ReportWire

Tag: Privacy

  • One Tech Tip: Modern cars are spying on you. Here’s what you can do about it

    [ad_1]

    While driving to a new restaurant, your car’s satellite navigation system tracks your location and guides you to the destination. Onboard cameras constantly track your face and eye movements. When another car veers into your path, forcing you to slam on the brakes, sensors are assisting and recording. Waiting at a stoplight, the car notices when you unbuckle your seat belt to grab your sunglasses in the backseat.

    Modern cars are computers on wheels that are becoming increasingly connected, enabling innovative new features that make driving safer and more convenient. But these systems are also collecting reams of data on our driving habits and other personal information, raising concerns about data privacy.

    Here is what to know about how your car spies on you and how you can minimize it:

    How cars collect data

    It’s hard to figure out exactly how much data a modern car is collecting on you, according to the Mozilla Foundation, which analyzed privacy practices at 25 auto brands in 2023. It declared that cars were the worst product category that the group had ever reviewed for privacy.

    The data points include all your normal interactions with the car — such as turning the steering wheel or unlocking doors — but also data from connected onboard services, like satellite radio, GPS navigation systems, connected devices, telematics systems as well as data from sensors or cameras.

    Vehicle telematics systems started to become commonplace about a decade ago, and the practice of automotive data collection took off about five years ago.

    The problem is not just that data is being collected but who it’s provided to, including insurers, marketing companies and shadowy data brokers. The issue surfaced earlier this year when General Motors was banned for five years from disclosing data collected from drivers to consumer reporting agencies.

    The Federal Trade Commission accused GM of not getting consent before sharing the data, which included every instance when a driver was speeding or driving late at night. It was ultimately provided to insurance companies that used it to set their rates.

    Be aware

    The first thing drivers should do is be aware of what data their car is collecting, said Andrea Amico, founder of Privacy4Cars, an automotive privacy company.

    In an ideal world, drivers would read through the instruction manuals and documentation that comes with their cars, and quiz the dealership about what’s being collected.

    But it’s not always practical to do this, and manufacturers don’t always make it easy to find out, while dealership staff aren’t always the best informed, Amico said.

    Privacy4Cars offers a free auto privacy labeling service at vehicleprivacyreport.com that can summarize what your car could be tracking.

    Owners can punch in their car’s Vehicle Identification Number, which then pulls up the automaker’s data privacy practices, such as whether the car collects location data and whether it’s given to insurers, data brokers or law enforcement.

    Tweak your settings

    Data collection and tracking start as soon as you drive a new car off the dealership lot, with drivers unwittingly consenting when they’re confronted with warning menus on dashboard touch screens.

    Experts say that some of the data collection is baked into the system, you can revoke your consent by going back into the menus.

    “There are permissions in your settings that you can make choices about,” said Lauren Hendry Parsons of Mozilla. “Go through on a granular level and look at those settings where you can.”

    For example, Toyota says on its website that drivers can decline what it calls “Master Data Consent” through the Toyota app. Ford says owners can opt to stop sharing vehicle data with the company by going through the dashboard settings menu or on the FordPass app.

    BMW says privacy settings can be adjusted through the infotainment system, “on a spectrum between” allowing all services including analysis data and none at all.

    You can opt out

    Drivers in the U.S. can ask carmakers to restrict what they do with their data.

    Under state privacy laws, some carmakers allow owners across the United States to submit requests to limit the use of their personal data, opt out of sharing it, or delete it, Consumer Reports says. Other auto companies limit the requests to people in states with applicable privacy laws, the publication says.

    You can file a request either through an online form or the carmaker’s mobile app.

    You can also go through Privacy4Cars, which provides a free online service that streamlines the process. It can either point car owners to their automaker’s request portal or file a submission on behalf of owners in the U.S., Canada, the European Union, Britain and Australia.

    … but there will be trade-offs

    Experts warn that there’s usually a trade-off if you decide to switch off data collection.

    Most people, for example, have switched to satellite navigation systems over paper maps because it’s “worth the convenience of being able to get from point A to point B really easily,” said Hendry Parsons.

    Turning off location tracking could also halt features like roadside assistance or disable smartphone app features like remote door locking, Consumer Reports says.

    BMW advises that if an owner opts to have no data shared at all, “their vehicle will behave like a smartphone in flight mode and will not transmit any data to the BMW back end.”

    When selling your car

    When the time comes to sell your car or trade it in for a newer model, it’s no longer as simple as handing over the keys and signing over some paperwork.

    If you’ve got a newer car, experts say you should always do a factory reset to wipe all the data, which will also include removing any smartphone connections.

    And don’t forget to notify the manufacturer about the change of ownership.

    Amico said that’s important because if you trade in your vehicle, you don’t want insurers to associate it with your profile if the dealer is letting customers take it for test drives.

    “Now your record may be affected by somebody else’s driving — a complete stranger that you have no relationship with.”

    ____

    Is there a tech topic that you think needs explaining? Write to us at [email protected] with your suggestions for future editions of One Tech Tip.

    ___

    This story has been corrected to show that the Mozilla representative’s first name is Lauren, not Laura.

    [ad_2]

    Source link

  • Russian hackers use fake CAPTCHA tests to spread new malware families across multiple targets

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Russian state-backed hackers have stepped up their game with new malware families that hide behind fake CAPTCHA tests. The group, known as Star Blizzard or ColdRiver, now uses ClickFix attacks to trick people into launching dangerous malware disguised as a simple “I’m not a robot” check.

    These attacks represent a new wave of cyber deception, targeting governments, journalists and NGOs with malware that keeps changing faster than researchers can analyze it.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    The ClickFix trap: A new kind of social engineering

    Google’s Threat Intelligence Group (GTIG) first observed the hackers using LostKeys malware in espionage operations. Once researchers exposed it, the attackers pivoted quickly, abandoning LostKeys within a week and deploying new tools: NoRobot, YesRobot and MaybeRobot.

    NORTH KOREAN HACKERS USE AI TO FORGE MILITARY IDS

    The ClickFix attack works like this: a victim lands on a fake CAPTCHA page that looks identical to the real thing. When they click to prove they’re human, the system silently runs NoRobot, infecting the computer and establishing persistence via registry changes and scheduled tasks.

    A fake “I’m not a robot” CAPTCHA can launch hidden malware in seconds. (Jens Büttner/picture alliance via Getty Images)

    Inside the Russian “robot” malware chain

    The Russian hackers built their latest attack around a chain of connected malware families that unfold step by step once a victim clicks the fake CAPTCHA.

    NoRobot: The entry point

    NoRobot acts as the first stage of infection. It prepares the environment by downloading files, modifying registry keys and creating tasks to ensure it stays active even after a reboot.

    YesRobot: The brief experiment

    The hackers briefly tested YesRobot, a Python-based backdoor, but dropped it quickly after realizing the full Python installation drew unwanted attention from defenders.

    3,000+ YOUTUBE VIDEOS DELIVER MALWARE DISGUISED AS FREE SOFTWARE

    MaybeRobot: The new weapon

    MaybeRobot replaced YesRobot as a stealthier PowerShell-based tool. It can download and execute payloads, run command prompts, and send stolen data back to the attackers. Researchers say MaybeRobot’s development has now stabilized, allowing the hackers to focus on refining NoRobot’s stealth.

    How these attacks keep evolving

    Security analysts noticed the malware’s delivery chain has shifted several times. At one point, it became “drastically simplified,” only to grow complex again as the attackers began splitting cryptographic keys across multiple files. This strategy makes it harder for researchers to reconstruct how infections work. Without every piece of the puzzle, the final malware payload cannot be decrypted correctly. 

    Who’s being targeted by the Russian malware

    ColdRiver’s operations have been linked to the Russian intelligence service (FSB), with years of activity focused on espionage and data theft. The group has consistently targeted Western governments, think tanks, media organizations and NGOs to steal sensitive information and gain strategic insight.

    Despite sanctions, infrastructure takedowns and public exposure, the hackers continue to evolve. Their quick shift from LostKeys to NoRobot and MaybeRobot shows a highly organized and well-funded operation capable of retooling within days.

    A Russian flag flies above the Russian Embassy in Berlin, Germany.

    Researchers warn that Russian hackers now use realistic CAPTCHA traps to spread new “Robot” malware strains. (Kristian Tuxen Ladegaard Berg/NurPhoto via Getty Images)

    CAPTCHAGEDDON SIGNALS A DANGEROUS SHIFT

    Even if you’re not a government or corporate target, these evolving attacks serve as a reminder that anyone connected to the internet is at some level of risk. Compromised personal accounts, reused passwords or infected email attachments can make everyday users an easy entry point for larger campaigns.

    While these threats may aim high, their reach extends everywhere. Awareness and cautious online behavior are essential for everyone.

    How to stay safe from Russian malware hidden in fake CAPTCHAs

    These practical steps can help you protect your data and devices from the growing wave of Russian malware using fake CAPTCHA pages to spread. 

    1) Be cautious with unexpected CAPTCHA challenges

    Fake “I’m not a robot” pages are the main lure in this Russian malware campaign. If you’re redirected to a CAPTCHA on an unfamiliar site or after clicking a suspicious link, stop immediately. Real CAPTCHAs usually appear only on trusted websites, not random pop-ups or login pages. When in doubt, close the page and verify the URL before taking any action.

    2) Use strong antivirus software

    Choose reputable antivirus protection that not only scans for known malware but also monitors suspicious behavior. Since the “Robot” malware evolves rapidly, behavior-based detection helps stop new variants before signature updates are available. Enable automatic updates and schedule daily scans to catch infections early. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 

    META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE

    3) Consider a data removal service to reduce exposure

    Many cyberattacks begin with publicly available data. Using a data removal or privacy protection service helps eliminate your personal information from data broker sites. By reducing what hackers can find online, you make it harder for them to tailor phishing emails or social engineering traps that lead to malware infection.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Keep all software and operating systems updated

    The malware used in these attacks exploits known security flaws in unpatched systems. Always apply updates as soon as they’re released. Turn on automatic updates for your browser, antivirus and operating system. Outdated software is one of the easiest entry points for Russian hackers and other advanced groups.

    Someone with a hoodie types suspiciously on a laptop that displays a dark screen.

    Cyber experts say awareness is the best defense as these evolving attacks target both organizations and everyday users. (Kurt “CyberGuy” Knutsson)

    AI FLAW LEAKED GMAIL DATA BEFORE OPENAI PATCH

    5) Use multi-factor authentication (MFA) everywhere possible

    Even if a hacker steals credentials through malware or phishing, MFA adds another layer of protection. Require it for email, VPNs, and cloud services. This simple step can block most unauthorized access attempts.

    6) Back up data regularly

    A ransomware payload could be the next evolution of this malware family. Back up critical data to both an external drive and cloud storage. 

