ReportWire

Tag: personal tech

  • Google’s new Call Reason feature marks calls as urgent

    NEWYou can now listen to Fox News articles!

    Sometimes you need someone to answer right away. Maybe you are locked out. Maybe those concert tickets are about to go on sale. Android users are about to get a helpful upgrade that gives their calls more context when time matters.

    Google is rolling out a beta feature called Call Reason in the Phone by Google app that lets you mark a call as urgent before you dial.

    When you use it, the person receiving your call sees the urgent label on their screen. If they miss it, the same note shows up in their call history. That quick hint can give your call priority without you needing to send a separate message.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON

    Call Reason lets you flag a call as urgent before you dial, giving your contacts a clear signal that your call needs quick attention. (Google)

    How the Call Reason feature works

    Call Reason appears inside the Phone by Google app on Android devices. The feature only works when both people use Google’s default calling app and the contact is saved in your phone. Many Android phones ship with Phone by Google preinstalled, especially Pixel models, while others like Samsung may use their own dialer instead. If your device does not use Phone by Google by default, you may not see the feature until you install or switch to the Google version. Once marked as urgent, your call displays a clear indicator that tells the other person the conversation should not wait.

    This simple tool helps friends and family answer faster. It also gives them a reminder if they miss the call. Since the note stays in the call log, it nudges them to call back sooner.

    Why this Call Reason feature on Android can help you

    Missed calls are common. Many people silence their phones while working or driving. Call Reason bridges that gap with a small but meaningful alert that adds context. You can give someone a heads-up that the call needs quick attention without creating extra steps or confusion.

    Right now, Call Reason only supports the urgent label. Google has hinted that more options could come later, like short custom messages or emoji-style indicators. That could add even more clarity when your call is tied to a specific topic.

    5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOW

    A Google phone call with the notify button highlighted

    Both people need to use the Phone by Google app for the urgent label to work, which helps your calls stand out when timing matters most.  (Google)

    How to check if you have ‘Phone by Google’ on your Android

    Not every Android phone shows ‘Phone by Google’ in its settings. Some manufacturers, especially Samsung, use their own Phone app. Here is a quick way to confirm if you have the Google version on your device.

    Check the Play Store

    Open Google Play Store

    Search for Phone by Google

    If you see Open or Update, it is installed

    If you see Install, your phone does not have it yet.

    If the Install button appears, you can download it with one tap.

    After installing the Google Phone app

    Once it is installed, your phone may prompt you to set it as your default calling app. If it does not, you can change it manually.

    Switch to Phone by Google as your default

    Once Phone by Google is installed, you need to make it your main calling app. Call Reason only works when Phone by Google is set as your default calling app. Installing it is not enough. You must switch your phone to use the Google dialer for the feature to appear. Here’s how to enable it by following these steps.

    On Pixel devices

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap Default apps

    Tap Phone app

    Select Phone by Google, which uses a blue icon with a white phone handset

    On Samsung Galaxy phones

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap the three dots

    Tap Choose default apps

    Tap Phone app

    Select Phone by Google if available. It uses a blue icon with a white phone handset, which looks different from Samsung’s green Phone icon

    Samsung may block or hide the Google Phone app on some carrier models. If you do not see it after installation, your device may not support switching. 

    How to use the Call Reason urgent label on Android

    Once you have Phone by Google set as your default calling app, using Call Reason is very simple. Both you and the person you are calling must use the Phone by Google app for the urgent label to appear.

    How to mark your call as urgent

    When you are ready to call someone:

    Open the Phone by Google app

    Go to your Contacts or Recents

    Tap the contact you want to call

    Before you press the call button, look for the Call Reason option on the screen

    Tap Urgent to attach the urgent label

    Then tap the call button to place your call

    The urgent badge is sent with your outgoing call so the person knows your call needs attention.

    What the other person sees

    When your call reaches them, they will see:

    Your name and number

    A bold “Urgent” label under your name on the incoming call screen

    If they miss the call:

    The urgent label appears in their call history

    They can tap your missed call to return it quickly

    No extra steps are needed on their end. They do not need to press anything special to receive an urgent call. Their only requirement is that they also use Phone by Google as their default calling app.

    What both people must have for it to work

    For the urgent label to show:

    Both people must use Phone by Google

    Both devices must support the Call Reason beta rollout

    The person must be saved in your Contacts

    If any of those pieces are missing, the option will not appear.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    A Google phone call with the notify and urgent buttons highlighted

    When someone receives an urgent call, the label appears on their screen and in their call history if they miss it, making it easier to call back fast. (Google)

    Tips for getting the most out of Call Reason

    Use the urgent label only for situations that need fast attention

    Keep your contacts list updated so the feature works as intended

    Encourage close friends or family to use the Phone by Google app for full compatibility

    Check your call history for urgent notes if you miss an important call  

     Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Call Reason feels like one of those small upgrades that can make everyday calling a little smoother. It gives your friends a quick sense of why you’re reaching out and helps cut through the guesswork when timing matters. As the feature expands, it could turn into an even more helpful way to share context before someone taps Accept.

    What situation in your life would make you use the urgent label first? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Find a lost phone that is off or dead

    NEWYou can now listen to Fox News articles!

    Losing your phone can leave you in panic mode, especially when the battery dies. The good news is that both Apple and Android offer built-in tools that help you track a missing device even when it is powered off or offline.

    With an iPhone, you can use the Find My network on another Apple device or sign in from a browser. With Android, you can use Google’s Find My Device system to see the last known location and secure your phone fast.

    This guide walks you through clear steps for iPhone and Android so you know exactly what to do next.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    You can still find your lost Apple device even when it’s dead. (Apple)

    Does Find My work when your iPhone is dead?

    Yes, it does. Your iPhone uses low power mode in the background so it stays findable for a period after powering off. If other Apple devices are nearby, your phone can still send out a Bluetooth signal that helps pinpoint the last known location.

    You can check this location from any Apple device or a browser.

    Use Find My from another Apple device

    If you have an iPad, Mac, or another iPhone, you can look up your missing device in seconds. Family Sharing works too, so you can track a shared device even if it is offline. Here is how to do it:

    • Open the Find My app
    • Tap the Devices tab
    • Swipe up to see your full list of devices
    • Select your missing iPhone
    • View the location on the map
    • Tap Directions to navigate to it
    • Tap Play Sound if the phone is on and nearby
    Steps to enable Find My on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    • Turn on Lost Mode by tapping continue at the bottom of the screen to lock it and show a message with a callback number.
    • Enter a phone number that can be used when someone finds your iPhone and wants to contact you. Then, tap Next. 
    • If the screen icon is black, the phone is dead. You will still see the last known location, so you know where to start looking.
    Steps to enable Find my on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    Find your iPhone from a web browser

    If you only have access to a computer or an Android phone, use iCloud.com to locate your device. The browser version gives fewer tools, but it still shows your iPhone on the map. Follow these steps:

    • Go to iCloud.com/find
    • Sign in with your Apple ID
    • Approve two-factor if needed
    A Find Devices sign in screen

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Select All Devices
    • Choose your missing iPhone
    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Use Play Sound if the device is on
    • Turn on Lost Mode to lock the phone

    Use this method when you have no Apple hardware nearby.

    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    Use the Help a Friend feature in Find My

    If you need to borrow another person’s iPhone, avoid signing in to their device directly. That triggers security checks you cannot complete without your missing phone. Instead, use Help a Friend inside the Find My app:

    • Open Find My on your friend’s iPhone
    • Scroll to Help a Friend
    • Sign in with your Apple ID
    • View the last known location of your iPhone

    This tool bypasses two-factor prompts so you can get your location without any issues.

    Help a Friend feature on iPhone

    Steps to use the Help a Friend feature in Find My. (Kurt “CyberGuy” Knutsson)

    Can you find an iPhone without Find My

    If ‘Find My’ was never enabled, you must retrace your steps. You can check ‘Your Timeline’ in Google Maps if you use that app and have location history on.

    Without ‘Find My,’ there is no way to remotely lock, track, or erase the device.

    Once you recover your phone, turn on ‘Find My’ and enable ‘Send Last Location’ so you are covered next time.

    Best iPhone settings to turn on before your device goes missing

    Before your iPhone ever goes missing, take a minute to set up these key protections.

    1) Turn on Find My iPhone

    This keeps your device trackable whether it is on or off. Go to Settings, then tap your name, then click Find My, then Find My iPhone and enable it. 

    2) Enable Send Last Location

    Go to Settings, then tap your name, then click Find My, then Find My iPhone and scroll down and enable Sent Last Location. 

    Your phone will save its final location before the battery dies.

    3) Turn on Find My network

    Go to Settings, tap your name, click Find My, then tap Find My iPhone and enable Find My network.
    This keeps your iPhone discoverable through nearby Apple devices even when it is off or offline.

    4) Keep two-factor authentication on

    Go to Settings, tap your name, tap Sign-In & Security, select Two-Factor Authentication (2FA), then tap your iPhone and make sure 2FA is turned on.
    This blocks anyone from accessing your Apple ID without approval.

    5) Use a strong passcode

    Go to Settings, then tap Face ID & Passcode, then enter your current passcode.
    Tap Change Passcode and follow the prompts to set a unique passcode that is hard to guess.

    6) Add a recovery contact

    Go to Settings, tap your name, tap Sign-In & Security, then tap Recovery contacts. Then, click Add Recovery Contact. 
    Add a trusted person as your recovery contact so you can verify your identity if you ever lose your iPhone. 

    CAN’T FIND YOUR ANDROID PHONE? HERE’S WHAT TO DO TO TRACK IT DOWN

    How to find an Android phone that is off or dead

    Android users can also track a missing device using Google’s Find My Device system. While you cannot see live location when the phone is powered off, you can view the last known location, lock the phone, or display a message for anyone who finds it. Here is how to track it:

    Find your Android from a browser

    Settings may vary depending on your Android phone’s manufacturer.

    • Go to android.com/find
    • Sign in with your Google account
    • Select your missing device
    • View the last known location on the map
    • Select Secure Device to lock it and display a callback message
    • Select Play Sound if the phone is on and nearby

    Find your Android from another phone

    Settings may vary depending on your Android phone’s manufacturer.

    • Download the Find My Device app on another Android
    • Sign in with your Google account
    • Tap your missing phone to view its last known location

    If the phone is off or dead, the map will show its last saved location. You can still lock the device or leave a message for whoever finds it.

    Best Android settings to turn on before your device goes missing

    Before your Android phone ever goes missing, take a minute to set up these key protections.

    Settings may vary depending on your Android phone’s manufacturer.

    1) Turn on Find My Device

    This lets you track your phone or lock it from any browser.
    Go to Settings, tap Security & privacy, tap Find My Device or Device Finders and turn it on.
    (Names may vary by manufacturer.)

    2) Enable Location Services

    This improves accuracy and helps Google save your phone’s last known location.
    Go to Settings, tap Location and turn on Use Location.

    3) Turn on Google Location History

    This allows Google to show past locations even when your phone is off.
    Go to Settings, tap Location, tap Location Services, then choose Google Location History or Google Location Sharing and turn it on.

    4) Add a recovery phone number or email

    This helps you verify your identity and recover your account fast.
    Go to Settings, tap Google, tap Manage your Google Account, then open the Security tab and add a recovery phone number or email.

    5) Use a strong screen lock

    Choose a secure lock to keep your data safe.
    Go to Settings, tap Security, then Screen lock, and select a PIN, pattern, or password that is hard to guess.

    6) Turn on “Send last location” (If available)

    Some Android models save the phone’s last known location before the battery dies.
    Go to Settings, tap Security & privacy, tap Find My Device and enable Send last location if your device supports it.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    A dead or powered-off phone does not have to stay lost. Apple’s Find My network and Google’s Find My Device system both give you a last known location and fast tools that help you lock or secure your phone. With the right settings in place before anything happens, you can recover your device sooner and protect your personal data.

    What would you do first if your phone went missing today? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Adaptive Power in iOS 26 boosts iPhone battery life

    NEWYou can now listen to Fox News articles!

