ReportWire

Tag: Privacy

  • OpenAI admits AI browsers face unsolvable prompt attacks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals don’t always need malware or exploits to break into systems anymore. Sometimes, they just need the right words in the right place. OpenAI is now openly acknowledging that reality. The company says prompt injection attacks against artificial intelligence (AI)-powered browsers are not a bug that can be fully patched, but a long-term risk that comes with letting AI agents roam the open web. This raises uncomfortable questions about how safe these tools really are, especially as they gain more autonomy and access to your data.

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY

    AI-powered browsers can read and act on web content, which also makes them vulnerable to hidden instructions attackers can slip into pages or documents. (Kurt “CyberGuy” Knutsson)

    Why prompt injection isn’t going away

    In a recent blog post, OpenAI admitted that prompt injection attacks are unlikely to ever be completely eliminated. Prompt injection works by hiding instructions inside web pages, documents or emails in ways that humans don’t notice, but AI agents do. Once the AI reads that content, it can be tricked into following malicious instructions.

    OpenAI compared this problem to scams and social engineering. You can reduce them, but you can’t make them disappear. The company also acknowledged that “agent mode” in its ChatGPT Atlas browser increases risk because it expands the attack surface. The more an AI can do on your behalf, the more damage it can cause when something goes wrong.

    OpenAI launched the ChatGPT Atlas browser in October, and security researchers immediately started testing its limits. Within hours, demos appeared showing that a few carefully placed words inside a Google Doc could influence how the browser behaved. That same day, Brave published its own warning, explaining that indirect prompt injection is a structural problem for AI-powered browsers, including tools like Perplexity’s Comet.

    This isn’t just OpenAI’s problem. Earlier this month, the National Cyber Security Centre in the U.K. warned that prompt injection attacks against generative AI systems may never be fully mitigated.

    FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

    ChatGPT Atlas screen in an auditorium

    Prompt injection attacks exploit trust at scale, allowing malicious instructions to influence what an AI agent does without the user ever seeing it. (Kurt “CyberGuy” Knutsson)

    The risk trade-off with AI browsers

    OpenAI says it views prompt injection as a long-term security challenge that requires constant pressure, not a one-time fix. Its approach relies on faster patch cycles, continuous testing and layered defenses. That puts it broadly in line with rivals like Anthropic and Google, which have both argued that agentic systems need architectural controls and ongoing stress testing.

    Where OpenAI is taking a different approach is with something it calls an “LLM-based automated attacker.” In simple terms, OpenAI trained an AI to act like a hacker. Using reinforcement learning, this attacker bot looks for ways to sneak malicious instructions into an AI agent’s workflow.

    The bot runs attacks in simulation first. It predicts how the target AI would reason, what steps it would take and where it might fail. Based on that feedback, it refines the attack and tries again. Because this system has insight into the AI’s internal decision-making, OpenAI believes it can surface weaknesses faster than real-world attackers.

    Even with these defenses, AI browsers aren’t safe. They combine two things attackers love: autonomy and access. Unlike regular browsers, they don’t just display information, but also read emails, scan documents, click links and take actions on your behalf. That means a single malicious prompt hidden in a webpage, document or message can influence what the AI does without you ever seeing it. Even when safeguards are in place, these agents operate by trusting content at scale, and that trust can be manipulated.

    THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

    Person wearing a hoodie works on multiple computer screens displaying digital data in a dark room.

    As AI browsers gain more autonomy and access to personal data, limiting permissions and keeping human confirmation in the loop becomes critical for safety. (Kurt “CyberGuy” Knutsson)

    7 steps you can take to reduce risk with AI browsers

    You may not be able to eliminate prompt injection attacks, but you can significantly limit their impact by changing how you use AI tools.

    1) Limit what the AI browser can access

    Only give an AI browser access to what it absolutely needs. Avoid connecting your primary email account, cloud storage or payment methods unless there’s a clear reason. The more data an AI can see, the more valuable it becomes to attackers. Limiting access reduces the blast radius if something goes wrong.

    2) Require confirmation for every sensitive action

    Never allow an AI browser to send emails, make purchases or modify account settings without asking you first. Confirmation breaks long attack chains and gives you a moment to spot suspicious behavior. Many prompt injection attacks rely on the AI acting quietly in the background without user review.

    3) Use a password manager for all accounts

    A password manager ensures every account has a unique, strong password. If an AI browser or malicious page leaks one credential, attackers can’t reuse it elsewhere. Many password managers also refuse to autofill on unfamiliar or suspicious sites, which can alert you that something isn’t right before you manually enter anything.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    4) Run strong antivirus software on your device

    Even if an attack starts inside the browser, antivirus software can still detect suspicious scripts, unauthorized system changes or malicious network activity. Strong antivirus software focuses on behavior, not just files, which is critical when dealing with AI-driven or script-based attacks.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    5) Avoid broad or open-ended instructions

    Telling an AI browser to “handle whatever is needed” gives attackers room to manipulate it through hidden prompts. Be specific about what the AI is allowed to do and what it should never do. Narrow instructions make it harder for malicious content to influence the agent.

    6) Be careful with AI summaries and automated scans

    When an AI browser scans emails, documents or web pages for you, remember that hidden instructions can live inside that content. Treat AI-generated actions as drafts or suggestions, not final decisions. Review anything the AI plans to act on before approving it.

    7) Keep your browser, AI tools and operating system updated

    Security fixes for AI browsers evolve quickly as new attack techniques emerge. Delaying updates leaves known weaknesses open longer than necessary. Turning on automatic updates ensures you get protection as soon as they’re available, even if you miss the announcement.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    There’s been a meteoric rise in AI browsers. We’re now seeing them from major tech companies, including OpenAI’s Atlas, The Browser Company’s Dia and Perplexity’s Comet. Even existing browsers like Chrome and Edge are pushing hard to add AI and agentic features into their current infrastructure. While these browsers can be useful, the technology is still early. It’s best not to fall for the hype and to wait for it to mature.

    Do you think AI browsers are worth the risk today, or are they moving faster than security can keep up? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • University of Phoenix data breach hits 3.5M people

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The University of Phoenix has confirmed a major data breach affecting nearly 3.5 million people. The incident traces back to August when attackers accessed the university’s network and quietly stole sensitive information.

    The school detected the intrusion on Nov. 21. That discovery came after the attackers listed the university on a public leak site. In early December, the university disclosed the incident, and its parent company filed an 8-K with regulators.

    The scope is large. Notification letters filed with Maine’s Attorney General show 3,489,274 individuals are impacted. Those affected include current and former students, faculty, staff and suppliers.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    DATA BREACH EXPOSES 400K BANK CUSTOMERS’ INFO

    The University of Phoenix data breach exposed sensitive personal and financial information tied to nearly 3.5 million people. (Kurt “CyberGuy” Knutsson)

    What happened and how attackers got in

    According to the university, hackers exploited a zero-day vulnerability in Oracle E-Business Suite. This application handles financial operations and contains highly sensitive data.

    Based on the technical details shared so far, security researchers believe the attack aligns with tactics used by the Clop ransomware gang. Clop has a long track record of stealing data through zero-day flaws rather than encrypting systems.

    The vulnerability tied to this campaign is tracked as CVE-2025-61882. Investigators say it has been abused since early August.

    What data was exposed

    The university says the attackers accessed highly sensitive personal and financial information. That includes:

    • Full names
    • Contact information
    • Dates of birth
    • Social security numbers
    • Bank account numbers
    • Routing numbers

    This type of data creates a serious risk. It can fuel identity theft, financial fraud, and targeted phishing scams.

    700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

    A hacker uses a laptop in to steal data.

    Stolen University of Phoenix records could be used by criminals to launch targeted phishing and identity theft attacks.  (Kurt “CyberGuy” Knutsson)

    Nearly 3.5 million people impacted

    In letters sent to affected individuals, the university confirmed the breach affects 3,489,274 people. If you are a current or former student or employee, watch your mail closely.

    These notifications often arrive by postal mail, not email. The letter explains what data was exposed and includes instructions for protective services.

    We reached out to The University of Phoenix for comment, and a rep provided CyberGuy with the following statement: 

    “We recently experienced a cybersecurity incident involving the Oracle E-Business Suite software platform. Upon detecting the incident on November 21, 2025, we promptly took steps to investigate and respond with the assistance of leading third-party cybersecurity firms. We are reviewing the impacted data and will provide the required notifications to affected individuals and regulatory entities.”

    Free identity protection is now available

    The University of Phoenix is offering impacted individuals free identity protection services. These include:

    • 12 months of credit monitoring
    • Identity theft recovery assistance
    • Dark web monitoring
    • A $1 million fraud reimbursement policy

    To enroll, you must use the redemption code provided in the notification letter. Without that code, you cannot activate the service.

    This attack fits a larger Clop campaign

    The University of Phoenix breach is not an isolated case. Clop has used similar tactics in past campaigns involving GoAnywhere MFT, Accellion FTA, MOVEit Transfer, Cleo, and Gladinet CentreStack.

    Other universities have also reported Oracle EBS-related incidents. These include Harvard University and the University of Pennsylvania.

    The U.S. government is taking notice. The U.S. Department of State is now offering a reward of up to $10 million for information linking Clop’s attacks to a foreign government.

    Why colleges are prime targets

    Universities store massive amounts of personal data. Student records, financial aid files, payroll systems, and donor databases all live under one roof.

    Like healthcare organizations, colleges present a high-value target. A single breach can expose years of data tied to millions of people.

    MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

    Outsmart hackers who are out to steal your identity

    Affected University of Phoenix students and staff should act quickly to monitor accounts and protect their identities. (Kurt “CyberGuy” Knutsson)

    Steps to stay safe right now

    If you believe you may be affected, act quickly. These steps can reduce your risk.

    1) Watch for your breach notification letter

    Read it carefully. It explains what data was exposed and how to enroll in protection services.

    2) Enroll in the free identity protection

    First, use the redemption code provided. Because social security and banking data are involved, credit monitoring and recovery services matter. Even if you do not qualify for the free service, an identity theft protection service is still a smart move.

    In addition, these services actively monitor sensitive details like your social security number, phone number and email address. If your information appears on the dark web or if someone tries to open a new account, you receive an alert right away. As a result, many services also help you quickly freeze bank and credit card accounts to limit further fraud.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    3) Use a data removal service

    Because this breach exposed names, contact details and other identifiers, reducing what is publicly available about you matters. A data removal service can help remove your personal information from data broker sites, which lowers the risk of targeted phishing or fraud tied to the stolen University of Phoenix records.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Monitor financial accounts daily

    Check bank statements and credit card activity for unfamiliar charges. Report anything suspicious immediately.

    5) Consider freezing your credit

    A credit freeze can stop criminals from opening new accounts in your name. It is free and reversible. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    6) Be alert for phishing attempts and use strong antivirus software 

    Expect more scam emails and phone calls. Criminals may reference the breach to sound legitimate.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    7) Secure your devices

    Keep your operating systems and apps up to date, as attackers often exploit outdated software to gain access. In addition, enable automatic updates and review app permissions to prevent stolen personal data from being combined with device-level access and causing further harm.

    Kurt’s key takeaways

    The University of Phoenix data breach highlights a growing problem across higher education. When attackers exploit trusted enterprise software, the fallout spreads fast and wide. While free identity protection helps, long-term vigilance matters most. Staying alert can limit damage long after the headlines fade.

    If universities cannot protect this level of sensitive data, should students demand stronger cybersecurity standards before enrolling? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Fake AI chat results are spreading dangerous Mac malware

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals have always chased whatever people trust the most. First, it was email. Then search results. Now it’s AI chat answers. Researchers are warning about a new campaign where fake AI conversations are showing up in Google search results and quietly pushing Mac users to install dangerous malware. What makes this especially risky is that everything looks helpful, legitimate and step-by-step, right up until your system is compromised.

    The malware being spread is Atomic macOS Stealer, often called AMOS, and the attacks abuse conversations generated by tools people increasingly rely on for everyday help. Investigators have confirmed that both ChatGPT and Grok were misused as part of this campaign.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

    One copied terminal command is all it takes for malware like AMOS to quietly install itself on a Mac. (Kurt “CyberGuy” Knutsson)

    How fake AI chat results lead to malware

    Researchers traced one infection back to a simple Google search: “clear disk space on macOS.” Instead of landing on a normal help article, the user was shown what looked like an AI conversation result embedded directly in search. That conversation offered clear, confident instructions and ended by telling the user to run a command in the macOS Terminal. That command installed AMOS.

    When researchers followed the same trail, they found multiple poisoned AI conversations appearing for similar searches. That consistency strongly suggests this was a deliberate operation aimed at Mac users searching for routine maintenance help.

    If this feels familiar, it should. A previous campaign used sponsored search results and SEO-poisoned links that pointed to fake macOS software hosted on GitHub. In that case, attackers impersonated legitimate apps and walked users through terminal commands that installed the same AMOS infostealer.

    According to researchers, once the terminal command is executed, the infection chain kicks off immediately. The base64 string in the command decodes into a URL that hosts a malicious bash script. That script is designed to harvest credentials, escalate privileges and establish persistence, all without triggering a visible security warning.

    The danger here is how clean the process looks. There’s no installer window, obvious permission prompt or any option for you to review what’s about to run. Because everything happens through the command line, normal download protections are sidestepped and the attacker gets to execute whatever they want.

    MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

    A fake chatGPT website

    Fake AI chat results can look polished and trustworthy, even when they are designed to trick you into running harmful commands. (Kurt “CyberGuy” Knutsson)

    Why is this attack so effective?

    This campaign combines two powerful ideas. Trust in AI answers and trust in search results. Most major chat tools, including Grok on X, let users delete parts of conversations or share only selected snippets. That means an attacker can carefully curate a short, polished exchange that looks genuinely helpful while hiding the manipulative prompts that produced it.