    Kurt’s key takeaways

    The rise of these Russian malware campaigns is a reminder that cybercriminals are always one step ahead. What looks like a harmless “I’m not a robot” test can actually hide a serious threat. Protecting yourself isn’t just about having antivirus software; it’s about staying alert to small online details that can make a big difference. Keep your devices updated, question unexpected pop-ups, and use trusted tools to guard your personal information. With a little caution and consistency, you can outsmart even the most deceptive attacks.

    What concerns you most about today’s online security risks? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • How to stop impostor bank scams before they drain your wallet

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Losing your life savings to fraud is not a distant fear; it is a real and growing risk. Scams involving criminals pretending to be bank representatives have surged, with the Federal Trade Commission (FTC) reporting record-breaking losses exceeding $2.9 billion in recent data. These criminals no longer rely on basic phone tricks. Instead, they use caller ID spoofing and artificial-voice software to sound like trusted professionals, often imitating real bank employees down to the smallest detail.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    What impostor bank scams look like

    Scammers pretending to be from your bank follow a predictable yet terrifying pattern. They begin with an urgent phone call warning that your account has been compromised. The caller ID displays your bank’s real number, which builds instant trust.

    Impostor scams have become one of the fastest-growing crimes in America, costing victims billions each year. (Kurt “CyberGuy” Knutsson)

    Next, they instruct you to move your money into a so-called “safe” or “decoy” account while they “investigate” the issue. Their goal is to create fear and push you into action before you have time to think.

    One journalist reportedly learned this lesson the hard way when he answered what appeared to be a legitimate call from Chase Bank. After a series of convincing conversations with multiple “representatives,” he transferred nearly $30,000 to scammers. In another case, a 65-year-old caterer reportedly lost $162,000 when a friendly woman pretending to be a bank employee claimed her ATM card had been compromised. These stories are not rare; they reflect how sophisticated and believable modern scams have become.

    Why you and others are targets

    Banks are trusted institutions, and scammers know it. That trust makes impersonation one of the easiest and most effective fraud tactics today. With spoofing tools, criminals can mimic real bank phone numbers and even use AI to reproduce familiar voices. Their approach is psychological: they create panic and urgency to make victims act quickly and irrationally.

    Older adults are particularly vulnerable. The FTC found that losses of over $100,000 to impostor scams among people aged 60 and older have skyrocketed, from $55 million in 2020 to $445 million in 2024. These numbers highlight how no one is immune to manipulation when fear and urgency collide.

    A woman speaks on her cell phone.

    Criminals exploit fear, trust and technology to pressure victims into acting before they can think clearly. (Kurt “CyberGuy” Knutsson)

    9 smart tips to protect yourself from impostor scams 

    Impostor scams move fast, but with the right precautions, you can stop them before they strike.

    1) Never trust caller ID alone

    Spoofed numbers make a call appear as if it’s coming from your bank, even when it’s not.

    2) Hang up and call your bank using a verified number

    Do not return calls using numbers given to you by the person who contacted you. Always call the number printed on your debit or credit card.

    3) Use a data removal service to protect your identity

    Scammers often collect phone numbers, email addresses and other personal details from public records and data broker sites. Using a trusted data removal service helps wipe that information from the web, reducing the chances that criminals can use your data to impersonate you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    A woman talking on her cell phone

    Scammers often pose as bank employees, using fake caller IDs and urgent stories to trick people into sending money. (Kurt “CyberGuy” Knutsson)

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Your bank will never ask you to transfer money

    Any request to move funds “for protection” is a red flag for fraud.

    NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

    5) Use strong antivirus software

    Scammers often send fake links or pop-ups that install malicious programs on your device. A strong antivirus program can detect these threats, block phishing attempts and stop remote-access tools that give criminals control of your computer. Keeping your software updated adds another layer of protection against evolving scams.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Never share verification codes or PINs

    Banks do not ask for your codes over the phone, text or email.

    7) Use call-blocking or scam-identifier apps

    Adding these tools to your phone can filter many spoofed calls before they reach you. Both iPhone and Android devices have built-in settings and apps that help you stop scam calls before you even pick up.

    If you use an iPhone:

    • Go to Settings
    • Tap Apps
    • Click Phone
    • Under Unknown Callers, click Silence to automatically block unsaved numbers that aren’t in your contacts.

    Android phones offer similar protection:

    Settings may vary depending on your Android phone’s manufacturer. 

    • Go to the Phone app
    • Click Settings
    • Tap Caller ID & Spam
    • Click Filter Spam Calls, or you might be asked to toggle on Caller ID and spam protection, to automatically identify and block numbers flagged as potential scams.

    8) Pause if something feels urgent and frightening

    Scammers depend on panic. Taking a moment to breathe could save your savings.

    9) Report suspicious activity immediately

    If you suspect a scam, contact your bank, file a complaint with the FTC at ReportFraud.ftc.gov and alert local law enforcement.

    What to do if you’ve been targeted

    If you believe you have fallen victim, act quickly.

    1) Contact your bank and request a freeze or close monitoring of your accounts.

    2) File a report with the FTC and your local police department, even if you believe recovery is unlikely.

    3) Keep every piece of evidence, including phone records, text messages and transfer confirmations.

    4) Change all passwords and enable transaction alerts on every sensitive account to prevent further damage. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Sign up with an Identity Theft Protection service that can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Fraud can strike anyone, anywhere, at any time. Scammers have become smarter, faster and more convincing than ever before. They use fear, urgency and technology to make their lies sound real. But you can fight back with knowledge and caution. Stay alert every time your phone rings or your inbox pings. Slow down before you react. Verify before you trust. The few seconds you take to double-check could be what saves your life savings. Remember, even the most tech-savvy people fall for scams when emotions take over. The real key to protection isn’t fear, it’s awareness and action. Share what you know with friends, family and coworkers. The more people who understand how these scams work, the harder it becomes for criminals to win.

    Are banks really doing enough to protect you from impostor scams? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • California Legislation Could Lead to Better Online Privacy Nationwide

    [ad_1]

    The privacy changes web browsers will be required to make under a new California law could set the de facto standard for the entire country, changing how Americans control their data when using the internet, according to experts.

    Assembly Bill 566, recently signed into law by Gov. Gavin Newsom, requires companies that make web browsers to offer users an opt-out “signal” that automatically tells websites not to share or sell their personal information as they browse.

    It will likely be easier for companies to roll out the service for the entire country, rather than for users only in California.

    “It’s such a trivial implementation,” said Emory Roane, associate director of policy at Privacy Rights Clearinghouse, an organization that pushed for the legislation. “It’s really not that difficult technically.”

    The legislation, a first of its kind in the country, was sponsored by the California Privacy Protection Agency, the state’s consumer privacy watchdog, as well as several consumer advocacy and privacy rights groups.

    Under the law, browsers like Google’s Chrome and Microsoft’s Edge will have until the beginning of 2027 to create a way for consumers to select the signal. Combined with recent changes from other states, the new law could be a tipping point in how web traffic is treated in the United States.

    “We expect it to have a national impact,” Roane said.

    California already offers privacy protections under the California Consumer Privacy Act, including customers’ right to opt out from having their information sold.

    But advocates for the new law point out this still puts the burden on the consumer to navigate to web pages and individually select web pages to opt out from. The new tool will effectively automate that process, giving consumers a single toggle to keep their data protected.

    “I would argue if you have to go to every individual website and click the link saying you ‘don’t want your information sold or shared,’ that’s not really a meaningful privacy right,” said Caitriona Fitzgerald, deputy director of the Electronic Privacy Information Center, another organization that pressed for AB 566.

    Already, some browser makers have voluntarily offered similar settings under a framework called the Global Privacy Control. Mozilla’s Firefox, for example, includes a setting called “tell websites not to sell or share your data.” With that setting on, the browser communicates to sites that the visitor wants the site to respect the user’s preference.

    But until now, browsers haven’t been required to offer a setting that uses the Global Privacy Control or another standard to communicate users’ preferences. “There are browser extensions but those aren’t very widely used,” said Nick Doty, senior technologist at the Center for Democracy and Technology.

    Since it would likely be burdensome for companies to carve out a way to only allow the signal to be used by Californians, according to experts, the tool will likely be available across the country. How, exactly, that will look still remains to be seen. The legislation doesn’t require browser makers to use a specific standard.

    Spokespeople for Google and Microsoft declined to comment on the companies’ plans.

    There’s still a risk that some websites may try to detect which state a visitor is from, and only respect the signal if they find the visitor is from a state that mandates it.

    This is legally risky, though, according to Roane, who points out that AB 566 applies to residents of California, regardless of whether they’re using the web from California.

    “If I’m safe saying I’m a resident and you’re assuming I’m not and you’re flagrantly not respecting my privacy wishes, that is a violation of the law,” Roane said.


    Pushback from Google and the industry

    The law didn’t get across the finish line without friction. As CalMatters reported in September, despite not being publicly against the legislation, Google organized opposition to the bill through a group it backs financially.

    AB 566 also wasn’t the first attempt at such legislation. Newsom vetoed a similar, but slightly more expansive, version of the bill in 2024.

    But now that the door is open, some advocates say they are going to continue to push to further expand privacy preferences.

    Roane notes that legislation could be drafted that requires connected smart devices to offer an opt-out preference, or for vehicles that gather data on drivers to respect opt-out preference requests.

    “We are finally, finally starting to have real privacy rights,” Roane said, “but we’re far away from them being really easy to exercise across the country and across the border and even in states like California where we have these rights.”

    This story was originally published by CalMatters and distributed through a partnership with The Associated Press.

    Copyright 2025 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

    Photos You Should See – Oct. 2025

    [ad_2]

    Associated Press

    Source link

  • Protecting kids from AI chatbots: What the GUARD Act means

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new bipartisan bill introduced by Sens. Josh Hawley, R-Mo., and Richard Blumenthal, D-Conn., would bar minors (under 18) from interacting with certain AI chatbots. It taps into growing alarm about children using “AI companions” and the risks these systems may pose.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    What’s the deal with the proposed GUARD Act?

    Here are some of the key features of the proposed Guard Act:

    • AI companies would be required to verify user age with “reasonable age-verification measures” (for example, a government ID) rather than simply asking for a birthdate.
    • If a user is found to be under 18, a company must prohibit them from accessing an “AI companion.”
    • The bill also mandates that chatbots clearly disclose they are not human and do not hold professional credentials (therapy, medical, legal) in every conversation.
    • It creates new criminal and civil penalties for companies that knowingly provide chatbots to minors that solicit or facilitate sexual content, self-harm or violence.

    Bipartisan lawmakers, including Senators Josh Hawley and Richard Blumenthal, introduced the GUARD Act to protect minors from unregulated AI chatbots. (Kurt “CyberGuy” Knutsson)

    The motivation: lawmakers cite testimony of parents, child welfare experts and growing lawsuits alleging that some chatbots manipulated minors, encouraged self-harm or worse. The basic framework of the GUARD Act is clear, but the details reveal how extensive its reach could be for tech companies and families alike.

