffers a breach, customers often don’t realize the risk until weeks or months later. These steps help limit what attackers can do with your information if your Panera data falls into the wrong hands.

    1) Use a strong, unique password for every account

    If you ever created a Panera Bread account, reset its password immediately. If you reused that password anywhere else, those accounts are now at risk, too. Attackers routinely test breached passwords across email, shopping and banking sites.

    A password manager helps by generating strong, unique passwords for every account and storing them securely so you never need to reuse credentials. Many password managers also alert you if your email or passwords appear in known data breaches, giving you an early warning to lock things down fast.

    Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    2) Enable two-factor authentication (2FA) wherever possible

    Two-factor authentication (2FA) adds a second step to the login process, usually through an app or device you control. Even if someone gets your password through phishing or a breach, 2FA makes it much harder for them to access your account.

    3) Be cautious of phishing messages

    Cybercriminals often follow up breaches with fake emails or in-app messages pretending to offer help or security updates. Always double-check the sender and avoid clicking links. When in doubt, open the app or website directly rather than responding to the message. Using strong antivirus software adds another layer of protection by flagging malicious links and blocking known threats before they can do harm. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Limit the personal details you share

    When names, email addresses, phone numbers and physical addresses are exposed, identity theft becomes a real risk. Identity theft-protection services monitor your personal information, alert you if it appears on the dark web, and watch for attempts to open new accounts in your name.

    If something does go wrong, these services often include recovery support to help freeze accounts, dispute fraud, and guide you through the cleanup process.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    5) Reduce your digital footprint with a data removal service

    Scammers don’t rely on one breach alone. They combine leaked data with information from data broker sites to build detailed profiles. Data removal services help remove your phone number, home address and other personal details from hundreds of these sites.

    While no service can erase everything, reducing what’s publicly available makes it much harder for criminals to target you with convincing scams or identity fraud. This is one of the most effective long-term ways to lower your risk after any major breach.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Secure your email account

    Your email account controls password resets for most services. Protect it with a strong password and 2FA. Regularly review login activity and recovery settings, so attackers can’t use your email to take over other accounts.

    7) Watch for account changes after breach news

    Not every breach leads to immediate account takeovers. In some cases, attackers quietly test access weeks later. That is why staying alert after breach reports matters. Watch for password reset emails you did not request, profile changes you did not make, or new messages you did not send. Unexpected logouts or security alerts are also red flags. If you notice anything unusual, change your password immediately and review your security settings.

    Kurt’s key takeaway

    The Panera Bread data breach is another reminder that even familiar brands can become major cyber targets. While Panera says only contact information was exposed, that data is often enough to fuel scams and identity theft long after headlines fade. Staying proactive after breach news is now part of protecting your digital life.

    Do you still trust large brands to protect your personal information, or have repeated breaches changed how much data you’re willing to share? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Tax season scams 2026: Fake IRS messages stealing identities

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Tax season no longer begins in April. For scammers, it starts the moment the calendar flips to January. 

    While you’re waiting for your W-2 or 1099 to arrive, cybercriminals are already sending out waves of fake IRS messages, “refund problem” alerts and account verification scams. These messages feel alarmingly real, and that’s not an accident.

    The truth is, today’s tax scams don’t rely on random guessing. They rely on your personal data, pulled from online data brokers, public records and previous breaches. And once your information is in circulation, you become part of a high-value target list.

    Let’s break down what’s really happening – and how you can protect yourself before the first fake message lands in your inbox.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    ROBINHOOD TEXT SCAM WARNING: DO NOT CALL THIS NUMBER

    Tax scammers are targeting Americans as soon as January with fake IRS emails and refund alerts designed to steal personal data. (Photo illustration by Michael Bocchieri/Getty Images)

    The new wave of tax scams

    Every year, scammers refine their tactics. And every year, they get better at making their messages look legitimate. Here are the most common scams hitting Americans before tax season even peaks:

    1) Fake IRS emails and texts

    These messages look official. They use real IRS language, government-style formatting and even fake case numbers. You might see something like:

    “Your tax account is under review. Immediate action is required to avoid penalties.”

    The email may include:

    • IRS logos and official-looking headers
    • Threatening language about audits or fines
    • A link that appears to go to a government website.

    But when you click, you’re taken to a fake IRS portal designed to steal:

    • Your Social Security number
    • Your date of birth
    • Your bank account details
    • Your IRS login credentials.

    Once scammers have that, they can file fake returns, redirect your refund or impersonate you for years.

    2) ‘Refund Issue’ alerts

    This is one of the most effective tax scams because it preys on something people are already waiting for: their money. The message usually says:

    “Your tax refund has been delayed due to a verification issue. Please confirm your information.”

    It feels believable. You just filed. You are expecting a refund. And the message arrives right when you’re checking your bank account.

    The link leads to a perfect copy of:

    • A government site
    • A tax filing service
    • Or a bank login page.

    Every keystroke you enter is captured. Scammers now have your identity, your financial access and your tax data – all from one click.

    3) Benefit and identity verification scams

    These scams impersonate the:

    • IRS
    • Social Security Administration
    • State tax offices.

    Often, they use what seem to be legitimate titles like “tax resolution officer” and state that you have unresolved tax activity. They claim your benefits, tax records or identity are “on hold” and must be verified immediately.

    Typical messages say: “Your benefits account has been temporarily suspended. Verify your identity to restore access.” Or: “We detected unusual activity on your tax profile. Confirm your information now.”

    The goal is simple: panic. When people panic, they don’t slow down. They don’t double-check. They click. And once they do, scammers collect everything they need to fully impersonate the victim.

    HOW TO SAFELY VIEW YOUR BANK AND RETIREMENT ACCOUNTS ONLINE

    Multiple W-2 tax forms.

    Cybercriminals use data broker profiles and breach records to personalize tax scams and make them appear legitimate. (Andrew Harrer/Bloomberg via Getty Images)

    Why these messages feel so real

    You may wonder: How do they know my name? My address? My tax service?

    They don’t guess. They buy it. Data brokers collect and sell personal profiles that can include your:

    • Full name and address history
    • Phone numbers and email addresses
    • Family members and marital status
    • Estimated income and property records
    • Age, retirement status and employer history.

    Scammers use this data to personalize their messages. That’s why the email doesn’t feel random. It feels meant for you. And once your profile is sold or leaked, it can be reused again and again.

    The real target isn’t your refund. It’s your identity

    Once scammers steal your Social Security number, tax ID or bank details, the damage doesn’t stop with one scam.

    They can:

    • File fake tax returns
    • Open credit lines in your name
    • Redirect benefits
    • Sell your identity on criminal marketplaces.

    Tax scams are often the entry point to long-term identity theft.

    The ‘pre-tax season cleanup’ most people skip

    Most people think clearing browser cookies or changing passwords is enough. It’s not. Your information still lives in data broker databases, where scammers shop for victims.

    That’s why I recommend a data removal service that automates data removal and goes directly to the source. Instead of chasing scams one by one, these services help remove the reason you’re targeted in the first place.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Practical steps to protect yourself this tax season

    Here’s what I recommend before filing:

    • Never click tax links from emails or texts. Go directly to official websites. Strong antivirus software can help block malicious links before they install malware or steal personal information. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
    • Use strong, unique passwords for tax services and email.  A password manager helps create and store strong, unique passwords and alerts you if your email appears in known data breaches. Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
    • Enable two-factor authentication (2FA) wherever possible.
    • Freeze your credit if you’re not applying for loans. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 
    • Remove your data from brokers before scammers find it, as discussed above.

    2026 VALENTINE’S ROMANCE SCAMS AND HOW TO AVOID THEM

    1040 tax form on a table.

    Fake “refund issue” messages trick taxpayers into entering Social Security numbers and bank details on fraudulent sites. (Photo illustration by Michael Bocchieri/Getty Images)

    Kurt’s key takeaways

    Tax scams don’t start in April; they start when your data is sold. The more complete your profile becomes, the easier it is for scammers to impersonate government agencies and steal your identity. By removing your personal data now, you’re not just protecting your refund; you’re protecting your future. This tax season, don’t wait for the alert. Remove the risk.

    Have you received a suspicious IRS text or email this tax season, and what made you question whether it was real? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Substack data breach exposes emails and phone numbers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you read newsletters to stay informed, here is an update worth paying attention to. Substack, a popular platform where writers, journalists and creators send email updates directly to subscribers, has confirmed a data breach that exposed user data.

    The company says the exposed information includes email addresses, phone numbers and internal account metadata. More sensitive data, such as passwords, credit card numbers and financial information, was not affected. That is good news. Still, many users are asking how this happened and why it took months to detect.

    For clarity, CyberGuy does not use Substack to send its newsletters.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    ROBINHOOD TEXT SCAM WARNING: DO NOT CALL THIS NUMBER

    Substack confirmed a data breach that exposed users’ email addresses, phone numbers and internal account metadata after unauthorized access in October. (Photo Illustration by Robin Utrecht/SOPA Images/LightRocket via Getty Images)

    What we know so far about the Substack breach

    According to Substack, the unauthorized access occurred in October but was not identified until February. That means user data may have been exposed for several months before the issue was discovered. In response to CyberGuy’s request for comment, Substack shared an email from CEO and cofounder Chris Best that was sent to affected users on Wednesday, Feb. 4.

    “I’m incredibly sorry this happened,” Best wrote. “We take our responsibility to protect your data and your privacy seriously, and we came up short here.” He went on to say the company will “work very hard to make sure it does not happen again.”

    According to Best, Substack identified evidence of a system issue on February 3 that allowed an unauthorized third party to access limited user data in October. He confirmed the accessed data included email addresses, phone numbers and internal metadata. He also said passwords, credit card numbers and financial information were not accessed.

    What Substack says it is doing now

    Substack says it has fixed the system issue that allowed the unauthorized access and has launched a full investigation. The company also said it does not have evidence that the exposed information is being misused. Even so, it encouraged users to take extra caution with emails or text messages that appear suspicious. While the statement clarifies what data was exposed, it does not explain why the access went undetected for several months or what specific safeguards are now in place to prevent a similar incident. That gap remains a key concern.

    Why exposed emails and phone numbers still matter

    Email addresses and phone numbers are often the first pieces of information used in scams. Once attackers have verified contact details, they can send messages that feel personal, urgent or familiar. Those messages may reference subscriptions, billing or account changes to pressure people into clicking links or sharing information. Even without passwords, this type of exposure can increase the risk of phishing and impersonation attempts. That is why awareness matters now.

    MICROSOFT ‘IMPORTANT MAIL’ EMAIL IS A SCAM: HOW TO SPOT IT

    Person typing code on their laptop.

    Security experts warn exposed email addresses and phone numbers can fuel phishing and impersonation scams. (Photo by Annette Riedl/picture alliance via Getty Images)

    Ways to stay safe after the Substack breach

    If you have a Substack account, now is a good time to tighten things up.

    1) Watch for targeted messages

    Be cautious with emails or texts that reference your Substack account subscriptions or payments. Scammers may use real details to sound convincing.

    2) Avoid clicking links under pressure

    Urgent language is a common tactic. Go directly to Substack’s website instead of using links in messages. Use a strong antivirus to safeguard yourself from malicious links that install malware, potentially accessing your private information.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Change your password anyway

    Even if passwords were not exposed, updating them adds a layer of protection, especially if you reuse passwords elsewhere. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    4) Limit data exposure

    Consider using a data removal service to reduce where your email and phone number appear online. Fewer data points make scams harder to pull off. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Use two-factor authentication

    Enable two-factor authentication (2FA) wherever possible to reduce the risk of account takeover.

    SOUNDCLOUD DATA BREACH EXPOSES 29.8 MILLION USER ACCOUNTS

    Person typing on their laptop.

