ReportWire

Tag: Cybercrime

  • How scammers target you even without social media

    NEWYou can now listen to Fox News articles!

    “I don’t use Facebook. I don’t even have an email. How could scammers possibly know anything about me?”

    That’s the question I hear from people over 60 all the time. If you assume that by staying off social media and avoiding the internet, you’re invisible to fraudsters, think again.

    The truth is, even if you’ve never posted a single thing online, scammers can still know your age, home address, relatives’ names, property value, and even when you’ve suffered the loss of a loved one. How? Because the everyday details of your offline life are quietly being collected, digitized, and sold.

    And scammers are taking full advantage.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Scammers can still know a lot about you, even if you have never posted anything online. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)

    How scammers target seniors without social media

    Here’s the uncomfortable reality: you don’t have to “put yourself out there” for your information to appear online. Much of it becomes public record automatically, thanks to the way our legal and government systems work.

    Some of the biggest sources include:

    • Obituaries: When a loved one passes away, obituaries often list family members, ages, locations, and relationships. To scammers, it’s a family tree of potential targets.
    • Real estate records: Property purchases, sales, and even mortgage details are public. This can tell scammers whether you own your home outright, what it’s worth, and if you might be cash-rich.
    • Probate filings: When estates go through probate, details about beneficiaries and assets are recorded. Scammers can identify heirs and target them with fraudulent “inheritance assistance.”
    • Property tax documents: These are often searchable by anyone. They reveal not only your address but also your financial standing.
    • Court filings: Divorce, bankruptcy, and civil disputes often contain personal details, which are public by law.

    On their own, these may not seem dangerous. But combined, they create a shockingly detailed portrait of your life.

    THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY

    A man leaning on a fence using a tablet

    Public records can provide a portrait of your life. (Barbara Eddowes via Getty Images)

    Bereavement scams and emotional tricks scammers use

    One of the cruelest scams I’ve seen lately is what I call the bereavement scam.

    Here’s how it works:

    A scammer scrapes local obituaries to see who’s recently lost a spouse or child. They then reach out, by phone, email, or even mail, pretending to be a funeral home, a grief counselor, or a charity. Because they reference real names, dates, and relationships, their outreach sounds painfully authentic.

    • Example: “We saw you lost your husband on March 3rd. We’d like to offer you a free grief support service…”
    • Or: “Your loved one’s final medical expenses may qualify for reimbursement. We just need your banking details to confirm.”

    When you’re in mourning, your guard is down. Scammers know this, and they exploit grief to steal money and identities.

    Other emotionally charged scams follow the same playbook

    • Fake Medicare calls referencing your age and location.
    • Phony financial advisors offering to “help” with retirement rollovers.
    • Romance scams targeting widows and widowers who live alone.
    • Fake agent scams trick victims into paying thousands of dollars through phone threats

    The unifying factor is that these criminals don’t need Facebook to learn about you. They already have a dossier built from public and brokered data.

    What’s even worse is that scammers can target your loved ones even years after your passing. They can call or text your close relatives claiming to offer free memorial services, annuities, or other common strategies when people are most vulnerable. Your exposed personal data fuels such morbid scams.

    9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUT

    A man typing on a laptop

    A man typing on his laptop (Kurt “Cyberguy” Knutsson)

    The shocking sources of your personal data

    Here’s the part most people don’t realize: scammers rarely dig through dusty courthouse files themselves. They don’t have to. That work has already been done by data brokers. Data brokers are companies whose entire business model is gathering and selling personal information. They collect from:

    • Public records (like those obituaries and real estate filings)
    • Consumer databases (credit headers, magazine subscriptions, surveys)
    • “People search” websites (Spokeo, Whitepages, BeenVerified, and dozens more).

    The result is a searchable profile that might include:

    • Full name and aliases
    • Current and past addresses
    • Phone numbers and email addresses
    • Relatives and their contact info
    • Age, income range, home value
    • Legal or financial history

    Once a broker has your data, they sell it. And once it’s sold, it spreads. Even if you’ve never had a social media account, companies may build a ‘shadow profile’ of you from leaked data, online purchases, or details shared by others, leaving it ready to be abused.

    How to protect yourself from scammers and data brokers

    The good news is, you’re not powerless. While you can’t stop public records from existing, you can make it much harder for scammers to access and weaponize your data. Here’s how:

    1) Reduce your digital footprint

    • Request removal from people search sites and data brokers.
    • This prevents your profile from being sold to scammers.
    • Doing this manually can take hours and has to be repeated, but it works.

    2) Stay alert for emotional manipulation

    • If someone contacts you after a loss, assume caution.
    • Verify charities and funeral services before engaging.
    • Never share banking or personal details over the phone or email.

    3) Automate data removal

    • Instead of manually contacting hundreds of data brokers, you can use a service like Incogni.
    • It sends and tracks removal requests across 420+ brokers, and keeps repeating the process so your data doesn’t resurface.
    • With their Unlimited plan, you can request data removal from any other shady website and disappear from the internet.
    • For seniors, this is often the safest and most practical solution.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Not being on Facebook doesn’t mean you’re invisible. Scammers don’t need you to share your life online. Your offline life is already online without your consent. The obituary in the local paper, the deed to your home, the probate record of your loved one’s estate, these are all turned into data points, sold to brokers, and resold to whoever wants them. That’s why protecting your personal data isn’t about avoiding the internet. It’s about reducing what’s already out there. The less data scammers can find, the harder it is for them to fool you with realistic, emotionally charged attacks. And that’s a big step toward keeping your money, your identity, and your retirement safe.

    Do you believe it’s time for the government and companies to step in and protect your data privacy?  Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Cyberattack shuts down Nevada state offices and websites, governor’s office says

    LAS VEGAS — A cyberattack caused Nevada’s state offices to close for two days this week and rendered some state websites and phone lines unavailable, the governor’s office said Tuesday.

    Agencies will announce when their counters will reopen for in-person services, according to the technology office of Gov. Joe Lombardo, whose website was among those disabled.

    The state identified the attack Sunday and said authorities are investigating. Officials were unable to release technical details to protect internal systems during the investigation, the memo said.

    There is no evidence that personal information was compromised, it added. Emergency services remained available.

    State employees were put on administrative leave Monday. Many returned to work Tuesday, and workers will continue to come back to the office as their computer systems are brought online.

    Previous cyberattacks have crippled public services elsewhere in the U.S.

    In 2020, for example, an attack on Oregon’s Tillamook County took down its computer systems and website.

    And in 2018 a ransomware attack shut down automated 911 dispatching in Baltimore for roughly 17 hours.

    Source link

  • Over 2B users face phishing risks after Google data leak

    NEWYou can now listen to Fox News articles!

    A tech leader like Google often seems invincible when it comes to cybersecurity attacks, but that is not the case. Earlier this month, the search giant confirmed that attackers had accessed one of its corporate Salesforce instances. According to a Google spokesperson, this system stored basic, and largely publicly available business information, such as contact details and notes from small and medium-sized companies. It did not store customer data from Google Cloud or consumer products like Gmail, Drive or Calendar.

    Google says it terminated the malicious activity, completed an impact analysis, and provided mitigations. Therefore, no further action is required by users.

    NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUD

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

    Cybercriminals are exploiting Google’s recent Salesforce data breach to launch vishing calls and phishing attacks against Gmail users worldwide. (Kurt “CyberGuy” Knutsson)

    Vishing calls target Gmail users

    Hackers have reportedly accessed Google’s Salesforce database systems, exposing customer and company names. Google confirmed the incident and clarified that the information was mostly public business contact data and did not include passwords or payment information. The company stressed that the breach affected only a corporate Salesforce system, not consumer Gmail or Google Cloud accounts.

    Still, attackers are exploiting the news of the breach to fuel phishing and vishing scams, tricking people into giving up sensitive information. According to PC World, some users have already reported an increase in phishing attempts that reference Google services.

    STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE

    One of the main tactics involves scam phone calls, also known as vishing. A Reddit post highlighted a wave of calls coming from the 650 area code, which is linked to Google’s headquarters. In these calls, scammers pose as Google employees and warn victims of a supposed security breach. They then instruct users to reset their Gmail password and share it with them. This locks the rightful owner out of the account and gives the attacker complete control.

    Gmail loading screen.

    A user launches Gmail. (Kurt “CyberGuy” Knutsson)

    Old infrastructure exploited with “dangling buckets”

    Separately from the Salesforce incident, Google Cloud customers are also facing another type of attack. Hackers are trying to exploit outdated access addresses using a method called the dangling bucket. This can allow them to inject malware or steal data. Both businesses and individuals are vulnerable to losing control over sensitive information if targeted in this way.

    Gmail and Google Cloud serve nearly 2.5 billion people, which makes the scale of the risk significant. Although the initial breach did not expose passwords, attackers are using the news of the incident to trick people into revealing their login details.

