ReportWire

Tag: Cybercrime

  • Indians who fled a Myanmar cyberscam center are being flown home from Thailand

    [ad_1]

    MAE SOT, Thailand (AP) — India is repatriating on Thursday the first batch of hundreds of its nationals who last month fled to Thailand from Myanmar, where most had been working at a notorious center for online scams.

    The center, known as KK Park on the outskirts of the border city of Myawaddy and said to house a major cybercrime operation, was raided by Myanmar’s army in mid-October to suppress cross-border online scams and illegal gambling.

    An Indian air force transport plane left Thailand en route to India and another plane was to leave later in the day, with about 270 out of 465 Indians who are to be repatriated. The remainder will leave Thailand next Monday, according to Maj. Gen. Maitree Chupreecha, commander of the Thai army’s northern region Naresuan Task Force.

    In March, India repatriated 549 nationals after an earlier crackdown on cybercrime operations at the Myanmar-Thai border.

    Those currently being repatriated are among more than 1,500 people from 28 nations who fled the raid in Myawaddy. Across the border in the Thai town of Mae Sot, Thai authorities had set up temporary facilities for housing and processing not just Indians, but also Chinese, Filipinos, Vietnamese, Ethiopians and Kenyans, among other nationalities.

    In April, the U.N. Office on Drugs and Crime estimated that hundreds of industrial-scale scam centers generate just under $40 billion in annual profits.

    Southeast Asia is the world epicenter for online scams, and hundreds of thousands of people are believed to have been lured to work in Myanmar, Cambodia and Laos, where many were forced to perpetrate global scams involving false romances, fraudulent investments, and illegal gambling.

    Human trafficking is another major criminal aspect of such operations as many of the workers were recruited under false pretenses offering legitimate jobs, only to find themselves trapped in virtual slavery.

    State media in military-run Myanmar said the raid on KK Park was part of operations starting in early September to suppress cross-border online scams and illegal gambling. Since the raid, witnesses and the Thai army have said that that parts of KK Park were demolished by explosions.

    However, independent Myanmar media, including The Irrawaddy, an online news service, have reported that organized criminal scams in Myanmar continue to operate in the Myawaddy area.

    The cybercrime problem received major attention last month when the United States and Britain enacted sanctions against organizers of a major Cambodian cyberscam gang, and its alleged ringleader was indicted by a U.S. federal court in New York.

    In South Korea, the case of a young man, killed after apparently being lured to work at a cyberscam operation in Cambodia, caused an uproar.

    [ad_2]

    Source link

  • Stop foreign-owned apps from harvesting your personal data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You might not think twice about that flashlight app you downloaded or the cute game your grandkids recommended. Yet with a single tap, your private data could travel halfway across the world into the hands of people who profit from selling it. A growing threat is emerging as foreign-owned apps quietly collect massive amounts of personal data about you, and older Americans are among the most vulnerable.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    The hidden cost of ‘free’ apps

    We all love free apps. Whether it’s a shopping deal finder, a weather tracker or a photo editor, they make life easier. But many of these “free” tools aren’t really free; they just don’t charge you money. Instead, they collect your personal information and sell it to make their profit.

    A recent study revealed that over half of the most popular foreign-owned apps available in U.S. app stores collect sensitive user data, including your location, contacts, photos and even keystrokes.

    Many “free” apps secretly collect personal data from users, sending private information to foreign servers without consent. (Kurt “CyberGuy” Knutsson)

    Some of the worst offenders are apps that seem completely harmless:

    • Flashlight and weather apps that track your GPS location 24/7.
    • Shopping apps that collect purchase history, payment preferences and home addresses.
    • Casual games that request access to your camera and contacts for no logical reason.

    These apps often share data with data brokers and ad networks overseas, where privacy laws are weaker and accountability is nearly impossible.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Why retirees are prime targets

    If you’re retired, you may already be on dozens of public databases like voter rolls, real estate listings and charity donor lists. Combine that with information harvested from apps, and scammers can build a frighteningly detailed profile of your life.

    Young woman types on smartphone

    Flashlight, weather and shopping apps often request unnecessary access to your camera, contacts and location to track you around the clock. (Portra/Getty Images)

    They can see:

    • Where you live and who lives with you.
    • What medications you search for.
    • What causes you support or charities you donate to.
    • What devices you own and which banks you use.

    From there, they can craft highly convincing scams like fake donation requests, Medicare scams or phishing texts that look eerily personal. Some even use your social media photos to mimic family members in “grandparent scams.” And it all starts with what you allowed that “harmless” app to access.

    Signs your data might already be exposed

    You don’t need to be a tech expert to spot the warning signs. Here’s what to look for:

    • Unfamiliar charges or new accounts in your name.
    • An increase in scam calls or texts, especially with personal details like your city or bank.
    • Emails from foreign domains claiming to offer rewards or urgent account updates.
    • Ads that seem to “read your mind,” which show up right after you talk about something offline.

    If you’ve noticed any of these, your information is likely circulating through data brokers who purchased it from app networks.

    A smartphone displays apps.

    Older Americans are prime targets, but simple steps like deleting risky apps and reviewing permissions can help protect your privacy. (Kurt “CyberGuy” Knutsson)

    How to stop the data drain

    You can take back control of your data starting right now.

    1) Audit your apps

    Go through your phone and delete any apps you don’t use regularly, especially free ones from unfamiliar developers.

    2) Stop data brokers from trading your info

    Even after deleting risky apps, your personal information may already be circulating online. This is where a data removal service can make a massive difference. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    3) Check permissions

    Open your settings and review which apps have access to your location, contacts or camera. Revoke any unnecessary permissions immediately.

    TEA APP HACKED AS WOMEN’S PHOTOS, IDS & EVEN DMS LEAKED ONLINE

    4) Avoid “foreign-owned” apps that request extensive access without a clear reason.

    Always read the privacy policy (yes, it’s tedious but eye-opening). If an app asks for permissions that do not match its purpose, like a calculator wanting your location or a flashlight needing camera access, that is a major red flag. Many foreign-owned apps hide behind vague privacy terms that allow data to be transferred to overseas servers where U.S. privacy laws do not apply.

    5) Use official stores only

    Stick to the Apple App Store or Google Play Store for downloads. Avoid third-party sites that host cloned or tampered versions of popular apps. Look for verified developers and check privacy ratings in reviews before installing anything new.

    6) Keep your device and apps updated

    Updates close security holes that hackers exploit through malicious apps. Turn on automatic updates so your phone and apps stay protected without you having to remember.

    7) Turn off ad tracking

    Limit how much of your activity is shared with advertisers. 

    On iPhone:

    Go to Settings Privacy & Security Tracking and toggle off “Allow Apps to Request to Track.” 

    On Android: 

    (Settings may vary depending on your Android phone’s manufacturer) 

    Go to Settings → Google → Ads (or Settings → Privacy → Ads) and choose “Delete advertising ID” or “Reset advertising ID.” This action removes or replaces your unique ID so apps and advertisers can no longer use it for personalized ad tracking.

    This step stops apps from following you across other platforms and building data profiles about your habits.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Foreign-owned apps are the new front line in data harvesting, and retirees are the easiest targets. But you don’t have to accept that your private life is public property. It’s time to take back control. Delete the apps you don’t need. Lock down your permissions. And let a data removal service erase your data trail before scammers can use it against you.

    Have you checked which of your apps might be secretly sending your personal data overseas? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Ghost-tapping scam targets tap-to-pay users

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new scam called ghost tapping is spreading across the country. The Better Business Bureau (BBB) warns that scammers are using this tactic to steal money from people who use tap-to-pay credit cards and mobile wallets.

    This scam exploits wireless technology to withdraw money without your awareness. Many victims only realize something is wrong after small, unnoticed transactions slowly drain their accounts.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    The Better Business Bureau warns of a new “ghost-tapping” scam draining money from tap-to-pay cards and mobile wallets. (Clara Margais/picture alliance via Getty Images)

    How the ghost-tapping scam works

    Scammers use near-field communication (NFC) devices that mimic legitimate tap-to-pay systems. In busy places such as festivals, markets, or public transportation, they move close enough to your wallet or phone to trigger a transaction.

    The BBB reports that some scammers pose as charity vendors or market sellers who only accept tap payments. Once you tap your card or phone, they charge far more than the agreed amount.

    Because the first few withdrawals are usually small, they often go undetected by fraud systems. Victims may not notice until much later, when more money has been taken.

    Real-life cases and warnings

    A Missouri resident reportedly lost $100 after being approached by a person carrying a handheld card reader. The BBB Scam Tracker has recorded many similar cases across the nation, with losses sometimes exceeding $1,000.

    Officials warn that scammers may pressure you to complete payments quickly, preventing you from verifying the amount or merchant name. Some even carry portable readers that can pick up signals through thin wallets or purses.

    How to protect yourself from ghost tapping

    While the threat of ghost tapping may sound alarming, protecting yourself is easier than you think. A few smart habits and security tools can greatly reduce your risk of falling victim.

    1) Use RFID-blocking technology

    Invest in an RFID-blocking wallet or card sleeve to create a physical barrier between your card and potential scanners. These inexpensive tools prevent scammers from reading your card information through clothing, bags, or wallets. Look for sleeves or wallets specifically designed to block wireless communication.

    2) Verify before you tap

    Always check the merchant name and transaction amount displayed on the payment terminal before tapping. Scammers often rush you to avoid scrutiny. Take an extra second to confirm what you see matches what you agreed to pay. If something looks off, cancel the transaction immediately.

    3) Set up instant alerts

    Enable instant transaction alerts from your bank or credit card provider. This lets you know the moment a payment is made, giving you a chance to spot unauthorized activity right away. Quick detection can prevent further charges and make it easier to dispute fraudulent transactions.

    Bonus protection: Even if you stop a scam early, your personal data can end up for sale online. Our No. 1 identity theft company monitors your credit and financial information, alerting you if your details appear on the dark web or in a data breach.  

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    You can also use a data removal service to automatically delete your personal information from data broker sites that sell it, keeping you off scam lists before the next attack.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

     

    Woman tapping her credit card at the groceries.

    The BBB says reports of “ghost tapping” are rising, with some victims losing more than $1,000 to contactless theft. (M. Scott Brauer/Bloomberg via Getty Images)

    4) Be cautious in crowded areas

    Crowded environments such as festivals, public transportation, or street fairs create perfect conditions for scammers to blend in. Limit tap-to-pay use in these situations. Instead, use chip or swipe methods, which require physical contact and are harder to exploit.

    5) Monitor your accounts regularly

    Make it a habit to check your financial accounts at least once a week. Review each transaction carefully and report anything suspicious to your bank immediately. Even small unexplained charges could signal a larger problem.

    6) Use payment app security features

    Most mobile wallet apps allow you to set PINs, facial recognition, or fingerprint verification before authorizing a transaction. Make sure these protections are enabled. This adds another barrier that prevents criminals from initiating payments without your consent.

    7) Keep your payment apps and devices updated

    Regularly update your smartphone’s software and mobile wallet apps. Updates often include security patches that protect against newly discovered vulnerabilities scammers might exploit. Outdated software can leave your data exposed.

    Stay protected from payment-stealing malware:

    In addition to keeping your apps updated, protect your device from hidden threats with strong antivirus software. It scans for malicious apps and spyware that can hijack your tap-to-pay data or record sensitive information. 

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    8) Avoid saving multiple cards on mobile wallets

    While convenient, storing several cards in one app can increase your exposure if your phone is compromised. Keep only the cards you use most often connected to your mobile wallet. This reduces the impact of potential fraudulent activity.

    9) Report suspicious activity promptly

    If you ever suspect ghost tapping or notice a strange charge, contact your bank immediately and report the scam to the BBB Scam Tracker. Quick action can help prevent additional losses and assist authorities in identifying scam trends.

    Man paying for his purchase.

