ReportWire

Tag: Cybercrime

  • Cyberattack disrupts systems, causes delays at major European airports

    [ad_1]

    A cyberattack targeting check-in and boarding systems has disrupted air traffic and caused delays at several of Europe’s major airports, officials said Saturday, though the initial impact appeared to be limited.

    The disruptions to electronic systems initially reported at Brussels, Berlin’s Brandenburg and London’s Heathrow airports meant that only manual check-in and boarding was possible. Many other European airports said their operations were unaffected.

    “There was a cyberattack on Friday night 19 September against the service provider for the check-in and boarding systems affecting several European airports including Brussels Airport,” said Brussels Airport in a statement, initially reporting a “large impact” on flight schedules.

    Airports said the issue centered around a provider of check-in and boarding systems — not airlines or the airports themselves.

    People at Brandenburg Airport airport as a cyber attack has caused delays, in Berlin, Germany, Saturday, Sept. 20, 2025. 

    Carsten Koall / AP


    Collins Aerospace, whose systems help passengers check themselves in, print boarding passes and bag tags and dispatch their luggage from a kiosk, cited a “cyber-related disruption” to its MUSE (Multi-User System Environment) software at “select airports.”

    As the day wore on, the fallout appeared to be contained.

    Brussels Airport spokesperson Ihsane Chioua Lekhli told broadcaster VTM that by mid-morning, nine flights had been canceled, four were redirected to another airport and 15 faced delays of an hour or more. She said it wasn’t immediately clear how long the disruptions might last.

    Axel Schmidt, head of communications at the Brandenburg airport, said that by late morning, “we don’t have any flights canceled due to this specific reason, but that could change.” The Berlin airport said operators had cut off connections to affected systems.

    Europe Airport Cyber Attack

    People at Brandenburg Airport airport as a cyber attack has caused delays, in Berlin, Germany, Saturday, Sept. 20, 2025.

    Carsten Koall / AP


    Heathrow, Europe’s busiest airport, said the disruption has been “minimal” with no flight cancellations directly linked to the problems afflicting Collins. A spokesperson would not provide details as to how many flights have been delayed as a result of the cyberattack.

    The airports advised travelers to check their flight status and apologized for any inconvenience.

    Collins, an aviation and defense technology company that is a subsidiary of RTX Corp., formerly Raytheon Technologies, said it was “actively working to resolve the issue and restore full functionality to our customers as quickly as possible.”

    “The impact is limited to electronic customer check-in and baggage drop and can be mitigated with manual check-in operations,” it said in a statement.

    It wasn’t the only cyber incident targeting airports. One of Russia’s busiest airports said on Friday that its website had been hacked and was offline. Pulkovo Airport in St. Petersburg said that access to its website was restricted, but that operations at the nation’s second-largest air hub were unaffected and specialists were working to restore service. 

    [ad_2]

    Source link

  • Sam’s Club customers targeted by phishing scam using fake $100 reward offers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Dennis and Carole recently reached out to us with a warning about a suspicious email claiming to offer a $100 Sam’s Club reward. 

    “We received this yesterday, and my wife fell for the scam and initiated the free gift offer. No credit card other than email transferred,” Dennis said.

    The email looked professional, with the official Sam’s Club logo at the top. It read, “YOUR OPINION IS IMPORTANT. Exclusive. YOU CAN GET A $100 REWARD.” It then invited the recipient to “Take a short survey to claim your $100 reward. Click the button below to get started,” with a bold black button labeled “GET STARTED NOW!”

    Despite no credit card being entered, the couple wanted to know:

    • Will scammers be able to charge their credit card?
    • Do they already have credit card info?
    • What steps should they take?

    Let’s break this all down.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    THE TRUTH BEHIND THOSE MYSTERIOUS SHIPMENT EMAILS IN YOUR INBOX

    A couple warns about a new email scam disguised as a Sam’s Club survey. (Kurt “CyberGuy” Knutsson)

    Why this Sam’s Club email is a scam

    At first glance, the email looked like it came straight from Sam’s Club, complete with the logo, blue color scheme and a tempting promise of a $100 reward for filling out a short survey. That’s exactly what scammers want you to think.

    This is a classic phishing scam. Cybercriminals copy a trusted brand’s style to trick you into clicking their links or entering personal information. Once you engage, they can:

    • Collect your email address for spam lists
    • Send more realistic-looking phishing attempts
    • Try to lure you into giving up payment or account details in future messages
    • Direct you to malware-infected websites

    In this case, only an email address was entered. That means there’s no direct credit card risk, yet. However, scammers now know the address is active and that someone at it will click through, making it more valuable for targeted scams later. The next step is protecting yourself quickly, because stopping them now is far easier than dealing with identity theft later.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    person receiving spam email on laptop

    Experts warn consumers not to click suspicious looking links. (Peter Dazeley)

    How to protect yourself after clicking a link in a scam email

    If you entered your email in a scam form, take these steps right away to reduce the risk of further attacks:

    1) Use strong antivirus software

    Run a scan with a trusted antivirus program. Many modern security tools also include phishing protection, blocking dangerous links before they can load. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.

    2) Mark the email as phishing

    Use your email provider’s spam or phishing report tool to flag the message. This helps block future attempts and trains filters to catch similar scams. 

    3) Consider a data removal service

    Data removal services can contact data brokers to remove your personal information from their lists. This makes it harder for scammers to target you with more personalized attacks. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Sam's Club Store Bentonville Arkansas

    Scammers are claiming to offer a $100 Sam’s Club reward. (REUTERS/Rick Wilking)

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    4) Watch for follow-up scams

    Scammers often follow up with urgent-sounding emails to “confirm” your account or claim you won a prize. Delete these immediately without clicking links or opening attachments. 

    5) Change your passwords and strengthen security

    Never reuse the same password across multiple accounts. If scammers target your email address, they may try it with common password guesses. Create unique, strong passwords for each account and store them in a reputable password manager.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    6) Report the scam

    Forward the email to:

    • Sam’s Club: phishing@samsclub.com
    • FTC: reportphishing@apwg.org

    Reporting helps both the brand and law enforcement track scam activity.

    CLICK HERE TO GET THE FOX NEWS APP

    Consumers are advised to report phishing emails to the company or the FTC.

    Consumers are advised to report phishing emails to the company or the FTC. (CyberGuy.com)

    Kurt’s key takeaways

    Even if you avoid entering payment details, your personal information still has value to scammers. An email address can open the door to phishing attacks designed to steal passwords, install malware, or gather more sensitive data. Scammers know how to make an email look convincing, especially when they dangle a gift card as bait. By staying alert, reporting suspicious emails and protecting your personal data, you can reduce your risk.

    Have you ever received a fake reward email from a brand you trust? How did you handle it? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Stop Medicare scams before they stop you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Medicare is a tempting prize for scammers. Because it’s a public program funded by taxpayers, it has a huge budget to distribute and that’s what attracts scammers. In 2024, improper payments added up to $54 billion. Some scams involve setting up fake companies to file bogus claims, while others target beneficiaries directly, stealing their personal information and denying them their right to treatment.

    If you fall victim to such a scam, the consequences can range from small financial losses to actual health risks. Scammers may trick you into paying fake fees, premiums or “copays” over the phone or online. They may also go after your personal information or Medicare number to bill for services or equipment you never requested, which could leave you with less coverage when you actually need treatment.

    It’s better to know what you’re up against so you don’t accidentally lose your Medicare benefits.

    FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING IT

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter 

    A patient is examined on Dec. 5, 2022, at the Indiana University Health Cancer Center. (Kelly Wilkinson/USA Today Network via Imagn Images)

    What to look out for to recognize a Medicare scam

    Scammers are getting more and more professional these days. With Medicare scams, fraudsters may use spoofed phone numbers, emails and websites to make their schemes seem more believable. Luckily, there are still some telltale signs to look out for.

    Regardless of the communication method, phone, email, mail or in person, scammers will try to:

    • Create fear or urgency
    • Pressure you to act quickly
    • Threaten you with consequences
    A woman with painted nails types on a MacBook.

    Scam artists often try to create time pressure in order to compel their victims to act quickly, before they have time to think. (Kurt “CyberGuy” Knutsson)

    Scammers calling you in Medicare’s name to demand payments

    Some scammers use spoofed phone numbers to impersonate Medicare representatives. They may try to trick you into paying fake fees or buying unnecessary products.

    These often include:

    • Fake health insurance upgrades
    • “Low-cost” medical equipment
    • Fake tests or genetic kits
    • Discounted medication

    Remember: Medicare will never call you unless you ask them to, and they will never ask for money.

    If you ever owe Medicare fees, you will be contacted by mail, not by phone.

    Medicare will never charge random “activation” or “renewal” fees, those are always scams. However, Medicare itself is not completely free. Part A (hospital coverage) is free for most people, but Part B (doctor visits, outpatient care, preventive services) always requires a monthly premium, and you may also pay deductibles or copays for certain services.

    Scammers try to mimic these legitimate bills to steal your money. If you’re asked for payment over the phone or online, that’s your red flag it’s a scam.

    Scammers try to mimic these payments to steal your money

    Scammers may try calling you in Medicare’s name to ask for your Medicare number or card details.

    Money isn’t the only thing scammers are after; your Medicare number can be just as valuable, if not more so.

    This scam follows a similar scheme: fraudsters call you pretending to be Medicare employees and ask you to provide your Medicare number for fake reasons, such as:

    • Upgrading your plan
    • Updating your account details
    • Offering “free” drugs
    • Issuing a new Medicare card
    • … and more

    Let me be clear: Medicare will never call you, whether it’s about paying fees, updating your account or anything else.

    Scammers want your Medicare information so they can impersonate you and obtain medical supplies, prescription drugs or treatments in your name.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Scammers calling you in Medicare’s name to extort your personal data

    Your Social Security number (SSN) can be the final piece scammers need to impersonate you. During these calls, fraudsters may ask not only for your Medicare details but also for other personal information, such as your SSN, date of birth or similar data.

    They often use the same excuses as when trying to obtain Medicare information, such as:

    • Upgrading your plan
    • Issuing new cards
    • Other account-related reasons.

    Let me emphasize this again: Medicare will never call you for these reasons.

    Even if the phone number looks legitimate and the caller sounds professional, the moment you’re asked for personal details or payments, you know it’s a scam.

    What to do if you suspect a Medicare scam

    If it’s a phone call, just hang up.

    You don’t need to explain yourself or engage in a conversation with scammers. If they threaten you with consequences, do not believe them; scammers use fear to pressure you into making poor decisions.

    Remember: If Medicare or its service providers had important information to communicate, they would do so by mail, not by phone.

