ReportWire

Tag: Privacy

  • Parenting 101: 5 Lessons to keep kids safe online for the new school year

    [ad_1]

    The back-to-school season is exciting – new knowledge, new digital tools, and new discoveries. But it also brings higher cybersecurity risks for both schools and children. Cybersecurity experts are urging children, parents, and school communities to stay extra alert during this period.

    “The back-to-school period requires additional efforts to keep children and school communities safe online. A new beginning means new digital tools, online searches, and registrations for learning platforms. All of that increases cyber risks that must be taken seriously,” said Karolis Arbačiauskas, head of product at NordPass, in a media release

    A new study by NordPass, in collaboration with NordStellar, reveals a worrying truth: many educational institutions are still using shockingly weak passwords to protect sensitive data. Entries like “123456”, “Edifygroup@1”, and “principal@2021” appeared frequently, showing a widespread reliance on predictable or outdated credentials that are easy for hackers to guess.

    This is why the back-to-school season is the perfect moment to talk to children about cyber hygiene – the dos and don’ts in digital environments – and to help them build strong habits for digital security and privacy. “Learning about cybersecurity can be fun. Many families of cybersecurity professionals make it a game – they host a small party with snacks and guide their children through five simple but essential exercises,” said Arbačiauskas.

    Cybersecurity experts advise to take these steps to preserve your own cybersecurity and that of your family members (it can also be used as inspiration for your family’s Cyber Party):

    • Create strong and unique passwords. Make sure every account in your family – whether it’s yours, your parents’, your significant other’s, or your children’s – uses a strong and unique password. The easiest way to do it? Use a trusted password manager to generate, store, and share them securely.
    • Turn on multi-factor authentication (MFA). Add an extra layer of security wherever you can, especially to access school portals, email accounts, and social apps. MFA helps keep hackers out even if a password gets breached – and they get breached more often than you think. A recent study by NordPass revealed that many educational institutions still use shockingly weak passwords.
    • Update devices and apps. Keep phones, tablets, and laptops up to date with the latest software. Outdated apps can contain vulnerabilities that hackers take advantage of to get backdoor access into your device. Updates patch these security holes so that cybercriminals can no longer exploit them.
    • Talk about phishing. Discuss cybersecurity with your family and why it matters. Teach them to never click suspicious links or open unknown attachments – especially in emails or messages claiming to be from the school. When in doubt, verify with the sender by using a website checker.
    • Adjust privacy settings. Review and tighten privacy settings on social media, online games, and school platforms. Limit what personal info is publicly visible and who can contact your kids online.

    – JC

    [ad_2]

    Source link

  • Moving exposes your personal data to scammers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Downsizing should feel like a fresh start. A smaller home, less upkeep, maybe even a retirement community with new friends. In fact, more than 3 million elderly Americans move every year. Are you considering downsizing as well?

    One woman told the internet about moving her mother into an assisted living home. Before the boxes were even packed, her mother fell for two back-to-back scams. It wasn’t bad luck; scammers had picked up on her address and pounced.

    This isn’t rare. Researchers have found that over 70% of cybercrimes trace back to exposed personal data. And moving creates one of the biggest exposures of all. Real estate listings, moving companies and address changes get scooped up by data brokers and published online, the perfect setup for criminals to strike.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    PODS moving truck and employee outside residential home, Queens, New York. (Lindsey Nicholson/UCG/Universal Images Group via Getty Image)

    How moving puts your personal data at risk

    When you buy, sell, or even just change your address, your information spreads across multiple systems:

    • Real estate records (public by default)
    • Utility company logs
    • Postal forwarding data
    • Transaction history and home value.

    Data brokers scoop all this up. Then they bundle it, resell it and suddenly your new life stage is an open secret. That’s exactly what scammers look for.

    10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE

    Front Door with Delivery Boxes

    Cybercriminals look into multiple databases to gain information about a move. (iStock)

    Common scams that target you when downsizing

    Here’s why moving makes seniors a hot target:

    • Identity theft: Pair your new address with your date of birth (easy to find online), and thieves can open accounts in your name.
    • Cash-rich scams: Selling a house can make you look like you’re sitting on cash. Fraudsters know this.
    • Phishing tricks: Fake “utility setup” calls asking for your Social Security number.
    • Harassment: A new address published online can attract unwanted attention.

    Think of it this way: while you’re busy unpacking boxes, criminals are unpacking your data.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    How to avoid becoming a moving scam victim

    Removing your data can protect you from cyber scams. (Kurt “CyberGuy” Knutsson)

    How to protect your personal data when you move

    While moving creates new opportunities, it also creates new risks. These simple steps will help you lock down your personal data before scammers can exploit it.

    1) Remove your info from data broker sites

    Data brokers automatically update your file when you move. That means your new address, phone number and even property transaction details can end up on people-search websites almost overnight. Once your profile is out there, scammers can buy or scrape it with ease.

    The good news: you don’t have to chase down every broker yourself. A personal data removal service does the legwork for you, contacting data brokers, demanding removal and following up to make sure your new details don’t creep back in. Think of it as hiring a moving company for your personal data.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    2) Use the official USPS form only

    When you change your address, always use the official USPS website or your local post office. Some third-party sites look like they’re offering a convenient service, but they often collect extra data about you and sometimes even resell it. Going straight to the source means your sensitive details don’t take unnecessary detours.

    3) Watch real estate disclosures

    When you sell your home, more than just the price gets published. Your name, past addresses and even photos of your home can become part of the public record. Ask your realtor what’s automatically disclosed and whether anything can be limited or redacted. It’s worth being picky here: the less of your personal footprint that’s tied to your property, the better.

    4) Shred old paperwork

    Moving is the perfect excuse to purge. But don’t just throw out old bills, medical statements, or financial records; shred them. Dumpster-diving for personal data may sound outdated, but it’s still a method scammers use. A good shredder ensures your sensitive history doesn’t end up in the wrong hands.

    5) Share moving news privately

    It’s tempting to post a “Goodbye, old house!” photo online, but resist the urge. Publicly announcing a move tells scammers exactly when your home is empty and what your new address might be. Instead, share the news directly with family and close friends. A little less buzz online means a lot more safety offline.

    6) Freeze your credit before and after moving

    One powerful way to stay ahead of scammers is to freeze your credit. A freeze blocks new credit accounts from being opened in your name, even if criminals have your address or other details. The good news is that you can do this for free with all three major credit bureaus: Equifax, Experian and TransUnion.

    It only takes a few minutes online or by phone, and you can lift the freeze anytime if you need to apply for a loan or credit card. By freezing your credit before and after your move, you create a strong barrier that keeps thieves from turning stolen data into financial damage.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Moving should feel like a new beginning, not an invitation for scammers to strike. With a few smart steps, you can stay ahead of data brokers and fraudsters. From shredding documents to freezing your credit, every action adds a layer of protection. By protecting your information before and after your move, you gain peace of mind and start your next chapter on solid ground. The effort is small compared to the security it brings.

    Should more be done to stop companies from exposing and selling our personal data? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Jury duty phone scams on the rise as fraudsters impersonate local officials, threaten arrest

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Scammers are constantly finding new ways to trick people. While older tactics like phishing emails and impersonating government agencies to steal credentials are becoming easier to spot, bad actors are now turning to more alarming methods. One of the latest involves impersonating local authorities. 

    People have reported receiving phone calls claiming they missed jury duty and now face a warrant for their arrest. This kind of impersonation scam is harder to spot because it’s highly personalized, but that doesn’t mean you’re defenseless. Let’s break it down.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    Scammers impersonating local authorities are on the rise, telling victims they missed jury duty and must pay to avoid legal trouble. (Kurt “CyberGuy” Knutsson)

    What jury duty scam victims need to know

    Scammers posing as court officials are targeting individuals with false claims about missed jury duty, prompting warnings from law enforcement. The fraud typically begins with a call from a blocked or unknown number, alleging that the recipient has missed jury duty and is facing an arrest warrant. The scammers then demand payment, usually through wire transfers or gift cards.

    A key warning sign is being asked to pay money to avoid arrest or legal trouble. It is important never to give money or personal information to unknown callers.

    These scams often target older or more vulnerable individuals, although younger people have also reported close calls. In one example, a person received repeated calls from an unidentified number before answering. The caller, claiming to be from a local sheriff’s department and equipped with the individual’s full name and address, insisted they had failed to appear for jury duty and faced multiple citations.

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

    man using laptop and talking on phone while in apartment

    Victims can spot jury duty impersonation scams by verifying suspicious calls before taking action and reducing their digital footprint. (Kurt “CyberGuy” Knutsson)

    How to spot jury duty impersonation scams

    • No jury duty arrest warrants: Missing jury duty doesn’t lead to criminal citations or warrants.
    • Blocked or spoofed numbers: Real law enforcement won’t hide their identity.
    • Unusual payment methods: No government agency will ask for gift cards or crypto.
    • Aggressive threats: Threats of arrest or contempt of court are a scare tactic.

    Legitimate jury summonses are delivered by mail, not through threatening phone calls.

    6 ways to protect yourself from jury duty scam calls

    If you get a suspicious call about missed jury duty, don’t panic. Follow these steps to stay safe and protect your personal information.

    1) Don’t trust calls from unknown numbers

    This might sound obvious, but don’t trust any unknown caller, especially if they demand money. Legitimate authorities will never ask for payment over the phone, especially not through gift cards, wire transfers, or cryptocurrency. If someone threatens you with arrest or legal action unless you pay immediately, it’s almost certainly a scam. Hang up and call your local court or police department using an official number.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE 

    2) Verify suspicious calls before taking action

    If you receive a suspicious call, take a breath and fact-check. Court summonses are always delivered by mail, not over the phone. Even if the caller has personal information like your name or address, that doesn’t make them credible. Scammers often use leaked or publicly available data to appear convincing.

    Be extra cautious, even if the scam comes through text messages or email. Do not click on any suspicious links, as they can install malware on your device and steal your personal data.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE 

    3) Reduce your digital footprint to stop scammers

    The truth is, your data is already out there, from old social media profiles to past breaches. That’s often how scammers get enough personal details to sound legitimate. Investing in a data removal service can help reduce your digital footprint by scrubbing your information from people-search sites and data brokers.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    man talking to black-cased iphone in car

    Victims of jury duty phone scams can block and report suspicious numbers to local law enforcement or fraud reporting agencies. (Kurt “CyberGuy” Knutsson)

    4) Block and report scam numbers

    If you receive a scam call, report it to local law enforcement or your country’s fraud reporting agency. After hanging up, block the number on your phone and report it to:

    • FTC (USA): reportfraud.ftc.gov
    • Local police or sheriff’s office
    • Your phone carrier’s scam call reporting option

    Many carriers allow you to forward scam texts to 7726 (SPAM).

    5) Use call screening or spam protection apps

    Apps like TruecallerHiya, and built-in features like Google Call Screen or Silence Unknown Callers on iPhones can detect and block fake calls automatically.

    Pro Tip: Enable your phone’s “silence unknown callers” feature for extra protection. 

    6) Talk to vulnerable family members

    Older adults are frequent targets. Sit down with your parents, grandparents, or neighbors to explain how these scams work and what to watch for. A simple heads-up could stop a costly mistake.

    What this means for you

    Scammers are getting bolder and more convincing, but you can stay a step ahead. Knowing the signs of a jury duty phone scam, using smart tools like antivirus and call blockers and limiting your digital footprint can dramatically reduce your risk. Empower yourself and your loved ones with this knowledge.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaway

    Instead of relying on faceless phishing emails, scammers are now using hyper-personalized and emotionally charged phone calls. By impersonating local authorities and referencing civic duties like jury duty, they exploit both fear and a sense of responsibility. What makes this especially dangerous is how plausible it sounds, drawing on real processes that many people don’t fully understand.

    Do you think law enforcement and government agencies are doing enough to educate the public about these scams? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • FSU freshman linebacker is in intensive care after shooting, school says

    [ad_1]

    FSU freshman linebacker Ethan Pritchard is in intensive care after shooting, school says

    Updated: 9:59 AM PDT Sep 1, 2025

    Editorial Standards

    A Florida State linebacker is in critical but stable condition after being shot while visiting family, the Seminoles said Monday.Ethan Pritchard, a 6-foot-2, 224-pound freshman from Sanford, was in intensive care at a Tallahassee-area hospital. He was shot Sunday evening while inside a vehicle outside apartments in Havana, according to the Gadsden County Sheriff’s Office.“The Pritchard family is thankful for the support from so many people, as well as the care from first responders and medical professionals, and asks that their privacy be respected at this time,” FSU said in a statement. “Further updates will be provided as they are available.”Pritchard did not play in Florida State’s season opener, a 31-17 victory Saturday over No. 8 Alabama in Tallahassee.

    A Florida State linebacker is in critical but stable condition after being shot while visiting family, the Seminoles said Monday.

    Ethan Pritchard, a 6-foot-2, 224-pound freshman from Sanford, was in intensive care at a Tallahassee-area hospital. He was shot Sunday evening while inside a vehicle outside apartments in Havana, according to the Gadsden County Sheriff’s Office.