    Using prompt engineering, attackers get ChatGPT to generate a step-by-step cleanup or installation guide that actually installs malware. ChatGPT’s sharing feature then creates a public link that lives inside the attacker’s account. From there, criminals either pay for sponsored search placement or use SEO tactics to push that shared conversation high in the results.

    Some ads are designed to look almost identical to legitimate links. Unless you check who the advertiser actually is, it’s easy to assume it’s safe. One example documented by researchers showed a sponsored result advertising a fake “Atlas” browser for macOS, complete with professional branding.

    Once those links are live, attackers don’t need to do much else. They wait for users to search, click, trust the AI output and follow the instructions exactly as written.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    An iPhone app screen

    Attackers rely on trust in search results and AI answers, knowing most people will not question step-by-step instructions. (Kurt “CyberGuy” Knutsson)

    8 steps you can take to stay safe from fake AI chat malware

    AI tools are useful, but attackers are now shaping answers that lead you straight into trouble. These steps help you stay protected without giving up search or AI entirely.

    1) Never paste terminal commands from search results or AI chats

    This is the most important rule. If an AI response or webpage tells you to open Terminal and paste a command, stop. Legitimate macOS fixes almost never require you to blindly run scripts copied from the internet. Once you press Enter, you lose visibility into what happens next. Malware like AMOS relies on this moment of trust to bypass normal security checks.

    2) Treat AI instructions as suggestions

    AI chats are not authoritative sources. They can be manipulated through prompt engineering to produce dangerous step-by-step guides that look clean and confident. Before acting on any AI-generated fix, cross-check it with Apple’s official documentation or a trusted developer site. If you cannot verify it easily, do not run it.

    3) Use a password manager to limit the damage

    A password manager creates strong, unique passwords for every account you use. If malware steals one password, it cannot unlock everything else. Many password managers also refuse to autofill credentials on fake or unfamiliar sites, which can alert you that something is wrong before you type anything manually. This single tool dramatically reduces the impact of credential-stealing malware.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com 

    4) Keep macOS and browsers fully updated

    AMOS and similar malware often rely on known weaknesses after the initial infection. Updates patch these holes. Delaying updates gives attackers more room to escalate privileges or maintain persistence. Turn on automatic updates so you are protected even if you forget.

    5) Use a strong antivirus software on macOS

    Modern macOS malware often runs through scripts and memory-only techniques. A strong antivirus software doesn’t just scan files. It monitors behavior, flags suspicious scripts, and can stop malicious activity even when nothing obvious is downloaded. This is especially important when malware is delivered through Terminal commands.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    6) Be skeptical of sponsored search results

    Paid search ads can look almost identical to legitimate results. Always check who the advertiser is before clicking. If a sponsored result leads to an AI conversation, a download or instructions to run commands, close it immediately.

    7) Avoid “cleanup” and “installer” guides from unknown sources

    Search results promising quick fixes, disk cleanup or performance boosts are common malware entry points. If a guide is not hosted by Apple or a well-known developer, assume it could be risky, especially if it pushes command-line solutions.

    8) Slow down when instructions look unusually polished

    Attackers spend time making fake AI conversations look helpful and professional. Clear formatting and confident language are not signs of safety. They are often part of the deception. Slowing down and questioning the source is usually enough to break the attack chain.

    Kurt’s key takeaway

    This campaign shows how attackers are shifting from breaking systems to manipulating trust. Fake AI conversations work because they sound calm, helpful and authoritative. When those conversations are boosted through search results, they inherit credibility they don’t deserve. The technical tricks behind AMOS are complex, but the entry point is simple. Someone follows instructions without questioning where they came from.

    Have you ever followed an AI-generated fix without double-checking it first? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 10 simple cybersecurity resolutions for a safer 2026

    [ad_1]

    NEWYou can now listen to Fox News articles!

    We could not let 2025 end without one last reminder about digital safety. Cybercriminals never slow down. In fact, the holidays and the start of a new year often bring a surge in scams, account takeovers and data theft. The good news is that cybersecurity need not feel overwhelming. You do not need advanced skills or expensive tools. With a few smart habits, you can lower your risk and protect your digital life throughout 2026. To help you start the year strong, here are 10 simple cybersecurity resolutions that actually work.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    AMERICA’S MOST-USED PASSWORD IN 2025 REVEALED

    Strong passwords and two-factor authentication stop most account takeovers before they start. (Peter Steffen/picture alliance)

    1) Start the year with strong passwords

    Passwords remain your first line of defense. Weak or reused passwords make it easy for attackers to break into multiple accounts at once. Use a unique password for every account. Longer passphrases work better than short, complex strings. A reputable password manager can generate and securely store passwords, so you do not have to memorize them. One rule matters most. Never reuse passwords.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Enable two-factor authentication (2FA) everywhere

    Two-factor authentication (2FA) adds a second step after your password. This usually includes a code from an app or a physical security key. Even if someone steals your password, 2FA can block access. App-based authenticators provide stronger protection than text messages. Turn it on for email, banking, social media and shopping accounts first.

    3) Audit your digital presence

    Old accounts create new risks. Take time to review shopping sites, forums, apps and subscriptions you no longer use. Delete what you do not need. Update privacy settings on what you keep. Share less personal information whenever possible, especially birthdays, locations and phone numbers. A smaller digital footprint limits abuse.

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    Simple habits like updating software and thinking before you click block common scams.

    Simple habits like updating software and thinking before you click block common scams. (Kurt “CyberGuy” Knutsson)

    4) Keep software and devices up to date

    Security updates fix real vulnerabilities that attackers actively exploit. Skipping updates leaves doors open. Enable automatic updates for operating systems, browsers, apps, routers and smart devices. This habit blocks many common attacks without extra effort. Outdated software remains one of the top causes of successful hacks.

    5) Use a personal data removal service

    Your personal information appears on hundreds of data broker sites. These sites collect names, addresses, phone numbers and relatives, then sell access to anyone willing to pay. A personal data removal service helps locate and remove that information. This step reduces scam attempts, phishing messages and identity fraud risks throughout the year. Less exposed data means fewer threats.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    6) Consider identity theft protection

    Identity theft often starts quietly. A breach happens. Data leaks. Fraud follows months later. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Many services can also scan for accounts tied to multiple email addresses, making cleanup easier. Early alerts help you act before damage spreads.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS

    laptop keyboard

    Backups, secure Wi-Fi and identity monitoring help limit damage when breaches happen. (Kurt “CyberGuy” Knutsson)

    7) Think before you click and use strong antivirus protection

    Most cyberattacks still begin with a click. Fake shipping notices, refund alerts and urgent messages push people to act fast. Pause before clicking links or opening attachments. Many scams now use AI to generate realistic messages, fake voices and convincing images, making it even more important to pause before you click. Verify messages through official websites or apps instead. Strong antivirus software adds another layer of protection by blocking malware, ransomware and malicious downloads across your devices, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    8) Secure your home Wi-Fi network

    Your Wi-Fi network connects everything. That makes it a valuable target. Change the default router password right away. Enable WPA3 encryption if your router supports it. Keep router firmware up to date and avoid sharing your network with unknown devices. A secure network protects every connected device.

    9) Back up your data regularly

    Backups protect you from ransomware, hardware failure and accidental deletion. Many people still skip them. Use cloud backups, an external hard drive or both. Automate the process so it runs without reminders. If something goes wrong, backups let you recover quickly.

    10) Freeze your credit if you do not need it

    A credit freeze prevents new accounts from opening in your name. It remains one of the strongest defenses against identity fraud heading into 2026. Freezing credit is free and reversible. You can temporarily lift it when applying for loans or credit cards. This single step blocks many identity crimes outright. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.”

    Pro tip: Lock down your email and use aliases

    Your email account controls password resets, alerts and account recovery. If attackers get in, they can reach nearly everything else. Secure your primary email with a long, unique password and two-factor authentication. Then create email aliases for shopping, subscriptions and sign-ups. Aliases limit exposure when a company suffers a data breach and make phishing easier to spot. Protecting email this way strengthens every other cybersecurity resolution.

    By creating email aliases, you can protect your information and reduce spam. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com.

    Kurt’s key takeaways

    A safer digital life starts with small, consistent decisions. Strong passwords, updates, backups and awareness go a long way. By committing to these cybersecurity resolutions, you set yourself up for a more secure 2026. You also make it harder for criminals to profit from stolen data. There is no better time to start than now.

    Which of these cybersecurity habits are you still delaying, and what would it take to address them today? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Microsoft typosquatting scam swaps letters to steal logins

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new phishing campaign is exploiting a visual trick that is easy to miss and hard to unsee once you know it. Attackers are using the domain rnicrosoft.com to impersonate Microsoft and steal login credentials. The trick is simple. Instead of the letter m, scammers place r and n side by side. In many fonts, those letters blur together and look almost identical to an m at a quick glance.

    Security experts are sounding the alarm because this tactic works. These emails closely copy Microsoft branding, layout and tone, which makes them feel familiar and trustworthy. That false sense of legitimacy is often all it takes to get a quick click before you realize something is wrong.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    MOST PARKED DOMAINS NOW PUSH SCAMS AND MALWARE

    Cybersecurity experts warn of a new phishing scam that uses the fake domain rnicrosoft.com to mimic Microsoft and steal login credentials. (Photo by Oliver Berg/picture alliance via Getty Images)

    Why your brain falls for the rn trick

    This attack relies on how people read. Your brain predicts words instead of scanning each letter. When something looks familiar, you fill in the gaps automatically. On a large desktop monitor, a careful reader might spot the flaw. On a phone, the risk jumps. The address bar often shortens URLs, and the screen leaves little room for close inspection. That is exactly where attackers want you. Once trust is established, you are more likely to enter passwords, approve fake invoices or download harmful attachments.

    Common typosquatting variations to watch for

    Attackers rarely rely on a single trick. They mix several visual deceptions to increase their odds.

    Letter combinations

    rnicrosoft.com
    Uses r and n together to mimic m

    Number swapping

    micros0ft.com
    Replaces the letter o with the number 0

    Hyphenation

    microsoft-support.com
    Adds official-sounding words to look legitimate

    TLD switching

    microsoft.co
    Uses a different domain ending to appear real

    What attackers do after you click

    Typosquatting domains like rnicrosoft.com are rarely used for a single purpose. Criminals reuse them across multiple scams. Common follow-ups include credential phishing, fake HR notices and vendor payment requests. In every case, the attacker benefits from speed. The faster you act, the less likely you are to notice the mistake.

    Why these fake domains keep working

    Most people do not slow down to read URLs character by character. Familiar logos and language reinforce trust, especially during a busy workday. Mobile use makes this worse. Smaller screens, shortened links and constant notifications create perfect conditions for mistakes. This is not a Microsoft-only problem. Banks, retailers, healthcare portals and government services all face the same risk.

    How to stay safe from typosquatting attacks

    Typosquatting scams work because they rush you into trusting what looks familiar. These steps slow that moment down and help you spot fake domains before damage is done.

    1) Expand the full sender address every time

    Before clicking anything, open the full sender address in the email header. Display names and logos are easy to fake, but domains tell the real story. Look closely for swapped letters like rn in place of m, added hyphens or strange domain endings. If the address feels even slightly off, treat the message as hostile.

    NETFLIX SUSPENSION SCAM TARGETS YOUR INBOX

    Scammer typing on his laptop.

    Scammers are replacing the letter “m” with “rn” in web addresses, a subtle trick that can fool users at a quick glance. (Photo By Paul Chinn/The San Francisco Chronicle via Getty Images)

    2) Preview links before you click

    On a desktop, hover your mouse over links to reveal the real destination. On a phone, long-press the link to preview the URL. This simple pause often exposes lookalike domains designed to steal logins. If the link does not match the exact site you expect, do not proceed.

    3) Avoid email links for password or security alerts

    When an email claims your account needs urgent action, do not use its links. Instead, open a new browser tab and manually go to the official website using a saved bookmark. Legitimate companies do not require you to act through surprise links, and this habit cuts off most typosquatting attempts instantly.

    4) Use strong antivirus software for added protection

    Strong antivirus software can block known phishing domains, flag malicious downloads and warn you before you enter credentials on risky sites. While it cannot catch every new typo trick, it adds an important safety net when human attention slips.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    5) Check the Reply To field for hidden red flags

    Even if the sender’s address looks correct, inspect the Reply To field. Many phishing campaigns route replies to external inboxes that have nothing to do with the real company. A mismatch here is a strong signal that the message is a scam.

    HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

    Person using their computer.

    A typosquatting campaign targeting Microsoft users highlights how small visual changes in URLs can lead to major security risks. (Photo by THOMAS SAMSON / AFP) (Photo by THOMAS SAMSON/AFP via Getty Images)

    6) Consider a data removal service to reduce targeting

    Typosquatting attacks often begin with leaked or scraped contact details. A data removal service can help remove your personal information from data broker sites, reducing the number of scam emails and targeted phishing attempts that reach your inbox.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Rely on saved bookmarks for critical accounts

    For email, banking and work portals, use bookmarks you created yourself. This eliminates the risk of mistyping addresses or trusting links in messages. It is one of the simplest and most effective defenses against lookalike domain attacks.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Typosquatting works because it targets human behavior, not software flaws. A single swapped character can bypass filters and fool smart people in seconds. Knowing these tricks slows attackers down and gives you back control. Awareness turns a sophisticated scam into an obvious fake.