    Apart from not letting scammers take advantage of you, you can also help others by:

    • Reporting the fraud to Medicare at 1‑800‑MEDICARE (1‑800‑633‑4227)
    • Reporting the fraud to the US Department of Health and Human Services at oig.hhs.gov/fraud/report-fraud/
    • Reporting the fraud to the Federal Trade Commission (FTC) at reportfraud.ftc.gov/
    A woman types on her laptop at a kitchen table.

    A woman checks her Medicare account on her laptop. (Kurt “CyberGuy” Knutsson)

    How to make yourself less of a target of Medicare scams

    You don’t have to sit tight and hope that scammers won’t target you. Instead, you can take some active measures to make such attempts less likely.

    1) Lower your online exposure

    To target you, scammers first need to gather some basic information about you, like your phone number. That information and much more can be easily looked up on people search sites, platforms operated by data brokers that let people search for others. The good news is that you can opt out of these platforms. You can do it manually by visiting each website and filling out the opt-out forms or you can automate the process.

    2) Use a data removal service to help you

    Data removal services work on your behalf to erase personal details like your phone number, address and email from people-search sites and data broker databases. By reducing the amount of information available online, these services make it harder for scammers to find and target you. Many of them also monitor whether your data reappears, so you stay protected over time without having to constantly check dozens of sites yourself.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to come after you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    3) Monitor your Medicare statements regularly

    Always review your Medicare Summary Notices (MSNs) or Explanation of Benefits (EOBs). These statements show what services have been billed in your name. If you see charges for services, equipment or prescriptions you never received, report it right away. Quick action can stop fraud before it impacts your care.

    4) Use identity theft protection services

    Identity theft protection tools can alert you if your Social Security number, Medicare number or other sensitive details show up on the dark web or are used to open new accounts. These services can also guide you through recovery if scammers misuse your information.

    See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Medicare scams are designed to exploit fear, urgency and confusion. By recognizing the warning signs and knowing what Medicare will and will not do, you can stay one step ahead of fraudsters. Protecting your personal information and reducing your online exposure are key to keeping your coverage safe. With a few smart habits, you can make yourself a less appealing target and help others by reporting scams when you see them.

    Have you or someone you know ever been targeted by a Medicare scam, and how did you handle it? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Hackers breach system responsible for New Orleans bond transactions, jail releases

    [ad_1]



    Hackers breach system responsible for New Orleans bond transactions, jail releases – CBS News










































    Watch CBS News



    A notorious ransomware group has claimed responsibility for a cyberattack at the Orleans Parish Sheriff’s Office. CBS News national reporter Kati Weis has the details.

    [ad_2]
    Source link

  • New Evite phishing scam uses emotional event invitations to target victims

    [ad_1]

    NEWYou can now listen to Fox News articles!

    I recently got an email from a friend with the subject “Special Celebration of Life.” It looked like a genuine Evite invitation. But when I clicked the “View Invitation” button, my antivirus software blocked the site, flagging it as a phishing attempt.

    It was one of the most convincing scam emails I’ve seen lately, complete with Evite branding, realistic design, and a personal touch. If I didn’t have strong antivirus protection, I might have walked right into it.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    Phishing email appears to be a legitimate Evite invitation titled “Special Celebration Of Life.” (Kurt “CyberGuy” Knutsson)

    How this Evite phishing scam works

    Scammers send fake Evite messages with emotionally charged subjects, such as a “Special Celebration of Life,” to lure you into clicking. These emails mimic Evite’s design so they appear to come from someone you know, lowering your guard.

    Woman using laptop in chair

    Scammers are sending fake Evite invitations that look personal and trustworthy. One click can expose a user’s personal data or install malware. (Kurt “CyberGuy” Knutsson)

    Clicking the malicious link can:

    • Steal your personal information
    • Capture your login credentials
    • Install malware on your device

    Because these invitations feel personal and urgent, they can bypass skepticism. Always verify sender details before opening event links, especially for sensitive occasions. 

    Person reviewing email inbox on laptop

    Always hover over links and check sender details before clicking, especially on invitations or urgent messages from unfamiliar sources. (Kurt “CyberGuy” Knutsson)

    Steps to protect yourself from fake Evite phishing scams

    Even the most convincing invitation can be a trap, as the fake Evite email I received proved. By following these steps, you can lower your chances of falling for similar scams and keep your personal information safe.

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

    1) Use strong antivirus software for real-time protection

    Strong antivirus software can stop you from landing on dangerous sites. In my case, the antivirus software blocked the fake Evite link and flagged it as phishing before any damage was done. Choose strong antivirus software with phishing detection and automatic blocking to protect against threats you might not spot yourself.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech 

    2) Check the sender’s email address carefully

    Scammers often use email addresses that look almost identical to legitimate ones, but with tiny changes, like an extra letter, a missing character, or a different domain extension. In my fake Evite example, the branding looked perfect, but the sender’s address didn’t match Evite’s official domain. Always double-check before trusting an email.

    HOW I ALMOST FELL FOR A MICROSOFT 365 CALENDAR INVITE SCAM

    3) Hover over links before clicking

    Before you click “You’re Invited!”, “View Invitation” or “RSVP Now,” hover your mouse over the link. Your email client will usually display the destination URL. In the phishing email I received, the link pointed to a suspicious domain, not Evite.com. In the phishing email I received, the link pointed to a suspicious domain, not Evite.com. If you look closely, you’ll see it was misspelled as “envtte.” If the address looks odd or unfamiliar, don’t click. 

    Fake Evite email with a red box highlighting a suspicious phishing link resembling Evite branding.

    A closer look reveals the fake link in this email that leads to a suspicious domain, not Evite.com. (Kurt “CyberGuy” Knutsson)

    4) Use a personal data removal service to limit your exposure

    The less personal information scammers can find about you online, the harder it is for them to target you. A personal data removal service can scrub your personal details, such as your phone number, home address, and email, from public databases. This reduces the risk of scammers crafting convincing, personalized phishing attempts like the fake Evite email I received.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES

     5) Verify with the sender directly before clicking

    If an invitation appears to come from a friend, don’t assume it’s real. Scammers often spoof the names of people you know. Send a quick text or make a phone call to confirm they actually sent the invite. In many cases, they’ll be just as surprised as you are to hear about it.

    What this means for you

    Phishing scams are evolving to look more authentic than ever. Even if the message seems to come from someone you trust, one careless click can put your personal data at risk. Having strong cybersecurity tools in place and knowing how to spot a scam is your best defense.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    I was lucky my antivirus software blocked this attack before any damage was done. But not everyone has that safety net. The next time an unexpected invitation or urgent message lands in your inbox, take a few extra seconds to verify before you click.

    Have you ever almost fallen for a fake event invite? What happened? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • This Chrome VPN extension secretly spies on you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Browser extensions promise convenience, but some take far more than they give. A new report from Koi Security says that FreeVPN.One, a Chrome extension with more than 100,000 installs and even a “Featured” badge, has been secretly taking screenshots of users’ browsing sessions.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS

    Google Chrome extension FreeVPN.One has allegedly taken screenshots of users’ sensitive information. (Kurt “CyberGuy” Knutsson)

    How FreeVPN.One secretly captured your browsing

    Once installed, FreeVPN.One didn’t just handle VPN traffic. It silently captured screenshots of every website you visited, bank logins, private photos, sensitive documents, and sent them to servers controlled by the developer.

    Even worse, the extension added permissions step by step, disguising its activity as “AI Threat Detection.” What looked like a useful feature became a tool for constant background surveillance.

    Why this Chrome extension threat is so dangerous

    People install VPNs to protect their privacy. Instead, this extension flipped that expectation on its head. By using Chrome’s and scripting permissions, FreeVPN.One gained access to every page you opened.

    Koi Security researchers tested the extension and confirmed it captured screenshots even on trusted sites like Google Photos and Google Sheets. The developer claimed these images were not stored, but offered no proof.

    MALICIOUS BROWSER EXTENSIONS CAUGHT SPYING ON 2 MILLION USERS

    Person looking at their computer screen.

    The screenshots were allegedly sent to the extension’s developer. (Kurt “CyberGuy” Knutsson)

    Warning signs of unsafe free VPN extensions

    There were red flags all along:

    • Awkward grammar and poorly written descriptions.
    • A generic Wix page as the only developer “contact.”
    • A promise of unlimited, free VPN service with no clear business model.

    While some free VPNs may work responsibly, most need a way to profit. If it isn’t by charging you, it may be by selling your data.

    FreeVPN.One developer’s response and Google’s removal

    When Koi Security published its findings, the developer behind FreeVPN.One offered a partial explanation. He claimed the automatic screenshot captures were part of a “Background Scanning” feature, intended only for suspicious domains. He also said the images weren’t stored, only briefly analyzed for threats.

    But researchers observed screenshots taken on trusted sites like Google Photos and Google Sheets, which don’t fit that explanation. When asked to provide proof of legitimacy, such as a company profile, GitHub repository, or professional contact, the developer stopped responding. The only public link tied to the extension led to a basic Wix starter page.

    FreeVPN.One has been removed from the Chrome Web Store. Attempts to visit its page now return the message: “This item is not available.”

    While the removal reduces the risk of new downloads, it also highlights a troubling gap. The extension spent months with spyware behavior while still carrying a verified label, raising questions about how thoroughly Chrome reviews updates to featured extensions.

    GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED

    A screenshot of the Microsoft Edge store

    FreeVPN.one is not available in the Microsoft Edge store (Koi Security)

    Steps to protect yourself from VPN extension spyware

    If you’ve installed FreeVPN.One or any suspicious Chrome VPN extension, take these steps if you are concerned for your cybersecurity:

    1) Uninstall immediately

    Go to ChromeWindowExtensions and click remove.

    2) Use a trusted VPN

    Stick to reliable VPN providers that have proven track records, audited policies, and transparent operations. By choosing a legitimate VPN, you take control of your privacy instead of handing it over to an anonymous developer. A reliable VPN is also essential for protecting your online privacy and ensuring a secure, high-speed connection.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN 

    3) Scan your device with strong antivirus software

    Run a trusted antivirus tool to check for hidden malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    4) Change your passwords

    Assume anything typed or viewed could have been logged. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your passwords have been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    5) Use a personal data removal service

    Extensions like FreeVPN.One show how easily your private details can be collected and exploited. Even after uninstalling spyware, your personal information may already be circulating on data broker sites that sell your identity to marketers, scammers, and even cybercriminals. A personal data removal service can scan for your information across hundreds of broker sites and automatically request its removal. This limits how much of your data can be weaponized if it’s ever exposed through an extension like this.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    6) Check permissions

    Before adding any extension, review what it requests. If a VPN wants access to “all websites,” that’s a red flag.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    FreeVPN.One is a reminder that “free” often comes at a hidden cost; your data. Don’t assume an extension is safe just because it looks popular or carries a badge. Be critical, vet carefully, and use privacy tools backed by real companies.