    Battery life matters more than ever as your iPhone takes on heavier workloads from streaming and gaming to AI-driven tasks. Every extra minute of charge now makes a difference in how smoothly your day runs.

    With iOS 26, Apple introduced Adaptive Power, an intelligent feature that quietly learns how you use your phone and adjusts performance to stretch battery life when you need it most. It is designed to keep your iPhone running stronger for longer without you having to lift a finger.

    What Adaptive Power does

    Adaptive Power helps your iPhone battery last longer when your daily use increases. It works automatically in the background and learns your recent activity to predict when extra power will be needed. When active, it can make small adjustments, such as lowering screen brightness, limiting background activity or turning on Low Power Mode when your battery reaches 20%.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    APPLE, MICROSOFT HIT $4T MILESTONE

    It uses on-device intelligence to understand your habits, then fine-tunes performance without requiring any input from you. Apple notes that Adaptive Power pauses its adjustments during tasks that demand maximum performance, like using the camera or gaming with Game Mode turned on.

    Adaptive Power in iOS 26 learns your daily habits to extend your iPhone’s battery life automatically. (Apple)

    How Adaptive Power affects real-world use

    Think of Adaptive Power as a smart battery assistant that adjusts only when needed. It balances performance and power consumption throughout the day, helping your phone last longer without noticeable slowdowns. It trims energy use in high-demand moments, like recording videos, editing photos or multitasking, without disrupting what you’re doing. When it activates, you might see a small notification letting you know it’s working, but otherwise, it operates quietly in the background.

    Settings in the iPhone

    The Adaptive Power feature uses on-device intelligence to adjust brightness, limit background tasks and keep performance balanced throughout the day. (Apple)

    Make sure you have iOS 26 installed

    To use Adaptive Power, your iPhone must be running iOS 26. If you’re unsure, here’s how to check and update:

    • Open Settings on your iPhone.
    • Tap General.
    • Tap Software Update.
    • If you see iOS 26 available, tap Download and Install.
    • Keep your phone plugged in and connected to Wi-Fi during the update.

    Once the update finishes, restart your phone. The feature activates automatically on supported models.

    Which iPhones support Adaptive Power

    Only iPhones that can run Apple Intelligence will see this feature. Here’s the list:

    • iPhone 17, 17 Pro and 17 Pro Max
    • iPhone Air
    • iPhone 16, 16 Plus, 16 Pro and 16 Pro Max
    • iPhone 16e
    • iPhone 15 Pro and 15 Pro Max

    Adaptive Power is on by default for iPhone 17 models and iPhone Air. It’s off by default for iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 16e, iPhone 15 Pro and iPhone 15 Pro Max.

    While some iPad and Mac models also run Apple Intelligence, Adaptive Power is currently exclusive to iPhones.

    APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

    How to turn Adaptive Power on

    If you’ve got a newer model like the iPhone 17 or Air, Adaptive Power is already on. For others, it’s just a few taps away:

    • Open Settings on your iPhone
    • Tap Battery
    • Select Power Mode
    • Toggle Adaptive Power to turn it on
    • To be notified when it activates during the day, turn on Adaptive Power Notifications. Even if you turn off alerts, the feature will continue to extend battery life automatically.
    A guide shows how to enable Adaptive Power in iOS 26 on iPhone.

    Steps to enable Adaptive Power in iOS 26 on iPhone. (Kurt “CyberGuy” Knutsson)

    What this means for your charging habits

    You may not see dramatic gains every day, but the effect adds up. Adaptive Power could extend the lifespan of your iPhone just by updating to iOS 26. Even though you might still need to charge overnight, the feature can buy you extra hours when you’re away from an outlet. Just remember: battery life often dips briefly after major updates while your system re-indexes data, but it levels out in a few days.

    Pro tip: Use strong antivirus software

    Use trusted antivirus software as an extra layer of protection for your iPhone. While Apple’s built-in defenses are strong, security threats evolve fast. Installing strong antivirus software adds real-time protection against phishing, unsafe links and rogue apps. Keep it updated and run regular scans to catch potential risks early. This extra step helps your device stay clean, fast and fully protected between iOS updates.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Adaptive Power represents Apple’s move toward smarter, self-managing devices that adapt to you. By learning your habits and adjusting power use dynamically, it helps your battery last longer without sacrificing performance. It’s one of those invisible upgrades that can quietly make your phone feel newer for longer.

    Would you trust your iPhone to manage power automatically, or do you still prefer to control it yourself? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Never forget to reply to an email again with hidden phone trick that actually works

    NEWYou can now listen to Fox News articles!

    If you’ve ever told yourself you’d reply to an email later and then forgot, there’s a simple fix built right into your phone. Android and iPhone users both have ways to set reminders that bring messages back to your attention at the perfect time. 

    Whether you use Apple’s Mail app or Gmail on Android, these features help you stay organized, reduce stress and never miss an important reply again.

    Why the message reminder feature matters

    Many people leave emails unread as a reminder to reply later, but that method often fails. The built-in Mail reminder gives you a clear alert at a time you choose. It helps you follow through on tasks, maintain better communication and avoid missed opportunities.

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    Reminders can be set in the iPhone Mail app to ensure you don’t miss an email. (Reuters/Thomas Peter/File)

    To make sure you can use this feature, update your iPhone to the latest iOS version. Here’s how:

    • Open Settings.
    • Tap General.
    • Select Software Update.
    • If an update is available, tap Download and Install.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    If you’re on Android, you’ll also want to make sure your Gmail app and system software are up-to-date so the Snooze feature runs smoothly. Here’s how:

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Google Play Store.
    • Tap your profile icon in the upper right corner.
    • Select Manage apps and device.
    • Tap Update all or locate Gmail and tap Update.
    • To check your Android version, open Settings > About phone > Android version.

    5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOW

    Keeping your phone updated ensures you have the newest tools, features and security improvements.

    How to set up a reminder in the Mail app on iPhone 

    • Open the Mail app.
    • Find the email you want to be reminded about and swipe right on it.
    • Tap Remind Me.
    • Choose a preset time or tap Remind Me Later to pick your own.
    • Select the date and time that fits your schedule and tap the check mark in the upper right corner of the screen.

    That’s it. When the time comes, you’ll get a fresh notification as if you just received the email again. It’s a great way to stay organized without using third-party apps.

    Person using iPhone

    Android and iPhone users can set built-in email reminders to manage messages and stay organized through Apple’s Mail and Gmail apps. (Sean Gallup/Getty Images)

    10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

    How to cancel a reminder early in the Mail app on iPhone 

    If you’ve already handled the message and no longer need the alert, you can end it early:

    • Open the Mail app and go to Mailboxes.
    • Tap Remind Me.
    • Swipe left on the email you want to remove.
    • Tap Clear to cancel the reminder.

    This prevents duplicate notifications and keeps your inbox tidy.

    Android users can do this, too

    If you’re on Android, you can set up a similar email reminder using Gmail’s built-in Snooze feature. It works much like Apple’s Mail reminder. Instead of choosing “Remind Me,” Gmail lets you snooze an email so it pops back to the top of your inbox later, right when you want to deal with it.

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    How to snooze an email in Gmail on Android 

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Gmail app on your Android phone.
    • Tap and hold the email you want to be reminded about.
    • Tap the three dots in the upper right corner or the clock icon at the top.
    • Select Snooze.
    • Choose a preset time or tap Pick date & time to set a custom reminder.

    When the time arrives, Gmail automatically moves the message back to the top of your inbox and marks it unread so it stands out.

    BEST WAYS TO TRACK YOUR MEDS ON IPHONE AND ANDROID

    How to cancel a snooze quickly in Gmail on Android 

    If you change your mind before the reminder triggers, you can easily cancel it:

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Gmail app.
    • Tap the Menu icon (three lines) in the top left corner.
    • Select Snoozed.
    • Find the email and swipe it left or right, or open it and tap Unsnooze.

    Your email will return to its original spot in the inbox right away, so you can handle it or leave it as is.

    Woman smiles at her Android

    Built-in reminder features on iPhone and Android help users follow up on emails and prevent missed messages. (Cyberguy.com)

    What this means for you

    If you manage a busy inbox, this feature can be a game-changer. It helps reduce mental clutter since you won’t have to rely on memory or endless email flags. You decide when you want to be reminded, and your phone takes care of the rest.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Whether you’re using an iPhone or Android device, built-in email reminders can keep your digital life running smoothly. These features help you manage your inbox with less effort and more control. By setting a time to follow up, you stay productive and avoid letting key emails slip through the cracks. Both platforms make it easy to stay focused and keep your conversations on track.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Would a reminder like this have saved you from missing an important email recently? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    Source link

  • Apple passkey technology transforms Mac security with biometric authentication, encrypted storage

    NEWYou can now listen to Fox News articles!

    Your Mac holds a lot more than just files. It carries your personal information, payment data, messages and every online account you access. Keeping that information safe starts with how you sign in. For years, passwords have been the standard way to protect accounts, but they are also one of the weakest links in digital security. They can be guessed, stolen or reused across multiple sites.

    Apple’s introduction of passkeys marks a major step forward. Instead of relying on something you need to remember, passkeys rely on something you have (your trusted Apple device) and something you are, like your fingerprint or face. Together with iCloud Keychain and two-factor authentication, passkeys create a seamless and much safer way to secure your Mac and your digital life.

    What are passkeys?

    Passkeys are a modern alternative to passwords. They use public key cryptography to let you sign in without ever creating or typing a password. When you register for an account using a passkey, your Mac creates two unique keys. One is public and stored by the website or app, and the other is private and stays securely on your device.

    The public key is not sensitive information. The private key, on the other hand, never leaves your Mac and is protected behind your device’s security features. When you sign in, Touch ID or Face ID confirms your identity before your Mac uses the private key to authenticate you. This process prevents phishing and password leaks because no shared secret is ever transmitted to the website.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOW TO USE PASSKEYS TO KEEP YOUR COMPUTER SAFE

    A passkey on your Mac replaces passwords with a faster, more secure way to sign in. (Kurt “CyberGuy” Knutsson)

    How Apple keeps passkeys secure

    Passkeys are stored and synced across your devices through iCloud Keychain, which is protected by end-to-end encryption. This means that not even Apple can access your passkeys or passwords. iCloud Keychain also has built-in protection against brute force attacks, even if someone were to gain unauthorized access to Apple’s servers.

    If you lose your devices, you can still recover your passkeys through iCloud Keychain recovery. To do this, you must sign in with your Apple ID and password, verify your identity with a code sent to your trusted number and confirm using your device passcode. The system limits the number of attempts, and if too many failed attempts occur, the recovery record is locked or destroyed to prevent misuse.

    You can also set an account recovery contact to make sure you never lose access, even if you forget your Apple ID password or device passcode. This multi-layered design ensures that your data remains secure even in extreme scenarios, such as a compromised Apple account or cloud breach.

    How to set up passkeys on your Mac

    Setting up passkeys is simple and requires iCloud Keychain to be enabled.

    • Choose the Apple menu, then select System Settings.
    • Click your name, then click iCloud.
    • Click Passwords. In macOS Sonoma or earlier, click Passwords & Keychain.
    • Click Sync this Mac, then click Done.
    • When you sign up for a website or app that supports passkeys, you’ll now see the option to create a passkey.
    • If your Mac has Touch ID, place your finger on the sensor to confirm.
    • If you are using an iPhone or iPad nearby, select Other Options and scan the QR code shown on your Mac to confirm with Face ID.
    • You can also replace an existing password by visiting the account settings of a supported website or app and selecting the option to switch to a passkey.

    Once created, your passkeys are automatically stored in iCloud Keychain and available on all devices signed in with the same Apple ID.

    Major services that support passkeys

    Passkey adoption is growing quickly across major tech platforms. As of now, many of the biggest online services already let you sign in without a password.

    Some of the key ones include:

    • Google
    • Microsoft
    • Apple
    • Amazon
    • PayPal
    • GitHub
    • Uber
    • eBay
    • WhatsApp
    • Facebook

    Support for passkeys continues to expand every month as more companies integrate the technology into their login systems. On most of these platforms, you can now create new accounts or switch your existing ones to passkeys for faster, more secure sign-ins.