    Google homepage

    A Google search window is on a laptop. (Kurt “CyberGuy” Knutsson)

    6 ways you can stay safe from scammers targeting Google accounts

    Google accounts are often a prime target for scammers. The good news is that protecting yourself doesn’t require advanced technical skills. A few practical steps can drastically reduce your chances of becoming a victim.

    1) Avoid clicking on phishing links

    Phishing remains the most common way scammers steal Google account credentials. A fake email or text may claim your account has been locked or that you need to verify suspicious activity. Clicking the link usually takes you to a counterfeit login page that looks almost identical to the real Google sign-in screen.

    To avoid falling for these tricks, check the sender’s email address carefully, hover over links before clicking, and avoid entering your Google password on any page that doesn’t start with accounts.google.com.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    2) Save passwords securely

    Reusing weak passwords across multiple sites is an open invitation for scammers. If one site is breached, your Google account becomes vulnerable. A strong, unique password is your first line of defense.

    The easiest way to manage this is with a password manager. It can generate complex passwords, store them securely, and fill them in automatically when you need them. This way, you never have to remember dozens of different logins, and attackers can’t guess their way in.

    Next, see if your email has been exposed in past breaches. Our #1 password manager pick (see Cyberguy.com/Passwords) includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    WHAT TO DO IF YOU GET A PASSWORD RESET EMAIL YOU DIDN’T ASK FOR

    3) Delete personal data that puts you at risk

    Scammers often use information they find online to craft convincing attacks. If your email address, phone number, or even past passwords are floating around on data broker sites, criminals have more tools to impersonate you or trick you into revealing more.

    Using a data removal service helps clean up your digital footprint. By reducing the amount of exposed information about you, it becomes much harder for scammers to target you directly.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Turn on two-factor authentication

    Even the strongest password can be stolen, but two-factor authentication (2FA) adds an extra barrier. When enabled, Google will ask for a one-time code or prompt on your phone before granting access. That means even if a scammer manages to get your password, they can’t log in without also having your device.

    Google offers several 2FA methods, from SMS codes to app-based prompts and even hardware security keys. For the best protection, choose app-based or hardware verification rather than text messages.

    5) Keep your devices updated

    Many scams rely on exploiting outdated software. If your phone, browser, or operating system isn’t up to date, attackers may use known vulnerabilities to install malware or hijack your session.

    Set your devices to update automatically whenever possible. This ensures you’re always running the latest security patches, reducing the number of openings a scammer can use.

    6) Regularly check Google account security settings

    Google provides built-in tools to help users spot suspicious activity. By visiting your Google Account’s security page, you can see devices that have signed in, recent account activity, and whether recovery options like your phone number and backup email are up to date.

    Running a Google Security Checkup only takes a few minutes and gives you a clear overview of any weaknesses. Think of it as a health check for your digital life.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    The incident is a reminder that even tech giants with vast resources are not immune to security lapses. While Google insists that no passwords were exposed, the wave of phishing and vishing scams shows how quickly criminals can weaponize even partial leaks. What began as a breach of business data has spiraled into a threat facing millions of everyday users, raising questions about how secure Google’s ecosystem really is.

    Do you believe regulators should step in with stricter rules for how cloud providers handle security lapses? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    Source link

  • FBI warns seniors about billion-dollar scam draining retirement funds, expert says AI driving it

    NEWYou can now listen to Fox News articles!

    A cybersecurity expert warns that a scam that has been used to drain entire life savings or retirement accounts has become “devastating” for seniors.

    FBI Los Angeles on July 15 posted a reminder on X about the Phantom Hacker Scam, which has cost Americans over $1 billion since at least 2024, according to the agency. The FBI said the scam targets senior citizens and warns that victims could lose their “life savings.”

    The scam operates in three phases: a “tech support impostor,” “financial institution impostor” and a “US government impostor.”

    In the first phase, a tech support impostor will contact victims through text, phone call or email, then direct them to download a program allowing the scammer remote access to their computer. Then, the scammer asks victims to open their financial accounts to “determine whether there have been any unauthorized charges,” which the FBI says “is most lucrative for targeting.” Afterwards, the scammer will choose an account to target, then tell the victim they will get a call for further instructions from the “fraud department” of the bank hosting their account.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    The FBI is warning Americans about a scam targeting seniors. (Getty Images)

    In the second phase, the financial institution impostor will then call the victim and inform them that their funds have been “accessed by a foreign hacker” and must be moved to a “safe” third party account. Victims are then instructed to send the money via wire transfer, cash or cryptocurrency, and are told to send “multiple transactions over a span of days or months.”

    In the third phase of the scam, the victim could be contacted by someone posing as a U.S. government employee, who prompts the individual to move their funds to an “alias” account for protection.

    SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES

    Grandpa on swing with kids

    Pete Nicoletti said families should have discussions with their loved ones about the Phantom Hacker Scam. (Getty Images/Adamkaz)

    Pete Nicoletti, chief information security officer at Check Point, told Fox News Digital the scam has become “devastating” for seniors, and said families need to have discussions with their loved ones to keep them protected. Nicoletti said scammers are now getting personal with some of their tactics, targeting people with specific interests they have. 

    A senior citizen uses a smartphone

    Families should discuss ways for seniors to protect themselves from scams, said Pete Nicoletti, chief information security officer at Check Point. (iStock)

    “The family should have dinner-time discussions about this,” Nicoletti said. “But, you know, seniors are posting things on Facebook like they’re a Corvette collector. The criminals are actually using artificial intelligence to look for those type of characteristics and profiles. And they’ll send you an email or a message saying, ‘hey, that Corvette that you ordered a month ago is now available. It’s, you know, for $500, you can get it…and we’ll deliver it to you right away. And of course, the senior goes, ‘well, I’m a Corvette collector. Maybe I was forgetful and I didn’t know that I ordered that Corvette, or, you know.”

    CLICK HERE TO GET THE FOX NEWS APP

    Close up of hands holding cash

    Over $1 billion has been taken from seniors as a result of the Phantom Hacker Scam. (iStock)

    Nicoletti said that victims rarely get their money back, even after reporting it stolen to authorities.

    “It’s devastating,” he said. “If [victims report their funds stolen] the same day, there’s a chance. I think it’s in the single digit percentages. It’s, you know, 10, 15%. I’ve heard, I have heard of people getting their money back. If it delayed beyond that, it’s not good. It’s gone.”

    Source link

  • Interpol cybercrime crackdown in Africa leads to the arrest of over 1,200 suspects

    DAKAR, Senegal — A major cybercrime crackdown coordinated by Interpol has led to the arrest of 1,209 suspects across Africa and the recovery of nearly $97.4 million, the organization announced Friday.

    Dubbed Operation Serengeti 2.0, the operation took place between June and August. It brought together investigators from 18 African countries and the United Kingdom to fight harmful cybercrimes including inheritance scams, ransomware and business email compromise.

    Altogether, the scams targeted nearly 88,000 victims, the international police organization said in a statement.

    Interpol said that authorities in Angola dismantled 25 cryptocurrency mining centers where 60 Chinese nationals had been mining cryptocurrency. The operation resulted in the confiscation of equipment worth over $37 million; the government now plans to use the equipment to support power distribution in vulnerable areas.

    In Zambia, the operation dismantled an online investment scheme that defrauded more than 65,000 victims of an estimated $300 million through a fraudulent high-return cryptocurrency scam.

    “The scammers lured victims into investing in cryptocurrency through extensive advertising campaigns promising high-yield returns. Victims were then instructed to download multiple apps to participate,” Interpol said. It said that 15 people had been arrested and that authorities seized evidence including domains, mobile numbers and bank accounts.

    In locating the scam center in Zambia, authorities also disrupted a suspected human trafficking network, Interpol said.

    Interpol also said it dismantled a transnational inheritance scam in the Ivory Coast which had originated in Germany. Victims of that scam were tricked into paying fees to claim fake inheritances, causing $1.6 million in losses.

    “Despite being one of the oldest-running internet frauds, inheritance scams continue to generate significant funds for criminal organizations,” it said.

    Interpol, which has 196 member countries and celebrated its centennial last year, is the world’s largest international police network to combat international crime. Headquartered in Lyons, France, it works to help national police forces communicate with each other and track suspects and criminals in areas like counterterrorism, financial crime, child pornography, cybercrime and organized crime.

    In recent years it has grappled with new challenges including a growing caseload of cybercrime and child sex abuse, and increasing divisions among its member countries.

    Last year in the first Operation Serengeti, Interpol arrested over 1,000 people in operations that had targeted 35,000 victims.

    Source link

  • The truth behind those mysterious shipment emails in your inbox

    NEWYou can now listen to Fox News articles!

    Over the past year, more people have reported receiving order shipment emails for purchases they never made. These messages usually come from legitimate retailers, often sportswear brands or electronics stores, and contain real tracking numbers and delivery details. The products are being shipped to different names at different addresses, but for some reason, the buyer’s contact email is yours.