    Would you trade your browsing privacy for a free tool, or is it time to rethink the cost of “free”?  Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Hacker exploits AI chatbot in cybercrime spree

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A hacker has pulled off one of the most alarming AI-powered cyberattacks ever documented. According to Anthropic, the company behind Claude, a hacker used its artificial intelligence chatbot to research, hack, and extort at least 17 organizations. This marks the first public case where a leading AI system automated nearly every stage of a cybercrime campaign, an evolution that experts now call “vibe hacking.”

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    HOW AI CHATBOTS ARE HELPING HACKERS TARGET YOUR BANKING ACCOUNTS

    Simulated ransom guidance created by Anthropic’s threat intelligence team for research and demonstration purposes. (Anthropic)

    How a hacker used an AI chatbot to strike 17 targets

    Anthropic’s investigation revealed how the attacker convinced Claude Code, a coding-focused AI agent, to identify vulnerable companies. Once inside, the hacker:

    • Built malware to steal sensitive files.
    • Extracted and organized stolen data to find high-value information.
    • Calculated ransom demands based on victims’ finances.
    • Generated tailored extortion notes and emails.

    Targets included a defense contractor, a financial institution and multiple healthcare providers. The stolen data included Social Security numbers, financial records and government-regulated defense files. Ransom demands ranged from $75,000 to over $500,000.

    Why AI cybercrime is more dangerous than ever

    Cyber extortion is not new. But this case shows how AI transforms it. Instead of acting as an assistant, Claude became an active operator scanning networks, crafting malware and even analyzing stolen data. AI lowers the barrier to entry. In the past, such operations required years of training. Now, a single hacker with limited skills can launch attacks that once took a full criminal team. This is the frightening power of agentic AI systems.

    HOW AI IS NOW HELPING HACKERS FOOL YOUR BROWSER’S SECURITY TOOLS

    Webpage of AI generated ransom note

    A simulated ransom note template that hackers could use to scam victims. (Anthropic)

    What vibe hacking reveals about AI-powered threats

    Security researchers refer to this approach as vibe hacking. It describes how hackers embed AI into every phase of an operation.

    • Reconnaissance: Claude scanned thousands of systems and identified weak points.
    • Credential theft: It extracted login details and escalated privileges.
    • Malware development: Claude generated new code and disguised it as trusted software.
    • Data analysis: It sorted stolen information to identify the most damaging details.
    • Extortion: Claude created alarming ransom notes with victim-specific threats.

    This systematic use of AI marks a shift in cybercrime tactics. Attackers no longer just ask AI for tips; they use it as a full-fledged partner.

    GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

    A dark web page selling ransomware services

    A cybercriminal’s initial sales offering on the dark web seen in January 2025. (Anthropic)

    How Anthropic is responding to AI abuse

    Anthropic says it has banned the accounts linked to this campaign and developed new detection methods. Its threat intelligence team continues to investigate misuse cases and share findings with industry and government partners. The company admits, however, that determined actors can still bypass safeguards. And experts warn that these patterns are not unique to Claude; similar risks exist across all advanced AI models.

    How to protect yourself from AI cyberattacks

    Here’s how to defend against hackers now using AI tools to their advantage:

    1. Use strong, unique passwords everywhere

    Hackers who break into one account often attempt to use the same password across your other logins. This tactic becomes even more dangerous when AI is involved because a chatbot can quickly test stolen credentials across hundreds of sites. The best defense is to create long, unique passwords for every account you have. Treat your passwords like digital keys and never reuse the same one in more than one lock.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    2. Protect your identity and use a data removal service

    The hacker who abused Claude didn’t just steal files; they organized and analyzed them to find the most damaging details. That illustrates the value of your personal information in the wrong hands. The less data criminals can find about you online, the safer you are. Review your digital footprint, lock down privacy settings, and reduce what’s available on public databases and broker sites.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    Chinese hackers target US telecoms: What you need to know to protect your data

    Illustration of a hacker at work. (Kurt “CyberGuy” Knutsson)

    3. Turn on two-factor authentication (2FA)

    Even if a hacker obtains your password, 2FA can stop them in their tracks. AI tools now help criminals generate highly realistic phishing attempts designed to trick you into handing over logins. By enabling 2FA, you add an extra layer of protection that they cannot easily bypass. Choose app-based codes or a physical key whenever possible, as these are more secure than text messages, which are easier for attackers to intercept.

    4. Keep devices and software updated

    AI-driven attacks often exploit the most basic weaknesses, such as outdated software. Once a hacker knows which companies or individuals are running old systems, they can use automated scripts to break in within minutes. Regular updates close those gaps before they can be targeted. Setting your devices and apps to update automatically removes one of the easiest entry points that criminals rely on.

    5. Be suspicious of urgent messages

    One of the most alarming details in the Anthropic report was how the hacker used AI to craft convincing extortion notes. The same tactics are being applied to phishing emails and texts sent to everyday users. If you receive a message demanding immediate action, such as clicking a link, transferring money or downloading a file, treat it with suspicion. Stop, check the source and verify before you act.

    6. Use a strong antivirus software

    The hacker in this case built custom malware with the help of AI. That means malicious software is getting smarter, faster and harder to detect. Strong antivirus software that constantly scans for suspicious activity provides a critical safety net. It can identify phishing emails and detect ransomware before it spreads, which is vital now that AI tools make these attacks more adaptive and persistent.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

    Hacker typing code.

    Over 40,000 Americans were previously exposed in a massive OnTrac security breach, leaking sensitive medical and financial records. (Jakub Porzycki/NurPhoto via Getty Images)

    7. Stay private online with a VPN

    AI isn’t only being used to break into companies; it’s also being used to analyze patterns of behavior and track individuals. A VPN encrypts your online activity, making it much harder for criminals to connect your browsing to your identity. By keeping your internet traffic private, you add another layer of protection for hackers trying to gather information they can later exploit.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN

    CLICK HERE TO GET THE FOX NEWS APP  

    Kurt’s key takeaways

    AI isn’t just powering helpful tools; it’s also arming hackers. This case proves that cybercriminals can now automate attacks in ways once thought impossible. The good news is, you can take practical steps today to reduce your risk. By making smart moves, such as enabling two-factor authentication (2FA), updating devices, and using protective tools, you can stay one step ahead.

    Do you think AI chatbots should be more tightly regulated to prevent abuse? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Shamos malware tricks Mac users with fake fixes

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A dangerous new malware campaign is targeting Mac users worldwide. Security researchers at CrowdStrike uncovered Shamos, a new variant of the Atomic macOS Stealer (AMOS), developed by a cybercriminal group called COOKIE SPIDER.

    The attack relies on ClickFix tactics, where victims searching for Mac troubleshooting help are lured to fake websites or GitHub repositories. These spoofed sites trick users into copying and pasting a one-line command in Terminal, supposedly to fix an error. Instead, the command silently downloads Shamos, bypasses macOS Gatekeeper protections, and installs the malware.

    Once inside, Shamos searches for sensitive data, Apple Notes, Keychain items, browser passwords, and even cryptocurrency wallets. The stolen information is zipped and sent directly to attackers, often alongside additional malware like botnet modules or fake Ledger wallet apps.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER  

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Malicious sponsored results can be seen on Google search. (CrowdStrike)

    How Shamos malware spreads on macOS

    Cybercriminals distribute these fake “fixes” through so-called “malvertising” campaigns and spoofed tech help sites with names like mac-safer[.]com or rescue-mac[.]com. These pages pose as trusted troubleshooting guides and appear in search results for common Mac issues, such as “how to flush resolver cache.”

    The websites encourage victims to copy and paste commands that download malicious Bash scripts. These scripts grab the user’s password, remove file protections, and launch Shamos. With persistence tools installed, the malware can even restart alongside the system, keeping control long after the initial infection.

    CAPTCHAGEDDON SIGNALS A DANGEROUS SHIFT

    A fake Mac help page

    A fake help page provides victims with false instructions about how to fix problems with their Mac computer. (CrowdStrike)

    Tips to stay safe from Shamos malware

    You can avoid falling victim to Shamos and similar threats with these proactive steps:

    1) Never run commands you don’t understand

    Copy-pasting commands into Terminal may seem like an easy fix, but it’s also one of the easiest ways for attackers to bypass Apple’s built-in protections. If you see a command on a website, forum, or GitHub repository, don’t execute it unless you fully understand what it does. Instead, confirm with Apple’s official support site or the Apple Community forums, where experienced users and moderators can verify safe troubleshooting steps.

    2) Avoid sponsored results

    Hackers know that when your Mac has a problem, you’ll search for a quick solution. That’s why they buy sponsored ads like the one below to push fake troubleshooting websites higher in search results. Clicking the top link may feel natural, but it could be a trap. Stick with trusted sources like Apple Support, or scroll past the ads to find legitimate guides.

    CLICK HERE TO GET THE FOX NEWS APP 

    A fake webpage on how to fix a printer

    Fake instructions on how to fix printer issues on macOS. (CrowdStrike)

    3) Be wary of GitHub projects

    GitHub is an amazing resource for developers, but it’s also become a hotspot for malicious repositories that mimic legitimate software. Attackers often clone popular apps or tools, then hide malware inside. Before downloading anything, check the publisher’s name, stars, and activity history. If the account looks suspicious, inactive, or brand-new, avoid it.

    4) Use strong antivirus protection

    Mac malware is evolving fast, and Apple’s built-in security features can’t catch everything. A strong antivirus adds another layer of defense by scanning downloads, blocking malicious scripts, and detecting suspicious behavior in real time. Some security tools can even spot the one-line Terminal commands used by Shamos before they cause harm.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

    5) Use a personal data removal service

    Since Shamos is designed to steal personal information and send it to cybercriminals, reducing your online footprint can help limit the fallout. A personal data removal service scans data broker sites and removes your exposed information, making it harder for attackers to resell or exploit it after a breach. While this won’t stop malware from stealing what’s on your Mac, it adds another layer of protection by minimizing the data criminals can use against you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan 

    6) Keep macOS updated

    Apple regularly patches vulnerabilities in macOS that malware tries to exploit. By keeping your system up to date, you close the doors that attackers rely on. Enable automatic updates, so your Mac receives the latest patches as soon as they’re available. Pairing this with good digital hygiene, like avoiding shady downloads, dramatically lowers your risk of infection.

    Kurt’s key takeaways

    Cybercriminals know that when your Mac breaks, you’ll look for quick answers. Shamos takes advantage of that urgency by disguising itself as help. Staying safe means slowing down before you copy, paste, or download anything. If something feels off, it probably is.