    Man sitting with a MacBook on his lap with the Google search engine on the screen

    Each passkey is unique to your account and safely stored in your device’s iCloud Keychain. (iStock)

    6 additional steps to keep your Mac safe

    Passkeys add a strong layer of protection, but good security habits still matter. Here are more steps to strengthen your Mac’s defenses. 

    1) Enable two-factor authentication

    Two-factor authentication (2FA) adds another layer of protection to your Apple ID. It works by requiring two forms of verification: your password and a one-time code sent to a trusted device or phone number. This means that even if someone somehow gets your password, they still cannot access your account without also having your device.

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    2) Review your trusted devices and numbers

    Regularly check which devices and phone numbers are linked to your Apple ID. On your Mac, click the Apple icon in the upper left of the screen. Then go to System Settings → Apple ID → Devices and remove anything you don’t recognize. Make sure your trusted phone number is still current, since it’s critical for account recovery.

    3) Use a password manager

    Even though passkeys are replacing passwords, many sites still rely on traditional logins. A password manager helps you create, store and fill in unique passwords for every account. iCloud Keychain can do this automatically across all your Apple devices, but if you want more flexibility, you might want to consider a third-party password manager.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    4) Be wary of phishing attempts and install strong antivirus software

    Phishing remains one of the most common ways attackers try to steal personal information. They may send fake emails or messages pretending to be from Apple or other trusted companies, urging you to click links or provide login details. Always double-check the sender’s address and avoid clicking on links that seem suspicious. Instead, visit the website directly by typing the address into your browser.

    While macOS has strong built-in defenses such as Gatekeeper and XProtect, installing strong antivirus software adds another layer of protection against malware, adware and potentially unwanted programs. Strong antivirus software continuously monitors your system for suspicious behavior and can alert you to threats before they cause damage. It is especially useful if you download files from outside the App Store or connect external drives frequently.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    securing passwords 1

    Using a passkey with Touch ID or Face ID keeps your information protected from phishing and leaks. (Kurt “CyberGuy” Knutsson)

    5) Turn On FileVault disk encryption

    FileVault protects everything stored on your Mac by encrypting the entire hard drive. That means if your computer is ever lost or stolen, your data stays locked away from prying eyes. Go to System Settings → Privacy & Security → FileVault to enable it.

    6) Keep macOS updated automatically

    Apple regularly releases software updates that include important security patches. Cybercriminals often target outdated systems because they contain known vulnerabilities. By keeping macOS and your apps up to date, you make it harder for attackers to exploit weaknesses. To make this effortless, turn on Automatic Updates under System Settings → General → Software Update → Automatic Updates.

    7) Back up with time machine

    Backing up your Mac is just as important as protecting it. Time Machine automatically backs up your files to an external drive or network disk, keeping your data safe from ransomware, hardware failure or accidental deletion. Make sure your backup drive is encrypted for extra protection.

    HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

    8) Use a data removal service

    Even with passkeys, your personal information can still be exposed through data broker sites that collect and sell your details. Using a data removal service can help remove your private data from hundreds of these sites automatically. It’s an effective way to reduce your online footprint and protect your identity, especially when combined with Apple’s built-in security tools.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Passwords have served us for decades, but they are no longer enough to protect our digital identities. Passkeys make signing in faster, easier and significantly more secure by removing the weaknesses of traditional passwords. Combined with Apple’s encryption, iCloud Keychain and two-factor authentication, they represent one of the safest ways to protect your Mac and everything on it.

    Have you tried using passkeys yet on your Mac, and what was your experience like? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Apple releases iOS 26.1 with major security improvements and new features for iPhone users

    NEWYou can now listen to Fox News articles!

    Apple’s iOS 26.1 update is more than a standard patch. It boosts security, speeds up performance and adds practical upgrades to features you already use. The update fixes dozens of vulnerabilities that impact Safari, Photos and Apple Account settings. 

    It also introduces stronger privacy controls, design tweaks and expanded support for Apple Intelligence. Since iOS 26.1 is the first major follow-up to iOS 26, it builds on the foundation of the original release with key fixes and refinements. 

    If you value protection, speed and reliability, updating now is an easy way to keep your iPhone secure and performing at its best.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    The new update focuses on privacy, stability, and performance, giving iPhone users stronger protection and a more polished overall experience. (Cyberguy.com)

    How to update to iOS 26.1

    Here are a few simple steps to install iOS 26.1:

    • Plug in your iPhone and connect to a reliable Wi-Fi network to prevent interruptions.
    • Go to Settings.
    • Tap General.
    • Click Software Update.
    • Tap Update Now or Download and Install when iOS 26.1 appears.
    • Follow the prompts and wait for your phone to restart.

    Once complete, your iPhone will have the latest protections and performance enhancements. iOS 26.1 is available for all iPhones from the iPhone 11 and later. Because it is a smaller point update, installation is quick and delivers immediate benefits without the delays of a major version upgrade.

    WHY WI-FI CALLING MAY BE KILLING YOUR PHONE’S BATTERY LIFE

    Top 10 Reasons to Update to iOS 26.1

    Apple packed plenty of improvements into this release, but these ten stand out as the most important reasons to install iOS 26.1 right now.

    1) Stronger security protections

    Apple fixed over 50 vulnerabilities in this update. Those include serious flaws that could let apps access sensitive data or take screenshots without permission. Installing iOS 26.1 keeps your personal information safer than before. 

    2) Streamlined security

    Apple added a new option in iOS 26.1 that quietly keeps your iPhone protected between major updates. Go to Settings > Privacy & Security > Background Security Improvements, then turn on the toggle for automatic background security updates. These smaller patches install automatically without waiting for the next iOS version, helping your device stay protected against new threats with less effort.

    EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES

    3) Alarm upgrade

    Apple changed how alarms work in iOS 26.1 to make mornings more reliable. You now need to swipe across the screen to turn an alarm off, rather than tapping it. The snooze button still works with a single tap, so you can easily tell the difference between stopping and snoozing. This simple change helps prevent accidental silencing and makes it easier to wake up on time.

    The new iPhone 14 and 14 Plus are displayed

    Apple’s iOS 26.1 update boosts security, speeds up performance and adds practical upgrades to already existing features. (BRITTANY HOSEA-SMALL/AFP via Getty Images)

    4) Customizable liquid glass look

    The semi-transparent iOS 26 design now includes new options for opacity. You can make screens easier to read and reduce glare with more visual clarity.

    Open Settings > Display & Brightness > then choose Liquid Glass. From there, select either Clear for a sharper background or Tinted for a softer, more subdued look that reduces glare.

    5) New camera toggle

    iOS 26.1 adds a new setting that gives you control over the camera shortcut on your lock screen. Go to Settings > Camera, then look for the option “Lock Screen Swipe to Open Camera.” You can now turn this feature off if you often trigger the camera by accident or prefer using the dedicated Camera Control instead. It’s a small but useful change for anyone who wants fewer unintentional photos or faster access to other lock screen tools.

    6) Expanded live translation

    Frequent travelers and language learners will appreciate the expanded real-time translation. iOS 26.1 adds Italian, Japanese, Korean and Chinese to AirPods translation, making global communication smoother.

    APPLE EXPECTED TO ROLL OUT TEXTING UPDATE THAT WOULD HIT GOP HARDEST AHEAD OF MIDTERMS, FUNDRAISERS SAY

    7) More languages for Apple Intelligence

    Apple Intelligence now understands additional languages, including Dutch, Danish, Swedish, Norwegian, Portuguese, Turkish and Vietnamese. That expands how Siri and on-device AI respond to more users. 

    8) Smarter music and audio controls

    Apple added handy gesture controls to the Apple Music MiniPlayer in iOS 26.1. You can now swipe left to go back or right to skip ahead while a song plays, making it easier to control music without opening the full player. The update also adds AutoMix support over AirPlay and lets creators adjust USB microphone gain directly from their iPhone for clearer recordings.

    9) Phone call haptics control

    iOS 26.1 adds a simple but welcome change for anyone who prefers fewer distractions. You can now turn off the vibration feedback that happens when a call connects or ends. Go to Settings > Apps > Phone and toggle Haptics off to stop those subtle buzzes that can feel like extra notifications. It’s a small tweak that makes phone calls feel cleaner and less intrusive.

    10) Local Capture options

    iOS 26.1 adds a new Local Capture menu that makes it easier to record high-quality audio and video from your own device during calls. Go to Settings > General > Local Capture to choose where your recordings are saved or to enable audio-only recording.

    10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

    A man scrolling on social media on his phone.

    The new IOS update also introduces stronger privacy controls, enhancing online security. (Kurt “CyberGuy” Knutsson)

    Pro Tip: Use strong antivirus software

    Use trusted antivirus software as an extra layer of protection for your iPhone or iPad. While Apple’s built-in defenses are strong, security threats evolve fast. Installing strong antivirus software adds real-time protection against phishing, unsafe links, and rogue apps. Keep it updated and run regular scans to catch potential risks early. This extra step helps your device stay clean, fast, and fully protected between iOS updates.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    The iOS 26.1 update brings more than simple fixes. It fine-tunes how your iPhone works, sounds and protects your information. With expanded translation, smarter music gestures, new privacy options and better camera controls, every improvement makes daily use smoother. Features like Local Capture, streamlined security updates and the ability to turn off phone call haptics highlight Apple’s focus on practical upgrades that matter. If you have not updated yet, now is a good time. iOS 26.1 strengthens your phone’s security, improves stability and adds thoughtful details that make your device easier to use every day.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Which new iOS 26.1 feature will you try first, the enhanced privacy tools or the camera and haptic settings? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • 5 hidden battery drainers you can fix right now

    NEWYou can now listen to Fox News articles!

    You plug in your phone overnight, but by lunchtime, it’s already gasping for charge. Sound familiar? Hidden background features, sneaky settings and apps you forgot existed can quietly drain your battery faster than you think. The good news is a few quick tweaks can help your device stay powered all day, without sacrificing performance or convenience.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    1) Turn off background app refresh

    Stop apps from sapping power when you’re not using them. Even when you’re not actively scrolling or tapping, many apps continue running in the background, fetching updates, refreshing data and sending notifications. It’s convenient, but it drains your battery faster than you realize.

    For iPhone 

    • Go to Settings.
    • Tap General.
    • Click Background App Refresh.
    • Tap Background App Refresh again.
    • Select Off, or choose Wi-Fi to limit data use and battery drain.
    • You can also toggle off refresh for individual apps if you still want certain ones to run.

    WHY WI-FI CALLING MAY BE KILLING YOUR PHONE’S BATTERY LIFE

    Stop background apps from quietly draining your battery. (Kurt “CyberGuy” Knutsson)

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer. 

    • Open Settings.
    • Tap Battery (or Battery & device care, Power management, or similar).
    • Select Background usage limitsApp battery management, or Battery optimizationwording depends on your device.
    • Choose the apps you rarely use, then set them to Restricted or Optimized, or Put unused apps to sleep.
    • To let Android manage this automatically, turn on Adaptive Battery (found under Settings › Battery › Adaptive Battery).

    Pro tip: Keep essential apps, such as messaging, navigation, or weather, active so they can update in real time. Restricting background activity for apps you don’t open often can extend battery life by several hours a day.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    3 phones are plugged in with dark screens

    Turn off background refresh to stop unused apps from quietly draining your battery. (Kurt Knutsson)

    2) Disable Always-in Display

    That sleek clock on your screen might look cool, but it’s constantly using power. Always-On Display keeps your screen partially lit, even when you’re not touching it, to show time, notifications or widgets. Over time, that adds up, especially overnight.

    For iPhone (14 Pro and later)

    • Go to Settings.
    • Tap Display & Brightness.
    • Click Always On Display.
    • Toggle Off next to Always On Display to stop your phone from lighting up when locked.

    For Android

    Settings may vary, depending on your Android phone’s manufacturer. 