    It might seem like a harmless clerical error or someone accidentally typing the wrong email address. But when it happens repeatedly, and across multiple unrelated orders, it starts to look less like a coincidence and more like a tactic.

    Arthur from Cape Coral, Florida, recently reached out with an experience that mirrors what others have been describing:

    “My wife’s e-mail address is showing up in emails from various sports entities to notify her of shipping dates, etc. So far, three separate individuals have ordered products, shipped to a different name at a different address, but used her email as the contact. They didn’t use our credit card to place the order. What could be going on? I don’t believe it’s a coincidence.”

    HOW TO DETECT FAKE AMAZON EMAILS AND AVOID IMPERSONATION SCAMS

    Arthur is right to question what’s happening. Scammers are deliberately using real email addresses to push fraudulent purchases through retailer systems with fewer checks. They rely on your email to carry out the scam, even if they have not stolen your payment details.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    Some scammers use valid, active email addresses to bypass retailer fraud filters. (Kurt “CyberGuy” Knutsson)

    What’s likely happening with those shipment emails in your inbox

    It is unlikely that someone is accidentally typing your email address every single time. Rather, scammers are deliberately using valid, active email addresses like yours to bypass retailer fraud filters. Numerous sources confirm that fake order and shipping confirmation emails are a common tactic in fraud operations, with criminals exploiting the trust systems placed in legitimate email addresses.

    When a stolen credit card is used, pairing it with a real email that has not triggered spam alerts increases the chance the transaction will go unnoticed by anti-fraud systems. Retailers often check whether an email address is active or bounces. If the system sees a functioning address, it may be less suspicious than an obviously fake one.

    Once the order is placed, products are frequently sent to drop addresses or freight-forwarding services, as confirmed by official investigations into brushing scams. These services act as intermediaries, making the scam harder to trace. In that context, your email is simply a means to an end, a validated contact point that helps the operation move forward smoothly.

    A laptop with the Google search screen on it

    Scammers can obtain email addresses when reputable companies experience data breaches. (Kurt “CyberGuy” Knutsson)

    How bad actors are able to get your email

    Your email address may have ended up in the hands of scammers through several common methods. The most likely cause is a data breach. Many well-known companies have experienced leaks in which customer emails and other information were exposed. 

    Once your email is part of a leaked database, it often circulates on the dark web or in underground forums, where it is freely traded and reused. Even if you were not part of a breach, scammers often use a technique called credential stuffing. This involves testing stolen login details across different websites to confirm which email addresses are active.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Remove yourself from the web

    The best thing you can do to prevent this from happening is to invest in a data removal service. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. 

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    A person types on their laptop.

    If you are receiving order confirmations for things you never bought, your email address could be a tool used by scammers in a larger fraud operation. (Kurt “CyberGuy” Knutsson)

    7 ways to secure your email from scammers

    These simple but powerful steps can help you protect your inbox, safeguard your identity and stay one step ahead of scammers misusing your email.

    1. Protect and monitor your email

    Start by locking down your email account with a strong, unique password that you don’t reuse anywhere else. Enable two-factor authentication (2FA) so hackers can’t get in even if they’ve stolen your password. A password manager makes this much easier by generating and securely storing complex passwords, helping you avoid the risks of reuse. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    2. Watch for suspicious messages

    Scan your inbox regularly for order confirmations, shipping notices or account sign-ups you don’t recognize. If something looks off, report it directly to the retailer or platform; it could be part of a larger scam using your email address. Never click on suspicious links, even if the message looks legitimate, and protect your devices with strong antivirus software to catch threats before they spread.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com/LockUpYourTech 

    3. Be picky about where you share your email

    Avoid entering your email on shady giveaway sites or sketchy online forms. When in doubt, skip the sign-up or use a throwaway email. The fewer places your email lives, the harder it is for scammers to get hold of it.

    4. Create a second email address for shopping

    Set up a dedicated email for online purchases, newsletters and subscriptions. This helps keep your main inbox clean and makes it easier to spot strange activity. Sometimes, it’s best to create various email aliases so that you don’t have to worry about all your info getting taken in a data breach.  An email alias address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com/Mail

    HOW TO TELL IF A LOGIN ALERT IS REAL OR A SCAM

    5. Monitor your credit and identity regularly

    Even if no purchases appear under your name, scams involving your email can be a red flag for future identity misuse. Set up alerts with your bank and consider a credit monitoring service to catch unauthorized activity early.

    See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft

    6. Review connected accounts and revoke access

    In your email settings (e.g., Gmail, Outlook), check for any connected apps, services or delegated access you don’t recognize and remove them. This ensures no third party is piggybacking off your account.

    7. File an identity theft report if the problem escalates

    If this email misuse leads to fraudulent financial activity, users should file a report with the FTC at IdentityTheft.gov or their local authorities. 

    Kurt’s key takeaway

    If you are receiving order confirmations for things you never bought, do not shrug it off. Your email is likely being misused as part of a larger fraud operation, not by accident but intentionally. Scammers are taking advantage of active, trustworthy email addresses to slip past retailer defenses and carry out unauthorized purchases. The repeated use of your email shows that fraud networks are already circulating it, even if your financial information remains untouched.

    Are you comfortable with how much of your personal information is floating around online? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    Source link

  • Remove your data to protect your retirement from scammers

    NEWYou can now listen to Fox News articles!

    You’ve spent decades building your retirement fund. Now is the time to enjoy it, not lie awake worrying about scammers and identity thieves. Criminals are more aggressive than ever, and they know your personal information is the key to your money.

    The good news? You can take simple steps to remove your personal data from risky websites and databases. These actions greatly reduce the chance of fraud and protect your hard-earned savings from scammers. By taking control of your information now, you keep your money secure and your retirement in your hands.

    THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER 

    A man enjoys his retirement. (Kurt “CyberGuy” Knutsson)

    Why criminals target retirement accounts

    Retirement accounts are a goldmine for criminals. Here’s why:

    • They’re large. A lifetime of savings can add up to six or seven figures.
    • They’re less monitored. Unlike checking accounts, you may only review them a few times a year.
    • They’re easy to access remotely. Scammers don’t need your wallet — just enough personal details to pretend to be you.

    Elder fraud caused more than $4.9 billion in losses in 2024. In 72% of cases, scammers found victims’ personal data online. Most of these crimes were tied to identity theft, allowing criminals to access accounts, redirect benefits, or launch phishing attacks.

    A woman enjoying her retirement

    A woman enjoys her retirement. (Kurt “CyberGuy” Knutsson)

    You have an online profile even without social media

    You don’t have to be on Facebook to have your information online. Data brokers, companies you may have never heard of, collect and sell personal details about nearly every adult in the U.S. These profiles may include:

    • Age and date of birth
    • Home address and property value
    • Marital status and family details
    • Income range and investments
    • Retirement status

    For scammers, this information is like a treasure map.

    HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUD

    How criminals abuse your data

    When scammers know your age, address, and that you’re retired, they can craft scams that feel frighteningly real. Some examples are:

    • Fake financial advisor calls: Claiming to represent your bank or retirement plan provider, they already know your full name, your investment type, and even the city you live in.
    • “Pre-approved” retirement loan or annuity offers: Complete with official-sounding terms and personal details to make them seem legitimate.
    • Social engineering scams: Using information about your family or recent life events (like selling a home) to build trust before asking for account details.

    The more accurate the personal data they have, the more convincing their story, and the higher the risk you’ll believe them.

    A woman scrolling on social media on her phone

    A woman scrolls on her phone. (Kurt “CyberGuy” Knutsson)

    Reduce the target on your back

    Every piece of personal information you remove from public databases is one less tool scammers can use. Removing your data can:

    • Reduce the number of scam attempts
    • Limit how convincing those scams seem
    • Prevent your details from being resold repeatedly

    Think of it as changing the locks on your home before a break-in happens.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    Remove your data manually

    You can contact data brokers and request that they delete your profile. To start, search your name online, find the sites listing your data, and follow each site’s removal process. However, there’s a catch:

    • There are hundreds of these companies
    • Each has a different process, often requiring ID copies or mailed letters
    • Many will repost your data within months unless you check back regularly

    It’s a time-consuming job that most people eventually abandon.

    A woman checking her retirement accounts on her laptop

    A woman checks her retirement accounts on her laptop. (Kurt “CyberGuy” Knutsson)

    Use an automated data removal service

    A data removal tool handles the work for you. It:

    • Contacts hundreds of data brokers on your behalf
    • Tracks each request and follow-up to ensure deletion
    • Monitors continuously to keep your data off the lists

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    Kurt’s key takeaways

    You’ve worked too hard to let criminals take what you’ve built. By reducing your digital footprint, you protect both your money and your peace of mind. Start removing your personal information today, and keep your retirement exactly where it belongs, in your hands.