    Should Apple be doing more to protect Mac users from evolving threats like Shamos? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Kim Dotcom loses latest bid to avoid U.S. extradition on Megaupload charges

    [ad_1]

    Wellington, New Zealand — A New Zealand court has rejected the latest bid by internet entrepreneur Kim Dotcom to halt his deportation to the United States on charges related to his file-sharing website Megaupload.

    Dotcom had asked the High Court to review the legality of an official’s August 2024 decision that he should be surrendered to the U.S. to face trial on charges of copyright infringement, money laundering and racketeering. It was the latest chapter in a protracted 13-year battle by the U.S. government to extradite the Finnish-German millionaire from New Zealand.

    The Megaupload founder had applied for what in New Zealand is called a judicial review, in which a judge is asked to evaluate whether an official’s decision was lawful.

    Internet mogul Kim Dotcom leaves with his girlfriend Elizabeth Donelly following his extradition appeal at the High Court in Auckland, New Zealand, in an Aug. 29, 2016 file photo.

    KATE DWEK/AFP/Getty


    A judge on Wednesday dismissed Dotcom’s arguments that the decision to deport him was politically motivated and that he would face grossly disproportionate treatment in the U.S. In a written ruling, Justice Christine Grice also rejected Dotcom’s claim that New Zealand’s police were wrong to charge his business partners, but not him, under domestic laws – which likely yielded laxer sentences than if the men had been tried in the U.S.

    The latest decision could be challenged in the Court of Appeal, where a deadline for filing is Oct. 8. It wasn’t immediately clear if Dotcom would do so.

    One of his lawyers, Ron Mansfield, told Radio New Zealand that Dotcom’s team had “much fight left in us as we seek to secure a fair outcome,” but he didn’t elaborate.

    Neither Dotcom nor Mansfield responded to a request for comment from The Associated Press on Thursday.

    New Zealand’s government hasn’t disclosed what will happen next in the extradition process or divulged an expected timeline for Dotcom to be surrendered to the United States.

    The saga stretches back to the January 2012 arrest by New Zealand authorities of Dotcom in a dramatic raid on his Auckland mansion, along with other company officers, at the request of the FBI. U.S. prosecutors said Megaupload raked in at least $175 million, mainly from people who used the site to illegally download songs, television shows and movies, before the FBI shut it down earlier that year.

    Lawyers for Dotcom and the others arrested argued that it was the users of the site, founded in 2005, who chose to pirate material, not its founders. But prosecutors said the men were the architects of a vast criminal enterprise, with the Department of Justice describing it as the largest criminal copyright case in U.S. history.

    He has been free on bail in New Zealand since February 2012.

    Interviewed at his sprawling home by 60 Minutes in 2014, Dotcom told correspondent Bob Simon that he was inspired to seek his riches by the James Bond movies, “where, you know, some characters had private islands and super tankers converted into yachts and space stations and underwater homes. So, you know, I got inspired by that.”

    “But you’re not playing James Bond, you’re playing Dr. No,” suggested Simon.

    “That’s what everybody says,” replied the web entrepreneur.

    Dotcom and his business partners fought the FBI’s efforts to extradite them for years, including by challenging New Zealand law enforcement’s actions during the investigation and arrests. In 2021, however, New Zealand’s Supreme Court ruled that Dotcom and two other men could be surrendered.

    Under New Zealand law, it remained up to the country’s justice minister to decide if the extradition should proceed. The minister, Paul Goldsmith, ruled in August 2024 that it should.
       
    But by then, Dotcom was the only person whose fate remained in question. Two of his former business partners, Mathias Ortmann and Bram van der Kolk, pleaded guilty to charges against them in a New Zealand court in June 2023 and were sentenced to two and a half years in jail.

    In exchange, U.S. efforts to extradite them were dropped. Part of Dotcom’s latest legal bid challenged the police decision not to extend a plea deal under New Zealand laws to him, too.

    Grice rejected that, saying the choice to only charge Ortmann and van der Kolk in New Zealand was “a proper exercise of the Police’s discretion.” The jurist also dismissed Dotcom’s claim that Goldsmith’s extradition decision was politically motivated.

    Prosecutors earlier abandoned their extradition bid against a fourth Megaupload officer, Finn Batato, who was arrested in New Zealand. Batato returned to Germany, where he died from cancer in 2022.

    In November 2024, Dotcom said in a post on X that he had suffered a stroke. He wrote on X in July that he was making “good progress” in his recovery but still suffered from speech and memory impairments.

    Goldsmith’s decision that Dotcom should be extradited was made before the stroke. But Grice said the minister had considered other “significant health conditions” Dotcom faced and wasn’t wrong to conclude that these shouldn’t prevent him from being deported.

    [ad_2]

    Source link

  • How to safeguard your credit score in retirement as fraud and identity theft rise among seniors

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’ve worked hard, saved smart, and now it’s time to enjoy your retirement years. But here’s the catch: your credit score still matters, even when you’re no longer applying for mortgages, car loans or new credit cards. Why? Scammers know many seniors don’t monitor their credit very often, and that makes retirees prime targets for identity theft. Due largely to increased scam attempts, financial losses for seniors reached $4.9 billion in 2024. And anyone can become a target. The good news is there are simple, powerful steps you can take right now to lock down your credit score and make sure your hard-earned nest egg is safe.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Why your credit score matters in retirement

    A lot of people assume that once they stop working, their credit score doesn’t matter anymore. After all, you’re not buying a new house or car, right? Not so fast. Your credit score can still affect:

    • Insurance premiums. Some insurers factor your credit into your rates.
    • Retirement community applications. Senior housing and assisted living facilities often run credit checks.
    • Loan approvals. You may still need financing for medical bills, home repairs or emergencies.
    • Identity theft risk. A clean, unused credit file is like a blank check to a scammer.

    The hands of Karin Seelmann, a 70-year-old participant of a computer course for seniors, handle the keyboard of a laptop in Hanover, Germany, Feb. 21, 2017. (Peter Steffen/picture alliance)

    Keeping your credit score safe is about protecting both your financial reputation and your retirement savings.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Step 1: Monitor your credit regularly

    Even if you’re not applying for credit, you should know what’s in your file. Seniors are often the last to find out when a scammer has taken out a loan or opened a card in their name. The three big credit bureaus, Equifax, Experian and TransUnion, are required to give you a free report once a year. Here’s the trick: thanks to recent changes, you can now get a free weekly credit report at AnnualCreditReport.com. Set a calendar reminder to check your reports once a month. Look for accounts you don’t recognize, suspicious credit inquiries or sudden drops in your score.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    man writing in journal next to laptop while sittign at table

    A man looking into his retirement matters. (Kurt “CyberGuy” Knutsson)

    Step 2: Place a fraud alert

    If you suspect you’ve been targeted, a fraud alert makes it harder for identity thieves to open new accounts in your name. It tells creditors they need to take extra steps to verify your identity before approving anything.

    • A fraud alert is free.
    • It lasts for one year (you can renew it).
    • You only need to contact one bureau. They’ll notify the others.

    This is a great first line of defense if you’ve received scam calls, phishing emails or notice odd activity in your accounts. 

    woman types on laptop while sitting at table

    A woman looking up her credit score on a laptop. (Kurt “CyberGuy” Knutsson)

    Step 3: Freeze your credit (the gold standard)

    A credit freeze is the single most powerful tool retirees have to protect their credit score. Also, it’s completely free. Here’s why you should do it today:

    • It blocks anyone from opening new credit in your name.
    • It doesn’t affect your current accounts, score or benefits.
    • You can unfreeze it anytime if you need new credit.

    Since most retirees don’t apply for new loans often, a credit freeze is a “set it and forget it” safeguard. Think of it as putting your credit file in a vault.

    How to do it:

    • Contact Equifax, Experian and TransUnion individually (you’ll need to freeze your credit with each one).
    • Provide proof of identity (usually SSN, date of birth and address).
    • Keep the PIN or password they give you; you’ll need it if you ever want to lift the freeze.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    woman sitting on couch typing on laptop

    A woman looking into her retirement matters on her laptop. (Kurt “CyberGuy” Knutsson)

    Step 4: Lock down your personal data online

    Here’s something many seniors don’t realize: even if your credit is frozen, scammers can still target you through other leaks of personal information.

    Data brokers publish your name, address history, phone numbers, relatives and even property records online. Scammers use this information to:

    • Impersonate family members in “grandparent scams.”
    • Craft convincing phishing messages.
    • Trick banks or creditors with stolen details.

    That’s why removing your personal information from these sites is just as important as freezing your credit. Doing it manually means tracking down dozens (sometimes hundreds) of data broker websites and sending formal removal requests and repeating the process every few months as your info pops back up.

    Data removal services can handle this automatically, requesting removals from dozens of data brokers at a time and monitoring for re-uploads. It’s one of the simplest ways to cut off scammers at the source and keep your retirement profile off the web.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5 STEPS TO PROTECT YOUR FINANCES FROM FAMILY SCAMS

    Step 5: Watch for warning signs of identity theft

    Even with strong protections in place, it pays to stay alert. Here are a few red flags to watch for:

    • Bills or medical statements for services you never used
    • Collection calls about debts that aren’t yours
    • New credit cards or loans arriving in your mail
    • Denials for credit or insurance you didn’t apply for
    • A sudden, unexplained drop in your credit score.

    If you see any of these, act fast: file a report at IdentityTheft.gov, contact your bank or creditors and double-check that your credit freeze is active.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Retirement should be about peace of mind; you’ve earned your retirement. Protecting your credit score may not be the most exciting task on your to-do list, but it’s one of the smartest. By monitoring your credit, freezing your file, removing your data from broker sites and staying alert for red flags, you can keep scammers out of your finances and focus on enjoying the retirement you deserve. Want to take one major worry off your list? Start by having your personal information automatically pulled from the internet. It’s an easy way to reduce your digital footprint and keep your credit and your retirement fund safe.

    Should more be done to protect retirees from identity theft and financial scams? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • FBI warns of QR code scam disguised in mystery packages

    [ad_1]

    NEWYou can now listen to Fox News articles!

    QR codes that were once seen as a convenient shortcut for checking menus or paying bills have increasingly been turned into weapons. Fake delivery texts, counterfeit payment links and malicious codes pasted over legitimate ones have all become part of the modern fraud playbook.

    The latest warning from federal authorities shows just how far these tactics have gone. Criminals are now mailing out packages that people never ordered. Inside these boxes is a QR code that, when scanned, can lead to stolen personal details, drained bank accounts or malware running silently in the background of a phone.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    QR CODE SCAMS RISE AS 73% OF AMERICANS SCAN WITHOUT CHECKING

    What you need to know about the QR code scam

    The scheme is a twist on what is known as a brushing scam. Traditionally, brushing scams involved online sellers sending products to strangers and then using the recipient’s details to post fake reviews. It was more of a nuisance than a serious crime.