    • Open Settings.
    • Tap Lock screen (sometimes labeled “Lock screen & security,” “Lock screen & AOD,” “Display & lock screen,” etc.).
    • Look for Always On Display (AOD) (or similar, such as “Always show time & info”, “Ambient display”, “Screen always on when locked”).
    • Toggle Off to disable the AOD entirely, or choose an alternative mode (for example: “Tap to show” / “Show on tap” so the AOD only appears when you tap the screen) if available.
    • (Optional) Some devices allow scheduling of AOD or limiting it to when notifications are present. If you want more control, explore the sub-options under the AOD setting.

    Turning off Always-On Display can extend standby battery life by up to 10 to 15%.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    Samsung Galaxy S23 Ultra smartphone is seen in South Korea

    Turn off Always-On Display to save more power each day.  (SeongJoon Cho/Bloomberg via Getty Images)

    3) Limit location access

    GPS is one of the biggest hidden battery drains. Apps that track your location in the background, from ride-sharing to retail, can quietly sap your phone’s power even when you’re not using them. Adjusting permissions keeps your phone secure and efficient.

    For iPhone 

    • Go to Settings.
    • Tap Privacy & Security.
    • Click Location Services.
    • Tap each app individually and change Always to While Using the App or Never.
    • Now, scroll to the bottom and tap System Services.
    • Tap Significant Locations, then toggle it Off to stop your iPhone from storing detailed location and travel history. (You can also tap “Clear History” here to erase past entries.)

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Location (or sometimes Privacy & Security → Location).
    • Tap App permissions (or App location permissionsLocation permissions for apps).
    • Select an app, then choose the appropriate permission, such as “Allow only while using the app” (or “Allow only when in use”) or “Don’t allow” (or “Deny”).
    • On the same screen (for that app), you may see a toggle for “Use precise location”. If the app doesn’t need GPS accuracy, toggle Off to let it use only an approximate location.

    Apps like Maps and Weather need access, but most don’t. Tightening this setting not only boosts battery life, it also improves your privacy by limiting background tracking.

    Pro tip: Leaving essential features like Find My iPhone or Emergency Calls & SOS enabled under System Services ensures your phone can still help locate or protect you if it’s lost, even with other location options turned off.

    CLICK HERE TO GET THE FOX NEWS APP

    Limit location tracking to protect privacy and extend battery life.

    Limit location tracking to protect privacy and extend battery life. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)

    4) Turn off Raise to Wake and Tap to Wake

    Ever notice your screen lighting up when you simply pick up your phone? Those quick flashes add up. Every time your display activates — even for a second, it consumes battery power. Turning off these motion-activated features can reduce unnecessary screen wake-ups.

    For iPhone

    • Go to Settings.
    • Tap Display & Brightness.
    • Turn off Raise to Wake.

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Display (or Lock screen & security, or Advanced features, depending on your device).
    • Look for Lift/ Raise to wakeTap to wake, or Double tap to wake (sometimes found under Gestures or Motion settings).
    • Turn off “Lift/Raise to wake” and “Tap/Double tap to wake” (or choose to disable whichever is active).
    • If you want a simpler way to wake your phone only when you intend to, rely on the power-button wake (which is the default on nearly all phones).

    5) Review battery usage and spot the culprits

    If your phone is dying faster than usual, the Battery Usage tool can reveal the exact cause. You’ll see which apps are using the most power, both on screen and in the background, so you can take action.

    For iPhone

    • Go to Settings.
    • Tap Battery.
    • Scroll to view the battery usage graph and list of apps and system processes that are using power.
    • Look for any highlighted items (indicating unusually high usage).
    • Tap an app or process to view more details about its usage and background activity.
    • If you notice an app draining power in the background on an ongoing basis, consider limiting its background activity or uninstalling it if it’s not needed.

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Battery (or Battery & device carePower & battery, depending on your device).
    • Tap Battery usage or Battery usage by app (or similar).
    • Look through the list of apps and sort or filter by App usage or Screen time, if available, to identify top battery consumers.
    • Tap a high-drain app, then choose something like Restrict background usageOptimize, or Disallow background activity (depending on the options your phone offers).

    Common battery-draining culprits include social media apps, streaming apps, location-based apps and apps with heavy background update behavior. Reviewing this every few weeks can help catch new drains early. 

    Bonus: Check your battery health

    If your phone still drains quickly after these fixes, your battery might be aging. Both iPhones and Android devices offer built-in diagnostics to check battery health and capacity.

    For iPhone

    • Go to Settings.
    • Tap Battery.
    • Tap Battery Health & Charging (on some older versions, it may simply be “Battery Health”).
    • On the Battery Health screen, look at the Maximum Capacity percentage. This tells you how the battery’s current capacity compares to when it was new.
    • If the percentage is well below ~80%, it may be a good time to replace the battery to restore performance and capacity. (Apple notes that batteries are designed to retain around 80 % of their original capacity at 500 full charge cycles under ideal conditions.)

    For Android

    Settings may vary, depending on your Android phone’s manufacturer.

    • Go to Settings.
    • Tap Battery (or “Battery & device care,” “Power & battery,” depending on your phone).
    • Look for an option called Battery healthBattery capacityBattery status or Battery Information. Note: this may not appear on all phones.
    • If the built-in health indicator isn’t available, you can open the hidden test menu by dialing *#*#4636#*#* in the Phone app. If “Battery information” appears, you may see stats such as health, capacity, or cycle count.
    • If your battery health or capacity is shown as “Reduced” or significantly lower than expected, consider replacing the battery for better performance and longevity.

    Replacing an aging battery can dramatically improve performance and lifespan, often more than any software tweak.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    With a few quick tweaks, your phone can finally keep up with you all day. Adjusting settings, limiting background activity and checking battery health really do make a difference. You’ll spend less time stressing about a low battery and more time actually using your phone. Stay proactive, and your device will stay powered when you need it most.

    Got a tip you’d like to share, and/or what other everyday tech challenges would you like help solving? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Scammers target retirees as major 401(k) rule changes loom for 2026 tax year ahead nationwide

    NEWYou can now listen to Fox News articles!

    If you’re over 50 and maxing out your 401(k), there’s a big change coming in 2026 that could affect how much tax you pay on your “catch-up contributions.” While it’s mostly about taxes and retirement planning, there’s an unexpected side effect: scammers are circling. Every time your financial habits or personal data become public, it’s a chance for fraudsters to try to exploit you. Here’s what’s changing, why it matters, and how to protect yourself before the scammers come knocking.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    What’s changing with 401(k) catch-up contributions

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Right now, if you’re over 50, you can make extra contributions to your 401(k) on top of the standard annual limit ($23,500 in 2025). These “catch-up” contributions are typically tax-deferred, meaning the money comes out of your paycheck before tax and grows tax-free until retirement.

    But starting in 2026, for anyone earning more than $145,000 in the previous year, these catch-up contributions will no longer be tax-deferred. Instead, they’ll become like the Roth 401(k), meaning you pay taxes on the money now, but it grows tax-free and can be withdrawn tax-free in retirement.

    That sounds simple, but it creates a ripple effect:

    • High earners will see less take-home pay now.
    • Tax planning gets trickier, and some people may consider restructuring their accounts or investment strategies.
    • And, most importantly for CyberGuy readers: these changes create new opportunities for scammers.

    Big 401(k) changes in 2026 could leave retirees exposed to new scam risks. (Cyberguy.com)

    Why the new rules could attract scammers

    FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING IT

    Scammers constantly look for financially active retirees. When rules like this change, fraudsters send out emails, calls, or letters pretending to be financial advisors, IRS agents, or plan administrators. Their goal? To trick you into giving away account numbers, Social Security details, or direct-deposit information.

    Some common scam tactics to watch for:

    • Fake “plan update” emails claiming you need to verify your 401(k) contributions due to the law change.
    • Roth conversion scam calls claiming you can “avoid extra taxes” by transferring your account through a third-party “advisor.”
    • Urgency and fear tactics, such as “Act now, or lose your retirement benefits!”

    Even savvy retirees can be caught off guard, especially when the message sounds official and references real tax law changes.

    How to protect yourself from 401(k) scams and data theft

    NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

    With new 401(k) rule changes taking effect, scammers are using the confusion to trick retirees and workers alike. Follow these steps to stay alert, safeguard your savings, and protect your personal data from being stolen or misused.

    1) Know the legitimate changes

    Start by understanding Secure 2.0 and how catch-up contributions will be taxed. Reliable sources include your plan administrator, the IRS website, or a licensed tax advisor. Staying informed helps you spot fake claims before they cause harm.

    2) Use a personal data removal service

    For retirees, this extra layer of protection keeps sensitive information out of reach from scammers who exploit tax changes, Roth conversions, and retirement updates. While you can manually opt out of data brokers and track your information, that process takes time and effort. A personal data removal service automates the task by contacting over 420 data brokers on your behalf. It also reissues removal requests if your data reappears and shows you a dashboard of confirmed removals.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Scam written on a tablet surrounded by cash

    Scammers are already targeting retirees with fake “account update” alerts. (Kurt “CyberGuy” Knutsson)

    HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUD

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    3) Verify every call and email, plus use antivirus software

    If you get a call or email about your 401(k), don’t assume it’s real. Hang up or delete it, then contact your plan administrator directly using official contact details. Avoid clicking links or downloading attachments from unknown messages.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    4) Monitor your credit and accounts

    Cybercriminals often use personal information from earlier data leaks or data brokers. Watch your credit reports and account activity closely. Early detection can stop suspicious transactions before they escalate.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    5) Set up alerts and freezes if necessary

    Ask your bank and retirement plan to enable transaction alerts. You can also temporarily freeze your credit to prevent anyone from opening new accounts in your name. This is especially useful during times of financial change.

    6) Educate friends and family

    Scammers often target retirees and their relatives who help manage finances. Remind your loved ones never to share account details over the phone or email. Protecting everyone in your household keeps scammers from finding weak links.

    Man reviews inheritance documents

    Stay safe by confirming any 401(k) changes directly with your plan provider. (uchar/Getty Images)

    Kurt’s key takeaways

    As 2026 approaches, the new 401(k) rule changes will reshape how millions of Americans manage their retirement savings. Staying informed, cautious, and proactive can protect your financial future. Scammers thrive on confusion, but by verifying information, monitoring your accounts, and removing your personal data from risky sites, you can stay one step ahead. Remember, the more control you take over your privacy, the harder it becomes for criminals to exploit it.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Have you taken steps to see where your personal data is exposed, and what did you find most surprising when you checked? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Ethernet vs Wi-Fi security comparison reveals surprising results for home users seeking protection

    NEWYou can now listen to Fox News articles!

    We spend so much time online that how we connect to the internet has become almost as important as the devices we use. Most people never give it a second thought. They connect their computer to Wi-Fi, type in a password and get on with their day. But if you have ever wondered whether plugging in an Ethernet cable is safer than sticking to wireless, you are asking the right question. The way you connect can have real consequences for your privacy and security. Recently, Kathleen reached out to me with the same doubt.

    “Is it more secure to use the Ethernet connection at home for my computer, or is it safer to use the Wi-Fi from my cable provider?”

    It’s a great question, Kathleen, because both options seem similar on the surface but work very differently under the hood. Those differences can mean the difference between a private, secure connection and one that’s more vulnerable to attackers.

    BEWARE OF FAKE WI-FI NETWORKS THAT STEAL YOUR DATA WHEN TRAVELING

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Ethernet offers direct, wired security without wireless risks. (Kurt “CyberGuy” Knutsson)

    How Ethernet and Wi-Fi differ when it comes to security

    Ethernet and Wi-Fi both get you online, but they do it in completely different ways. Ethernet uses a physical cable that connects your computer directly to the router. Since it is a wired connection, data travels straight through that cable, making it much harder for anyone to intercept it. There is no wireless signal to hijack, no airwaves to eavesdrop on.

    Wi-Fi, on the other hand, is built on convenience. It sends your data through the air to and from your router, which is what makes it so easy to connect from anywhere in your home. But that convenience comes with more risk. Anyone within range of your signal could potentially try to break into the network. If your Wi-Fi is protected by a weak password or uses outdated encryption, a skilled attacker might gain access without ever stepping inside your house. 

    At home, that risk is smaller than in a coffee shop or hotel, but it is not zero. Even a poorly secured smart device on your network can give attackers a way in. Ethernet removes many of those risks simply because it is harder to access a connection that requires physical access to a cable. Check out our steps for setting up a home network like a pro here.