    META AI DOCS EXPOSED, ALLOWING CHATBOTS TO FLIRT WITH KIDS

    Why is this such a big deal?

    This bill is more than another piece of tech regulation. It sits at the center of a growing debate over how far artificial intelligence should reach into children’s lives.

    Rapid AI growth + child safety concerns

    AI chatbots are no longer toys. Many kids are using them. Hawley cited more than 70 percent of American children engaging with these products. These chatbots can provide human-like responses, emotional mimicry and sometimes invite ongoing conversations. For minors, these interactions can blur boundaries between machine and human, and they may seek guidance or emotional connection from an algorithm rather than a real person.

    Legal, ethical and technological stakes

    If this bill passes, it could reshape how the AI industry manages minors, age verification, disclosures and liability. It shows that Congress is ready to move away from voluntary self-regulation and toward firm guardrails when children are involved. The proposal may also open the door for similar laws in other high-risk areas, such as mental health bots and educational assistants. Overall, it marks a shift from waiting to see how AI develops to acting now to protect young users.

    A girl uses a smartphone.

    Parents across the country are calling for stronger safeguards as more than 70 percent of children use AI chatbots that can mimic empathy and emotional support. (Kurt “CyberGuy” Knutsson)

    Industry pushback and innovation concerns

    Some tech companies argue that such regulation could stifle innovation, limit beneficial uses of conversational AI (education, mental-health support for older teens) or impose heavy compliance burdens. This tension between safety and innovation is at the heart of the debate.

    What the GUARD Act requires from AI companies

    If passed, the GUARD Act would impose strict federal standards on how AI companies design, verify and manage their chatbots, especially when minors are involved. The bill outlines several key obligations aimed at protecting children and holding companies accountable for harmful interactions.

    • The first major requirement centers on age verification. Companies must use reliable methods such as government-issued identification or other proven tools to confirm that a user is at least 18 years old. Simply asking for a birthdate is no longer enough.
    • The second rule involves clear disclosures. Every chatbot must tell users at the start of each conversation, and at regular intervals, that it is an artificial intelligence system, not a human being. The chatbot must also clarify that it does not hold professional credentials such as medical, legal or therapeutic licenses.
    • Another provision establishes an access ban for minors. If a user is verified as under 18, the company must block access to any “AI companion” feature that simulates friendship, therapy or emotional communication.
    • The bill also introduces civil and criminal penalties for companies that violate these rules. Any chatbot that encourages or engages in sexually explicit conversations with minors, promotes self-harm or incites violence could trigger significant fines or legal consequences.
    • Finally, the GUARD Act defines an AI companion as a system designed to foster interpersonal or emotional interaction with users, such as friendship or therapeutic dialogue. This definition makes it clear that the law targets chatbots capable of forming human-like connections, not limited-purpose assistants.
    A boy holds a smartphone horizontally.

    The proposed GUARD Act would require chatbots to verify users’ ages, disclose they are not human and block under-18 users from AI companion features.  (Kurt “CyberGuy” Knutsson)

    OHIO LAWMAKER PROPOSES COMPREHENSIVE BAN ON MARRYING AI SYSTEMS AND GRANTING LEGAL PERSONHOOD

    How to stay safe in the meantime

    Technology often moves faster than laws, which means families, schools and caregivers must take the lead in protecting young users right now. These steps can help create safer online habits while lawmakers debate how to regulate AI chatbots.

    1) Know which bots your kids use

    Start by finding out which chatbots your kids talk to and what those bots are designed for. Some are made for entertainment or education, while others focus on emotional support or companionship. Understanding each bot’s purpose helps you spot when a tool crosses from harmless fun into something more personal or manipulative.

    2) Set clear rules about interaction

    Even if a chatbot is labeled safe, decide together when and how it can be used. Encourage open communication by asking your child to show you their chats and explain what they like about them. Framing this as curiosity, not control, builds trust and keeps the conversation ongoing.

    3) Use parental controls and age filters

    Take advantage of built-in safety features whenever possible. Turn on parental controls, activate kid-friendly modes and block apps that allow private or unmonitored chats. Small settings changes can make a big difference in reducing exposure to harmful or suggestive content.

    4) Teach children that bots are not humans

    Remind kids that even the most advanced chatbot is still software. It can mimic empathy, but does not understand or care in a human sense. Help them recognize that advice about mental health, relationships or safety should always come from trusted adults, not from an algorithm.

    5) Watch for warning signs

    Stay alert for changes in behavior that could signal a problem. If a child becomes withdrawn, spends long hours chatting privately with a bot or repeats harmful ideas, step in early. Talk openly about what is happening, and if necessary, seek professional help.

    6) Stay informed as the laws evolve

    Regulations such as the GUARD Act and new state measures, including California’s SB 243, are still taking shape. Keep up with updates so you know what protections exist and which questions to ask app developers or schools. Awareness is the first line of defense in a fast-moving digital world.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    The GUARD Act represents a bold step toward regulating the intersection of minors and AI chatbots. It reflects growing concern that unmoderated AI companionship might harm vulnerable users, especially children. Of course, regulation alone won’t solve all problems, industry practices, platform design, parental involvement and education all matter. But this bill signals that the era of “build it and see what happens” for conversational AI may be ending when children are involved. As technology continues to evolve, our laws and our personal practices must evolve too. For now, staying informed, setting boundaries and treating chatbot interactions with the same scrutiny we treat human ones can make a real difference.

    If a law like the GUARD Act becomes reality, should we expect similar regulation for all emotional AI tools aimed at kids (tutors, virtual friends, games) or are chatbots fundamentally different? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Australia adds Reddit and Kick to social media platforms banning children under 16

    [ad_1]

    MELBOURNE, Australia (AP) — Australia has added message board Reddit and livestreaming service Kick to its list of social media platforms that must ban children younger than 16 from holding accounts.

    The platforms join Facebook, Instagram, Snapchat, Threads, TikTok, X and YouTube in facing a world-first legal obligation to shut the accounts of younger Australian children from Dec. 10, Communications Minister Anika Wells said on Wednesday.

    Platforms that fail to take reasonable steps to exclude children younger than 16 could be punished with a fine of up to 50 million Australian dollars ($33 million).

    “We have met with several of the social media platforms in the past month so that they understand there is no excuse for failure to implement this law,” Wells told reporters in Canberra.

    “Online platforms use technology to target children with chilling control. We are merely asking that they use that same technology to keep children safe online,” Wells added.

    Australia’s eSafety Commissioner Julie Inman Grant, who will enforce the social media ban, said the list of age-restricted platforms would evolve with new technologies.

    The nine platforms currently age-restricted meet the key requirement that their “sole or significant purpose is to enable online social interaction,” a government statement said.

    Inman Grant said she would work with academics to evaluate the impacts of the ban, including whether children sleep or interact more or become more physically active.

    “We’ll also look for unintended consequences and we’ll be gathering evidence” so that others could learn from Australia’s achievements, Inman Grant said.

    Australia’s move is being closely watched by countries that share concerns about social media impacts on young children.

    European Commission President Ursula von der Leyen told a United Nations forum in New York in September that she was “inspired” by Australia’s “common sense” move to legislate the age restriction.

    Critics of the legislation fear that banning young children from social media will impact the privacy of all users, who must establish they are older than 16.

    Wells recently said the government seeks to keep platform users’ data as private as possible.

    More than 140 Australian and international academics with expertise in fields related to technology and child welfare signed an open letter to Prime Minister Anthony Albanese last year opposing a social media age limit as “too blunt an instrument to address risks effectively.”

    [ad_2]

    Source link

  • FBI Warns of Criminals Posing as ICE, Urges Agents to ID Themselves

    [ad_1]

    Criminals posing as US immigration officers have carried out robberies, kidnappings, and sexual assaults in several states, warns a law enforcement bulletin issued last month by the Federal Bureau of Investigation. The bureau urges agencies to ensure officers clearly identify themselves and to cooperate when civilians ask to verify an officer’s identity—including by allowing calls to a local police precinct. “Ensure law enforcement personnel adequality [sic] identify themselves during operations and cooperate with individuals who request further verification,” it says.

    First reported by WIRED, the bulletin cites five 2025 incidents involving fake immigration officers and says criminals are using Immigration and Custom Enforcement’s heightened profile to target vulnerable communities, making it harder for Americans to distinguish between lawful officers and imposters while eroding trust in law enforcement. A review of public reporting confirms four of the five cases described in the bulletin. One appears to have gone unreported, suggesting the FBI drew in part on internal law enforcement information. The document was first obtained by the transparency nonprofit Property of the People.

    On August 7, according to the FBI, three men in black vests entered a New York restaurant claiming to be ICE agents. Inside, they tied a worker’s hands and pulled a garbage bag over the person’s head. Another, believing the burglars’ story, surrendered themselves, only to be kicked to the ground and tied up as the intruders robbed an ATM.

    The bureau’s advisory urges agencies at every level of government to coordinate to “verify legitimate versus non-legitimate operations” attributed to ICE—a call that frames the wave of impersonations as a national law-enforcement concern.

    The FBI declined to comment. Its national press office said that it could only respond to media inquiries involving national security, violations of federal law, or essential public safety functions during the government shutdown.

    Cases cited by its advisory span kidnappings, street crime, and sexual violence: In Bay County, Florida, the advisory says, a woman “unzipped [her] jacket and revealed a shirt that said ICE” and told her ex-boyfriend’s wife she was there to “pick her up,” before driving her to an apartment complex. The woman later escaped. In Brooklyn, it alleges, a man told a woman he was an immigration officer and “directed [her] to a nearby stairwell,” where he punched her, tried to rape her, and stole her phone before police caught him. In Raleigh, North Carolina, it claims, a man “entered [a] motel room and threatened to deport the woman if she did not have sex with him,” telling her he was a sworn officer. He showed her a business card with a badge, police said.

    The FBI describes a few signs of impersonation: forged or mismatched credentials, outdated protective gear, and cloned vehicle markings. It’s urging agencies to launch outreach programs aimed at identifying fake ICE agents, a step the FBI argues could counteract the mistrust caused by impersonators and strengthen law enforcement’s image.

    [ad_2]

    Dell Cameron, Caroline Haskins

    Source link

  • Ghost-tapping scam targets tap-to-pay users

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new scam called ghost tapping is spreading across the country. The Better Business Bureau (BBB) warns that scammers are using this tactic to steal money from people who use tap-to-pay credit cards and mobile wallets.