    The company said passwords and financial information were not accessed, but the breach went undetected for months. (Photographer: Luke MacGregor/Bloomberg via Getty Images)

    Kurt’s key takeaways

    Substack’s breach is a reminder that even creator-focused platforms face real security risks. While the company says sensitive data was not affected, unanswered questions remain about detection delays and transparency. Email addresses and phone numbers are powerful tools in the wrong hands. Staying alert now can prevent bigger problems later. Trust is built on clarity, and users are still waiting for it.

    Have you changed how you protect your email and phone number after recent data breaches, and what steps have made you feel safer? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Fake ad blocker breaks PCs in new malware extension scam

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Fake browser extensions are nothing new, but this one takes things a step further by deliberately breaking your computer to scare you into infecting it.

    Security researchers have uncovered a malicious Chrome and Edge extension called NexShield that pretends to be a fast, privacy-friendly ad blocker. Once installed, it crashes your browser on purpose and then tricks you into “fixing” the problem by running dangerous commands on your own PC.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    MALICIOUS GOOGLE CHROME EXTENSIONS HIJACK ACCOUNTS

    A fake Chrome and Edge extension called NexShield crashes browsers to trick users into running malicious commands. (Sina Schuldt/picture alliance via Getty Images)

    How the NexShield ad blocker scam works

    NexShield was promoted as a lightweight ad blocker supposedly created by Raymond Hill, the real developer behind the popular uBlock Origin extension. That claim was false, but it helped the extension look legitimate enough to spread through online ads and search results before it was taken down from the Chrome Web Store.

    Once installed, NexShield immediately starts abusing Chrome or Edge in the background. Researchers at Huntress found that it opens endless internal browser connections until your system runs out of memory (via Bleeping Computer). Tabs freeze, CPU usage spikes, RAM fills up, and the browser eventually hangs or crashes completely.

    After you restart the browser, NexShield displays a scary pop-up warning that claims your system has serious security problems. When you click to “scan” or “fix” the issue, you’re shown instructions telling you to open Command Prompt and paste a command that’s already been copied to your clipboard.

    That single paste is the trap. The command launches a hidden PowerShell script that downloads and runs malware. To make detection harder, the attackers delay the payload execution for up to an hour after installation, creating distance between the extension and the damage it causes.

    Why this fake browser extension attack is especially dangerous

    This campaign is a new variation of the well-known ClickFix scam, which relies on convincing you to run commands yourself. Huntress calls this version CrashFix because instead of faking a system failure, it causes a real one.

    In corporate environments, the attack delivers a Python-based remote access tool called ModeloRAT. This malware allows attackers to spy on systems, run commands, change system settings, add more malware and maintain long-term access. Researchers say the threat group behind it, tracked as KongTuke, appears to be shifting focus toward enterprise networks where the payoff is higher.

    Home users weren’t the primary target in this campaign, but that doesn’t mean they’re safe. Even if the final payload was unfinished for consumer systems, uninstalling the extension alone is not enough. Some malicious components can remain behind. The biggest danger here isn’t a browser bug. It’s trust. The attack works because it looks like a helpful fix from a trusted tool, and it pressures you to act quickly while your system feels broken.

    “Microsoft Defender provides built in protections to help identify and stop malicious or unwanted browser extensions and the harmful behaviors associated with them,” Tanmay Ganacharya, VP of Microsoft Threat Protection, told CyberGuy. “Our security technologies are designed to detect and mitigate tactics like the ones described in this campaign, and they are continuously updated to help keep customers safe. We encourage consumers and organizations to follow our security best practices for reducing exposure to social engineering-based threats. Guidance on strengthening your security posture against techniques like this can be found in our blog, ⁠Think Before You Click (Fix): Analyzing the ClickFix Social Engineering Technique, on the Microsoft Security blog.”

    We also reached out to Google for comment.

    7 steps you can take to stay safe from malicious browser extensions

    A few smart habits and the right tools can dramatically reduce your risk, even when malicious extensions slip past official app stores.

    1) Only install extensions from trusted publishers

    Before installing any browser extension, check the publisher name, official website and update history. Reputable tools clearly identify their developer and have years of user reviews. Be cautious of “new” extensions that claim to come from well-known creators, especially if the name or branding looks slightly off.

    2) Never run unknown commands

    No legitimate browser extension will ever ask you to open Command Prompt or paste a command to fix an issue. That’s a massive red flag. If something breaks your browser and then tells you to run system commands, close it and seek help from a trusted source.

    3) Use a strong antivirus

    Strong antivirus software can detect malicious scripts, suspicious PowerShell activity and remote access tools like ModeloRAT. This is especially important because these attacks rely on delayed execution that basic defenses might miss.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    MALICIOUS MAC EXTENSIONS STEAL CRYPTO WALLETS AND PASSWORDS

    Person sitting at their desk, typing into their computer.

    After freezing your browser, the rogue extension urges users to paste a PowerShell command that installs malware. (Annette Riedl/picture alliance via Getty Images)

    4) Use a password manager to limit fallout

    If malware gains access to your system, stored browser passwords are often the first target. A password manager keeps credentials encrypted and separate from your browser, reducing the risk of account takeover even if something slips through.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    5) Keep Windows, Chrome and Edge fully updated

    Security updates don’t just patch bugs. They also improve protection against malicious extensions, script abuse and unauthorized system changes. Turn on automatic updates so you’re not relying on memory to stay protected.

    6) Consider an identity theft protection service

    If malware ever runs on your system, assume personal data could be at risk. Identity protection services can monitor for misuse of your information, alert you early and help with recovery if fraud occurs.

    Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    7) Reduce your online footprint with a data removal service

    Many attacks become more effective when criminals already have your personal details. Data removal services help pull your information from broker sites, making it harder for attackers to craft convincing follow-up scams or targeted phishing.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    FAKE ERROR POPUPS ARE SPREADING MALWARE FAST

    Woman using her laptop computer.

    Security researchers say the NexShield ad blocker scam deliberately overloads memory to force a system crash. (Photo by Sebastian Gollnow/picture alliance via Getty Images)

    Kurt’s key takeaway

    Cybercriminals are getting better at blending technical tricks with psychological pressure. Instead of relying on exploits alone, they break things on purpose and wait for you to panic. If a browser extension crashes your system and then tells you to “fix” it by running commands, stop immediately. The safest response is not to fix the problem fast, but to question why you’re being asked to fix it at all.

    CLICK HERE TO GET THE FOX NEWS APP

    How many browser extensions are installed on your computer right now? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Why physical ID theft is harder to fix than credit card fraud

    [ad_1]

    NEWYou can now listen to Fox News articles!

    It started with a voicemail from a Hertz rental car location in Miami, Florida. A 57-year-old woman in Los Alamitos, California, was asked when she planned to return a Mercedes-Benz she had never rented. A thief had stolen her driver’s license, replaced the photo with their own and used it to rent the vehicle. The same identity was used to open a credit card account, book airline tickets and reserve hotel stays. By the time she learned what happened, the fraud involved businesses in multiple states.

    Clearing her name required police reports in two jurisdictions, written disputes with the credit card issuer and repeated contact with the rental company and hotels. Her accounts were frozen while she submitted notarized copies of her identification and signed fraud affidavits. The process lasted more than a week. She reported losing $78,500 and spent nearly 10 days dealing with the fallout from one stolen ID.

    Credit card fraud is usually limited to a single account number. Physical ID theft gives someone the ability to act as you in the real world. As a result, the cleanup process is longer, more intrusive and often tied to your legal record.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK

    A stolen driver’s license can allow someone to rent cars, open accounts and sign contracts in your name. (Photo by Silas Stein/picture alliance via Getty Images)

    How credit card fraud recovery works

    Under the Fair Credit Billing Act, you report unauthorized charges to the card issuer within 60 days of the statement date. Federal law limits your liability to $50, and most major issuers waive that entirely. The bank cancels the compromised card number, issues a replacement and removes the disputed charges after an investigation. You may need to confirm transactions and sign a fraud affidavit. The account number changes. Your name, driver’s license and Social Security number stay the same. In most cases, fraud is resolved within one or two billing cycles. That structure gives consumers clarity. There is one issuer, one investigation and one account to correct.

    Why physical ID theft recovery is more complicated

    Physical ID theft creates problems that go far beyond one financial account. When someone uses your driver’s license, they step into your legal identity. Start with reporting requirements. Most states require you to file a police report before the DMV will issue a replacement linked to fraud. That report number becomes part of your official record. If the misuse happened in another state, you may need to file a second report there.

    Next, understand what replacing the card actually does. A new physical card does not erase prior activity. Rental contracts, utility accounts, hotel stays, or police interactions tied to the stolen license still carry your name and license number. Fixing those records takes work. You must contact each business directly and submit documentation. No central agency reverses everything at once. Each company sets its own rules and timeline.

    The stakes can rise quickly. For example, if someone abandons a rental car or commits a crime using your stolen ID, law enforcement databases may record your name. At that point, the situation shifts from financial inconvenience to legal exposure.

    HOW TO PROTECT A LOVED ONE’S IDENTITY AFTER DEATH

    A passport

    Police reports and formal disputes are often required before businesses will remove fraudulent records.  (Kurt “Cyberguy” Knutsson)

    How to prove physical ID theft was not yours

    With credit card fraud, the issuer investigates the charge. With physical ID theft, businesses and agencies often require you to prove that you did not authorize the activity. That process usually starts at IdentityTheft.gov. The FTC generates an Identity Theft Report, which serves as an official statement of fraud. Most banks, collection agencies and rental companies will not proceed without it.

    You may also need:

    • A local police report
    • A copy of your driver’s license
    • A notarized identity affidavit
    • Proof of residence tied to the date of the fraud

    When thieves open fraudulent accounts in your name, dispute each one separately. Act quickly. Send a written response within 30 days of the first collection notice to protect your rights under federal law. Fraud that appears on your credit report requires another step. Contact Equifax, Experian and TransUnion individually and submit formal disputes with supporting documentation. The credit bureaus then have up to 30 days to complete their investigations. No central agency manages these corrections for you. Instead, every company sets its own documentation rules and timeline. Therefore, you must track deadlines, follow up consistently and keep detailed records of every communication.

    You cannot simply replace your driver’s license number after identity theft

    When a credit card number is stolen, the bank issues a new one. When a driver’s license is stolen, the number usually remains the same. In California, if your driver’s license is lost or stolen, you can request a replacement card through the DMV online system or at a field office. The official process gets you a new physical card. No new license number is automatically assigned when the card is stolen.

    If there is identity misuse tied to the license number, the DMV fraud review process allows you to submit documentation, including police reports, to support an identity theft claim before they take further action. A Social Security number is even harder to change. The Social Security Administration approves new numbers only in cases involving continued harm. Applicants must provide extensive documentation and appear in person.

    A stolen physical ID, such as your license, includes:

    • Full legal name
    • Date of birth
    • Address
    • Driver’s license number
    • Signature

    That information is sufficient for in-person identity checks, rental contracts, certain loan applications and travel-related transactions.

    Hands typing on a laptop with green code on screen

    Credit monitoring alerts can help you detect identity misuse before it spreads across multiple accounts. (Kurt “CyberGuy” Knutsson)

    Why ongoing identity protection matters

    There is no single agency that tracks misuse of your driver’s license across rental companies, lenders, collection agencies and law enforcement systems. That burden falls on you.

    Identity theft services monitor your identity across all three credit bureaus and alert you to new credit inquiries, account openings and changes to your credit file. If fraud appears, you are assigned a dedicated U.S.-based case manager who helps:

    • File disputes with Equifax, Experian and TransUnion
    • Prepare and submit FTC Identity Theft Reports
    • Contact creditors and collection agencies
    • Track documentation deadlines and responses
    • Assist with reimbursement claims when eligible

    Plans can include identity theft insurance of up to $1 million per adult to cover eligible expenses such as lost wages, legal fees and document replacement costs related to identity theft recovery.