    DON’T USE YOUR HOME WI-FI BEFORE FIXING CERTAIN SECURITY RISKS

    Why one connection might be safer than the other

    It is easy to think Ethernet is automatically safer, but that is not the whole story. Your real security depends on how your entire network is set up. For example, a Wi-Fi network with a strong password, up-to-date router firmware, and WPA3 encryption is going to be far more secure than a poorly configured Ethernet setup connected to an outdated router.

    There is also the question of who else uses your network. If it is just you and a handful of devices, your risk is low. But if you live in a shared space or run smart home gadgets, that changes the equation. Each device connected to Wi-Fi is a potential entry point. Ethernet reduces the number of devices that can connect, which limits the attack surface.

    Ultimately, the connection type is one piece of the puzzle. The bigger factors are how your router is configured, how often you update your software, and how careful you are with what devices you connect.

    Wireless router with four antennas glowing in blue and pink light.

    Wi-Fi brings convenience but also potential exposure to hackers.  (Kurt “CyberGuy” Knutsson)

    6 ways to make your internet safer

    Whether you stick with Wi-Fi or switch to Ethernet, there are several practical steps you can take to protect your devices and data. Each step adds an extra layer of security to your network.

    IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN

    1) Use a strong network password

    Choose a long and unique password for your Wi-Fi. Avoid obvious choices like your name, address, or simple sequences. A strong password makes it far harder for attackers to guess or crack your network. A password manager helps you create and store strong, unique passwords for every account, reducing the chances of a hacker gaining access through weak or repeated credentials.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    2) Enable the latest encryption on your router

    Most modern routers support WPA3, which is much more secure than older standards like WPA2. Check your router’s settings to enable the latest encryption and ensure your network traffic is harder to intercept.

    3) Keep your router firmware updated

    Router manufacturers regularly release updates that patch security vulnerabilities. Log into your router’s admin panel occasionally to check for updates and install them as soon as they are available. This prevents attackers from exploiting known flaws. 

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    4) Review connected devices

    Regularly check which devices are connected to your network and disconnect anything you no longer use. Each connected device is a potential entry point for attackers, so keeping the list limited reduces your network’s exposure.

    5) Install strong antivirus software

    Even on a secure network, malware can sneak in through downloads, phishing attacks, or compromised websites. A strong antivirus program will detect and block malicious activity, protecting your computer before damage occurs.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    Close-up of a Wi-Fi router showing Ethernet ports and connected network cables.

    Ethernet cables connect to a router as part of a home network setup. (Kurt “CyberGuy” Knutsson)

    6) Use a VPN for sensitive tasks

    A virtual private network encrypts your internet traffic, making it unreadable to outsiders. This is especially useful if you ever use Wi-Fi in public or need an extra layer of privacy at home. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN

    Kurt’s key takeaway

    So, which is safer, Ethernet or Wi-Fi? Ethernet wins in raw security because it eliminates many of the risks that come with wireless connections. But in a well-secured home network, the difference is often smaller than most people think. What matters more is how you manage your devices, passwords, software, and online habits.

    CLICK HERE TO GET THE FOX NEWS APP

    Would you trade the flexibility of wireless for the peace of mind of a wired connection? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Teens hack school cell phone bans with creative workarounds

    NEWYou can now listen to Fox News articles!

    Across the country, schools are cracking down on cell phone use. At least 18 states have rolled out bell-to-bell bans, with New York calling phones “distraction devices.” Teachers are praising the shift, saying classes feel more focused. But teens? They’re not giving up so easily.

    Students are sidestepping bans in the most millennial-inspired way possible, turning Google Docs into digital chat rooms. With laptops open, it looks like they’re working on assignments. In reality, they’re typing messages back and forth in real time, just like an old-school AOL chat room.

    SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter  

    Students secretly turn Google Docs into real-time chatrooms. (Kurt “CyberGuy” Knutsson)

    A creative workaround for school cell phone bans

    Parents and teachers admit the workaround is clever. One teacher said she respects her students’ determination to stay connected and even acknowledged that the phone ban has improved behavior and focus in class. Still, she worries that turning Google Docs into chat rooms could open the door to bullying or cheating. Parents are also weighing in. One parent told CyberGuy that some kids in their district are buying MacBooks just so they can text each other through iMessage. Others, the parent added, are leaning on email threads or even old-school Post-It notes to keep the conversation alive.

    A girl writes at a table in front of an open laptop.

    Teens share their classroom hacks on TikTok with pride. (Kurt “CyberGuy” Knutsson)

    Social media reaction

    On TikTok, students proudly show off their “secret” Docs conversations. Captions range from playful, “Your cell phone rule was never going to stop me,” to defiant: “Can’t ever silence us, queens.” The creativity is earning laughs from older generations who remember the days before smartphones. But the trend is also stirring debate. Some parents see it as a harmless way for kids to adapt, while others worry it undermines the entire point of the ban. Educators are split too, amused by the ingenuity, yet frustrated that students are still finding ways to drift off task during lessons. The viral clips prove one thing for sure: when it comes to tech, today’s teens will always find a workaround.

    A girl uses the trackpad on a MacBook.

    Some kids buy MacBooks to keep texting through iMessage. (Kurt “CyberGuy” Knutsson)

    Parent tips for navigating school cell phone bans

    If your child’s school has adopted a phone ban, there are a few ways you can help them adjust while keeping communication open and safe:

    • Talk about the rules at home: Explain why schools are putting these bans in place and set expectations for how your child should behave with laptops and other devices.
    • Offer safe communication plans: Work with your child and the school to establish how you’ll contact each other in case of an emergency. Some districts allow phones in lockers or require them to stay powered off in backpacks.
    • Encourage balance: Remind your child that downtime from screens can actually help them focus better in class and relax during the school day.
    • Monitor alternatives: Keep an eye on how your child uses tools like Google Docs, email or messaging apps. What starts as chatting with friends can sometimes veer into bullying or cheating.
    • Be open to feedback: Ask your child how the ban is affecting their school day. Their perspective can help you understand where the real challenges and benefits are showing up.

    TEENS AND PHONE USE WHILE DRIVING: WHY THIS DEADLY HABIT PERSISTS

    What this means for you

    If you’re a parent, this shows just how inventive kids can be when rules are put in place. Cell phone bans may cut down on scrolling, but students are quickly shifting to other tools. They’re chatting through shared Google Docs, buying MacBooks so they can iMessage during class, swapping notes over email, and even sticking to old-school Post-Its to stay in touch. While some of these workarounds seem harmless, they also carry risks, from distractions that take focus away from learning to new opportunities for bullying or even cheating. For teachers, it’s a reminder that managing distractions in the classroom goes beyond phone policies. Laptops, messaging apps, and even simple sticky notes can become back doors for the same behaviors schools are trying to limit. 

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Phone bans are reshaping the school day, and educators are already seeing benefits. Yet students are proving they’ll always find ways to connect, whether through phones, laptops or even retro workarounds that echo the early internet era.

    What do you think? Are these bans helping kids learn better, or are they simply pushing students to get sneakier with tech? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Windows 10 support ends: Upgrade to Windows 11 safely

    NEWYou can now listen to Fox News articles!

    With Microsoft ending support for Windows 10 this October, many people are racing to upgrade. Catherine, a longtime HP desktop user, shared her concerns with us: “I need to purchase a new/updated computer with Windows 11 pretty darn quick. I’ve utilized HP desktops for years and would prefer to continue to do so. My concern deals with transferring everything from one computer to another, made more interesting since my husband and I have separate setups and log-ins. I had a My Passport running, but now I believe a lot is in the cloud. We are concerned about losing our emails/contacts, etc. I also use various programs for a couple of groups I’m involved with (Word, PowerPoint, Excel, Adobe Acrobat, etc.), which I cannot afford to lose. Any guidance for a smooth transition would be great.”

    If this sounds familiar, you’re not alone. The good news: you can move everything to a new HP computer running Windows 11 with the right preparation and tools. Here’s a step-by-step guide.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    WHAT HAPPENS WHEN WINDOWS 10 SUPPORT ENDS IN 2025?

    Microsoft will end support for Windows 10 this month. (Microsoft)

    What to prepare before you buy a new computer

    Before you switch to a new Windows 11 PC, take these steps to organize your files, programs and accounts, so the move goes as smoothly as possible.

    1) Inventory what you have and make sure it’s backed up.

    • List the programs/software you use (Word, PowerPoint, Excel, Acrobat, etc.), including any license/activation info.
    • Find where your data is: local hard drive, external My Passport drive or cloud (OneDrive, Google Drive, etc.).
    • Make sure you have backups of anything that’s only local.

    2) Check how your email is set up.

    • If it’s a Microsoft/Outlook/Exchange account, a lot may already be stored in the cloud. Outlook contacts/calendars may sync automatically depending on how your accounts are configured.
    • If you use POP (email downloaded locally), or “local only” Outlook data (.pst files), you’ll need to move those manually.

    3) Have your login accounts ready.

    • Know your Microsoft account credentials (if you use one).
    • Know admin passwords for existing software.

    4) Gather license keys/software installers.

    • For paid apps (Adobe Acrobat etc.), make sure you have install files or know how to re-download, plus activation keys.
    • Make a note of any special settings or plugins you use so they get restored.

    Choosing the right computer for your needs 

    When choosing a new HP computer, confirm it runs Windows 11 out of the box. Pick a model with enough storage to hold all your files and plenty of RAM for multitasking. If you rely on external drives, make sure the new computer has the right ports, like USB-C or USB 3.0.

    You can browse CyberGuy’s best laptop picks or best desktop computers for solid options at Cyberguy.com. If you mainly use your computer for email, browsing, or video calls, a tablet, Chromebook, or iPad might be all you need. They’re low-maintenance, secure, and often more affordable than a new Windows laptop.

    WINDOWS 11 FLAW LETS HACKERS BYPASS SECURE BOOT PROTECTIONS

    Windows 11 and Windows 10

    Windows 11 and Windows 10 operating system logos are displayed on laptop screens. Krakow, Poland, on Feb. 3, 2022.  (Beata Zawrzel/NurPhoto)

    Step-by-step: Migrating to the new Windows 11 computer 

    Moving to a new PC takes planning, but following these steps will help you transfer your files, programs and settings safely. This is especially important if you and your spouse use separate logins.

    Back up everything

    Start by backing up your personal files, documents, pictures and desktop to both your external drive and a cloud service like OneDrive. If you use Outlook, export your email, contacts, and calendar if needed.

    • For POP or local .pst files, go to File → Open & Export → Export → Outlook Data File (.pst) and make a copy.
    • For IMAP or Exchange accounts, confirm that everything has synced properly online.

    Back up Windows and settings

    Use Windows Backup or the built-in tools to save your settings and user folders. Apply the latest Windows updates on the old PC before making the switch.

    Set up the new PC

    When you turn on your new computer, sign in with your Microsoft account if you have one. This helps sync certain settings automatically. Reinstall your Office apps, Adobe Acrobat, and any other software using your license keys or installers.

    Transfer data and settings

    If both PCs are connected and supported, you can use Windows Backup’s “Transfer information to a new PC” option. Simply pair them and choose what to move. If that’s not an option, copy backups from your external drive or cloud storage onto the new computer. Restore email by importing your .pst file if required.

    Verify everything works

    Open your key programs to confirm licensing is valid. Check that your email, contacts and calendar are functioning correctly. Go through your files to make sure nothing is missing.

    Set up backup and ongoing sync

    Once you’re up and running, turn on OneDrive or your preferred cloud service to sync important folders like Documents and Desktop. Finally, create a regular backup plan using either your external drive or the cloud, so your new PC stays protected.

    Common problems to avoid

    Some users run out of space on their new PC because they underestimated how much data they had. Others lose email when they forget to export .pst files. License activation can also cause headaches if the software is tied to the old machine, so always deactivate before reinstalling. And remember that older programs may not work perfectly on Windows 11, so check compatibility in advance.