    An Amazon package with a QR code. (Lindsey Nicholson/UCG/Universal Images Group via Getty Images)

    Now the practice has shifted from harmless free items to deliberate fraud. Instead of receiving a product, many victims find only a printed QR code. Once scanned, the code redirects them to fraudulent websites that ask for sensitive personal information, such as banking information, credit card numbers or login credentials. Some codes go a step further and install malicious software designed to track activity and steal data directly from the device.

    “The FBI warns the public about a scam variation in which criminals send unsolicited packages containing a QR code that prompts the recipient to provide personal and financial information or unwittingly download malicious software that steals data from their phone,” the agency said in a public notice. “To encourage the victim to scan the QR code, the criminals often ship the packages without sender information to entice the victim to scan the QR code.”

    WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL

    Why QR codes appeal to scammers

    QR codes have become common in everyday life. They are used in restaurants, stores, airports, on polls and payment systems and most people scan them without a second thought. Unlike suspicious links that can be spotted, a QR code reveals nothing until it is scanned.

    That makes it a perfect disguise for a scam. The setup is simple: a package arrives with no sender information and no explanation. The mystery sparks curiosity, and many people scan the code to figure out who sent it. That moment of curiosity is what the scammers rely on.

    A woman scanning a QR code on a building

    Taylor Swift fans gather outside a building where a mural featuring a large QR code was being painted to promote Swift’s latest album, “The Tortured Poets Department,” on April 17, 2024, in Chicago. (Scott Olson/Getty Images)

    The consequences can be serious. Fake websites may harvest names, addresses and financial details. Malware may silently monitor accounts, log keystrokes or even target cryptocurrency wallets. Victims often do not notice until they see unauthorized charges or suspicious withdrawals. By then, their information may already be in the hands of criminals.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    7 ways to stay safe from QR code scams

    Scammers rely on curiosity and convenience to trick people into scanning malicious QR codes. A few simple habits can help you avoid becoming a target. Here are seven ways to stay safe from QR code scams.

    1) Be cautious with unsolicited QR codes and use strong antivirus software

    Avoid scanning QR codes from mystery deliveries, random flyers or stickers on public signs. A QR code is just a disguised link, and until you know where it leads, it shouldn’t be trusted. To stay safe even if you accidentally scan a risky code, keep strong antivirus software on your phone. Mobile security apps can block fraudulent sites, warn you before downloads and protect against malicious QR code attacks.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Stick to trusted sources

    Only scan QR codes from businesses and organizations you already trust. Examples include your bank’s mobile app, an airline boarding pass or a known retailer’s checkout page. If you wouldn’t click a random link in a text message, don’t scan a random QR code either.

    3) Preview links before opening

    Most phones let you press and hold a QR code link to preview where it goes. If the URL looks suspicious, with misspellings, random numbers or shortened links, don’t open it. Taking a second to check can save you from a phishing trap. 

    A man holding a package

    Scammers are sending fake packages with QR codes that trick recipients into scanning and giving criminals access to their personal data. (Kurt “CyberGuy” Knutsson)

    4) Limit your digital footprint

    The less personal data available about you online, the harder it is for scammers to target you with convincing fraud attempts. Consider using data removal services that scrub your information from people-search sites and marketing databases. This reduces the chances that your address or phone number ends up in the wrong hands and is connected to a scam package.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Enable two-factor authentication (2FA)

    Even if your login details are stolen, 2FA makes it harder for criminals to access your accounts. By requiring a secondary code sent to your phone or generated through an authenticator app, 2FA helps prevent unauthorized logins to your banking, email and trading accounts.

    6) Keep your device updated

    Software updates often contain fixes for security vulnerabilities that scammers try to exploit. Running the latest version of your phone’s operating system, as well as updating apps regularly, gives you stronger protection against malware that can be delivered through a malicious QR code.

    7) Report suspicious activity

    If an unexpected package arrives at your door with a QR code inside, do not simply throw it away. Report it to local authorities and consider filing a complaint with the FBI’s Internet Crime Complaint Center. Reporting not only helps protect you, but it also gives law enforcement more information to track how these scams are spreading.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    This scam might not be everywhere yet, but it shows just how quickly criminals adapt to new technology. QR codes were meant to make life easier, and most of the time they do, but that same convenience can turn into a weakness when people let curiosity override caution. The lesson here is that a mystery package with a QR code is not some fun puzzle to figure out. It is a red flag. The safest move is to step back, resist the urge to scan and if something feels off, report it instead of interacting with it.

    Have you ever scanned a QR code without thinking twice about where it might lead? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Passwords Won’t Secure Your Identity. Here’s What Will. | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Our lives have migrated to a virtual world to the point where our emails have become an entry point to our identity. Medical records, employment history, education, world views and all that comes to mind, which pertains to who we are as people, likely have some form of digital footprint that can be traced back to us. While this can translate to seamless convenience, whether personalized recommendations or quick product deliveries, there remains a risk of exposure that threat actors constantly exploit.

    The tech titans who handle our data and boast a robust security infrastructure are the same ones who lost control of our data. With 16 billion Apple, Facebook, Google and other passwords leaked, a large question mark looms over the reliability of traditional security systems. The centralized databases and login processes of yesteryear are simply unable to keep up with today’s increasingly sophisticated cyber threats. Our passwords and two-factor authentication fall short in securing our digital identities.

    Related: Why Businesses Should Implement Passwordless Authentication Right Now

    Digitization outpacing security

    Digitization has become deeply entrenched in the fabric of how we operate as a society on a global scale, with 5.56 billion people online today and 402.74 million terabytes of data generated on a daily basis. The dizzying numbers demonstrate the breakneck speed with which every aspect of our lives has taken a virtual shape, and with it, the proliferation of the conversation about how we secure the digital world we have created.

    With the current security measures in use, cybercrime is expected to cost over $639 billion in the United States this year, with the costs expected to balloon as far as $1.82 trillion by 2028. In light of such projected costs, the development of a secure infrastructure is a priority that requires immediate attention, one that could compromise digital identity if disregarded.

    Decentralize to prevent compromise

    The centralized databases of tech titans mean that there is one location, one source of truth, that if compromised, all that it contains is leaked, as was the case with the passwords that were leaked. If not a leak, then a ransomware attack that disrupts the systems on which our digital lives operate. This kind of disruption can cascade to fundamental services such as healthcare, as a recent ransomware attack caused a system-wide tech outage at a large network of medical centers in Ohio, cancelling inpatient and outpatient procedures.

    Centralization’s single point of failure calls for a shift in how to operate tech infrastructures — a shift to decentralized data storage. Unlike centralized systems, blockchain networks distribute data across a large multitude of nodes that are in constant verification of one another through cryptographic consensus. To verify the data, the majority of nodes must be in agreement, a majority that rejects tampered “blocks” or compromised nodes. This means that there is no single repository that can be compromised, as attackers would need to compromise the majority of the nodes, a task immensely more challenging than the common compromise of a centralized server.

    Related: Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

    Use the physical to verify the virtual

    The beauty of blockchain technology is its ownership element. As everything is secured by cryptography, the only way to “decrypt” the data and access it is through your own private keys. However, if a threat actor is to gain access to your private keys, they also gain access to your data and funds, posing a threat that puts in question how secure the shift from centralized to decentralized storage really is.

    If a private key is proof of one’s identity, then its loss equates to the loss of one’s digital identity, a compromise that can only be secured by undeniable proof that the owner of the keys is indeed who they claim to be. This is where biometric authentication becomes the final piece in the puzzle of securing one’s digital identity in a decentralized infrastructure.

    Using one’s fingerprint in an offline environment for identity verification not only ensures ownership of data and its security but also prevents the exposure of biometric data to a server where it could be breached. This creates a new paradigm that deems passwords and two-factor authentication obsolete. Building on such a methodology opens pathways for a secure digital identity and KYC verification on a decentralized infrastructure, leaving no room for threat actors to compromise digital identities.

    The conversation on digital security is the result of an absolute necessity in the face of increasingly sophisticated cyber attacks. However, adding uppercase letters, symbols and numbers to your password will not be enough. The added layer of two-factor authentication will not be enough either. More steps do not equate to more security. The future of security lies in an infrastructure shift from the centralized to the decentralized, protected by a layer of biometric authentication that ensures that one’s digital identity is secured.

    Our lives have migrated to a virtual world to the point where our emails have become an entry point to our identity. Medical records, employment history, education, world views and all that comes to mind, which pertains to who we are as people, likely have some form of digital footprint that can be traced back to us. While this can translate to seamless convenience, whether personalized recommendations or quick product deliveries, there remains a risk of exposure that threat actors constantly exploit.

    The tech titans who handle our data and boast a robust security infrastructure are the same ones who lost control of our data. With 16 billion Apple, Facebook, Google and other passwords leaked, a large question mark looms over the reliability of traditional security systems. The centralized databases and login processes of yesteryear are simply unable to keep up with today’s increasingly sophisticated cyber threats. Our passwords and two-factor authentication fall short in securing our digital identities.

    Related: Why Businesses Should Implement Passwordless Authentication Right Now

    The rest of this article is locked.

    Join Entrepreneur+ today for access.

    [ad_2]

    Venket Naga

    Source link

  • Columbia University data breach hits 870,000 people

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Columbia University recently confirmed a major cyberattack that compromised personal, financial and health-related information tied to students, applicants and employees. The victims include current and former students, employees and applicants. Notifications to affected individuals began Aug. 7 and are continuing on a rolling basis.

    Columbia, one of the oldest Ivy League universities, discovered the breach after a network outage in June. According to Columbia, the disruption was caused by an unauthorized party that accessed its systems and stole sensitive data. Investigators are still assessing the full scope of the theft.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

    Students on the campus of Columbia University April 14, 2025, in New York City. (Charly Triballeau/AFP via Getty Images)

    What information was stolen?

    According to a breach notification filed with the Maine Attorney General’s office, nearly 869,000 individuals were affected by the Columbia breach. This number includes students, employees, applicants and, in some cases, family members. Media outlets also reported that the threat actor claimed to have stolen approximately 460 gigabytes of data from Columbia’s systems.

    Columbia confirmed that the stolen information relates to admissions, enrollment and financial aid records, as well as certain employee data. The categories of exposed information include:

    • Names, dates of birth and Social Security numbers
    • Contact details and demographic information
    • Academic history and financial aid records
    • Insurance details and certain health information

    Columbia emphasized that patient records from Columbia University Irving Medical Center were not affected. Still, the breadth of stolen data poses serious risks of identity theft and fraud.