    This scam exploits wireless technology to withdraw money without your awareness. Many victims only realize something is wrong after small, unnoticed transactions slowly drain their accounts.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    The Better Business Bureau warns of a new “ghost-tapping” scam draining money from tap-to-pay cards and mobile wallets. (Clara Margais/picture alliance via Getty Images)

    How the ghost-tapping scam works

    Scammers use near-field communication (NFC) devices that mimic legitimate tap-to-pay systems. In busy places such as festivals, markets, or public transportation, they move close enough to your wallet or phone to trigger a transaction.

    The BBB reports that some scammers pose as charity vendors or market sellers who only accept tap payments. Once you tap your card or phone, they charge far more than the agreed amount.

    Because the first few withdrawals are usually small, they often go undetected by fraud systems. Victims may not notice until much later, when more money has been taken.

    Real-life cases and warnings

    A Missouri resident reportedly lost $100 after being approached by a person carrying a handheld card reader. The BBB Scam Tracker has recorded many similar cases across the nation, with losses sometimes exceeding $1,000.

    Officials warn that scammers may pressure you to complete payments quickly, preventing you from verifying the amount or merchant name. Some even carry portable readers that can pick up signals through thin wallets or purses.

    How to protect yourself from ghost tapping

    While the threat of ghost tapping may sound alarming, protecting yourself is easier than you think. A few smart habits and security tools can greatly reduce your risk of falling victim.

    1) Use RFID-blocking technology

    Invest in an RFID-blocking wallet or card sleeve to create a physical barrier between your card and potential scanners. These inexpensive tools prevent scammers from reading your card information through clothing, bags, or wallets. Look for sleeves or wallets specifically designed to block wireless communication.

    2) Verify before you tap

    Always check the merchant name and transaction amount displayed on the payment terminal before tapping. Scammers often rush you to avoid scrutiny. Take an extra second to confirm what you see matches what you agreed to pay. If something looks off, cancel the transaction immediately.

    3) Set up instant alerts

    Enable instant transaction alerts from your bank or credit card provider. This lets you know the moment a payment is made, giving you a chance to spot unauthorized activity right away. Quick detection can prevent further charges and make it easier to dispute fraudulent transactions.

    Bonus protection: Even if you stop a scam early, your personal data can end up for sale online. Our No. 1 identity theft company monitors your credit and financial information, alerting you if your details appear on the dark web or in a data breach.  

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    You can also use a data removal service to automatically delete your personal information from data broker sites that sell it, keeping you off scam lists before the next attack.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

     

    Woman tapping her credit card at the groceries.

    The BBB says reports of “ghost tapping” are rising, with some victims losing more than $1,000 to contactless theft. (M. Scott Brauer/Bloomberg via Getty Images)

    4) Be cautious in crowded areas

    Crowded environments such as festivals, public transportation, or street fairs create perfect conditions for scammers to blend in. Limit tap-to-pay use in these situations. Instead, use chip or swipe methods, which require physical contact and are harder to exploit.

    5) Monitor your accounts regularly

    Make it a habit to check your financial accounts at least once a week. Review each transaction carefully and report anything suspicious to your bank immediately. Even small unexplained charges could signal a larger problem.

    6) Use payment app security features

    Most mobile wallet apps allow you to set PINs, facial recognition, or fingerprint verification before authorizing a transaction. Make sure these protections are enabled. This adds another barrier that prevents criminals from initiating payments without your consent.

    7) Keep your payment apps and devices updated

    Regularly update your smartphone’s software and mobile wallet apps. Updates often include security patches that protect against newly discovered vulnerabilities scammers might exploit. Outdated software can leave your data exposed.

    Stay protected from payment-stealing malware:

    In addition to keeping your apps updated, protect your device from hidden threats with strong antivirus software. It scans for malicious apps and spyware that can hijack your tap-to-pay data or record sensitive information. 

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    8) Avoid saving multiple cards on mobile wallets

    While convenient, storing several cards in one app can increase your exposure if your phone is compromised. Keep only the cards you use most often connected to your mobile wallet. This reduces the impact of potential fraudulent activity.

    9) Report suspicious activity promptly

    If you ever suspect ghost tapping or notice a strange charge, contact your bank immediately and report the scam to the BBB Scam Tracker. Quick action can help prevent additional losses and assist authorities in identifying scam trends.

    Man paying for his purchase.

    Victims of “ghost tapping” often lose money through small, unnoticed transactions before realizing they’ve been scammed. (Leonie Asendorpf/picture alliance via Getty Images)

    Kurt’s key takeaways

    As contactless payments become more common, scammers are getting more creative. Staying informed and cautious can help protect your money. Small steps like checking your transaction history and using protective gear can make a big difference. If you notice unauthorized charges, contact your bank immediately, freeze your card and report the scam to the BBB Scam Tracker. Technology offers convenience but can also create new risks. The ghost-tapping scam shows how quickly and easily payments can invite hidden dangers. Awareness and prevention remain the best ways to keep your finances safe.

    Will you keep using tap-to-pay after learning about ghost tapping, or switch back to more traditional payment methods? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 3,000+ YouTube videos deliver malware disguised as free software

    [ad_1]

    NEWYou can now listen to Fox News articles!

    YouTube is arguably the most popular and most visited platform for entertainment, education and tutorials. There’s a video for everything on YouTube, whether you want to learn how to cook, ride a bike or need help with work or school. But recent research by Check Point reveals a darker side: a sprawling malware distribution network quietly operating within the platform. Hackers are using compromised accounts, fake engagement and clever social engineering to spread information-stealing malware disguised in more than 3,000 software cracks and game hack videos.

    Most victims begin by searching for free or cracked software, cheat tools or game hacks, which is the root of the infection chain. This curiosity for “free” software opens the door to the Ghost Network’s traps.

    META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Cybercriminals are exploiting YouTube’s massive reach by disguising malware inside fake “how-to” and “free software” videos. (Kurt “CyberGuy” Knutsson)

    All about YouTube’s ghost network

    According to Check Point Research, the YouTube Ghost Network has been active since 2021, with activity surging threefold in 2025. It’s built around a simple but effective formula, which blends social manipulation with technical stealth. The network’s primary targets are people searching for “Game Hacks/Cheats” and “Software Cracks/Piracy.”

    Researchers discovered that these videos often feature positive comments, likes and community posts from compromised or fake accounts. This coordinated engagement gives potential victims a false sense of safety.

    The fake social proof and fabricated likes, comments and subscriber activity play a key psychological role. They trick viewers into believing the content is legitimate and widely trusted, allowing the operation to persist even when YouTube removes individual videos or channels. The network’s modular structure and constant replacement of banned accounts make takedowns only temporarily effective.

    Once a user clicks the provided links, they’re usually taken to file-sharing services or phishing sites hosted on Google Sites, MediaFire, Dropbox or similar platforms. The linked files are often password-protected archives, making them harder for antivirus tools to scan. Victims are then asked to disable Windows Defender before installation, effectively disarming their own protection before running the malware.

    Check Point found that the majority of these attacks deliver information-stealing malware such as Lumma Stealer, Rhadamanthys, StealC and RedLine. These programs harvest passwords, browser data and other sensitive information, sending it back to the attacker’s command and control servers.

    What makes the network particularly resilient is its role-based structure. Each compromised YouTube account serves a function; some upload malicious videos, others post download links and a third group boosts credibility by commenting and liking content. When an account gets banned, it’s quickly replaced, allowing the operation to continue largely uninterrupted.

    YouTube.com displayed on a laptop

    A single click on a malicious link can disable your defenses and install information-stealing malware in seconds. (Kurt “CyberGuy” Knutsson)

    Inside the malicious campaigns

    Two major campaigns stood out in Check Point’s investigation. The first involved the Rhadamanthys infostealer, spread through a compromised YouTube channel named @Sound_Writer, which had nearly 10,000 subscribers.

    The attackers uploaded fake cryptocurrency-related videos and used phishing pages on Google Sites to distribute malicious archives. These pages instructed viewers to “turn off Windows Defender temporarily,” assuring them it was a false alert. The archives contained executable files that quietly installed the Rhadamanthys malware, which connected to multiple control servers to exfiltrate stolen data.

    The second campaign, involving HijackLoader and Rhadamanthys, leveraged a much larger channel, @Afonesio1, with around 129,000 subscribers. Here, attackers uploaded videos offering cracked versions of Adobe Photoshop, Premiere Pro, and FL Studio.

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    One of these videos gained over 291,000 views and dozens of glowing comments claiming the software worked perfectly. The malware was hidden inside a password-protected archive linked through a community post. The installer used HijackLoader to drop the Rhadamanthys payload, which then connected to rotating control servers every few days to avoid detection.

    Even if you never complete the installation, you can still be at risk. Simply visiting the phishing or file-hosting sites may expose you to malicious scripts or credential theft prompts disguised as “verification” steps. Clicking the wrong link can compromise login data before any software is even installed.

    youtube smartphone

    Strong passwords, two-factor authentication, and regular security scans are your best defense against YouTube’s Ghost Network. (Cyberguy.com)

    7 steps you can take to stay safe from YouTube’s ghost network

    The Ghost Network succeeds by exploiting curiosity and trust. It disguises malware as “free software” or “game hacks,” relying on users to click before thinking. Protecting yourself means adopting habits that make it harder for attackers to fool you. Here are seven steps to stay safe:

    1) Avoid cracked software and cheat downloads

    Most infections start with people trying to download pirated or modified programs. These files are often hosted on unregulated file-sharing websites where anyone can upload malicious content. Even if a YouTube video looks polished or filled with positive comments, that doesn’t mean it’s safe. Official software developers and gaming studios never distribute downloads through YouTube links or third-party sites.

    Besides being dangerous, downloading cracked software also poses legal risks. Piracy violates copyright law and can lead to serious consequences, while giving cybercriminals a perfect delivery channel for malware.

    2) Use a strong antivirus

    Make sure you have a trusted antivirus solution installed and always running. Real-time protection can detect suspicious downloads and block harmful files before they do any damage. Schedule regular system scans and keep your antivirus updated so it can recognize the latest threats.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE

    3) Never disable your antivirus or Windows Defender

    If a tutorial or installer tells you to disable your security software, that’s a red flag. Malware creators use this trick to bypass detection. There’s no legitimate reason to turn off protection, even temporarily. The moment a file asks you to do so, delete it immediately.

    4) Be cautious with YouTube links and download sources

    Always inspect links before clicking. Hover over them to check the destination and avoid shortened or redirected URLs that hide their true target. Downloads hosted on unfamiliar domains or file-sharing sites should be treated as unsafe. If you need software, get it directly from the official website or trusted open-source communities.

    5) Use a password manager and enable two-factor authentication (2FA)

    Turning on 2FA for important accounts adds another layer of protection, ensuring that even if someone gets your password, they can’t access your account. Malware often aims to steal saved passwords and browser data. Storing credentials in a password manager keeps them encrypted and separate from your browser, making them harder to steal. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com

    6) Keep your operating system and apps updated

    Software updates don’t just bring new features, but they also fix security flaws that malware can exploit. Enable automatic updates for your system, browser, and commonly used applications. Staying up to date is one of the simplest ways to prevent infections.