    Tools that can help

    • 3rd party software: Transfers files, settings and some installed apps automatically. For our picks, search “First 10 things to do if you got a new PC” on Cyberguy.com
    • Windows Backup and Transfer: Free but may require reinstalling programs manually.

    External hard drive backup: Still the simplest safety net for keeping copies of your important files. Copy everything important to your external drive as a safety measure before migrating.

    MICROSOFT AUTHENTICATOR IS DELETING YOUR PASSWORDS

    A person typing on a laptop

    Experts recommend backing up your files to an external hard drive or a cloud service before making the switch. (Kurt “CyberGuy” Knutsson)

    How long the process takes

    Upgrading to a new computer isn’t instant, but knowing the timeline helps you plan your day. On average, you can expect the transition to take most of an afternoon. Here’s what it looks like step by step:

    Choose and order your new PC: Browsing, comparing models and making the purchase usually takes one to two hours.

    Initial setup and Windows updates: When the new computer arrives, the first startup and applying all current Windows updates can take another one to two hours.

    Install key programs: Installing Microsoft Office apps and Adobe Acrobat typically requires about one hour, depending on download speed and license activation.

    Back up data on your old PC: Creating backups of your documents, photos and email accounts usually takes one to three hours. The exact time depends on how much data you have and whether you use an external drive or the cloud.

    Transfer data and settings: Moving files, Outlook .pst backups and Windows settings to the new computer often takes one to two hours.

    Verify that everything works: Allow about an hour to test your programs, check your email and contacts, and confirm that none of your files were left behind.

    Reconnect devices and tweak settings: Finally, plan for 30 to 60 minutes to reconnect printers, set up Bluetooth accessories and customize your desktop and preferences.

    When you add it all together, the full migration can take anywhere from six to ten hours spread over a day. While it requires patience, completing each step carefully ensures that your new Windows 11 computer runs smoothly without losing important data.

    Pro tip: Once your new PC is ready, don’t forget security. Install strong antivirus software right away. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    What to do with your old PC

    Once you’ve finished moving everything over to your new Windows 11 computer and confirmed it’s working, don’t forget about your old PC. Leaving files on it could expose your personal data if the computer is ever donated, recycled or resold.

    Before repurposing, always perform a secure wipe to erase all personal information. This step ensures that sensitive files, passwords and documents can’t be recovered later. After wiping, you can safely recycle the device, donate it or set it up for light use elsewhere in your home.

    For step-by-step instructions, check out how to securely get rid of your old computer before recycling, selling or donating it.  

    CLICK HERE TO GET THE FOX NEWS APP

    What if you’re not ready to upgrade?

    Not everyone wants to switch right away. The good news is that Microsoft recently added two ways to extend Windows 10 support until October 13, 2026.

    • Use Microsoft Rewards: Redeem 1,000 points to keep your Windows 10 system covered.
    • Back up with OneDrive: Sync your files through Windows Backup and get extended support for free.

    These options buy you more time, but remember: Windows 11 is the future. Planning now ensures you won’t be caught off guard when the final end date arrives.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    Upgrading from Windows 10 to Windows 11 may feel overwhelming, but it doesn’t have to be. With the right preparation, backups and tools, you can make the switch smoothly and protect everything that matters.

    Are you ready to upgrade before Windows 10 support runs out, or will you risk sticking with an outdated system? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • New exoskeleton built to boost endurance and cut fatigue

    NEWYou can now listen to Fox News articles!

    If you have ever wanted to walk longer, hike farther, climb more challenging trails or cycle with less strain, the Hypershell X Ultra is ready to assist you in all of those activities. 

    This latest exoskeleton improves on earlier models and shows how wearable tech can unlock new levels of outdoor performance.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    THE NEW ROBOT THAT COULD MAKE CHORES A THING OF THE PAST

    Hypershell X exoskeleton aims to improve outdoor performance in running, hiking and other activities. (Hypershell)

    Power that pushes you forward

    The Hypershell X Ultra features the M-One Ultra motor system, which delivers up to 1000W of power. That is about 1.3 horsepower attached directly to your hips. The range has been extended to 18.6 miles, meaning you can travel longer on a single charge. With efficiency above 90% and AI algorithms that adjust in real time, the exoskeleton feels like part of your body. 

    Smarter movement across terrain

    The Hypershell X Ultra is designed to adapt automatically. A new descent mode protects your knees by reducing impact on joints and boosting support when walking downhill. The exoskeleton also provides smarter assistance when you accelerate, start a ride or pick up the pace on a run. With 12 terrain modes to choose from, it adjusts to almost any environment. These modes include Cycling+, Running+, Snow, Dune, Walking, Speed Walking, Uphill, Downhill, Mountain, Gravel, Up Stairs and Down Stairs.

    NEW CAPSULE DEVICE LETS YOU CONTROL ROBOTS WITH YOUR ENTIRE BODY

    A woman hiking while wearing the Hypershell X Ultra exoskeleton

    Hypershell X Ultra features an improved motor system, allowing the user to travel longer on a single charge. (Hypershell)

    Built tough for real adventures

    At under 4 pounds, the X Ultra is lightweight but strong. It uses carbon fiber and titanium alloy for aerospace-level durability. With an IP54 rating, it resists dust, rain and snow. The Hypershell+ app, available for Android, iOS and Apple Watch, gives you easy access to settings and performance data. At $1,999, it is an investment, but one that could transform the way you move outdoors. For anyone looking to extend endurance and take on new challenges, it represents the future of adventure.

    Proven performance you can trust

    Independent testing from SGS in Switzerland verified the X Ultra’s performance. In trials, users reduced exertion by up to 22% while walking, and 39% while cycling. Heart rates dropped as much as 40%, showing the impact this suit can make. These results confirm that the X Ultra is more than marketing talk.

    CLICK HERE TO GET THE FOX NEWS APP

    Cyclists wearing the Hypershell X Ultra exoskeleton while on a ride

    Hypershell X Ultra uses carbon fiber and titanium alloy for aerospace-level durability. (Hypershell)

    What this means for you

    Whether you are training for an endurance event, keeping pace with your kids on a hike or exploring places once out of reach, the Hypershell X Ultra provides extra support and reduces fatigue. It helps you go farther while protecting your body from strain.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    The Hypershell X Ultra takes the strain out of steep climbs, long hikes and even tough bike rides. It helps you conserve energy, protects your joints and gives you that extra push when you need it most. Whether you are hiking mountain trails, cycling longer distances or exploring new terrain like snow and sand, this exoskeleton makes the journey feel easier and more exciting. For anyone ready to push past limits, it could be the future of outdoor adventure.

    Would you wear an exoskeleton to boost your outdoor performance, or would you rather stick to your natural limits? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • 10 iOS 26 tricks that help you get more out of your iPhone

    NEWYou can now listen to Fox News articles!

    IOS 26 has arrived, bringing a mix of practical upgrades and fun new features that make your iPhone smarter and easier to use. Updating only takes a few minutes, and it ensures you get the latest tools along with Apple’s newest security fixes.

    From smarter spam filters in Messages to custom alarm snooze times and even polls in group chats, iOS 26 is packed with ways to simplify your day. Here’s how to install iOS 26 and start exploring its best features right away.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Updating to iOS 26 takes just a few minutes. (Kurt “CyberGuy” Knutsson)

    How to update your iPhone to iOS 26

    Updating to iOS 26 takes just a few minutes, and it ensures you get the latest features and security fixes. Make sure your iPhone is charged and connected to Wi-Fi before you start.

    Follow these steps:

    • Open the Settings app on your iPhone.
    • Tap General.
    • Select Software Update.
    • If iOS 26 is available, tap Upgrade to iOS 26.
    • Click Update Now.
    • Enter your passcode if asked, then agree to the terms.
    • Wait for the download and installation to finish. Your iPhone will restart with iOS 26.
    Steps to update iPhone with iOS 26

    Your phone will restart with the new update after following the process. ( )

    iOS 26 compatible devices:

    IOS 26 works on a wide range of iPhones, from the iPhone 11 series through the latest iPhone 17 lineup. Compatible models include:

    IPhone 17, iPhone 17 Pro, iPhone 17 Pro Max, iPhone Air, iPhone 16e, iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 15, iPhone 15 Plus, iPhone 15 Pro, iPhone 15 Pro Max, iPhone 14, iPhone 14 Plus, iPhone 14 Pro, iPhone 14 Pro Max, iPhone 13, iPhone 13 mini, iPhone 13 Pro, iPhone 13 Pro Max, iPhone 12, iPhone 12 mini, iPhone 12 Pro, iPhone 12 Pro Max, iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max, and iPhone SE (2nd generation and later).

    1) Smarter spam message detection

    Spam texts arrive at the worst times. IOS 26 filters these unwanted messages into a separate folder, keeping your main inbox clean. Here’s how to use this feature:

    • Open the Messages app.
    • Click the horizontal lines in the upper right of the screen
    • Go to the Unknown Senders folder.
    • Review texts moved there automatically.
    • Click the right arrow and mark as known or delete the spam.

    You can check the “Unknown Senders” folder anytime, mark trusted contacts or delete the clutter without ever being disturbed by lock screen notifications.

    Steps to mark as known or delete the spam in unknown senders folder

    Users are also able to instantly share location via Maps.  ( )

    2) Instantly share your location in Maps

    IOS 26 makes it simple to send your location without even opening the Maps app. Here’s how:

    • Touch and hold the Maps icon on your Home Screen.
    • Tap Send My Location.
    • From there, you can choose how to share it. AirDrop works best if the person is nearby, while Messages lets you send it instantly to friends or family anywhere.

    This shortcut removes the hassle of digging through menus and makes sharing directions effortless.
     

    Steps to instantly share your location in Maps

    The new update also allows users to sort and view call history by contact. ( )

    3) View call history by contact

    No more endless scrolling. Now you can quickly see every incoming, outgoing and missed calls in one organized list.

    • Open the Phone app.
    • Click the search icon.
    • Type the contact’s name and click the search icon. 
    • Select the contact’s name.
    Steps to view call history by contact

    New updates make it easier to view all calls with one person at a glance. ( )

    • Select Call History
    • There you will see all calls associated with that person.

    This makes it easy to check all your calls with one person at a glance, without scrolling through your entire log.

    Steps to view call history by contact

    Specific text can also now be selected in a text message. ( )

    Sign up to get more of my Tech Tips in my FREE CyberGuy Report. Sign up for free here:
    CYBERGUY.COM/NEWSLETTER 

    4) Select specific text in a message

    Sometimes you only need one detail instead of the entire message bubble. Here’s how to grab it:

    • Open the Messages app.
    • Long-press the message you want.
    • Tap Select from the menu.
    • Drag the selection handles to highlight just the part you need.
    • Click the right arrow > to choose to copy, look up, translate, search webspeak or share it instantly.

    It’s a quick way to pull out only the detail you need, whether that’s an address, a code or just a single word.

    Steps to select specific text in a message

    The new update permits users to disable “tap recents to call.”  ( )

    5) Disable “Tap Recents to Call”

    Accidental calls can be embarrassing. IOS 26 lets you turn this off, so tapping a number in Recents won’t instantly dial; you’ll have to press the call button on purpose. Here’s how to toggle off or disable the feature:

    • Open Settings.
    • Scroll down and tap Apps.
    • Choose Phone.
    • Toggle off Tap Recents to Call.

    Now your call log stays drama-free. Tapping a number in Recents won’t instantly start a call anymore. You’ll need to press the call button on purpose. That means no more accidentally ringing your boss when you just wanted to double-check the number.

    EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES

    Steps to disable "Tap Recents to Call"

    The above illustration features steps to disable “Tap Recents to Call” in the Settings App. ( )

    6) Customize alarm snooze options

    Not a fan of the default 9-minute snooze? IOS 26 lets you set the interval that actually matches your morning routine. Follow these steps to adjust it:

    • Open the Clock app.
    • Tap the Alarms tab.
    • Select an existing alarm (or tap + to create one).
    • Tap Snooze Duration. 
    • Choose your snooze time from 1 to 15 minutes.
    • Tap Save.

    Your mornings become more manageable, whether you’re grabbing a quick 5-minute reset or easing into the day with a longer break.