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    Columbia University campus

    Columbia University campus (Luiz C. Ribeiro for New York Daily News/Tribune News Service via Getty Images)

    Columbia University response

    Columbia has reported the incident to law enforcement and is working with cybersecurity experts. The university said it has strengthened its systems with new safeguards and enhanced protocols to prevent future incidents.

    Starting Aug. 7, Columbia began mailing letters to those affected, offering two years of complimentary credit monitoring, fraud consultation and identity theft restoration services.

    When contacted, Columbia referred CyberGuy to its official community updates, published June 24 and Aug. 5.

    While the university says there is no evidence that the stolen data has been misused so far, the risk remains high. Criminals often wait months before exploiting stolen data.

    NEARLY A MILLION PATIENTS HIT BY DAVITA DIALYSIS RANSOMWARE ATTACK

    A computer with binary code

    Columbia University says a June network outage is to blame for the breach. (Silas Stein/picture alliance via Getty Images)

    Steps to protect yourself after the Columbia University breach

    If you are among those affected or simply want to safeguard your data, take these steps today:

    1) Monitor your credit reports

    Check your credit reports regularly through AnnualCreditReport.com. Look for accounts you did not open or changes you did not authorize. 

    2) Use a personal data removal service

    Since Columbia confirmed that stolen files may include names, addresses and demographic details, consider using a personal data removal service. These services help scrub your information from data brokers and people search sites, making it harder for criminals to exploit exposed details. This step reduces the chance that stolen Columbia records are linked to your broader online identity.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    3) Set up fraud alerts and freezes

    Placing a fraud alert makes it harder for identity thieves to open accounts in your name. A credit freeze offers even stronger protection by blocking new credit applications.

    4) Use strong and unique passwords

    Create long, complex passwords for each account. A password manager can help generate and securely store them.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    5) Enable two-factor authentication

    Turn on two-factor authentication (2FA) wherever possible. This extra layer of security helps protect your accounts even if a password is stolen.

    6) Watch for phishing attempts and use strong antivirus software

    Scammers may try to exploit fear around the breach with fake emails or texts. Verify any message before clicking links or sharing personal information.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com/LockUpYourTech 

    7) Consider identity theft protection services

    Beyond the free credit monitoring Columbia offers, additional paid services can help track your data across the dark web and provide extra safeguards.

    Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    The Columbia University breach shows how even trusted institutions are vulnerable to cyberattacks. Because the investigation is ongoing and notifications will continue through the fall, individuals should remain on high alert. With so much personal, financial and health information exposed, staying alert long after the headlines fade is critical.

    What more should universities and large institutions be required to do to safeguard the personal data of the people who trust them? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Notorious people search site returns after massive breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Over a year ago, National Public Data (NPD) made headlines for one of the largest breaches in history. The people search site exposed the personal information of 3 billion individuals. After disappearing from the internet, the site has returned under new ownership, sparking fresh concerns about privacy.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Who owns National Public Data now?

    NPD has relaunched under Perfect Privacy LLC, a company that sounds protective but is not affiliated with the VPN service of the same name. Despite the new name behind the scenes, the business model has not changed. The site still allows anyone to look up personal data about friends, relatives or strangers with just a name.

    MAJOR DATA BROKER HACK IMPACTS 364,000 INDIVIDUALS’ DATA

    Although NPD includes disclaimers about the Fair Credit Reporting Act (FCRA), nothing prevents users from misusing this data when making decisions about employment, housing or credit.

    National Public Data, a people search site, exposed the personal information of 3 billion individuals in one of the largest breaches ever. (NPD)

    Accuracy issues and data sources

    According to NPD, the data comes from public records, property ownership databases, social media and government agencies. The company claims to verify and filter this information to ensure it is accurate and up to date. However, users may find that profiles still contain mistakes.

    A quick test search revealed a mix of outdated and accurate information. The site struggled with hyphenated names but pulled up correct details in other cases.

    We reached out to NPD for a comment but did not hear back before our deadline.

    A woman types on a laptop on a wooden table.

    A woman searches for herself online. (Kurt “CyberGuy” Knutsson)

    How to remove your information from NPD

    If you prefer not to have your information available on NPD’s site, you can request removal directly:

    • Search your name on nationalpublicdata.com.
    • Open your profile and copy its URL.
    • Visit nationalpublicdata.com/optout.html.
    • Paste the URL into the “Your Profile Link” field.
    • Enter your email address to confirm deletion.

    Keep in mind that each profile needs its own request and confirmation email. After you submit, check back in a few days to make sure your data is actually gone.

    Pro tip: Use an alias or disposable email address for these requests. This makes it easier to track confirmations and keeps your main inbox clear.

    For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com.

    The opt-out page of the National Public Data site

    NPD offers an opt-out function for users who prefer not to have their information available on the site. (NPD)

    Why NPD is only part of the problem

    Removing your information from National Public Data is only the beginning. Dozens of other people search sites may still display your personal details. Many of these platforms pull from the same public databases, which means your address, phone number or relatives’ names can keep reappearing.

    The return of NPD shows how quickly data can resurface online. A breach may fade from the headlines, but the exposed information rarely disappears. To protect your privacy, you need a broader plan.

    1) Regularly check for your data

    Start by searching for your name on people search engines several times a year. Look beyond NPD. Sites like Whitepages, Spokeo and Radaris often host similar data. Regular checks help you spot new profiles before they spread further.

    STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE

    2) Use a personal data removal service

    A removal service can save time by scanning hundreds of databases at once. These services request opt-outs on your behalf and track new listings. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    3) Monitor your accounts closely and use strong antivirus software

    Protecting your privacy goes beyond deleting profiles. Keep an eye on your bank statements, credit reports and online accounts. Criminals can use exposed data for phishing attempts, fake loan applications or identity theft. Monitoring activity gives you an early warning if something looks suspicious.

    The best way to safeguard yourself from malicious links that install malware, which could potentially access your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    4) Set up alerts for your identity

    Many banks and credit monitoring services let you create alerts for suspicious activity. You can also set up free fraud alerts with the credit bureaus. These warnings tell lenders to take extra steps to verify your identity before issuing new credit.

    Identity theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com.

    5) Remove data at the source

    People search sites often pull records from government databases. Review your local county’s property, court or voter registration records. Some jurisdictions allow you to request redactions or limit what is shown online.

    6) Lock down your social media

    Since NPD and similar sites scrape from social media, tighten your privacy settings. Limit what strangers can see on Facebook, LinkedIn and other platforms. The less public information you share, the less these databases can collect.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    The return of National Public Data is a reminder that your personal information can resurface at any time. Even if you remove yourself from one site, dozens more may still hold your details. That is why protecting your privacy requires more than a quick opt-out. With regular checks, credit freezes and stronger account monitoring, you can reduce your risk and stay one step ahead.

    Do you think stronger laws should be in place to stop companies from collecting and selling personal data, or is it up to individuals to protect themselves? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Don’t use your home Wi-Fi before fixing certain security risks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Home Wi-Fi networks are the backbone of how most people get online, connecting laptops, phones, smart TVs and more. When properly secured, they offer a convenient and private way to browse the internet, stream content and work from home. But “private” doesn’t always mean “safe.” Wi-Fi security can be easily compromised if you have weak settings or outdated equipment.

    I recently heard from Carol in Smithtown, New York, who asked, “Is it safe to browse the internet on your own laptop using only your home Wi-Fi?”

    Her question points to a bigger concern. Many of us rely on home networks every day without really knowing if they’re as secure as they should be.

    Let’s break down what makes a home Wi-Fi network secure, the risks you should know about and the steps you can take to protect your privacy.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my Cyberguy.com newsletter.

    A user troubleshoots an internet router. (Kurt “CyberGuy” Knutsson)

    Why home Wi-Fi security is important

    Your home Wi-Fi is not just a way to get online but also the gateway to your personal and professional life. Everything from online banking to work emails to video calls passes through it. If your network isn’t secure, that information could be intercepted or exposed.

    One of the biggest misconceptions is that a home network is safe simply because it’s private. In reality, hackers often target residential networks because they tend to have weaker defenses than corporate ones.

    Someone nearby could connect to your network if your password is weak or your encryption is outdated. This not only slows your internet but also lets them use your connection for illegal activities. Sensitive information like passwords, credit card numbers and personal documents can be intercepted if the network is compromised.

    11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

    Attackers can use an insecure network to push malicious software onto your devices, sometimes without you even realizing it. Smart devices such as security cameras, thermostats and speakers can be taken over and used for spying or as part of larger cyberattacks.

    Even if you trust everyone in your household, your network is still exposed to risks from outside. And with so many devices connected today, including laptops, phones, tablets, TVs and IoT gadgets, there are more entry points for an attacker than ever before. Securing your Wi-Fi closes those doors before someone decides to try them. 

    Illustration of a hacker at work

    A hacker executes cybercrime. (Kurt “CyberGuy” Knutsson)

    Choose the right router for Wi-Fi protection

    Every piece of Wi-Fi security advice ultimately comes back to the same foundation: your router. It is the gatekeeper for your entire home network. If it is old, poorly configured, or missing important updates, even the strongest passwords and best digital habits will not fully protect you.

    Investing in a good router is one of the most important steps you can take to secure your home Wi-Fi. A modern, well-supported router gives you stronger encryption, better control over connected devices and regular updates that patch security flaws.

    Don’t stop at the hardware itself. Check regularly for firmware updates from the manufacturer. Some new routers update automatically, but many require you to log in and install patches manually. Outdated firmware leaves known vulnerabilities wide open.

    IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN

    Also, change the default router login password immediately. Most routers ship with basic credentials like “admin/admin.” Attackers know this and can easily hijack your settings if you never change them.

    If your router supports it, enable two-factor authentication (2FA) for logins. This extra step makes it much harder for attackers to gain control, even if they steal your password.

    If you are not sure where to begin, I have put together a list of some of the best and most secure routers you can buy right now by visiting Cyberguy.com.

    Enable strong Wi-Fi encryption

    Encryption ensures that the data flowing across your network is scrambled, making it useless to anyone who tries to intercept it. Without proper encryption, nearby attackers can capture and read your traffic.

    The current gold standard is WPA3, which provides the strongest protection. If your router doesn’t support it, WPA2 is still considered safe and widely used. Older options like WEP or an open, password-free network are highly insecure and should be avoided at all costs. It’s worth logging into your router’s settings just to confirm what level of encryption your network is using.

    Image of a home router in use

    Cables run out of an internet router. (Kurt “CyberGuy” Knutsson)

    Create a strong Wi-Fi password

    Your Wi-Fi password is the digital equivalent of the key to your home. A short or predictable password is like leaving a spare under the doormat, and anyone determined enough can find a way in. Instead, create a long passphrase that combines upper and lowercase letters, numbers and symbols. Aim for at least 12 to 16 characters.