    If a single letter can decide whether you get hacked, how closely are you really reading the links you trust every day? Let us know by writing to us at Cyberguy.com. 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 700Credit data breach exposes SSNs of 5.8M consumers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Data breaches tied to financial services companies are no longer rare, but they still hit harder when Social Security numbers are involved. In the latest incident, U.S.-based fintech company 700Credit has confirmed that the personal data of more than 5.8 million people was exposed. The breach did not originate from a direct compromise of 700Credit’s internal network, which makes it more concerning. It began with a third-party integration partner and quietly snowballed over several months before it was detected. By the time the issue was contained, hackers had managed to steal a significant amount of sensitive consumer data.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    DATA BREACH EXPOSES 400K BANK CUSTOMERS’ INFO

    A data breach at fintech firm 700Credit exposed the personal information of more than 5.8 million people after hackers accessed data through a third-party vendor. (Photo by Philip Dulian/picture alliance via Getty Images)

    What went wrong at 700Credit

    The company says the breach traces back to July, when a threat actor compromised one of its third-party integration partners, as reported by Bleeping Computer. During that intrusion, the attacker discovered an exposed API that could be used to access customer information linked to 700Credit’s dealership clients. The integration partner failed to inform 700Credit about the compromise, allowing the access to continue unnoticed.

    Suspicious activity was only detected on October 25, when 700Credit flagged unusual behavior on its systems and launched an internal investigation. The company says it brought in third-party computer forensic specialists to assess the scope of the incident and determine what data had been affected.

    According to the company’s findings, certain records within its web application were copied without authorization. These records are related to customers of auto dealerships that use 700Credit’s services. Managing Director Ken Hill later confirmed that roughly 20% of the consumer data accessible through the affected system was stolen between May and October.

    What data was exposed and why it matters

    While 700Credit has not published an exhaustive list of every data field involved, the company has confirmed that highly sensitive personal information was exposed. This includes Social Security numbers, which significantly raises the risk of identity theft and financial fraud. When SSNs are compromised, the impact is long-term. You cannot simply change them like a password.

    The company has published a dedicated page on its website outlining the breach and the types of information impacted. As part of its response, 700Credit is offering affected individuals 12 months of free identity protection and credit monitoring through TransUnion. You have a 90-day window to enroll in this service after receiving the notification.

    Notably, audio streaming platform SoundCloud and adult video sharing platform Pornhub also suffered data breaches tied to third-party vendors. There is no indication that the same vendor was involved in all three incidents, but the cases highlight how risky third-party access can be when vendors handle sensitive consumer data.

    CyberGuy reached out to 700Credit for comment but did not receive a response before publication.

    PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH

    Person on their smartphone.

    Social Security numbers were among the sensitive data stolen in a monthslong breach involving 700Credit and an outside integration partner. (Photo by Matt Cardy/Getty Images)

    6 steps you can take to stay safe after a data breach

    When breaches like this happen, the damage is not always immediate. Your data can sit in underground markets for months before it is abused. That is why it helps to lock things down early. Here are six practical steps you can take.

    1) Use strong antivirus software 

    A good antivirus helps block malicious downloads, phishing links and spyware that often follow large data leaks. Attackers know your details are exposed and may try to target you directly with malware-based scams.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    2) Switch to a password manager

    If you are still reusing passwords, this is the time to stop. A password manager helps you generate strong, unique passwords for every service and keeps them stored securely. If one site is breached, the rest of your accounts stay protected.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Enable two-factor authentication everywhere

    Turn on 2FA for email, banking, social media and cloud accounts. Even if someone has your password, they cannot log in without the second factor. App-based authenticators are more secure than SMS, where possible.

    4) Sign up for identity theft and credit monitoring

    Monitoring services alert you when new accounts, loans or credit checks appear in your name. Early alerts give you a chance to act before serious financial damage is done.

    Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    PETCO CONFIRMS MAJOR DATA BREACH INVOLVING CUSTOMER DATA

    Photo of a phone with malware.

    Hackers quietly accessed consumer data tied to auto dealerships using 700Credit services before the breach was discovered in October. (Photo by Jaque Silva/NurPhoto via Getty Images)

    5) Consider a personal data removal service

    Your phone number, address and other details are often already scattered across data broker sites. Data removal services help reduce your digital footprint, making it harder for attackers to profile and target you after a breach.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Freeze your credit if SSNs are exposed

    If your Social Security number is involved, a credit freeze is one of the strongest defenses. It prevents new credit accounts from being opened without your approval and can be lifted temporarily when needed. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.”

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Third-party APIs and integrations are essential for modern digital services, but they also expand the attack surface. When third-party partners fail to disclose breaches quickly, the downstream impact can be massive, as this case shows. If you receive a notification from 700Credit, take it seriously. Enroll in the credit monitoring service, review your credit reports, and consider locking them down. Even if no fraud has occurred yet, breaches involving SSNs often lead to delayed abuse months or even years later.

    Should companies be held accountable when a third-party vendor exposes customer information? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    [ad_2]

    Source link

  • You’ve been targeted by government spyware. Now what? | TechCrunch

    [ad_1]

    It was a normal day when Jay Gibson got an unexpected notification on his iPhone. “Apple detected a targeted mercenary spyware attack against your iPhone,” the message read.

    Ironically, Gibson used to work at companies that developed exactly the kind of spyware that could trigger such a notification. Still, he was shocked that he received a notification on his own phone. He called his father, turned off and put his phone away, and went to buy a new one.

    “I was panicking,” he told TechCrunch. “It was a mess. It was a huge mess.”  

    Gibson is just one of an ever-increasing number of people who are receiving notifications from companies like Apple, Google, and WhatsApp, all of which send similar warnings about spyware attacks to their users. Tech companies are increasingly proactive in alerting their users when they become targets of government hackers, and in particular those who use spyware made by companies such as Intellexa, NSO Group, and Paragon Solutions.

    But while Apple, Google, and WhatsApp alert, they don’t get involved in what happens next. The tech companies direct their users to people who could help, but at which point the companies step away.

    This is what happens when you receive one of these warnings. 

    Warning 

    You have received a notification that you were the target of government hackers. Now what? 

    First of all, take it seriously. These companies have reams of telemetry data about their users and what happens on both their devices and their online accounts. These tech giants have security teams that have been hunting, studying, and analyzing this type of malicious activity for years. If they think you have been targeted, they are probably right. 

    It’s important to note that in the case of Apple and WhatsApp notifications, receiving one doesn’t mean you were necessarily hacked. It’s possible that the hacking attempt failed, but they can still tell you that someone tried. 

    A photo showing the text of a threat notification sent by Apple to a suspected spyware victim (Image: Omar Marques/Getty Images)

    In the case of Google, it’s most likely that the company blocked the attack, and is telling you so you can go into your account and make sure you have multi-factor authentication on (ideally a physical security key or passkey), and also turn on its Advanced Protection Program, which also requires a security key and adds other layers of security to your Google account. In other words, Google will tell you how to better protect yourself in the future. 

    In the Apple ecosystem, you should turn on Lockdown Mode, which switches on a series of security features that makes it more difficult for hackers to target your Apple devices. Apple has long claimed that it has never seen a successful hack against a user with Lockdown Mode enabled, but no system is perfect. 

    Mohammed Al-Maskati, the director of Access Now’s Digital Security Helpline, a 24/7 global team of security experts who investigate spyware cases against members of civil society, shared with TechCrunch the advice that the helpline gives people who are concerned that they may be targeted with government spyware.

    This advice includes keeping your devices’ operating systems and apps up-to-date; switching on Apple’s Lockdown Mode, and Google’s Advanced Protection for accounts and for Android devices; be careful with suspicious links and attachments; to restart your phone regularly; and to pay attention to changes in how your device functions.

    Contact Us

    Have you received a notification from Apple, Google, or WhatsApp about being targeted with spyware? Or do you have information about spyware makers? We would love to hear from you. From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.

    Reaching out for help

    What happens next depends on who you are. 

    There are open source and downloadable tools that anyone can use to detect suspected spyware attacks on their devices, which requires a little technical knowledge. You can use the Mobile Verification Toolkit, or MVT, a tool that lets you look for forensic traces of an attack on your own, perhaps as a first step before looking for assistance. 

    If you don’t want or can’t use MVT, you can go straight to someone who can help. If you are a journalist, dissident, academic, or human rights activist, there are a handful of organizations that can help. 

    You can turn to Access Now and its Digital Security Helpline. You can also contact Amnesty International, which has its own team of investigators and ample experience in these cases. Or, you can reach out to The Citizen Lab, a digital rights group at the University of Toronto, which has been investigating spyware abuses for almost 15 years. 

    If you are a journalist, Reporters Without Borders also has a digital security lab that offers to investigate suspected cases of hacking and surveillance. 

    Outside of these categories of people, politicians or business executives, for example, will have to go elsewhere. 

    If you work for a large company or political party, you likely have a competent (hopefully!) security team you can go straight to. They may not have the specific knowledge to investigate in-depth, but in that case they probably know who to turn to, even if Access Now, Amnesty, and Citizen Lab cannot help those outside of civil society. 

    Otherwise, there aren’t many places executives or politicians you can turn to, but we have asked around and found the ones below. We can’t fully vouch for any of these organizations, nor do we endorse them directly, but based on suggestions from people we trust, it’s worth pointing them out. 

    Perhaps the most well known of these private security companies is iVerify, which makes an app for Android and iOS, and also gives users an option to ask for an in-depth forensic investigation. 

    Matt Mitchell, a well-regarded security expert who’s been helping vulnerable populations protect themselves from surveillance has a new startup, called Safety Sync Group, which offers this kind of service. 

    Jessica Hyde, a forensic investigator with experience in the public and private sectors, has her own startup called Hexordia, and offers to investigate suspected hacks. 

    Mobile cybersecurity company Lookout, which has experience analyzing government spyware from around the world, has an online form that allows people to reach out for help to investigate cyberattacks involving malware, device compromise, and more. The company’s threat intelligence and forensics teams may then get involved.  

    Then, there’s Costin Raiu, who heads TLPBLACK, a small team of security researchers who used to work at Kaspersky’s Global Research and Analysis Group, or GReAT. Raiu was the unit’s head when his team discovered sophisticated cyberattacks from elite government hacking teams from the United States, Russia, Iran, and other countries. Raiu told TechCrunch that people who suspect they’ve been hacked can email him directly.

    Investigation

    What happens next depends on who you go to for help. 

    Generally speaking, the organization you reach out to may want to do an initial forensic check by looking at a diagnostic report file that you can create on your device, which you can share with the investigators remotely. At this point, this doesn’t require you to hand over your device to anyone. 

    This first step may be able to detect signs of targeting or even infection. It may also turn out nothing. In both cases, the investigators may want to dig deeper, which will require you to send in a full backup of your device, or even your actual device. At that point, the investigators will do their work, which may take time because modern government spyware attempts to hide and delete its tracks, and will tell you what happened. 

    Unfortunately, modern spyware may not leave any traces. The modus operandi these days, according to Hassan Selmi, who leads the incident response team at Access Now’s Digital Security Helpline, is a “smash and grab” strategy, meaning that once spyware infects the target device, it steals as much data as it can, and then tries to remove any trace and uninstall itself. This is assumed as the spyware makers trying to protect their product and hide its activity from investigators and researchers.  

    If you are a journalist, a dissident, an academic, a human rights activist, the groups who help you may ask if you want to publicize the fact that you were attacked, but you’re not required to do so. They will be happy to help you without taking public credit for it. There may be good reasons to come out, though: To denounce the fact that a government targeted you, which may have the side effect of warning others like you of the dangers of spyware; or to expose a spyware company by showing that their customers are abusing their technology. 

    We hope you never get one of these notifications. But we also hope that, if you do, you find this guide useful. Stay safe out there.

    [ad_2]

    Lorenzo Franceschi-Bicchierai

    Source link

  • Pornhub hit by massive user data leak exposing 200 million records

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Pornhub is dealing with fresh fallout after the hacking group ShinyHunters claimed responsibility for a massive user data leak. The group says it stole 94GB of data tied to more than 200 million records and is now attempting to extort the company for a Bitcoin ransom.

    According to reporting from BleepingComputer, the hackers say they will publish the data if their demands are not met. Pornhub has acknowledged the situation but maintains its core systems were not breached.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    DATA BREACH EXPOSES 400K BANK CUSTOMERS’ INFO

    Pornhub is facing new fallout after hackers claimed to steal millions of user records tied to Premium accounts. The group is threatening to release sensitive activity data unless paid in Bitcoin. (Philip Dulian/picture alliance via Getty Images)

    What data ShinyHunters claims to have stolen

    ShinyHunters says the exposed data focuses on Pornhub Premium users. While no financial information was included, the dataset still contains highly sensitive activity details.

    The group claims the stolen records include:

    • Email addresses
    • Activity type
    • Location
    • Video URLs and video names
    • Keywords linked to videos
    • Timestamps showing when the activity occurred

    Activity logs reportedly show whether a user watched or downloaded a video or viewed a channel. Search histories are also included, which raises serious privacy concerns if the data is released publicly.

    How Mixpanel is connected to the breach

    The alleged breach appears linked to a separate November security incident involving Mixpanel, a data analytics vendor that previously worked with Pornhub. That earlier breach occurred after a smishing attack gave threat actors access to Mixpanel systems. However, Mixpanel says it does not believe Pornhub data came from that incident. The company stated it found no evidence that the data was taken during its November 2025 breach. Pornhub has also clarified that it stopped working with Mixpanel in 2021. That means the stolen data would be several years old. Reuters contacted some Pornhub customers to verify the claims. Those users confirmed the data tied to their accounts was accurate but outdated, which aligns with the Mixpanel timeline.

    What Pornhub says was not exposed

    Pornhub moved quickly to reassure users following the reports. In a security notice, the company said:

    “This was not a breach of Pornhub Premium’s systems. Passwords, payment details and financial information remain secure and were not exposed.”