    Victims of “ghost tapping” often lose money through small, unnoticed transactions before realizing they’ve been scammed. (Leonie Asendorpf/picture alliance via Getty Images)

    Kurt’s key takeaways

    As contactless payments become more common, scammers are getting more creative. Staying informed and cautious can help protect your money. Small steps like checking your transaction history and using protective gear can make a big difference. If you notice unauthorized charges, contact your bank immediately, freeze your card and report the scam to the BBB Scam Tracker. Technology offers convenience but can also create new risks. The ghost-tapping scam shows how quickly and easily payments can invite hidden dangers. Awareness and prevention remain the best ways to keep your finances safe.

    Will you keep using tap-to-pay after learning about ghost tapping, or switch back to more traditional payment methods? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 3,000+ YouTube videos deliver malware disguised as free software

    [ad_1]

    NEWYou can now listen to Fox News articles!

    YouTube is arguably the most popular and most visited platform for entertainment, education and tutorials. There’s a video for everything on YouTube, whether you want to learn how to cook, ride a bike or need help with work or school. But recent research by Check Point reveals a darker side: a sprawling malware distribution network quietly operating within the platform. Hackers are using compromised accounts, fake engagement and clever social engineering to spread information-stealing malware disguised in more than 3,000 software cracks and game hack videos.

    Most victims begin by searching for free or cracked software, cheat tools or game hacks, which is the root of the infection chain. This curiosity for “free” software opens the door to the Ghost Network’s traps.

    META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Cybercriminals are exploiting YouTube’s massive reach by disguising malware inside fake “how-to” and “free software” videos. (Kurt “CyberGuy” Knutsson)

    All about YouTube’s ghost network

    According to Check Point Research, the YouTube Ghost Network has been active since 2021, with activity surging threefold in 2025. It’s built around a simple but effective formula, which blends social manipulation with technical stealth. The network’s primary targets are people searching for “Game Hacks/Cheats” and “Software Cracks/Piracy.”

    Researchers discovered that these videos often feature positive comments, likes and community posts from compromised or fake accounts. This coordinated engagement gives potential victims a false sense of safety.

    The fake social proof and fabricated likes, comments and subscriber activity play a key psychological role. They trick viewers into believing the content is legitimate and widely trusted, allowing the operation to persist even when YouTube removes individual videos or channels. The network’s modular structure and constant replacement of banned accounts make takedowns only temporarily effective.

    Once a user clicks the provided links, they’re usually taken to file-sharing services or phishing sites hosted on Google Sites, MediaFire, Dropbox or similar platforms. The linked files are often password-protected archives, making them harder for antivirus tools to scan. Victims are then asked to disable Windows Defender before installation, effectively disarming their own protection before running the malware.

    Check Point found that the majority of these attacks deliver information-stealing malware such as Lumma Stealer, Rhadamanthys, StealC and RedLine. These programs harvest passwords, browser data and other sensitive information, sending it back to the attacker’s command and control servers.

    What makes the network particularly resilient is its role-based structure. Each compromised YouTube account serves a function; some upload malicious videos, others post download links and a third group boosts credibility by commenting and liking content. When an account gets banned, it’s quickly replaced, allowing the operation to continue largely uninterrupted.

    YouTube.com displayed on a laptop

    A single click on a malicious link can disable your defenses and install information-stealing malware in seconds. (Kurt “CyberGuy” Knutsson)

    Inside the malicious campaigns

    Two major campaigns stood out in Check Point’s investigation. The first involved the Rhadamanthys infostealer, spread through a compromised YouTube channel named @Sound_Writer, which had nearly 10,000 subscribers.

    The attackers uploaded fake cryptocurrency-related videos and used phishing pages on Google Sites to distribute malicious archives. These pages instructed viewers to “turn off Windows Defender temporarily,” assuring them it was a false alert. The archives contained executable files that quietly installed the Rhadamanthys malware, which connected to multiple control servers to exfiltrate stolen data.

    The second campaign, involving HijackLoader and Rhadamanthys, leveraged a much larger channel, @Afonesio1, with around 129,000 subscribers. Here, attackers uploaded videos offering cracked versions of Adobe Photoshop, Premiere Pro, and FL Studio.

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    One of these videos gained over 291,000 views and dozens of glowing comments claiming the software worked perfectly. The malware was hidden inside a password-protected archive linked through a community post. The installer used HijackLoader to drop the Rhadamanthys payload, which then connected to rotating control servers every few days to avoid detection.

    Even if you never complete the installation, you can still be at risk. Simply visiting the phishing or file-hosting sites may expose you to malicious scripts or credential theft prompts disguised as “verification” steps. Clicking the wrong link can compromise login data before any software is even installed.

    youtube smartphone

    Strong passwords, two-factor authentication, and regular security scans are your best defense against YouTube’s Ghost Network. (Cyberguy.com)

    7 steps you can take to stay safe from YouTube’s ghost network

    The Ghost Network succeeds by exploiting curiosity and trust. It disguises malware as “free software” or “game hacks,” relying on users to click before thinking. Protecting yourself means adopting habits that make it harder for attackers to fool you. Here are seven steps to stay safe:

    1) Avoid cracked software and cheat downloads

    Most infections start with people trying to download pirated or modified programs. These files are often hosted on unregulated file-sharing websites where anyone can upload malicious content. Even if a YouTube video looks polished or filled with positive comments, that doesn’t mean it’s safe. Official software developers and gaming studios never distribute downloads through YouTube links or third-party sites.

    Besides being dangerous, downloading cracked software also poses legal risks. Piracy violates copyright law and can lead to serious consequences, while giving cybercriminals a perfect delivery channel for malware.

    2) Use a strong antivirus

    Make sure you have a trusted antivirus solution installed and always running. Real-time protection can detect suspicious downloads and block harmful files before they do any damage. Schedule regular system scans and keep your antivirus updated so it can recognize the latest threats.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE

    3) Never disable your antivirus or Windows Defender

    If a tutorial or installer tells you to disable your security software, that’s a red flag. Malware creators use this trick to bypass detection. There’s no legitimate reason to turn off protection, even temporarily. The moment a file asks you to do so, delete it immediately.

    4) Be cautious with YouTube links and download sources

    Always inspect links before clicking. Hover over them to check the destination and avoid shortened or redirected URLs that hide their true target. Downloads hosted on unfamiliar domains or file-sharing sites should be treated as unsafe. If you need software, get it directly from the official website or trusted open-source communities.

    5) Use a password manager and enable two-factor authentication (2FA)

    Turning on 2FA for important accounts adds another layer of protection, ensuring that even if someone gets your password, they can’t access your account. Malware often aims to steal saved passwords and browser data. Storing credentials in a password manager keeps them encrypted and separate from your browser, making them harder to steal. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com

    6) Keep your operating system and apps updated

    Software updates don’t just bring new features, but they also fix security flaws that malware can exploit. Enable automatic updates for your system, browser, and commonly used applications. Staying up to date is one of the simplest ways to prevent infections.

    7) Use a trusted data removal service

    Even after securing your system, your personal information might already be circulating online from past breaches. A reliable data removal service can continuously scan and request deletion of your data from people-search and broker sites, making it harder for cybercriminals to exploit your exposed information.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Cybercriminals have evolved beyond traditional phishing and email scams. By exploiting a platform built on trust and engagement, they have created a scalable, self-sustaining system for malware distribution. Frequent file updates, password-protected payloads, and shifting control servers make these campaigns difficult for both YouTube and security vendors to detect and shut down.

    Do you think YouTube is doing enough to stop malware distribution on its platform? Let us know by writing to us at CyberGuy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Hackers target online stores with new attack

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A security researcher found a serious weakness in the software that powers thousands of e-commerce sites. The platform, called Magento, and its paid version Adobe Commerce, has a bug that lets attackers break into active shopping sessions. Some attackers can even take control of the entire store.

    The flaw is known as SessionReaper. It allows hackers to pretend they are real customers without needing a password. Once they are inside, they can steal data, make fake orders, or install tools that collect credit card details.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Why is this attack so serious?

    The problem starts in the part of the system that handles how a store communicates with other online services. Because the software does not properly check the information it receives, it sometimes trusts data that it should not. Hackers take advantage of this by sending fake session files that the store accepts as real.

    Researchers at SecPod warn that successful attacks can lead to stolen customer data, fake purchases, and even full control of the store’s server.

    Once the attack method was shared publicly, cybercriminals began using it right away. Security experts at Sansec reported that more than 250 online stores were compromised within a single day. This shows how quickly attacks can spread once a vulnerability becomes public.

    Hackers are exploiting a new flaw called SessionReaper to hijack active shopping sessions on thousands of e-commerce sites running Adobe Commerce and Magento. (Kurt Knutsson)

    Why are many stores still unprotected?

    Adobe released a security update on September 9 to fix the issue. Weeks later, about 62 percent of affected stores still have not installed it. Some store owners are afraid an update might break features on their site. Others simply do not know how serious the risk is.

    Every unpatched store remains an open door for attackers who want to steal information or install malicious code.

    MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

    How can you stay safe when shopping online?

    While store owners are responsible for fixing the problem, you can still take smart steps to protect yourself when shopping online. These actions can help you spot danger early and keep your personal information safe.

    1) Look for warning signs

    Always pay attention to how a website behaves. If a page looks odd, loads slowly, or shows error messages, it could mean something is wrong behind the scenes. Check for the small padlock symbol in the address bar that shows the site uses HTTPS encryption. If it is missing or the site redirects you to an unfamiliar page, stop and close the browser tab immediately. Trust your instincts if something feels off.

    2) Be careful with email links and use a data removal service 

    Cybercriminals often use fake promotional emails or ads that look like real store offers. Instead of clicking links in messages or banners, type the store’s web address directly into your browser to avoid phishing pages designed to steal your login details or card information. Since attacks like SessionReaper can expose your personal data to criminal marketplaces, consider using a reputable data removal service that continuously scans and deletes your private information, such as your address, phone number, and email, from data broker sites. This reduces your risk of identity theft if your information has been leaked through a compromised online store.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    A person types on a laptop computer in a home office setting, representing remote access points targeted in data breaches.

    Cybersecurity teams at SecPod and Sansec tracked more than 250 stores breached within 24 hours of the exploit going public, showing how fast these attacks spread. (Kurt “CyberGuy” Knutsson)

    3) Use strong antivirus software

    Strong antivirus protection is your silent guard online. Choose reputable software that offers real-time protection, safe browsing alerts, and automatic updates. A strong antivirus program can detect malicious code that tries to run on your device, block unsafe sites, and alert you to potential threats. This adds another crucial layer of defense when visiting online stores that may not be fully secure.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 

    4) Use safe payment options

    Whenever possible, choose payment services that add an extra layer of protection between your bank account and the online store. Platforms like PayPal, Apple Pay, or Google Pay do not share your card number with the retailer. This reduces the chance of your information being stolen if the store is compromised. These payment gateways also offer dispute protection if a purchase turns out to be fraudulent.

    5) Shop with trusted retailers

    Stick to stores with a solid reputation. Well-known brands usually have better security and faster response times when issues arise. Before buying from a new website, check its reviews on trusted consumer sites. Look for signs of credibility such as clear contact information, a professional design, and verified payment options. A few minutes of research can save you from weeks of frustration.

    TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

    6) Keep your devices updated

    Updates may seem annoying, but they are one of the most effective ways to protect your data. Make sure your computer, smartphone, and web browser all have the latest security patches installed. Updates often fix the exact kinds of flaws hackers use to spread attacks like SessionReaper. Enable automatic updates if you can, so your devices stay protected without extra effort.

    7) Use unique, strong passwords

    If you create accounts on shopping sites, make sure each one has its own strong password. Avoid using the same password across multiple platforms. Consider using a password manager to generate and store long, random passwords. That way, if one account is compromised, your other logins stay safe.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    8) Turn on two-factor authentication

    If a site or payment service offers two-factor authentication, enable it. This adds a second security step, such as a code sent to your phone or generated by an app. Even if hackers steal your password, they will not be able to access your account without that second verification.