    No service can prevent every misuse of a stolen ID. But when the issue involves police reports, credit bureaus, tax agencies and collection accounts, having structured support can make all the difference.

    The California woman in this case was not enrolled in an identity theft protection service. Some businesses may reverse fraudulent charges, but it is unclear whether she recovered the full $78,500.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Credit card fraud follows a defined path. You report the charge, the issuer investigates and your account number changes. In most cases, the disruption ends there. Physical ID theft moves differently. It spreads across rental companies, hotels, credit bureaus and sometimes law enforcement databases. Instead of one dispute, you may face several. Instead of replacing a number, you must protect a permanent identity marker tied to your name. That shift matters. A stolen driver’s license carries your legal identity into the real world. Therefore, recovery demands documentation, patience and persistence. Each business sets its own rules. Each agency runs its own timeline. You coordinate the process. The lesson is clear. Protecting your financial accounts is critical. However, protecting your physical identification may be even more important. Once someone uses it in person, the cleanup becomes personal, procedural and time-consuming. Layered monitoring, early alerts and fast reporting reduce long-term damage. The faster you respond, the more control you keep.

    Have you ever dealt with physical ID theft, and did the recovery process take longer than you expected? Let us know your thoughts by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    [ad_2]

    Source link

  • Android malware hidden in fake antivirus app

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you use an Android phone, this deserves your attention. 

    Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to spread dangerous Android malware. 

    At first, the threat appears harmless because it is disguised as a fake antivirus app. Then, once you install it, criminals gain direct access to your device. Because of this, the threat stands out as especially troubling. It combines two things people already trust — security apps and AI platforms.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    MALICIOUS GOOGLE CHROME EXTENSIONS HIJACK ACCOUNTS

    Researchers say hackers hid Android malware inside a fake antivirus app that looked legitimate at first glance.  (Kurt “CyberGuy” Knutsson)

    What Hugging Face is and why it matters

    For anyone unfamiliar, Hugging Face is an open platform where developers share AI, NLP and machine learning models. It is widely used by researchers and startups and has become a central hub for AI experimentation. That openness is also what attackers exploited. Because Hugging Face allows public repositories and supports many file types, criminals were able to host malicious code in plain sight.

    The fake antivirus app behind the attack

    The malware first appeared in an Android app called TrustBastion. On the surface, it looks like a helpful security tool. It promises virus protection, phishing defense and malware blocking. In reality, it does the opposite. 

    Once installed, TrustBastion immediately claims your phone is infected. It then pressures you to install an update. That update delivers the malicious code. This tactic is known as scareware. It relies on panic and urgency to push users into tapping before thinking.

    FAKE ERROR POPUPS ARE SPREADING MALWARE FAST

    A fake Android antivirus app in the Google Play store

    The fake TrustBastion app mimics a legitimate Google Play update screen to trick users into installing malware.  (Bitdefender)

    How the malware spreads and adapts

    According to Bitdefender, a global cybersecurity company, the campaign centers on a fake Android security app called TrustBastion. Victims were likely shown ads or warnings claiming their device was infected and were instructed to manually install the app.

    The attackers hosted TrustBastion’s APK files directly on Hugging Face, placing them inside public datasets that appeared legitimate at first glance. Once installed, the app immediately prompted users to install a required “update,” which delivered the actual malware.

    After researchers reported the malicious repository, it was taken down. However, Bitdefender observed that nearly identical repositories quickly reappeared, with small cosmetic changes but the same malicious behavior. That rapid re-creation made the campaign harder to fully shut down.

    What this Android malware can actually do

    This Trojan is not minor or annoying. It is invasive. Bitdefender says the malware can:

    Take screenshots of your device

    Show fake login screens for financial services

    Capture your lock screen PIN

    Once collected, that data is sent to a third-party server. From there, attackers can move quickly to drain accounts or lock you out of your own phone.

    What Google says about the threat

    Google says users who stick to official app stores are protected. A Google spokesperson told CyberGuy, “Based on our current detection, no apps containing this malware are found on Google Play.

    “Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.

    “Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play.”

    BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK

    A person typing on their Android phone

    Once installed, the malware could capture screenshots, fake login details and even your lock screen PIN. (Kurt “CyberGuy” Knutsson)

    How to stay safe from Hugging Face Android malware

    This threat is a reminder that small choices matter. Here is what you should do right now:

    1) Stick to trusted app stores

    Only download apps from reputable sources like Google Play Store or the Samsung Galaxy Store. These platforms have moderation and scanning in place.

    2) Read reviews before installing

    Look closely at ratings, download counts and recent comments. Fake security apps often have vague reviews or sudden rating spikes.

    3) Use a data removal service

    Even careful users can have personal data exposed. A data removal service helps remove your phone number, email and other details from data broker sites that criminals rely on. That reduces follow-up scams, fake security alerts and account takeover attempts.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. 

    These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Run Play Protect and use strong antivirus software

    Scan your device regularly with Play Protect and back it up with strong antivirus software for added protection. Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it hasn’t been 100% effective at removing all known malware from Android devices.

    The best way to protect yourself against malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also help you detect phishing emails and ransomware, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com

    5) Avoid sideloading APK files

    Avoid installing apps from websites outside the app store. These apps bypass security checks, so always verify the publisher name and URL.

    6) Lock down your Google account

    Your phone security depends on it. Enable two-step verification (2FA) first, then use a strong, unique password stored in a password manager to prevent account takeovers.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

    7) Be cautious with permissions

    Be cautious with accessibility permissions. Malware often abuses them to take control of your device.

    8) Watch app updates closely

    Malware can hide inside fake updates. Be cautious of urgent fixes that push you outside the app store.

    Kurt’s key takeaways

    This attack shows how quickly trust can be weaponized. A platform designed to advance AI research was repurposed as a delivery system for malware. A fake antivirus app became the threat it claimed to stop. Staying safe no longer means avoiding sketchy-looking apps. It means questioning even those apps that appear helpful and professional.

    Have you seen something on your phone that made you question its security? Let us know your thoughts by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Robinhood text scam warning: Do not call this number

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most scam texts are easy to spot, but this one feels different. At first glance, the message looks polished and uses official branding that signals credibility. It also includes technical details that sound serious, which can cause even cautious people like Bob to pause instead of instantly deleting it. He shared the text message with CyberGuy after second-guessing whether it could be real.

    “I received a text message from someone, some entity I do not recognize. Normally, I just delete this phishing spam, but in this case, I wonder if someone has my personal, financially related info. Have you seen this before?”

    — Text message sent to Bob

    Yes, this exact message format has been circulating widely. The screenshot below points to a Robinhood impersonation scam, not a legitimate security alert. For those of you who might not be familiar, Robinhood is a popular financial app that lets people trade stocks, options and cryptocurrency from their phones. 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    MICROSOFT ‘IMPORTANT MAIL’ EMAIL IS A SCAM: HOW TO SPOT IT

    Kurt “CyberGuy” Knutsson is warning of a Robinhood phishing scheme. (Kurt “CyberGuy” Knutsson)

    What the scam text actually says

    At the top of the message is a warning designed to trigger urgency:

    “Safety Reminder: If this wasn’t you, please call +1 (888) 497-####.”

    Below that, a realistic looking Robinhood graphic claims:

    • An API key was linked to an external wallet
    • Permissions include trade and transfer
    • A linked wallet labeled Robinhood-Wallet
    • An IP address listed as 128.51.100.##
    • A date and time stamp from January 23, 2026

    The message ends by calling itself a mandatory service SMS meant to keep the account secure. To most people, this feels official. That feeling is intentional.

    Why this message is designed to scare

    This scam relies on presentation, not accuracy. Technical language like API key and IP address sound authoritative. It creates pressure to act even when the details are unclear. The phone number is the real objective. Calling it connects directly to scammers trained to sound calm, helpful and urgent at the same time. The message also avoids links on purpose. A phone call feels safer than clicking, which lowers suspicion.

    The most important thing to understand

    Receiving this text does not mean an account has been accessed. Messages like this go out in bulk. Phone numbers often come from unrelated data breaches and marketing lists. The sender does not know who actually has a Robinhood account. The scam only works if someone reacts.

    A spokesperson for Robinhood told us the company is seeing a rise in financial scams and says it has safeguards in place “to monitor, report, and disrupt fraudulent activity.” The spokesperson urged customers not to engage with suspected scams and to use resources on Robinhood’s support page to help identify and avoid them.

    What to do right now if you get this text

    If this message shows up on your phone, pause for a moment. These scams succeed when fear takes over. Staying calm keeps you in control. These steps break the scam’s momentum and help protect your accounts before any real damage can occur.

    1) Do not call the phone number

    This is the single most important step. The phone number in the text connects directly to scammers posing as Robinhood security. Once on the call, they often claim there is an active threat and push for immediate action. They may ask you to verify account details, share one-time codes or approve fake transfers. No legitimate financial company handles account security through an unsolicited phone call.

    2) Do not click links or reply to the message

    Avoid interacting with the text at all. Replying confirms your number is active, while clicking anything can lead to fake login pages, follow-up scams or malware. Strong antivirus software can help block malicious links and scam sites if one is tapped accidentally, but the safest move is to ignore the message entirely. Cutting off interaction stops the scam immediately. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    3) Check your account the safe way

    If you have a Robinhood account, always go directly to the source. Open the official app or manually type the website address into your browser. Never use links or phone numbers included in the text.

    Once logged in, review:

    • Security alerts
    • Recent account activity
    • Linked apps
    • API or third-party access

    If nothing appears there, the message was fake, and your account is safe.

    TAX SEASON SCAMS SURGE AS FILING CONFUSION GROWS

    Robinhood loaded on a laptop screen.

    Cyber experts warn a widely shared “Safety Reminder” text is a Robinhood impersonation scam, not a real breach alert. (Photo Illustration by Scott Olson/Getty Images)

    4) Turn on two-factor authentication

    Two-factor authentication (2FA) adds a critical layer of protection. Even if scammers obtain a password, they cannot access an account without the second verification step. This stops many account takeover attempts in their tracks.

    5) Use strong, unique passwords

    Never reuse passwords across financial accounts. Strong, unique passwords limit the damage from unrelated data breaches. A password manager can help generate and store secure passwords, so you don’t have to remember them.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    6) Reduce exposure with a data removal service

    If scam texts like this keep appearing, it often means your phone number is circulating among data brokers. A data removal service can help reduce that exposure over time.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Remove old or unused linked apps

    Over time, accounts can accumulate connections that are no longer needed. Review linked apps and remove anything unfamiliar or unused. Fewer connections mean fewer potential attack paths.

    8) Block the sending number

    After confirming your account is safe, block the number that sent the message. This prevents repeat attempts from the same source and reduces future interruptions.

    9) Report the message as spam

    Robinhood encourages users to contact its customer support team with any scam or fraud concerns or to verify suspicious messages. Suspected phishing attempts can be reported directly to reportphishing@robinhood.com, the spokesperson said. Also, report the message as spam in your messaging app. This helps improve filtering systems and can prevent similar scams from reaching others.

    10) Save the message as evidence

    Finally, before deleting it, take a screenshot. This gives you a record in case you need to report the scam later or explain what happened. It also helps remove doubt once the message is gone.

    5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK

    Robinhood logo on a smartphone.

    Scammers are using technical jargon and official-looking branding to trick users into revealing financial account details. (Photo illustration by Cheng Xin/Getty Images)

    Kurt’s key takeaways

    This scam works by leveraging trust in a well-known brand and using fear to push for quick decisions. The message is designed to rush and intimidate, not to inform. The strongest defense is simple. Pause. Check accounts directly through official apps. Do not let technical language or urgency force a reaction. You do not need to understand every detail to stay safe. Questioning a message like this protects something far more valuable than time. And it raises an important question worth asking every time a security alert appears on your phone.