    “The Pritchard family is thankful for the support from so many people, as well as the care from first responders and medical professionals, and asks that their privacy be respected at this time,” FSU said in a statement. “Further updates will be provided as they are available.”

    Pritchard did not play in Florida State’s season opener, a 31-17 victory Saturday over No. 8 Alabama in Tallahassee.

    [ad_2]

    Source link

  • Anonymous researcher exposes politicians’ hidden Spotify playlists, including Vance, Leavitt and Bondi

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Vice President JD Vance is a big fan of the Backstreet Boys’ “I Want It That Way.” White House press secretary Karoline Leavitt gets pumped up with Beyoncé’s “Run the World (Girls).” And former Florida Attorney General Pam Bondi? She cranks Nelly’s “Hot In Herre.”

    That’s all according to Panama Playlists, a website that quietly went live recently and claims to reveal the hidden music tastes of politicians, tech leaders and journalists.

    “I found the real Spotify accounts of celebrities, politicians and journalists. Many use their real names,” the anonymous site creator wrote. “With a little sleuthing, I could say with near-certainty: yep, this is them.”

    The anonymous researcher, who says they’ve been scraping accounts since summer 2024, insists they only used publicly available information. “I’ve been scraping their playlists for over a year. Some individuals even have a setting enabled that displays their last played song. I scraped this continuously, so I know what songs they played, how many times and when.” They also noted there is no affiliation with Spotify. The site itself frames the project as more playful than sinister.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Vice President JD Vance’s playlist revealed “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” (Panama Playlists)

    Why leaked playlists matter

    At first, this all feels like lighthearted gossip, but it points to a bigger issue: how much of our personal information is publicly available by default? A playlist can reveal mood, personality and even political leanings. When pieced together with other open-source data, these details help paint a surprisingly detailed portrait. The lesson? Privacy leaks don’t always involve hackers. Sometimes, it’s the platforms themselves leaving doors wide open. 

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    What the Panama Playlists reveal

    The playlists range from ironic to eyebrow-raising, with some choices feeling almost too on the nose. Here are some of the highlights: 

    JD Vance

    The vice president’s “Making Dinner” playlist includes “I Want It That Way” by the Backstreet Boys and Justin Bieber’s “One Time.” His “Gold On The Ceiling” playlist adds eclectic picks like “What Makes You Beautiful” by One Direction, “You are a Tourist” by Death Cab for Cutie and “San Francisco” by The Mowgli’s.

    Karoline Leavitt

    The White House press secretary’s “Baby Shower” playlist featured Beyoncé’s “Run the World (Girls)” and Cyndi Lauper’s “Girls Just Want to Have Fun.” The timing matched her actual baby shower, further confirming the account.

    Sam Altman

    The OpenAI CEO’s “My Shazam Tracks” suggests he’s searched for “Get Ur Freak On” by Missy Elliott, George Ezra’s “Blame It on Me,” and David Guetta and OneRepublic’s “I Don’t Wanna Wait.”

    Pam Bondi

    The U.S. attorney general’s playlist “Pam” includes “Hot In Herre” by Nelly, “Hands to Myself” by Selena Gomez and “Cold As Ice” by Foreigner.

    screenshot of playlist for Karoline Leavitt, Sam Altman and Pam Bondi

    Playlists show Karoline Leavitt listening to Beyoncé’s “Run the World (Girls),” Sam Altman to Missy Elliott’s “Get Ur Freak On” and Pam Bondi to Nelly’s “Hot In Herre.” (Panama Playlists)

    Ron DeSantis

    The Florida governor keeps it classic. His playlist includes “Ring of Fire” by Johnny Cash, Billy Joel’s “Piano Man” and “Life Is a Highway” by Rascal Flatts.

    Mike Johnson

    The House speaker has a Pandora account with Jerry Goldsmith’s “The Parachutes,” Enya’s “May It Be” and Bryan Adams’ “One Night Love Affair.”

    Adam Mosseri

    The Instagram CEO’s playlist, “Hang,” shows a reflective and soulful side. It features “July” by Noah Cyrus and Leon Bridges, “River” by Leon Bridges, “Strangers” by The Kinks and Leonard Cohen’s “Famous Blue Raincoat.” He rounds it out with Otis Redding’s “(Sittin’ On) The Dock of the Bay” and Bobby Vinton’s “Mr. Lonely.” 

    screenshot of playlist for Ron DeSantis, Mike Johnson and Adam Mosseri

    Ron DeSantis, Mike Johnson and Adam Mosseri’s playlists revealed. (Panama Playlists)

    9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUT

    What Panama Playlists teaches us

    • Panama Playlists demonstrate how a person’s music can clash with their public image, revealing hidden interests that shake expectations.
    • Your tunes might be more visible than you think.
    • Spotify’s default settings put playlists in public mode unless you switch them to private.

    This is less about guilty pleasures and more about digital exposure. The music you thought was just for your earbuds might already be telling a story about you to strangers. 

    Tips to stay safe and protect your playlist

    If you use Spotify, Apple Music or YouTube Music, take a moment to review your privacy settings. Here’s how to protect yourself: 

    1) Make playlists private

    Turn off public defaults. Only share playlists you intentionally want others to see.

    Spotify

    • Disable public visibility: Stop new playlists from being automatically public.
    • Tap your profile picture in the upper left.
    • Tap Settings and privacy
    • Click Privacy and Social 
    • Toggle off Public playlists.
    screenshot of settings on how to make spotify playlist private

    Users can adjust their Spotify settings to make their playlists private. (Kurt “CyberGuy” Knutsson)

    Apple Music

    • Open the Apple Music app on your iPhone or iPad.
    • Tap your profile icon or picture in the upper right of the screen.
    • Tap “View Profile.”
    • On your profile page, tap “Edit.”
    • Find the toggle for “Listening To” or “Allow Others to See What You’re Listening To” and turn it off to stop sharing your Apple Music listening activity.
    screenshot of settings on how to stop sharing apple music listening activity

    Steps on how to stop sharing your Apple Music listening activity. (Kurt “CyberGuy” Knutsson)

    YouTube Music

    • Open the YouTube Music app and sign in.
    • Tap your profile picture to go to your Library.
    • Find the playlist you want to edit. Long-press on the playlist or open it and tap the three dots (…).
    • Choose Edit playlist.
    • Under Privacy, select the option you want:Private: Only you can view the playlist.Unlisted: Anyone with the link can view, but it’s not publicly searchable.Public: Anyone can find and view your playlist.
    • Private: Only you can view the playlist.
    • Unlisted: Anyone with the link can view, but it’s not publicly searchable.
    • Public: Anyone can find and view your playlist.
    • Tap Done or Save to confirm your choice.

    Note: There is no global setting to make all playlists private at once; you must adjust privacy for each playlist individually. The privacy setting is available when creating a new playlist or editing an existing one. For brand-new playlists, you’ll see a privacy selection box during playlist creation. 

    2) Review connected apps

    Streaming platforms often link to third-party apps. Revoke access for those you no longer use. 

    3) Limit what you share

    Playlist names, listening history and even likes reveal more than you think. 

    4) Use personal data removal services

    What looks like harmless fun, like a playlist name or your “last played” track, can actually become part of a bigger puzzle. A determined bad actor could stitch together your music history with other open-source data, such as your social posts, tagged photos or even public records. Over time, those small details paint a surprisingly complete picture of your habits, locations or private interests.

    That’s why reducing your overall digital footprint matters. Personal data removal services work to wipe your information from data broker sites, making it harder for anyone to cross-reference your listening habits with your identity. The less data floating around, the harder it is for someone to connect the dots in ways you never intended.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan. 

    5) Keep your software updated

    Privacy settings change often. Check regularly to ensure your preferences haven’t been reset and keep your software updated.  

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    The playlist leak may feel like a punchline, but it serves as a real reminder. Our digital lives are stitched together from tiny details we often overlook. Even something as simple as your favorite workout jams can end up on display if you don’t take control. Privacy isn’t about hiding your personality. It’s about choosing what you share, and with whom.

    Would you be comfortable if your own playlists, every guilty pleasure and repeat listens were suddenly made public? Let us know by writing to us at Cyberguy.com/Contact.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • TransUnion becomes latest victim in major wave of Salesforce-linked cyberattacks, 4.4M Americans affected

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You might have recently noticed a wave of cyberattacks hitting companies whose services millions of Americans rely on every day. Among the victims are Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, all reporting breaches linked to Salesforce-connected applications.

    Now, credit reporting firm TransUnion has confirmed its own major incident, with more than 4.4 million U.S. consumers affected. Attackers exploited weaknesses in third-party integrations, not Salesforce itself. Security researchers tie this technique to the extortion group ShinyHunters and its affiliated crews.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.

    SCAMMERS ARE USING DOCUSIGN EMAILS TO PUSH APPLE PAY FRAUD

    Hackers stole 13 million records, exposing data of 4.4 million Americans in the latest TransUnion cyberattack. (Christopher Dilts/Bloomberg)

    What you need to know about the TransUnion data breach

    TransUnion has disclosed a major data breach that impacted 4,461,511 individuals in the United States, according to a filing with the Maine Attorney General’s Office. The incident occurred on July 28, 2025, and was discovered two days later on July 30.

    The breach resulted from unauthorized access to a third-party application used in TransUnion’s U.S. consumer support operations. The company stressed that its core credit database and credit reports were not compromised.

    Although TransUnion characterized the exposed information as “limited,” the stolen data is highly sensitive. It includes names, dates of birth, Social Security numbers, billing addresses, email addresses, phone numbers, reasons for customer transactions (such as requests for a free credit report), and customer support tickets and messages.

    Hackers claim they stole more than 13 million records in total, with about 4.4 million tied to U.S. consumers.

    In response, TransUnion is providing all affected individuals with 24 months of free credit monitoring and identity theft protection services.

    FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

    entrance of google office building with people standing outside

    The breach at TransUnion follows several similar cyberattacks against tech companies, including Google and Cisco, and retail brands, such as Chanel and Adidas.  (Mike Kemp/In Pictures)

    Hackers target companies through Salesforce apps

    The breach appears to be part of a broader wave of Salesforce-related attacks that is hitting organizations across sectors, from tech and finance to retail and aviation. Alongside Google, Farmers Insurance, Allianz Life, Workday, Pandora, Cisco, Chanel and Qantas, brands like Adidas, Louis Vuitton, Dior, Tiffany & Co., Cartier and Air France-KLM have also reported incidents tied to weaknesses in Salesforce-linked applications.

    In most cases, attackers exploited malicious third-party integrations or OAuth-connected apps disguised as legitimate Salesforce tools to siphon sensitive records. This technique bypassed traditional login protections and gave intruders long-lasting access to customer relationship management data. The stolen information ranges from basic contact details and business notes to highly sensitive identifiers such as Social Security numbers, dates of birth and driver’s license information.

    Researchers say these intrusions align with activity from the extortion group ShinyHunters, with some overlap in tactics and infrastructure linked to other threat actors like Scattered Spider. Campaigns tracked under names such as UNC6395 and UNC6040 point to a larger “extortion-as-a-service” model, where criminal crews collaborate and share stolen data across underground forums.

    TransUnion’s response

    CyberGuy reached out to TransUnion for a comment and received the following response:

    “TransUnion recently experienced a cyber incident that affected a third-party application serving our U.S. consumer support operations. Upon discovery, we quickly contained the issue, which did not involve our core credit database or include credit reports.

    The incident involved unauthorized access to limited personal information for a very small percentage of U.S. consumers. We are working with law enforcement and have engaged third-party cybersecurity experts for an independent forensics review. Additionally, we will notify affected consumers and provide credit monitoring services.”

    As for the gap between when the breach occurred (July 28, 2025) and when it was officially recorded as “discovered” (July 30, 2025), a TransUnion spokesperson clarified that the company “identified and contained this event within hours” of it happening, but that it is common industry practice to designate a later “date of discovery” to reflect a more complete assessment following the initial response.

    MARY KAY’S ICONIC PINK CADILLAC SHIFTS TO FULLY ELECTRIC

    hacker wearing globes and using laptop

    Researchers have linked the latest cybercrimes to extortion group ShinyHunters and its affiliated crews. (Kurt “CyberGuy” Knutsson)

    8 ways you can stay safe from the TransUnion data breach

    The TransUnion breach exposed millions of people’s data, but there are steps you can take to protect yourself. Here are eight ways to stay safe.

    1) Delete personal data that puts you at risk

    Go through old online accounts, shopping profiles or cloud storage that may still hold sensitive data. Deleting what you no longer use reduces the amount of information that could be stolen in future breaches or sold on dark web forums. You can also get help from a data removal service.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan.

    2) Avoid phishing scams and use strong antivirus software

    Data stolen in breaches often ends up fueling phishing campaigns. Attackers may use your name, email or phone number to make messages look more convincing. If you get an email or text claiming to be from TransUnion, your bank or any service asking you to “verify” details, don’t click on the link. Instead, log in through the official website or call customer service directly.

    The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech.