    Wallet with multiple debit/credit cards

    Even weeks after Adobe issued a critical patch for the SessionReaper vulnerability, nearly two-thirds of affected online stores remain unprotected, leaving customer data and payment information at high risk of theft. (CyberGuy.com)

    9) Avoid public Wi-Fi for purchases

    FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

    Public Wi-Fi networks in places like cafés, airports, and hotels are often unsecured. Avoid entering payment information or logging in to accounts while connected to public networks. If you must make a purchase while away from home, use a mobile data connection or a reliable VPN to encrypt your activity. 

    10) Monitor your bank and credit statements

    Check your financial statements regularly for any unusual activity. Small, unauthorized charges can be early signs of fraud. Report any suspicious transactions to your bank or credit card company right away so they can freeze your account or issue a new card.

    11) Report suspicious activity

    If you notice anything strange during or after an online purchase, act quickly. Contact the store’s customer service to report what you saw. You should also inform your payment provider or credit card company so they can block unauthorized transactions. Reporting early can help stop further damage and alert other shoppers to potential risks.

    Kurt’s key takeaways

    The SessionReaper attack shows how fast online threats can appear and how long they can linger when updates are ignored. Even well-known stores can become unsafe overnight. For retailers, installing patches quickly is critical. For shoppers, staying alert and choosing secure payment methods are the best ways to stay protected.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Would you still shop online if you knew hackers could be hiding behind a store’s checkout page? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • What really happens on the dark web and how to stay safe

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The dark web often feels like a mystery, hidden beneath the surface of the internet that most people use every day. But to understand how scams and cybercrimes actually work, you need to know what happens in those hidden corners where criminals trade data, services and stolen access. 

    Cybercriminals rely on a structured underground economy, complete with marketplaces, rules and even dispute systems to operate safely away from law enforcement. By learning how these systems function, you can better understand the threats that could reach you and avoid becoming the next target.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    Learn how to protect your personal information from dark web threats with simple cybersecurity habits and tools. (Phil Barker/Future Publishing via Getty Images)

    Inside the hidden layers of the internet

    The internet is often divided into three layers: the clear web, the deep web and the dark web. The clear web is the open part of the internet that search engines like Google or Bing can index, including news sites, blogs, stores and public pages. Beneath it lies the deep web, which includes pages not meant for public indexing, such as corporate intranets, private databases and webmail portals. Most of the content in the deep web is legal but simply restricted to specific users.

    The dark web, however, is where anonymity and illegality intersect. It requires special software such as Tor to access, and much of its activity happens behind encryption and invitation-only walls. Tor, short for The Onion Router, was originally developed by the U.S. Navy for secure communication but has since become a haven for both privacy advocates and criminals.

    It anonymizes users by routing traffic through multiple encrypted layers, making it almost impossible to trace where a request truly came from. This anonymity allows criminals to communicate, sell data and conduct illegal trade with reduced risk of exposure.

    Over time, the dark web has become a hub for criminal commerce. Marketplaces once operated like eBay for illegal goods, offering everything from drugs and stolen credit card data to hacking tools and fake identities. Many of these platforms have been shut down, but the trade continues on smaller, more private channels, including encrypted messaging apps such as Telegram. Vendors use aliases, ratings and escrow systems to build credibility.

    Ironically, even among criminals, trust is a critical part of business. Forums often have administrators, verified sellers and mediators to settle disputes. Members who cheat others or fail to deliver are quickly blacklisted, and reputation becomes the main currency that determines who can be trusted.

    The criminal economy and how scams are born

    Every major cyberattack or data leak often traces back to the dark web’s underground economy. A single attack typically involves several layers of specialists. It begins with information stealers, malware designed to capture credentials, cookies and device fingerprints from infected machines. The stolen data is then bundled and sold in dark web markets by data suppliers. Each bundle, known as a log, might contain login credentials, browser sessions and even authentication tokens, often selling for less than $20.

    Another group of criminals, known as initial access brokers, purchases these logs to gain entry into corporate systems. With that access, they can impersonate legitimate users and bypass security measures such as multi-factor authentication by mimicking the victim’s usual device or browser. Once inside, these brokers sometimes auction their access to larger criminal gangs or ransomware operators who are capable of exploiting it further.

    Some of these auctions are run as competitions, while others are flash sales where well-funded groups can buy access immediately without bidding. Eventually, this chain of transactions ends with a ransomware attack or an extortion demand, as attackers encrypt sensitive data or threaten to leak it publicly.

    Interestingly, even within these illegal spaces, scams are common. New vendors often post fake listings for stolen data or hacking tools, collect payments and disappear. Others impersonate trusted members or set up counterfeit escrow services to lure buyers.

    Despite all the encryption and reputation systems, no one is truly safe from fraud, not even the criminals themselves. This constant cycle of deception forces dark web communities to build internal rules, verification processes and penalties to keep their operations somewhat functional.

    What you can do to stay ahead of dark web-driven threats

    For ordinary people and businesses, understanding how these networks operate is key to preventing their effects. Many scams that appear in your inbox or on social media originate from credentials or data first stolen and sold on the dark web. That is why basic digital hygiene goes a long way. Below are some steps you can take to stay protected.

    MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

    Hacker using a computer.

    From password managers to antivirus software, experts share practical ways to keep hackers out of your data. (Annette Riedl/picture alliance via Getty Images)

    1) Invest in personal data removal services

    A growing number of companies specialize in removing your personal data from online databases and people search sites. These platforms often collect and publish names, addresses, phone numbers and even family details without consent, creating easy targets for scammers and identity thieves.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    2) Use unique passwords and a password manager

    One of the easiest ways to stay safe online is to use unique, complex passwords for every account you own. Many breaches happen because people reuse the same password across multiple services. When one site is hacked, cybercriminals take those leaked credentials and try them elsewhere, a technique known as credential stuffing. A password manager eliminates this problem by generating strong, random passwords and securely storing them for you.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Install strong antivirus protection

    Antivirus software remains one of the most effective ways to detect and block malicious programs before they can steal your information. Modern antivirus solutions do far more than just scan for viruses. They monitor system behavior, detect phishing attempts and prevent infostealer malware from sending your credentials or personal data to attackers.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Keep your software updated

    Outdated software is one of the biggest entry points for attackers. Cybercriminals often exploit known vulnerabilities in operating systems, browsers and plugins to deliver malware or gain access to systems. Installing updates as soon as they are available is one of the simplest yet most effective forms of defense. Enable automatic updates for your operating system, browsers and critical applications.

    5) Enable two-factor authentication

    Even if your password gets leaked or stolen, two-factor authentication (2FA) adds an additional barrier for attackers. With 2FA, logging in requires both your password and a secondary verification method. This includes code from an authentication app or a hardware security key.

    6) Consider identity theft protection services

    Identity theft protection can provide early warnings if your personal information appears in data breaches or on dark web marketplaces. These services monitor your sensitive data, such as Social Security numbers, bank details or email addresses. If anything suspicious is detected, they alert you. Many providers also offer recovery assistance, helping you restore stolen identities or close fraudulent accounts. While no service can prevent identity theft entirely, these tools can shorten your response time and limit potential damage if your data is compromised.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Black keyboard with red lights.

    Protecting your identity starts with strong passwords, two-factor authentication and regular software updates. (Jens Kalaene/picture alliance via Getty Images)

    Kurt’s key takeaway

    The dark web thrives on the idea that anonymity equals safety. But while criminals may feel protected, law enforcement and security researchers continue to monitor and infiltrate these spaces. Over the years, many large marketplaces have been dismantled, and hundreds of operators have been caught despite their layers of encryption. The takeaway for everyone else is that the more you understand how these underground systems function, the better prepared you are to recognize warning signs and protect yourself.

    Do you think law enforcement can ever truly catch up with dark web criminals? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Microsoft’s blog recently gave a firm warning: unsupported systems aren’t just outdated, they’re unprotected. That message targets anyone still using Windows 10, and it’s serious. In Microsoft’s Digital Defense Report, over 90% of ransomware attacks hit unsupported PCs. That statistic alone should make every Windows 10 user think twice.

    When an operating system stops receiving updates, it becomes an open door for hackers. Security patches dry up, and vulnerabilities grow. So while your computer might seem fine today, it could already be compromised without your knowledge.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Why are unsupported systems dangerous

    Unsupported Windows 10 systems no longer get the updates that keep you safe. Without those patches, ransomware and malware have easy access to your files. Once inside, attackers can encrypt your personal data or steal credentials and banking details.

    It’s not just about losing files. Identity theft and financial fraud often start with outdated systems. The older the software, the easier it is for cybercriminals to exploit weaknesses that will never be fixed.

    The “just one more year” trap

    Many people tell themselves they’ll upgrade later. Microsoft calls this “just one more year” thinking. The problem is that every delay increases your risk. Extended security updates only offer limited coverage, and they don’t stop new types of attacks.

    Without Microsoft’s regular monitoring, new vulnerabilities stay hidden. You could be using your computer for months while attackers quietly collect your data. That’s a frightening thought, especially when most of it can be prevented by upgrading.

    Upgrading to Windows 11 keeps your system protected with ongoing security updates. (Microsoft)

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    The hidden costs of waiting to upgrade to Windows 11

    It’s easy to think upgrading costs too much. But what about the cost of losing your photos, business files or financial information? Data recovery, fraud resolution and downtime can cost far more than a new device.

    Hackers know users delay updates, and they actively look for outdated systems. Even one unsupported device in a home or office network can create a weak spot that exposes everything else.

    How to stay safe from unsupported Windows 10 security risks

    You can protect yourself right now with a few smart steps. These actions reduce your exposure, tighten your online defenses and prepare you for a smooth upgrade to Windows 11. The good news is that most of these changes only take a few minutes but make a major difference in your security.

    1) Upgrade your system to Windows 11

    HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY

    Start by checking whether your PC can handle Windows 11. Most modern AMD and Intel processors already meet the system requirements. Upgrading keeps your computer protected with ongoing updates that patch vulnerabilities and improve overall performance. It’s one of the simplest ways to defend against ransomware and malware before they strike.

    2) Watch out for phishing scams and install strong antivirus software

    Be cautious with every link and attachment you receive. Cybercriminals love sending fake update notifications that look like official Microsoft messages. These phishing scams often contain malicious links that install malware in seconds. Before you click, hover over links to verify their source and only download updates directly from Microsoft’s official site. To add an extra layer of protection, install strong antivirus software that can detect and block malicious files before they infect your system.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Signage outside the Microsoft Campus

    Delaying your Windows 11 upgrade only gives cybercriminals more time to strike. (Photographer: Chona Kasinger/Bloomberg via Getty Images)

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Use a data removal service

    HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

    Use a personal data removal service to take your information off people-search and data broker websites. These services help remove your name, address, phone number and other personal details that scammers often use for phishing or social-engineering attacks. By limiting what’s publicly available about you, you make it much harder for cybercriminals to target you, especially if your older, unsupported Windows 10 system is ever exposed online.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    4) Secure your logins

    Strong logins make a huge difference. Turn on two-factor authentication (2FA) for your most sensitive accounts, such as banking and email. Also, create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. This extra layer stops hackers, even if they manage to steal a password.

    WINDOWS 10 SUPPORT ENDS: UPGRADE TO WINDOWS 11 SAFELY

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords, and secure those accounts with new, unique credentials.

    Man typing on his laptop.

    Without Windows updates, hidden vulnerabilities give hackers easy access to your data. (Felix Zahn/Photothek via Getty Images)

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    5) Back up your data regularly

    Think of backups as your safety net. Save copies of important files to an external hard drive or a trusted cloud service. Schedule automatic backups so you don’t have to remember to do it yourself. If your PC ever gets locked by ransomware, a clean backup means you can restore everything without paying a cent.

    6) Stay informed and proactive

    Cyber threats evolve every day, and knowledge is your best defense. Keep an eye on official Microsoft announcements and alerts. Small changes, like applying updates quickly and revisiting your privacy settings, can keep you a step ahead of attackers.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Unsupported systems might look harmless, but they create silent risks that grow over time. Every day you stay on Windows 10 after support ends, you depend on luck instead of protection. Upgrading isn’t just about staying current; it’s about keeping your data safe and your privacy intact.