    If you’ve been targeted by a scam, how did you handle it, and what advice would you give others?  Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide—free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Meta AI docs exposed, allowing chatbots to flirt with kids

    NEWYou can now listen to Fox News articles!

    Tech bro Mark Zuckerberg’s company has been caught in one of the most disturbing scandals yet. Reuters uncovered an internal Meta document that allowed its AI chatbots to flirt with children and engage in sensual conversations. The revelation sparked outrage, and Meta only reversed course after getting caught.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Threads app logo on a smartphone screen with the Meta logo above it. (Kurt “CyberGuy” Knutsson)

    Meta AI policy allowed chatbots to flirt with kids

    According to internal “GenAI: Content Risk Standards,” Meta’s legal, policy, and engineering teams signed off on chatbot rules that made it acceptable for bots to describe a child as “a youthful form of art” or engage in romantic roleplay with minors. Even worse, the guidelines gave room for chatbots to demean people by race and spread false medical claims. This was not a bug. These were approved rules until Meta faced questions. Once Reuters started asking, the company quickly scrubbed the offensive sections and claimed it had been a mistake.

    META ADDS TEEN SAFETY FEATURES TO INSTAGRAM, FACEBOOK

    We reached out to Meta, and a spokesperson provided this statement to CyberGuy:

    “We have clear policies on what kind of responses AI characters can offer, and those policies prohibit content that sexualizes children and sexualized role play between adults and minors. Separate from the policies, there are hundreds of examples, notes, and annotations that reflect teams grappling with different hypothetical scenarios. The examples and notes in question were and are erroneous and inconsistent with our policies, and have been removed.”

    Illustration of a kid using Meta AI on his phone

    Meta told CyberGuy that their AI policies prohibit content that sexualizes children.  (Kurt “CyberGuy” Knutsson)

    Big Tech puts profit over kids’ safety

    Let’s call this what it is. Meta didn’t stop this on its own. It only acted when exposed. That shows Big Tech’s priorities: money, engagement, and keeping kids glued to screens. Safety? Not even on the radar until someone blows the whistle. Meta has repeatedly shown it couldn’t care less about your children’s well-being. It’s about maximizing time online, pulling in younger users, and monetizing every click. This latest scandal proves once again that parents cannot rely on tech companies to protect kids.

    Congress pushes Meta to explain disturbing AI rules

    Sen. Josh Hawley, R-Mo., and a bipartisan group in Congress are demanding that Meta come clean. Lawmakers want to know how and why these policies ever got approval. Hawley called on Meta to release all internal documents and explain why chatbots were allowed to simulate flirting with children. Meta insists it has “fixed” the problem, but critics argue these corrections only came after they were exposed. Until real regulations arrive, parents are on their own.

    Illustration of a kid using Meta AI on her phone

    A bipartisan group of lawmakers is demanding that Meta release internal documents and explain why chatbots were allowed to simulate flirting with children. (Kurt “CyberGuy” Knutsson)

    META FACES BACKLASH OVER AI POLICY THAT LETS BOTS HAVE ‘SENSUAL’ CONVERSATIONS WITH KIDS

    How parents can protect kids from risky AI chatbots

    While Congress investigates, families need to take immediate steps to protect their children from the dangers exposed in Meta’s AI scandal.

    1) No unsupervised access to AI chatbots

    Children should never have free access to AI chatbots, including Meta AI. The internal documents show these systems can cross boundaries that no parent would approve of. Supervision is the first line of defense.

    2) Turn on parental controls across all devices

    Enable parental controls on phones, tablets, and computers. These tools give you more visibility and limit access to risky apps where inappropriate chatbot conversations could happen.

    3) Talk with kids regularly about AI and online dangers

    The Meta revelations prove AI can go places parents would never expect. Ongoing conversations with your children about what is safe and what is not online are essential for their protection.

    4) Use content filtering tools to block risky apps

    Apps like Bark allow parents to block or filter certain programs where AI interactions may slip through. With tech companies failing to self-police, filtering tools give parents more control.

    Read more here: Is your child’s data up for grabs? The hidden dangers of school tech

    5) Install strong antivirus software on every family device

    While antivirus software won’t stop AI flirting, it adds a much-needed layer of security. Hackers and bad actors often target kids through the same devices where chatbots live, so whole-family protection matters. The best way to safeguard from malicious links that install malware, potentially accessing you and your family’s private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech

    These steps won’t solve the problem entirely, but they give parents more power at a time when Big Tech seems unwilling to put children’s safety first.

    META AI’S NEW CHATBOT RAISES PRIVACY ALARMS

    What this means for you

    If you thought chatbots were harmless fun, think again. Meta’s own documents prove its AI bots were allowed to cross dangerous lines with children. Parents must now take a proactive role in monitoring tech, because Big Tech will not protect your kids until forced.

    Kurt’s key takeaways

    Meta’s scandal shows once again why blind trust in Silicon Valley is dangerous. AI can be powerful, but without accountability, it becomes a threat. Congress may push for answers, but parents must stay one step ahead to safeguard their children.

    Do you think Big Tech companies like Meta should ever be trusted to police themselves when kids’ safety is on the line? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Oregon man accused of operating powerful

    An Oregon man is facing federal charges over allegations he orchestrated multiple large-scale cyberattacks over the course of several years, federal authorities announced Tuesday.

    Ethan Foltz, 22, allegedly developed the “Rapper Bot” Botnet, a network of devices such as digital video recorders and WiFi routers that have been infected with malware and used to conduct distributed denial of service (DDoS) attacks — a type of cyberattack aimed at slowing or shutting down websites, servers or other devices by sending large amounts of requests and overloading the system — since at least 2021, said the U.S. Attorney’s Office in the District of Alaska. Prosecutors said the network is “one of the most sophisticated and powerful DDoS-for-hire Botnets currently in existence.”

    Prosecutors said law enforcement officials stopped the attacks on Aug. 6 after executing a search warrant at Foltz’s home in Eugene, Oregon, and obtaining administrative control of his Botnet.

    Court documents allege Foltz loaned “Rapper Bot” to paying customers who targeted victims in over 80 countries, including a U.S. government network, a social media platform and U.S. tech companies. The Department of Justice’s news release did not disclose the specific victims. 

    “Rapper Bot” was controlling approximately 65,000 to 95,000 infected devices and using them to send a massive amount of data, about 2 to 3 terabits per second, in order to overwhelm the target’s bandwidth, according to prosecutors. At least five infected victim devices were believed to be in Alaska, investigators said.

    Foltz is charged with one count of aiding and abetting computer intrusions, prosecutors said. If convicted, he could face up to 10 years in prison. It wasn’t immediately clear if Foltz has legal representation.

    Special Agent in Charge Kenneth DeChellis of the Department of Defense Office of Inspector General said the charge against Foltz highlights efforts to “disrupt and dismantle emerging cyber threats targeting the Department of Defense and the defense industrial base.”

    The case is part of Operation PowerOFF, an ongoing international law enforcement effort aimed at dismantling criminal DDoS-for-hire infrastructures worldwide, authorities said.

    In December 2024, federal authorities seized 27 internet domains associated with DDoS-for-hire services and charged two people who allegedly oversaw the services.

    Source link

  • Air France and KLM breach tied to hacker group

    NEWYou can now listen to Fox News articles!

    Air France and KLM are warning customers about a new data breach that hit their customer service platform. Hackers accessed personal details including names, emails, phone numbers, loyalty program information and recent transactions. While no financial details were stolen, experts warn that this information is still a gold mine for cybercriminals.

    The airlines say they acted quickly to cut off the attackers’ access. They also stressed that their internal networks remain secure.

    “Air France and KLM detected unusual activity on an external platform we use for customer service,” the companies said in a joint statement. “This activity led to unauthorized access to customer data. Our IT security teams, along with the relevant external party, took immediate action to stop it. We have also put measures in place to prevent it from happening again. Internal Air France and KLM systems were not affected.”

    Authorities in France and the Netherlands have been notified. Meanwhile, impacted customers are being told to stay alert.

    “Customers whose data may have been accessed are currently being informed,” the airlines added. “We are advising them to be extra vigilant for suspicious emails or phone calls.”

    NOTORIOUS HACKER GROUP SETS SIGHTS ON AIRLINE INDUSTRY IN ALARMING SECURITY THREAT

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Air France airliner (Kurt “CyberGuy” Knutsson)

    A larger cybercrime trend

    This attack is part of a broader wave of data theft linked to the ShinyHunters group. In recent months, they have targeted Salesforce customer service systems used by major global brands. High-profile victims include Adidas, Qantas, Louis Vuitton and even Google.

    Ricardo Amper, CEO of Incode Technologies, a global leader in identity verification and AI-powered fraud prevention, calls this a dangerous shift.