    7) Use a trusted data removal service

    Even after securing your system, your personal information might already be circulating online from past breaches. A reliable data removal service can continuously scan and request deletion of your data from people-search and broker sites, making it harder for cybercriminals to exploit your exposed information.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Cybercriminals have evolved beyond traditional phishing and email scams. By exploiting a platform built on trust and engagement, they have created a scalable, self-sustaining system for malware distribution. Frequent file updates, password-protected payloads, and shifting control servers make these campaigns difficult for both YouTube and security vendors to detect and shut down.

    Do you think YouTube is doing enough to stop malware distribution on its platform? Let us know by writing to us at CyberGuy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Stop your smart TV from listening to you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most people do not realize their smart TV includes microphones that can capture sound even when voice commands are off. These tiny mics power voice search and assistants, but they also pose privacy risks. If that makes you uneasy, you are not alone. The good news is that it takes only a few minutes to disable your smart TV microphone and protect your conversations.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    Step one: Find the built-in mic switch

    Before opening menus, check your TV’s frame. Many models feature a small hardware switch that turns the microphone off completely.

    Look closely along the bottom or sides of your screen. Some switches are labeled “Built-in MIC.” On Samsung TVs, it’s often near the bottom right edge when facing the screen.

    Take back control of your space and enjoy your smart TV safely without your microphone listening.  (Kurt “CyberGuy” Knutsson)

    Slide the switch to “off.” Your TV may confirm the change with an on-screen message. This is the most reliable way to stop the mic because it physically cuts power to it.

    Step two: Disable the smart TV microphone in settings

    If your TV lacks a physical switch, go through its settings menu. While the exact names differ by brand, most follow a similar pattern.

    Press Home or Settings on your remote. Look for main sections such as SystemGeneral or Privacy. Inside, you’ll find microphone or voice options labeled Voice RecognitionVoice Assistant or Microphone Access.

    instructions for how to turn off the microphone on a Samsung smart TV

    Slide the built-in mic switch to stop your TV from listening. (Samsung)

    Examples:

    • Samsung: General → Voice
    • Sony: Privacy → Google Assistant
    • LG: User Agreements → Voice Settings

    Toggle off every feature that uses the microphone. Some options may appear in more than one place, so check each section carefully.

    instructions for how to turn off the microphone on a Samsung smart TV

    Use your TV’s settings to disable voice features and protect privacy. (Samsung)

    Step three: Balance convenience and privacy

    Turning off your TV’s microphone does not mean you lose smart features. Many remotes include a push-to-talk button that activates voice control only when pressed.

    If you rarely talk to your TV, keeping the microphone off makes sense. If you like using voice commands, enable it temporarily when you need it.

    Step four: Check connected devices and apps

    Even after you disable your smart TV microphone, voice-enabled apps and linked devices may still be listening.

    Check any connected smart assistants such as Alexa, Google Assistant or Bixby. These platforms can continue capturing audio through your phone, smart speaker or another device on the same network.

    STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE

    A remote control points at a television.

    Keep your privacy and still enjoy voice control, just use it when you need it. (Kurt “CyberGuy” Knutsson)

    Take a moment to review privacy settings in those apps as well. Turning off voice activity tracking across all your devices ensures that nothing in your home listens when you do not want it to.

    Why smart TVs have microphones at all

    Manufacturers include microphones to make TVs more interactive. You can ask for weather updates, control volume or find movies with your voice. It’s convenient, but it comes with trade-offs.

    Some companies state in their privacy policies that voice data may be shared with third parties for analysis. That means your living room chatter could leave your home.

    When you disable your smart TV microphone, you keep the benefits of a modern TV while limiting unwanted data collection.

    What this means for you

    By taking a few minutes to change one setting or flip one switch, you gain control over what your TV hears. It’s an easy way to improve your digital privacy without losing the entertainment experience you love.

    You still get streaming apps, vivid displays and fast connectivity, just with added peace of mind.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways 

    Smart TVs offer great features, but convenience should never cost you privacy. Whether you flip a switch or use your settings menu, you have the power to decide when your TV listens.

    Will you take back your living room privacy today or leave it as it is? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • What really happens on the dark web and how to stay safe

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The dark web often feels like a mystery, hidden beneath the surface of the internet that most people use every day. But to understand how scams and cybercrimes actually work, you need to know what happens in those hidden corners where criminals trade data, services and stolen access. 

    Cybercriminals rely on a structured underground economy, complete with marketplaces, rules and even dispute systems to operate safely away from law enforcement. By learning how these systems function, you can better understand the threats that could reach you and avoid becoming the next target.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    Learn how to protect your personal information from dark web threats with simple cybersecurity habits and tools. (Phil Barker/Future Publishing via Getty Images)

    Inside the hidden layers of the internet

    The internet is often divided into three layers: the clear web, the deep web and the dark web. The clear web is the open part of the internet that search engines like Google or Bing can index, including news sites, blogs, stores and public pages. Beneath it lies the deep web, which includes pages not meant for public indexing, such as corporate intranets, private databases and webmail portals. Most of the content in the deep web is legal but simply restricted to specific users.

    The dark web, however, is where anonymity and illegality intersect. It requires special software such as Tor to access, and much of its activity happens behind encryption and invitation-only walls. Tor, short for The Onion Router, was originally developed by the U.S. Navy for secure communication but has since become a haven for both privacy advocates and criminals.

    It anonymizes users by routing traffic through multiple encrypted layers, making it almost impossible to trace where a request truly came from. This anonymity allows criminals to communicate, sell data and conduct illegal trade with reduced risk of exposure.

    Over time, the dark web has become a hub for criminal commerce. Marketplaces once operated like eBay for illegal goods, offering everything from drugs and stolen credit card data to hacking tools and fake identities. Many of these platforms have been shut down, but the trade continues on smaller, more private channels, including encrypted messaging apps such as Telegram. Vendors use aliases, ratings and escrow systems to build credibility.

    Ironically, even among criminals, trust is a critical part of business. Forums often have administrators, verified sellers and mediators to settle disputes. Members who cheat others or fail to deliver are quickly blacklisted, and reputation becomes the main currency that determines who can be trusted.

    The criminal economy and how scams are born

    Every major cyberattack or data leak often traces back to the dark web’s underground economy. A single attack typically involves several layers of specialists. It begins with information stealers, malware designed to capture credentials, cookies and device fingerprints from infected machines. The stolen data is then bundled and sold in dark web markets by data suppliers. Each bundle, known as a log, might contain login credentials, browser sessions and even authentication tokens, often selling for less than $20.

    Another group of criminals, known as initial access brokers, purchases these logs to gain entry into corporate systems. With that access, they can impersonate legitimate users and bypass security measures such as multi-factor authentication by mimicking the victim’s usual device or browser. Once inside, these brokers sometimes auction their access to larger criminal gangs or ransomware operators who are capable of exploiting it further.

    Some of these auctions are run as competitions, while others are flash sales where well-funded groups can buy access immediately without bidding. Eventually, this chain of transactions ends with a ransomware attack or an extortion demand, as attackers encrypt sensitive data or threaten to leak it publicly.

    Interestingly, even within these illegal spaces, scams are common. New vendors often post fake listings for stolen data or hacking tools, collect payments and disappear. Others impersonate trusted members or set up counterfeit escrow services to lure buyers.

    Despite all the encryption and reputation systems, no one is truly safe from fraud, not even the criminals themselves. This constant cycle of deception forces dark web communities to build internal rules, verification processes and penalties to keep their operations somewhat functional.

    What you can do to stay ahead of dark web-driven threats

    For ordinary people and businesses, understanding how these networks operate is key to preventing their effects. Many scams that appear in your inbox or on social media originate from credentials or data first stolen and sold on the dark web. That is why basic digital hygiene goes a long way. Below are some steps you can take to stay protected.

    MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

    Hacker using a computer.

    From password managers to antivirus software, experts share practical ways to keep hackers out of your data. (Annette Riedl/picture alliance via Getty Images)

    1) Invest in personal data removal services

    A growing number of companies specialize in removing your personal data from online databases and people search sites. These platforms often collect and publish names, addresses, phone numbers and even family details without consent, creating easy targets for scammers and identity thieves.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    2) Use unique passwords and a password manager

    One of the easiest ways to stay safe online is to use unique, complex passwords for every account you own. Many breaches happen because people reuse the same password across multiple services. When one site is hacked, cybercriminals take those leaked credentials and try them elsewhere, a technique known as credential stuffing. A password manager eliminates this problem by generating strong, random passwords and securely storing them for you.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Install strong antivirus protection

    Antivirus software remains one of the most effective ways to detect and block malicious programs before they can steal your information. Modern antivirus solutions do far more than just scan for viruses. They monitor system behavior, detect phishing attempts and prevent infostealer malware from sending your credentials or personal data to attackers.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Keep your software updated

    Outdated software is one of the biggest entry points for attackers. Cybercriminals often exploit known vulnerabilities in operating systems, browsers and plugins to deliver malware or gain access to systems. Installing updates as soon as they are available is one of the simplest yet most effective forms of defense. Enable automatic updates for your operating system, browsers and critical applications.

    5) Enable two-factor authentication

    Even if your password gets leaked or stolen, two-factor authentication (2FA) adds an additional barrier for attackers. With 2FA, logging in requires both your password and a secondary verification method. This includes code from an authentication app or a hardware security key.

    6) Consider identity theft protection services

    Identity theft protection can provide early warnings if your personal information appears in data breaches or on dark web marketplaces. These services monitor your sensitive data, such as Social Security numbers, bank details or email addresses. If anything suspicious is detected, they alert you. Many providers also offer recovery assistance, helping you restore stolen identities or close fraudulent accounts. While no service can prevent identity theft entirely, these tools can shorten your response time and limit potential damage if your data is compromised.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Black keyboard with red lights.

    Protecting your identity starts with strong passwords, two-factor authentication and regular software updates. (Jens Kalaene/picture alliance via Getty Images)

    Kurt’s key takeaway

    The dark web thrives on the idea that anonymity equals safety. But while criminals may feel protected, law enforcement and security researchers continue to monitor and infiltrate these spaces. Over the years, many large marketplaces have been dismantled, and hundreds of operators have been caught despite their layers of encryption. The takeaway for everyone else is that the more you understand how these underground systems function, the better prepared you are to recognize warning signs and protect yourself.

    Do you think law enforcement can ever truly catch up with dark web criminals? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Microsoft’s blog recently gave a firm warning: unsupported systems aren’t just outdated, they’re unprotected. That message targets anyone still using Windows 10, and it’s serious. In Microsoft’s Digital Defense Report, over 90% of ransomware attacks hit unsupported PCs. That statistic alone should make every Windows 10 user think twice.