    3) Save passwords securely

    If your login details were exposed, reusing the same password across sites puts multiple accounts at risk. Use a password manager to create and store strong, unique passwords for every service. Even if hackers get hold of one, they won’t be able to use it elsewhere. Consider using a password manager to generate and store complex passwords.

    Next, see if your passwords have been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords.

    HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY

    4) Turn on two-factor authentication

    Two-factor authentication (2FA) adds a critical extra step beyond just a password. If someone tries to break into your email, banking app or social media account, they’ll also need the one-time code from your authenticator app or text message. This makes stolen credentials much less useful.

    5) Keep your devices updated

    Hackers often rely on outdated software to spread malware or steal information. Installing the latest updates for your phone, computer and apps ensures security patches are in place, blocking known vulnerabilities that attackers might exploit.

    6) Freeze your credit right away

    One of the biggest risks after a breach is criminals opening new loans or credit cards in your name. A credit freeze with all three major bureaus, TransUnion, Equifax and Experian, prevents anyone from accessing your credit file without your approval. It’s free and can be temporarily lifted if you need to apply for credit.

    7) Monitor your accounts regularly

    Watch your bank and credit card statements for unfamiliar charges, no matter how small. Set up transaction alerts where available. You should also pull your free annual credit report to check for unauthorized accounts or inquiries, which could be signs of fraud.

    8) Consider identity theft protection services

    If your Social Security number, driver’s license or other sensitive identifiers were exposed, you may want to sign up for an identity theft protection service. These services monitor credit reports, dark web forums and financial activity for signs of misuse. Some also include insurance or recovery assistance if your identity is stolen, giving you added peace of mind beyond basic credit monitoring. If you’re one of the affected TransUnion users, make use of the 24 months of free credit monitoring and identity theft protection services. If not, you might get one yourself for the future.

    See my tips and best picks on how to protect yourself from identity theft at  Cyberguy.com/IdentityTheft.

    CLICK HERE TO GET THE FOX NEWS APP 

    Kurt’s key takeaway

    The reality is that the TransUnion breach isn’t just about stolen names and numbers. It’s about how exposed ordinary people are when a single company holds the keys to their financial identity. For years, consumers have had little choice but to trust credit bureaus they never opted into.

    Should companies like TransUnion be held legally accountable when millions of people are exposed to fraud? Let us know by writing to us at Cyberguy.com/Contact.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Big Tech Companies in the US Have Been Told Not to Apply the Digital Services Act

    [ad_1]

    Trouble is brewing for the Digital Services Act (DSA), the landmark European law governing big tech platforms. On August 21, the Federal Trade Commission (FTC), sent a scathing letter to a number of tech giants, including Google, Meta, Amazon, Microsoft, and Apple. The letter’s subject: the European Digital Services Act cannot be applied if it jeopardizes freedom of expression and, above all, the safety of US citizens.

    The opening of the letter—signed by FTC chairman Andrew Ferguson—features a prominent reference to the First Amendment of the US Constitution, namely freedom of speech: “Online platforms have become central to public debate, and the pervasive online censorship in recent years has outraged the American people. Not only have Americans been censored and banned from platforms for expressing opinions and beliefs not shared by a small Silicon Valley elite, but the previous administration actively worked to encourage such censorship.”

    The Trump Administration’s Lunge

    The Trump administration intends to reverse course, and it is in this direction that the attack on “foreign powers,” the European Union and in the United Kingdom, and in particular on the Digital Services Act and the Online Safety Act, begins. The letter also indirectly references GDPR, the European regulation on the protection of personal data, whose measures are “aimed at imposing censorship and weakening end-to-end encryption” with the result of a weakening of Americans’ freedoms, according to the letter.

    Privacy and End-to-End Encryption: The Issues on the Table

    In the letter, the US Antitrust Authority specifically asked the 13 companies to report “how they intend to comply with incorrect international regulatory requirements” (the deadline for scheduling a meeting was set for August 28) and recalled their “obligations towards American consumers under Section 5 of the Federal Trade Commission Act, which prohibits unfair or deceptive acts or practices” that could distort the market or compromise safety.

    And it is precisely on the security front, and especially on the adoption of end-to-end encryption, that the FTC calls big tech companies to order: “Companies that promise that their service is secure or encrypted, but fail to use end-to-end encryption where appropriate, may deceive consumers who reasonably expect this level of privacy.” Furthermore, “certain circumstances may require the use of end-to-end encryption, and failure to implement such measures may constitute an unfair practice.” The weakening of encryption or other security measures to comply with laws or requests from a foreign government may therefore violate Section 5 of the Federal Trade Commission Act, the document states.

    What Happens in Case of Disputes and Interference

    In a tweet on X, Ferguson wrote flatly that “if companies censor Americans or weaken privacy and communications security at the request of a foreign power, I will not hesitate to enforce the law.”

    “In a global society like the one we live in, overlaps and interferences between different legal systems are natural. Just think of those, in the opposite direction, between European privacy legislation and the famous American Cloud Act,” Guido Scorza, a member of the Italian Data Protection Authority, told WIRED. Scorza believes that in the event of significant discrepancies, “it will be up to the US government and the European Commission to identify corrective measures capable of guaranteeing the sovereignty, including digital, of each country.”

    This article originally appeared on Wired Italy and has been translated from Italian.

    [ad_2]

    Mila Fiordalisi

    Source link

  • Scammers are using DocuSign emails to push Apple Pay fraud

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Phishing scams are getting smarter, and one of the latest tricks involves fake DocuSign emails that appear to show charges from major companies like Apple. At first glance, these fraud messages look convincing, often including a receipt, order ID and even a support number. But instead of connecting you to Apple or another legitimate service, that number links you directly to scammers.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    All about the DocuSign & Apple Pay fraud

    These phishing emails pretend to be billing receipts for recent Apple Pay purchases. They typically claim that a subscription has been charged to your account and prompt you to call a phone number if you do not recognize the charge.

    Scammers spoof Apple, Netflix, and other brands to push fake subscription charges posing as DocuSign. (Kurt “CyberGuy” Knutsson)

    The emails often use well-known brands such as Apple, Netflix, Expedia, or even lawn service companies to make them seem credible. Some also include a “DocuSign” link with a security code, creating the illusion that you need to access a file to confirm the transaction.

    In reality, neither Apple nor these other companies sends billing receipts through DocuSign. That detail alone is a red flag. Another telltale sign is the sender’s address. It may contain odd characters, such as a Cyrillic “B” replacing the “B” in “Billing,” which helps scammers bypass spam filters.

    AMAZON ALERTS CUSTOMERS ABOUT IMPERSONATION SCAMS

    How the DocuSign scam works

    The scam aims to catch you off guard and pressure you into acting fast. The email claims your Apple Pay account has been charged for a subscription or purchase. It includes an order ID, a charge amount, and a DocuSign link that supposedly holds a receipt or confirmation file. To make it look even more convincing, some versions add a security code to “unlock” the document.

    The message also lists a phone number and urges you to call if the charge was not authorized. That number is the core of the scam. Instead of reaching Apple, Netflix or whichever company the email pretends to represent, you end up speaking with a scammer posing as a support agent.

    Once you’re on the call, the scammer tries to convince you that your account has been compromised or that the payment must be reversed right away. From there, the tactics vary. They might ask for your Apple ID, banking details, or card numbers. They may pressure you to download remote access software so they can “fix” the issue on your device. In some cases, they demand payment for fake account protection or reversal fees.

    Man tapping his phone screen.

    DocuSign scam uses fake receipts and urgent language to steal personal information from users. (Kurt “Cyberguy” Knutsson)

    The end goal is always the same: gain enough access to lock you out of your accounts, steal sensitive data, or initiate fraudulent transactions. What makes these scams dangerous is how they combine multiple red flags in one message: a realistic-looking receipt, official logos, a DocuSign link, urgent language, and a phone number that appears to be the quickest way to resolve the issue.

    HOW TO TELL IF A LOGIN ALERT IS REAL OR A SCAM

    5 ways to stay safe from the DocuSign scam

    Scammers rely on people reacting quickly without questioning the details. The good news is that there are simple steps you can take to protect yourself. Here are five practical ways to stay safe.

    1) Inspect the sender address carefully

    Scammers often use email addresses that look close to official ones but contain subtle differences, such as extra letters or swapped characters. If the email does not come from an official domain like @apple.com, it is not legitimate.

    Woman on her phone.

    Fraudulent billing emails claim Apple Pay charges and link victims to fake support lines using DocuSign. (Kurt “CyberGuy” Knutsson)

     2) Know how companies send receipts

    Apple, Netflix, and other major services do not send billing statements through DocuSign. If a receipt shows up in this format, you can safely assume it is a scam. Real receipts always come directly from the service provider itself.

    3) Watch out for phishing links and use strong antivirus software

    Be cautious with any links in suspicious emails. Scammers often mask harmful links behind text that looks legitimate, such as “View Document” or “Review Payment.” Hover over the link without clicking to see the real web address. If it does not match the official company domain, do not click.

    The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.

    4) Double-check your transaction history

    Instead of trusting the email, confirm whether a charge actually exists. Apple users can review purchases directly from the Settings app under their Apple ID. If nothing shows up, the receipt is fake. Other services have similar ways to check history.

    5) Delete personal data from the internet

    The less information scammers can find about you online, the harder it is for them to craft convincing attacks. Consider removing old accounts you no longer use, limit the personal details you share publicly on social media, and use data removal services when possible. This reduces the risk of your name, email, or phone number being targeted in scams like this.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Phishing scams are constantly evolving, and the DocuSign Apple Pay ruse is just one of many. The best defense is a healthy dose of skepticism. If something feels off, stop, double-check, and confirm directly through official channels. Scammers rely on panic and quick reactions. By slowing down and verifying details, you can protect yourself from falling into their trap.

    Should email providers step up their filters so fewer of these messages slip through? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Farmers Insurance data breach exposes 1.1M Americans

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Data breaches are no longer just a problem for the tech industry. They’ve become a constant across every sector, from airlines to banks to fashion brands, exposing personal data and leaving customers worried about where their information might end up. Insurance companies, sitting on mountains of sensitive details, are no exception. The latest to join the list is Farmers Insurance. The U.S. insurer confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year, stealing customer databases and fueling a growing wave of extortion attempts.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    What you need to know about the Farmers Insurance breach

    Farmers Insurance has confirmed a data breach impacting more than 1.1 million customers. The incident is tied to the ongoing wave of Salesforce-related cyberattacks that have hit major companies this year.

    In a notice published on its website, the U.S. insurance giant said the breach occurred on May 29, 2025, through one of its third-party vendors. Farmers serves over 10 million households nationwide. It offers auto, home, life, and business insurance through a vast network of agents and subsidiaries.

    “On May 30, 2025, one of Farmers’ third-party vendors alerted Farmers to suspicious activity involving an unauthorized actor accessing one of the vendor’s databases containing Farmers’ customer information,” the company wrote in its advisory.

    Farmers Insurance confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year. (Kindamorphic/Getty Images)

    According to the company, the vendor’s monitoring tools detected the intrusion quickly, allowing containment measures to be taken. Farmers said it immediately launched an investigation, notified law enforcement, and worked to determine the scope of the breach.

    The investigation revealed that the stolen data included customer names, addresses, dates of birth, and driver’s license numbers. In some cases, the last four digits of Social Security numbers. Farmers began notifying affected individuals on Aug. 22, with a filing to the Maine Attorney General’s Office confirming that 1,111,386 customers were impacted.

    While Farmers did not publicly name the vendor involved, reports indicate that the breach is part of the larger Salesforce data theft campaign carried out by threat actors this year.

    ALLIANZ LIFE INSURANCE DATA BREACH EXPOSES 1.4 MILLION AMERICANS

    The Salesforce data theft campaign

    The Salesforce attacks have been ongoing since early 2025. Researchers attributed them to a threat actor cluster tracked as UNC6040/UNC6240. The intrusions typically begin with voice phishing (vishing) calls, where employees are tricked into approving a malicious OAuth application linked to their company’s Salesforce instance.

    Once connected, attackers siphon customer relationship management (CRM) databases and use the stolen data in extortion attempts. The cybercrime group ShinyHunters has claimed responsibility, according to BleepingComputer. The group claims that the attacks involve overlapping threat groups, including members of the notorious Scattered Spider gang.

    Code seen through glasses.

    Hackers exploited a third-party vendor tied to Salesforce systems to steal 1.1 million Farmers Insurance customer data. (Kurt “CyberGuy” Knutsson)

    “Like we have said repeatedly already, ShinyHunters and Scattered Spider are one and the same,” a representative told the publication. “They provide us with initial access, and we conduct the dump and exfiltration of the Salesforce CRM instances. Just like we did with Snowflake.”

    The Salesforce campaign has affected a growing list of high-profile companies, including Google, Cisco, Workday, Adidas, Qantas, Allianz Life and luxury brands under LVMH such as Louis Vuitton, Dior, and Tiffany & Co.