    That distinction reduces the immediate risk of financial fraud. However, exposure of viewing habits and search activity still carries long-term privacy risks. We reached out to Pornhub for a comment, but did not hear back before our deadline.

    Why ShinyHunters remains a serious threat

    ShinyHunters has been linked to some of the most disruptive data breaches this year. The group relies heavily on social engineering tactics such as phishing and smishing to gain access to corporate systems. Once inside, the group typically steals large datasets and uses extortion threats to pressure companies into paying ransoms. This strategy has affected businesses and users worldwide.

    PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH

    Person typing on their laptop.

    A hacking group says it obtained years-old Pornhub Premium user data, including viewing activity and search history. Pornhub says its core systems were not breached. (Donato Fasano/Getty Images)

    Pornhub warns Premium members about direct contact from hackers

    Pornhub has updated its online statement to warn Premium members about possible direct contact from cybercriminals. In cases involving adult platforms, this type of outreach often escalates into sextortion attempts, where criminals threaten to expose private activity unless victims pay.

    “We are aware that the individuals responsible for this incident have threatened to contact impacted Pornhub Premium users directly. You may therefore receive emails claiming they have your personal information. As a reminder, we will never ask for your password or payment information by email.”

    Pornhub remains one of the world’s most visited adult video platforms. People can view content anonymously or create accounts to upload and interact with videos. 

    PETCO CONFIRMS MAJOR DATA BREACH INVOLVING CUSTOMER DATA

    Hacker on his laptop.

    ShinyHunters claims responsibility for a massive Pornhub data leak involving alleged user activity records. The company says passwords and payment details remain secure. (Morteza Nikoubazl/NurPhoto via Getty Images)

    Ways to stay safe after a data breach

    Even if the data is several years old, users should take this opportunity to strengthen their digital security.

    1) Change your passwords

    Start by updating your Pornhub password. Next, change the password for any email or payment account linked to it. Using a password manager makes it easier to create and store strong, unique passwords.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    2) Stay alert for phishing attempts and install strong antivirus software 

    Data breaches often lead to follow-up scams. Be cautious of emails, texts or phone calls that reference Pornhub or account issues. Avoid clicking links, downloading attachments or sharing personal information unless you can verify the source. Installing a strong antivirus program adds another layer of defense against malicious links and downloads.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    3) Use a data removal service to limit future exposure

    Data removal services work to remove your personal information from data broker websites that collect and sell details such as email addresses, locations and online identifiers. If leaked data from this breach is shared, resold or cross-referenced with broker databases, removing your information can make it much harder for scammers to connect it to you.

    This step is especially important after high-profile breaches involving activity data. Shrinking what is publicly available about you reduces the risk of targeted phishing, impersonation and long-term privacy harm.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Consider identity theft protection

    Identity Theft companies can monitor personal information such as your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or used to open an account. Early warnings can help limit damage if your data surfaces. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    5) Add extra privacy protection with a VPN

    A VPN helps protect your browsing activity by masking your IP address and encrypting your internet traffic. That is especially relevant in breaches like this one, where exposed activity data may include location signals or usage patterns. While a VPN cannot erase past exposure, it reduces how much new information is visible going forward and makes it harder to link future activity back to you. Using a VPN consistently can also limit tracking across sites, which helps lower your overall digital footprint after a breach.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com

     CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    The Pornhub massive data leak highlights how long stored user information can remain a risk. While passwords and payment details were not exposed, activity data can still be damaging if released. ShinyHunters has shown it is willing to apply pressure through public threats. As a result, you should stay vigilant and proactive about your online security.

    Should companies be allowed to store years of user activity data once it is no longer needed? Let us know by writing to us at Cyberguy.com
     

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • New iPhone scam tricks owners into giving phones away

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Getting a brand-new iPhone should be a moment you enjoy. You open the box. You power it on. Everything feels secure. Unfortunately, scammers know that moment too. 

    Over the past few weeks, we’ve heard from a number of people who received unexpected phone calls shortly after activating a new iPhone. The callers claimed to be from a major carrier. They said a shipping mistake was made. They insisted the phone needed to be returned right away. One message stood out because it shows exactly how convincing and aggressive this scam can be.

    “Somebody called me (the call said it was from Spectrum) and told me they sent the wrong iPhone and needed to replace it. I was to rip off the label on the box, tape it up and set it on my porch steps. FedEx was going to pick it up and they’d put a label on it. And just for my trouble, he’d send me a $100 gift card! However, the guy was just too anxious. He called me again at 7 am to make sure I would follow his instructions. Right after that, I picked up my box on the steps and called Spectrum, who confirmed it was a scam. There are no such things as refurbished i17 phones because they’re brand new. I called the guy back, said a few choice words and hung up on him. Since then, they have called at least twice for the same thing. Spectrum should be warning its customers!”

    — Kris L, Columbus, Montana

    That second early morning call was the giveaway. Pressure is the scammer’s favorite tool.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

    Scammers often strike right after a new iPhone purchase, using urgency and fake carrier calls to catch you off guard before you have time to verify. (Kurt “CyberGuy” Knutsson)

    How the new iPhone replacement scam works

    This scam relies on timing and pressure. First, criminals focus on people who recently bought a new iPhone. That information often comes from data-broker sites, leaked purchase data or marketing lists sold online. Next, scammers spoof a carrier phone number. As a result, the call appears legitimate. They sound confident and informed because they already know the device model you ordered.

    Once the call begins, the story moves quickly. The scammer claims a shipping mistake occurred. Then they insist the phone must be returned right away. To reinforce urgency, they say a courier is already scheduled. If you follow the instructions, you hand over a brand-new iPhone. At that point, the device is gone. The scammer either resells it or strips it for parts. By the time you realize something is wrong, recovery is unlikely.

    Why this scam feels so believable

    This scam copies real customer service processes. Carriers do ship replacement phones. FedEx does handle returns. Gift cards are often used as apologies. Scammers blend those facts together and add urgency. They count on you acting before you verify. They also rely on one risky assumption, that a phone call that looks real must be real.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    iphone

    By spoofing trusted phone numbers and knowing details about your device, criminals make these calls feel real enough to push you into acting fast. (Kurt “CyberGuy” Knutsson)

    Red flags that give this scam away

    Once you know what to watch for, the warning signs are clear.

    • Unsolicited calls about returns you did not request

    • Pressure to act fast

    • Instructions to leave a phone outside

    • Promises of gift cards for cooperation

    • Follow-up calls to rush you

    Legitimate carriers do not handle returns this way.

    THE FAKE REFUND SCAM: WHY SCAMMERS LOVE HOLIDAY SHOPPERS

    Woman on her phone while sitting down.

    Once a phone is handed over, it is usually resold or stripped for parts, leaving victims with no device and little chance of recovery. (Kurt “CyberGuy” Knutsson)

    Ways to stay safe from iPhone return scams

    Protecting yourself starts with slowing things down. Scammers rely on speed and confusion. You win by pausing and verifying.

    1) Never return a device based on a phone call alone

    Hang up and contact the carrier using the number on your bill or the official website. If the issue is real, they will confirm it.

    2) Do not leave electronics outside for pickup

    Legitimate returns use tracked shipping labels tied to your account. Carriers do not ask you to leave phones on porches or doorsteps.

    3) Be skeptical of urgency

    Scammers rush you on purpose. Pressure shuts down careful thinking. Any demand for immediate action should raise concern.

    4) Use a data removal service

    Scammers often know what phone you bought because your personal data is widely available online. Data removal services help reduce your exposure by removing your information from data broker sites that criminals rely on. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Install strong antivirus software

    Strong antivirus software adds another layer of protection. Many antivirus tools help block scam calls, warn about phishing links and alert you to suspicious activity before damage is done.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android, & iOS devices at Cyberguy.com.

    6) Save messages and call details

    Keep voicemails, phone numbers and timestamps. This information helps carriers warn other customers and spot repeat scams.

    7) Share this scam with others

    Criminals reuse the same script again and again. A quick warning to friends or family could stop the next victim.

    Kurt’s key takeaways

    Scams aimed at new iPhone owners are getting more targeted and more aggressive. Criminals are timing their calls carefully and copying real carrier language. The simplest defense still works best. Verify before you act. If a call pressures you to rush or hand over a device, pause and contact the company directly. That one step can save you hundreds of dollars and a major headache.

    If a carrier called you tomorrow claiming a mistake with your new phone, would you verify first or would urgency take over? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Amazon adds controversial AI facial recognition to Ring

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Amazon’s Ring video doorbells are getting a major artificial intelligence (AI) upgrade, and it is already stirring controversy.

    The company has started rolling out a new feature called Familiar Faces to Ring owners across the United States. Once enabled, the feature uses AI-powered facial recognition to identify people who regularly appear at your door. Instead of a generic alert saying a person is at your door, you might see something far more personal, like “Mom at Front Door.” On the surface, that sounds convenient.

    Privacy advocates, however, say this shift comes with real risks.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    GOOGLE NEST STILL SENDS DATA AFTER REMOTE CONTROL CUTOFF, RESEARCHER FINDS

    Ring’s new Familiar Faces feature uses AI facial recognition to identify people who regularly appear at your door and personalize alerts. (Chip Somodevilla/Getty Images)

    How Ring’s Familiar Faces feature works

    Ring says Familiar Faces helps you manage alerts by recognizing people you know. Here is how it works in practice. You can create a catalog of up to 50 faces. These may include family members, friends, neighbors, delivery drivers, household staff or other frequent visitors. After labeling a face in the Ring app, the camera will recognize that person as they approach. Anyone who regularly passes in front of your Ring camera can be labeled by the device owner if they choose to do so, even if that person is unaware they are being identified.

    From there, Ring sends personalized notifications tied to that face. You can also fine-tune alerts on a per-face basis, which means fewer pings for your own comings and goings. Importantly, the feature is not enabled by default. You must turn it on manually in the Ring app settings. Faces can be named directly from Event History or from the Familiar Faces library. You can edit names, merge duplicates or delete faces at any time.

    Amazon says unnamed faces are automatically removed after 30 days. Once a face is labeled, however, that data remains stored until the user deletes it.

    Why privacy groups are pushing back

    Despite Amazon’s assurances, consumer protection groups and lawmakers are raising alarms. Ring has a long history of working with law enforcement. In the past, police and fire departments were able to request footage through the Ring Neighbors app. More recently, Amazon partnered with Flock, a company that makes AI-powered surveillance cameras widely used by police and federal agencies. Ring has also struggled with internal security. In 2023, the FTC fined Ring $5.8 million after finding that employees and contractors had unrestricted access to customer videos for years. The Neighbors app previously exposed precise home locations, and Ring account credentials have repeatedly surfaced online. Because of these issues, critics argue that adding facial recognition expands the risk rather than reducing it.

    Electronic Frontier Foundation (EFF) staff attorney Mario Trujillo tells CyberGuy, “When you step in front of one of these cameras, your faceprint is taken and stored on Amazon’s servers, whether you consent or not. Today’s feature to recognize your friend at your front door can easily be repurposed tomorrow for mass surveillance. It is important for state regulators to investigate.” The Electronic Frontier Foundation is a well-known nonprofit organization that focuses on digital privacy, civil liberties and consumer rights in the tech space. 

    WASHINGTON COURT SAYS FLOCK CAMERA IMAGES ARE PUBLIC RECORDS

    Photo of a mounted ring camera.

    Once a face is labeled by the device owner, Ring can replace generic notifications with named alerts tied to that individual. (CyberGuy.com)

    Where the feature is blocked and why that matters

    Legal pressure is already limiting where Familiar Faces can launch. According to the EFF, privacy laws are preventing Amazon from offering the feature in Illinois, Texas and Portland, Oregon. These jurisdictions have stricter biometric privacy protections, which suggests regulators see facial recognition in the home as a higher-risk technology. U.S. Senator Ed Markey has also called on Amazon to abandon the feature altogether, citing concerns about surveillance creep and biometric data misuse.

    Amazon says biometric data is processed in the cloud and not used to train AI models. The company also claims it cannot identify all locations where a face appears, even if law enforcement asks. Still, critics point out the similarity to Ring’s Search Party feature, which already scans neighborhoods to locate lost pets.

    We reached out to Amazon for comment but did not receive a response before our deadline.

    Ring’s other AI feature feels very different

    Not all of Ring’s AI updates raise the same level of concern. Ring recently introduced Video Descriptions, a generative AI feature that summarizes motion activity in plain text. Instead of guessing what triggered an alert, you might see messages like “A person is walking up the steps with a black dog” or “Two people are peering into a white car in the driveway.”

    HOW RESTAURANT RESERVATION PLATFORM OPENTABLE TRACKS CUSTOMER DINING HABITS

    A Ring doorbell alert with two people getting out of a car

    Ring’s Video Descriptions feature takes a different approach by summarizing activity without identifying people by name. (Amazon)

    How Video Descriptions decides what matters

    This AI focuses on actions rather than identities. It helps you quickly decide whether an alert is urgent or routine. Over time, Ring says the system can recognize activity patterns around a home and only notify you when something unusual happens. However, as with any AI system, accuracy can vary depending on lighting, camera angle, distance and environmental conditions. Video Descriptions is currently rolling out in beta to Ring Home Premium subscribers in the U.S. and Canada. Unlike facial recognition, this feature improves clarity without naming or tracking specific people. That contrast matters.

    Ring doorbell notifications on an iPhone screen

    Video Descriptions turns motion alerts into short summaries, helping you understand what is happening without identifying who is involved. (Amazon)

    Should you turn Familiar Faces on?