    When an operating system stops receiving updates, it becomes an open door for hackers. Security patches dry up, and vulnerabilities grow. So while your computer might seem fine today, it could already be compromised without your knowledge.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Why are unsupported systems dangerous

    Unsupported Windows 10 systems no longer get the updates that keep you safe. Without those patches, ransomware and malware have easy access to your files. Once inside, attackers can encrypt your personal data or steal credentials and banking details.

    It’s not just about losing files. Identity theft and financial fraud often start with outdated systems. The older the software, the easier it is for cybercriminals to exploit weaknesses that will never be fixed.

    The “just one more year” trap

    Many people tell themselves they’ll upgrade later. Microsoft calls this “just one more year” thinking. The problem is that every delay increases your risk. Extended security updates only offer limited coverage, and they don’t stop new types of attacks.

    Without Microsoft’s regular monitoring, new vulnerabilities stay hidden. You could be using your computer for months while attackers quietly collect your data. That’s a frightening thought, especially when most of it can be prevented by upgrading.

    Upgrading to Windows 11 keeps your system protected with ongoing security updates. (Microsoft)

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    The hidden costs of waiting to upgrade to Windows 11

    It’s easy to think upgrading costs too much. But what about the cost of losing your photos, business files or financial information? Data recovery, fraud resolution and downtime can cost far more than a new device.

    Hackers know users delay updates, and they actively look for outdated systems. Even one unsupported device in a home or office network can create a weak spot that exposes everything else.

    How to stay safe from unsupported Windows 10 security risks

    You can protect yourself right now with a few smart steps. These actions reduce your exposure, tighten your online defenses and prepare you for a smooth upgrade to Windows 11. The good news is that most of these changes only take a few minutes but make a major difference in your security.

    1) Upgrade your system to Windows 11

    HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY

    Start by checking whether your PC can handle Windows 11. Most modern AMD and Intel processors already meet the system requirements. Upgrading keeps your computer protected with ongoing updates that patch vulnerabilities and improve overall performance. It’s one of the simplest ways to defend against ransomware and malware before they strike.

    2) Watch out for phishing scams and install strong antivirus software

    Be cautious with every link and attachment you receive. Cybercriminals love sending fake update notifications that look like official Microsoft messages. These phishing scams often contain malicious links that install malware in seconds. Before you click, hover over links to verify their source and only download updates directly from Microsoft’s official site. To add an extra layer of protection, install strong antivirus software that can detect and block malicious files before they infect your system.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Signage outside the Microsoft Campus

    Delaying your Windows 11 upgrade only gives cybercriminals more time to strike. (Photographer: Chona Kasinger/Bloomberg via Getty Images)

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Use a data removal service

    HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

    Use a personal data removal service to take your information off people-search and data broker websites. These services help remove your name, address, phone number and other personal details that scammers often use for phishing or social-engineering attacks. By limiting what’s publicly available about you, you make it much harder for cybercriminals to target you, especially if your older, unsupported Windows 10 system is ever exposed online.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    4) Secure your logins

    Strong logins make a huge difference. Turn on two-factor authentication (2FA) for your most sensitive accounts, such as banking and email. Also, create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. This extra layer stops hackers, even if they manage to steal a password.

    WINDOWS 10 SUPPORT ENDS: UPGRADE TO WINDOWS 11 SAFELY

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords, and secure those accounts with new, unique credentials.

    Man typing on his laptop.

    Without Windows updates, hidden vulnerabilities give hackers easy access to your data. (Felix Zahn/Photothek via Getty Images)

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    5) Back up your data regularly

    Think of backups as your safety net. Save copies of important files to an external hard drive or a trusted cloud service. Schedule automatic backups so you don’t have to remember to do it yourself. If your PC ever gets locked by ransomware, a clean backup means you can restore everything without paying a cent.

    6) Stay informed and proactive

    Cyber threats evolve every day, and knowledge is your best defense. Keep an eye on official Microsoft announcements and alerts. Small changes, like applying updates quickly and revisiting your privacy settings, can keep you a step ahead of attackers.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Unsupported systems might look harmless, but they create silent risks that grow over time. Every day you stay on Windows 10 after support ends, you depend on luck instead of protection. Upgrading isn’t just about staying current; it’s about keeping your data safe and your privacy intact.

    Is holding on to Windows 10 worth risking everything stored on your computer? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 183 million email passwords leaked: Check yours now

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A massive online leak has exposed more than 183 million stolen email passwords gathered from years of malware infections, phishing campaigns and older data breaches. Cybersecurity experts say it is one of the largest compilations of stolen credentials ever discovered.

    Security researcher Troy Hunt, who runs the website Have I Been Pwned, found the 3.5-terabyte dataset online. The credentials came from infostealer malware and credential stuffing lists. This malware secretly collects usernames, passwords and website logins from infected devices.

    Researchers say the data contains both old and newly discovered credentials. Hunt confirmed that 91% of the data had appeared in previous breaches, but about 16.4 million email addresses were completely new to any known dataset.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    DISCORD CONFIRMS VENDOR BREACH EXPOSED USER IDS IN RANSOM PLOT

    Cyber experts uncovered a 3.5-terabyte data dump containing millions of stolen logins. (Kurt “CyberGuy” Knutsson)

    The real risk behind the password leak

    The leak puts millions of users at risk. Hackers often collect stolen logins from multiple sources and combine them into large databases that circulate on dark web forums, Telegram channels and Discord servers.

    If you have reused passwords across multiple sites, attackers can use this data to break into your accounts through credential stuffing. This method tests stolen username and password pairs on many different platforms.

    The risk remains real for anyone using old or repeated credentials. One compromised password can unlock social media, banking and cloud accounts.

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices.

    Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices. (Jens Büttner/picture alliance via Getty Images)

    Google responds to the reports

    Google confirmed there was no Gmail data breach. In a post on X, the company stated “reports of a Gmail security breach impacting millions of users are false. Gmail’s defenses are strong, and users remain protected.”

    Google clarified that the leak came from infostealer databases that compile years of stolen credentials from across the web. These databases are often mistaken for new breaches when, in fact, they represent ongoing theft activity. Troy Hunt also confirmed the dataset originated from Synthient’s collection of infostealer logs, not from a single platform or recent attack. While no new breach occurred, experts warn that leaked credentials remain dangerous because cybercriminals reuse them for future attacks.

    How to check if you were exposed

    To see if your email was affected, visit Have I Been Pwned. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the Synthient leak.

    Many password managers also include built-in breach scanners that use the same data sources. However, they may not yet include this new collection until their databases update.

    If your address shows up, treat it as compromised. Change your passwords immediately and turn on stronger security features to protect your accounts.

    COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE

    hacker on laptop

    The 183 million exposed credentials came from malware, phishing and old data breaches. (Kurt “CyberGuy” Knutsson)

    9 steps to protect yourself now

    Protecting your online life starts with consistent action. Each step below adds another layer of defense against hackers, malware and credential theft.

    1) Change your passwords immediately

    Start with your most important accounts, such as email and banking. Use strong, unique passwords with letters, numbers and symbols. Avoid predictable choices like names or birthdays. 

    Never reuse passwords. One stolen password can unlock multiple accounts. Each login should be unique to protect your data.

    A password manager makes this simple. It stores complex passwords securely and helps you create new ones. Many managers also scan for breaches to see if your current passwords have been exposed.

    Next, check whether your email has been caught in a recent credential leak. Our No. 1 password manager pick includes a built-in Breach Scanner that searches trusted databases, including the newly added Synthient data from Have I Been Pwned. It helps you find out if your email or passwords have appeared in any known leaks. If you see a match, change any reused passwords right away and secure those accounts with strong, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Enable two-factor authentication (2FA)

    Turn on 2FA wherever possible. It adds a powerful second layer of defense that blocks intruders even if they have your password. You will receive a code by text, app or security key. That code ensures only you can log in to your accounts.

    3) Use an identity theft service for continuous monitoring

    Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. It’s a smart way to stay one step ahead of hackers.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    4) Protect your devices with strong antivirus software 

    Infostealer malware hides inside fake downloads and phishing attachments. A strong antivirus software scans your devices to stop threats before they spread. Keep your antivirus updated and run frequent scans. Even one unprotected device can put your whole digital life at risk.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Avoid saving logins in your web browser

    Browsers are convenient but risky. Infostealer malware often targets saved passwords in your web browser. 

    6) Keep software updated

    Updates fix security flaws that hackers exploit. Turn on automatic updates for your operating system, antivirus and apps. Staying current keeps threats out. 

    7) Download only from trusted sources

    Avoid unknown websites that offer free downloads. Fake apps and files often contain hidden malware. Use official app stores or verified company websites. 

    8) Review your account activity often

    Check your accounts regularly for unusual logins or device connections. Many platforms show a login history. If something looks off, change your password and enable 2FA immediately.

    9) Consider a personal data removal service

    The massive leak of 183 million credentials shows just how far your personal information can spread and how easily it can resurface years later in aggregated hacker databases. Even if your passwords were part of an old breach, data like your name, email, phone number or address may still be available through data broker sites. Personal data removal services can help reduce your exposure by scrubbing this information from hundreds of these sites.

    While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    This leak highlights the ongoing danger of malware and password reuse. Prevention remains the best defense. Use unique passwords, enable 2FA and stay alert to keep your data safe. Visit Have I Been Pwned today to check your email and take action. The faster you respond, the better you protect your identity.

    Have you ever discovered your data in a breach? What did you do next? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.   

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Scammers target retirees as major 401(k) rule changes loom for 2026 tax year ahead nationwide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If you’re over 50 and maxing out your 401(k), there’s a big change coming in 2026 that could affect how much tax you pay on your “catch-up contributions.” While it’s mostly about taxes and retirement planning, there’s an unexpected side effect: scammers are circling. Every time your financial habits or personal data become public, it’s a chance for fraudsters to try to exploit you. Here’s what’s changing, why it matters, and how to protect yourself before the scammers come knocking.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    What’s changing with 401(k) catch-up contributions

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    Right now, if you’re over 50, you can make extra contributions to your 401(k) on top of the standard annual limit ($23,500 in 2025). These “catch-up” contributions are typically tax-deferred, meaning the money comes out of your paycheck before tax and grows tax-free until retirement.

    But starting in 2026, for anyone earning more than $145,000 in the previous year, these catch-up contributions will no longer be tax-deferred. Instead, they’ll become like the Roth 401(k), meaning you pay taxes on the money now, but it grows tax-free and can be withdrawn tax-free in retirement.

    That sounds simple, but it creates a ripple effect:

    • High earners will see less take-home pay now.
    • Tax planning gets trickier, and some people may consider restructuring their accounts or investment strategies.
    • And, most importantly for CyberGuy readers: these changes create new opportunities for scammers.