    “This signals hackers like ShinyHunters evolving from brute-force hacks to AI-amplified social engineering, targeting third-party platforms where humans are the weak link. They’re not just stealing data; they’re using generative AI to craft convincing impersonations. It’s an AI arms race.”

    KLM airliner (Kurt "CyberGuy" Knutsson)

    KLM airliner (Kurt “CyberGuy” Knutsson)

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    How hackers pulled this off

    Attackers now use advanced AI tools that make impersonation both fast and inexpensive. These tools allow them to convincingly mimic real people.

    “Attackers today are digital con artists with an unprecedented toolkit,” Amper explains. “With AI, they can convincingly impersonate real people using cloned voices, speech patterns and even realistic video deepfakes. With just 10-20 seconds of someone’s voice, they can create an audio clone that sounds exactly like them. Armed with this, attackers call customer service reps, posing as an executive, a partner or a high-value customer, and request sensitive account changes or data access.”

    These AI-driven impersonations bypass the “red flags” that once alerted employees.

    “The best AI deepfakes are nearly impossible for humans to detect in real time,” says Amper. “Pauses, awkward phrasing, bad audio, those giveaways are disappearing.”

    Why customer service platforms are prime targets

    Customer service portals hold a wealth of personal information and often have the power to reset accounts or override security settings. This combination makes them especially attractive to hackers.

    “Customer service platforms are considered a treasure trove because they store detailed personal data, transaction histories, and sometimes have capabilities to reset passwords or override security settings,” Amper notes. “Unlike core financial systems, many lack robust security controls, making them accessible to attackers armed with partial user information.”

    What this means for you

    Air France-KLM’s breach shows just how quickly cybercriminals are adapting. With AI-powered impersonation, even experienced customer service representatives can be tricked. Your best defense is to stay vigilant, use stronger authentication and actively monitor your accounts for any unusual activity.

    A woman booking airline travel on her laptop (Kurt "CyberGuy" Knutsson)

    A woman booking airline travel on her laptop (Kurt “CyberGuy” Knutsson)

    What hackers do with the stolen data

    Once hackers gain access to this data, they can quickly convert it into profit.

    “This starts when attackers use stolen data such as loyalty program numbers, recent transactions or service request information to impersonate customers in future interactions,” Amper says. “Loyalty points and frequent flyer miles act as digital currency that can be monetized or redeemed for rewards. These pieces of information are treated as puzzle pieces to build complete identity profiles.”

    These profiles often appear for sale on the dark web. Criminals can also reuse them to break into other accounts or launch highly targeted scams.

    How to protect yourself after a breach

    Amper warns that scammers often move quickly after a breach, sending fake alerts that seem legitimate.

    “Post-breach, watch for phishing lures tailored to you, like emails citing your recent Air France flight, urging a ‘security update’ with a dodgy link. Scammers thrive on urgency.”

    If you were notified, or even suspect that your data was part of this breach, take these steps immediately:

    1) Enable phishing-resistant MFA

    Use app-based authentication, security keys or biometrics wherever possible. Unlike basic text message codes, these methods are far harder for cybercriminals to intercept, even if they already have some of your personal information from the breach.

    2) Watch for tailored phishing attempts and use strong antivirus software

    Scammers may reference real flights, loyalty program balances or recent transactions to trick you into clicking malicious links. Pair your caution with strong antivirus tools which can block dangerous websites, phishing attempts and malware before they get a chance to run. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech

    3) Monitor loyalty and financial accounts closely

    Frequent flyer miles and loyalty points are like digital currency. They can be stolen, sold or redeemed for real-world goods. Check your airline, hotel and bank accounts regularly for unusual activity.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    4) Use strong, unique passwords

    Never reuse the same password across accounts. If hackers compromise one account, they can try the same password elsewhere in a “credential stuffing” attack. A reputable password manager can create and store complex, unique logins.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    5) Sign up for an identity theft protection service

    Credit bureaus and specialized services can alert you if your information appears on the dark web or is linked to suspicious activity. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft

    6) Use a personal data removal service

    Personal data removal services can help scrub your personal information from data broker sites. Removing these records makes it harder for attackers to gather the details they need to impersonate you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    7) Scan your credit reports weekly

    Review your reports from major credit bureaus for suspicious accounts or inquiries you didn’t initiate.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Your frequent flyer miles, email address and phone number might not seem as valuable as your credit card, but in the wrong hands, they’re keys to unlocking more of your personal life. Protect them like cash.

    What would you do if a scammer could call your airline and sound exactly like you? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Nearly a million patients hit by DaVita dialysis ransomware attack

    NEWYou can now listen to Fox News articles!

    Healthcare institutions have become a favorite target for bad actors, largely because of how easy they make it for attackers. In June, researchers discovered a healthcare data breach that exposed the personal information of around 8 million patients. All of this information was publicly accessible online without any passwords or authentication protocols.

    The latest healthcare organization to fall victim to a breach is DaVita, which has put nearly a million people at risk. Headquartered in Denver, Colorado, DaVita provides dialysis treatment to about 200,000 patients across the U.S. and 13 other countries.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    A healthcare professional working on her laptop  (Kurt “CyberGuy” Knutsson)

    What you need to know DaVita ransomware attack

    Kidney dialysis giant DaVita says nearly 916,000 people had personal and medical information exposed in an April ransomware attack (via Comparitech). The breach, which the company disclosed in state filings, compromised names, Social Security numbers, dates of birth, health insurance details, medical records, tax ID numbers, addresses and even images of checks made out to the company.

    DaVita says the incident disrupted internal operations and primarily affected its laboratories. In its latest notice to victims, the company says the cyberattack began March 24, 2025, and continued until April 12. It has not confirmed whether a ransom was paid.

    Ransomware gang Interlock claimed responsibility on April 25, posting screenshots of alleged stolen documents and saying it took 1.5TB of DaVita’s data. The group lists the company on its public leak site, where it pressures victims by threatening to sell or release stolen files.

    DaVita is offering eligible breach victims free identity restoration services through Experian, with a Nov. 28 enrollment deadline. The company has not confirmed how attackers gained access to its network or the size of the ransom demand.

    CyberGuy reached out to DaVita for comment but did not receive a response before publication.

    person typing on tablet

    A healthcare professional working on a tablet   (Kurt “CyberGuy” Knutsson)

    Who’s behind the DaVita breach

    Interlock, which first appeared in October 2024, has claimed responsibility for the DaVita attack and at least 23 other ransomware attacks, plus dozens more that remain unverified. Healthcare targets have included Texas Digestive Specialists, Kettering Health and Naper Grove Vision Care, all of which reported data breaches in 2025.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The DaVita incident is the second-largest U.S. healthcare ransomware attack by number of records this year, behind Frederick Health’s January breach. According to Comparitech, there have been 53 confirmed ransomware attacks on American healthcare providers in 2025 alone, compromising more than 3.2 million patient records.

    patient vitals

    A screen showing a patient’s vitals  (Kurt “CyberGuy” Knutsson)

    6 ways to protect yourself from DaVita ransomware attack

    The DaVita data breach exposed sensitive patient information. If you are affected or just want to stay one step ahead, these actions can help minimize your risk.

    1. Don’t click on suspicious links or attachments and use strong antivirus software

    The DaVita data breach likely gives attackers access to your contact details, which they can misuse. Avoid clicking on unexpected emails or messages, even if they look legitimate.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech

    2. Use a personal data removal service

    Since your personal details were exposed in the DaVita breach, you’re more vulnerable to targeted fraud. Consider using a personal data removal service to scrub your personal details from data broker websites that sell your information.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan 

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    3. Use strong, unique passwords for every account

    Reusing passwords increases your risk. A single leaked password can unlock multiple accounts. Use a password manager to generate and store secure passwords.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    4. Sign up for an identity theft protection service

    DaVita is offering free identity theft and credit monitoring services to those affected by the breach. But even if you weren’t a victim of this specific breach, it’s still smart to protect yourself.

    Identity theft protection services can alert you to suspicious activity, help you recover if your identity is stolen and often provide tools to freeze or lock your credit. That prevents fraudsters from opening new accounts in your name, and you can lift the freeze temporarily when needed.

    See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft

    5. Enable two-factor authentication (2FA)

    Adding a second layer of login protection, like a text message or app-based code via 2FA, can make it much harder for DaVita attackers to access your accounts, even if your password is exposed.

    6. Monitor your credit and financial accounts

    Keep an eye out for strange charges or unfamiliar accounts. Set up alerts through your bank and review your credit report regularly to catch fraud early.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    The investigation into the DaVita breach is ongoing, and the company has not disclosed how the hackers got in. Nearly a million people now face the possibility of their personal information being used for malicious purposes. Ransomware attacks on hospitals and clinics can lock critical systems, delay care and push providers back to paper records. In severe cases, they can force appointment cancellations and patient diversions and potentially endanger lives.