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    Farmers Insurance response

    In response to CyberGuy’s inquiry, a Farmers Insurance spokesperson shared the following statement:

    “At Farmers, protecting our customers’ information is our top priority. We recently discovered that an unauthorized third party briefly accessed a vendor’s system that contained some Farmers’ customer information. The incident involved only limited information from certain customers. An investigation-conducted with both internal and external security experts-found no evidence that the exposed data has been misused, nor any indication that Farmers’ own systems were compromised. We are contacting affected individuals directly and are providing support resources, including complimentary credit monitoring.”

    8 ways you can stay safe after a data breach

    If your personal information has been exposed in the Farmers data breach, take the steps below immediately to limit the damage, protect your identity, and prevent future fraud.

    A hacker uses a laptop in to steal data.

    Farmers Insurance said it began notifying more than 1 million affected policyholders after detecting unauthorized access to customer records in a data breach. (Kurt “CyberGuy” Knutsson)

    1) Invest in a data removal service

    You can’t undo the damage once hackers have accessed your data. However, you can limit the fallout by investing in a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    2) Use identity theft protection services

    Your Social Security number or other sensitive data may have been exposed in the data breach. Identity Theft companies can monitor personal information, such as your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    3) Enable two-factor authentication (2FA)

    Turn on 2FA for your email, banking, and insurance logins. Even if a hacker has your password, 2FA requires a second verification step, like a code sent to your phone, making unauthorized access much harder.

    4) Be wary of phishing and follow-up scams

    After a data breach, attackers often follow up with phishing emails or phone calls. They pretend to be from your insurance company or a support service. Don’t click on links in unsolicited messages, and verify any claims through official channels before responding. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    5) Freeze your credit right away

    Put a credit freeze on your files with Equifax, Experian and TransUnion. This stops criminals from opening new accounts in your name. It’s free, easy to set up, and you can lift the freeze temporarily when needed.

    6) Update your passwords now

    Change your passwords for all important accounts. Start with email, financial, and health-related logins. Use strong, unique passwords for each account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    7) Check your accounts for strange activity

    Look for any signs of identity misuse, like:

    • Unknown charges
    • Logins from unfamiliar devices
    • New accounts or lines of credit you didn’t open

    Early detection makes a big difference.

    8) Report identity theft fast

    If someone is misusing your identity, go to IdentityTheft.gov. This government site provides step-by-step help and generates the letters and reports you’ll need to stop the fraud.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Data breaches keep hitting companies we trust, and Farmers Insurance is the latest reminder. Even when the stolen data hasn’t been misused yet, the risk lingers long after the headlines fade. That’s why it’s so important to stay alert, protect your identity, and take simple steps now. By acting today, you put yourself in control, not the hackers.

    Do incidents like this make you reconsider which companies you do business with? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • SSA Whistleblower’s Resignation Email Mysteriously Disappeared From Inboxes

    [ad_1]

    On Friday, the Social Security Administration’s chief data officer, Chuck Borges, sent an email to agency staff claiming that he had been forcibly removed from his position after filing a whistleblower complaint this week accusing the agency of mishandling sensitive agency data. Minutes after the email went out, it disappeared from employee inboxes, two SSA sources tell WIRED.

    “I am regretfully and involuntarily leaving my position at the Social Security Administration (SSA),” Borges wrote in the resignation letter to staff obtained by WIRED. “This involuntary resignation is the result of SSA’s actions against me, which make my duties impossible to perform legally and ethically, have caused me serious attendant mental, physical, and emotional distress, and constitute a constructive discharge.”

    Less than 30 minutes after staffers received the email, it mysteriously disappeared from employee inboxes, the SSA sources tell WIRED. It is not clear whether the email had been restored after it was made unavailable, nor was the reason for the email’s disappearance immediately clear. One SSA staffer speculates that it was removed because it was critical of the agency.

    “It certainly didn’t paint CIO leadership in a favorable light,” one SSA source says, referring to the SSA’s chief information officer.

    Under the Federal Records Act of 1950, US agencies are typically required by law to maintain internal records, including emails.

    Independent journalist Marisa Kabas was first to report on Borges’ resignation and his email’s disappearance in posts on Bluesky.

    Neither Borges nor SSA immediately responded to requests for comment.

    The “involuntary resignation” comes days after Borges filed a formal whistleblower complaint to the US Office of Special Counsel accusing the Department of Government Efficiency (DOGE) of wrongfully uploading SSA data, which included highly sensitive information on millions of people with Social Security numbers, to an unsecure cloud server. Borges alleges that uploading “live” SSA data to a cloud server outside of agency protocols is illegal and could put the data at risk of being hacked or leaked.

    “Recently, I have been made aware of several projects and incidents which may constitute violations of federal statutes or regulations, involve the potential safety and security of high value data assets in the cloud, possibly provided unauthorized or inappropriate access to agency enterprise data storage solutions, and may involve unauthorized data exchange with other agencies,” Borges wrote in his Friday letter.

    In a statement to The New York Times on Tuesday, SSA spokesperson Nick Perrine defended the agency’s data-security practices and claimed that the data Borges’ complaint references is “walled off from the internet.”

    “SSA stores all personal data in secure environments that have robust safeguards in place to protect vital information,” Perrine said. “The data referenced in the complaint is stored in a long-standing environment used by SSA and walled off from the internet. High-level career SSA officials have administrative access to this system with oversight by SSA’s information security team.”

    Borges’ whistleblower complaint included documents showing that DOGE affiliate John Solly, working under the SSA, asked a career agency employee to copy data from Numident, a master SSA database including a lifelong record of all SSN holders, to a “virtual private cloud,” identified in the complaint as an Amazon Web Services server controlled by SSA. Edward “Big Balls” Coristine was also involved with the project, according to the complaint.

    “Mr. Borges’ disclosures involve wrongdoing including apparent systemic data security violations, uninhibited administrative access to highly sensitive production environments, and potential violations of internal SSA security protocols and federal privacy laws by DOGE personnel Edward Coristine, Aram Moghaddassi, John Solly, and Michael Russo,” the complaint reads. “These actions constitute violations of laws, rules, and regulations, abuse of authority, gross mismanagement, and creation of a substantial and specific threat to public health and safety.”

    Neither Coristine, Moghaddassi, Solly, nor Russo immediately responded to WIRED’s request for comment.

    [ad_2]

    Makena Kelly, David Gilbert

    Source link

  • Hackers found a way to turn off Windows Defender remotely

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most modern Windows PCs rely on Microsoft Defender as their first line of defense against malware. Over the years, it has evolved into a capable and often underrated antivirus that blocks a wide range of threats. But a hacker group has found a way to abuse a legitimate Intel CPU tuning driver in a “Bring Your Own Vulnerable Driver” (BYOVD) attack to completely disable Microsoft Defender.

    The technique has been observed since mid-July 2025 and is already being used in active ransomware campaigns. The method doesn’t rely on exploiting a software bug or delivering an obviously malicious file. Instead, it takes advantage of how the Windows driver system is designed to allow deep hardware access.

    Let’s discuss all you need to know about the attack and how you can stay safe.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    The Akira ransomware group exploits a legitimate Intel CPU tuning driver in cyberattacks to completely disable Microsoft Defender on Windows systems. (Kurt “CyberGuy” Knutsson)

    How Akira ransomware disables Microsoft Defender

    The Akira ransomware group has developed a new way to bypass security tools by using a legitimate Intel CPU tuning driver called rwdrv.sys from the performance-tweaking tool ThrottleStop. Security firm GuidePoint Security says attackers load this driver to gain kernel-level access to Windows systems, then install a second malicious driver, hlpdrv.sys, which changes the DisableAntiSpyware registry setting via regedit.exe to shut down Microsoft Defender.

    Once Defender is disabled, attackers can run other malicious programs undetected. GuidePoint says this method has been consistently spotted in Akira campaigns since mid-July.

    A Windows PC

    The Akira ransomware group has been infiltrating Windows operating systems by exploiting a legitimate driver to gain access. (Kurt “CyberGuy” Knutsson)

    Akira ransomware targets Microsoft Defender and SonicWall VPNs

    The same group has also been linked to attacks targeting SonicWall VPN devices. SonicWall has stated that these incidents likely involve a known vulnerability, CVE-2024-40766, rather than a brand-new zero-day. The company recommends restricting VPN access, enabling multi-factor authentication, and disabling unused accounts as immediate defenses.

    Akira attacks often involve stealing data, setting up hidden remote access, and deploying ransomware to encrypt files across an organization. Security experts warn that fake or lookalike websites are increasingly being used to distribute these malicious tools.

    FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING IT

    Researchers at GuidePoint have published a YARA detection rule, along with file names, service names, SHA-256 hashes, and file paths to help identify this activity. They recommend administrators actively monitor for these indicators, apply filtering and blocking rules as new IoCs emerge, and only download software from official or verified sources.

    We reached out to Microsoft for a comment, but did not hear back before our deadline.

    A split image shows a hacker and a Windows laptop.

    Antivirus software, two-factor authentication and data removal services are just a few ways Windows users can protect themselves from hackers. (Cyberguy.com)

    6 ways to protect yourself against Akira ransomware and similar threats

    The Microsoft Defender attack is smart and dangerous, but you’re not without defenses. Here are a few tips to help you stay safe:

    1) Use strong antivirus software

    Even with regular updates, Windows systems can be left exposed if built-in defenses are disabled. A strong antivirus software with real-time protection, kernel-level monitoring, and frequent updates can provide backup security. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.

    2) Limit exposure

    Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file, or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments, and use a browser with built-in security features (like Microsoft Edge or Chrome with Safe Browsing enabled).

    3) Avoid running unexpected commands

    Never paste or run commands (like PowerShell scripts) you don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    4) Keep your software updated

    Regularly update your operating system, browsers, and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.

    5) Use two-factor authentication (2FA)

    Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.

    6) Invest in personal data removal services

    Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap – and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Akira’s trick shows a bigger flaw in how Windows trusts certain tools. A driver meant for harmless CPU tuning ends up being the key to turning security off. Since it’s from a legitimate source, Windows just lets it through without asking questions. We tend to think hackers always break in from the outside. Here, they’re already inside the circle of trust, using the system’s own rules.

    Should Microsoft be doing more to stop ransomware groups from disabling Defender? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • The Internet Revolutionized Porn. Age Verification Could Upend Everything

    [ad_1]

    Across a four-day span in late August, porn star Siri Dahl invites her followers to “cum on in” on OnlyFans, goes live on YouTube (“100% raw, organic, grass-fed” content, she advertises with a wink), hawks “Corn Star” T-shirts via her personal store, posts about appearing in a live podcast taping of Lovett or Leave It on X, where she has nearly half a million followers, and uploads eight videos to Pornhub, alternating between role-play (“Sexy Mean Starfish Babe Gives You Femdom Ass Worship”) and kink-friendly (“Cozy naked yoga by the fireplace”) content.

    It’s a typical week for Dahl: demanding, a little all over the place, and very online, but one she’s totally in control of.

    It’s also very different from the world of studio porn where she got her start. Dahl debuted in adult entertainment in 2012, with credits in projects by Vivid Entertainment, Naughty America, and Girlfriends Films. At the time, she says, the industry was still very much a boys club; she had no independence and even less say over the direction of her career. “It was like five CEOs who completely dictated what was attractive and what kind of person was allowed to become a porn star,” she says. “Performers were essentially at the bottom. I’d be on set for 12 hours all for one check, and there are no royalties in porn. The power dynamic was inverted compared to what it is now.”

    Today, Dahl does a little bit of everything: girl on girl, solo and fetish content, naked workout videos, group scenes. She’s on “basically every fan platform”—Fansly, LoyalFans, and ManyVids, with OnlyFans being her “biggest income generator.” She also uploads free content to Pornhub, where she makes ad revenue based on views. Some of her most popular work is role-playing a badly-behaved stepmom: “MOMMY’S BOY – Naughty MILF Siri Dahl Caught Naked in the Kitchen!” is her most-watched video on Pornhub, with 29 millions views. She’s grateful for the autonomy the internet has given her over her career.

    But that could come to a crashing end, with the widespread adoption of age-verification laws in the US and UK, which require visitors to upload an ID or other personal documentation to validate that they are not a minor before viewing sexually explicit material.

    Already Dahl has seen “an absolutely massive drop in traffic,” she says from her home in Los Angeles. “I’ve made 30 percent less money this year than I did last year.” (She declined to say exactly how much.)

    So far at least 24 US states have sanctioned some form of ID verification, each with unique stipulations. Legislators argue that these laws are intended to keep minors safe from content deemed harmful to them. Critics say that argument doesn’t hold any weight because there are “easy solutions” to the moral panic conservatives have created around the issue. They say the laws infringe on privacy rights and set an irreversibly dark precedent for the future of free speech.

    Perhaps even more terrifying is what it all signals: the death of the free web and an ushering in of a more puritanical version of America.