    Big 401(k) changes in 2026 could leave retirees exposed to new scam risks. (Cyberguy.com)

    Why the new rules could attract scammers

    FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING IT

    Scammers constantly look for financially active retirees. When rules like this change, fraudsters send out emails, calls, or letters pretending to be financial advisors, IRS agents, or plan administrators. Their goal? To trick you into giving away account numbers, Social Security details, or direct-deposit information.

    Some common scam tactics to watch for:

    • Fake “plan update” emails claiming you need to verify your 401(k) contributions due to the law change.
    • Roth conversion scam calls claiming you can “avoid extra taxes” by transferring your account through a third-party “advisor.”
    • Urgency and fear tactics, such as “Act now, or lose your retirement benefits!”

    Even savvy retirees can be caught off guard, especially when the message sounds official and references real tax law changes.

    How to protect yourself from 401(k) scams and data theft

    NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

    With new 401(k) rule changes taking effect, scammers are using the confusion to trick retirees and workers alike. Follow these steps to stay alert, safeguard your savings, and protect your personal data from being stolen or misused.

    1) Know the legitimate changes

    Start by understanding Secure 2.0 and how catch-up contributions will be taxed. Reliable sources include your plan administrator, the IRS website, or a licensed tax advisor. Staying informed helps you spot fake claims before they cause harm.

    2) Use a personal data removal service

    For retirees, this extra layer of protection keeps sensitive information out of reach from scammers who exploit tax changes, Roth conversions, and retirement updates. While you can manually opt out of data brokers and track your information, that process takes time and effort. A personal data removal service automates the task by contacting over 420 data brokers on your behalf. It also reissues removal requests if your data reappears and shows you a dashboard of confirmed removals.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Scam written on a tablet surrounded by cash

    Scammers are already targeting retirees with fake “account update” alerts. (Kurt “CyberGuy” Knutsson)

    HOW TO SECURE YOUR 401(K) PLAN FROM IDENTITY FRAUD

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    3) Verify every call and email, plus use antivirus software

    If you get a call or email about your 401(k), don’t assume it’s real. Hang up or delete it, then contact your plan administrator directly using official contact details. Avoid clicking links or downloading attachments from unknown messages.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    4) Monitor your credit and accounts

    Cybercriminals often use personal information from earlier data leaks or data brokers. Watch your credit reports and account activity closely. Early detection can stop suspicious transactions before they escalate.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    5) Set up alerts and freezes if necessary

    Ask your bank and retirement plan to enable transaction alerts. You can also temporarily freeze your credit to prevent anyone from opening new accounts in your name. This is especially useful during times of financial change.

    6) Educate friends and family

    Scammers often target retirees and their relatives who help manage finances. Remind your loved ones never to share account details over the phone or email. Protecting everyone in your household keeps scammers from finding weak links.

    Man reviews inheritance documents

    Stay safe by confirming any 401(k) changes directly with your plan provider. (uchar/Getty Images)

    Kurt’s key takeaways

    As 2026 approaches, the new 401(k) rule changes will reshape how millions of Americans manage their retirement savings. Staying informed, cautious, and proactive can protect your financial future. Scammers thrive on confusion, but by verifying information, monitoring your accounts, and removing your personal data from risky sites, you can stay one step ahead. Remember, the more control you take over your privacy, the harder it becomes for criminals to exploit it.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Have you taken steps to see where your personal data is exposed, and what did you find most surprising when you checked? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • CBP Searched a Record Number of Phones at the US Border Over the Past Year

    [ad_1]

    The recent spike in searches at the border has mostly been driven by an increase in the past six months. Between April and June, CBP searched 14,899 devices—which at the time marked a record high for any quarter of the year. However, the most recent figures show this increase has continued: Between July and September, there were 16,173 phones searched, the newly published CBP figures show.

    Over the past decade, there has been an uptick in the number of phone and electronics searches taking place at the border—with the increases taking place throughout multiple political administrations. Statistics published by the CBP show there were 8,503 searches in 2015. Since 2018, the number of yearly searches has risen from around 30,000 to more than 55,000 this year. The new figures are the first time searches have surpassed 50,000.

    CBP spokesperson Rhonda Lawson says that its most recent search numbers are “consistent with increases since 2021, and less than 0.01 percent” of travelers have devices searched. Lawson says searches can be conducted to “detect digital contraband, terrorism-related content, and information relevant to visitor admissibility.”

    “It may be helpful for travelers to know when they weigh the decision of what device to bring with them when traveling into the United States that searches of electronic personal devices are not new, the policy and procedures for searches have not changed, and that the likelihood of a search has not increased and remains exceedingly rare,” Lawson says.

    Of the 55,000 device searches that took place over the past 12 months, the vast majority of these (51,061) were basic searches, with a total of 4,363 advanced device searches—a 3 percent increase over the 2024 fiscal year.

    Federal courts remain split on whether advanced phone searches require warrants. The answer can change with the airport. The Eleventh and Eighth Circuits allow suspicionless searches of phones, while the Fourth and Ninth require reasonable suspicion for advanced, forensic searches. Recent district-court decisions in New York go further, requiring probable cause.

    Several incidents involving tourists, including a French scientist whose phone was reportedly searched to discover whether he had criticized Trump, have shown how easily the intensified screening can slip into international controversy. In June, a 21-year-old Norwegian tourist was reportedly denied entry at Newark Liberty International Airport because his phone contained a now-famous meme mocking Vice President JD Vance—a small act of humor allegedly treated as grounds for expulsion.

    CBP disputes many of those accounts, but the impression abroad is clear: The US is becoming an increasingly harder—if not more hostile—place to visit.

    [ad_2]

    Matt Burgess, Dell Cameron

    Source link

  • The Republican Plan to Reform the Census Could Put Everyone’s Privacy at Risk

    [ad_1]

    President Donald Trump and the Republican Party have spent the better part of the president’s second term radically reshaping the federal government. But in recent weeks, the GOP has set its sights on taking another run at an old target: the US census.

    Since the first Trump administration, the right has sought to add a question to the census that captures a respondent’s immigration status and to exclude noncitizens from the tallies that determine how seats in Congress are distributed. In 2019, the Supreme Court struck down an attempt by the first Trump administration to add a citizenship question to the census.

    But now, a little-known algorithmic process called “differential privacy,” created to keep census data from being used to identify individual respondents, has become the right’s latest focus. WIRED spoke to six experts about the GOP’s ongoing effort to falsely allege that a system created to protect people’s privacy has made the data from the 2020 census inaccurate.

    If successful, the campaign to get rid of differential privacy could not only radically change the kind of data made available, but could put the data of every person living in the US at risk. The campaign could also discourage immigrants from participating in the census entirely.

    The Census Bureau regularly publishes anonymized data so that policymakers and researchers can use it. That data is also sensitive: Conducted every 10 years, the census counts every person living in the United States, citizen and noncitizen alike. The data includes detailed information like the race, sex, and age, as well the languages they speak, their home address, economic status, and the number of people living in a house. This data is used for allocating the federal funds that support public services like schools and hospitals, as well as for how a state’s population is divided up and represented in Congress. The more people in a state, the more Congressional representation—and more votes in the Electoral College.

    As computers got increasingly sophisticated and data more abundant and accessible, census employees and researchers realized the data published by the Census Bureau could be reverse engineered to identify individual people. According to Title XIII of the US Code, it is illegal for census workers to publish any data that would identify individual people, their homes, or businesses. A a government employee revealing this kind of information could be punished with thousands of dollars in fines or even a possible prison sentence.

    For individuals, this could mean, for instance, someone could use census data without differential privacy to identify transgender youth, according to research from the University of Washington.

    [ad_2]

    Vittoria Elliott

    Source link

  • Beware fake credit card account restriction scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    It started with an urgent subject line: “Resolve Unusual Activity on Your American Express Account Now.” That is how one scam email tried to trick me into clicking a fake link that claimed to “verify account activity.” It looked official with logos, customer support tone and even a partial account number. But it was a phishing attempt, a common tactic used to steal personal and financial information.

    Let’s look at what made this message suspicious and how you can protect yourself.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOW TO SPOT AND STOP AI PHISHING SCAMS

    How the phishing email scam works

    Phishing emails copy trusted companies to create panic and urgency. The goal is simple: get you to click. In this case, the email claimed my American Express account was “temporarily restricted” until I verified my identity.

    A fake American Express email tried to steal personal data using urgent, fear-based language. (Kurt “CyberGuy” Knutsson)

    A closer look revealed several red flags:

    • The sender’s email was not from an official American Express domain.
    • The “Click Here” button linked to a strange website.
    • The message used fear-based language about account suspension.

    Each of these clues points to a fake email designed to steal login details or credit card numbers.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    Instructions on where to click.

    Learn to spot red flags like strange email addresses and fake “verify account” requests. (Kurt “CyberGuy” Knutsson)

    What to do if you receive a phishing email

    If an email looks suspicious:

    • Do not click any links.
    • Check the sender’s address. Real companies use verified domains, not random ones.
    • Go directly to the company website by typing the URL into your browser.
    • Report the email. American Express asks customers to forward phishing messages to spoof@americanexpress.com.
    • Delete the email right away.

    These steps can protect you from identity theft and financial fraud.

    PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS

    Person typing on their laptop.

    Strong passwords, 2FA and data removal services help defend against digital scams. (Neil Godwin/Future via Getty Images)

    10 tips to protect yourself from phishing emails

    Phishing scams that mimic real companies like American Express can slip into your inbox looking almost legitimate. The best way to stay safe is to create strong digital habits that protect your information and your peace of mind. Here are the top ways to defend yourself against phishing threats and financial fraud.

    1) Turn on two-factor authentication for financial accounts

    Adding two-factor authentication (2FA) creates an extra layer of protection. Even if a scammer gets your password through a fake American Express email, they cannot access your account without your verification code. Most banks and credit card companies offer this free feature in their security settings. Enable it today and make your login stronger.

    2) Consider using a data removal service

    Data removal services help clean up your personal information from data broker websites that collect and sell your details to advertisers, marketers and even scammers. Reducing your digital footprint limits the amount of information that phishing attackers can use to make fake emails look convincing. In the case of fake American Express messages, less personal data online means fewer details criminals can use to target you directly.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    3) Keep your browser and security software updated

    Outdated browsers and antivirus programs leave gaps that scammers can exploit. Regular updates close those gaps and strengthen your defense against phishing links and malicious downloads. Set your software to update automatically so you are always protected when opening emails or clicking links.

    4) Review account statements and transactions regularly

    Make it a habit to log into your credit card accounts directly from the official website, not from email links. Scan your statements for unfamiliar transactions. Early detection helps you report fraud fast and recover funds before more damage is done.