    Is holding on to Windows 10 worth risking everything stored on your computer? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 183 million email passwords leaked: Check yours now

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A massive online leak has exposed more than 183 million stolen email passwords gathered from years of malware infections, phishing campaigns and older data breaches. Cybersecurity experts say it is one of the largest compilations of stolen credentials ever discovered.

    Security researcher Troy Hunt, who runs the website Have I Been Pwned, found the 3.5-terabyte dataset online. The credentials came from infostealer malware and credential stuffing lists. This malware secretly collects usernames, passwords and website logins from infected devices.

    Researchers say the data contains both old and newly discovered credentials. Hunt confirmed that 91% of the data had appeared in previous breaches, but about 16.4 million email addresses were completely new to any known dataset.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    DISCORD CONFIRMS VENDOR BREACH EXPOSED USER IDS IN RANSOM PLOT

    Cyber experts uncovered a 3.5-terabyte data dump containing millions of stolen logins. (Kurt “CyberGuy” Knutsson)

    The real risk behind the password leak

    The leak puts millions of users at risk. Hackers often collect stolen logins from multiple sources and combine them into large databases that circulate on dark web forums, Telegram channels and Discord servers.

    If you have reused passwords across multiple sites, attackers can use this data to break into your accounts through credential stuffing. This method tests stolen username and password pairs on many different platforms.

    The risk remains real for anyone using old or repeated credentials. One compromised password can unlock social media, banking and cloud accounts.

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices.

    Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices. (Jens Büttner/picture alliance via Getty Images)

    Google responds to the reports

    Google confirmed there was no Gmail data breach. In a post on X, the company stated “reports of a Gmail security breach impacting millions of users are false. Gmail’s defenses are strong, and users remain protected.”

    Google clarified that the leak came from infostealer databases that compile years of stolen credentials from across the web. These databases are often mistaken for new breaches when, in fact, they represent ongoing theft activity. Troy Hunt also confirmed the dataset originated from Synthient’s collection of infostealer logs, not from a single platform or recent attack. While no new breach occurred, experts warn that leaked credentials remain dangerous because cybercriminals reuse them for future attacks.

    How to check if you were exposed

    To see if your email was affected, visit Have I Been Pwned. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the Synthient leak.

    Many password managers also include built-in breach scanners that use the same data sources. However, they may not yet include this new collection until their databases update.

    If your address shows up, treat it as compromised. Change your passwords immediately and turn on stronger security features to protect your accounts.

    COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE

    hacker on laptop

    The 183 million exposed credentials came from malware, phishing and old data breaches. (Kurt “CyberGuy” Knutsson)

    9 steps to protect yourself now

    Protecting your online life starts with consistent action. Each step below adds another layer of defense against hackers, malware and credential theft.

    1) Change your passwords immediately

    Start with your most important accounts, such as email and banking. Use strong, unique passwords with letters, numbers and symbols. Avoid predictable choices like names or birthdays. 

    Never reuse passwords. One stolen password can unlock multiple accounts. Each login should be unique to protect your data.

    A password manager makes this simple. It stores complex passwords securely and helps you create new ones. Many managers also scan for breaches to see if your current passwords have been exposed.

    Next, check whether your email has been caught in a recent credential leak. Our No. 1 password manager pick includes a built-in Breach Scanner that searches trusted databases, including the newly added Synthient data from Have I Been Pwned. It helps you find out if your email or passwords have appeared in any known leaks. If you see a match, change any reused passwords right away and secure those accounts with strong, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Enable two-factor authentication (2FA)

    Turn on 2FA wherever possible. It adds a powerful second layer of defense that blocks intruders even if they have your password. You will receive a code by text, app or security key. That code ensures only you can log in to your accounts.

    3) Use an identity theft service for continuous monitoring

    Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. It’s a smart way to stay one step ahead of hackers.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    4) Protect your devices with strong antivirus software 

    Infostealer malware hides inside fake downloads and phishing attachments. A strong antivirus software scans your devices to stop threats before they spread. Keep your antivirus updated and run frequent scans. Even one unprotected device can put your whole digital life at risk.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Avoid saving logins in your web browser

    Browsers are convenient but risky. Infostealer malware often targets saved passwords in your web browser. 

    6) Keep software updated

    Updates fix security flaws that hackers exploit. Turn on automatic updates for your operating system, antivirus and apps. Staying current keeps threats out. 

    7) Download only from trusted sources

    Avoid unknown websites that offer free downloads. Fake apps and files often contain hidden malware. Use official app stores or verified company websites. 

    8) Review your account activity often

    Check your accounts regularly for unusual logins or device connections. Many platforms show a login history. If something looks off, change your password and enable 2FA immediately.

    9) Consider a personal data removal service

    The massive leak of 183 million credentials shows just how far your personal information can spread and how easily it can resurface years later in aggregated hacker databases. Even if your passwords were part of an old breach, data like your name, email, phone number or address may still be available through data broker sites. Personal data removal services can help reduce your exposure by scrubbing this information from hundreds of these sites.

    While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    This leak highlights the ongoing danger of malware and password reuse. Prevention remains the best defense. Use unique passwords, enable 2FA and stay alert to keep your data safe. Visit Have I Been Pwned today to check your email and take action. The faster you respond, the better you protect your identity.

    Have you ever discovered your data in a breach? What did you do next? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.   

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Scammers target retirees as major 401(k) rule changes loom for 2026 tax year ahead nationwide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you’re over 50 and maxing out your 401(k), there’s a big change coming in 2026 that could affect how much tax you pay on your “catch-up contributions.” While it’s mostly about taxes and retirement planning, there’s an unexpected side effect: scammers are circling. Every time your financial habits or personal data become public, it’s a chance for fraudsters to try to exploit you. Here’s what’s changing, why it matters, and how to protect yourself before the scammers come knocking.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    What’s changing with 401(k) catch-up contributions

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Right now, if you’re over 50, you can make extra contributions to your 401(k) on top of the standard annual limit ($23,500 in 2025). These “catch-up” contributions are typically tax-deferred, meaning the money comes out of your paycheck before tax and grows tax-free until retirement.

    But starting in 2026, for anyone earning more than $145,000 in the previous year, these catch-up contributions will no longer be tax-deferred. Instead, they’ll become like the Roth 401(k), meaning you pay taxes on the money now, but it grows tax-free and can be withdrawn tax-free in retirement.

    That sounds simple, but it creates a ripple effect:

    • High earners will see less take-home pay now.
    • Tax planning gets trickier, and some people may consider restructuring their accounts or investment strategies.
    • And, most importantly for CyberGuy readers: these changes create new opportunities for scammers.

    Big 401(k) changes in 2026 could leave retirees exposed to new scam risks. (Cyberguy.com)

    Why the new rules could attract scammers

    FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING IT

    Scammers constantly look for financially active retirees. When rules like this change, fraudsters send out emails, calls, or letters pretending to be financial advisors, IRS agents, or plan administrators. Their goal? To trick you into giving away account numbers, Social Security details, or direct-deposit information.

    Some common scam tactics to watch for:

    • Fake “plan update” emails claiming you need to verify your 401(k) contributions due to the law change.
    • Roth conversion scam calls claiming you can “avoid extra taxes” by transferring your account through a third-party “advisor.”
    • Urgency and fear tactics, such as “Act now, or lose your retirement benefits!”

    Even savvy retirees can be caught off guard, especially when the message sounds official and references real tax law changes.

    How to protect yourself from 401(k) scams and data theft

    NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

    With new 401(k) rule changes taking effect, scammers are using the confusion to trick retirees and workers alike. Follow these steps to stay alert, safeguard your savings, and protect your personal data from being stolen or misused.

    1) Know the legitimate changes

    Start by understanding Secure 2.0 and how catch-up contributions will be taxed. Reliable sources include your plan administrator, the IRS website, or a licensed tax advisor. Staying informed helps you spot fake claims before they cause harm.

    2) Use a personal data removal service

    For retirees, this extra layer of protection keeps sensitive information out of reach from scammers who exploit tax changes, Roth conversions, and retirement updates. While you can manually opt out of data brokers and track your information, that process takes time and effort. A personal data removal service automates the task by contacting over 420 data brokers on your behalf. It also reissues removal requests if your data reappears and shows you a dashboard of confirmed removals.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Scam written on a tablet surrounded by cash

    Scammers are already targeting retirees with fake “account update” alerts. (Kurt “CyberGuy” Knutsson)

    HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUD

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    3) Verify every call and email, plus use antivirus software

    If you get a call or email about your 401(k), don’t assume it’s real. Hang up or delete it, then contact your plan administrator directly using official contact details. Avoid clicking links or downloading attachments from unknown messages.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    4) Monitor your credit and accounts

    Cybercriminals often use personal information from earlier data leaks or data brokers. Watch your credit reports and account activity closely. Early detection can stop suspicious transactions before they escalate.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    5) Set up alerts and freezes if necessary

    Ask your bank and retirement plan to enable transaction alerts. You can also temporarily freeze your credit to prevent anyone from opening new accounts in your name. This is especially useful during times of financial change.

    6) Educate friends and family

    Scammers often target retirees and their relatives who help manage finances. Remind your loved ones never to share account details over the phone or email. Protecting everyone in your household keeps scammers from finding weak links.

    Man reviews inheritance documents

    Stay safe by confirming any 401(k) changes directly with your plan provider. (uchar/Getty Images)

    Kurt’s key takeaways

    As 2026 approaches, the new 401(k) rule changes will reshape how millions of Americans manage their retirement savings. Staying informed, cautious, and proactive can protect your financial future. Scammers thrive on confusion, but by verifying information, monitoring your accounts, and removing your personal data from risky sites, you can stay one step ahead. Remember, the more control you take over your privacy, the harder it becomes for criminals to exploit it.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Have you taken steps to see where your personal data is exposed, and what did you find most surprising when you checked? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 5 social media safety tips to protect your privacy online

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Let’s face it: Social media can feel like a minefield. Between oversharing personal details, friend requests from strangers and sneaky scams sliding into your DMs, it’s easy to put yourself at risk without realizing it. But staying safe online doesn’t have to be complicated. With a few smart settings and habits, you can enjoy social media without giving away more than you mean to.

    Settings and menus on social media platforms can change over time and may vary by device (iOS vs. Android vs. Web) or region. The steps below were accurate at the time of publishing, but you may see slightly different wording or paths depending on updates, app version or mobile device manufacturer.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter

    HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES

    1) Turn off Location Sharing

    Many apps automatically tag your posts with your location. That can let strangers know your routines or even your home address.

    Scammers have a harder time learning about your life the less you share online.    (Kurt “CyberGuy” Knutsson)

    How to turn off Location Sharing

    On iPhone

    • Go to Settings.
    • Click Privacy & Security.
    • Tap Location Services.
    • Then pick the app.
    • Set it to “Never” or “While Using the App.”

    On Android

    (Settings may vary depending on your Android phone’s manufacturer.)

    • Go to Settings.
    • Tap Location.
    • Click App permissions.
    • Then select the app and toggle location off or select Don’t allow.

    Note: Some apps may still have permission for “While using the app” or “Only this time.” So, you should check each app individually, especially camera and social-media apps, for location permissions.

    Pro tip: Even turning off location for just your camera app helps keep photos from carrying hidden location data.

    META TO ALLOW TEENS’ PARENTS TO DISABLE PRIVATE CHATS WITH AI AFTER BACKLASH OVER FLIRTY CHATBOTS

    A child holds an iPhone at an Apple store on Sept. 25, 2015 in Chicago.

    Parents — and even some teens — are growing increasingly concerned about the effects of social media use on young people. (AP Photo/Kiichiro Sato, File)

    2) Use a private account

    A private account means only people you approve can see your posts and photos. Think of it like putting a lock on your front door.

    How to set private accounts

    Facebook

    • Go to Settings & Privacy.
    • Tap Settings.
    • Scroll to the Audience & Visibility (or Your Activity) section.
    • Click Posts.
    • Find “Who can see your future posts?” and set it to Friends.