    Should U.S. law require healthcare organizations to meet stricter cybersecurity standards? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Google confirms data stolen in breach by known hacker group

    NEWYou can now listen to Fox News articles!

    When a hospital or nonprofit falls victim to a cyberattack, it’s hard to place blame. Cybersecurity isn’t their strength, and many lack the budget for a dedicated security team, let alone a chief technology officer.

    But when a tech giant like Google experiences a data breach, it raises serious questions. Is data security slipping down the company’s priority list? Or are today’s cybercriminals so advanced that even Google’s top engineers are struggling to keep up?

    Here’s what happened: Google recently confirmed that hackers stole customer data by breaching one of its internal databases. The breach targeted a system that used Salesforce, a popular cloud-based platform companies use to manage customer relationships, store business contact information and track interactions. The attack has been linked to a known threat group.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    A Google sign on the side of a building (Kurt “CyberGuy” Knutsson)

    What you need to know about Google data breach

    Google has confirmed that a hacking group known as ShinyHunters stole customer data from one of its internal Salesforce databases used to manage business client relationships. The company disclosed the breach in a blog post published in early August, noting that the stolen data included “basic and largely publicly available business information, such as business names and contact details.”

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The breach was carried out by ShinyHunters, a well-known cybercriminal group formally tracked as UNC6040. The group has recently been linked to a string of high-profile incidents involving companies such as AT&T, Ticketmaster, Allianz Life and Pandora. In this case, the attackers targeted Google’s corporate Salesforce system, which the company uses to store contact information and notes about small and medium-sized businesses.

    According to Google’s Threat Intelligence Group, the attackers relied on voice phishing, or “vishing,” impersonating company employees in phone calls to IT support and persuading them to reset login credentials. This technique has proven effective against multiple organizations in recent months.

    google hackers 2

    A man using the Google search engine on his laptop   (Kurt “CyberGuy” Knutsson)

    No company is safe from cyberattacks

    Google did not specify how many customers were affected by the breach. When asked for comment, a company spokesperson pointed CyberGuy back to the blog post and declined to elaborate. It is also unclear whether Google has received any sort of ransom demand from the group.

    Cisco, Qantas and Pandora have all reported similar breaches in recent months, which now appear to be part of a broader campaign targeting cloud-based customer relationship management tools.

    In its blog post, Google warned that ShinyHunters may be preparing a public leak site. Ransomware gangs often use this tactic to extort companies, threatening to publish stolen data. The group reportedly shares infrastructure and personnel with other cybercriminal collectives, including The Com, which runs extortion campaigns and has, in some cases, issued threats of physical violence. 

    google hackers 3

    Google search engine (Kurt “CyberGuy” Knutsson)

    9 ways to stay safe from voice phishing and social engineering attacks

    While organizations like Google may be prime targets, individuals are often the weakest link that attackers exploit. But with a few smart practices, you can dramatically reduce your risk.

    1. Never share login credentials over the phone

    The Google breach happened because employees gave up sensitive information over a phone call. No legitimate IT team will ever ask you to share your password or 2FA codes over the phone. If someone does, it’s a major red flag.

    2. Always verify who’s calling

    If someone claims to be from your company’s IT department or a service provider, hang up and call back using an official number. Never trust the number displayed on caller ID.

    3. Enable two-factor authentication (2FA)

    Even if credentials are compromised, two-factor authentication (2FA) can block unauthorized access by adding an extra layer of security. It ensures that a password alone isn’t enough to break into your accounts.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    4. Beware of phishing links too

    Phishing emails and messages often include links that take you to fake websites designed to steal your login credentials or personal information. These messages usually create a sense of urgency, asking you to verify an account, reset a password or claim a reward. Instead of clicking the link, take a moment to inspect the message.

    The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com/LockUpYourTech

    5. Use a data removal service

    Attackers are able to carry out phishing, smishing and vishing attacks because your personal data is readily available online. The less of it that’s publicly accessible, the harder it becomes for them to craft convincing scams.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    6. Keep your software and browsers up to date

    Attackers often exploit outdated software with known vulnerabilities. Make sure your operating system, browsers, plugins and apps are always running the latest version. Enable auto updates wherever possible to avoid missing critical patches.

    7. Use a password manager with phishing detection

    A good password manager doesn’t just store strong, unique passwords; it can also alert you if you’re on a suspicious site. If your password manager refuses to autofill your login, it could mean the site is fake.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    8. Monitor your accounts for unusual activity

    If you suspect a breach, watch your accounts for unauthorized logins, password reset emails or other suspicious behavior. Set up alerts when possible. Many online services offer login notifications or dashboards that show recent access history.

    9. Report phishing attempts

    If you receive a vishing or phishing attempt, report it to your organization’s IT/security team or the appropriate government agency (like reportfraud.ftc.gov in the U.S.). Reporting helps shut down these scams faster and can protect others.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    While the data exposed in Google’s case may be limited, the breach highlights a persistent vulnerability in corporate systems: people. ShinyHunters seems to be getting more effective at exploiting that weakness. What’s even more concerning is the rise of vishing, also known as voice phishing. Vishing isn’t new, but its growing success shows just how fragile even well-defended systems can be when human error is involved.

    How confident are you in your company’s cybersecurity awareness training? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Colorado accidentally put voting system passwords online, but officials say election is secure

    Colorado accidentally put voting system passwords online, but officials say election is secure

    DENVER — Voting system passwords were mistakenly put on the Colorado Secretary of State’s website for several months before being spotted and taken down, but the lapse did not pose an immediate threat to the upcoming election, said state election officials Tuesday.

    The passwords were only one of two that are needed to access any component of Colorado’s voting systems, and are just one part of a layered security system, said Jack Todd, spokesperson for the the Secretary of State’s office, in a statement. The two passwords are “kept in separate places and held by different parties,” he said.

    “This is not a security threat,” said Colorado Secretary of State Jena Griswold in an interview on 9News Tuesday evening. She said her office is investigating, that not all of the passwords in the spreadsheet were active and there is no reason to believe there’s been a security breach.

    Griswold said workers are changing passwords, looking at access logs and chain of custody books.

    She frequently calls Colorado the gold standard for election security, though there have been some hiccups in the past. The error has brought criticism from the chairman of the Colorado Republican Party at a time of heightened scrutiny of the country’s election systems, though U.S. elections remain remarkably reliable.

    Colorado law requires that election equipment is surveilled and stored in secure rooms — access to which is guarded, tracked and logged. Colorado voters fill out paper ballots, which are audited after the election.

    Election officials learned last week that the spreadsheet, which held the passwords in a hidden tab, was available online. Once the lapse was discovered, Todd said, they acted immediately and informed the U.S. Cybersecurity and Infrastructure Security Agency.

    The executive director of the Colorado Clerks Association, Matt Crane, told 9News that while the lapse was concerning, the association was satisfied with the Colorado Secretary of State’s response.

    Chairman of the Colorado GOP, Dave Williams, sent a letter to the department Tuesday demanding that, among other things, the secretary of state confirm that the exposed passwords have since been changed.

    Earlier this month, a Colorado county clerk, Tina Peters, was sentenced to nine years behind bars for a data-breach scheme based in false claims about voting machine fraud in the 2020 presidential race.

    Source link

  • A man accused of threatening to kill Dem election officials will likely plead guilty

    A man accused of threatening to kill Dem election officials will likely plead guilty

    DENVER — A man accused of repeatedly threatening to kill the top elections officials in Colorado and Arizona as well as judges and federal law enforcement agents is expected to plead guilty in federal court on Wednesday.

    Teak Ty Brockbank, 45, of Cortez, Colorado, has been jailed since his Aug. 23 arrest. Now he’s scheduled to appear in court for a change of plea hearing after previously pleading not guilty to one count of making interstate threats. His lawyer notified the court that Brockbank wanted to change his plea. In federal court, “guilty” is the only other option.

    According to a detention motion, Brockbank told investigators that he’s not a “vigilante” and that he hoped his posts would simply “wake people up.”

    Investigators say Brockbank began to express the view that violence against public officials was necessary in late 2021 and proceeded to make multiple threats against Colorado Secretary of State Jena Griswold and former Arizona Secretary of State Katie Hobbs, now the state’s governor, and the others.

    In one post in August 2022, referring to Griswold and Hobbs, Brockbank allegedly said: “Once those people start getting put to death then the rest will melt like snowflakes and turn on each other,” according to copies of the threats included in court documents. Griswold and Hobbs were not named as among those allegedly targeted by Brockbank when he was first arrested but were identified as victims in evidence unsealed in September.

    The investigation was launched in August 2022 after Griswold’s office notified federal authorities of posts made on Gab and Rumble, an alternative video-sharing platform that has been criticized for allowing and sometimes promoting far-right extremism, according to court documents.