    If you own a Ring doorbell, caution is wise. While Familiar Faces may reduce notification fatigue, labeling people by name creates a detailed record of who comes to your home and when. Given Ring’s past security lapses and close ties with law enforcement, many privacy experts recommend keeping the feature disabled. If you do use it, avoid full names and remove faces you no longer need. In many cases, simply checking the live video feed is safer than relying on AI labels. Not every smart home feature needs to know who someone is.

    How to turn Familiar Faces on or off in the Ring app

    If you want to review or change this setting, you can do so at any time in the Ring mobile app.

    To enable Familiar Faces:

    • Open the Ring app
    • Tap the menu icon
    • Select Control Center
    • Tap Video and Snapshot Capture
    • Select Familiar Faces
    • Toggle the feature on and follow the on-screen prompts

    To turn Familiar Faces off:

    • Open the Ring app
    • Go to Control Center
    • Tap Video and Snapshot Capture
    • Select Familiar Faces
    • Toggle the feature off

    Turning the feature off stops facial recognition and prevents new faces from being identified. Any labeled faces can also be deleted manually from the Familiar Faces library if you want to remove stored data.

    Alexa is now answering your door for you

    Amazon is also rolling out a very different kind of AI feature for Ring doorbells, and it lives inside Alexa+. Called Greetings, this update gives Ring doorbells a conversational AI voice that can interact with people at your door when you are busy or not home. Instead of identifying who someone is, Greetings focuses on what they appear to be doing. Using Ring’s video descriptions, the system looks at apparel, actions, and objects to decide how to respond. 

    For example, if someone in a delivery uniform drops off a package, Alexa can tell them exactly where to leave it based on your instructions. You can even set preferences to guide delivery drivers toward a specific spot, or let them know water or snacks are available. If a delivery requires a signature, Alexa can ask the driver when they plan to return and pass that message along to you. The feature can also handle sales representatives or service vendors. You might set a rule such as politely declining sales pitches without ever coming to the door yourself.

    Greetings can also work for friends and family. If someone stops by while you are away, Alexa can greet them and ask them to leave a message for you. That interaction is saved so you can review it later. That said, the system is not perfect. Because it relies on visual context rather than identity, mistakes can happen. A friend who works in logistics could show up wearing a delivery uniform and be treated like a courier instead of being invited to leave a message. Amazon acknowledges that accuracy can vary. Importantly, Amazon says Greetings does not identify who a person is. It uses Ring’s video descriptions to determine the main subject in front of the camera and generate responses, without naming or recognizing individuals. That makes it fundamentally different from the Familiar Faces feature, even though both rely on AI.

    Greetings is compatible with Ring Wired Doorbell Pro (3rd Gen) and Ring Wired Doorbell Plus (2nd Gen). It is available to Ring Premium Plan subscribers who have video descriptions enabled and is currently rolling out to Alexa+ Early Access users in the United States and Canada.

    Thinking about a Ring doorbell?

    If you are already in the Ring ecosystem or considering a video doorbell, Ring’s lineup includes models with motion alerts, HD video, night vision, and optional AI-powered features such as Video Descriptions. While Familiar Faces remains controversial and can be turned off, many homeowners still use Ring doorbells for basic security awareness and package monitoring. 

    If you decide Ring is right for your home, you can check out the latest Ring Video Doorbell models or compare features and pricing with other options by visiting Cyberguy.com and searching “Top Video Doorbells.”

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Amazon Ring’s AI facial recognition feature shows how quickly convenience can collide with privacy. Familiar Faces may offer smarter alerts, but it also expands surveillance into deeply personal spaces. Meanwhile, features like Video Descriptions prove that AI can be useful without identifying people. As smart home tech evolves, the real question is not what AI can do but what it should do.

    Would you trade fewer notifications for a system that recognizes and names everyone who comes to your door? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Netflix suspension scam targets your inbox

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Holiday phishing attempts surge every year, and scammers know people juggle subscriptions, gifts and billing changes. That makes a fake alert feel real for a split second. Stacey P. emailed to tell us that he received one of these messages and wrote:

    “I thought I should forward this message to you that I received today that was ostensibly from Netflix. Without clicking on any links, I called Netflix and they advised me that my account is in good standing. They asked me to forward this to them.”

    — Stacey P.

    Stacey’s experience shows how convincing these emails can appear and why taking a moment to verify can make all the difference. These Netflix suspension emails look polished at first glance. When you look closer, however, the warning signs jump out.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

    Holiday phishing scams spike as fake Netflix suspension emails exploit seasonal billing confusion and urgency. (Zeng Hui/Xinhua via Getty Images)

    Why scammers use this approach

    People expect billing reminders during the holidays. When you see a familiar logo during a busy day, your guard drops for a moment. Scammers build templates that look clean, simple and trustworthy because it increases their odds of success.

    Red flags inside the fake Netflix message

    The Netflix scam email attempts to mimic Netflix’s branding, but several details reveal it is fraudulent.

    Spelling and grammar issues

    The email includes mistakes real companies would never send. It uses valldate instead of validateCommunicication instead of communication and even writes “sent to yo” with the u missing from you. Errors like these are major signs of a scam.

    Strange tone and pressure tactics

    The message claims your billing info failed and says your membership will be suspended within 48 hours unless you act. Criminals rely on urgency because it stops people from thinking clearly.

    Fake login buttons

    The bold red Restart Membership button aims to lure you into entering your credentials on a phishing page. Once you type your password and payment details, you hand them over to attackers.

    Generic greeting

    The message uses Dear User instead of your name. Netflix includes your account name in official communications.

    Suspicious footer and address

    The footer contains off wording about inbox preferences and a Scottsdale address not tied to Netflix. Real subscription providers use consistent company details.

    FACEBOOK SETTLEMENT SCAM EMAILS TO AVOID NOW

    Phone with a Netflix logo on it.

    A reader narrowly avoided a Netflix phishing scam by calling the company instead of clicking the email link. (Luis Boza/NurPhoto via Getty Images)

    How to stay safe from the Netflix suspension scam

    A few habits can protect your account even when a phishing attempt looks convincing.

    1) Check your account on Netflix.com

    Open Netflix on your browser or app instead of clicking any link in the email. Your account status there is always accurate.

    2) Avoid entering payment details through email links

    Phishing pages often copy real sites. Instead of clicking the link in the message, open your browser and type the official website address yourself. This keeps you in control and away from fake pages.

    3) Use a data removal service

    Scammers often pull email addresses and personal details from data broker sites. These lists fuel subscription scams that look like the Netflix alert Stacey received. A trusted data removal service can pull your information off those sites and cut down on future phishing attempts.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    4) Hover over links to reveal the true URL

    On a computer, hovering over a link shows where it really goes. If the address looks strange, delete the message.

    5) Report the scam

    Forward suspicious Netflix emails to phishing@netflix.com. This helps the fraud team block similar messages.

    6) Strengthen your device security

    Use two-factor authentication (2FA) for your email and install strong antivirus software to catch malicious pages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    THE FAKE REFUND SCAM: WHY SCAMMERS LOVE HOLIDAY SHOPPERS

    Laptop with "Netflix" on the screen.

    Scammers use polished branding and urgent language to trick users into giving up login and payment details. (Gabby Jones/Bloomberg via Getty Images)

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    7) Consider an identity theft protection service

    If you ever enter your billing info into a fake login page, attackers can use that data for much more than streaming fraud. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Stacey’s caution prevented him from becoming another victim of this email scam. These messages keep getting more believable, so spotting the red flags and using the steps above can save you time, money and frustration.

    Have you seen a fake subscription alert recently that nearly fooled you? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Data breach exposes 400,000 bank customers’ info

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A major data breach tied to U.S. fintech firm Marquis is rippling through banks, credit unions and their customers. Hackers broke into Marquis systems by exploiting a known but unpatched vulnerability in a SonicWall firewall, gaining access to deeply sensitive consumer data.

    At least 400,000 people are confirmed to be affected so far across multiple states. Texas has been hit the hardest with more than 354,000 residents affected. That number is expected to rise as additional breach notifications are filed.

    Marquis operates as a marketing and compliance provider for financial institutions. The company says it serves more than 700 banks and credit unions nationwide. That role gives Marquis access to centralized pools of customer data, which also makes it a high-value target.

    PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    A major data breach tied to fintech firm Marquis exposed sensitive banking and identity data for hundreds of thousands of people. (Kurt “CyberGuy” Knutsson)

    What information was stolen in the Marquis cyberattack

    According to legally required disclosures filed in Texas, Maine, Iowa, Massachusetts and New Hampshire, hackers accessed a wide range of personal and financial data. Stolen information includes customer names, dates of birth, postal addresses, Social Security numbers and bank account, debit and credit card numbers. The breach dates back to Aug. 14, when attackers gained access through the SonicWall firewall vulnerability. Marquis later confirmed the incident was a ransomware attack.

    While Marquis did not publicly name the attackers, the campaign has been widely linked to the Akira ransomware gang. Akira has previously targeted organizations running SonicWall appliances during large-scale exploitation waves. This was not a routine credential leak.

    We reached out to Marquis for comment, and a company spokesperson provided CyberGuy with the following statement:

    “In August, Marquis Marketing Services experienced a data security incident. Upon discovery, we immediately enacted our response protocols and proactively took the affected systems offline to protect our data and our customers’ information. We engaged leading third-party cybersecurity experts to conduct a comprehensive investigation and notified law enforcement.

    “The incident was quickly contained, and our investigation was recently completed. It was determined that an unauthorized third party accessed certain non-public information within our network. However, there is no evidence indicating that any personal information has been used for identity theft or financial fraud. We have notified potentially affected individuals.  

    “We know our customers place great trust in us, and at Marquis, we take that responsibility seriously by making the protection of their information our highest priority. We are extremely appreciative of the cooperation, understanding, and support of our employees and customers during this time.”

    HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET 

    Why the Marquis data breach creates long-term identity risk

    When a data breach exposes your full identity, the danger does not disappear after the news cycle ends. Unlike a stolen password, this kind of information cannot be changed, which means the risk can stick around for a long time.

    “With a typical credential leak, you reset passwords, rotate tokens and move on,” Ricardo Amper, CEO and Founder of Incode Technologies, a digital identity verification company, tells CyberGuy. “But core identity data is static. You cannot meaningfully change your date of birth or SSN, and once those are exposed, they can circulate on criminal markets for years. The breach is a moment in time, but the exposure it creates can follow people for the rest of their financial lives.”

    That is why identity breaches are so dangerous. Criminals can reuse the same stolen data years later to open new accounts, build fake identities or run highly targeted scams that feel personal and convincing. Many attackers now combine this data with AI tools to scale their efforts. As a result, phishing emails, phone calls and even voice impersonations are harder to spot when they reference real details about your bank or account history.

    The most likely scams after identity data is stolen

    When criminals obtain verified identity data, fraud becomes targeted rather than opportunistic. 

    “Once criminals get their hands on rich, verified identity data, fraud stops being a guessing game and becomes a targeted execution,” Amper said. 

    The first major threat is account takeover. With enough personal details, attackers can bypass knowledge-based checks, reset passwords, change contact information and abuse accounts in ways that often look legitimate. The second risk is new account fraud. This includes credit cards, loans, buy now pay later services and even new bank accounts. High-quality data helps these applications pass automated systems and manual reviews.

    The fastest-growing threat is synthetic identity fraud. Real data, like a Social Security number, is blended with fabricated details to create a new identity that matures over time before a large financial bust. 

    “These attacks are hard to catch early because the data being presented is accurate and often reused across multiple institutions,” Amper noted. “If your defenses can’t reliably tell a real human from an AI-generated impersonation, you are starting every decision from a position of disadvantage,” he added.

    Why unpatched firewall flaws pose such a serious threat

    Ransomware groups like Akira increasingly focus on widely deployed infrastructure to maximize impact. Firewalls sit at the boundary of trusted networks. When one is compromised, everything behind it becomes reachable. 

    “What we’re seeing with groups like Akira is a focus on maximizing impact by targeting widely used infrastructure. The strategy remains the same: Find a single weak point that gives access to many downstream victims at once,” Amper said. 

    This approach exposes a persistent blind spot in traditional cybersecurity thinking. Many organizations still assume traffic passing through a firewall is safe. 

    “When the perimeter device itself is the entry point, static defenses and outdated controls simply can’t keep up,” Amper explained.

    Illustration of a hacker at work

    Hackers accessed names, Social Security numbers and bank details by exploiting an unpatched firewall vulnerability.  (Kurt “CyberGuy” Knutsson)

    How long affected consumers should assume risk remains high

    Identity data does not expire. Social Security numbers and birth dates stay the same for life. 

    “When core identity data reaches criminal markets, the risk does not fade quickly,” Amper emphasized. “Fraud rings treat stolen identity data like inventory. They hold it, bundle it, resell it and combine it with information from new breaches.” 

    Warning signs of misuse can be subtle. These include credit inquiries you did not authorize, account recovery alerts from unfamiliar services or phone calls that convincingly mimic a bank’s verification process using deepfake voice tools. 

    “The most damaging fraud often starts long after the breach is no longer in the news,” Amper added.

    The overlooked impact of identity theft

    Financial losses are only part of the damage. Victims often experience a lasting erosion of trust. 

    Amper says, “The most overlooked consequence is the psychological toll of knowing that you can no longer trust who is contacting you. Deepfake impersonation turns every phone call, video message or urgent request into a potential attack.”

    Ways to stay safe after the Marquis data breach

    When a breach exposes Social Security numbers, bank details and birth dates, the risk does not end with a password reset. These steps focus on protections that reduce long-term identity misuse and help you detect fraud early.

    1) Freeze your credit with all major bureaus

    A credit freeze prevents criminals from opening new accounts in your name using stolen identity data. This is critical after the Marquis breach, where full identity profiles were exposed. Freezing credit does not affect your score and can be lifted temporarily when needed. Place a free credit freeze with Equifax, Experian and TransUnion online or by phone. Each bureau must be contacted separately. Once frozen, new credit cannot be opened unless you temporarily lift or remove the freeze using a PIN or account login.