    5) Pause and verify before you click anything

    Phishing emails thrive on urgency. Before clicking, take a deep breath and ask yourself: Does this message feel pressured or suspicious? Instead of clicking “verify now,” open a new browser tab and visit the official credit card website to check your account. This one simple pause can stop a scam in its tracks.

    6) Use strong antivirus software

    Good antivirus software not only blocks viruses but also warns you when a site or email is unsafe. Choose a program that includes phishing detection, real-time web protection and email scanning. These tools can automatically block fraudulent look-alike emails before you even open them.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    7) Use an identity monitoring service

    Identity monitoring services keep watch over the dark web and alert you if your personal information, such as your email address, password, or credit card number, appears in stolen data. If scammers gain access to this information, they often use it to create realistic phishing attempts, like the fake American Express “account restricted” email. Early detection through identity monitoring allows you to take action, such as changing passwords, freezing credit, or alerting your bank before real damage occurs.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    8) Learn to recognize official communications

    Legitimate companies like American Express will never ask for full account numbers, passwords, or security codes by email. Familiarize yourself with how real messages from your bank look and sound. If something feels off, forward the message to the company’s official fraud department and delete it immediately.

    9) Back up your important data securely

    If a phishing attack installs malware on your computer, it can lock or delete files. Keep secure backups on an external drive or a trusted cloud service. That way, even if scammers target your system, you will not lose access to your information.

    10) Trust your instincts

    If an email feels wrong, it probably is. Your intuition is one of your strongest defenses against scams. Combine it with these habits to stay ahead of cybercriminals and keep your personal and financial information safe. 

    Kurt’s key takeaways

    Phishing scams are becoming more advanced, but your awareness is your best defense. When you know how to spot fake emails and stay calm under pressure, you protect both your money and your peace of mind. So next time you get an “urgent” message about your account, ask yourself: Would your bank really contact you this way?

    Have you ever received a suspicious email like this? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Meta AI edits your camera roll for better Facebook posts

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Your phone is full of photos you’ve never posted, moments you meant to share but never got around to. That’s exactly what Facebook wants to change. It now uses Meta AI to spot hidden gems in your camera roll, polish them, and create simple collages you can share. You take the pictures, and Facebook helps turn them into easy, ready-to-share memories. No design skills required.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Why Meta created this AI photo feature

    Many people take photos but then don’t share them because they feel the image isn’t “post-worthy,” or they simply don’t have time to make it look good.  Meta’s logic: if those moments are sitting unseen in your phone, screenshots, receipts, random snaps, they might still matter to you. So the tool helps you rediscover and share them. From Meta’s perspective, this also fits its bigger push into artificial intelligence-driven features across its apps.

    LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

    New AI tool scans your camera roll to find and polish images for quick sharing. (Kurt “CyberGuy” Knutsson)

    Behind the scenes, Meta AI analyzes photo details, like lighting, people and events, to group similar moments and create polished collage layouts automatically. It can suggest captions or filters, but users can edit or reject any suggestion before posting.

    How to enable the Facebook AI feature

    Here’s how to turn this feature on in Facebook (and how to disable it if you prefer).

    • Open the Facebook app on your phone (iOS or Android).
    • Tap your profile picture or the menu icon.
    • Go to Settings & Privacy.
    • Click Settings.

    META STRENGTHENS TEEN SAFETY WITH EXPANDED ACCOUNTS

    Instructions for Meta.

    Meta aims to revive old memories with Facebook’s AI-powered collage creator. (Kurt “CyberGuy” Knutsson)

    • Scroll to Preferences (or something similar) and find Camera Roll Sharing Suggestions and tap on it.
    • Toggle on ‘Get creative ideas made for you by allowing camera roll cloud processing’ (or similar wording). You may be prompted to allow “cloud processing,” whereby Facebook uploads photos from your device to its servers so Meta AI can analyze them.

    INSTAGRAM FRIEND MAP FEATURE SPARKS PRIVACY QUESTIONS

    Camera roll instructions.

    Users can now let Facebook’s AI curate camera roll highlights automatically. (Kurt “CyberGuy” Knutsson)

    • Confirm the opt-in and accept any permission prompts. Once enabled, Meta claims that only you see suggestions, and you decide if you save or share them.

    META DELETES 10 MILLION FACEBOOK ACCOUNTS THIS YEAR, BUT WHY?

    Camera roll instructions for Facebook.

    Facebook rolls out AI photo suggestions to make sharing easier than ever. (Kurt “CyberGuy” Knutsson)

    You’ll also receive optional notifications when new collage suggestions are ready, giving you the chance to preview and edit them before sharing.

    Steps to disable or opt out

    • Follow the same path: Facebook app → Settings & Privacy → Settings → Preferences → Camera Roll Sharing Suggestions.
    • Toggle the feature off or disable “cloud processing.”
    • For extra privacy, you can also revoke Facebook’s access to your camera roll in your phone’s OS settings.

    If you’ve already uploaded photos for analysis, Meta says you can delete that data by turning off the feature and clearing saved files under “Your Facebook Information” in Settings.

    What this means for you

    Here’s how Facebook’s new AI photo feature could change the way you share, save and see your favorite moments online.

    • More sharing without the effort. You capture the moment, Facebook helps polish it. The barrier of “this photo isn’t good enough” gets lowered.
    • Greater visibility for memories. That vacation scrapbook photo or family snap buried in your camera roll might now get a second life.
    • Full control remains. You decide whether to share the suggested edit or keep it private. Meta emphasizes that the suggestions are shown only to you unless you choose to share.
    • Privacy considerations. Even though Meta says your photos won’t be used to train AI unless you edit or share them, they do get uploaded to Meta’s cloud when you opt in and may be stored for some time. Meta confirms that the uploaded photos aren’t used for ad targeting or facial recognition, but they may be stored temporarily for processing before being deleted.
    • Limited rollout. At present, U.S. and Canada only; international users may need to wait.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    This move by Facebook addresses a common pain point (photos that don’t get shared) and leverages AI to make sharing more effortless. If you’re an active Facebook user who takes many photos and wants to share more of them, this feature could be a welcome boost. But if you’re cautious about how your private media may be handled, the opt-out path is important and worth using. Either way, it reflects how AI is quietly reshaping everyday apps.

    Will you turn on Facebook’s AI-powered photo suggestion feature or keep your camera roll private just the way it is?  Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Hundreds of People With ‘Top Secret’ Clearance Exposed by House Democrats’ Website

    [ad_1]

    The sensitive personal details of more than 450 people holding “top secret” US government security clearances were left exposed online, new research seen by WIRED shows. The people’s details were included in a database of more than 7,000 individuals who have applied for jobs over the last two years with Democrats in the United States House of Representatives.

    While scanning for unsecured databases at the end of September, an ethical security researcher stumbled upon the exposed cache of data and discovered that it was part of a site called DomeWatch. The service is run by the House Democrats and includes videostreams of House floor sessions, calendars of congressional events, and updates on House votes. It also includes a job board and résumé bank.

    After the researcher attempted to notify the House of Representatives’ Office of the Chief Administrator on September 30, the database was secured within hours, and the researcher received a response that simply said, “Thanks for flagging.” It is unclear how long the data was exposed or if anyone else accessed the information while it was unsecured.

    The independent researcher, who asked to remain anonymous due to the sensitive nature of the findings, likened the exposed database to an internal “index” of people who may have applied for open roles. Résumés were not included, they say, but the database contained details typical of a job application process. The researcher found data including applicants’ short written biographies and fields indicating military service, security clearances, and languages spoken, along with details like names, phone numbers, and email addresses. Each individual was also assigned an internal ID.

    “Some people described in the data have spent 20 years on Capitol Hill,” the researcher tells WIRED, noting that the information went beyond a list of interns or junior staffers. This is what made the finding so concerning, the researcher says, because they fear that if the data had fallen into the wrong hands—perhaps those of a hostile state or malicious hackers—it could have been used to compromise government or military staffers who have access to potentially sensitive information. “From the perspective of a foreign adversary, that is a gold mine of who you want to target,” the security researcher says.

    WIRED reached out to the Office of the Chief Administrator and House Democrats for comment. Some staff members WIRED contacted were unavailable because they have been furloughed as a result of the ongoing US government shutdown.

    “Today, our office was informed that an outside vendor potentially exposed information stored in an internal site,” Joy Lee, spokesperson for House Democratic whip Katherine Clark, told WIRED in a statement on October 22. DomeWatch is under the purview of Clark’s office. “We immediately alerted the Office of the Chief Administration Officer, and a full investigation has been launched to identify and rectify any security vulnerabilities.” Lee added that the outside vendor is “an independent consultant who helps with the backend” of DomeWatch.

    [ad_2]

    Lily Hay Newman, Matt Burgess

    Source link

  • Browser Password Managers Are Great, and a Terrible Idea

    [ad_1]

    By default, Google manages your encryption key, but it allows you to set up on-device encryption, which functions similarly to a zero-knowledge architecture. Your passwords are encrypted before being saved on your device, and you manage the key. Regardless of how the encryption works, Google uses AES, which is still the gold standard for security among password managers.

    It was trivial to decrypt Chrome passwords previously, requiring little more than a Python script and knowledge of where the files are stored. But even there, Google has pushed the security bar up. App-bound encryption has invalidated those methods, and cracking passwords is far more involved than it used to be. Further, Google has integrated with Windows Hello. If you choose, you can have Windows Hello protect your passwords each time you log in by asking for your PIN or biometric authentication.

    Other browsers aren’t as secure. Firefox, for instance, makes it clear that, although passwords saved in Firefox are encrypted, “someone with access to your computer user profile can still see or use them.” Brave works in a similar way, though I suspect most people using Brave are using a third-party password manager (and probably a VPN) already.

    Regardless, storing your passwords in even a less secure browser like Firefox is leaps and bounds better than not using a password manager at all. And the browsers at the forefront of market share, Chrome and Safari, have vastly improved their security practices over the past few years. The problem isn’t encryption—it’s putting all your eggs in one basket.

    Let’s Talk OpSec

    OpSec, or operational security, is normally a term used when talking about sensitive data in government or private organizations, but you can look at your own security through an OpSec lens. If you were an attacker and wanted to swipe someone’s passwords, how would you go about it? I know where I’d look first.

    Even with better security measures, the goal of a browser-based password manager is to get people using password managers. That has to be balanced against how easy the password manager is to use. In a blog post announcing changes to Google’s authentication methods from Google I/O this year, the company mentions reducing “friction” seven times, while “encryption” isn’t mentioned at all. That’s not a bad thing, but it’s a testament to how these tools are designed.

    You don’t need to pick out words from a blog post to see this focus. Google gives you the option to turn on Windows Hello or biometric authentication with the Google Password Manager. Each time you want to fill in a password, you’ll need to authenticate. That’s undoubtedly more secure than not authenticating each time, but the setting is turned off by default. It creates friction.

    [ad_2]

    Jacob Roach

    Source link