    Have you received a suspicious security text or call recently? Tell us what it looked like and how you handled it by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • How to safely view your bank and retirement accounts online

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Logging into your bank, retirement or investment accounts is now part of everyday life. Still, for many people, it comes with a knot in the stomach. You hear about hacks, scams and stolen identities and wonder if simply checking your balance could open the door to trouble. That concern landed in our inbox from Mary.

    “How do I protect my bank accounts, 401K and non-retirement accounts when I view them online?”

    — Mary in Baltimore, Ohio

    Mary’s question is a good one, because protecting your money online is not about one magic setting. It comes down to smart habits layered together.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    DATA BREACH EXPOSES 400,000 BANK CUSTOMERS’ INFO

    Securing your device with updates and antivirus software is the first step in protecting your financial accounts online. (REUTERS/Andrew Kelly)

    Secure your device before logging into financial accounts

    Everything begins with the device in your hands. If it isn’t secure, even the strongest password can be exposed. These essentials help lock things down before you ever sign in.

    Start with these device security basics:

    • Keep your phone, tablet and computer fully updated with the latest operating system and browser versions
    • Use strong, always-on antivirus protection to block malware and phishing attempts. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
    • Avoid public Wi-Fi when accessing financial accounts, or use a trusted VPN if you have no other option.  For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    Protect your bank and investment account logins

    Your login details are the front door to your money. Strengthening them reduces the chance that anyone else can get inside.

    Strengthen your account logins by:

    • Using strong, unique passwords for every financial account
    • Avoiding saved passwords on shared or older devices
    • Relying on a password manager to create and store credentials securely. Our No. 1 pick, includes a built-in breach scanner that alerts you if your information appears in known leaks. If you find a match, change any reused passwords immediately and secure those accounts with new, unique credentials.
    • Checking whether your email or passwords have appeared in known data breaches and updating reused passwords immediately. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
    • Turning on two-factor authentication (2FA) wherever it’s available

    Avoid common online banking scams when logging in

    Even well-secured accounts can be compromised through careless access. How you log in matters.

    Reduce your risk when accessing financial accounts:

    • Typing website addresses yourself or using saved bookmarks
    • Avoiding login links sent by email or text, even if they look official
    • Checking for “https” and the lock icon before entering credentials
    • Logging out completely after every session, especially on mobile devices

    Add extra layers of protection to financial accounts

    Person typing on their laptop.

    Strong, unique passwords and two-factor authentication help stop criminals even if one login is exposed. (Photo by Neil Godwin/Future via Getty Images)

    DON’T LET AI PHANTOM HACKERS DRAIN YOUR BANK ACCOUNT

    Think of these as early warning systems. They help catch problems quickly, before real damage is done.

    Enable financial account alerts and safeguards:

    • Setting up alerts for logins, withdrawals, password changes and new payees
    • Requiring extra confirmation for large or unusual transactions
    • Freezing your credit with the major credit bureaus to block new accounts opened in your name. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    Protect your identity beyond your bank accounts

    Your financial accounts are only part of the picture. Identity protection helps stop problems before they ever reach your bank.

    Go beyond basic banking security:

    • Monitoring for identity theft involving your Social Security number, phone number and email
    • Using an identity protection service that alerts you if your data appears on the dark web or is used fraudulently. See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com
    • Removing your personal information from data broker websites that buy and sell consumer data. A data removal service reduces risk before identity theft happens. Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Review bank and credit statements for early warning signs

    Review your bank, credit card and investment statements regularly, even when nothing looks suspicious. Small red flags often appear long before major losses.

    Everyday security habits that prevent financial scams

    Many successful scams rely on pressure and trust, not advanced technology. Good habits close those gaps.

    Practice smart daily security habits:

    • Never allow anyone to log into your accounts remotely, even if they claim to be from your bank
    • Avoid storing photos of IDs, Social Security cards, or account numbers on your phone or email
    • Stop immediately if something feels off, and contact the institution directly using a verified phone number
    Logging in the right way, by typing web addresses yourself and avoiding suspicious links, reduces phishing risks.  

    Logging in the right way, by typing web addresses yourself and avoiding suspicious links, reduces phishing risks.   (Martin Bertrand / Hans Lucas / AFP via Getty Images)

    Kurt’s key takeaways

    Checking your bank or retirement accounts online should feel routine, not risky. With updated devices, strong logins, careful access and smart habits, you can keep control of your money without giving up convenience. Security is not about fear. It is about staying one step ahead.

    Have you ever clicked a financial alert and wondered afterward if it was real or a scam? Let us know your thoughts by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • One Tech Tip: All you need to know about the iPhone’s Lockdown Mode

    [ad_1]

    A little known security feature on iPhones is in the spotlight after it stymied efforts by U.S. federal authorities to search devices seized from a reporter.

    Apple’s Lockdown Mode recently prevented FBI agents from getting into Washington Post reporter Hannah Natanson ‘s iPhone.

    Agents seized the phone, as well as two MacBooks and other electronic devices, when they searched Natanson’s home last month as part of an investigation into a Pentagon contractor accused of illegally handling classified information. But the FBI reported that its Computer Analysis Response Team “could not extract” data from the iPhone because it was in Lockdown Mode, according to a court filing.

    So what is Lockdown Mode? Here’s a rundown of how it works and how to use it:

    Apple says Lockdown Mode is an “optional, extreme” protection tool designed to guard against “extremely rare and highly sophisticated cyberattacks.” It’s not for everyone, but instead for “very few individuals” who could be targeted by digital threats because of who they are or what they do.

    “Most people will never be targeted by attacks of this nature,” Apple’s support page says.

    It’s available in Apple’s newer operating systems, including iOS 16 and macOS Ventura. It works by putting strict security limits on some apps and features, or even making some unavailable, to reduce the areas that advanced spyware can attack. It also restricts the kinds of browser technologies that websites can use and limits photo sharing.

    Apple has previously rejected U.S. government requests to build so-called backdoor access for its devices.

    In 2016, Apple refused a request by authorities to help bypass lockscreen security for an encrypted iPhone belonging to a shooter who carried out a terrorist attack in San Bernardino, Calif. The company also declined to add an ability to input passcodes electronically, which would make it possible to carry out “brute force” attempts to guess the combination using computers.

    “It would be wrong to intentionally weaken our products with a government-ordered backdoor,” Apple said in explaining its decision.

    Make sure your iPhone, iPad or MacBook has been updated. You’ll have to turn the feature on separately for each of your Apple devices.

    On your iPhone, go to Settings, then to the Privacy and Security section, scroll down to the bottom and tap on Lockdown Mode. Enter your passcode — not a facial or fingerprint scan — to activate it. The device will restart and then you’ll again have to use your passcode to unlock it. On MacBooks, follow a similar procedure from the System Settings menu.

    Apple recommends that you switch it on for all of the company’s devices that you own.

    You might assume that requiring facial or fingerprint recognition to unlock your phone is good enough to protect it from snooping. But experts say passcodes are better than biometrics at protecting your devices from law enforcement, because they could compel you to unlock your device by holding your phone up to your face or forcing you to put your finger on the scanner.

    FBI agents told Natanson that they “could not compel her to provide her passcodes,” but the warrant they used to execute the search did give them the authority “to use Natanson’s biometrics, such as facial recognition or fingerprints, to open her devices.” According to a court filing, Natanson said she didn’t use biometrics to lock her devices but agents were ultimately able to unlock her MacBook with her finger.

    Apple says some apps and features will work differently when Lockdown Mode is on.

    Some websites might load slowly or not work properly, and some images and web fonts could be missing because they block “certain complex web technologies.”

    In Messages, most types of attachments are blocked, and links and link previews won’t be available. Incoming FaceTime calls are blocked unless it’s from a number you’ve called in the past month.

    In Photos, location information is stripped from shared photos and shared albums are removed from the app. Focus mode won’t work normally.

    There are also tighter restrictions on connecting your phone or computer to unsecure Wi-Fi networks or to other computers and accessories.

    When I tried it out on my own iPhone, some apps warned me that certain functions might not work. I noticed that one of my news apps started using a different font and photos on some websites didn’t appear, replaced by a question mark.

    The biggest disruption happened when I went to the gym, which involved using a web-based check-in system to scan a QR code. But my phone camera wouldn’t work so I had to turn off Lockdown Mode in order to get in. To be sure, my iPhone’s standalone Code Scanner app still worked, so the problem seemed to center on using a website to activate the camera.

    Follow the same procedure outlined above that you used to turn on Lockdown Mode. You’ll need to enter your passcode and the phone will perform a restart.

    ___

    Is there a tech topic that you think needs explaining? Write to us at onetechtip@ap.org with your suggestions for future editions of One Tech Tip.

    [ad_2]

    Source link

  • Roblox child safety warning after Nebraska kidnapping case

    [ad_1]

    NEWYou can now listen to Fox News articles!

    What starts as a game can quietly turn into something much more serious. Parents across the country are paying closer attention after a Nebraska man was charged with kidnapping two sisters, ages 12 and 14. 

    According to authorities, he first connected with the girls on Roblox and later continued the conversations on Snapchat.

    Law enforcement says the suspect built trust with the girls online over time before traveling from Nebraska to Florida to meet them in person. Even though the girls left willingly, investigators classified the case as an abduction because of their age. That distinction matters and highlights how grooming can distort a child’s sense of safety and choice.

    The case is a sobering reminder of how online grooming works and why social gaming platforms deserve closer scrutiny from families.

    5 PHONE SAFETY TIPS EVERY PARENT SHOULD KNOW

    Investigators say the suspect first contacted the girls through Roblox, showing how social gaming platforms can quietly become communication hubs. (Thomas Fuller/SOPA Images/LightRocket via Getty Images)

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    What Roblox and Snapchat really are

    To understand how this happened, parents need to understand what these platforms actually do.

    Roblox explained for parents and caregivers

    Roblox is an online gaming platform where users create digital characters and play games made by other players. It is popular with children and preteens, which is why many parents see it as harmless fun. What often gets overlooked is that Roblox is also a social platform. Kids can chat inside games, send direct messages and sometimes use voice chat. These conversations can happen with people they have never met in real life.

    According to investigators, communication in this case began on Roblox as early as the summer of 2025. That long timeline reinforces a key reality about grooming. It is rarely sudden. It is built slowly through repeated contact that starts to feel normal to a child.

    Snapchat explained for parents and caregivers

    Snapchat is a messaging app widely used by teens and young users. It allows people to send photos, videos and messages that usually disappear after they are viewed. That disappearing feature is a major concern. Once conversations move to Snapchat, messages become private and harder for parents to monitor.

    Investigators say communication continued on Snapchat after trust had already been established elsewhere. In many grooming cases, moving from a public or semi-public platform to private messaging is a turning point. 

    Snapchat does include safety features designed to limit unwanted contact, especially for teens. But those protections are most effective before trust is established elsewhere. Once a child has already bonded with someone on another platform, private messaging apps can accelerate grooming quickly. Snapchat also offers a parental tool called Family Center that provides limited visibility into teen interactions, but many families do not activate it until after a problem arises.

    How online grooming typically works

    Grooming rarely happens all at once. It is a gradual process built on time, attention and emotional manipulation. It often starts with shared interests and casual conversation. Trust grows slowly. The relationship begins to feel familiar. Then secrecy enters the picture.

    Authorities in this case said family members later noticed unusual behavior, including gifts and food deliveries showing up at the house. Investigators described this as part of the grooming process. Unexpected gifts tied to online contacts are a serious red flag, even when they seem harmless. Another common warning sign is secrecy. Requests like do not tell your parents or this is just between us are intentional. They isolate a child and make intervention harder.

    Another warning sign is sudden contact from someone outside a child’s normal geographic or social circle, especially when paired with urgency, flattery or offers of gifts.

    Why this matters for every family

    Technology changes fast. Kids adapt even faster. Parents often assume platforms are watching closely enough to catch problems early.  Both Roblox and Snapchat say they are cooperating with law enforcement and have safety measures in place. But cooperation after harm occurs is not the same as prevention before trust is built. Authorities stress that no platform can replace parental vigilance. No system is perfect. The most effective protection is awareness, conversation and involvement.