    Instagram

    • Tap your profile.
    • Tap the menu (☰).
    • Tap Account Privacy.
    • Toggle on Private account.

    TikTok

    • Go to your Profile.
    • Tap the menu (☰).
    • Select Settings and privacy.
    • Tap Privacy.
    • Toggle on Private account.

    X (formerly Twitter)

    • Click on your profile icon in the top left of the screen.
    • Open Settings and privacy.
    • Select Privacy and safety.
    • Tap Audience and tagging.
    • Toggle Protect your posts (or Protect your Tweets).
    • Once enabled, only approved followers can see your posts.

    Snapchat

    • Open Settings (gear icon).
    • Scroll to Privacy Controls.
    • Under “Who Can,” adjust options like Contact Me, View My Story and See Me in Quick Add to Friends only.

    YouTube

    • Go to your YouTube Studio (desktop or mobile app).
    • When uploading, set visibility to Private or Unlisted.
    • For existing videos, open the video’s settings and change visibility as needed.

    Note: Entire channels cannot be made private, only individual videos.

    LinkedIn

    • Tap your profile photo
    • Settings.
    • Go to Visibility.
    • Under Profile viewing options, select Private mode.
    • You can also control who sees your connections and activity under “Visibility of your LinkedIn activity.”
    identity theft tech scam

    Identity theft has become so commonplace that it no longer shocks you to hear about the latest scam. (Cyberguy.com)

    3) Report suspicious accounts

    Fake profiles are everywhere. Scammers may pose as friends, celebrities or even customer service reps. Reporting them helps keep you (and others) safe.

    How to report an account

    Facebook

    • Go to the fake or impersonating profile.
    • Tap the three-dot menu (Options).
    • Select Find support or report profile.
    • Choose a reason, such as pretending to be someone else.
    • Follow the on-screen prompts to submit the report.

    Instagram

    • Go to the profile.
    • Tap the three-dot menu.
    • Select Report.
    • Choose a reason.
    • Follow the on-screen instructions to complete the report.

    TikTok

    • Open the profile.
    • Tap the three-dot menu (or sometimes the Share icon).
    • Select Report.
    • Choose Report account.
    • Select the reason.
    • Submit the report.

    X (formerly Twitter)

    • Go to the account profile.
    • Tap the three-dot or overflow icon.
    • Select Report.
    • Choose the type of issue.
    • If you’re reporting an entire profile rather than a single post, select Report @username from the profile page.

    YouTube

    • Go to the channel page.
    • Tap the About tab (on desktop) or the three-dot menu (on mobile).
    • Select Report.
    • Choose the reason.
    • Submit the report.

    Snapchat

    • Go to the user’s profile.
    • Tap the three-dot menu or gear icon.
    • Select Report.
    • Choose the reason.
    • Submit the report.

    LinkedIn

    • Visit the fake or suspicious profile.
    • Tap the More button (or three dots).
    • Select Report abuse.
    • Select a reason and follow the prompts.

    Pro tip: Don’t just block. Report alerts to the platform so they can remove the account for everyone.

    Teenage boy on smartphone

    With a few smart settings and habits, you can enjoy social media without giving away more than you mean to. (Thai Liang Lim/Getty Images)

    4) Enable two-factor authentication (2FA)

    Even if someone steals your password, 2FA makes it harder for them to break in. It adds an extra step, like a code texted to your phone.

    How to enable two-factor authentication (2FA)

    Facebook

    • Go to the menu and select Settings & Privacy, then Settings.
    • Tap Accounts Center.
    • Then click Password and Security.
    • Tap Two-factor authentication.
    • It may ask you to choose an account to set up two-factor authentication. 
    • Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.

    Instagram

    • Go to your profile and open Settings.
    • Click Accounts Center. 
    • Select Password and Security.
    • Then Two-Factor Authentication.
    • It may ask you to choose an account to set up two-factor authentication. 
    • Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.

    TikTok

    • Go to your Profile.
    • Then open the Menu.
    • Select Settings and privacy.
    • Then, Security and permissions.
    • Tap 2-step verification.
    • Choose one or more verification methods, such as text message, email or an authentication app.
    • Click Turn On. 
    • Follow the prompts to finish setup.

    X (formerly Twitter)

    • Click on your profile on the upper left of the screen.
    • Open Settings and privacy.
    • Select Security and account access, then Security.
    • Tap Two-factor authentication.
    • Choose your preferred method, such as text message, authentication app or security key.
    • Follow the steps to turn it on.

    Note: Text message (SMS) verification on X may only be available for paid (Premium) users or in certain regions. If SMS isn’t available, you can still use an authentication app or a physical security key for two-factor authentication.

    Pro tip: Use an authenticator app (like Google Authenticator or Authy) instead of text messages for stronger protection.

    5) Check your photos before posting

    Your photos may reveal more than you think — house numbers, car license plates or even vacation details that signal you’re away from home.

    Quick fixes before posting

    • Crop or blur backgrounds that show personal details.
    • Avoid posting in real time while traveling. Wait until you’re back.
    • Review old posts to make sure you’re not unintentionally sharing private info.

    SOCIAL MEDIA VERIFICATION SYSTEMS LOSE POWER AS SCAMMERS PURCHASE CHECKMARKS TO APPEAR LEGITIMATE

    Bonus tip: Keep personal info under wraps

    Every time you post, share or comment online, you’re leaving small clues about your life, and scammers are great at putting those pieces together. The less information fraudsters can find about you, the weaker their scams become.

    Many impersonators use public details like your hometown, workplace or family connections to build fake profiles that seem trustworthy. Even information like your email address or phone number can be exploited if it’s floating around the internet.

    A personal data removal service can help reduce that risk by scrubbing your personal details from people search sites and data brokers. While no solution is perfect, minimizing your digital footprint makes you a much harder target for impersonation and social-engineering scams. These services actively monitor and systematically remove your information from hundreds of sites, saving you time and giving you peace of mind.

    Protecting your privacy online isn’t just about what you share on social media; it’s also about controlling what’s out there already. Limiting that data means scammers can’t easily cross-reference your information with data from breaches or the dark web.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    Kurt’s key takeaways

    Staying safe on social media isn’t about deleting your accounts; it’s about taking control of your information. Turning off location sharing keeps your whereabouts private. Switching to a private account gives you more say over who sees your posts. Being cautious with friend requests and DMs helps you avoid scams. And double-checking your photos before posting prevents oversharing. With just a few quick settings and habits, you can enjoy social media with peace of mind.

    Have you ever spotted a scam or fake account online? Tell us what happened by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Phishing scheme tricks people with free roadside kit

    [ad_1]

    TAHLEQUAH, Okla. – A free roadside safety kit is being offered under the auspices of AAA, but it’s actually a phishing scheme that not only levies a “shipping charge,” but uses bank card numbers for unrelated items.

    The Tahlequah Daily Press followed the link provided in a press release received by newsroom staff, preparing to write an article on something that sounded like a good deal for drivers who are members of AAA.

    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm~? $6AE] ab[ E96 C6A@CE6C H2D 492C865 S`c]hd 7@C E96 U=5BF@j7C66UC5BF@j <:E[ 2?5 :E ?6G6C 2CC:G65] p 4964< H:E9 ppp AC@G:56CD C6G62=65 :E H2D 2 D42>] }@E @?=J H2D E96 C6A@CE6CUCDBF@jD 42C5 FD65 E@ E2<6 @FE E96 S`c]hd[ 3FE 2? 255:E:@?2= 492C86 @? $6AE] ah 7@C Sg`]`a H2D E2<6? @FE @7 E96 244@F?E[ 7@C D@>6E9:?8 ?@E @C56C65[ 7C@> E96 D2>6 E9:C5A2CEJ A2J>6?E 92?5=6C] %9:D C6BF:C65 E96 4=@D:?8 @7 E92E 244@F?E 2?5 2 ?6H 42C5 56=:G6C65] %96 A2J66 H2D U=5BF@juF== #9JE9> t49@[UC5BF@j 2?5 92D E96 A9@?6 ?F>36C @7 gggba_hghf[ 😕 r2=:7@C?:2] (96? E96 C6A@CE6C 42==65 E96 ?F>36C[ D96 H2D E@=5 u#t @?=J 92?5=6D A2J>6?ED 7@C C6E2:=6CD[ 2?5 E96 6?E:EJ C67FD65 E@ =@@< 7FCE96C :?E@ E96 EC2?D24E:@?] %96 =:?< DFAA=:65 3J 2 AC6DD C6=62D6 C646:G65 😕 E96 ?6HDC@@> 42>6 7C@> k2 9C67lQ>2:=E@ippp#@25D:56o>=H6DE=@2?D6CG:46D]4@>Qmppp#@25D:56o>=H6DE=@2?D6CG:46D]4@>k^2m[ 2?5 6>2:=D 4@?7:C>:?8 E96 <:E H2D @? E96 H2J 42>6 7C@> k2 9C67lQ>2:=E@i?@C6A=JoEH:E49]EGQm?@C6A=JoEH:E49]EGk^2m]k^Am

    kAm$96==J #@33:?D[ H:E9 #@33:?D x?DFC2?46 p86?4J 😕 %29=6BF29[ D2:5 E96D6 EJA6D @7 D42>D 42? 36 C64@8?:K65 3J A2J:?8 4=@D6 2EE6?E:@? E@ E96 H63D:E6 =:?<]k^Am

    [ad_2]

    By Lee Guthrie | CNHI Oklahoma

    Source link

  • Phishing scheme tricks people with free roadside kit

    [ad_1]

    TAHLEQUAH, Okla. – A free roadside safety kit is being offered under the auspices of AAA, but it’s actually a phishing scheme that not only levies a “shipping charge,” but uses bank card numbers for unrelated items.

    The Tahlequah Daily Press followed the link provided in a press release received by newsroom staff, preparing to write an article on something that sounded like a good deal for drivers who are members of AAA.

    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm~? $6AE] ab[ E96 C6A@CE6C H2D 492C865 S`c]hd 7@C E96 U=5BF@j7C66UC5BF@j <:E[ 2?5 :E ?6G6C 2CC:G65] p 4964< H:E9 ppp AC@G:56CD C6G62=65 :E H2D 2 D42>] }@E @?=J H2D E96 C6A@CE6CUCDBF@jD 42C5 FD65 E@ E2<6 @FE E96 S`c]hd[ 3FE 2? 255:E:@?2= 492C86 @? $6AE] ah 7@C Sg`]`a H2D E2<6? @FE @7 E96 244@F?E[ 7@C D@>6E9:?8 ?@E @C56C65[ 7C@> E96 D2>6 E9:C5A2CEJ A2J>6?E 92?5=6C] %9:D C6BF:C65 E96 4=@D:?8 @7 E92E 244@F?E 2?5 2 ?6H 42C5 56=:G6C65] %96 A2J66 H2D U=5BF@juF== #9JE9> t49@[UC5BF@j 2?5 92D E96 A9@?6 ?F>36C @7 gggba_hghf[ 😕 r2=:7@C?:2] (96? E96 C6A@CE6C 42==65 E96 ?F>36C[ D96 H2D E@=5 u#t @?=J 92?5=6D A2J>6?ED 7@C C6E2:=6CD[ 2?5 E96 6?E:EJ C67FD65 E@ =@@< 7FCE96C :?E@ E96 EC2?D24E:@?] %96 =:?< DFAA=:65 3J 2 AC6DD C6=62D6 C646:G65 😕 E96 ?6HDC@@> 42>6 7C@> k2 9C67lQ>2:=E@ippp#@25D:56o>=H6DE=@2?D6CG:46D]4@>Qmppp#@25D:56o>=H6DE=@2?D6CG:46D]4@>k^2m[ 2?5 6>2:=D 4@?7:C>:?8 E96 <:E H2D @? E96 H2J 42>6 7C@> k2 9C67lQ>2:=E@i?@C6A=JoEH:E49]EGQm?@C6A=JoEH:E49]EGk^2m]k^Am

    kAm$96==J #@33:?D[ H:E9 #@33:?D x?DFC2?46 p86?4J 😕 %29=6BF29[ D2:5 E96D6 EJA6D @7 D42>D 42? 36 C64@8?:K65 3J A2J:?8 4=@D6 2EE6?E:@? E@ E96 H63D:E6 =:?<]k^Am

    [ad_2]

    By Lee Guthrie | CNHI Oklahoma

    Source link

  • Phishing scheme tricks people with free roadside kit

    [ad_1]

    TAHLEQUAH, Okla. – A free roadside safety kit is being offered under the auspices of AAA, but it’s actually a phishing scheme that not only levies a “shipping charge,” but uses bank card numbers for unrelated items.