    Brockbank also allegedly posted in October 2021 that he could use his rifle to “put a bullet” in the head of a state judge who had overseen Brockbank’s probation for his fourth conviction for driving under the influence, calling the judge a “Nazi,” prosecutors said in an Aug. 27 motion asking that Brockbank be kept behind bars while prosecuted.

    Prosecutors also say Brockbank posted in July 2022 that he would shoot any federal agent without warning who showed up at his house. Prosecutors said a half dozen firearms were found in his home after his August arrest, including a loaded one near his front door, even though he can’t legally possess firearms due to a felony conviction of attempted theft by receiving stolen property in Utah in 2002.

    And although Brockbank was charged for threats allegedly made between September 2021 and August 2022, prosecutors say he’s kept it up since then.

    In December 2023, after a divided Colorado Supreme Court removed Donald Trump from the state’s presidential primary ballot, Brockbank allegedly told his stepfather in a text that he was adding the four judges in the majority to “my list.”

    And this July, prosecutors say, Brockbank continued to threaten Griswold because her office triggered an investigation of former Mesa County clerk Tina Peters by notifying authorities about a data breach of the county’s election equipment in 2021. Griswold also has been outspoken nationally on elections security and has received threats in the past over her insistence that the 2020 election was secure.

    Peters was sentenced to nearly nine years behind bars in October for allowing access to the county’s election system to a man affiliated with My Pillow chief executive Mike Lindell — a prominent promoter of false claims that voting machines were manipulated to steal the election. Authorities investigated separate threats made against her trial judge, Matthew Barrett, who admonished Peters during her sentencing. Most of the messages appear to have been strongly worded opinions but none appeared to rise to the level of a crime, Mesa County Sheriff’s Office spokesperson Wendy Likes said Tuesday.

    Brockbank was prosecuted by the Justice Department’s Election Threats Task Force, announced by Attorney General Merrick Garland to protect workers who have been subject to increasing threats since the 2020 election.

    In 2022, a Nebraska man pleaded guilty to making death threats against Griswold in what officials said was the first such plea obtained by the task force.

    Source link

  • Hong Kong bars services like WhatsApp and Google Drive from government computers

    Hong Kong bars services like WhatsApp and Google Drive from government computers

    HONG KONG — The Hong Kong government is barring most civil servants from using popular apps like WhatsApp, WeChat and Google Drive on their work computers due to potential security risks.

    The latest IT security guidelines from the Digitial Policy Office have many civil servants complaining about added inconvenience. Government workers will still be allowed to use the services from personal devices at work, and can get exceptions to the ban with approval from a manager.

    Information technology experts said companies have adopted similar policies due to increasing risks of data leaks and cybersecurity challenges.

    Sun Dong, Secretary for Innovation, Technology and Industry, said on a radio program Tuesday that the ban is needed as hacking is becoming a more serious problem. He said the governments of the United States and China have also adopted stringent measures for their internal computer systems.

    A civil servant surnamed Lee, who requested anonymity because she was not authorized to speak to media, said her office often uses cloud storage services to exchange large files with vendors outside the government.

    Francis Fong, the honorary president of the Hong Kong Information Technology Federation, said officials told him that the policy aims to prevent malware from bypassing its firewall through encrypted messages. He added that it could also address issues with data breaches.

    Anthony Lai, director of VX Research Limited, a cybersecurity firm based in Hong Kong and Britain, said the government’s approach is appropriate due to low cybersecurity awareness among some staff and a lack of comprehensive internal monitoring systems.

    Earlier this year, data breaches at various Hong Kong government departments compromised the personal information of at least tens of thousands of people and sparked concerns.

    Source link

  • Cyprus thwarted a digital attack against the government’s main online portal

    Cyprus thwarted a digital attack against the government’s main online portal

    NICOSIA, Cyprus — Cyprus said Sunday that it has successfully thwarted a digital attack aimed at blocking access to the government’s central online portal, the latest in a string of similar attacks over a three-day period against state-run utilities and the Cypriot subsidiary of a Greek energy company.

    Cyprus’ Deputy Ministry of Research, Innovation and Digital Policy said in a statement that “a quick and coordinated response” by authorities foiled the attack, whose purpose was exclusively to prevent access to specific government websites.

    The distributed denial-of-service attack, or DDoS, only affected the main government portal gov.cy “for a few minutes” and that no other online government ministry or service website was affected.

    The deputy ministry didn’t say who was behind the attacks or what the possible motive may have been.

    Sunday’s attack came after Cyprus’ electricity and telecommunications authorities, as well as the operator of the island nation’s two airports, Hermes and fuel company EKO Cyprus Ltd., were targeted on Friday and Saturday.

    Officials told the Cyprus News Agency that all those attacks had also failed and that no client information had been leaked or compromised.

    Source link

  • October is Cybersecurity Awareness Month. Here’s how to stay safe from scams

    October is Cybersecurity Awareness Month. Here’s how to stay safe from scams

    NEW YORK — October is Cybersecurity Awareness Month, which means it’s the perfect time to learn how to protect yourself from scams.

    “Scams have become so sophisticated now. Phishing emails, texts, spoofing caller ID, all of this technology gives scammers that edge,” said Eva Velasquez, president and CEO of the Identity Theft Resource Center.

    As scammers find new ways to steal money and personal information, consumers should be more vigilant about who they trust, especially online. A quick way to remember what to do when you think you’re getting scammed is to think about the three S’s, said Alissa Abdullah, also known as Dr. Jay, Mastercard’s deputy chief security officer

    “Stay suspicious, stop for a second (and think about it) and stay protected,” she said.

    Whether it’s romance scams or job scams, impersonators are looking for ways to trick you into giving them money or sharing your personal information. Here’s what to know:

    Three common tactics used by scammers are based on fear, urgency and money, said security expert Petros Efstathopoulos. Here’s how they work:

    — Fear

    When a scammer contacts you via phone or email, they use language that makes it seem like there is a problem that you need to solve. For example, a scammer contacts you over email telling you that your tax return has an error and if you don’t fix it you’ll get in trouble.

    — Urgency

    Because scammers are good at creating a sense of urgency, people tend to rush, which makes them vulnerable. Scammers often tell people they need to act right away, which can lead to them sharing private information such as their Social Security numbers.

    — Money

    Scammers use money as bait, Efstathopoulos said. They might impersonate tax professionals or the IRS saying you will get a bigger tax refund than you expect if you pay them for their services or share your personal information.

    Simply being aware of typical scams can help, experts say. Robocalls in particular frequently target vulnerable individuals like seniors, people with disabilities, and people with debt.

    “If you get a robocall out of the blue paying a recorded message trying to get you to buy something, just hang up,” said James Lee, chief operating officer at the Identity Theft Resource Center. “Same goes for texts — anytime you get them from a number you don’t know asking you to pay, wire, or click on something suspicious.”

    Lee urges consumers to hang up and call the company or institution in question at an official number.

    Scammers will also often imitate someone in authority, such as a tax or debt collector. They might pretend to be a loved one calling to request immediate financial assistance for bail, legal help, or a hospital bill.

    So-called “romance scams” often target lonely and isolated individuals, according to Will Maxson, assistant director of the Division of Marketing Practices at the FTC. These scams can take place over longer periods of time — even years.

    Kate Kleinart, 70, who lost tens of thousands to a romance scam over several months, said to be vigilant if a new Facebook friend is exceptionally good-looking, asks you to download WhatsApp to communicate, attempts to isolate you from friends and family, and/or gets romantic very quickly.

    “If you’re seeing that picture of a very handsome person, ask someone younger in your life — a child, a grandchild, a niece or a nephew — to help you reverse-image search or identify the photo,” she said.

    She said the man in pictures she received was a plastic surgeon from Spain whose photos have been stolen and used by scammers.

    Kleinart had also been living under lockdown during the early pandemic when she got the initial friend request, and the companionship and communication meant a lot to her while she was cut off from family. When the scam fell apart, she missed the relationship even more than the savings.

    “Losing the love was worse than losing the money,” she said.

    Job scams involve a person pretending to be a recruiter or a company in order to steal money or information from a job seeker.

    Scammers tend to use the name of an employee from a large company and craft a job posting that matches similar positions. An initial red flag is that scammers usually try to make the job very appealing, Velasquez said.

    “They’re going to have very high salaries for somewhat low-skilled work,” she said. “And they’re often saying it’s a 100% remote position because that’s so appealing to people.”

    Some scammers post fake jobs, but others reach out directly to job seekers through direct messages or texts. If the scammers are looking to steal your personal information, they may ask you to fill out several forms that include information like your Social Security number and driver’s license details.

    The only information a legitimate employer should ask for at the beginning of the process is your skills, your work experience, and your contact information, Velasquez said.

    Other details don’t generally need to be shared with an employer until after you’ve gotten an offer.

    According to Lois Greisman, an associate director of marketing practices at the Federal Trade Commission, an investment scam constitutes any get-rich-quick scheme that lures targets via social media accounts or online ads.