    “We are investigating this deeply troubling incident and will fully support law enforcement,” Matt Kaufman, Roblox’s chief safety officer, told CyberGuy. “Roblox has robust safety policies to protect users that go beyond many other platforms and advanced safeguards that monitor for harmful content and communications. 

    “We have filters designed to block the sharing of personal information, don’t allow user-to-user image or video sharing and recently rolled out age checks globally to limit kids and teens to chatting with others their age by default. While no system is perfect, our commitment to safety never ends, and we continue to strengthen protections to keep users safe.”

    A Snap company spokesperson provided CyberGuy with the following statement:

    Woman looking through her iPad.

    Law enforcement described the case as an abduction, even though the girls left willingly, highlighting how online grooming can distort a child’s sense of safety. (CyberGuy.com)

    “Our hearts go out to the family affected by this tragic incident, and we are grateful to the law enforcement professionals who worked tirelessly in the rescue efforts. The exploitation of children is an abhorrent crime, and we are committed to combating it. We work closely with law enforcement to support their investigations, including during this incident, and to prevent such heinous activity on our platform and help bring criminals to justice. 

    “While no single safety feature or policy can eliminate every potential threat online or in the world around us, we continuously adapt our strategies as criminals evolve their tactics. We’ve built safeguards, launched safety tutorials, partnered with experts and continue to invest in features and tools that support the safety, privacy and well-being of all Snapchatters.”

    What parents can do right now to protect their kids

    There are clear steps parents and grandparents can take today. These actions combine common sense conversations with practical tech controls.

    1) Lock down chat features

    Disable direct messaging and voice chat with strangers. Allow communication only with approved friends. This is one of the most important steps parents can take.

    On Roblox:

    • Open Roblox and log into your child’s account.
    • Go to Settings and select Privacy.
    • Set Who can chat with me to Friends or No one.
    • Set Who can message me to Friends or No one.
    • Turn off voice chat unless you are actively supervising.

    Check these settings regularly. Platform updates can reset defaults.

    EVEN THE FUTURE KING DISCOVERS SMARTPHONES ARE A ROYAL PAIN FOR KIDS AND PARENTS

    On Snapchat:

    • Open Snapchat and tap your child’s profile icon.
    • Tap Settings, then Privacy Controls, then Privacy Controls.
    • Set Contact Me to Friends.
    • Set View My Story to Friends or Custom.
    • Turn off Quick Add to reduce contact from strangers.

    2) Turn on parental controls and activity reports

    Built-in tools help parents spot changes without reading every message. They are designed to provide visibility and early warning signs.

    On Roblox:

    • Open Settings and select Parental Controls.
    • Create a parent PIN so changes require approval.
    • Set monthly spending limits.
    • Review account activity and friend lists together.

    On Snapchat:

    • Enable Family Center from the parent’s Snapchat account.
    • Add your child to see who they interact with most often.
    • Watch for new friends added quickly or late at night.
    • Look for sudden changes in usage patterns.

    3) Set a no secrets rule

    Make it clear that anyone asking for secrecy online is crossing a line. Kids should feel safe coming to you without fear of punishment.

    4) Keep devices out of bedrooms

    Shared family spaces reduce risk and increase visibility. Late-night and private screen time often create conditions in which grooming escalates. Law enforcement noted that devices had been removed earlier in the day in this case, a reminder that rules alone are not enough without ongoing conversation and awareness.

    5) Talk openly about grooming

    Explain that grooming is a slow manipulation that can take weeks or months. When kids understand how it works, they are more likely to recognize red flags.

    6) Watch for platform switching

    Be alert if conversations suddenly move from a game to another app like Snapchat. That shift is often intentional and deserves immediate attention.

    High school students using their smart phones in a hallway

    High school students using their smartphones in a hallway (iStock)

    7) Trust instincts and act early

    If something feels off, pause the account, block the contact and report the behavior. Acting early is always better than waiting.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.  

    Kurt’s key takeaways

    This case is a wake-up call. Gaming platforms are no longer just games. They are social spaces where real relationships can form, for better or worse. Parental controls help. Open conversations matter more. Staying involved gives kids the confidence to ask for help before a situation turns dangerous.

    Is it time for platforms, not parents alone, to take more responsibility for keeping kids safe online? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Microsoft ‘Important Mail’ email is a scam: How to spot it

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Scam emails are getting better at looking official. This one claims to be an urgent warning from Microsoft about your email account. It looks serious. It feels time sensitive. And that is exactly the point. Lily reached out after something about the message did not sit right.

    “I need help with an email that I’m unsure is valid. Hoping you can help me determine whether this is a valid or a scam. I have attached two screenshots below. Thank you in advance,” Lily wrote.

    Here is the important takeaway up front. This email is not from Microsoft. It is a scam designed to rush you into clicking a dangerous link.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK

    A closer look at the sender shows a red flag scammers hope you will miss, a free email address posing as a trusted brand. (Kurt “CyberGuy” Knutsson)

    Why this Microsoft ‘Important Mail’ email is a scam

    Once you slow down and read it closely, the red flags pile up quickly.

    A generic greeting

    It opens with “Dear User.” Microsoft uses your name. Scammers avoid it because they do not know who you are.

    A hard deadline meant to scare you

    The message claims your email access will stop on Feb. 5, 2026. Scammers rely on fear and urgency to short-circuit good judgment.

    A completely wrong sender address

    The email came from accountsettinghelp20@aol.com. Microsoft does not send security notices from AOL. Ever.

    Pushy link language

    “PROCEED HERE” is designed to trigger a fast click. Microsoft messages sent to you to are clearly labeled Microsoft.com pages.

    Fake legal language

    Lines like “© 2026 All rights reserved” are often copied and pasted by scammers to look official.

    Attachments that should not be there

    Microsoft account alerts do not include image attachments. That alone is a major warning sign.

    10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

    Windows 10 security flaws leave millions vulnerable

    The fake Microsoft email uses urgency and vague language to pressure you into clicking before you have time to think. (Kurt “CyberGuy” Knutsson)

    What would have happened if you clicked

    If you clicked the link, you would almost certainly land on a fake Microsoft login page. From there, attackers aim to steal:

    • Your email address
    • Your password
    • Access to other accounts tied to that email

    Once they have your email, they can reset passwords, dig through old messages and launch more scams using your identity.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    Person on phone

    Scam emails often reach people on their phones, where small screens make it easier to miss warning signs and click fast. (Kurt “CyberGuy” Knutsson)

    What to do if this email lands in your inbox

    If an email like this shows up, slow down and follow these steps in order. Each one helps stop the scam cold.

    1) Do not click or interact at all

    Do not click links, buttons or images. Do not reply. Even opening attachments can trigger tracking or malware. Strong antivirus software can block phishing pages, scan attachments and warn you about dangerous links before damage happens. Make sure yours is active and up to date. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Delete the message immediately

    Once it is reported, delete it. There is no reason to keep it in your inbox or trash.

    3) Check your account the safe way

    If you want peace of mind, open a new browser window and go directly to the official Microsoft account website. Sign in normally. If there is a real issue, it will appear there.

    4) Change your password if you clicked

    If you clicked anything or entered information, change your Microsoft password right away. Use a strong, unique password you do not use anywhere else. A password manager can generate and store it securely for you. Then review recent sign-in activity for anything suspicious.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    5) Enable two-factor authentication

    Turn on two-factor authentication (2FA) for your Microsoft account. This adds a second check, which can stop attackers even if they get your password.

    6) Use a data removal service for long-term protection

    Scammers often find targets through data broker sites. A data removal service helps reduce how much personal information is publicly available, which lowers your exposure to phishing in the first place.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Report it as spam or phishing 

    Use your email app’s built-in reporting tool. This helps train filters and protects other users from seeing the same scam.

    Extra protection tips for real Microsoft notices

    When Microsoft actually needs your attention, the signs look very different.

    • Alerts appear inside your Microsoft account dashboard
    • Messages do not demand immediate action through random email links
    • Notices never come from free email services like AOL, Gmail or Yahoo

    That contrast makes scams easier to spot once you know what to look for.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Scammers are counting on you being busy, distracted or worried about losing access to your email. That is why messages like this lean so hard on urgency. Your email sits at the center of your digital life, so attackers know a shutdown threat gets attention fast. The good news is that slowing down for even a few seconds changes everything. Lily did exactly the right thing by stopping and asking first. That single habit can prevent identity theft, account takeovers and a long, frustrating cleanup. Remember this rule. Emails that threaten shutdowns and demand immediate action are almost never legitimate. When something feels urgent, that is your cue to pause, verify on your own and never let an email rush you into a mistake.

    Have you seen a fake Microsoft warning like this recently, or did it pretend to come from another brand you trust? Let us know your thoughts by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • SoundCloud data breach exposes 29.8 million user accounts

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Hackers have exposed personal and contact information tied to SoundCloud accounts, with data breach notification service Have I Been Pwned reporting impacts to approximately 29.8 million users. The breach hit one of the world’s largest audio platforms and left many users locked out with error messages before the company confirmed the incident.

    Founded in 2007, SoundCloud grew into an artist-first service hosting more than 400 million tracks from over 40 million creators. That scale made this incident especially concerning. SoundCloud said it detected unauthorized activity tied to an internal service dashboard and launched its incident response process. At the time, users reported 403 Forbidden errors, especially when connecting through VPNs.

    Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

    SoundCloud confirmed unauthorized activity after users reported access errors, triggering an internal incident response. (iStock)

    What data was exposed in the SoundCloud breach

    SoundCloud initially said attackers accessed limited data and did not touch passwords or financial information. The company said the exposed information matched what users already show publicly on profiles.

    Later disclosures painted a much bigger picture.

    According to Have I Been Pwned, attackers harvested data from approximately 29.8 million accounts. That data included:

    • Email addresses
    • Usernames and display names
    • Profile photos and avatars
    • Follower and following counts
    • Geographic locations, in some cases

    While no passwords were taken, linking emails to public profiles creates real risk. That combination fuels phishing, impersonation and targeted scams.

    Who is behind the attack

    Security researchers tied the breach to ShinyHunters, a well-known extortion gang. Sources told BleepingComputer that the group attempted to extort SoundCloud following the data breach. SoundCloud later confirmed those claims. In a January update, the company said attackers made demands and launched email-flooding campaigns to harass users, employees and partners. ShinyHunters has also claimed responsibility for recent voice phishing attacks targeting single sign-on systems at Okta, Microsoft and Google. Those attacks targeted corporate SaaS accounts to steal data and extort.

    Why this breach matters even without passwords

    At first glance, this may sound less serious than breaches involving passwords or credit cards. That assumption can be dangerous. Email addresses tied to real profiles allow scammers to craft convincing messages. They can pose as SoundCloud, brands or even other creators. With follower counts and usernames, messages feel personal and believable. Once attackers gain trust, they push links, malware or fake login pages. That is often how larger account takeovers begin.

    What SoundCloud users should expect next

    SoundCloud has not said whether more details will be released. The company did confirm the attack and the extortion attempt, but it has not answered follow-up questions about the scope or internal controls. For users, the long-term risk comes from how widely this dataset spreads. Once published, exposed data rarely disappears. It circulates across forums, marketplaces and scam networks for years.

    We reached out to SoundCloud for comment, and a representative told us, “We are aware that a threat actor group has published data online allegedly taken from our organization. Please know that our security team—supported by leading third-party cybersecurity experts—is actively reviewing the claim and published data.”

    SoundCloud has said it has found no evidence that sensitive data, such as passwords or financial information, was accessed.

    Ways to stay safe after the SoundCloud breach

    If you have or had a SoundCloud account, now is the time to act. Even limited data exposure can lead to targeted scams if you ignore it.