    That’s been a goal of Project 2025 all along. A line from the 900-page Heritage Foundation document, a right-wing blueprint of sorts for President Donald Trump’s second term, says “people who produce and distribute [porn] should be imprisoned.” In a video recording leaked last August by the Centre for Climate Reporting, Trump ally Russell Vought, who coauthored Project 2025, says the age verification laws are a “back door” route to a federal ban. “We’d have a national ban on pornography if we could,” says Vought, who is director of the Office of Management and Budget in the Trump administration, in the video. “We’ve got a number of states that are passing this, and you know what happens is, the porn company then says, ‘We’re not going to do business in your state,’ which is entirely what we were after,” he explains. In the same video, Vought says his wider goal is creating a “culture that values babies and the life that’s created and is focused on the birth rates and makes them a positive good as opposed to a burden.”

    [ad_2]

    Jason Parham

    Source link

  • Cybersecurity expert reveals simple trick to stop companies from tracking your online shopping

    [ad_1]

    NEWYou can now listen to Fox News articles!

    We’re conditioned to think our email address is harmless. Most of us think it’s just an ID, a way to get receipts and shipping updates, but that’s not it.

    Your email is the skeleton key to your online identity. It’s what companies use to build behavioral profiles, target ads, link purchases, and sometimes worse, facilitate fraud after a breach. And when you reuse the same email address everywhere, you make that key universal.

    To keep things private, I use an alias for online shopping to stay anonymous, cut down on spam, and more. Let’s discuss what aliases are, why they matter, and how they quietly turn the tables in your favor.

    Sign Up For My Free Cyberguy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    A woman browses the Amazon website on her laptop on Sep. 29, 2024. (Serene Lee/SOPA Images/LightRocket)

    How Email Aliases Help You Stay Anonymous Online

    Each time you enter your main email on a shopping site, you give that company a lasting way to connect your behavior across different platforms, devices, and timeframes. They might hash or encrypt your email, but the behavioral patterns remain. You can still be tracked, but aliases interrupt that chain.

    Instead of sharing my actual email address, I create a unique one for each website. The emails still reach me through forwarding, but the company never sees my real address. That small change prevents them from linking my activity with other accounts or sites. It is not a perfect solution, but it adds just enough friction to disrupt the tracking systems.

    Every alias I use becomes a kind of tracker. If one starts getting spam, I know which site sold or lost my data. Most people don’t know where the breach happened, they just assume “it happens.” I take a different approach. When an alias starts getting unwanted emails, I do not try to unsubscribe or set up filters or waste time guessing. I simply disable the alias, and the problem is gone.

    person receiving spam email on laptop

    A spam phishing email is displayed on a laptop screen on March 21, 2022. Retail companies often sell shopper data, leading to unwanted spam and phishing messages. (Peter Dazeley)

    Stop Companies From Tracking You With Email Aliases

    The average e-commerce site uses between 15 and 30 third-party scripts, analytics trackers, ad pixels, behavioral beacons, according to a study. Even if the site itself is honest, its stack probably isn’t. Your email passes through layers of infrastructure, mailing tools, CRM platforms, shipping plugins. And all it takes is one misconfiguration or a careless developer for your data to end up in the wrong hands.

    An alias reduces the blast radius. If the site gets breached your core identity remains untouched.

    Aliases don’t just protect privacy, they improve behavior. When I started using them, I found myself thinking more clearly about where I was signing up and why. The mental pause required to generate a new alias made me more deliberate. And it gave structure to the mess. I could set rules like all product warranties go to products@myalias.com, all newsletters to news@myalias.com.

    Create Email Aliases For Better Online Privacy

    An alias alone isn’t enough to stay safe out there. You also need a secure email provider to start with. By creating email aliases, you can protect your information and reduce spam. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches. 

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com.

    person shopping online through best buy phone app

    A woman browses Best Buy on her smartphone while online shopping. (Serene Lee/SOPA Images/LightRocket)

    Kurt’s Key Takeaway

    We’ve made progress when it comes to password hygiene. Many of us now use password managers and enable two-factor authentication, but when it comes to email, the habits haven’t changed much. Most people still rely on a single email address for everything, including shopping, banking, subscriptions, work, even family communication. That’s not just inefficient, but also a security risk. Using email aliases is a simple way to fragment your digital identity. It adds complexity for attackers and reduces the chances of a single breach affecting multiple accounts.

    Would you still use your main email for everything if you knew it made you easier to track? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign Up For My Free Cyberguy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Online age checks proliferating, but so are concerns they curtail internet freedom

    [ad_1]

    Online age checks are on the rise in the U.S. and elsewhere, asking people for IDs or face scans to prove they are over 18 or 21 or even 13. To proponents, they’re a tool to keep children away from adult websites and other material that might be harmful to them.

    But opponents see a worrisome trend toward a less secure, less private and less free internet, where people can be denied access not just to pornography but news, health information and the ability to speak openly and anonymously.

    “I think that many of these laws come from a place of good intentions,” said Jennifer Huddleston, a senior technology policy fellow at the Cato Institute, a libertarian think tank. “Certainly we all want to protect young people from harmful content before they’re ready to see it.”

    More than 20 states have passed some kind of age verification law, though many face legal challenges. While no such law exists on the federal level in the United States, the Supreme Court recently allowed a Mississippi age check law for social media to stand. In June, the court upheld a Texas law aimed at preventing minors from watching pornography online, ruling that adults don’t have a First Amendment right to access obscene speech without first proving their age.

    Elsewhere, the United Kingdom now requires users visiting websites that allow pornography to verify their age. Beyond adult sites, platforms like Reddit, X, Telegram and Bluesky have also committed to age checks. France and several other European Union countries also are testing a government sponsored verification app.

    And Australia has banned children under 16 from accessing social media.

    “Platforms now have a social responsibility to ensure the safety of our kids is a priority for them,” Australian Prime Minister Anthony Albanese told reporters in November. The platforms have a year to work out how they could implement the ban before penalties are enforced.

    To critics, though, age check laws raise “significant privacy and speech concerns, not only for young people themselves, but also for all users of the internet,” Huddleston said. “Because the only way to make sure that we are age verifying anyone under the age of 18 is to also age verify everyone over the age 18. And that could have significant impacts on the speech and privacy rights of adults.”

    The state laws are a hodgepodge of requirements, but they generally fall into two camps. On one side are laws — as seen in Louisiana and Texas — that require websites comprised of more than 33% of adult content to verify users’ ages or face fines. Then there are laws — enacted in Wyoming or South Dakota — that seek to regulate sites that have any material that is considered obscene or otherwise harmful to minors.

    What’s considered harmful to minors can be subjective, and this is where experts believe such laws run afoul of the First Amendment. It means people may be required to verify their ages to access anything, from Netflix to a neighborhood blog.

    “In places like Australia and the U.K., there is already a split happening between the internet that people who are willing to identify themselves or go through age verification can see and the rest of the internet. And that’s historically a very dangerous place for us to end up,” said Jason Kelley, activism director at the nonprofit digital rights group Electronic Frontier Foundation.

    What’s behind the gates is determined by a “hundred different decision-makers,” Kelley said, from politicians to tech platforms to judges to individuals who have sued because they believe that a piece of content is dangerous.

    While many companies are complying, verifying users’ ages can prove a burden, especially for smaller platforms. On Friday, Bluesky said it will no longer be available in Mississippi because of its age verification requirements. While the social platform already does age verification in the U.K., it said Mississippi’s approach “would fundamentally change how users access Bluesky.”

    That’s because it requires every user to undergo an age check, not just those who want to access adult content. It would also require Bluesky to identify and track users that are children.

    “We think this law creates challenges that go beyond its child safety goals, and creates significant barriers that limit free speech and disproportionately harm smaller platforms,” the company said in a blog post.

    Some websites and social media companies, such as Instagram’s parent company Meta, have argued that age verification should be done by app store owners, such as Apple and Google, and not individual platforms. This would mean that app stores need to verify their users’ ages before they allow them to download apps. Unsurprisingly, Apple and Google disagree.

    “Billed as ‘simple’ by its backers, including Meta, this proposal fails to cover desktop computers or other devices that are commonly shared within families. It also could be ineffective against pre-installed apps,” Google said in a blog post.

    Nonetheless, a growing number of tech companies are implementing verification systems to comply with regulations or ward off criticism that they are not protecting children. This includes Google, which recently started testing a new age-verification system for YouTube that relies on AI to differentiate between adults and minors based on their watch histories.

    Instagram is testing a similar AI system to determine if kids are lying about their ages. Roblox, which was sued by the Louisiana attorney general on claims it doesn’t do enough to protect children from predators, requires users who want to access certain games rated for those over 17 to submit a photo ID and undergo a face scan for verification. Roblox has also recently begun requiring age verification for teens who want to chat more freely on platform.

    Face scans that promise to estimate a person’s age may address some of the concerns around IDs, but they can be unreliable. Can AI accurately tell, for instance, if someone is 17.5 or just turned 18?

    “Sometimes it’s less accurate for women or it’s less accurate for certain racial or ethnic groups or for certain physical characteristics that then may mean that those people have to go through additional privacy invasive screenings to prove that they are of a certain age,” Huddleston said.

    While IDs are a common way of verifying someone’s age, the method raises security concerns: What happens if companies don’t delete the uploaded files, for instance?

    Case in point: the recent data breaches at Tea, an app for women to anonymously warn each other about the men they date, speak to some of these concerns. The app requires women who sign up to upload an ID or undergo a scan to prove that they are women. Tea wasn’t supposed to keep the files but it did, and stored them in a way that allowed hackers to not only access the images, but also their private messages.

    [ad_2]

    Source link

  • Online age checks are proliferating, but so are concerns they curtail internet freedom

    [ad_1]

    Online age checks are on the rise in the U.S. and elsewhere, asking people for IDs or face scans to prove they are over 18 or 21 or even 13. To proponents, they’re a tool to keep children away from adult websites and other material that might be harmful to them.

    But opponents see a worrisome trend toward a less secure, less private and less free internet, where people can be denied access not just to pornography but news, health information and the ability to speak openly and anonymously.

    “I think that many of these laws come from a place of good intentions,” said Jennifer Huddleston, a senior technology policy fellow at the Cato Institute, a libertarian think tank. “Certainly we all want to protect young people from harmful content before they’re ready to see it.”

    More than 20 states have passed some kind of age verification law, though many face legal challenges. While no such law exists on the federal level in the United States, the Supreme Court recently allowed a Mississippi age check law for social media to stand. In June, the court upheld a Texas law aimed at preventing minors from watching pornography online, ruling that adults don’t have a First Amendment right to access obscene speech without first proving their age.

    Elsewhere, the United Kingdom now requires users visiting websites that allow pornography to verify their age. Beyond adult sites, platforms like Reddit, X, Telegram and Bluesky have also committed to age checks. France and several other European Union countries also are testing a government sponsored verification app.

    And Australia has banned children under 16 from accessing social media.

    “Platforms now have a social responsibility to ensure the safety of our kids is a priority for them,” Australian Prime Minister Anthony Albanese told reporters in November. The platforms have a year to work out how they could implement the ban before penalties are enforced.

    To critics, though, age check laws raise “significant privacy and speech concerns, not only for young people themselves, but also for all users of the internet,” Huddleston said. “Because the only way to make sure that we are age verifying anyone under the age of 18 is to also age verify everyone over the age 18. And that could have significant impacts on the speech and privacy rights of adults.”

    The state laws are a hodgepodge of requirements, but they generally fall into two camps. On one side are laws — as seen in Louisiana and Texas — that require websites comprised of more than 33% of adult content to verify users’ ages or face fines. Then there are laws — enacted in Wyoming or South Dakota — that seek to regulate sites that have any material that is considered obscene or otherwise harmful to minors.

    What’s considered harmful to minors can be subjective, and this is where experts believe such laws run afoul of the First Amendment. It means people may be required to verify their ages to access anything, from Netflix to a neighborhood blog.

    “In places like Australia and the U.K., there is already a split happening between the internet that people who are willing to identify themselves or go through age verification can see and the rest of the internet. And that’s historically a very dangerous place for us to end up,” said Jason Kelley, activism director at the nonprofit digital rights group Electronic Frontier Foundation.

    What’s behind the gates is determined by a “hundred different decision-makers,” Kelley said, from politicians to tech platforms to judges to individuals who have sued because they believe that a piece of content is dangerous.

    While many companies are complying, verifying users’ ages can prove a burden, especially for smaller platforms. On Friday, Bluesky said it will no longer be available in Mississippi because of its age verification requirements. While the social platform already does age verification in the U.K., it said Mississippi’s approach “would fundamentally change how users access Bluesky.”

    That’s because it requires every user to undergo an age check, not just those who want to access adult content. It would also require Bluesky to identify and track users that are children.

    “We think this law creates challenges that go beyond its child safety goals, and creates significant barriers that limit free speech and disproportionately harm smaller platforms,” the company said in a blog post.

    Some websites and social media companies, such as Instagram’s parent company Meta, have argued that age verification should be done by app store owners, such as Apple and Google, and not individual platforms. This would mean that app stores need to verify their users’ ages before they allow them to download apps. Unsurprisingly, Apple and Google disagree.

    “Billed as ‘simple’ by its backers, including Meta, this proposal fails to cover desktop computers or other devices that are commonly shared within families. It also could be ineffective against pre-installed apps,” Google said in a blog post.