    Consider using a password manager to generate and store complex passwords.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    Check who is connected to your network

    Even with a solid password, it’s smart to check who is actually connected to your network. Most routers allow you to view a list of active devices. If you spot something you don’t recognize, investigate. It could be a neighbor piggybacking on your connection or, in the worst case, an intruder.

    It also helps to disable Wi-Fi Protected Setup (WPS). This feature was designed to make connecting new devices easier, but it has security flaws that attackers can exploit. Some users go further by enabling MAC address filtering, which limits access to specific devices.

    To reduce risk even more, set up a separate guest network for smart devices and visitors. That way, if one device gets hacked, your laptops and phones remain protected.

    And remember, keep all your devices updated. From laptops and phones to smart bulbs and thermostats, every gadget is a potential entry point. A weak link in one device can put your entire network at risk.

    IS YOUR PHONE HACKED? HOW TO TELL AND WHAT TO DO

    Protect your privacy with a VPN

    A Virtual Private Network, or VPN, helps solve one of the biggest issues with online privacy, which is who can see what you’re doing. When you connect through a VPN, it creates an encrypted tunnel between your device and the websites or apps you use. Everything that travels through this tunnel is hidden from outsiders, including your internet provider.

    A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com. 

    Don’t overlook antivirus protection

    While your Wi-Fi settings form the first line of defense, you should also protect the devices connected to your network. Install strong antivirus software to block malware that could spread through downloads, emails, or malicious links. This extra step ensures that even if a threat slips past your router’s defenses, your devices stay protected.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaway

    So, to return to Carol’s question: Is it safe to browse the internet on your home Wi-Fi? The answer is yes, but only if you take the time to secure it. Strong router settings, proper encryption and a solid password do most of the heavy lifting. Building habits such as checking who is connected, keeping devices updated and using tools like a VPN adds even greater peace of mind.

    When was the last time you checked your router settings or updated its firmware? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my Cyberguy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Parenting 101: 5 Lessons to keep kids safe online for the new school year

    [ad_1]

    The back-to-school season is exciting – new knowledge, new digital tools, and new discoveries. But it also brings higher cybersecurity risks for both schools and children. Cybersecurity experts are urging children, parents, and school communities to stay extra alert during this period.

    “The back-to-school period requires additional efforts to keep children and school communities safe online. A new beginning means new digital tools, online searches, and registrations for learning platforms. All of that increases cyber risks that must be taken seriously,” said Karolis Arbačiauskas, head of product at NordPass, in a media release

    A new study by NordPass, in collaboration with NordStellar, reveals a worrying truth: many educational institutions are still using shockingly weak passwords to protect sensitive data. Entries like “123456”, “Edifygroup@1”, and “principal@2021” appeared frequently, showing a widespread reliance on predictable or outdated credentials that are easy for hackers to guess.

    This is why the back-to-school season is the perfect moment to talk to children about cyber hygiene – the dos and don’ts in digital environments – and to help them build strong habits for digital security and privacy. “Learning about cybersecurity can be fun. Many families of cybersecurity professionals make it a game – they host a small party with snacks and guide their children through five simple but essential exercises,” said Arbačiauskas.

    Cybersecurity experts advise to take these steps to preserve your own cybersecurity and that of your family members (it can also be used as inspiration for your family’s Cyber Party):

    • Create strong and unique passwords. Make sure every account in your family – whether it’s yours, your parents’, your significant other’s, or your children’s – uses a strong and unique password. The easiest way to do it? Use a trusted password manager to generate, store, and share them securely.
    • Turn on multi-factor authentication (MFA). Add an extra layer of security wherever you can, especially to access school portals, email accounts, and social apps. MFA helps keep hackers out even if a password gets breached – and they get breached more often than you think. A recent study by NordPass revealed that many educational institutions still use shockingly weak passwords.
    • Update devices and apps. Keep phones, tablets, and laptops up to date with the latest software. Outdated apps can contain vulnerabilities that hackers take advantage of to get backdoor access into your device. Updates patch these security holes so that cybercriminals can no longer exploit them.
    • Talk about phishing. Discuss cybersecurity with your family and why it matters. Teach them to never click suspicious links or open unknown attachments – especially in emails or messages claiming to be from the school. When in doubt, verify with the sender by using a website checker.
    • Adjust privacy settings. Review and tighten privacy settings on social media, online games, and school platforms. Limit what personal info is publicly visible and who can contact your kids online.

    – JC

    [ad_2]

    Source link

  • WhatsApp patches exploit allowing hackers to target Apple users

    [ad_1]

    NEW YORK — WhatsApp has patched a security vulnerability that allowed sophisticated attacks against the Apple devices of “specific targeted users.”

    The messaging app, owned by Meta Platforms, said in a blog post that its vulnerability, chained with a bug found in iOS and iPadOS, allowed hackers to exploit and steal information from Apple devices.

    In a post on X, Amnesty’s Security Lab researcher Donncha Ó Cearbhaill said the malicious campaign lasted about 90 days. He said other apps beyond WhatsApp may also have been affected.

    WhatsApp said in a statement that less than 200 users were targeted and that the company had notified those affected. All users have been encouraged to update their app to the latest version to fix the issue.

    It’s not immediately clear who, or which spyware vendor, is behind the attacks.

    Apple also acknowledged the vulnerability in its systems and issued patches to fix the flaws.

    [ad_2]

    Source link

  • Moving exposes your personal data to scammers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Downsizing should feel like a fresh start. A smaller home, less upkeep, maybe even a retirement community with new friends. In fact, more than 3 million elderly Americans move every year. Are you considering downsizing as well?

    One woman told the internet about moving her mother into an assisted living home. Before the boxes were even packed, her mother fell for two back-to-back scams. It wasn’t bad luck; scammers had picked up on her address and pounced.

    This isn’t rare. Researchers have found that over 70% of cybercrimes trace back to exposed personal data. And moving creates one of the biggest exposures of all. Real estate listings, moving companies and address changes get scooped up by data brokers and published online, the perfect setup for criminals to strike.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    PODS moving truck and employee outside residential home, Queens, New York. (Lindsey Nicholson/UCG/Universal Images Group via Getty Image)

    How moving puts your personal data at risk

    When you buy, sell, or even just change your address, your information spreads across multiple systems:

    • Real estate records (public by default)
    • Utility company logs
    • Postal forwarding data
    • Transaction history and home value.

    Data brokers scoop all this up. Then they bundle it, resell it and suddenly your new life stage is an open secret. That’s exactly what scammers look for.

    10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE

    Front Door with Delivery Boxes

    Cybercriminals look into multiple databases to gain information about a move. (iStock)

    Common scams that target you when downsizing

    Here’s why moving makes seniors a hot target:

    • Identity theft: Pair your new address with your date of birth (easy to find online), and thieves can open accounts in your name.
    • Cash-rich scams: Selling a house can make you look like you’re sitting on cash. Fraudsters know this.
    • Phishing tricks: Fake “utility setup” calls asking for your Social Security number.
    • Harassment: A new address published online can attract unwanted attention.

    Think of it this way: while you’re busy unpacking boxes, criminals are unpacking your data.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    How to avoid becoming a moving scam victim

    Removing your data can protect you from cyber scams. (Kurt “CyberGuy” Knutsson)

    How to protect your personal data when you move

    While moving creates new opportunities, it also creates new risks. These simple steps will help you lock down your personal data before scammers can exploit it.

    1) Remove your info from data broker sites

    Data brokers automatically update your file when you move. That means your new address, phone number and even property transaction details can end up on people-search websites almost overnight. Once your profile is out there, scammers can buy or scrape it with ease.

    The good news: you don’t have to chase down every broker yourself. A personal data removal service does the legwork for you, contacting data brokers, demanding removal and following up to make sure your new details don’t creep back in. Think of it as hiring a moving company for your personal data.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    2) Use the official USPS form only

    When you change your address, always use the official USPS website or your local post office. Some third-party sites look like they’re offering a convenient service, but they often collect extra data about you and sometimes even resell it. Going straight to the source means your sensitive details don’t take unnecessary detours.

    3) Watch real estate disclosures

    When you sell your home, more than just the price gets published. Your name, past addresses and even photos of your home can become part of the public record. Ask your realtor what’s automatically disclosed and whether anything can be limited or redacted. It’s worth being picky here: the less of your personal footprint that’s tied to your property, the better.

    4) Shred old paperwork

    Moving is the perfect excuse to purge. But don’t just throw out old bills, medical statements, or financial records; shred them. Dumpster-diving for personal data may sound outdated, but it’s still a method scammers use. A good shredder ensures your sensitive history doesn’t end up in the wrong hands.

    5) Share moving news privately

    It’s tempting to post a “Goodbye, old house!” photo online, but resist the urge. Publicly announcing a move tells scammers exactly when your home is empty and what your new address might be. Instead, share the news directly with family and close friends. A little less buzz online means a lot more safety offline.

    6) Freeze your credit before and after moving

    One powerful way to stay ahead of scammers is to freeze your credit. A freeze blocks new credit accounts from being opened in your name, even if criminals have your address or other details. The good news is that you can do this for free with all three major credit bureaus: Equifax, Experian and TransUnion.

    It only takes a few minutes online or by phone, and you can lift the freeze anytime if you need to apply for a loan or credit card. By freezing your credit before and after your move, you create a strong barrier that keeps thieves from turning stolen data into financial damage.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Moving should feel like a new beginning, not an invitation for scammers to strike. With a few smart steps, you can stay ahead of data brokers and fraudsters. From shredding documents to freezing your credit, every action adds a layer of protection. By protecting your information before and after your move, you gain peace of mind and start your next chapter on solid ground. The effort is small compared to the security it brings.

    Should more be done to stop companies from exposing and selling our personal data? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Jury duty phone scams on the rise as fraudsters impersonate local officials, threaten arrest

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Scammers are constantly finding new ways to trick people. While older tactics like phishing emails and impersonating government agencies to steal credentials are becoming easier to spot, bad actors are now turning to more alarming methods. One of the latest involves impersonating local authorities. 

    People have reported receiving phone calls claiming they missed jury duty and now face a warrant for their arrest. This kind of impersonation scam is harder to spot because it’s highly personalized, but that doesn’t mean you’re defenseless. Let’s break it down.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    Scammers impersonating local authorities are on the rise, telling victims they missed jury duty and must pay to avoid legal trouble. (Kurt “CyberGuy” Knutsson)

    What jury duty scam victims need to know

    Scammers posing as court officials are targeting individuals with false claims about missed jury duty, prompting warnings from law enforcement. The fraud typically begins with a call from a blocked or unknown number, alleging that the recipient has missed jury duty and is facing an arrest warrant. The scammers then demand payment, usually through wire transfers or gift cards.