    The Tahlequah Daily Press followed the link provided in a press release received by newsroom staff, preparing to write an article on something that sounded like a good deal for drivers who are members of AAA.

    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm~? $6AE] ab[ E96 C6A@CE6C H2D 492C865 S`c]hd 7@C E96 U=5BF@j7C66UC5BF@j <:E[ 2?5 :E ?6G6C 2CC:G65] p 4964< H:E9 ppp AC@G:56CD C6G62=65 :E H2D 2 D42>] }@E @?=J H2D E96 C6A@CE6CUCDBF@jD 42C5 FD65 E@ E2<6 @FE E96 S`c]hd[ 3FE 2? 255:E:@?2= 492C86 @? $6AE] ah 7@C Sg`]`a H2D E2<6? @FE @7 E96 244@F?E[ 7@C D@>6E9:?8 ?@E @C56C65[ 7C@> E96 D2>6 E9:C5A2CEJ A2J>6?E 92?5=6C] %9:D C6BF:C65 E96 4=@D:?8 @7 E92E 244@F?E 2?5 2 ?6H 42C5 56=:G6C65] %96 A2J66 H2D U=5BF@juF== #9JE9> t49@[UC5BF@j 2?5 92D E96 A9@?6 ?F>36C @7 gggba_hghf[ 😕 r2=:7@C?:2] (96? E96 C6A@CE6C 42==65 E96 ?F>36C[ D96 H2D E@=5 u#t @?=J 92?5=6D A2J>6?ED 7@C C6E2:=6CD[ 2?5 E96 6?E:EJ C67FD65 E@ =@@< 7FCE96C :?E@ E96 EC2?D24E:@?] %96 =:?< DFAA=:65 3J 2 AC6DD C6=62D6 C646:G65 😕 E96 ?6HDC@@> 42>6 7C@> k2 9C67lQ>2:=E@ippp#@25D:56o>=H6DE=@2?D6CG:46D]4@>Qmppp#@25D:56o>=H6DE=@2?D6CG:46D]4@>k^2m[ 2?5 6>2:=D 4@?7:C>:?8 E96 <:E H2D @? E96 H2J 42>6 7C@> k2 9C67lQ>2:=E@i?@C6A=JoEH:E49]EGQm?@C6A=JoEH:E49]EGk^2m]k^Am

    kAm$96==J #@33:?D[ H:E9 #@33:?D x?DFC2?46 p86?4J 😕 %29=6BF29[ D2:5 E96D6 EJA6D @7 D42>D 42? 36 C64@8?:K65 3J A2J:?8 4=@D6 2EE6?E:@? E@ E96 H63D:E6 =:?<]k^Am

    [ad_2]

    By Lee Guthrie | CNHI Oklahoma

    Source link

  • EL and WLA Event Discuss How Lotteries Stay Safe as Cyber Threats Change the Sector

    [ad_1]

    In an event hosted by Norsk Tipping, Norway’s national lottery company, European Lotteries and the World Lottery Association (WLA) brought together operators, suppliers, and regulators in Oslo from October 21–23 for the 2025 Security & Operational Risk Seminar. Centered on the theme “Trust in the Supply Chain: Resilience and Oversight,” the seminar examined ways lotteries can enhance operational integrity in the face of growing cyber threats and increasingly complex supplier networks.

    Trust in the Gambling Sector’s Security Is Under Pressure

    Sofie Nystrøm, CEO of Fortified Technologies and former head of the Norwegian National Security Authority, opened the seminar by outlining the current security landscape. She highlighted that digital supply chains are becoming increasingly complex, cyber threats are growing in both sophistication and frequency, and ransomware continues to be the most common form of attack. 

    According to Nystrøm, trust is under pressure. She explained that lotteries need to take proactive measures, streamline their processes, and collaborate with partners who prioritize strong security, since a lottery’s protection is only as resilient as that of its suppliers.

    The seminar underscored a key point that security is more than just a department. It is a collaborative effort and a cornerstone of trust. From implementing frameworks and conducting audits to managing real-world crises, lotteries function as trusted partners in society, and often, the behind-the-scenes work of security teams is vital to maintaining that trust.

    Security Is a Cornerstone of Public Trust

    The event had many leading industry professionals who delved deeper into the necessity of having better security as a cornerstone of public trust.  For example, Gennaro Borrelli of Brightstar Lottery delved into the “AI versus AI” frontier, showing how emerging technologies can both enhance defenses and be exploited by attackers. 

    Meanwhile, Pablo Berloso of SELAE reminded attendees that some of the most significant risks remain traditional and tangible. Even the most advanced cybersecurity measures are limited if basic infrastructure fails. He pointed to the nationwide power outage in Spain in spring 2024 and explained how SELAE navigated the crisis to preserve operational resilience.

    Rebecca McCarthy of Allwyn UK highlighted how the transition from Camelot to Allwyn reinforced resilience, embedding security throughout everyday processes. This was a concept that she illustrated with the metaphor of a tree that bends under pressure but develops stronger roots over time.

    Supplier and auditor insights emphasized the collaborative aspect of security. For example, Andrew Jackson of Scientific Games underscored the importance of transparency and teamwork, drawing lessons from the notorious McDonald’s promotional games case of the 1990s. 

    Meanwhile, Stavroula Karagianni of OpenBet outlined strategies for safeguarding data integrity across complex global operations. Hans Peter Østrem, WLA SCS Auditor, described auditors as “critical friends,” highlighting that audits go beyond compliance. According to Østrem, these are opportunities to enhance processes, foster innovation, and bolster resilience.

    The closing panel agreed that while absolute security is impossible, maintaining trust depends on continuous vigilance and open communication.

    [ad_2]

    Stefan Velikov

    Source link

  • Beware fake credit card account restriction scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    It started with an urgent subject line: “Resolve Unusual Activity on Your American Express Account Now.” That is how one scam email tried to trick me into clicking a fake link that claimed to “verify account activity.” It looked official with logos, customer support tone and even a partial account number. But it was a phishing attempt, a common tactic used to steal personal and financial information.

    Let’s look at what made this message suspicious and how you can protect yourself.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOW TO SPOT AND STOP AI PHISHING SCAMS

    How the phishing email scam works

    Phishing emails copy trusted companies to create panic and urgency. The goal is simple: get you to click. In this case, the email claimed my American Express account was “temporarily restricted” until I verified my identity.

    A fake American Express email tried to steal personal data using urgent, fear-based language. (Kurt “CyberGuy” Knutsson)

    A closer look revealed several red flags:

    • The sender’s email was not from an official American Express domain.
    • The “Click Here” button linked to a strange website.
    • The message used fear-based language about account suspension.

    Each of these clues points to a fake email designed to steal login details or credit card numbers.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Instructions on where to click.

    Learn to spot red flags like strange email addresses and fake “verify account” requests. (Kurt “CyberGuy” Knutsson)

    What to do if you receive a phishing email

    If an email looks suspicious:

    • Do not click any links.
    • Check the sender’s address. Real companies use verified domains, not random ones.
    • Go directly to the company website by typing the URL into your browser.
    • Report the email. American Express asks customers to forward phishing messages to spoof@americanexpress.com.
    • Delete the email right away.

    These steps can protect you from identity theft and financial fraud.

    PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS

    Person typing on their laptop.

    Strong passwords, 2FA and data removal services help defend against digital scams. (Neil Godwin/Future via Getty Images)

    10 tips to protect yourself from phishing emails

    Phishing scams that mimic real companies like American Express can slip into your inbox looking almost legitimate. The best way to stay safe is to create strong digital habits that protect your information and your peace of mind. Here are the top ways to defend yourself against phishing threats and financial fraud.

    1) Turn on two-factor authentication for financial accounts

    Adding two-factor authentication (2FA) creates an extra layer of protection. Even if a scammer gets your password through a fake American Express email, they cannot access your account without your verification code. Most banks and credit card companies offer this free feature in their security settings. Enable it today and make your login stronger.

    2) Consider using a data removal service

    Data removal services help clean up your personal information from data broker websites that collect and sell your details to advertisers, marketers and even scammers. Reducing your digital footprint limits the amount of information that phishing attackers can use to make fake emails look convincing. In the case of fake American Express messages, less personal data online means fewer details criminals can use to target you directly.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    3) Keep your browser and security software updated

    Outdated browsers and antivirus programs leave gaps that scammers can exploit. Regular updates close those gaps and strengthen your defense against phishing links and malicious downloads. Set your software to update automatically so you are always protected when opening emails or clicking links.

    4) Review account statements and transactions regularly

    Make it a habit to log into your credit card accounts directly from the official website, not from email links. Scan your statements for unfamiliar transactions. Early detection helps you report fraud fast and recover funds before more damage is done.

    5) Pause and verify before you click anything

    Phishing emails thrive on urgency. Before clicking, take a deep breath and ask yourself: Does this message feel pressured or suspicious? Instead of clicking “verify now,” open a new browser tab and visit the official credit card website to check your account. This one simple pause can stop a scam in its tracks.

    6) Use strong antivirus software

    Good antivirus software not only blocks viruses but also warns you when a site or email is unsafe. Choose a program that includes phishing detection, real-time web protection and email scanning. These tools can automatically block fraudulent look-alike emails before you even open them.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    7) Use an identity monitoring service

    Identity monitoring services keep watch over the dark web and alert you if your personal information, such as your email address, password, or credit card number, appears in stolen data. If scammers gain access to this information, they often use it to create realistic phishing attempts, like the fake American Express “account restricted” email. Early detection through identity monitoring allows you to take action, such as changing passwords, freezing credit, or alerting your bank before real damage occurs.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    8) Learn to recognize official communications

    Legitimate companies like American Express will never ask for full account numbers, passwords, or security codes by email. Familiarize yourself with how real messages from your bank look and sound. If something feels off, forward the message to the company’s official fraud department and delete it immediately.

    9) Back up your important data securely

    If a phishing attack installs malware on your computer, it can lock or delete files. Keep secure backups on an external drive or a trusted cloud service. That way, even if scammers target your system, you will not lose access to your information.

    10) Trust your instincts

    If an email feels wrong, it probably is. Your intuition is one of your strongest defenses against scams. Combine it with these habits to stay ahead of cybercriminals and keep your personal and financial information safe. 

    Kurt’s key takeaways

    Phishing scams are becoming more advanced, but your awareness is your best defense. When you know how to spot fake emails and stay calm under pressure, you protect both your money and your peace of mind. So next time you get an “urgent” message about your account, ask yourself: Would your bank really contact you this way?

    Have you ever received a suspicious email like this? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Teen sues AI tool maker over fake nude images

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A teenager in New Jersey has filed a major lawsuit against the company behind an artificial intelligence (AI) “clothes removal” tool that allegedly created a fake nude image of her. 

    The case has drawn national attention because it shows how AI can invade privacy in harmful ways. The lawsuit was filed to protect students and teens who share photos online and to show how easily AI tools can exploit their images.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

    How the fake nude images were created and shared

    When she was 14, the plaintiff posted a few photos of herself on social media. A male classmate used an AI tool called ClothOff to remove her clothing in one of those pictures. The altered photo kept her face, making it look real.

    The fake image quickly spread through group chats and social media. Now 17, she is suing AI/Robotics Venture Strategy 3 Ltd., the company that operates ClothOff. A Yale Law School professor, several students and a trial attorney filed the case on her behalf.