    Nonetheless, a growing number of tech companies are implementing verification systems to comply with regulations or ward off criticism that they are not protecting children. This includes Google, which recently started testing a new age-verification system for YouTube that relies on AI to differentiate between adults and minors based on their watch histories.

    Instagram is testing a similar AI system to determine if kids are lying about their ages. Roblox, which was sued by the Louisiana attorney general on claims it doesn’t do enough to protect children from predators, requires users who want to access certain games rated for those over 17 to submit a photo ID and undergo a face scan for verification. Roblox has also recently begun requiring age verification for teens who want to chat more freely on platform.

    Face scans that promise to estimate a person’s age may address some of the concerns around IDs, but they can be unreliable. Can AI accurately tell, for instance, if someone is 17.5 or just turned 18?

    “Sometimes it’s less accurate for women or it’s less accurate for certain racial or ethnic groups or for certain physical characteristics that then may mean that those people have to go through additional privacy invasive screenings to prove that they are of a certain age,” Huddleston said.

    While IDs are a common way of verifying someone’s age, the method raises security concerns: What happens if companies don’t delete the uploaded files, for instance?

    Case in point: the recent data breaches at Tea, an app for women to anonymously warn each other about the men they date, speak to some of these concerns. The app requires women who sign up to upload an ID or undergo a scan to prove that they are women. Tea wasn’t supposed to keep the files but it did, and stored them in a way that allowed hackers to not only access the images, but also their private messages.

    [ad_2]

    Source link

  • How scammers target you even without social media

    [ad_1]

    NEWYou can now listen to Fox News articles!

    “I don’t use Facebook. I don’t even have an email. How could scammers possibly know anything about me?”

    That’s the question I hear from people over 60 all the time. If you assume that by staying off social media and avoiding the internet, you’re invisible to fraudsters, think again.

    The truth is, even if you’ve never posted a single thing online, scammers can still know your age, home address, relatives’ names, property value, and even when you’ve suffered the loss of a loved one. How? Because the everyday details of your offline life are quietly being collected, digitized, and sold.

    And scammers are taking full advantage.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Scammers can still know a lot about you, even if you have never posted anything online. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)

    How scammers target seniors without social media

    Here’s the uncomfortable reality: you don’t have to “put yourself out there” for your information to appear online. Much of it becomes public record automatically, thanks to the way our legal and government systems work.

    Some of the biggest sources include:

    • Obituaries: When a loved one passes away, obituaries often list family members, ages, locations, and relationships. To scammers, it’s a family tree of potential targets.
    • Real estate records: Property purchases, sales, and even mortgage details are public. This can tell scammers whether you own your home outright, what it’s worth, and if you might be cash-rich.
    • Probate filings: When estates go through probate, details about beneficiaries and assets are recorded. Scammers can identify heirs and target them with fraudulent “inheritance assistance.”
    • Property tax documents: These are often searchable by anyone. They reveal not only your address but also your financial standing.
    • Court filings: Divorce, bankruptcy, and civil disputes often contain personal details, which are public by law.

    On their own, these may not seem dangerous. But combined, they create a shockingly detailed portrait of your life.

    THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY

    A man leaning on a fence using a tablet

    Public records can provide a portrait of your life. (Barbara Eddowes via Getty Images)

    Bereavement scams and emotional tricks scammers use

    One of the cruelest scams I’ve seen lately is what I call the bereavement scam.

    Here’s how it works:

    A scammer scrapes local obituaries to see who’s recently lost a spouse or child. They then reach out, by phone, email, or even mail, pretending to be a funeral home, a grief counselor, or a charity. Because they reference real names, dates, and relationships, their outreach sounds painfully authentic.

    • Example: “We saw you lost your husband on March 3rd. We’d like to offer you a free grief support service…”
    • Or: “Your loved one’s final medical expenses may qualify for reimbursement. We just need your banking details to confirm.”

    When you’re in mourning, your guard is down. Scammers know this, and they exploit grief to steal money and identities.

    Other emotionally charged scams follow the same playbook

    • Fake Medicare calls referencing your age and location.
    • Phony financial advisors offering to “help” with retirement rollovers.
    • Romance scams targeting widows and widowers who live alone.
    • Fake agent scams trick victims into paying thousands of dollars through phone threats

    The unifying factor is that these criminals don’t need Facebook to learn about you. They already have a dossier built from public and brokered data.

    What’s even worse is that scammers can target your loved ones even years after your passing. They can call or text your close relatives claiming to offer free memorial services, annuities, or other common strategies when people are most vulnerable. Your exposed personal data fuels such morbid scams.

    9 ONLINE PRIVACY RISKS YOU PROBABLY DON’T KNOW ABOUT

    A man typing on a laptop

    A man typing on his laptop (Kurt “Cyberguy” Knutsson)

    The shocking sources of your personal data

    Here’s the part most people don’t realize: scammers rarely dig through dusty courthouse files themselves. They don’t have to. That work has already been done by data brokers. Data brokers are companies whose entire business model is gathering and selling personal information. They collect from:

    • Public records (like those obituaries and real estate filings)
    • Consumer databases (credit headers, magazine subscriptions, surveys)
    • “People search” websites (Spokeo, Whitepages, BeenVerified, and dozens more).

    The result is a searchable profile that might include:

    • Full name and aliases
    • Current and past addresses
    • Phone numbers and email addresses
    • Relatives and their contact info
    • Age, income range, home value
    • Legal or financial history

    Once a broker has your data, they sell it. And once it’s sold, it spreads. Even if you’ve never had a social media account, companies may build a ‘shadow profile’ of you from leaked data, online purchases, or details shared by others, leaving it ready to be abused.

    How to protect yourself from scammers and data brokers

    The good news is, you’re not powerless. While you can’t stop public records from existing, you can make it much harder for scammers to access and weaponize your data. Here’s how:

    1) Reduce your digital footprint

    • Request removal from people search sites and data brokers.
    • This prevents your profile from being sold to scammers.
    • Doing this manually can take hours and has to be repeated, but it works.

    2) Stay alert for emotional manipulation

    • If someone contacts you after a loss, assume caution.
    • Verify charities and funeral services before engaging.
    • Never share banking or personal details over the phone or email.

    3) Automate data removal

    • Instead of manually contacting hundreds of data brokers, you can use a service like Incogni.
    • It sends and tracks removal requests across 420+ brokers, and keeps repeating the process so your data doesn’t resurface.
    • With their Unlimited plan, you can request data removal from any other shady website and disappear from the internet.
    • For seniors, this is often the safest and most practical solution.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Not being on Facebook doesn’t mean you’re invisible. Scammers don’t need you to share your life online. Your offline life is already online without your consent. The obituary in the local paper, the deed to your home, the probate record of your loved one’s estate, these are all turned into data points, sold to brokers, and resold to whoever wants them. That’s why protecting your personal data isn’t about avoiding the internet. It’s about reducing what’s already out there. The less data scammers can find, the harder it is for them to fool you with realistic, emotionally charged attacks. And that’s a big step toward keeping your money, your identity, and your retirement safe.

    Do you believe it’s time for the government and companies to step in and protect your data privacy?  Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Over 2B users face phishing risks after Google data leak

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A tech leader like Google often seems invincible when it comes to cybersecurity attacks, but that is not the case. Earlier this month, the search giant confirmed that attackers had accessed one of its corporate Salesforce instances. According to a Google spokesperson, this system stored basic, and largely publicly available business information, such as contact details and notes from small and medium-sized companies. It did not store customer data from Google Cloud or consumer products like Gmail, Drive or Calendar.

    Google says it terminated the malicious activity, completed an impact analysis, and provided mitigations. Therefore, no further action is required by users.

    NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUD

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

    Cybercriminals are exploiting Google’s recent Salesforce data breach to launch vishing calls and phishing attacks against Gmail users worldwide. (Kurt “CyberGuy” Knutsson)

    Vishing calls target Gmail users

    Hackers have reportedly accessed Google’s Salesforce database systems, exposing customer and company names. Google confirmed the incident and clarified that the information was mostly public business contact data and did not include passwords or payment information. The company stressed that the breach affected only a corporate Salesforce system, not consumer Gmail or Google Cloud accounts.

    Still, attackers are exploiting the news of the breach to fuel phishing and vishing scams, tricking people into giving up sensitive information. According to PC World, some users have already reported an increase in phishing attempts that reference Google services.

    STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE

    One of the main tactics involves scam phone calls, also known as vishing. A Reddit post highlighted a wave of calls coming from the 650 area code, which is linked to Google’s headquarters. In these calls, scammers pose as Google employees and warn victims of a supposed security breach. They then instruct users to reset their Gmail password and share it with them. This locks the rightful owner out of the account and gives the attacker complete control.

    Gmail loading screen.

    A user launches Gmail. (Kurt “CyberGuy” Knutsson)

    Old infrastructure exploited with “dangling buckets”

    Separately from the Salesforce incident, Google Cloud customers are also facing another type of attack. Hackers are trying to exploit outdated access addresses using a method called the dangling bucket. This can allow them to inject malware or steal data. Both businesses and individuals are vulnerable to losing control over sensitive information if targeted in this way.

    Gmail and Google Cloud serve nearly 2.5 billion people, which makes the scale of the risk significant. Although the initial breach did not expose passwords, attackers are using the news of the incident to trick people into revealing their login details.

    Google homepage

    A Google search window is on a laptop. (Kurt “CyberGuy” Knutsson)

    6 ways you can stay safe from scammers targeting Google accounts

    Google accounts are often a prime target for scammers. The good news is that protecting yourself doesn’t require advanced technical skills. A few practical steps can drastically reduce your chances of becoming a victim.

    1) Avoid clicking on phishing links

    Phishing remains the most common way scammers steal Google account credentials. A fake email or text may claim your account has been locked or that you need to verify suspicious activity. Clicking the link usually takes you to a counterfeit login page that looks almost identical to the real Google sign-in screen.

    To avoid falling for these tricks, check the sender’s email address carefully, hover over links before clicking, and avoid entering your Google password on any page that doesn’t start with accounts.google.com.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    2) Save passwords securely

    Reusing weak passwords across multiple sites is an open invitation for scammers. If one site is breached, your Google account becomes vulnerable. A strong, unique password is your first line of defense.

    The easiest way to manage this is with a password manager. It can generate complex passwords, store them securely, and fill them in automatically when you need them. This way, you never have to remember dozens of different logins, and attackers can’t guess their way in.

    Next, see if your email has been exposed in past breaches. Our #1 password manager pick (see Cyberguy.com/Passwords) includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    WHAT TO DO IF YOU GET A PASSWORD RESET EMAIL YOU DIDN’T ASK FOR

    3) Delete personal data that puts you at risk

    Scammers often use information they find online to craft convincing attacks. If your email address, phone number, or even past passwords are floating around on data broker sites, criminals have more tools to impersonate you or trick you into revealing more.

    Using a data removal service helps clean up your digital footprint. By reducing the amount of exposed information about you, it becomes much harder for scammers to target you directly.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Turn on two-factor authentication

    Even the strongest password can be stolen, but two-factor authentication (2FA) adds an extra barrier. When enabled, Google will ask for a one-time code or prompt on your phone before granting access. That means even if a scammer manages to get your password, they can’t log in without also having your device.

    Google offers several 2FA methods, from SMS codes to app-based prompts and even hardware security keys. For the best protection, choose app-based or hardware verification rather than text messages.

    5) Keep your devices updated

    Many scams rely on exploiting outdated software. If your phone, browser, or operating system isn’t up to date, attackers may use known vulnerabilities to install malware or hijack your session.

    Set your devices to update automatically whenever possible. This ensures you’re always running the latest security patches, reducing the number of openings a scammer can use.

    6) Regularly check Google account security settings

    Google provides built-in tools to help users spot suspicious activity. By visiting your Google Account’s security page, you can see devices that have signed in, recent account activity, and whether recovery options like your phone number and backup email are up to date.

    Running a Google Security Checkup only takes a few minutes and gives you a clear overview of any weaknesses. Think of it as a health check for your digital life.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    The incident is a reminder that even tech giants with vast resources are not immune to security lapses. While Google insists that no passwords were exposed, the wave of phishing and vishing scams shows how quickly criminals can weaponize even partial leaks. What began as a breach of business data has spiraled into a threat facing millions of everyday users, raising questions about how secure Google’s ecosystem really is.

    Do you believe regulators should step in with stricter rules for how cloud providers handle security lapses? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Schools’ safety tools are spying on kids — even at home

    [ad_1]

    NEWYou can now listen to Fox News articles!

    School is back in session, but here’s something no one told you at orientation: Your kids may have more eyes on them than just their teachers’. Even if you don’t have kids in school, you really need to know about this.

    new study from UC San Diego uncovered what’s really going on with those student safety tools schools buy. You know, the ones that are supposed to stop bullying, flag mental health struggles and prevent school shootings? Well, they’ve morphed into 24/7 surveillance machines.

    Enter to win a new iPhone at www.WinFromKim.com!

    Get this: 86% of the companies that provide these services monitor kids day and night, not just during school hours and not just on school devices. That’s every Google search, every message, sometimes even at home on personal phones and laptops.