    Investment scammers typically add different forms of “testimony,” such as from other social media accounts, to support that the “investment” works. Many of these also involve cryptocurrency. To avoid falling for these frauds, the FTC recommends independently researching the company — especially by searching the company’s name along with terms like “review” or “scam.”

    When you’re using Facebook or scrolling Google results, be aware of quiz scams, which typically appear innocuous and ask about topics you might be interested in, such as your car or favorite TV show. They may also ask you to take a personality test.

    Despite these benign-seeming questions, scammers can then use the personal information you share to respond to security questions from your accounts or hack your social media to send malware links to your contacts.

    To protect your personal information, the FTC simply recommends steering clear of online quizzes. The commission also advises consumers to use random answers for security questions.

    “Asked to enter your mother’s maiden name? Say it’s something else: Parmesan or another word you’ll remember,” advises Terri Miller, consumer education specialist at the FTC. “This way, scammers won’t be able to use information they find to steal your identity.”

    When buying or selling products on Instagram or Facebook Marketplace, keep in mind that not everyone that reaches out to you has the best intentions.

    To avoid being scammed when selling via an online platform, the FTC recommends checking buyers’ profiles, not sharing any codes sent to your phone or email, and avoiding accepting online payments from unknown persons.

    Likewise, when buying something from an online marketplace, make sure to diligently research the seller. Take a look at whether the profile is verified, what kind of reviews they have, and the terms and conditions of the purchase.

    Scammers often reach out by phone, Ben Hoffman, Head of Strategy and Consumer Products at Fifth Third Bank recommends that you don’t pick up unknown incoming calls.

    “Banks don’t ask your for your password,” said Hoffman. If you believe your bank is trying to reach out, give them a call at a number listed on their website.

    This makes it easier to know for sure that you’re not talking to a scammer. As a general rule, banks don’t often call unless there is suspicious activity on your account or if you previously contacted them about a problem.

    If you receive many unknown calls that end up being scammers or robocalls, you can use tools available on your phone to block spam. Check here for how to do this on your iPhone and here for Android.

    There are many tools are your disposal that can be used to protect yourself from scammers online.

    — Use a password manager to ensure you’re utilizing a complex password that scammers can’t guess.

    — Regularly checking your credit report and bank statements is a good practice since it can help you identify if someone has been using your bank account without your knowledge.

    — Turn on multi-factor verification to make sure impersonators aren’t able to access your social media or bank accounts.

    As scams get more sophisticated, it’s difficult to know who to trust or if a person is actually real, or an impersonator. If you aren’t sure if a job recruiter is real or if your bank is actually asking your for information, find organizations that can help you, recommended Velasquez.

    Organizations like the Identity Theft Protection Center and the AARP Fraud Watch Network offer free services for customers who need help identifying scams or knowing what to do if you’ve been a victim of a scam.

    If you’ve taken all the necessary steps to protect yourself, you might want to help those around you. Whether you’re helping your grandparents to block unknown callers on their phones or sharing tips with your neighbors, talking with others about how to protect themselves from scams can be very effective.

    If you or a family member is a victim of a scam, it’s good practice to report it on the FTC’s website.

    ___

    The Associated Press receives support from Charles Schwab Foundation for educational and explanatory reporting to improve financial literacy. The independent foundation is separate from Charles Schwab and Co. Inc. The AP is solely responsible for its journalism.

    Source link

  • Former porn shop worker wants defamation lawsuit by North Carolina lieutenant governor dismissed

    Former porn shop worker wants defamation lawsuit by North Carolina lieutenant governor dismissed

    RALEIGH, N.C. — A former porn shop worker who was accused by North Carolina Lt. Gov. Mark Robinson of defamation has asked a court to throw out the lawsuit against him, calling the politician’s allegations “bizarre” and his demand for at least $50 million in damages a violation of civil court rules.

    Robinson, the Republican nominee for governor, filed a lawsuit in Wake County court Tuesday against CNN and Louis Love Money, of Greensboro, saying they published “disgusting lies” about him.

    The lawsuit identified a CNN report last month that Robinson made explicit racial and sexual posts on a pornography website’s message board more than a decade ago. Weeks before CNN’s report, Money alleged in a music video and in a media interview that for several years starting in the 1990s, Robinson frequented a porn shop Money was working at, and that Robinson purchased porn videos from him.

    Attorneys for Money, in filing a dismissal motion Wednesday, said that Robinson’s lawsuit violated a procedural rule that requires that a person seeking punitive damages state initially a demand for monetary damages “in excess of $25,000.”

    The motion said the rule is designed to “prevent excess demands from leaking publicly in the media and tainting the judicial process.” Violating the rule, attorneys Andrew Fitzgerald and Peter Zellmer wrote, may “have been for the very purpose of creating media attention for Mr. Robinson’s campaign.”

    Otherwise, the attorneys also are seeking a dismissal on the grounds that the allegations in the lawsuit, even if they were true, fail to establish a cause of action against Money.

    “The complaint contains many impertinent and bizarre allegations,” they wrote.

    Asked for a response to the motion, Robinson’s campaign referred to Tuesday’s news release announcing the lawsuit. In it, Robinson said claims from “grifters like Louis Love Money are salacious tabloid trash.”

    Money on Tuesday said he stood by what he had said as truthful. CNN declined to comment on the lawsuit when it was filed and had not responded to it in court as of midday Thursday.

    Robinson is running against Democratic nominee Josh Stein in the campaign to succeed term-limited Democratic Gov. Roy Cooper.

    The CNN report led many fellow GOP elected officials and candidates, including presidential nominee Donald Trump, to distance themselves from Robinson’s gubernatorial campaign. Most of the top staff running Robinson’s campaign and his lieutenant governor’s office quit following the CNN report, and the Republican Governors Association stopped supporting Robinson’s bid.

    The network report said it matched details of the account on the message board to other online accounts held by Robinson by comparing usernames, a known email address and his full name. CNN also reported that details discussed by the account holder matched Robinson’s age, length of marriage and other biographical information.

    The lawsuit alleges that CNN published its report despite knowing, or recklessly disregarding, that Robinson’s personal data was previously compromised by data breaches.

    Source link

  • Marriott agrees to pay $52 million, beef up data security to resolve probes over data breaches

    Marriott agrees to pay $52 million, beef up data security to resolve probes over data breaches

    Marriott International has agreed to pay $52 million and make changes to bolster its data security to resolve state and federal claims related to major data breaches that affected more than 300 million of its customers worldwide.

    The Federal Trade Commission and a group of attorneys general from 49 states and the District of Columbia announced the terms of separate settlements with Marriott on Wednesday. The FTC and the states ran parallel investigations into three data breaches, which took place between 2014 and 2020.

    As a result of the data breaches, “malicious actors” obtained the passport information, payment card numbers, loyalty numbers, dates of birth, email addresses and/or personal information from hundreds of millions of consumers, according to the FTC’s proposed complaint.

    The FTC claimed that Marriott and subsidiary Starwood Hotels & Resorts Worldwide’s poor data security practices led to the breaches.

    Specifically, the agency alleged that the hotel operator failed to secure its computer system with appropriate password controls, network monitoring or other practices to safeguard data.

    As part of its proposed settlement with the FTC, Marriott agreed to “implement a robust information security program” and provide all of its U.S. customers with a way to request that any personal information associated with their email address or loyalty rewards account number be deleted.

    Marriott also settled similar claims brought by the group of attorneys general. In addition to agreeing to strengthen its data security practices, the hotel operator also will pay $52 million penalty to be split by the states.

    In a statement on its website Wednesday, Bethesda, Maryland-based Marriott noted that it made no admission of liability as part of its agreements with the FTC and states. It also said it has already put in place data privacy and information security enhancements.

    In early 2020, Marriott noticed that an unexpected amount of guest information was accessed using login credentials of two employees at a franchised property. At the time, the company estimated that the personal data of about 5.2. million guests worldwide might have been affected.

    In November 2018, Marriott announced a massive data breach in which hackers accessed information on as many as 383 million guests. In that case, Marriott said unencrypted passport numbers for at least 5.25 million guests were accessed, as well as credit card information for 8.6 million guests. The affected hotel brands were operated by Starwood before it was acquired by Marriott in 2016.

    The FBI led the investigation of that data theft, and investigators suspected the hackers were working on behalf of the Chinese Ministry of State Security, the rough equivalent of the CIA.

    Source link

  • American Water, the largest water utility in US, is targeted by a cyberattack

    American Water, the largest water utility in US, is targeted by a cyberattack

    FILE – The largest regulated water and wastewater utility company in the U.S., American Water, its building in Camden, N.J., seen in the foreground on June 17, 2024, says it was the victim of a cyberattack, prompting the firm to pause billing to customers. (AP Photo/Matt Slocum, File)

    Source link