    A New Jersey teen is suing the creators of an AI tool that made a fake nude image of her. (iStock)

    The suit asks the court to delete all fake images and stop the company from using them to train AI models. It also seeks to remove the tool from the internet and provide financial compensation for emotional harm and loss of privacy.

    The legal fight against deepfake abuse

    States across the U.S. are responding to the rise of AI-generated sexual content. More than 45 states have passed or proposed laws to make deepfakes without consent a crime. In New Jersey, creating or sharing deceptive AI media can lead to prison time and fines.

    At the federal level, the Take It Down Act requires companies to remove nonconsensual images within 48 hours after a valid request. Despite new laws, prosecutors still face challenges when developers live overseas or operate through hidden platforms.

    APPARENT AI MISTAKES FORCE TWO JUDGES TO RETRACT SEPARATE RULINGS

    courtroom and gavel

    The lawsuit aims to stop the spread of deepfake “clothes-removal” apps and protect victims’ privacy. (iStock)

    Why legal experts say this case could set a national precedent

    Experts believe this case could reshape how courts view AI liability. Judges must decide whether AI developers are responsible when people misuse their tools. They also need to consider whether the software itself can be an instrument of harm.

    The lawsuit highlights another question: How can victims prove damage when no physical act occurred, but the harm feels real? The outcome may define how future deepfake victims seek justice.

    Is ClothOff still available?

    Reports indicate that ClothOff may no longer be accessible in some countries, such as the United Kingdom, where it was blocked after public backlash. However, users in other regions, including the U.S., still appear able to reach the company’s web platform, which continues to advertise tools that “remove clothes from photos.”

    On its official website, the company includes a short disclaimer addressing the ethics of its technology. It states, “Is it ethical to use AI generators to create images? Using AI to create ‘deepnude’ style images raises ethical considerations. We encourage users to approach this with an understanding of responsibility and respect for others’ privacy, ensuring that the use of undress app is done with full awareness of ethical implications.”

    Whether fully operational or partly restricted, ClothOff’s ongoing presence online continues to raise serious legal and moral questions about how far AI developers should go in allowing such image-manipulation tools to exist.

    CLICK HERE TO GET THE FOX NEWS APP

    Insurance data breach exposes sensitive info of 1.6 million people

    This case could set a national precedent for holding AI companies accountable for misuse of their tools. (Kurt “CyberGuy” Knutsson)

    Why this AI lawsuit matters for everyone online

    The ability to make fake nude images from a simple photo threatens anyone with an online presence. Teens face special risks because AI tools are easy to use and share. The lawsuit draws attention to the emotional harm and humiliation caused by such images.

    Parents and educators worry about how quickly this technology spreads through schools. Lawmakers are under pressure to modernize privacy laws. Companies that host or enable these tools must now consider stronger safeguards and faster takedown systems.

    What this means for you

    If you become a target of an AI-generated image, act quickly. Save screenshots, links and dates before the content disappears. Request immediate removal from websites that host the image. Seek legal help to understand your rights under state and federal law.

    Parents should discuss digital safety openly. Even innocent photos can be misused. Knowing how AI works helps teens stay alert and make safer online choices. You can also demand stricter AI rules that prioritize consent and accountability.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    This lawsuit is not only about one teenager. It represents a turning point in how courts handle digital abuse. The case challenges the idea that AI tools are neutral and asks whether their creators share responsibility for harm. We must decide how to balance innovation with human rights. The court’s ruling could influence how future AI laws evolve and how victims seek justice.

    If an AI tool creates an image that destroys someone’s reputation, should the company that made it face the same punishment as the person who shared it? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Payroll scam hits US universities as phishing wave tricks staff

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Phishing scams target every kind of institution, whether it’s a hospital, a big tech firm or even a fast-food chain. Educational institutions aren’t an exception, especially in 2025, when attackers are actively directing their efforts toward them. Universities across the U.S. are facing a new type of cybercrime where attackers are targeting staff to hijack salary payments. Researchers have discovered that since March 2025, a hacking group known as Storm-2657 has been running “pirate payroll” attacks, using phishing tactics to gain access to payroll accounts. Let’s talk more about this attack and how you can stay safe.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    How does the university payroll scam work

    According to Microsoft Threat Intelligence, Storm-2657 primarily targets Workday, a widely used human resources platform, though other payroll and HR software could be at risk as well. The attackers begin with highly convincing phishing emails, carefully crafted to appeal to individual staff members. Some messages warn of a sudden campus illness outbreak, creating a sense of urgency, while others claim that a faculty member is under investigation, prompting recipients to check documents immediately. In some cases, emails impersonate the university president or HR department, sharing “important” updates about compensation and benefits.

    Phishing scams are evolving fast and now universities have become prime targets for payroll theft. (Kurt “CyberGuy” Knutsson)

    These emails contain links designed to capture login credentials and multi-factor authentication (MFA) codes in real time using adversary-in-the-middle techniques. Once a staff member enters their information, the attackers can access the account as if they were the legitimate user. After gaining control, the hackers set up inbox rules to delete Workday notifications, so the victims do not see alerts about changes. This stealthy approach allows the attackers to modify payroll profiles, adjust salary payment settings and redirect funds to accounts they control, all without raising immediate suspicion.

    COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE

    Hackers are exploiting universities at scale

    The hackers don’t stop at a single account. Once they control one mailbox, they use it to spread the attack further. Microsoft reports that from just 11 compromised accounts at three universities, Storm-2657 sent phishing emails to nearly 6,000 email addresses at 25 institutions. By using trusted internal accounts, their emails appear more legitimate, increasing the likelihood that recipients will fall for the scam.

    To maintain access over time, the attackers sometimes enroll their own phone numbers as MFA devices, either through Workday profiles or through Duo MFA. This gives them persistent access, allowing them to approve further malicious actions without needing to phish again. Combined with inbox rules that hide notifications, this strategy lets them operate undetected for longer periods.

    Microsoft emphasizes that these attacks don’t exploit a flaw in Workday itself. Instead, they rely on social engineering, the absence of strong phishing-resistant MFA and careful manipulation of internal systems. In essence, the threat comes from human behavior and insufficient protection, not software bugs.

    A fake email

    Hackers lure staff with convincing emails that mimic campus alerts or HR updates and steal login details in real time.  (Microsoft)

    6 ways to stay safe from payroll and phishing scams

    Protecting yourself from payroll and phishing scams isn’t complicated. By taking a few careful steps, you can make it much harder for attackers to gain access to your accounts or personal information.

    1) Limit what personal information is online

    The more information scammers can find about you, the easier it is to craft convincing phishing messages. Services that remove or monitor personal data online can reduce exposure, making it harder for attackers to trick you with targeted emails.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    2) Think before you click

    Scammers often send emails that look like they come from your HR department or university leadership, warning about payroll, benefits or urgent issues. Don’t click links or download attachments unless you are 100% sure they are legitimate. Even small mistakes can give attackers access to your accounts.

    The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    College Students on University Campus

    Researchers have discovered that since March 2025, a hacking group known as Storm-2657 has been running “pirate payroll” attacks, using phishing tactics to gain access to payroll accounts. (Javi Sanz/Getty Images)

    3) Verify directly with the source

    If an email mentions salary changes or requires action, call or email the HR office or the person directly using contact information you already know. Phishing emails are designed to create panic and rush decisions, so taking a moment to verify can stop attackers in their tracks.

    4) Use strong, unique passwords

    Never reuse passwords across multiple accounts. Scammers often try to use credentials stolen from other breaches. A password manager can help you generate strong passwords and store them securely, so you don’t have to remember dozens of different combinations.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Enable two-factor authentication (2FA)

    Add an extra layer of security by enabling 2FA on all accounts that support it. This means even if someone steals your password, they still can’t log in without a second verification step, such as a code sent to your phone.

    6) Regularly check financial and payroll accounts

    Even if you follow all precautions, it’s smart to monitor your accounts for any unusual activity. Catching unauthorized transactions quickly can prevent bigger losses and alert you to potential scams before they escalate.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Hackers will reroute payments after gaining access to users' login information.

    Hackers will reroute payments after gaining access to users’ login information. (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaway

    The Storm-2657 attacks show that cybercriminals are targeting trust, not software. Universities are appealing because payroll systems handle money directly, and staff can be manipulated through well-crafted phishing. The scale and sophistication of these attacks highlight how vulnerable even well-established institutions can be to financially motivated threat actors.

    How often do you check your payroll or bank accounts for unusual activity? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.   

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Cybersecurity Awareness Month highlights new threats | Long Island Business News

    [ad_1]

    In Brief:
    • losses surged to $16 billion in 2024, a one-third jump from the previous year, according to the FBI.
    • AI-driven phishing, deepfakes, and voice cloning are fueling new waves of cyberattacks against businesses.
    • Experts warn supply-chain vulnerabilities and the rise of pose long-term cybersecurity challenges.
    • Organizations are urged to adopt stronger governance, MFA, vendor oversight, and event logging for proactive defense.

    October is . Established in 2004 by the U.S. Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA), Cybersecurity Awareness Month aims to educate the public and businesses about cyber threats and equip them with the knowledge and tools needed to stay secure.

    The 21st Annual Cybersecurity Awareness Month comes at a particularly crucial time. First and foremost, cybercrime is on the rise. In fact, the Federal Bureau of Investigation (FBI) reported that cybercrime costs rose to $16 billion in 2024—a one-third increase from 2023.

    Furthermore, the Cybersecurity and Infrastructure Security Agency recently furloughed the majority of its already-downsized staff at the start of the ongoing government shutdown. Many fear this will leave Americans more vulnerable to escalating cyber threats. Additionally, the 2015 Cybersecurity Information Sharing Act expired at the start of the month, raising concerns about diminished collaboration between the public and private sectors.

    As a result, the need for organizations to remain vigilant and informed about cybersecurity risks is greater than ever. Among the top threats businesses should be aware of are:

     

    AI-driven attacks

    While artificial intelligence (AI) has improved efficiency and productivity for many, it has also introduced new risks related to privacy and information security. However, businesses aren’t the only ones using AI. Cybercriminals are, too.

    According to a 2025 KnowBe4 report, more than 80% of phishing emails analyzed showed evidence of AI usage. AI is also behind increasingly convincing deepfakes, which led to one company losing $25 million after an employee was tricked into sending funds to fraudsters posing as the CFO. Similarly, AI-powered voice cloning is on the rise, forcing 91% of surveyed banks to reconsider their voice authentication systems.

     

    These attacks exploit vulnerabilities in third-party vendors to gain access to sensitive customer data. Research from the Ponemon Institute and Mastercard’s RiskRecon found that more than half of breaches in the past 12 months were caused by third-party vendors.

    Alarmingly, the research also stated that only 34% of organizations are confident their suppliers would notify them of a breach of their sensitive information. Yet, less than half of the organizations regularly review the security and privacy controls of their suppliers.

     

    Quantum computing

    Quantum computing leverages quantum mechanics to solve complex problems far beyond the capabilities of traditional computers. The concern is that adversaries may steal encrypted data today with the intent to decrypt it later using advanced quantum technologies.

    The National Institute of Standards and Technology (NIST) has already released encryption algorithms resistant to quantum attacks, however, transitioning to post-quantum cryptography could take years and prove especially challenging for smaller institutions.

    In light of these and other emerging threats, businesses should adopt the following cybersecurity best practices:

     

    Governance and board oversight

    Escalating cyber threats demand informed and active involvement at the board level. Boards and executives should take an active role in cybersecurity oversight by requiring regular updates, ensuring incident response plans exist and treating cybersecurity as a core business risk rather than just a technical issue.

     

    Most regulations require the use of multi-factor authentication for any user accessing an information system. However, not all types of MFA are created equal. Organizations should implement strong, phishing-resistant MFA (such as FIDO/WebAuthn or Public Key Infrastructure) for all users accessing sensitive information and phase out weaker methods like SMS or voice codes.

     

    End of operating life

    Unsupported and legacy systems continue to pose significant risk, especially for smaller organizations. Companies should maintain an inventory of systems, track vendor support timelines and proactively plan upgrades or replacements before software and hardware reach EOL to avoid exploitable vulnerabilities.