    2) Place a fraud alert on your credit file

    A fraud alert tells lenders to take extra steps to verify your identity before approving credit. It adds protection if you are not ready to freeze credit everywhere or want an extra layer on top of a freeze. Fraud alerts last for one year and can be renewed. You only need to contact one credit bureau to place a fraud alert. Equifax, Experian or TransUnion will notify the others for you. Fraud alerts are free and last for one year.

    3) Enable transaction and account alerts

    Turn on alerts for withdrawal, purchase, login attempts and password changes across all financial accounts. Real-time alerts can help you catch account takeovers or unauthorized activity before serious damage occurs.

    4) Review bank statements and credit reports regularly

    Check statements and credit reports often, even months or years after the breach. Identity data from incidents like this is frequently reused later for delayed fraud. Watch for unfamiliar accounts, hard inquiries or small test charges.

    5) Use phishing-resistant two-factor authentication

    Text message codes can be intercepted or socially engineered. Where possible, switch to app-based or hardware-backed two-factor authentication. These options are harder for attackers to bypass, even when they know your personal details.

    6) Rely on strong device-based biometrics where available

    Biometrics tied to your physical device add a layer that criminals cannot easily replicate. Face and fingerprint authentication help block account takeovers driven by stolen identity data or AI-powered impersonation.

    7) Use strong antivirus software

    Reputable antivirus software helps detect malicious links, fake login pages and follow-up attacks that target breach victims. This adds protection against phishing and ransomware tied to identity-based scams.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

    8) Consider a data removal service

    Data brokers collect and resell personal information that can be combined with breach data to fuel targeted fraud. A data removal service reduces how much of your personal information is publicly available and lowers your exposure over time.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    A man uses a smartphone, illustrating the vulnerability of mobile devices in modern cybercrime.

    Experts warn this type of identity exposure can fuel fraud and scams for years after the breach is discovered. (Kurt ‘CyberGuy’ Knutsson)

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    9) Add an identity theft protection service

    Identity theft services monitor credit files, dark web markets and account activity for signs that your stolen data is being misused. Many also offer recovery assistance in the event of fraud, which can save time and stress when dealing with banks, credit bureaus and government agencies. This monitoring is especially useful after breaches like Marquis, where identity data can resurface long after the initial incident.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    10) Verify unexpected outreach through official channels

    Be cautious of urgent calls, emails or texts that reference real banking or personal details. Scammers now use accurate breach data to sound legitimate. Hang up and contact your bank directly using the number on your card or official website.

    11) Lock down tax and government accounts

    Create or secure online accounts with the IRS, Social Security Administration and your state tax agency. Enable strong authentication and monitor for unexpected notices. Stolen identity data is often used for tax refund fraud or benefit scams long after a breach.

    Kurt’s key takeaways 

    The Marquis data breach highlights how dangerous unpatched infrastructure vulnerabilities have become for the financial sector. When a single vendor holds data for hundreds of institutions, the fallout spreads quickly. For you, identity protection is no longer a one-time response. It is an ongoing necessity that can last years beyond the initial breach.

    What questions do you still have about protecting your identity after a major data breach like this one? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Holiday deliveries and fake tracking texts: How scammers track you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    As we head into the last stretch of December (and last-minute gift shopping), your doorstep is probably busier than ever. And if you’re anything like me, you’re probably also juggling shipping updates, tracking numbers, and “out for delivery” alerts from half a dozen retailers.

    Unfortunately, scammers know this too, and they’ve likely been preparing for it all year. Like clockwork, I’ve already started seeing the usual wave of fake tracking texts hitting people’s phones. They look legit, they show up right when you’re expecting a package, and they rely on one inescapable truth: during the holiday rush, most of us are too overwhelmed to notice when something feels off.

    No need to panic, though. You can still come out ahead of the scammers. I’ll show you what to look out for and how you can prevent being targeted in the first place.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    THE FAKE REFUND SCAM: WHY SCAMMERS LOVE HOLIDAY SHOPPERS

    Holiday shoppers are being hit with a surge of fake delivery texts designed to steal personal information and account logins. (Photo by Sebastian Kahnert/picture alliance via Getty Images)

    What fake delivery text messages look like

    Most of these fake shipping texts include a “tracking link” that looks close enough to the real thing that you might tap without thinking twice about it. In some cases, like one Maryland woman found out, you may even receive fake deliveries with a QR code that works in a similar way.

    These links usually lead to a spoofed tracking page that looks almost identical to the real thing. It’ll ask you to “confirm” your login or enter your delivery details. The moment you type anything in, scammers capture it and use it to access your real accounts.

    Even worse, the “tracking link” may contain malware or spyware, triggering silent installs that can steal passwords, monitor keystrokes, or give scammers remote access to your device.

    Red flags that reveal fake shipping and tracking messages

    So how can you distinguish between a legitimate message for a delivery you’re actually waiting for and one of these scams? Here are the red flags I look for:

    • Weird or slightly altered URLs. Scammers use domains that look almost right. Except there’s usually one extra letter, a swapped character, or a completely unfamiliar extension.
    • Requests for additional payment. Real carriers don’t ask you to pay a “small fee” to release a package. That’s an instant giveaway.
    • A package you’re not expecting. If the text is vague or you can’t match it to a recent order, pause before you tap anything.
    • Delivery attempts at odd hours. “Missed delivery at 6:12 AM” or “late-night attempt” messages are usually fake. Carriers don’t normally operate like that.
    • Updates that don’t match what you see in the retailer’s app or email. If Amazon says your package is arriving tomorrow, but a random text says it’s delayed or stuck, trust Amazon, not the text.
    • Language that is designed to rush you. Anything screaming “immediate action required!” is designed to make you stop thinking and start tapping.

    If a text triggers any one of these, I delete it on the spot. When in doubt, always check directly with the delivery service provider first before opening any links.

    WHY YOUR HOLIDAY SHOPPING DATA NEEDS A CLEANUP NOW

    Person using their smartphone.

    Scammers are sending deceptive tracking links that mimic real carriers, hoping rushed shoppers won’t notice red flags. (Silas Stein/picture alliance via Getty Images)

    How scammers know your address, phone number, and shopping habits

    Scammers don’t magically know where you live or what you’ve ordered — they buy that information. There’s actually an entire industry of data brokers built on collecting and selling personal data. This can include your:

    • Phone number
    • Home address
    • Email
    • Purchase history
    • Browsing patterns
    • Retailers accounts and apps
    • Loyalty programs
    • Even preferred delivery times.

    These data brokers can sell profiles containing hundreds of data points on you. And they aren’t always discerning about who they sell to. In fact, some of them have been caught intentionally selling data to scammers.

    Once scammers have those details, creating a convincing delivery scam is no problem.

    But scammers can’t target what they can’t find

    I’ve been very vocal about the importance of keeping personal information under lock and key. And this is just one of the reasons why.

    Criminals rely on your personal information to target you with these types of scams. They also need at least a phone number or email address to reach you in the first place.

    So your best bet to avoid delivery scams (and, honestly, most other scams year-round) is removing your info from data brokers and people search sites. Doing this will keep your details out of circulation online and out of the wrong hands.

    FBI WARNS EMAIL USERS AS HOLIDAY SCAMS SURGE

    Person using their phone.

    Fraudsters use spoofed shipping pages and malware to capture passwords and gain access to victims’ devices. (Martin Ollman/Getty Images)

    How to remove your personal information from scammers’ reach

    You can start by looking yourself up online. Searching for different combinations of your name, address, email, and phone number should bring up a bunch of people search sites. Just visit the “opt-out” page on each site to request removal of your data.

    Private-database data brokers are a bit trickier. They sell data in bulk, usually to marketers and other third parties. So you won’t be able to check if they have your information. But if you look into which data brokers operate in your area, you can just send opt-out requests to them all. There’s a good chance they’ll have your information.

    You can also turn to a data removal service. They completely remove the headache from this process and just automatically keep your personal info off data broker sites. If, like me, you don’t have the time to keep manually checking data broker sites and sending removal requests every few months (because your data will keep reappearing), a personal data removal service is the way to go.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Kurt’s key takeaways

    Holiday delivery scams work because they blend perfectly into the chaos of December shopping. A well-timed text and a familiar tracking link are often all it takes to lower your guard. By slowing down, checking messages directly with retailers, and reducing how much of your personal data is circulating online, you can take away the advantage scammers rely on. A little caution now can save you a major headache later.

    Have you received a suspicious delivery text or tracking message this holiday season? If so, tell us what it looked like and how you handled it by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Facebook settlement scam emails to avoid now

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Millions of Facebook users filed claims in a recent privacy settlement after the platform was accused of mishandling user data. The approved payouts have been rolling out, which means people are watching their inboxes for updates. Scammers know this and are sending look-alike emails that push you to click a “Redeem Virtual Card” button. Arlene B emailed us to share what landed in her inbox.

    “I received an email stating that it was from (Facebook User Privacy Settlement Administrator) and that I needed to click on the button below to “Redeem Virtual Card.” Do you know if this is a scam or not?”

    Her question shows how convincing these fake messages appear. A real settlement did happen, and people have been getting payments. Still, criminals are now piggybacking on the rollout with messages that look official but lead to dangerous sites that steal your information. Let’s walk through how to tell real emails from fake ones.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    NEW SCAM SENDS FAKE MICROSOFT 365 LOGIN PAGES

    Scammers send fake settlement emails that mimic the real payout notices to trick you into clicking. (Kurt “CyberGuy” Knutsson)

    How to check if your Facebook settlement email is legitimate

    Scammers rely on confusion and urgency. These steps help you confirm the message before you click anything.

    Confirm the sender’s address

    Real settlement emails come from facebookuserprivacysettlement@notifications.kroll.com. Kroll is the official administrator.

    Look for your claimant ID

    Real notices include your unique claimant ID and reference the claim you filed last year. Fake emails skip this personalized detail.

    Check where the link leads

    Real payout links go to DigitalPay / Veritas or domains tied to krollsettlementadministration. If the link points to a strange or shortened URL, it is likely unsafe.

    Watch for common red flags

    Pressure to act right away. Clumsy wording or spelling mistakes. A button that goes to a suspicious URL. You never filed a claim in the first place. Any sender address that is not the official Kroll domain.

    Remember that you are not required to click anything

    If your claim was approved, you have already received a legitimate notice. Emails that say you must “redeem” again or “confirm” payment are signs of a scam.

    GEEK SQUAD SCAM EMAIL: HOW TO SPOT AND STOP IT

    Hacker looks at computer code while sitting in a dark room

    A quick hover over the “Redeem Virtual Card” button often reveals a suspicious link that gives the scam away. (Kurt “CyberGuy” Knutsson)

    Why scammers target large settlements

    Whenever a major payout occurs, criminals blend in with legitimate messages because people expect money and may open emails quickly. When fake notices look similar to real ones, it only takes one careless click for scammers to grab your data.

    DON’T FALL FOR FAKE SETTLEMENT SITES THAT STEAL YOUR DATA

    facebook access 1

    A person logging onto Facebook (Kurt “CyberGuy” Knutsson)

    Ways to stay safe from settlement scams

    Use these simple habits to protect yourself from Facebook settlement scams and any future payout scam.

    1) Verify the sender every time

    Look at the full address. Scammers often change one character in hopes you will not notice.

    2) Hover over links before tapping

    Check the destination without clicking. A strange URL is your warning sign.

    3) Never share sensitive information through email

    Real administrators do not ask for banking info or logins.

    4) Use a data removal service

    Data brokers often collect your email address, phone number and other personal details that scammers use to target victims. A data removal service can pull you out of those databases, which reduces the amount of scam email that reaches you in the first place.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Go directly to the official settlement site

    Type in the address yourself instead of using a link from an email.

    6) Use strong antivirus software 

    Good security software blocks dangerous links and pages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    7) Delete emails that push urgency

    Scammers want fast reactions. Slow down and confirm details. 

    Kurt’s key takeaways 

    The Facebook settlement payout created the perfect moment for scammers to slip fake messages into inboxes. Once you know the signs, it becomes much easier to separate real notices from dangerous ones. Stay alert, trust your instincts and verify before you click.

    Would you open a payout email if you were not expecting money in the first place? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Password manager fined after major data breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Any data breach affecting 1.6 million people is serious. It draws even more attention when it involves a company trusted to guard passwords. That is exactly what happened to LastPass.

    The U.K. Information Commissioner’s Office has fined LastPass about $1.6 million for security failures tied to its 2022 breach. Regulators say those failures allowed a hacker to access a backup database and put users at risk.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    CHECK IF YOUR PASSWORDS WERE STOLEN IN HUGE LEAK

    Why the LastPass breach still matters

    LastPass is one of the most widely used password managers in the world. It serves more than 20 million individual users and around 100,000 businesses. That popularity also makes it an attractive target for cybercriminals.

    The U.K. Information Commissioner’s Office fined LastPass for security failures tied to its 2022 breach. (LaylaBird/Getty Images)

    In 2022, LastPass confirmed that an unauthorized party accessed parts of its customer information through a third-party cloud storage service. While the incident initially raised alarms, the long-term impact has taken time to fully surface.

    The ICO now says the breach affected about 1.6 million U.K. users alone. That scope played a major role in the size of the fine.

    What regulators say went wrong

    According to the ICO, LastPass failed to put strong enough technical and security controls in place. Those gaps made it possible for attackers to reach a backup database that should have been better protected.

    The regulator added that LastPass promises to help people improve security, but failed to meet that expectation. As a result, users were left exposed even if their passwords were not directly cracked.