    Nearly a third of these companies give kids “risk scores” based on what they type or search. The kicker? 71% rely on AI to flag behavior. Yes, an algorithm decides if your child is “risky.” 

    TEXAS COMPANY CREATES DRONES TO CONFRONT SCHOOL SHOOTERS IN SECONDS

    A new study finds that school safety tools are monitoring students 24/7. (Photo by Matt Cardy/Getty Images)

    Imagine your kid writing an email they never send and that draft gets scooped into some monitoring company’s database. That’s exactly what happened to this teen who got suspended. Creepy doesn’t even begin to cover it.

    📱 Yes, they’re watching at home, too

    About 36% of companies monitor student-owned devices. All it takes is a school-required app, plug-in or software. 

    Late-night YouTube binges, private DMs and social media posts could trigger a red flag on some dashboard.

    📌 Questions every parent should ask the school

    I think these tools can do a lot of good. God knows we don’t want any more school shootings or kids slipping through the cracks. 

    STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE

    Students walking down the hall.

    School safety programs are collecting students’ emails, messages, and web activity on their personal devices. (Photo by Sebastian Willnow/picture alliance via Getty Images)

    But you and your kids need to understand exactly how they work and what happens to the data. Copy these questions and send an email to the school’s administrator or set up a meeting in person.

    1. Is our school using GoGuardian, Bark, Gaggle, Securly, Lightspeed or any online monitoring service? What exactly are they tracking?
    2. Are you monitoring personal devices at home?
    3. What happens if my child is flagged? How can I see my child’s dashboard?
    4. How long is student data stored, and can parents request deletion?
    5. Is student data ever sold, shared or used for anything beyond monitoring?

    Make sure your kids know that anything they do on a school-issued device is fair game. And depending on the setup, their personal phone or laptop could be tracked, too. These systems can protect, but they also raise big questions about privacy and oversight.

    Is this happening with your kid’s school? Drop me a note. I’d love to talk to you about it.

    STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE

    Students studying on the computer.

    Students should assume that school safety programs are monitoring their devices. (Kirk Sides/Houston Chronicle via Getty Images)

    🚸 Know someone with kids? Share this important information with them now.

    Get tech-smarter on your schedule

    CLICK HERE TO GET THE FOX NEWS APP

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    • National radio:  Airing on 500+ stations across the US – Find yours or get the free podcast.
    • Daily newsletter: Join 650,000 people who read the Current (free!)
    • Watch: On Kim’s YouTube channel

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

    [ad_2]

    Source link

  • Educators get new guidance for age of AI

    [ad_1]

    STATE HOUSE, BOSTON — Artificial intelligence in classrooms is no longer a distant prospect, and Massachusetts education officials on Monday released statewide guidance urging schools to use the technology thoughtfully, with an emphasis on equity, transparency, academic integrity and human oversight.

    “AI already surrounds young people. It is baked into the devices and apps they use, and is increasingly used in nearly every system they will encounter in their lives, from health care to banking,” the Department of Elementary and Secondary Education’s new AI Literacy Module for Educators says.


    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm“z?@H=6586 @7 9@H E96D6 DJDE6>D @A6C2E6—2?5 9@H E96J >2J D6CG6 @C F?56C>:?6 :?5:G:5F2=D’ 2?5 D@4:6EJ’D 8@2=D—96=AD 3C:586 4=2DDC@@> =62C?:?8 H:E9 E96 564:D:@?D E96J H:== 7246 @FED:56 D49@@=]”k^Am

    kAm%96 s6A2CE>6?E @7 t=6>6?E2CJ 2?5 $64@?52CJ t5F42E:@? C6=62D65 E96 =62C?:?8 >@5F=6 7@C 65F42E@CD[ 2D H6== 2D 2 ?6H v6?6C2E:G6 px !@=:46 vF:52?46 5@4F>6?E @? |@?52J 29625 @7 E96 a_ada_ae D49@@= J62C[ 2 7@C>2= 2EE6>AE E@ D6E A2C2>6E6CD 2C@F?5 E96 E649?@=@8J E92E 92D :?7:=EC2E65 65F42E:@?]k^Am

    kAmq@E9 H6C6 56G6=@A65 😕 C6DA@?D6 E@ C64@>>6?52E:@?D 7C@> 2 DE2E6H:56 px %2D< u@C46 2?5 2C6 >62?E E@ 8:G6 D49@@=D 2 4@?D:DE6?E 7C2>6H@C< 7@C 564:5:?8 H96?[ 9@H 2?5 H9J E@ FD6 px 😕 H2JD E92E 2C6 D276[ 6E9:42= 2?5 :?DECF4E:@?2==J >62?:?87F=[ 244@C5:?8 E@ 2 st$t DA@<6DA6CD@?]k^Am

    kAm%96 56A2CE>6?E DEC6DD65 E92E E96 8F:52?46 😀 “?@E E@ AC@>@E6 @C 5:D4@FC286 E96 FD6 @7 px] x?DE625[ :E @776CD 6DD6?E:2= 8F:52?46 E@ 96=A 65F42E@CD E9:?< 4C:E:42==J 23@FE px — 2?5 E@ 564:56 :7[ H96?[ 2?5 9@H :E >:89E 7:E :?E@ E96:C AC@76DD:@?2= AC24E:46]”k^Am

    kAm%96 =62C?:?8 >@5F=6 7@C 65F42E@CD :ED6=7 ?@E6D E92E :E H2D HC:EE6? H:E9 E96 96=A @7 86?6C2E:G6 px]k^Am

    kAm%96 7:CDE 5C27E H2D :?E6?E:@?2==J HC:EE6? H:E9@FE px] p 5:D4=@DFC6 D2JD “E96 2FE9@CD H2?E65 E9:D C6D@FC46 E@ C67=64E E96 36DE E9:?<:?8 @7 6IA6CED 7C@> st$t’D px E2D< 7@C46[ 7C@> st$t[ 2?5 7C@> @E96C 65F42E@CD H9@ DFAA@CE65 E9:D H@C<] (96? px >@56=D 4C62E6 7:CDE 5C27ED[ H6 >2J F?4@?D4:@FD=J ‘2?49@C’ @? px’D @FEAFED 2?5 =:>:E @FC @H? 4C:E:42= E9:?<:?8 2?5 4C62E:G:EJj 7@C E9:D C6D@FC46 23@FE px[ E92E H2D 2 A@DD:3:=:EJ E96 2FE9@CD H2?E65 E@ 2G@:5]”k^Am

    kAmw@H6G6C[ E96 4=@D6E@7:?2= 5C27E H2D 6?E6C65 :?E@ 2 =2C86 =2?8F286 >@56= =:<6 r92Ev!%c@ @C r=2F56 $@??6E c “E@ 4964< E92E E96 E6IE H2D 2446DD:3=6 2?5 ;2C8@?7C66[” :E D2JD]k^Am

    kAmx? |2DD249FD6EED 4=2DDC@@>D[ px FD6 92D 2=C625J DE2CE65 E@ DAC625] %62496CD 2C6 6IA6C:>6?E:?8 H:E9 r92Ev!% 2?5 @E96C E@@=D E@ 86?6C2E6 CF3C:4D[ =6DD@? A=2?D[ 2?5 :?DECF4E:@?2= >2E6C:2=D[ 2?5 DEF56?ED 2C6 FD:?8 :E E@ 5C27E 6DD2JD[ 3C2:?DE@C> :562D[ @C EC2?D=2E6 E6IE 7@C >F=E:=:?8F2= =62C?6CD] q6J@?5 E6249:?8[ 5:DEC:4ED 2C6 2=D@ FD:?8 px 7@C D4965F=:?8[ C6D@FC46 2==@42E:@? 2?5 252AE:G6 2DD6DD>6?ED]k^Am

    kAmqFE E96 DE2E6’D ?6H C6D@FC46D 42FE:@? E92E px 😀 72C 7C@> 2 ?6FEC2= E@@=[ 2?5 BF6DE:@?D DH:C= 2C@F?5 H96E96C px 42? 36 FD65 E@ 6?92?46 =62C?:?8[ @C D9@CE4FE :E]k^Am

    kAm“q642FD6 px 😀 56D:8?65 E@ >:>:4 A2EE6C?D[ ?@E E@ ‘E6== E96 ECFE9[’ :E 42? AC@5F46 C6DA@?D6D E92E 2C6 8C2>>2E:42==J 4@CC64E 2?5 E92E D@F?5 4@?G:?4:?8[ 3FE 2C6 724EF2==J HC@?8 @C 4@?EC2CJ E@ 9F>2?D’ F?56CDE2?5:?8 @7 C62=:EJ[” E96 8F:52?46 D2JD]k^Am

    kAmx? H92E :E 42==D “px 7:4E:@?D[” E96 56A2CE>6?E H2C?D 282:?DE @G6CC6=:2?46 @? DJDE6>D E92E 42? 723C:42E6 :?7@C>2E:@?[ C6:?7@C46 FD6C 2DDF>AE:@?D E9C@F89 “DJ4@A92?4J[” 2?5 4C62E6 H92E |x% C6D62C496CD 92G6 56D4C:365 2D “4@8?:E:G6 563E[” H96C6 A6@A=6 364@>6 2?49@C65 E@ >249:?686?6C2E65 5C27ED 2?5 =@D6 E96 23:=:EJ E@ 56G6=@A E96:C @H? :562D]k^Am

    kAm%96 8F:52?46 FC86D D49@@=D E@ AC:@C:E:K6 7:G6 8F:5:?8 G2=F6D H96? 25@AE:?8 px E@@=Di 52E2 AC:G24J 2?5 D64FC:EJ[ EC2?DA2C6?4J 2?5 244@F?E23:=:EJ[ 3:2D 2H2C6?6DD 2?5 >:E:82E:@?[ 9F>2? @G6CD:89E 2?5 65F42E@C ;F58>6?E[ 2?5 24256>:4 :?E68C:EJ]k^Am

    kAm~? AC:G24J[ E96 56A2CE>6?E C64@>>6?5D E92E 5:DEC:4ED @?=J 2AAC@G6 px E@@=D G6EE65 E9C@F89 2 7@C>2= 52E2 AC:G24J 28C66>6?E AC@46DD 2?5 E6249 DEF56?ED 9@H E96:C 52E2 😀 FD65 H96? E96J :?E6C24E H:E9 DF49 DJDE6>D] u@C EC2?DA2C6?4J[ D49@@=D 2C6 6?4@FC2865 E@ :?7@C> A2C6?ED 23@FE 4=2DDC@@> px FD6[ >2:?E2:? AF3=:4 =:DED @7 2AAC@G65 E@@=D[ 2?5 56D4C:36 9@H 6249 😀 FD65]k^Am

    kAmq:2D 😀 2?@E96C 46?EC2= 4@?46C?] %96 8F:52?46 DF886DED 86?6C2E:G6 px E@@=D 92G6 3F:=E:? 92C>7F= 3:2D6D[ 2D E96J 2C6 EC2:?65 @? 9F>2? 52E2[ 2?5 E92E E62496CD 2?5 DEF56?ED D9@F=5 6I2>:?6 9@H px C6DA@?D6D >2J G2CJ]k^Am

    kAm“(96? px DJDE6>D 8@ F?6I2>:?65[ E96J 42? :?25G6CE6?E=J C6:?7@C46 9:DE@C:42= A2EE6C?D @7 6I4=FD:@?[ >:DC6AC6D6?E2E:@?[ @C :?;FDE:46[” E96 56A2CE>6?E HC@E6]k^Am

    kAm~77:4:2=D H2C? E92E AC65:4E:G6 2?2=JE:4D 7@C642DE:?8 2 DEF56?E’D 7FEFC6 @FE4@>6 4@F=5 :?4@CC64E=J 7=28 E96> 7@C 24256>:4 :?E6CG6?E:@?[ 32D65 @? 3:2D65 px :?E6CAC6E2E:@? @7 52E2]k^Am

    kAm“pFE@>2E65 8C25:?8 E@@=D >2J A6?2=:K6 =:?8F:DE:4 5:776C6?46D] w:C:?8 A=2E7@C>D >:89E 5@H?C2?< 42?5:52E6D H9@D6 6IA6C:6?46D @C 6G6? ?2>6D 5:776C 7C@> 5@>:?2?E ?@C>D] pE E96 D2>6 E:>6[ DEF56?ED 24C@DD E96 r@>>@?H62=E9 7246 C62= 5:DA2C:E:6D 😕 2446DD E@ 9:89DA665 :?E6C?6E[ FAE@52E6 56G:46D[ 2?5 :?4=FD:G6 =62C?:?8 6?G:C@?>6?ED[” E96 8F:52?46 D2JD]k^Am

    kAm%96 5@4F>6?E 2=D@ A=246D C6DA@?D:3:=:EJ @? 65F42E@CD E@ @G6CD66 2?5 25;FDE px @FEAFED] u@C 6I2>A=6[ E62496CD >:89E FD6 px E@ 5C27E 2 A6CD@?2=:K65 C625:?8 A=2? 3FE DE:== 252AE :E E@ C67=64E 2 DEF56?E’D :?5:G:5F2= :?E6C6DED[ DF49 2D DA@CED @C 8C2A9:4 ?@G6=D]k^Am