    1) Watch for phishing and impersonation emails

    Scammers often move fast after a breach. Watch your inbox for messages that mention SoundCloud, music uploads, copyright issues or account warnings. Do not click links or open attachments from unexpected emails. When in doubt, go directly to the official website instead of using email links. Strong antivirus software adds another layer of protection here.

    Confused woman looking at her phone

    Nearly 29.8 million accounts had emails and public profile data harvested, raising concerns about phishing and impersonation. (Cyberguy.com)

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    2) Change your SoundCloud password anyway

    Passwords were not exposed, but changing them is still smart. Create a new password that you do not use anywhere else. If remembering passwords feels impossible, consider using a password manager to generate and securely store strong passwords. This reduces the risk of reuse across platforms.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

    3) Turn on two-factor authentication

    Two-factor authentication (2FA) adds a critical barrier if someone tries to access your account. Even if attackers guess or obtain a password later, they still need a second verification step. Enable 2FA anywhere SoundCloud or connected services offer it.

    4) Lock down your email account 

    Your email is the real target after most breaches. If someone gains access to it, they can reset passwords everywhere else. Use a strong, unique password for your email account and turn on two-factor authentication. Review recovery emails and phone numbers to make sure they still belong to you.

    DATA BREACH EXPOSES 400,000 BANK CUSTOMERS’ INFO

    5) Reduce your online data footprint

    Attackers use breached emails to search data broker sites and social platforms for more details. The less data available, the harder you are to target. Consider a data removal service to limit how often your email and personal details appear across the web.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    6) Check your other accounts for suspicious activity

    Attackers often reuse exposed email addresses to test logins across streaming services, social media and shopping accounts. Watch for password reset emails you did not request or login alerts from unfamiliar locations. If something looks off, act fast.

    Someone typing on a computer in a dark room.

    Security researchers linked the breach to the ShinyHunters extortion group, which later attempted to pressure SoundCloud for payment. (Thomas Trutschel/Photothek via Getty Images)

    Kurt’s key takeaways

    Data breaches no longer stay contained to one app or one moment in time. Even when attackers expose information that looks harmless, the fallout can last much longer. The SoundCloud breach shows how public profile data paired with private contact details creates real exposure. Staying alert, limiting data sharing and using strong security habits remain your best defense as breaches continue to escalate.

    Have you checked which old or forgotten accounts still expose your email and could be putting you at risk right now? Let us know your thoughts by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • AI deepfake romance scam steals woman’s home and life savings

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A woman named Abigail believed she was in a romantic relationship with a famous actor. The messages felt real. The voice sounded right. The video looked authentic. And the love felt personal. 

    By the time her family realized what was happening, more than $81,000 was gone — and so was the paid-off home she planned to retire in.

    We spoke with Vivian Ruvalcaba on my “Beyond Connected” podcast about what happened to her mother and how quickly the scam unfolded. What began as online messages quietly escalated into financial ruin and the loss of a family home. Vivian is Abigail’s daughter. She is now her mother’s advocate, investigator, chief advocate and protector.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    FROM FRIENDLY TEXT TO FINANCIAL TRAP: THE NEW SCAM TREND

    Vivian Ruvalcaba says a deepfake video made the scam against her mom, Abigail, feel real, using a familiar face and voice to build trust. (Philip Dulian/picture alliance via Getty Images)

    How the scam quietly started

    The scam did not begin with a phone call or a threat. It began with a message. “Facebook is where it started,” Vivian explained. “She was directly messaged by an individual.” That individual claimed to be Steve Burton, a longtime star of “General Hospital.” Abigail watched the show regularly. She knew his face. She knew his voice.

    After a short time, the conversation moved off Facebook. “He then led her to create an account with WhatsApp,” Vivian said. “When I discovered that, and I looked at the messaging, you can see all the manipulation.”

    That shift mattered. This is a major red flag I often warn people about. When a scammer moves a conversation from a public platform like Facebook to an encrypted app like WhatsApp, it is usually deliberate and designed to avoid detection.

    Grooming through secrecy and isolation

    At first, Abigail told no one. “She was very, very secretive,” Vivian said. “She didn’t share any of this with anyone. Not my father. Not me.” 

    That secrecy was not accidental. “She was being groomed not to share this information,” Vivian explained.

    This is a tactic I see over and over again in scams like this. Once a scammer feels they have someone emotionally invested, the next step is to isolate them. They push victims to keep secrets and avoid talking to family, friends or police. When Vivian finally started asking questions, her mother reacted in a way she never had before. “She said, ‘It’s none of your business,’” Vivian said. “That was shocking.”

    The deepfake video that changed everything

    When Vivian threatened to go to the police, her mother finally revealed what had been happening. “That’s when she showed me the AI video,” Vivian said. In the clip, a man who looked and sounded like Steve Burton spoke directly to Abigail and referred to her as “Abigail, my queen.” The message felt personal. It used her name and promised love and reassurance.

    “It wasn’t grainy,” Vivian said. “To the naked eye, you couldn’t tell.” Still, Vivian sensed something was off. “I looked at it, and I knew right away,” she said. “Mom, this is not real. This is AI.”

    Her mother disagreed and argued back. She pointed to the face and the voice. She also believed the phone calls proved it. That is what makes deepfakes so dangerous. When a video looks and sounds real, it can override common sense and even years of trust within a family.

    From gift cards to life savings

    The money flowed slowly at first. A $500 gift card request raised the first alarm. Then, money orders and Zelle payments. What Vivian discovered next still haunts her. “She pulled out a sandwich baggie,” Vivian said. “About 110 gift cards ranging from $25 up to $500.” Those cards were purchased with credit cards. Cash was mailed. Bitcoin was sent. In total, the Los Angeles Police Department (LAPD) tallied the losses at $81,000. And the scam was not finished.

    A couple posing for a picture

    The scam against Abigail moved from social media to encrypted messaging, a common tactic used to avoid detection. (Kurt “CyberGuy” Knutsson)

    When the scammer took her home

    After draining Abigail’s available cash, the scam did not stop. It escalated again. The scammer began pushing her to sell the one asset she still had: her home. “He was pressing her to sell,” Vivian told me. “Because he wanted more money.” The pressure came wrapped in romance. The scammer told Abigail they would buy a beach house together and start a new life. In her mind, this was not a scam. It was a plan for the future. That belief set off a chain reaction.

    How the home sale happened so quickly

    Abigail sold her condo for $350,000, even though similar homes in the area were worth closer to $550,000 at the time. The sale happened quickly. There was no family involvement. Her husband was still living in the home, yet he did not sign the documents. “She just gave away about $200,000 in equity,” Vivian said. “They stole it.”

    What makes this even more troubling is who bought the property. According to Vivian, the buyer was a wholesale real estate company that moved fast and asked very few questions. Messages later reviewed by the family show Abigail actively trying to hide the sale from her husband. In one text exchange, she warned the buyer not to park in the driveway because her husband had access to a Ring camera. That alone should have raised concerns. Instead, the buyers went along with it. “They appeased whatever she asked for,” Vivian said. “They were getting a property she was basically giving away.”

    These buyers were not the original scammers, but they benefited from the pressure the scammer created. The scammer pushed Abigail to sell. The buyers took advantage of the situation and the deeply discounted price. The home was not extra money, it was Abigail’s retirement. It was the only real security she and her husband had after decades of work. By the time Vivian uncovered the sale, Abigail was days away from sending another $70,000 from the proceeds to the scammer. Had that transfer gone through, nearly everything would have been gone.

    This is the part of the story people struggle to process. Modern AI-driven scams are no longer limited to draining bank accounts or gift cards. They now push victims into selling real property, often with opportunistic players waiting on the other side of the deal.

    Why police and lawyers could not stop the damage

    Vivian contacted the police the same day she realized her mother was being scammed. “They assigned an investigator,” she told me. “He was already very aware of the situation and how little they can help.” That reality is difficult for families to hear, but it is common. 

    Many large-scale scams operate overseas. The money moves quickly through gift cards, wire transfers and crypto. By the time victims realize what is happening, the trail is often cold. “Most of these scammers are out of the country,” Vivian said. “No one is being held accountable.”

    When the case shifted from criminal to civil

    Law enforcement documented the losses and opened a case, but there was little they could do to recover the money or stop what had already happened. The deeper damage came from the home sale, which fell into a legal gray area far beyond a typical fraud report. Once the condo was sold, the situation shifted from a criminal scam to a complex civil fight.

    Vivian immediately began searching for legal help. The first attorneys she contacted discouraged her. One told her it could cost more than $150,000 to pursue a case. Another failed to act even after being told about Abigail’s mental illness and history of bipolar disorder. At one point, an eviction attorney testified in court that Vivian never mentioned the romance scam, something she strongly disputes.

    By March, Abigail and her husband were forced out of their home. By October, they were fully evicted and locked out. Both parents are now displaced. Abigail is living with family out of state. Her husband, now in his mid-70s, is still working because the home was his retirement. 

    It was only after reaching out through personal connections that Vivian found an attorney willing to fight. That attorney is now pursuing the case on a contingency basis, meaning the family does not pay unless there is a recovery. The legal argument centers on Abigail’s mental capacity and whether she could legally understand and execute a home sale under the circumstances. The buyers dispute that claim. The outcome will be decided in court.

    This is why stories like this rarely end with a police arrest or quick resolution. Once a scam crosses into real estate and civil law, families are often left to navigate an expensive and exhausting legal system on their own. And by then, the damage has already been done.

    Why shame keeps scams hidden

    Many victims never report scams. Only about 22% contact the FBI. Fewer than 30% reach out to their local police department. Vivian understands why that happens. “She’s ashamed,” Vivian said. “I know she is.” That shame protects scammers. Silence gives them room to move on and target the next victim.

    INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU

    A photo of a couple sitting and smiling at the camera

    What started as online messages escalated into gift cards, lost savings and the sale of a family home. (Kurt “CyberGuy” Knutsson)

    Red flags families cannot ignore

    This case reveals warning signs every family needs to recognize early.

    Red flags to watch for

    • Sudden secrecy about finances or online activity
    • Requests for gift cards, cash or crypto
    • Pressure to move conversations to encrypted apps
    • AI videos or voice messages used as proof of identity
    • Emotional manipulation tied to urgency or romance
    • Requests to sell property or move large assets

    I want to be very clear about this. It does not matter how smart you are or how careful you think you are. You can become a victim and not realize it until it is too late.

    Tips to stay safe and protect your family

    These lessons come from both Vivian’s experience and the patterns I see repeatedly in modern scams. Some are emotional. Others are technical. Together, they can help families spot trouble sooner and limit the damage when something feels off.

    1) Watch for platform changes

    Moving a conversation from Facebook to WhatsApp or another encrypted app is not harmless. Scammers do this to avoid moderation and make messages harder to trace or flag.

    2) Question AI proof

    Deepfake videos and cloned voices can look and sound convincing. Never treat a video or voice message as proof of identity, especially when money or property is involved.

    3) Slow down major financial decisions

    Scammers create urgency on purpose. Any request involving large sums, property sales or retirement assets should pause until a trusted third party reviews it.

    4) Never send gift cards, cash or crypto

    Legitimate people do not ask for payment through gift cards or cryptocurrency. These methods are a common scam tactic because they are hard to trace and nearly impossible to recover.

    5) Talk openly as a family

    Silence helps scammers. Regular conversations about finances, online contacts and unusual requests make it easier to spot problems early and step in without shame.

    6) Reduce online exposure with a data removal service

    Scammers research their targets using public databases. They pull names, phone numbers, relatives and property records. Removing that data reduces how easily criminals can build a profile.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Use strong antivirus protection

    Malware links can expose financial accounts without obvious signs. Good antivirus software can block malicious links before they lead to deeper access or data theft.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    8) Protect assets early

    Living trusts and proper estate planning add protection before a crisis hits. They can help prevent rushed property sales and limit who can legally move assets without oversight.