    Were passwords exposed or decrypted?

    There is still no evidence that attackers decrypted customer passwords. That point matters.

    Despite the breach, security experts continue to recommend password managers for most people. Storing unique, strong passwords in an encrypted vault is still far safer than reusing weak passwords across accounts.

    As one expert noted, modern breaches often succeed after identity access rather than password cracking alone. Once attackers get a foothold, the damage can spread quickly.

    Illustration of password login on laptop

    Although attackers accessed a backup database, there is no evidence that customer passwords were decrypted. (Kurt “CyberGuy” Knutsson)

    Why the LastPass fine is a wake-up call for cybersecurity

    The ICO called the LastPass fine a turning point. It reinforces the idea that security is about governance, staff training and supplier risk as much as software.

    Users have a right to expect that companies handling sensitive data take every reasonable step to protect it.

    Breaches may be inevitable, but weak safeguards are not.

    LastPass on the UK data breach

    We reached out to LastPass for comment on the UK fine, and a spokesperson provided CyberGuy with the following statement: 

    “We have been cooperating with the UK ICO since we first reported this incident to them back in 2022. While we are disappointed with the outcome, we are pleased to see that the ICO’s decision has recognized many of the efforts we have already taken to further strengthen our platform and enhance our data security measures. Our focus remains on delivering the best possible service to the 100,000 businesses and millions of individual consumers who continue to rely on LastPass.”

    MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINS

    How to protect yourself after a password manager breach

    Breaches like this are a reminder that security requires layers. No single tool can protect everything on its own.

    1) Use a strong password manager correctly

    Keep using a reputable password manager. Set a long, unique master password and enable two-factor authentication. Avoid reusing your master password anywhere else.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Rotate sensitive passwords

    Change passwords for financial accounts, email accounts and work logins. Focus on services that could cause real damage if compromised.

    3) Lock down your email

    Your email account is the key to password resets. Use a strong password, two-factor authentication and recovery options you control. 

    4) Reduce your exposed personal data

    Data brokers collect and sell personal information that criminals use for targeting. A data removal service can help reduce what is publicly available about you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Woman Types on Laptop Computer

    The fine sends a warning to the entire cybersecurity industry. Companies that handle sensitive data must protect it with strong safeguards and oversight. (REUTERS/Andrew Kelly)

    5) Watch for phishing attempts and use strong antivirus software 

    After major breaches, scammers follow. Be cautious of emails claiming urgent account problems or asking for verification details. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Keep devices updated

    Install updates for your operating system, browser and security tools. Many attacks rely on known vulnerabilities that updates already fix.

    Kurt’s key takeaways

    The fine against LastPass is about more than one company. It highlights how much trust we place in tools that manage our digital lives. Password managers remain a smart security choice. Still, this case shows why you should stay alert even when using trusted brands. Strong settings, regular reviews and layered protection matter more than ever. In the end, security works best when companies and we share the responsibility. Tools help, but habits and awareness finish the job.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Do you believe companies are doing enough to protect user data, or should regulators step in more often? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Petco confirms major data breach involving customer data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Petco revealed a data breach that exposed sensitive customer information. The company disclosed the details in state filings after identifying a configuration in one of its software applications that made certain files accessible online. This issue has now been corrected, but the impact is significant.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

    Petco disclosed a breach that exposed customer data after a software setting left files accessible online. (Photographer: Tiffany Hagler-Geard/Bloomberg via Getty Images)

    What Petco says the breach exposed

    According to reports filed with the Texas attorney general’s office, the exposed data included names, Social Security numbers, driver’s license numbers, financial account details, credit or debit card numbers and dates of birth. Filings in California, Massachusetts and Montana confirm additional affected residents.

    In California, companies must report breaches involving at least 500 state residents. Petco did not disclose the exact number, which suggests the real total is higher. For context, Petco said in 2022 that it served more than 24 million customers.

    Petco says the company sent notifications to individuals whose information was involved. The sample notice released by the California attorney general explains that a software setting allowed certain files to be accessible online. Petco says it removed those files, corrected the setting and added new security measures.

    The company is offering free credit and identity theft monitoring to victims in California, Massachusetts and Montana. It is not clear if similar support is being offered to affected Texas residents.

    We reached out to Petco for comment, and a representative provided CyberGuy with the following statement,

    “We recently identified a setting in one of our applications which inadvertently made certain Petco files accessible online. Upon identifying the issue, we took immediate steps to correct the error and began an investigation. We notified individuals whose information was involved and continue to monitor for further issues. We take this incident seriously. To help prevent something like this from happening again, we have taken and will continue to take steps to enhance the security of our network.”

    What this breach means for you

    A breach that exposes government IDs, financial numbers and birth dates creates long-term risks. Criminals use this mix of information to open accounts, take over existing ones or try to pass identity checks. Even if no fraud happens right away, exposed data can sit in criminal markets for years.

    Ways to stay safe after a breach like this

    You can take several steps today that help lower your risk and protect your identity going forward.

    1) Place a credit freeze

    A freeze blocks new credit accounts in your name. It also stops criminals from opening loans or credit cards with your stolen information. You can freeze your credit for free at Equifax, Experian and TransUnion.

    2) Add two more freezes

    Two additional freezes cover accounts that do not run through the major credit bureaus. Freeze ChexSystems to stop criminals from opening checking or savings accounts. Freeze NCTUE to block fake phone, cable or utility accounts.

    3) Turn on account alerts

    Set up alerts for banking, credit cards and online shopping accounts. Alerts help you spot suspicious activity fast.

    4) Use a password manager

    Strong passwords protect you from credential stuffing attacks. This happens when criminals take stolen passwords from one breach and try them on other sites. A password manager creates unique passwords for every account and helps you stop those attacks before they start.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    5) Monitor your identity

    If Petco offered you free identity theft monitoring, enroll as soon as possible. It helps you catch fraud that can happen months or years later.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    WHY YOUR HOLIDAY SHOPPING DATA NEEDS A CLEANUP NOW

    Streetview of a Petco store.

    State filings show Petco customers had Social Security and financial information exposed in the breach. (Photo by Justin Sullivan/Getty Images)

    6) Remove exposed personal data

    Data broker sites collect and share personal details that fuel scams. Removing your information reduces your exposure and makes you a harder target.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    WHY SCAMMERS OPEN BANK ACCOUNTS IN YOUR NAME

    Front view of a Petco store.

    Petco says it corrected the software issue and notified individuals whose information was compromised. (Photo by Paul Weaver/SOPA Images/LightRocket via Getty Images)

    7) Watch for phishing and use strong antivirus software

    Scammers often follow a breach with emails or texts that look real. Slow down and check every message before you click. A strong antivirus helps block malicious links and alerts you when something looks risky.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Data breaches happen often, but this one involves information that can cause lasting harm. You can protect yourself with a few quick steps that reduce the chance of fraud and limit how far criminals can get with your data.

    How much trust do you place in companies to protect your personal information? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Fake Windows update pushes malware in new ClickFix attack

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals keep getting better at blending into the software you use every day. 

    Over the past few years, we’ve seen phishing pages that copy banking portals, fake browser alerts that claim your device is infected and “human verification” screens that push you to run commands you should never touch. The latest twist comes from the ongoing ClickFix campaign.

    Instead of asking you to prove you are human, attackers now disguise themselves as a Windows update. It looks convincing enough that you might follow the instructions without thinking, which is exactly what they want.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    NEW SCAM SENDS FAKE MICROSOFT 365 LOGIN PAGES

    The malware hides inside seemingly normal image files, using steganography to slip past traditional security tools.  (Microsoft)

    How the fake update works

    Researchers noticed that ClickFix has upgraded its old trick. The campaign used to rely on human verification pages, but now you get a full-screen Windows update screen that looks almost identical to the real thing. Joe Security showed how the page displays fake progress bars, familiar update messages and a prompt that tells you to complete a critical security update.

    If you are on Windows, the site tells you to open the Run box, copy something from your clipboard and paste it in. That “something” is a command that silently downloads a malware dropper. The final payload is usually an infostealer, which steals passwords, cookies and other data from your machine.

    NEW EMAIL SCAM USES HIDDEN CHARACTERS TO SLIP PAST FILTERS

    A fake Windows update screen

    Fake update screens are getting harder to spot as attackers mimic Windows with near-perfect precision. (Joe Security)

    The moment you paste the command, the infection chain begins. First, a file called mshta.exe reaches out to a remote server and grabs a script. To avoid detection, these URLs often use hex encoding for parts of the address and rotate their paths. The script then runs obfuscated PowerShell code filled with junk instructions to throw researchers off. Once PowerShell does its work, it decrypts a hidden .NET assembly that functions as the loader.

    Why is this attack so hard to detect?

    The loader hides its next stage inside what looks like a regular PNG file. ClickFix uses custom steganography, which is a technique that hides secret data inside normal-looking content. In this case, the malware sits inside the image’s pixel data. The attackers tweak color values in certain pixels, especially in the red channel, to embed pieces of shellcode. When you view the image, everything appears normal.

    The script knows exactly where the hidden data sits. It extracts the pixel values, decrypts them and rebuilds the malware directly in memory. That means nothing obvious is written to disk. Security tools that rely on file scanning miss it, since the shellcode never appears as a standalone file.

    Once rebuilt, the shellcode is injected into a trusted Windows process like explorer.exe. The attack uses familiar in-memory techniques such as VirtualAllocEx, WriteProcessMemory and CreateRemoteThread. Recent ClickFix activity has delivered infostealers like LummaC2 and updated versions of Rhadamanthys. These tools are built to harvest credentials and send them back to the attacker with very little noise.

    Person wearing a hoodie works on multiple computer screens displaying digital data in a dark room.

    Once the hidden code loads into a trusted Windows process, infostealers quietly begin harvesting your data. (Kurt “CyberGuy” Knutsson)

    7 steps you can take to protect yourself from the ClickFix campaign

    The best way to stay protected is to slow down for a moment and follow a few steps that cut off these attacks before they start.

    1) Never run commands you didn’t ask for

    If any site tells you to paste a command into Run, PowerShell or Terminal, treat it as an immediate warning sign. Real operating system updates never require you to run commands from a webpage. When you run that command, you hand full control to the attacker. If something feels off, close the page and don’t interact further.

    2) Keep Windows updates inside Windows

    Updates should only come from the Windows Settings app or through official system notifications. A browser tab or pop-up pretending to be a Windows update is always fake. If you see anything outside the normal update flow asking for your action, ignore it and check the real Windows Update page yourself.

    3) Use a reputable antivirus

    Choose a security suite that can detect both file-based and in-memory threats. Stealthy attacks like ClickFix avoid leaving obvious files for scanners to pick up. Tools with behavioral detection, sandboxing and script monitoring give you a much better chance of spotting unusual activity early.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Use a password manager

    Password managers create strong, unique passwords for every account you use. They also autofill only on legitimate websites, which helps you catch fake login pages. If a manager refuses to fill out your credentials, take a second look at the URL before entering anything manually.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Use a personal data removal service

    Many attacks start by targeting emails and personal details already exposed online. Data removal services help shrink your digital footprint by requesting takedowns from data broker sites that collect and sell your information. They can’t erase everything, but reducing your exposure means fewer attackers have easy access to your details.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Check URLs before trusting anything

    A convincing layout doesn’t mean it is legitimate. Always look at the domain name first. If it doesn’t match the official site or uses odd spelling or extra characters, close it. Attackers rely on the fact that people recognize a page’s design but ignore the address bar.

    7) Close suspicious full-screen pages

    Fake update pages often run in full-screen mode to hide the browser interface and make the page look like part of your computer. If a site suddenly goes full screen without your permission, exit with Esc or Alt+Tab. Once you’re out, scan your system and don’t return to that page.

    Kurt’s key takeaway

    ClickFix works because it leans on user interaction. Nothing happens unless you follow the instructions on the screen. That makes the fake Windows update page especially dangerous, because it taps into something most people trust. If you are used to Windows updates freezing your screen, you may not question a prompt that appears during the process. Cybercriminals know this. They copy trusted interfaces to lower your guard and then rely on you to run the final command. The technical tricks that follow are complex, but the starting point is simple. They need you to help them.

    Do you ever copy commands from a website without thinking twice about what they do? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Third-party breach exposes ChatGPT account details

    [ad_1]

    NEWYou can now listen to Fox News articles!

    ChatGPT went from novelty to necessity in less than two years. It is now part of how you work, learn, write, code and search. OpenAI has said the service has roughly 800 million weekly active users, which puts it in the same weight class as the biggest consumer platforms in the world. 

    When a tool becomes that central to your daily life, you assume the people running it can keep your data safe. That trust took a hit recently after OpenAI confirmed that personal information linked to API accounts had been exposed in a breach involving one of its third-party partners.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    The breach highlights how even trusted analytics partners can expose sensitive account details. (Kurt “CyberGuy” Knutsson)

    What you need to know about the ChatGPT breach

    OpenAI’s notification email places the breach squarely on Mixpanel, a major analytics provider the company used on its API platform. The email stresses that OpenAI’s own systems were not breached. No chat histories, billing information, passwords or API keys were exposed. Instead, the stolen data came from Mixpanel’s environment and included names, email addresses, Organization IDs, coarse location and technical metadata from user browsers. 

    FAKE CHATGPT APPS ARE HIJACKING YOUR PHONE WITHOUT YOU KNOWING

    That sounds harmless on the surface. The email calls this “limited” analytics data, but the label feels like PR cushioning more than anything else. For attackers, this kind of metadata is gold. A dataset that reveals who you are, where you work, what machine you use and how your account is structured gives threat actors everything they need to run targeted phishing and impersonation campaigns.