    kAmu@C DEF56?ED[ E96 DE2E6 😀 >@G:?8 2H2J 7C@> 2 E@?6 @7 @FEC:89E AC@9:3:E:@? @7 px[ 2?5 E@H2C5D @?6 @7 5:D4=@DFC6 7@C E96 D2<6 @7 24256>:4 :?E68C:EJ]k^Am

    kAm%96 5@4F>6?ED DF886DE E92E D49@@=D 4@F=5 4@>6 FA H:E9 A@=:4:6D 7@C DEF56?ED E@ :?4=F56 2? “px &D65” D64E:@? 😕 E96:C A2A6CD[ 4=2C:7J:?8 9@H 2?5 H96? E96J FD65 E@@=D[ H9:=6 E62496CD E6249 E96 5:DE:?4E:@? 36EH66? px2DD:DE65 3C2:?DE@C>:?8 2?5 pxHC:EE6? 4@?E6?E]k^Am

    kAm“$49@@=D E6249 2?5 6?4@FC286 E9@F89E7F= :?E68C2E:@? @7 px C2E96C E92? A6?2=:K:?8 FD6 @FEC:89E]]] px 😀 FD65 😕 H2JD E92E C6:?7@C46 =62C?:?8[ ?@E D9@CE4:C4F:E :E] r=62C 6IA64E2E:@?D 8F:56 H96? 2?5 9@H DEF56?ED FD6 px E@@=D[ H:E9 2? 6>A92D:D @? @C:8:?2=:EJ[ EC2?DA2C6?4J[ 2?5 C67=64E:@?[” :E D2JD]k^Am

    kAmq6J@?5 4=2DDC@@> CF=6D[ :E 6>A92D:K6D E92E “px =:E6C24J” — ?@E @?=J E96 E649?:42= @H=6586[ 3FE F?56CDE2?5:?8 2?5 6G2=F2E:?8 E96 C6DA@?D:3=6 FD6 @7 E96D6 E@@=D — 2D 2? :>A@CE2?E ;@3 2?5 4:G:4 D<:==]k^Am

    kAm“$EF56?ED ?665 E@ 36 6>A@H6C65 ?@E ;FDE 2D FD6CD[ 3FE 2D :?7@C>65[ 4C:E:42= E9:?<6CD H9@ F?56CDE2?5 9@H px H@C:D=625[ 2?5 9@H E@ 2DD6DD :ED :>A24ED[” E96 8F:52?46 D2JD]k^Am

    kAm%92E =:E6C24J 6IE6?5D E@ E96 A6CD@?2= 2?5 6?G:C@?>6?E2= 4@DED @7 E649?@=@8J] $EF56?ED[ E96 56A2CE>6?E DF886DED[ D9@F=5 C67=64E @? E96:C 5:8:E2= 7@@EAC:?ED 2?5 52E2 A6C>2?6?46 H9:=6 2=D@ 4@?D:56C:?8 6?G:C@?>6?E2= :>A24ED @7 px =:<6 6?6C8J FD6 2?5 6H2DE6]k^Am

    kAm%96 ?6H C6D@FC46D 6>A92D:K6 E92E “E6249:?8 H:E9 px 😀 ?@E 23@FE C6A=24:?8 65F42E@CD—:E’D 23@FE 6>A@H6C:?8 E96> E@ 724:=:E2E6 C:49[ 9F>2?46?E6C65 =62C?:?8 6IA6C:6?46D 😕 px6?92?465 6?G:C@?>6?ED]”k^Am

    kAm%96 4=2DDC@@> 8F:52?46 2CC:G6D 2D v@G] |2FC2 w62=6J 92D E2<6? 2 AC@>:?6?E C@=6 😕 D92A:?8 |2DD249FD6EED’ px =2?5D42A6] {2DE J62C D96 =2F?4965 E96 DE2E6’D px wF3[ 42==:?8 :E 2 3:5 E@ >2<6 |2DD249FD6EED 2 =6256C 😕 3@E9 56G6=@A:?8 2?5 C68F=2E:?8 2CE:7:4:2= :?E6==:86?46] w62=6J 92D AC@>@E65 2? 2==:? 2AAC@249 E@ :?E68C2E:?8 px 24C@DD D64E@CD[ 9:89=:89E:?8 :ED A@E6?E:2= 7@C 64@?@>:4 56G6=@A>6?E]k^Am

    kAmt5F42E:@? @77:4:2=D A@D:E:@?65 E96:C ?6H C6D@FC46D 2D A2CE @7 E92E 3C@256C DE2E6H:56 DEC2E68J]k^Am

    kAm“~G6C E96 4@>:?8 J62CD[ D49@@=D H:== A=2J 2 4C:E:42= C@=6 😕 DFAA@CE:?8 DEF56?ED H9@ H:== 36 8C25F2E:?8 :?E@ E9:D 64@DJDE6> 3J AC@G:5:?8 6BF:E23=6 @AA@CEF?:E:6D 7@C E96> E@ =62C? 23@FE E96 D276 2?5 67764E:G6 FD6 @7 px[” :E D2JD]k^Am

    kAm%96 5@4F>6?ED 24@H=6586 E92E px 😀 2=C625J 6>365565 😕 >2?J @7 E96 E@@=D DEF56?ED 2?5 E62496CD FD6 52:=J] %96 492==6?86[ E96J DF886DE[ 😀 ?@E H96E96C D49@@=D H:== FD6 px 3FE 9@H E96J H:== D92A6 :ED C@=6]k^Am

    kAm%96 C6=62D6 2=D@ 4@>6D 282:?DE E96 324<5C@A @7 2 AFD9 @? q624@? w:== E@ =:>:E E649?@=@8J 😕 4=2DDC@@>D]k^Am

    kAm%96 $6?2E6 E9:D DF>>6C 2AAC@G65 2 3:== E92E H@F=5 AC@9:3:E DEF56?E 46==A9@?6 FD6 😕 D49@@=D DE2CE:?8 😕 E96 a_aea_af 24256>:4 J62C[ C67=64E:?8 8C@H:?8 4@?46C? E92E 4@?DE2?E 56G:46 2446DD 92>A6CD 7@4FD 2?5 =62C?:?8] {2H>2<6CD 324<:?8 E96 >62DFC6 92G6 =:<6?65 46==A9@?6D 😕 4=2DDC@@>D E@ “6=64EC@?:4 4@42:?6” 2?5 “2 J@FE9 3692G:@C2= 962=E9 4C:D:D @? DE6C@:5D]”k^Am

    kAm%96 w@FD6 92D ?@E D2:5 H96? :E A=2?D E@ E2<6 FA E96 >62DFC6[ @C 6G6? H96? C6AC6D6?E2E:G6D H:== C6EFC? 7@C D6C:@FD =2H>2<:?8[ 2 E:>6E23=6 E92E ?@H 2AA62CD =:<6=J E@ 72== 27E6C E96 ?6H D49@@= J62C 368:?D]k^Am

    kAm%92E F?46CE2:?EJ =62G6D D49@@=D 😕 2 A6C:@5 @7 7=FI[ H6:89:?8 9@H E@ :?E68C2E6 6>6C8:?8 px E@@=D 6G6? 2D =2H>2<6CD 4@?D:56C AF==:?8 324< @? @E96C 7@C>D @7 DEF56?E E649?@=@8J FD6]k^Am

    [ad_2]

    By Sam Drysdale | State House News Service

    Source link

  • First Erik Menendez, then Lyle denied parole by California board that says they pose safety risk

    [ad_1]

    LOS ANGELES — Lyle Menendez was denied parole Friday by the same board that a day earlier rejected his brother Erik’s appeal for freedom after serving decades in prison for killing their parents in 1989 at their Beverly Hills mansion. The reason was the same: misbehavior behind bars.

    A panel of two commissioners denied Lyle Menendez parole for three years after a daylong hearing. Commissioners noted the older brother still displayed “anti-social personality traits like deception, minimization and rule-breaking that lie beneath that positive surface.”

    “We do understand that you had very little hope of being released for years,” said commissioner Julie Garland. “Citizens are expected to follow the rules whether or not there is some incentive to do so.”

    She also said the panel found his remorse genuine and that he has been a “model inmate in many ways who has demonstrated the potential for change.”

    “Don’t ever not have hope,” she told Menendez.

    The brothers were sentenced to life in prison in 1996 for fatally shooting their father, Jose Menendez, and mother, Kitty Menendez, in their Beverly Hills mansion almost exactly 36 years ago on Aug. 20, 1989. While defense attorneys argued that the brothers acted out of self-defense after years of sexual abuse by their father, prosecutors said the brothers sought a multimillion-dollar inheritance.

    A judge reduced their sentences in May, and they became immediately eligible for parole. The parole hearings marked the closest they have come to winning freedom since their convictions almost 30 years ago.

    Erik Menendez, who is being held at the same prison in San Diego, was denied parole Thursday after commissioners determined his misbehavior in prison made him still a risk to public safety.

    A day later, Lyle Menendez told the parole board details about the abuse he suffered under his parents. He cried, face reddened, while delivering his closing statement. He seemed to still want to protect his “baby brother,” telling commissioners he took sole responsibility for the murders.

    “I will never be able to make up for the harm and grief I caused everyone in my family,” he said. “I am so sorry to everyone, and I will be forever sorry.”

    The state corrections department chose a single reporter to watch the videoconference and share details with the rest of the press.

    The panel began by asking how abuse impacted decision-making in his life.

    The older brother described how his father physically abused him by choking, punching and hurting him using a belt.

    “I was the special son in my family. My brother was the castaway,” he said. “The physical abuse was focused on me because I was more important to him, I felt.”

    He also said his mother also sexually abused him. He appeared uncomfortable discussing this with the panel, who asked why he didn’t disclose his mother’s abuse in a risk assessment conducted earlier this year.

    Commissioners asked if one death made him more sorrowful than the other.

    “My mother. Because I loved her and couldn’t imagine harming her in any way,” he said. “I think also I learned a lot after about her life, her childhood, reflecting on how much fear maybe she felt.”

    Later, he broke down in tears when recounting how they confronted their mother about Jose Menendez’s abuse of his younger brother.

    “I couldn’t wrap my mind around the fact that she knew,” he said.

    Lyle Menendez’s parole lawyer, Heidi Rummel, was more outspoken during his hearing than the one for Erik Menendez on Thursday.

    She quarreled with the commissioners over several lines of questioning and whether the panel had access to trial evidence in the case.

    The panel asked Lyle Menendez whether the murders were planned, and about the brothers buying guns.

    “There was zero planning. There was no way to know it was going to happen Sunday,” he said, referring to buying the guns as “the biggest mistake.”

    “I no longer believe that they were going to kill us in that moment,” he said. “At the time, I had that honest belief.”

    Garland asked him about the “sophistication of the web of lies and manipulation you demonstrated afterward,” referring to having witnesses lie for them in court — and attempts to destroy his father’s will.

    Menendez maintained that there was no plan, only that he was “flailing in what was happening” and didn’t want to go to prison and be separated from his brother.

    In closing, Rummel expressed frustration that the hearing spent almost no time on Menendez’s achievements in prison or his efforts to build positive relationships with correctional staff. She noted he never touched drugs or alcohol inside.

    “How many people with an LWOP sentence come in front of this board with zero violence, despite getting attacked, getting bullied, and choose to do something different?” she said.

    More than a dozen of their relatives attended Friday’s hearing via videoconference, but many did not testify citing privacy concerns after learning audio from Erik Menendez’s hearing Thursday was published online.

    “I want my nephew to hear how much I love him, and believe in him,” said his aunt, Teresita Menendez-Baralt. “I’m very proud of him and I want him to come home.”

    Similar to his brother’s hearing the day before, the panel zeroed in on Menendez’s use of cellphones in prison as recent as March 2025.

    “I had convinced myself that this wasn’t a means that was harming anyone but myself in a rule violation,” Menendez said.

    He said correctional staff were monitoring his communications with his wife and family and selling them to tabloids, so he saw cellphones as a way to protect his privacy. There was “a lot of stress in his marriage” around the time he transferred to the prison in San Diego, and he wanted to stay in close touch with his wife, he said.

    Commissioner Patrick Reardon applauded him for starting a prison beautification project and mentorship programs. However, he questioned if the cellphone violations tainted those accomplishments.

    “I would never call myself a model incarcerated person,” Menendez said. “I would say that I’m a good person, that I spent my time helping people. … I’m the guy that officers will come to to resolve conflicts.”

    The panel noted that a psychologist found that Menendez is at “very low” risk for violence upon release.

    According to previous court documents, Menendez has not gotten into any fights in his time in prison. He said nonviolence was a promise he made to his grandmother.

    “My life has been defined by extreme violence,” he said. “I wanted to be defined by something else.”

    The brothers still have a pending habeas corpus petition filed in May 2023 seeking a review of their convictions based on new evidence supporting their claims of sexual abuse by their father.

    [ad_2]

    Source link