    9) Use conservatorship when capacity is limited

    “Conservatorship is the only way,” Vivian said. “Power of attorney may not be enough.” When a loved one has diminished capacity, a conservatorship adds court oversight and can stop unauthorized financial decisions before serious damage occurs.

    Kurt’s key takeaways

    This scam did not rely on sloppy emails or obvious mistakes. It used emotion, familiarity and AI that looked real. Once trust was built, the damage followed quickly. Money disappeared. Secrecy grew. Pressure increased. The home was sold. What makes this case especially painful is the speed. A few messages led to gift cards. Gift cards turned into life savings. Life savings became the loss of a home built over decades. Most families never expect this to happen. Many do not talk about it until it has already happened. The lesson is clear. Awareness matters more than intelligence. Open conversations matter more than embarrassment. Acting early matters more than trying to undo the damage later. If you want to hear Vivian tell this story in her own words and understand how fast these scams unfold, listen to our full conversation on the “Beyond Connected” podcast.

    If a deepfake video showed up on your parent’s phone tonight, would you know before everything was gone? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Microsoft crosses privacy line few expected

    [ad_1]

    NEWYou can now listen to Fox News articles!

    For years, we’ve been told that encryption is the gold standard for digital privacy. If data is encrypted, it is supposed to be locked away from hackers, companies and governments alike. That assumption just took a hit. 

    In a federal investigation tied to alleged COVID-19 unemployment fraud in Guam, a U.S. territory where federal law applies, Microsoft confirmed it provided law enforcement with BitLocker recovery keys. Those keys allowed investigators to unlock encrypted data on multiple laptops.

    This is one of the clearest public examples to date of Microsoft providing BitLocker recovery keys to authorities as part of a criminal investigation. While the warrant itself may have been lawful, the implications stretch far beyond one investigation. For everyday Americans, this is a clear signal that “encrypted” does not always mean “inaccessible.”

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    In the Guam investigation, Microsoft provided BitLocker recovery keys that allowed law enforcement to unlock encrypted laptops. (David Paul Morris/Bloomberg via Getty Images)

    What happened in the Guam BitLocker case?

    Federal investigators believed three Windows laptops held evidence tied to an alleged scheme involving pandemic unemployment funds. The devices were protected with BitLocker, Microsoft’s built-in disk encryption tool enabled by default on many modern Windows PCs. BitLocker works by scrambling all data on a hard drive so it cannot be read without a recovery key. 

    Users can store that key themselves, but Microsoft also encourages backing it up to a Microsoft account for convenience. In this case, that convenience mattered. When served with a valid search warrant, Microsoft provided the recovery keys to investigators. That allowed full access to the data stored on the devices. Microsoft says it receives roughly 20 such requests per year and can only comply when users have chosen to store their keys in the cloud.

    We reached out to Microsoft for comment, but did not hear back before our deadline.

    How Microsoft was able to unlock encrypted data

    According to John Ackerly, CEO and co-founder of Virtru and a former White House technology advisor, the problem is not encryption itself. The real issue is who controls the keys. He begins by explaining how convenience can quietly shift control. “Microsoft commonly recommends that users back up BitLocker recovery keys to a Microsoft account for convenience. That choice means Microsoft may retain the technical ability to unlock a customer’s device. When a third party holds both encrypted data and the keys required to decrypt it, control is no longer exclusive.”

    Once a provider has the ability to unlock data, that power rarely stays theoretical. “When systems are built so that providers can be compelled to unlock customer data, lawful access becomes a standing feature. It is important to remember that encryption does not distinguish between authorized and unauthorized access. Any system designed to be unlocked on demand will eventually be unlocked by unintended parties.”

    Ackerly then points out that this outcome is not inevitable. Other companies have made different architectural choices. “Other large technology companies have demonstrated that a different approach is possible. Apple has designed systems that limit its own ability to access customer data, even when doing so would ease compliance with government demands. Google offers client-side encryption models that allow users to retain exclusive control of encryption keys. These companies still comply with the law, but when they do not hold the keys, they cannot unlock the data. That is not obstruction. It is a design choice.”

    Finally, he argues that Microsoft still has room to change course. “Microsoft has an opportunity to address this by making customer-controlled keys the default and by designing recovery mechanisms that do not place decryption authority in Microsoft’s hands. True personal data sovereignty requires systems that make compelled access technically impossible, not merely contractually discouraged.”

    In short, Microsoft could comply because it had the technical ability to do so. That single design decision is what turned encrypted data into accessible data.

    “With BitLocker, customers can choose to store their encryption keys locally, in a location inaccessible to Microsoft, or in Microsoft’s consumer cloud services,” a Microsoft spokesperson told CyberGuy in a statement. “We recognize that some customers prefer Microsoft’s cloud storage, so we can help recover their encryption key if needed. While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide whether to use key escrow and how to manage their keys.”

    WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK

    New CISA warning: Thanksgiving clickjacking threat in popular browsers

    When companies hold encryption keys, lawful requests can unlock far more data than most people expect. (Kurt “CyberGuy” Knutsson)

    Why this matters for data privacy

    This case has reignited a long-running debate over lawful access versus systemic risk. Ackerly warns that centralized control has a long and troubling history. “We have seen the consequences of this design pattern for more than two decades. From the Equifax breach, which exposed the financial identities of nearly half the U.S. population, to repeated leaks of sensitive communications and health data during the COVID era, the pattern is consistent: centralized systems that retain control over customer data become systemic points of failure. These incidents are not anomalies. They reflect a persistent architectural flaw.”

    When companies hold the keys, they become targets. That includes hackers, foreign governments and legal demands from agencies like the FBI. Once a capability exists, it rarely goes unused.

    How other tech giants handle encryption differently

    Apple has designed systems, such as Advanced Data Protection, where it cannot access certain encrypted user data even when served with government requests. Google offers client-side encryption for some services, primarily in enterprise environments, where encryption keys remain under the customer’s control. These companies still comply with the law, but in those cases, they do not possess the technical means to unlock the data. That distinction matters. As encryption experts often note, you cannot hand over what you do not have.

    What we can do to protect our privacy

    The good news is that personal privacy is not gone. The bad news is that it now requires intention. Small choices matter more than most people realize. Ackerly says the starting point is understanding control. “The main takeaway for everyday users is simple: if you don’t control your encryption keys, you don’t fully control your data.”

    That control begins with knowing where your keys are stored. “The first step is understanding where your encryption keys live. If they’re stored in the cloud with your provider, your data can be accessed without your knowledge.”

    Once keys live outside your control, access becomes possible without your consent. That is why the way data is encrypted matters just as much as whether it is encrypted. “Consumers should look for tools and services that encrypt data before it reaches the cloud — that way, it is impossible for your provider to hand over your data. They don’t have the keys.” Defaults are another hidden risk. Many people never change them. “Users should also look to avoid default settings designed for convenience. Default settings matter, and when convenience is the default, most individuals will unknowingly trade control for ease of use.”

    When encryption is designed so that even the provider cannot access the data, the balance shifts back to the individual. “When data is encrypted in a way that even the provider can’t access, it stays private — even if a third party comes asking. By holding your own encryption keys, you’re eliminating the possibility of the provider sharing your data.” Ackerly says the lesson is simple but often ignored. “The lesson is straightforward: you cannot outsource responsibility for your sensitive data and assume that third parties will always act in your best interest. Encryption only fulfills its purpose when the data owner is the sole party capable of unlocking it.” Privacy still exists. It just no longer comes by default.

    700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

    Person holds a phone

    Reviewing default security and backup settings can help you keep control of your private data. (Kurt “CyberGuy” Knutsson)

    Practical steps you can take today

    You do not need to be a security expert to protect your data. A few practical checks can go a long way.

    1) Start by checking where your encryption keys live

    Many people do not realize that their devices quietly back up recovery keys to the cloud. On a Windows PC, sign in to your Microsoft account and look under device security or recovery key settings. Seeing a BitLocker recovery key listed online means it is stored with Microsoft. 

    For other encrypted services, such as Apple iCloud backups or Google Drive, open your account security dashboard and review encryption or recovery options. Focus on settings tied to recovery keys, backup encryption, or account-based access. When those keys are linked to an online account, your provider may be able to access them. The goal is simple. Know whether your keys live with you or with a company.

    2) Avoid cloud-based key backups unless you truly need them

    Cloud backups are designed for convenience, not privacy. If possible, store recovery keys offline. That can mean saving them to a USB drive, printing them and storing them in a safe place, or using encrypted hardware you control. The exact method matters less than who has access. If a company does not have your keys, it cannot be forced to turn them over.

    3) Choose services that encrypt data before it reaches the cloud

    Not all encryption works the same way, even if companies use similar language. Look for services that advertise end-to-end or client-side encryption, such as Signal for messages, or Apple’s Advanced Data Protection option for iCloud backups. These services encrypt your data on your device before it is uploaded, which means the provider cannot read it or unlock it later. Here is a simple rule of thumb. If a service can reset your password and restore all your data without your involvement, it likely holds the encryption keys. That also means it could be forced to hand over access. When encryption happens on your device first, providers cannot unlock your data because they never had the keys to begin with. That design choice blocks third-party access by default.

    4) Review default security settings on every new device

    Default settings usually favor convenience. That can mean easier recovery, faster syncing and weaker privacy. Take five minutes after setup and lock down the basics.

    iPhone: tighten iCloud and account recovery

    Turn on Advanced Data Protection for iCloud (strongest iCloud protection)

    • Open Settings
    • Tap your name
    • Tap iCloud
    • Scroll down and tap Advanced Data Protection
    • Tap Turn On Advanced Data Protection
    • Follow the prompts to set up Account Recovery options, like a Recovery Contact or Recovery Key

    Review iCloud Backup

    • Open Settings
    • Tap your name
    • Tap iCloud
    • Tap iCloud Backup
    • Decide if you want it on or off, based on your privacy comfort level

    Strengthen your Apple ID security

    • Open Settings
    • Tap your name
    • Tap Sign-In & Security
    • Make sure Two-Factor Authentication (2FA) is turned on and review trusted phone numbers and devices
    • Review trusted phone numbers and devices

    Android: lock your Google account and backups

    Review and control device backup

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Google
    • Tap Backup (or All services then Backup)
    • Tap Manage backup
    • Choose what backs up and confirm which Google account stores it

    NEW ANDROID MALWARE CAN EMPTY YOUR BANK ACCOUNT IN SECONDS

    Strengthen your screen lock, since it protects the device itself

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Security or Security & privacy
    • Set a strong PIN or password
    • Turn on biometrics if you want, but keep the PIN strong either way

    Secure your Google account

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Google
    • Tap Manage your Google Account
    • Go to Security
    • Turn on 2-Step Verification and review recent security activity

    Mac: enable FileVault and review iCloud settings

    Turn on FileVault disk encryption

    • Click the Apple menu
    • Select System Settings
    • Click Privacy & Security
    • Scroll down and click FileVault
    • Click Turn On
    • Save your recovery method securely

    Review iCloud syncing

    • Open System Settings
    • Click your name
    • Click iCloud
    • Review what apps and data types sync
    • Turn off anything you do not want stored in the cloud

    Windows PC: check BitLocker and where the recovery key is stored

    Confirm BitLocker status and settings

    • Open Settings
    • Go to Privacy & security
    • Tap Device encryption or BitLocker (wording varies by device)

    Check whether your BitLocker recovery key is stored in your Microsoft account

    • Go to your Microsoft account page
    • Open Devices
    • Select your PC
    • Look for Manage recovery keys or a BitLocker recovery key entry
    • If you see a key listed online, it means the key is stored with Microsoft. That is why Microsoft was able to provide keys in the Guam case.

    If your account can recover everything with a few clicks, a third party might be able to recover it too. Convenience can be helpful, but it can also widen access.