     

    Vendor management

    As aforementioned, third-party vendors pose a significant threat. As a result, organizations should maintain a documented program and regularly conduct due diligence audits.

     

    Event logging and threat detection

    Organizations should deploy comprehensive cybersecurity event logging solutions. This can help provide visibility into system performance and security, detect incidents and support response efforts, and enable forensic investigations and threat attributions.

    As cyber threats grow in scale and sophistication, Cybersecurity Awareness Month serves as a timely reminder that proactive defense is no longer optional—it’s essential. With rising risks from AI-driven attacks, supply-chain vulnerabilities and the looming impact of quantum computing, organizations must prioritize cybersecurity as a strategic imperative. By embracing strong governance, modern authentication, lifecycle management, vendor oversight, and robust event logging, businesses can better-safeguard their systems, data and stakeholders.

    Charlie Wood is a partner and practice lead with the Information Risk Management Division of The Bonadio Group.


    [ad_2]

    LIBN Staff

    Source link

  • Hackers steal medical records and financial data from 1.2M patients in massive healthcare breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    More than 1 million patients have been affected by a data breach involving SimonMed Imaging, one of the country’s largest outpatient radiology and medical imaging providers. The breach came to light after a cyberattack compromised sensitive patient data, with reports indicating that ransomware operators may have been behind the incident. What makes this case particularly concerning is the scale of the attack and the type of information stolen, which could easily be misused for financial or identity fraud.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    What happened at SimonMed Imaging

    In January 2025, SimonMed Imaging was alerted by one of its vendors about a potential security incident. The following day, the company noticed suspicious activity on its own network. The company says in response, it reset passwords, enforced two-factor authentication and tightened endpoint security while cutting off third-party vendor access.

    Unfortunately, the attackers had already gained access. Between Jan. 21 and Feb. 5, 2025, cybercriminals exfiltrated sensitive data belonging to around 1.2 million individuals. The Medusa ransomware group later claimed responsibility, alleging they had stolen more than 200 GB of data, including patient IDs, financial records and medical scans.

    DISCORD CONFIRMS VENDOR BREACH EXPOSED USER IDS IN RANSOM PLOT

    SimonMed Imaging discovered suspicious network activity in January 2025, prompting an immediate security response and system lockdown. (Kurt “CyberGuy” Knutsson)

    The attackers reportedly demanded 1 million dollars to delete the stolen files, or 10,000 dollars per day to delay publishing. SimonMed was later removed from the Medusa leak site, which could suggest a ransom payment, although the company has not confirmed this. In the aftermath, SimonMed brought in cybersecurity experts to investigate and has offered complimentary credit monitoring services to affected individuals.

    COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE

    Close-up of a person typing on a black Acer laptop keyboard

    Hackers linked to the Medusa ransomware group stole data from 1.2 million patients, including IDs, financial details and medical scans. (Kurt “CyberGuy” Knutsson)

    What data got exposed in the SimonMed breach

    While SimonMed’s official filing described the exposed data as names and other data elements, the ransomware group’s claims suggest a much broader leak. According to the attackers, the stolen dataset included identity documents, payment details, medical reports, account balances and raw imaging scans (via BleepingComputer).

    Such information is extremely valuable on dark web marketplaces. Identity details and medical records are often sold in bulk to fraud operators who use them to commit financial scams, insurance fraud, or obtain prescription drugs. Medical breaches are harder to recover from because you cannot reset or replace a medical history or a government ID scan the same way you can change a password.

    We reached out to SimonMed for comment, but did not hear back before our deadline.

    DELIVERY GIANT’S DATA BREACH EXPOSES 40,000 PERSONAL RECORDS

    Hands typing on a laptop with green code on screen

    After the breach, SimonMed hired cybersecurity experts, tightened defenses and offered free credit monitoring to affected individuals.  (Kurt “CyberGuy” Knutsson)

    7 steps you can take to stay protected

    Even though the company is offering free credit monitoring, leaked data often circulates long after an incident is closed publicly. That is why it is important to take additional precautions on your end to reduce the long-term impact of this breach and future-proof your personal security.

    1) Use a data removal service

    People-search sites collect personal records and make them publicly accessible. Data removal services handle outreach and removals on your behalf, which reduces your exposed footprint online. With less information easily available, it becomes harder for attackers to assemble a complete identity profile for scams.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    NEARLY A MILLION PATIENTS HIT BY DAVITA DIALYSIS RANSOMWARE ATTACK

    2) Change your passwords and use a password manager

    If you have ever interacted with SimonMed or any related platform, change your passwords immediately. Avoid reusing old passwords across different accounts. A password manager helps generate strong credentials and stores them securely so you do not have to remember them manually. This reduces the risk of one breach affecting multiple accounts.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Turn on two-factor authentication everywhere

    Enabling 2FA adds an important layer of verification to your accounts. Even if someone gets hold of your password, they will not be able to log in without the code delivered to your phone or app. It is one of the simplest and most effective security upgrades you can make.

    4) Install a strong antivirus

    Modern malware includes remote access tools and silent monitoring modules that can stay hidden before launching an attack. Strong antivirus software can detect unusual behavior, protect against ransomware and alert you in real time if something attempts to access your data without permission. This is no longer just about traditional virus protection but active threat monitoring.

    The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Monitor your financial and medical statements

    Regularly review your bank statements, insurance records and medical billing activity. Cybercriminals often test stolen information with small, easily overlooked transactions before moving to larger fraud attempts. Catching and reporting these early can prevent a much bigger loss.

    6) Consider an identity theft protection plan

    Because breaches involving medical providers often expose sensitive identifiers, an identity protection service can be useful. These services scan dark web listings, alert you when your information appears in leaked databases and assist with recovery if fraud occurs. Some plans include legal support and help with credit restoration.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    7) Stay informed and cautious

    After a major breach, attackers often launch phishing campaigns that reference the affected company to appear legitimate. Be skeptical of emails or texts mentioning SimonMed or credit monitoring, especially if they request payment or personal verification. Staying aware of current scams and keeping your software updated adds a strong layer of defense.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    The SimonMed Imaging breach is another reminder that cyberattacks on healthcare providers are becoming more frequent and far more invasive. Once data is taken, it can circulate indefinitely across criminal networks. Taking protective steps early, including monitoring your identity and reducing your exposed data online, can help you stay ahead of potential misuse.

    Do you think healthcare providers are doing enough to protect your personal and medical data? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • From friendly text to financial trap: the new scam trend

    [ad_1]

    NEWYou can now listen to Fox News articles!

    It starts with something small, a text that feels oddly familiar. Maybe it says, “Hey, how are you?” or “Are you coming to the BBQ?” Before you know it, you’re in a friendly back-and-forth with someone who seems genuine. But soon, that casual conversation takes a sharp turn toward money.

    That’s exactly what happened to John from Alabama.

    “I received a text from someone in California inviting me to a BBQ. We’ve been texting, and now she wants me to trade gold through WEEX. Is this safe or a scam? I’m 74, she’s 36.” – John, Huntsville, Alabama

    John’s story may sound like a one-off, but it’s part of a growing trend where scammers use personal charm to build trust and then push victims into risky online “investments.”

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter

    It only takes one text message to blur the line between connection and con. (Kurt “CyberGuy” Knutsson)

    What is WEEX?

    WEEX is a cryptocurrency exchange that allows users to trade digital assets, including gold-backed tokens like Tether Gold (XAUT). These aren’t physical gold bars or coins; they’re digital tokens tied to the price of gold and stored on blockchain networks. While WEEX operates as a legitimate platform, scammers often exploit the name of real exchanges to sound credible. They’ll encourage victims to “trade gold” through what seems like an official account but actually directs them to fake sites or wallets designed to steal money.

    Why this could be a scam

    John’s experience shows several red flags. The conversation began with a friendly invitation, then quickly shifted to a financial pitch. That’s a classic move in online relationship scams. The younger person builds an emotional connection, then uses that trust to promote an “opportunity.” Scammers often promise guaranteed profits or claim they’ll “help you trade” to make the process sound easy.

    But the truth is, once you send money or crypto, it’s nearly impossible to get it back. Even if WEEX itself is legitimate, the person encouraging you to use it may not be.

    Many scammers use stolen photos, AI-generated profiles or fake identities to build credibility. Once they convince you to send funds, they vanish, often taking your money and personal information with them.

    A scam message is seen on a smartphone.

    Scammers use friendly conversations to build trust before asking for money. Stay alert. (Kurt “CyberGuy” Knutsson)

    How to tell if you’re being targeted

    You can spot trouble early by asking simple questions. If someone can’t explain how the investment works or avoid details about how to withdraw your money, that’s a warning sign. Be cautious if they promise fast profits or “zero-risk” returns.

    Real investments always involve risk. Watch out for anyone who pressures you to act quickly or says the deal is “private.” Those urgency tactics are designed to keep you from thinking clearly.

    Also, look up the company behind the platform. If it’s based overseas, lacks clear business registration or hides its address, your funds may have no legal protection.

    WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL

    A scam message is seen on a smartphone.

    Scams often start with small talk, and even a simple “How about golf tomorrow?” can be a trap. (Kurt “CyberGuy” Knutsson)

    What you should do now

    If you’ve received a text like John’s, pause before replying or transferring anything. These scams move fast, but you can stop them in their tracks by following a few smart steps.

    1) Don’t send money or crypto

    Never send money, crypto or gift cards to anyone you’ve only met by text. Ask for written proof explaining how the investment works and how withdrawals happen. If the person avoids details or insists you “act now,” that’s a serious warning sign.

    2) Ask direct questions

    Scammers thrive on vague promises. Ask specific questions about how profits are made, how you’ll access your funds and who regulates the platform. If the answers are unclear or the topic changes, walk away immediately.

    3) Research WEEX reviews and complaints

    Before you invest a cent, search online for phrases like “WEEX scam” or “WEEX complaints.” See what other users have experienced and whether any regulatory agencies have flagged the platform. Real investors leave detailed feedback; scammers usually don’t.

    4) Use a data removal service

    Protect your privacy beyond just this scam. Data removal services can erase your personal details from data broker sites that sell your info to marketers and sometimes scammers. The fewer places your data lives online, the harder it is for fraudsters to find and target you again.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    5) Use strong antivirus protection

    Scammers sometimes send fake links or attachments that can infect your phone or computer. Install and regularly run a strong antivirus software. These tools can block dangerous websites, alert you to phishing attempts and keep your personal data secure.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com

    6) Talk to someone you trust

    Before investing in anything, share the details with a trusted friend, family member or financial advisor. A second opinion can help you spot inconsistencies or risks you might overlook in the moment. When in doubt, slow down and ask for help.

    A scam message is seen on a smartphone.

    A friendly “wrong number” text can be the start of a scam. Always think twice before replying. (Kurt “CyberGuy” Knutsson)

    How to report a scam

    If you believe you’ve been targeted by a WEEX gold scam or any similar text-based investment scheme, take action right away. Start by reporting the scam to the Federal Trade Commission (FTC) at reportfraud.ftc.gov. This helps investigators track new fraud patterns and warn others.

    Next, file a complaint with your state attorney general’s office and, if crypto is involved, submit a report through the U.S. Securities and Exchange Commission (SEC) or the Commodity Futures Trading Commission (CFTC). 

    If you sent money through a bank or payment app, contact your financial institution immediately to try to stop or reverse the transfer. 

    By reporting what happened, you not only protect yourself but also help stop scammers from reaching other potential victims.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    These scams prey on emotion. A kind message or casual chat can quickly turn into manipulation. Scammers use friendliness, flattery and false urgency to pull you in, then drain your accounts. Older adults are particularly vulnerable, especially when the scam feels personal. By blending romance with financial advice, these criminals make their victims believe they’re building both trust and wealth. Protect yourself by treating every unexpected text with caution. If the conversation moves toward money, crypto, or gold trading, that’s your cue to stop responding. Keep your devices secure and your private data off public sites where scammers look for new targets.

    Have you ever received a text that seemed friendly at first but felt “off” as the chat went on? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link