    A key warning sign is being asked to pay money to avoid arrest or legal trouble. It is important never to give money or personal information to unknown callers.

    These scams often target older or more vulnerable individuals, although younger people have also reported close calls. In one example, a person received repeated calls from an unidentified number before answering. The caller, claiming to be from a local sheriff’s department and equipped with the individual’s full name and address, insisted they had failed to appear for jury duty and faced multiple citations.

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

    man using laptop and talking on phone while in apartment

    Victims can spot jury duty impersonation scams by verifying suspicious calls before taking action and reducing their digital footprint. (Kurt “CyberGuy” Knutsson)

    How to spot jury duty impersonation scams

    • No jury duty arrest warrants: Missing jury duty doesn’t lead to criminal citations or warrants.
    • Blocked or spoofed numbers: Real law enforcement won’t hide their identity.
    • Unusual payment methods: No government agency will ask for gift cards or crypto.
    • Aggressive threats: Threats of arrest or contempt of court are a scare tactic.

    Legitimate jury summonses are delivered by mail, not through threatening phone calls.

    6 ways to protect yourself from jury duty scam calls

    If you get a suspicious call about missed jury duty, don’t panic. Follow these steps to stay safe and protect your personal information.

    1) Don’t trust calls from unknown numbers

    This might sound obvious, but don’t trust any unknown caller, especially if they demand money. Legitimate authorities will never ask for payment over the phone, especially not through gift cards, wire transfers, or cryptocurrency. If someone threatens you with arrest or legal action unless you pay immediately, it’s almost certainly a scam. Hang up and call your local court or police department using an official number.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE 

    2) Verify suspicious calls before taking action

    If you receive a suspicious call, take a breath and fact-check. Court summonses are always delivered by mail, not over the phone. Even if the caller has personal information like your name or address, that doesn’t make them credible. Scammers often use leaked or publicly available data to appear convincing.

    Be extra cautious, even if the scam comes through text messages or email. Do not click on any suspicious links, as they can install malware on your device and steal your personal data.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE 

    3) Reduce your digital footprint to stop scammers

    The truth is, your data is already out there, from old social media profiles to past breaches. That’s often how scammers get enough personal details to sound legitimate. Investing in a data removal service can help reduce your digital footprint by scrubbing your information from people-search sites and data brokers.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    man talking to black-cased iphone in car

    Victims of jury duty phone scams can block and report suspicious numbers to local law enforcement or fraud reporting agencies. (Kurt “CyberGuy” Knutsson)

    4) Block and report scam numbers

    If you receive a scam call, report it to local law enforcement or your country’s fraud reporting agency. After hanging up, block the number on your phone and report it to:

    • FTC (USA): reportfraud.ftc.gov
    • Local police or sheriff’s office
    • Your phone carrier’s scam call reporting option

    Many carriers allow you to forward scam texts to 7726 (SPAM).

    5) Use call screening or spam protection apps

    Apps like TruecallerHiya, and built-in features like Google Call Screen or Silence Unknown Callers on iPhones can detect and block fake calls automatically.

    Pro Tip: Enable your phone’s “silence unknown callers” feature for extra protection. 

    6) Talk to vulnerable family members

    Older adults are frequent targets. Sit down with your parents, grandparents, or neighbors to explain how these scams work and what to watch for. A simple heads-up could stop a costly mistake.

    What this means for you

    Scammers are getting bolder and more convincing, but you can stay a step ahead. Knowing the signs of a jury duty phone scam, using smart tools like antivirus and call blockers and limiting your digital footprint can dramatically reduce your risk. Empower yourself and your loved ones with this knowledge.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaway

    Instead of relying on faceless phishing emails, scammers are now using hyper-personalized and emotionally charged phone calls. By impersonating local authorities and referencing civic duties like jury duty, they exploit both fear and a sense of responsibility. What makes this especially dangerous is how plausible it sounds, drawing on real processes that many people don’t fully understand.

    Do you think law enforcement and government agencies are doing enough to educate the public about these scams? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You might have recently noticed a wave of cyberattacks hitting companies whose services millions of Americans rely on every day. Among the victims are Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, all reporting breaches linked to Salesforce-connected applications.

    Now, credit reporting firm TransUnion has confirmed its own major incident, with more than 4.4 million U.S. consumers affected. Attackers exploited weaknesses in third-party integrations, not Salesforce itself. Security researchers tie this technique to the extortion group ShinyHunters and its affiliated crews.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.

    SCAMMERS ARE USING DOCUSIGN EMAILS TO PUSH APPLE PAY FRAUD

    Hackers stole 13 million records, exposing data of 4.4 million Americans in the latest TransUnion cyberattack. (Christopher Dilts/Bloomberg)

    What you need to know about the TransUnion data breach

    TransUnion has disclosed a major data breach that impacted 4,461,511 individuals in the United States, according to a filing with the Maine Attorney General’s Office. The incident occurred on July 28, 2025, and was discovered two days later on July 30.

    The breach resulted from unauthorized access to a third-party application used in TransUnion’s U.S. consumer support operations. The company stressed that its core credit database and credit reports were not compromised.

    Although TransUnion characterized the exposed information as “limited,” the stolen data is highly sensitive. It includes names, dates of birth, Social Security numbers, billing addresses, email addresses, phone numbers, reasons for customer transactions (such as requests for a free credit report), and customer support tickets and messages.

    Hackers claim they stole more than 13 million records in total, with about 4.4 million tied to U.S. consumers.

    In response, TransUnion is providing all affected individuals with 24 months of free credit monitoring and identity theft protection services.

    FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

    entrance of google office building with people standing outside

    The breach at TransUnion follows several similar cyberattacks against tech companies, including Google and Cisco, and retail brands, such as Chanel and Adidas.  (Mike Kemp/In Pictures)

    Hackers target companies through Salesforce apps

    The breach appears to be part of a broader wave of Salesforce-related attacks that is hitting organizations across sectors, from tech and finance to retail and aviation. Alongside Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, brands like Adidas, Louis Vuitton, Dior, Tiffany & Co., Cartier and Air France-KLM have also reported incidents tied to weaknesses in Salesforce-linked applications.

    In most cases, attackers exploited malicious third-party integrations or OAuth-connected apps disguised as legitimate Salesforce tools to siphon sensitive records. This technique bypassed traditional login protections and gave intruders long-lasting access to customer relationship management data. The stolen information ranges from basic contact details and business notes to highly sensitive identifiers such as Social Security numbers, dates of birth and driver’s license information.

    Researchers say these intrusions align with activity from the extortion group ShinyHunters, with some overlap in tactics and infrastructure linked to other threat actors like Scattered Spider. Campaigns tracked under names such as UNC6395 and UNC6040 point to a larger “extortion-as-a-service” model, where criminal crews collaborate and share stolen data across underground forums.

    TransUnion’s response

    CyberGuy reached out to TransUnion for a comment and received the following response:

    “TransUnion recently experienced a cyber incident that affected a third-party application serving our U.S. consumer support operations. Upon discovery, we quickly contained the issue, which did not involve our core credit database or include credit reports.

    The incident involved unauthorized access to limited personal information for a very small percentage of U.S. consumers. We are working with law enforcement and have engaged third-party cybersecurity experts for an independent forensics review. Additionally, we will notify affected consumers and provide credit monitoring services.”

    As for the gap between when the breach occurred (July 28, 2025) and when it was officially recorded as “discovered” (July 30, 2025), a TransUnion spokesperson clarified that the company “identified and contained this event within hours” of it happening, but that it is common industry practice to designate a later “date of discovery” to reflect a more complete assessment following the initial response.

    MARY KAY’S ICONIC PINK CADILLAC SHIFTS TO FULLY ELECTRIC

    hacker wearing globes and using laptop

    Researchers have linked the latest cybercrimes to extortion group ShinyHunters and its affiliated crews. (Kurt “CyberGuy” Knutsson)

    8 ways you can stay safe from the TransUnion data breach

    The TransUnion breach exposed millions of people’s data, but there are steps you can take to protect yourself. Here are eight ways to stay safe.

    1) Delete personal data that puts you at risk

    Go through old online accounts, shopping profiles or cloud storage that may still hold sensitive data. Deleting what you no longer use reduces the amount of information that could be stolen in future breaches or sold on dark web forums. You can also get help from a data removal service.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.

    2) Avoid phishing scams and use strong antivirus software

    Data stolen in breaches often ends up fueling phishing campaigns. Attackers may use your name, email or phone number to make messages look more convincing. If you get an email or text claiming to be from TransUnion, your bank or any service asking you to “verify” details, don’t click on the link. Instead, log in through the official website or call customer service directly.

    The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech.

    3) Save passwords securely

    If your login details were exposed, reusing the same password across sites puts multiple accounts at risk. Use a password manager to create and store strong, unique passwords for every service. Even if hackers get hold of one, they won’t be able to use it elsewhere. Consider using a password manager to generate and store complex passwords.

    Next, see if your passwords have been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.

    HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY

    4) Turn on two-factor authentication

    Two-factor authentication (2FA) adds a critical extra step beyond just a password. If someone tries to break into your email, banking app or social media account, they’ll also need the one-time code from your authenticator app or text message. This makes stolen credentials much less useful.

    5) Keep your devices updated

    Hackers often rely on outdated software to spread malware or steal information. Installing the latest updates for your phone, computer and apps ensures security patches are in place, blocking known vulnerabilities that attackers might exploit.

    6) Freeze your credit right away

    One of the biggest risks after a breach is criminals opening new loans or credit cards in your name. A credit freeze with all three major bureaus, TransUnion, Equifax and Experian, prevents anyone from accessing your credit file without your approval. It’s free and can be temporarily lifted if you need to apply for credit.

    7) Monitor your accounts regularly

    Watch your bank and credit card statements for unfamiliar charges, no matter how small. Set up transaction alerts where available. You should also pull your free annual credit report to check for unauthorized accounts or inquiries, which could be signs of fraud.

    8) Consider identity theft protection services

    If your Social Security number, driver’s license or other sensitive identifiers were exposed, you may want to sign up for an identity theft protection service. These services monitor credit reports, dark web forums and financial activity for signs of misuse. Some also include insurance or recovery assistance if your identity is stolen, giving you added peace of mind beyond basic credit monitoring. If you’re one of the affected TransUnion users, make use of the 24 months of free credit monitoring and identity theft protection services. If not, you might get one yourself for the future.

    See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaway

    The reality is that the TransUnion breach isn’t just about stolen names and numbers. It’s about how exposed ordinary people are when a single company holds the keys to their financial identity. For years, consumers have had little choice but to trust credit bureaus they never opted into.

    Should companies like TransUnion be held legally accountable when millions of people are exposed to fraud? Let us know by writing to us at Cyberguy.com/Contact.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link