    Steps to customize alarm snooze options

    The above illustration shows steps to customize alarm snooze options in Clock App. ( )

    7) Get a dirty lens warning

    Nothing ruins a photo faster than a smudged lens. With iOS 26, you can turn on Lens Cleaning Hints, so your iPhone warns you before you take a blurry shot. Here’s how:

    • Open Settings.
    • Scroll down and tap Camera.
    • Find Lens Cleaning Hints.
    • Toggle the switch on.

    Now, when your camera detects smudges or haze, iOS 26 will display an on-screen hint in the Camera app, reminding you to clean the camera lens before taking your shot.

    Steps to get Get a dirty lens warning

    Here are steps to get a dirty lens warning in Settings App. ( )

    8) See estimated charging time

    Ever wonder how long it will take to fully charge your iPhone? IOS 26 now shows you an estimated charging time so you can plan your day better. Here’s how to view it:

    • Plug your iPhone into a charger.
    • Wake your phone, and the Lock Screen will display the estimated time until fully charged.
    • For more details, open Settings.
    • Tap Battery.
    • Look for the Estimated Full Charge Time under the charging status.

    This makes it easy to tell whether you’ll be at 100% before leaving the house or if you should pack a charger for later.

    Steps to see estimated charging time

    This makes it easy to tell whether you’ll be at 100% before leaving the house or if you should pack a backup charger. ( )

    9) Make the clock on your Lock Screen bigger

    Want your time display to stand out more? IOS 26 lets you adjust the size of the clock on your Lock Screen for a bolder look. Here’s how:

    • Long-press on your Lock Screen.
    • Tap Customize at the bottom.
    • Use the pull handle on the bottom right to adjust the size.
    • Tap Done to save your changes.

    On certain wallpapers, the clock even has a depth effect, slipping behind the subject in your photo. With Photo Shuffle wallpaper, the clock can adjust dynamically, and it also stretches in areas like the Notification Center, giving your iPhone a fresh and lively feel.

    CLICK HERE TO GET THE FOX NEWS APP

    Steps to make the clock on your Lock Screen bigger

    Users can also modify their clock appearance. ( )

    10) Create a poll in iMessage

    Can’t decide what color to paint your walls, where to eat or which movie to watch? IOS 26 lets you create quick polls right inside group chats so everyone can vote. Here’s how:

    • Open the Messages app.
    • Enter a conversation (this works in group chats or individual messages).
    • Tap the + button next to the text box.
    • From the pop-up menu, select Polls.
    • Tap each choice field and type your options (add more choices by typing into the next blank field).
    • When you’re done, tap Send (Up arrow).

    Now your friends or coworkers can vote directly in the chat, and you can decide whether to follow the results or just order what you were craving anyway.

    Steps to create a poll in iMessage

    Users can also now create a polls for others in iMessage. (Kurt “CyberGuy” Knutsson)

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com/Quiz

    Kurt’s key takeaways

    IOS 26 goes beyond security patches; it’s about convenience and personalization. You can finally adjust your snooze to match your mornings, keep your inbox free from spam, see how long charging will take and even get a heads-up if your camera lens is dirty before snapping a shot. These small but meaningful updates add up to a smoother iPhone experience.

    Which iOS 26 feature are you most excited to try first, polls in iMessage, spam filters or something else entirely? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    Source link

  • How scammers target you even without social media

    NEWYou can now listen to Fox News articles!

    “I don’t use Facebook. I don’t even have an email. How could scammers possibly know anything about me?”

    That’s the question I hear from people over 60 all the time. If you assume that by staying off social media and avoiding the internet, you’re invisible to fraudsters, think again.

    The truth is, even if you’ve never posted a single thing online, scammers can still know your age, home address, relatives’ names, property value, and even when you’ve suffered the loss of a loved one. How? Because the everyday details of your offline life are quietly being collected, digitized, and sold.

    And scammers are taking full advantage.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Scammers can still know a lot about you, even if you have never posted anything online. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)

    How scammers target seniors without social media

    Here’s the uncomfortable reality: you don’t have to “put yourself out there” for your information to appear online. Much of it becomes public record automatically, thanks to the way our legal and government systems work.

    Some of the biggest sources include:

    • Obituaries: When a loved one passes away, obituaries often list family members, ages, locations, and relationships. To scammers, it’s a family tree of potential targets.
    • Real estate records: Property purchases, sales, and even mortgage details are public. This can tell scammers whether you own your home outright, what it’s worth, and if you might be cash-rich.
    • Probate filings: When estates go through probate, details about beneficiaries and assets are recorded. Scammers can identify heirs and target them with fraudulent “inheritance assistance.”
    • Property tax documents: These are often searchable by anyone. They reveal not only your address but also your financial standing.
    • Court filings: Divorce, bankruptcy, and civil disputes often contain personal details, which are public by law.

    On their own, these may not seem dangerous. But combined, they create a shockingly detailed portrait of your life.

    THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY

    A man leaning on a fence using a tablet

    Public records can provide a portrait of your life. (Barbara Eddowes via Getty Images)

    Bereavement scams and emotional tricks scammers use

    One of the cruelest scams I’ve seen lately is what I call the bereavement scam.

    Here’s how it works:

    A scammer scrapes local obituaries to see who’s recently lost a spouse or child. They then reach out, by phone, email, or even mail, pretending to be a funeral home, a grief counselor, or a charity. Because they reference real names, dates, and relationships, their outreach sounds painfully authentic.

    • Example: “We saw you lost your husband on March 3rd. We’d like to offer you a free grief support service…”
    • Or: “Your loved one’s final medical expenses may qualify for reimbursement. We just need your banking details to confirm.”

    When you’re in mourning, your guard is down. Scammers know this, and they exploit grief to steal money and identities.

    Other emotionally charged scams follow the same playbook

    • Fake Medicare calls referencing your age and location.
    • Phony financial advisors offering to “help” with retirement rollovers.
    • Romance scams targeting widows and widowers who live alone.
    • Fake agent scams trick victims into paying thousands of dollars through phone threats

    The unifying factor is that these criminals don’t need Facebook to learn about you. They already have a dossier built from public and brokered data.

    What’s even worse is that scammers can target your loved ones even years after your passing. They can call or text your close relatives claiming to offer free memorial services, annuities, or other common strategies when people are most vulnerable. Your exposed personal data fuels such morbid scams.

    9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUT

    A man typing on a laptop

    A man typing on his laptop (Kurt “Cyberguy” Knutsson)

    The shocking sources of your personal data

    Here’s the part most people don’t realize: scammers rarely dig through dusty courthouse files themselves. They don’t have to. That work has already been done by data brokers. Data brokers are companies whose entire business model is gathering and selling personal information. They collect from:

    • Public records (like those obituaries and real estate filings)
    • Consumer databases (credit headers, magazine subscriptions, surveys)
    • “People search” websites (Spokeo, Whitepages, BeenVerified, and dozens more).

    The result is a searchable profile that might include:

    • Full name and aliases
    • Current and past addresses
    • Phone numbers and email addresses
    • Relatives and their contact info
    • Age, income range, home value
    • Legal or financial history

    Once a broker has your data, they sell it. And once it’s sold, it spreads. Even if you’ve never had a social media account, companies may build a ‘shadow profile’ of you from leaked data, online purchases, or details shared by others, leaving it ready to be abused.

    How to protect yourself from scammers and data brokers

    The good news is, you’re not powerless. While you can’t stop public records from existing, you can make it much harder for scammers to access and weaponize your data. Here’s how:

    1) Reduce your digital footprint

    • Request removal from people search sites and data brokers.
    • This prevents your profile from being sold to scammers.
    • Doing this manually can take hours and has to be repeated, but it works.

    2) Stay alert for emotional manipulation

    • If someone contacts you after a loss, assume caution.
    • Verify charities and funeral services before engaging.
    • Never share banking or personal details over the phone or email.

    3) Automate data removal

    • Instead of manually contacting hundreds of data brokers, you can use a service like Incogni.
    • It sends and tracks removal requests across 420+ brokers, and keeps repeating the process so your data doesn’t resurface.
    • With their Unlimited plan, you can request data removal from any other shady website and disappear from the internet.
    • For seniors, this is often the safest and most practical solution.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Not being on Facebook doesn’t mean you’re invisible. Scammers don’t need you to share your life online. Your offline life is already online without your consent. The obituary in the local paper, the deed to your home, the probate record of your loved one’s estate, these are all turned into data points, sold to brokers, and resold to whoever wants them. That’s why protecting your personal data isn’t about avoiding the internet. It’s about reducing what’s already out there. The less data scammers can find, the harder it is for them to fool you with realistic, emotionally charged attacks. And that’s a big step toward keeping your money, your identity, and your retirement safe.

    Do you believe it’s time for the government and companies to step in and protect your data privacy?  Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Over 2B users face phishing risks after Google data leak

    NEWYou can now listen to Fox News articles!

    A tech leader like Google often seems invincible when it comes to cybersecurity attacks, but that is not the case. Earlier this month, the search giant confirmed that attackers had accessed one of its corporate Salesforce instances. According to a Google spokesperson, this system stored basic, and largely publicly available business information, such as contact details and notes from small and medium-sized companies. It did not store customer data from Google Cloud or consumer products like Gmail, Drive or Calendar.

    Google says it terminated the malicious activity, completed an impact analysis, and provided mitigations. Therefore, no further action is required by users.

    NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUD

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

    Cybercriminals are exploiting Google’s recent Salesforce data breach to launch vishing calls and phishing attacks against Gmail users worldwide. (Kurt “CyberGuy” Knutsson)

    Vishing calls target Gmail users

    Hackers have reportedly accessed Google’s Salesforce database systems, exposing customer and company names. Google confirmed the incident and clarified that the information was mostly public business contact data and did not include passwords or payment information. The company stressed that the breach affected only a corporate Salesforce system, not consumer Gmail or Google Cloud accounts.

    Still, attackers are exploiting the news of the breach to fuel phishing and vishing scams, tricking people into giving up sensitive information. According to PC World, some users have already reported an increase in phishing attempts that reference Google services.

    STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE

    One of the main tactics involves scam phone calls, also known as vishing. A Reddit post highlighted a wave of calls coming from the 650 area code, which is linked to Google’s headquarters. In these calls, scammers pose as Google employees and warn victims of a supposed security breach. They then instruct users to reset their Gmail password and share it with them. This locks the rightful owner out of the account and gives the attacker complete control.

    Gmail loading screen.

    A user launches Gmail. (Kurt “CyberGuy” Knutsson)

    Old infrastructure exploited with “dangling buckets”

    Separately from the Salesforce incident, Google Cloud customers are also facing another type of attack. Hackers are trying to exploit outdated access addresses using a method called the dangling bucket. This can allow them to inject malware or steal data. Both businesses and individuals are vulnerable to losing control over sensitive information if targeted in this way.

    Gmail and Google Cloud serve nearly 2.5 billion people, which makes the scale of the risk significant. Although the initial breach did not expose passwords, attackers are using the news of the incident to trick people into revealing their login details.

    Google homepage

    A Google search window is on a laptop. (Kurt “CyberGuy” Knutsson)

    6 ways you can stay safe from scammers targeting Google accounts

    Google accounts are often a prime target for scammers. The good news is that protecting yourself doesn’t require advanced technical skills. A few practical steps can drastically reduce your chances of becoming a victim.

    1) Avoid clicking on phishing links

    Phishing remains the most common way scammers steal Google account credentials. A fake email or text may claim your account has been locked or that you need to verify suspicious activity. Clicking the link usually takes you to a counterfeit login page that looks almost identical to the real Google sign-in screen.

    To avoid falling for these tricks, check the sender’s email address carefully, hover over links before clicking, and avoid entering your Google password on any page that doesn’t start with accounts.google.com.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    2) Save passwords securely

    Reusing weak passwords across multiple sites is an open invitation for scammers. If one site is breached, your Google account becomes vulnerable. A strong, unique password is your first line of defense.

    The easiest way to manage this is with a password manager. It can generate complex passwords, store them securely, and fill them in automatically when you need them. This way, you never have to remember dozens of different logins, and attackers can’t guess their way in.