    5) Treat convenience features as privacy tradeoffs

    Every shortcut comes with a cost. Before enabling a feature that promises easy recovery or quick access, pause and ask one question. If I lose control of this account, who else gains access? If the answer includes a company or third party, decide whether the convenience is worth it. 

    These steps are not extreme or technical. They are everyday habits. In a world where lawful access can quietly become routine access, small choices now can protect your privacy later.

    Strengthen protection beyond encryption

    Encryption controls who can access your data, but it does not stop every real-world threat. Once data is exposed, different protections matter.

    Strong antivirus software adds device-level protection

    Strong antivirus software helps block malware, spyware and credential-stealing attacks that can bypass privacy settings altogether. Even encrypted devices are vulnerable if malicious software gains control before encryption comes into play.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com

    An identity theft protection service helps when exposure turns into fraud

    If personal data is accessed, sold, or misused, identity protection services can monitor for suspicious activity, alert you early and help lock down accounts before damage spreads. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    Kurt’s key takeaways

    Microsoft’s decision to comply with the BitLocker warrant may have been legal. That doesn’t make it harmless. This case exposes a hard truth about modern encryption. Privacy depends less on the math and more on how systems are built. When companies hold the keys, the risk falls on the rest of us.

    Do you trust tech companies to protect your encrypted data, or do you think that responsibility should fall entirely on you? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Paris prosecutors raid X offices in probe into child abuse images and deepfakes

    [ad_1]

    PARIS — French prosecutors raided the offices of Elon Musk’s social media platform X on Tuesday as part of a preliminary investigation into a range of alleged offences, including spreading child sexual abuse images and deepfakes.

    The investigation was opened in January last year by the prosecutors’ cybercrime unit, the Paris prosecutors’ office said in a statement. It’s looking into alleged “complicity” in possessing and spreading pornographic images of minors, sexually explicit deepfakes, denial of crimes against humanity and manipulation of an automated data processing system as part of an organized group, among other charges.

    Prosecutors also asked Elon Musk and former CEO Linda Yaccarino to attend “voluntary interviews” on April 20. Employees of X have also been summoned that same week to be heard as witnesses, the statement said. Yaccarino was CEO from May 2023 until July 2025.

    A spokesperson for X did not respond to a request for comment.

    In a message posted on X, the Paris prosecutors’ office announced the ongoing searches at the company’s offices in France and said it was leaving the platform while calling on followers to join it on other social media.

    “At this stage, the conduct of the investigation is based on a constructive approach, with the aim of ultimately ensuring that the X platform complies with French law, as it operates on the national territory,” the prosecutors’ statement said.

    European Union police agency Europol ’’is supporting the French authorities in this,″ Europol spokesperson Jan Op Gen Oorth told The Associated Press, without elaborating.

    The investigation was first opened following reports by a French lawmaker alleging that biased algorithms on X were likely to have distorted the functioning of an automated data processing system.

    It was later expanded after Musk’s artificial intelligence chatbot Grok generated posts that allegedly denied the Holocaust and spread sexually explicit deepfakes, the statement said. Holocaust denial is a crime in France.

    Grok wrote in a widely shared post in French that gas chambers at the Auschwitz-Birkenau death camp were designed for “disinfection with Zyklon B against typhus” rather than for mass murder — language long associated with Holocaust denial.

    Musk’s artificial intelligence company built xAI and it is integrated into his X platform.

    In later posts on its X account, the chatbot acknowledged that its earlier reply was wrong, said it had been deleted and pointed to historical evidence that Zyklon B in Auschwitz gas chambers was used to kill more than 1 million people.

    Grok has a history of making antisemitic comments. Musk’s company took down posts from the chatbot that appeared to praise Adolf Hitler after complaints.

    X is also under pressure from the EU. The 27-nation bloc’s executive arm opened an investigation last month after Grok spewed nonconsensual sexualized deepfake images on the platform.

    Brussels has already hit X with a 120-million euro (then-$140 million) fine for shortcomings under the bloc’s sweeping digital regulations, including blue checkmarks that broke the rules on “deceptive design practices” that risked exposing users to scams and manipulation.

    [ad_2]

    Source link

  • Tax season scams surge as filing confusion grows

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Tax season already brings stress. In 2026, it brings added confusion. Changes to tax filing programs and the discontinuation of the free government-run filing system have left many taxpayers unsure about what is legitimate. That uncertainty has created an opening for scammers who move quickly when people hesitate. 

    “Every tax season we see scammers ramp up their activity, and with likely confusion now that the free government-run filing system is discontinued, we’re sure scammers will take advantage,” said Lynette Owens, vice president of consumer marketing and education at Trend Micro.

    In past years, scammers have leaned heavily on impersonation. Fake IRS emails promising refunds, text messages claiming accounts have been flagged under new rules and fraudulent tax help offers that promise faster returns continue to circulate, Owens said. As February begins, many taxpayers feel pressure to file quickly. That urgency creates the perfect conditions for fraud.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    WHY SCAMMERS OPEN BANK ACCOUNTS IN YOUR NAME

    Scam emails often pose as IRS notices and demand immediate action to protect a refund. The IRS does not contact taxpayers this way. (Kurt “CyberGuy” Knutsson)

    Why scammers thrive when tax rules feel unclear

    Uncertainty is one of the most effective tools scammers have. When taxpayers are unsure how filing rules work or whether a message is legitimate, criminals step in with communications designed to sound official and helpful. The goal is not clarity. It is speed.

    “Scammers aim to create a heightened sense of anxiety among the people they are targeting,” Owens said. “When taxpayers don’t feel confident about what’s real, whether it’s new filing options, eligibility rules or program updates, criminals step in with messages that sound official and helpful.” They often pose as the IRS, a tax prep service, or even government support. Once trust is established, the message quickly turns transactional, asking for clicks, personal data or payments.

    The most common IRS impersonation scams right now

    While the delivery methods change, the core message rarely does. Something is wrong, and it must be fixed immediately. 

    “The most common tactic we’re seeing is fake refund or account alert messages that claim something is wrong and demand immediate action,” Owens said. Other scams go a step further. Some direct victims to fake IRS login pages designed to steal credentials.

    Others promote fraudulent tax assistance, presenting themselves as government-backed or low-cost help in order to collect personal and financial information. These scams arrive by email, text message, phone calls and fake websites. Many are polished enough to appear legitimate at first glance.

    Why phrases like new rules and urgent issues work

    Language plays a central role in tax scams. Phrases such as new rules or urgent account issues are designed to trigger panic before logic has a chance to catch up. They suggest the recipient has missed something important or risks losing money.

    “Those phrases work because they can trigger panic and urgency, and people are more likely to react emotionally than logically,” Owens said. “New rules suggest you may have missed something important, and an urgent account issue creates fear of penalties, delays or losing a refund.” 

    The safest response is to pause. Do not click links, reply to messages or call phone numbers included in the alert. Instead, go directly to a trusted source like IRS.gov using your own browser.

    A real tax scam message that looks legitimate

    Many tax scams follow a familiar structure. A common example reads: “IRS Notice: Your tax refund is on hold due to a filing discrepancy under updated 2026 rules. Verify your identity now to avoid delays.” 

    At first glance, messages like this may appear credible. They often include official-looking logos, reference numbers and links that resemble real government pages.

    “It may include a convincing IRS-style logo, a case number and a link that looks legitimate at a glance,” Owens said. “But the red flags are usually the same.” The message pressures immediate action, directs users to non-government websites, and requests sensitive information such as Social Security numbers, bank details or login credentials.

    HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET

    A fake IRS notification

    Fake IRS alerts use urgent language like “account issue” or “new rules” to trigger panic. Scammers rely on fear to push quick decisions. (Kurt “CyberGuy” Knutsson)

    What happens after someone falls for a tax scam?

    The damage rarely ends with a single click. 

    “The most serious consequences are identity theft and financial loss,” Owens said. “Once scammers have personal information, they can file fraudulent tax returns, steal refunds, open credit accounts and access bank funds.”

    Victims often spend months working to recover lost money, repair credit damage and restore their identities.

    How the IRS really communicates with taxpayers

    Despite repeated warnings, many people still believe the IRS might email or text them. 

    “A legitimate tax service or the IRS won’t reach out unexpectedly by email, text or social media, and they won’t pressure you to act immediately,” Owens said.

    Scam messages often share the same warning signs. They sound urgent, include links or attachments and ask for sensitive information right away. If a message creates panic or demands fast action, that alone is reason to be skeptical. The IRS primarily communicates by official mail. Unexpected digital contact should always raise concern.

    What to watch for next as scams evolve

    Tax scams continue to grow more sophisticated each year. 

    “Taxpayers should watch for scams that feel more real than ever,” Owens said. “That includes highly polished phishing emails, refund texts designed for quick mobile clicks, fake tax help ads and cloned websites that mimic real IRS or tax prep portals.”

    The biggest mistake people still make is treating an unexpected tax message like an emergency. 

    “In tax season, speed is the scammer’s advantage,” Owens said. “Taking 30 seconds to double-check the source can prevent months of financial and identity damage.”

    What to do if you clicked or responded by mistake

    If someone realizes too late that a message was fraudulent, fast action can limit the damage. 

    “First, stop engaging immediately,” Owens said. “Don’t click links, download attachments or reply.”

    Next, report the incident. Forward phishing emails to phishing@irs.gov and file a report at reportfraud.ftc.gov.

    After that, monitor financial accounts closely, change passwords and consider placing a fraud alert or credit freeze if necessary.

    To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    SCAMMERS TARGET RETIREES AS MAJOR 401(K) RULE CHANGES LOOM FOR 2026 TAX YEAR AHEAD NATIONWIDE

    A calculator on top of tax papers

    Tax scammers target personal and financial data to steal refunds or commit identity theft. (Kurt “CyberGuy” Knutsson)

    Ways to stay safe during tax season

    Scammers count on rushed decisions. The good news is that a few smart habits can dramatically lower your risk.

    1) Slow down before responding to tax messages

    Urgency is the scammer’s favorite tool. Messages that demand immediate action aim to short-circuit your judgment. 

    “Scammers rely on fear, urgency or false promises, especially during tax season,” Owens said. “It’s important to slow down, verify information through official channels, and use trusted security tools.” If a message pressures you to act fast, stop. Take a breath before doing anything else.

    2) Verify filing changes through official IRS channels

    Scam messages often reference new rules, updated policies or eligibility changes. That language sounds credible when filing programs shift. Always confirm changes by typing IRS.gov directly into your browser or signing in to your trusted tax provider account. Never rely on links or phone numbers included in a message.

    3) Protect tax accounts with strong credentials

    Tax portals hold valuable personal and financial data. Weak passwords make them easy targets. Use strong and unique passwords for every tax-related account. A password manager can help generate and store secure credentials without relying on memory.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

    4) Watch for pressure tactics and refund promises

    Scammers know refunds motivate quick action. Messages claiming your refund is waiting, delayed or at risk often signal fraud. Be cautious of promises like faster refunds, guaranteed results or special access to government-backed assistance. Legitimate services do not operate that way.

    5) Avoid links and secure your devices with strong antivirus software 

    Clicking a single link can expose login credentials or install malware. Do not click on links in unexpected tax messages. Also, use strong antivirus software to help block malicious sites and detect threats before damage occurs.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    6) Reduce your digital footprint

    Personal data fuels tax scams. The more information criminals can find online, the easier impersonation becomes. Using a data removal service can help limit exposed personal details across data broker sites. Less data means fewer opportunities for scammers to exploit your identity.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    Kurt’s key takeaways

    Tax season pressure makes even cautious people vulnerable. In 2026, filing confusion adds fuel to the fire. Scammers know this and design messages to look official, urgent and helpful. Pausing, verifying and trusting official sources remains the strongest defense. When something feels rushed, it is usually for a reason.

    Have you received a suspicious IRS message this tax season, and what made you question whether it was real? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link