    The biggest red flag is the exposure of Organization IDs. Anyone who builds on the OpenAI API knows how sensitive these identifiers are. They sit at the center of internal billing, usage limits, account hierarchy and support workflows. If an attacker quotes your Org ID during a fake billing alert or support request, it suddenly becomes very hard to dismiss the message as a scam.

    OpenAI’s own reconstructed timeline raises bigger questions. Mixpanel first detected a smishing attack on November 8. Attackers accessed internal systems the next day and exported OpenAI’s data. That data was gone for more than two weeks before Mixpanel told OpenAI on November 25. Only then did OpenAI alert everyone. It is a long and worrying silent period, and it left API users exposed to targeted attacks without even knowing they were at risk. OpenAI says it cut Mixpanel off the next day.

    The size of the risk and the policy problem behind it

    The timing and the scale matter here. ChatGPT sits at the center of the generative AI boom. It does not just have consumer traffic. It has sensitive conversations from developers, employees, startups and enterprises. Even though the breach affected API accounts rather than consumer chat history, the exposure still highlights a wider issue. When a platform reaches almost a billion weekly users, any crack becomes a national-scale problem.

    Regulators have been warning about this exact scenario. Vendor security is one of the weak links in modern tech policy. Data protection laws tend to focus on what a company does with the information you give them. They rarely provide strong guardrails around the entire chain of third-party services that process this data along the way. Mixpanel is not an obscure operator. It is a widely used analytics platform trusted by thousands of companies. Yet it still lost a dataset that should never have been accessible to an attacker.

    Companies should treat analytics providers the same way they treat core infrastructure. If you cannot guarantee that your vendors follow the same security standards you do, you should not be collecting the data in the first place. For a platform as influential as ChatGPT, the responsibility is even higher. People do not fully understand how many invisible services sit behind a single AI query. They trust the brand they interact with, not the long list of partners behind it.

    artificial intelligence language model

    Attackers can use leaked metadata to craft convincing phishing emails that look legitimate. (Jaap Arriens/NurPhoto via Getty Images)

    8 steps you can take to stay safer when using AI tools

    If you rely on AI tools every day, it’s worth tightening your personal security before your data ends up floating around in someone else’s analytics dashboard. You cannot control how every vendor handles your information, but you can make it much harder for attackers to target you.

    1) Use strong, unique passwords

    Treat every AI account as if it holds something valuable because it does. Long, unique passwords stored in a reliable password manager reduce the fallout if one platform gets breached. This also protects you from credential stuffing, where attackers try the same password across multiple services.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Turn on phishing-resistant 2FA

    AI platforms have become prime targets, so they rely on stronger 2FA. Use an authenticator app or a hardware security key. SMS codes can be intercepted or redirected, which makes them unreliable during large-scale phishing campaigns.

    3) Use strong antivirus software

    Another important step you can take to protect yourself from phishing attacks is to install strong antivirus software on your devices. This can also alert you to phishing emails and ransomware scams, helping you keep your personal information and digital assets safe. 

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. 

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    PARENTS BLAME CHATGPT FOR SON’S SUICIDE, LAWSUIT ALLEGES OPENAI WEAKENED SAFEGUARDS TWICE BEFORE TEEN’S DEATH

    4) Limit what personal or sensitive data you share

    Think twice before pasting private conversations, company documents, medical notes or addresses into a chat window. Many AI tools store recent history for model improvements unless you opt out, and some route data through external vendors. Anything you paste could live on longer than you expect.

    5) Use a data-removal service to shrink your online footprint

    Attackers often combine leaked metadata with information they pull from people-search sites and old listings. A good data-removal service scans the web for exposed personal details and submits removal requests on your behalf. Some services even let you send custom links for takedowns. Cleaning up these traces makes targeted phishing and impersonation attacks much harder to pull off.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Treat unexpected support messages with suspicion

    Attackers know users panic when they hear about API limits, billing failures or account verification issues. If you get an email claiming to be from an AI provider, do not click the link. Open the site manually or use the official app to confirm whether the alert is real.

    A smartphone shows ChatGPT open in an internet browser.

    Events like this show why strengthening your personal security habits matters more than ever. (Kurt “CyberGuy” Knutsson)

    7) Keep your devices and software updated

    A lot of attacks succeed because devices run outdated operating systems or browsers. Regular updates close vulnerabilities that could be used to steal session tokens, capture keystrokes or hijack login flows. Updates are boring, but they prevent a surprising amount of trouble.

    8) Delete accounts you no longer need

    Old accounts sit around with old passwords and old data, and they become easy targets. If you’re not actively using a particular AI tool anymore, delete it from your account list and remove any saved information. It reduces your exposure and limits how many databases contain your details.

    Kurt’s key takeaway

    This breach may not have touched chat logs or payment details, but it shows how fragile the wider AI ecosystem can be. Your data is only as safe as the least secure partner in the chain. With ChatGPT now approaching a billion weekly users, that chain needs tighter rules, better oversight and fewer blind spots. If anything, this should be a reminder that the rush toward AI adoption needs stronger policy guardrails. Companies cannot hide behind transparent emails after the fact. They need to prove that the tools you rely on every day are secure at every layer, including the ones you never see.

    Do you trust AI platforms with your personal information? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Android Emergency Live Video gives 911 eyes on the scene

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Holiday travel and winter storms create risky moments for drivers and families. Stress rises fast during emergencies, and describing the scene to 911 can feel overwhelming. 

    Now, a new Android feature closes that gap by providing live visual information that helps responders act with speed and accuracy.

    If you use an iPhone, Apple offers a similar tool through its Emergency SOS Live Video feature. 

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.   

    HOW ANDROID MALWARE LETS THIEVES ACCESS YOUR ATM CASH

    Android Emergency Live Video gives 911 a secure live view of the scene, so responders understand what is happening right away. (Cyberguy.com)

    What Android Emergency Live Video does

    Google is rolling out Android Emergency Live Video to give dispatchers a secure view of the scene during an active call or text. A dispatcher can request a live video stream through your phone when it is safe for you to share it. With a single tap, you can stream real-time video that helps responders understand what is happening.

    This can help during car accidents, medical emergencies or fast-moving hazards such as wildfire conditions. Live video can also help dispatchers guide you through steps that save lives, such as CPR, until responders arrive.

    APPLE NOW LETS YOU ADD YOUR PASSPORT TO YOUR PHONE’S WALLET

    How the Android Emergency Live Video feature works

    Android designed this tool to work with no setup. When you call or text 911, the dispatcher reviews the situation. If they decide video would help, they will send a request to your phone. You see a clear prompt that lets you choose whether to start the secure stream. The feature uses encryption and gives you full control. You can stop sharing at any moment.

    The feature works on Android phones running Android 8 or newer with Google Play services. It is rolling out across the U.S. and select regions in Germany and Mexico. Google plans to expand coverage with more public safety partners.

    How to use Emergency Live Video on Android

    You cannot turn this feature on in advance. It appears only during an active 911 call or text.

    1) Call or text 911 on your Android phone. The dispatcher reviews your situation.

    2) Watch for a request on your screen. If the dispatcher decides live video will help, they send a prompt to your device.

    3) Tap the notification that appears. You will see a clear message asking if you want to share live video.

    4) Choose Share video to start streaming. This opens your camera and begins a secure live feed.

    5) Tap Stop sharing at any time. You stay in control the entire time and can end the video at any time.

    android microsoft

    With one tap, you can choose to share real-time video during a 911 call or text, which gives dispatchers the clarity they need to guide you. (CyberGuy.com)

    Why Emergency Live Video on Android matters now

    Emergencies create confusion. Sharing details verbally takes time and can lead to miscommunication. Video removes guesswork. Responders gain clarity in seconds, which can speed up help and improve outcomes. This tool builds on Android’s safety features, including Satellite SOS, Fall Detection and Car Crash Detection.

    NEW ANDROID ATTACK TRICKS YOU INTO GIVING DANGEROUS PERMISSIONS

    Alastair Breeze, a Software Engineer for Android, tells CyberGuy that the team built this feature with one goal in mind. “Providing people peace of mind is at the core of Android’s safety mission. Android Emergency Live Video gives you the ability to securely share real-time video to provide dispatchers the critical eyes-on-scene context they need to assist in emergencies.”

    What this means to you

    If you carry an Android phone, this feature adds another layer of protection during moments that demand quick action. You stay in control of when the video is shared. You also get a simple way to show the situation when describing it feels impossible. Faster clarity can lead to faster help, which can shape how an emergency ends.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com. 

    Santa Rosa County Emergency Communication Center

    The feature works on Android phones running Android 8 or newer and helps responders act faster during emergencies when seconds matter. (Tony Giberson/tgiberson@pnj.com / USA TODAY)

    Kurt’s key takeaways

    Android Emergency Live Video brings real-time awareness to moments when every second matters. It gives responders a clear view, so they can guide you through urgent steps if necessary. Most of all, it adds peace of mind during situations no one plans for.

    Would you feel comfortable sharing live video during an emergency if it helped responders reach you faster? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • How to spot wallet verification scam emails

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Recently, you may have received alarming emails like the one below from “sharfharef” titled “Wallet Verification Required” that uses the MetaMask logo and branding.

    These messages warn you to verify your wallet by following a link, but scammers use emails like this to steal your crypto information.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    FBI WARNS EMAIL USERS AS HOLIDAY SCAMS SURGE

    Scam emails posing as MetaMask alerts are tricking users into revealing their crypto wallet details. (Photographer: Wei Leng Tay/Bloomberg via Getty Images)

    What is MetaMask and why scammers love it

    MetaMask is a popular crypto wallet and browser extension that lets you store tokens and connect to blockchain apps on networks such as Ethereum. Because MetaMask is widely known and trusted, criminals impersonate it in phishing campaigns that ask users to “verify” wallets and then harvest recovery phrases or keys.

    What makes this email a wallet verification scam

    The scam email copies MetaMask visuals and even routes through a Zendesk address to look more professional, yet the “Verify Wallet Ownership” button points to an unrelated domain that has nothing to do with MetaMask. That mismatch between branding and destination is a major red flag in crypto phishing attacks. It also relies on classic pressure tactics and vague corporate language. The body reads:

    Dear Valued User,
    As part of our ongoing commitment to account security, we require verification to confirm ownership of your wallet.
    This essential security measure helps protect your assets and maintain the integrity of our platform.
    Action Required By: December 03, 2025
    Your prompt attention to this verification will help ensure uninterrupted access to your account and maintain the highest level of security protection.

    Phrases like “Dear Valued User,” “essential security measure” and “Action Required By” are common in phishing emails that pretend to be MetaMask and threaten restrictions if you do not comply. Genuine MetaMask support will direct you to metamask.io or official apps and will never ask you to reveal your secret recovery phrase through a link in an unsolicited email.

    In this case, the message even claims to come from “МеtаМаsk.io (Support@МеtаМаsk.io)” . That display name looks like MetaMask Support, but the real sending address is an unrelated Zendesk subdomain, which is a classic red flag. MetaMask explains that legitimate support messages only come from specific official addresses, so anything else should be treated as a scam and ignored.

    Why mention Zendesk can be misleading

    Zendesk is a legitimate customer support platform that many companies use to manage tickets and notifications. Scammers sometimes route fake alerts through such services or spoof similar addresses, so messages look like real support tickets, which can fool users who associate Zendesk branding with trust.

    In this case, the presence of a Zendesk-style address does not make the message safe because the link still leads away from MetaMask’s official website and asks you to react to manufactured urgency.

    NEW EMAIL SCAM USES HIDDEN CHARACTERS TO SLIP PAST FILTERS

    Hacker typing on a computer.

    Phishing messages urging MetaMask “wallet verification” direct victims to fake websites that steal recovery phrases. (Photo by Morteza Nikoubazl/NurPhoto via Getty Images)

    Steps to stay safe from wallet verification scam emails

    Taking the right precautions can protect your digital wallet and personal data from scammers.

    1) Do not click suspicious links and use strong antivirus software

    Avoid clicking buttons or links in unexpected wallet verification emails, even if they show the MetaMask logo. Instead, open your browser and type metamask.io yourself or use the official mobile app to check for any real alerts. Also, install strong antivirus software to detect malicious links, fake sites or malware that tries to capture your keystrokes. 

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Keep it updated so it can block new phishing infrastructure and known scam domains.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Use official websites only

    Always confirm that the address bar shows MetaMask’s official domain or your wallet provider’s genuine site before you sign in. If an email link sends you to a domain that looks odd, close it immediately.

    3) Keep your credentials private

    Never enter your secret recovery phrase, password or private keys on a site you reached by email. MetaMask support will not ask for that information, and anyone who gets it can empty your wallet.

    4) Enable two-factor authentication

    Turn on two-factor authentication (2FA) wherever your exchange or related accounts support it, since codes from an app or key add a barrier even if a password leaks. Store backup codes safely offline, so criminals cannot reach them.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    Person checking their emails on their laptop.

    Criminals are spoofing Zendesk-style addresses to make fraudulent MetaMask support emails appear legitimate. (Photo by Felix Zahn/Photothek via Getty Images)

    5) Use a data removal service

    Data removal services can help reduce exposed personal details from data broker sites that attackers use to target victims by name and email. Less exposed information makes it harder for phishers to craft convincing wallet alerts tailored to you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Mark suspicious emails

    Mark any fake MetaMask messages as spam or phishing in your inbox so filters learn to block similar attacks. You can also report phishing attempts through MetaMask and your email provider to help protect other users.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Emails like the one from “sharfharef” use MetaMask’s trusted name, polished design and alarming language to push you into clicking before you think. When you slow down, check the sender, read the wording and confirm the website address, you strip scammers of their biggest advantage, which is panic.

    What questions do you still have about protecting your digital accounts and crypto wallets that you want us to answer in a future article? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link