    Next, see if your email has been exposed in past breaches. Our #1 password manager pick (see Cyberguy.com/Passwords) includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    WHAT TO DO IF YOU GET A PASSWORD RESET EMAIL YOU DIDN’T ASK FOR

    3) Delete personal data that puts you at risk

    Scammers often use information they find online to craft convincing attacks. If your email address, phone number, or even past passwords are floating around on data broker sites, criminals have more tools to impersonate you or trick you into revealing more.

    Using a data removal service helps clean up your digital footprint. By reducing the amount of exposed information about you, it becomes much harder for scammers to target you directly.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Turn on two-factor authentication

    Even the strongest password can be stolen, but two-factor authentication (2FA) adds an extra barrier. When enabled, Google will ask for a one-time code or prompt on your phone before granting access. That means even if a scammer manages to get your password, they can’t log in without also having your device.

    Google offers several 2FA methods, from SMS codes to app-based prompts and even hardware security keys. For the best protection, choose app-based or hardware verification rather than text messages.

    5) Keep your devices updated

    Many scams rely on exploiting outdated software. If your phone, browser, or operating system isn’t up to date, attackers may use known vulnerabilities to install malware or hijack your session.

    Set your devices to update automatically whenever possible. This ensures you’re always running the latest security patches, reducing the number of openings a scammer can use.

    6) Regularly check Google account security settings

    Google provides built-in tools to help users spot suspicious activity. By visiting your Google Account’s security page, you can see devices that have signed in, recent account activity, and whether recovery options like your phone number and backup email are up to date.

    Running a Google Security Checkup only takes a few minutes and gives you a clear overview of any weaknesses. Think of it as a health check for your digital life.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    The incident is a reminder that even tech giants with vast resources are not immune to security lapses. While Google insists that no passwords were exposed, the wave of phishing and vishing scams shows how quickly criminals can weaponize even partial leaks. What began as a breach of business data has spiraled into a threat facing millions of everyday users, raising questions about how secure Google’s ecosystem really is.

    Do you believe regulators should step in with stricter rules for how cloud providers handle security lapses? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    Source link

  • Smart tech tools that help you avoid dangerous falls

    NEWYou can now listen to Fox News articles!

    Falls are the number one cause of injury among adults 65 and older. But the truth is, your risk doesn’t suddenly appear the day you turn 65. It increases gradually over time, especially if you’re dealing with weak muscles, balance issues, side effects from medication, or even just forgetting a pill. Experts recommend that everyone get screened for fall risk at age 65. But you don’t have to wait for a doctor’s visit to take action. A new wave of technology is giving older adults the power to track, prevent, and respond to fall risks, all from home. Here are 10 smart tools that can help.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

    New technology can help track and prevent falls. (Kurt “CyberGuy” Knutsson)

    1) Gait sensors track how your balance changes over time

    Your walking pattern can reveal subtle issues that increase your risk of falling. If you use an iPhone with iOS 15 or newer, the built-in walking steadiness feature in the Health app can rate your balance as OK, low, or very low over time. Android users can use wearable fitness trackers like Fitbit, or Samsung Galaxy Watch to gather similar data. These tools track stride, stability, and pressure patterns that help identify balance changes before you feel unsteady.

    FORGET 10,000 STEPS — RESEARCH REVEALS THE REAL NUMBER YOU NEED FOR BETTER HEALTH

    What to check: On iPhone, open the Health app and review your walking steadiness trends. Android users can check their wearable app dashboards, like Samsung Health or Fitbit, to view step symmetry, cadence, and gait-related data. Look for any changes over weeks or months and take advantage of in-app exercise suggestions to improve balance and strength. 

    A woman working out

    Apps that track physical activity and walking patterns can help users improve their balance and strength, or even detect a change in gait before it becomes an issue. (Kurt “CyberGuy” Knutsson)

    2) Smart pill dispensers prevent risky mistakes

    Forgetting to take medication, or taking too much, can cause grogginess or dizziness that increases fall risk. A smart pill dispenser helps make sure you take the right dose at the right time.

    What to look for: Look for dispensers with reminders, dose tracking, and alerts for missed meds.

    A woman taking pills

    Smart pill dispensers can assist patients in making sure they take the correct dose of the desired medication at the right time. (Kurt “CyberGuy” Knutsson)

    3) Fitness trackers keep you motivated to move

    Building strength, especially in your legs and core, is one of the best ways to prevent falls. Whether you use an Apple Watch, Fitbit or another device, fitness trackers can nudge you toward daily movement goals.

    What to check: Track your cardio fitness levels, not just step counts. It’s a good indicator of your overall strength and endurance.

    A woman adjusting her Apple Watch

    Fitness tracking devices can help users build strength and resilience. (Kurt “CyberGuy” Knutsson)

    4) Vital-sign monitors help detect lightheaded spells

    Dips in blood pressure or oxygen levels can make you feel woozy, which increases your fall risk. Smartwatches and fingertip pulse oximeters help you monitor these changes in real time.

    What to check: If you’re not using a wearable, jot down your daily readings with a standard cuff or oximeter to spot any unusual trends.

    5) Motion-activated lighting lights the way

    Getting up in the middle of the night without enough light is a common recipe for a fall. Motion-activated lights can illuminate your path without you needing to touch a switch.

    What to look for: Try plug-in nightlights that turn on when they sense motion, or during a power outage. Some even double as portable flashlights.

    NEW MOBILE ROBOT HELPS SENIORS WALK SAFELY AND PREVENT FALLS

    6) Leak sensors help prevent unexpected slips

    A small water leak can create a slick floor long before it’s visible. Leak sensors alert you to changes in humidity or water buildup near appliances and pipes.

    What to look for: Choose ones that send alerts to your phone. You’ll avoid a fall and possibly a pricey repair bill.

    7) Doorbell cameras keep you from rushing

    One overlooked fall trigger is rushing to answer the door. A doorbell camera lets you see who’s there and speak to them, so you can take your time or decide not to answer at all.

    What to look for: A model with two-way audio gives you the freedom to communicate from wherever you are in your home.

    While we’re on the topic of security cameras, be sure to check out 10 things you must consider when choosing any security camera. 

    An outdoor doorbell camera

    Doorbell cameras enable users to communicate with visitors without rushing to answer the door. (Kurt “CyberGuy” Knutsson)

    8) Fall-detection devices can call for help

    Even the most independent older adults face higher fall risks, and family members who live far away may worry more than they let on. If a fall happens and you’re alone, getting help quickly is essential. Wearables like the Apple Watch can detect a hard fall and automatically alert emergency services or your emergency contacts. Apple Watch SE, Series 4 or later, and Apple Watch Ultra include fall detection. If a hard fall is detected, the watch vibrates, sounds an alarm, and gives the option to call emergency services.

    To turn it on manually:

    • Open the Watch app on your iPhone
    • Tap My Watch in the bottom left
    • Scroll down and click Emergency SOS
    • Toggle on Fall Detection and choose Always On

    If you don’t use an Apple Watch, there are other great options. Many Android-compatible smartwatches now offer fall detection, including select Samsung Galaxy Watch models. 

    There are also dedicated medical alert wearables that can help bridge that distance with a single button press. These tools are simple, discreet, and offer life-saving support, especially when no one else is around.

    Check out some of the top-rated personal safety tools to consider by visiting Cyberguy.com/MonitorLovedOnes.

    What to check: Whether you use a smartwatch or a medical alert device, make sure fall detection is turned on, your contacts are updated, and you test the feature once in a while for peace of mind.

    A man being helped to walk

    Many smartwatches and medical alert devices can detect when a user falls and offer the option to call for help. (Kurt “CyberGuy” Knutsson)

    9) Smart speakers make it easier to call for help

    Voice assistants like Alexa or Google Nest can help you call someone, turn on a light, or get a reminder, without having to move.

    What to look for: Set up voice shortcuts and routines for common tasks. If you’re unsteady, saying “Call my daughter” is a lot safer than walking to your phone.

    STUDY REVEALS 10 HAPPIEST STATES FOR SENIORS: DID YOURS MAKE THE LIST?

    10) Balance-training apps keep your brain and body in sync

    Apps like Nymbl for iPhone or Android, or KOKU for iPhone and Android, offer fun daily balance and cognitive exercises that take just a few minutes. The goal? Keep your body strong and your reflexes sharp.

    What to check: Use an app that tracks progress and gives feedback. Some are backed by health researchers or physical therapists.

    A woman learning balances exercises

    Using apps to perform balance exercises and cognitive challenges can help keep reflexes honed. (Kurt “CyberGuy” Knutsson)

    What this means for you

    Falls aren’t only about tripping on a rug or losing your footing. They often involve deeper issues like poor sleep, medication interactions, or delayed reflexes. By using smart tech, you can spot early warning signs, make smarter choices, and stay in control of your health, on your own terms.

    Kurt’s key takeaways

    Getting older doesn’t mean giving up your independence. In fact, the right technology can help extend it. Whether it’s a smartwatch that alerts family during a fall or a simple nightlight that turns on automatically, every tool you use can add peace of mind. You don’t have to wait for a fall to start protecting yourself.

    Smart tech is more advanced than ever, but do you feel confident relying on it for your safety? Or do you prefer human care and face-to-face checkups? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Your phone is tracking you even when you think it’s not

    NEWYou can now listen to Fox News articles!

    You know that little GPS icon that pops up when an app is using your location? That’s the polite part. The tip of the iceberg. The warm handshake before your phone whispers your every movement to Big Tech behind your back. 

    Your phone has more than one way to know where you are. Cell towers, Wi-Fi networks, Bluetooth beacons and even background pings track you. If you have an old smartphone, you can enter to win a new iPhone 16 Pro at www.komando.com/win.

    I’m not here to scare you or tinfoil-hat this. 

    I’m here to help you take back control. I tested these steps myself, but your phone’s menus might look a little different depending on the make and model. Poke around your settings and you’ll find it.

    YOUR PHONE PREDICTS AN EARTHQUAKE

    Your phone has more than one way of knowing where you are. (iStock)

    iPhone: The sneakiest setting

    Apple keeps a “Significant Locations” log buried deep in your settings. It’s meant to make your Maps smarter and improve recommendations, but it’s also a detailed history of where you’ve been.

    Here’s how to find and clear it:

    1. Go to Settings > Privacy & Security > Location Services.
    2. Scroll to System Services. Tap Significant Locations.
    3. Use Face ID or your passcode to unlock it, then review your history.
    4. Tap Clear History, and if you don’t want it tracked anymore, toggle it off.

    While you’re there, review your Location Services list and set apps to While Using or Never. Most don’t need 24/7 access.

    FORGET SEO: HOW TO GET FOUND BY AI TOOLS IN 2025

    iPhone settings app

    On iPhones, there’s a “Significant Locations” log deep in your Settings. (Photo by STR/NurPhoto via Getty Images)

    Android: Timeline and app permissions

    Android’s version is called “Timeline,” and it’s tied to your Google account, not just your device. Even if you switch phones, the log follows you unless you turn it off.

    To see it:

    1. Open Google Maps. Tap your profile picture > Your timeline.
    2. Hit the three dots > Location & privacy settings.
    3. Under Location Settings, toggle off Timeline. You can also Delete all Timeline data.

    Next, check app permissions:

    • Go to Settings > Location > App permissions.
    • Change any “Allow all the time” apps to “Allow only while using” or “Deny.”

    FOLDABLE PHONES ARE IMPRESSIVE TECHNOLOGICAL MARVELS BUT COME WITH SERIOUS COMPROMISES

    Google Maps app on Android phone

    On Android, Google Maps has a “Timeline” worth disabling if you’re concerned about privacy. (Guillaume Payen/SOPA Images/LightRocket via Getty Images)

    Pro tip for both

    Even with these off, your carrier still knows where you are when your phone is connected to the network. If you really need to go off-grid, you’ll need to power down or use airplane mode.

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    • National radio and podcasts: Airing on 500+ stations across the US, search for Komando in your favorite radio or podcast app
    • Daily newsletter: Join 650,000 folks who read the Current (free!) at www.GetKim.com
    • Watch: On YouTube.com/kimkomando

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

    Source link