ReportWire

Tag: Privacy

  • When Face Recognition Doesn’t Know Your Face Is a Face

    [ad_1]

    “If you don’t include people with disabilities or people with facial differences in the development of these processes, no one’s going to think of these issues,” says Kathleen Bogart, a psychology professor at Oregon State University who specializes in disability research and lives with a facial difference. “AI has amplified these issues, but it’s rooted in long-standing underrepresentation and prejudice towards people with facial differences that occurred long before AI was a thing.”

    Too Little, Too Late

    When face verification systems fail, it’s often hard to find help—piling more pressure on a stressful situation. For months, Maryland resident Noor Al-Khaled has struggled to create an online account with the Social Security Administration. Al-Khaled, who lives with the rare cranio-facial condition Ablepheron Macrostomia, says having an online account would allow her to easily access SSA records and quickly send documents to the agency.

    “I don’t drive because of my vision; I should be able to rely on the site,” Al-Khaled says. “You have to take a selfie, and the pictures have to match,” Al-Khaled says. “Because of the facial difference, I don’t know if it’s not recognizing the ID or the selfie, but it’s always saying images don’t match.”

    Not having that access makes life harder. “On an emotional level, it just makes me feel shut out from society,” she explains. Al-Khaled says that all services should provide alternative ways for people to access online systems. “The lack of other fallback options means that sometimes people get trapped in these labyrinths of technological systems,” says Byrum from Present Moment Enterprises.

    Courtesy of WIRED source

    An SSA spokesperson says alternative options to face verification are available, and it is “committed” to making its services accessible to everyone. The agency, the spokesperson says, does not run facial recognition systems itself but uses Login.gov and ID.me for verification services. The General Services Administration, which runs Login.gov, did not respond to WIRED’s request for comment. “Accessibility is a core priority for ID.me,” a spokesperson for ID.me says, adding it has previously helped people with facial differences and offered to directly help Al-Khaled after WIRED was in touch.

    “There are few things more dehumanizing than being told by a machine that you’re not real because of your face,” says Corey R. Taylor, a New York–based actor and motivational speaker who lives with a craniofacial anomaly. Last year, Taylor says, he was using a financial app to access a small amount of money; as he tried to complete the payment processes, he found that the face verification system could not match his selfie to the image on his ID. To get the system to work, he had to move into different positions. “I had to literally raise my eyes and contort my face,” Taylor says. When he emailed the company, he got what appeared to be a boilerplate response.

    [ad_2]

    Matt Burgess

    Source link

  • How to spot and stop AI phishing scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Artificial intelligence can do a lot for us. Need to draft an email? AI has you covered. Looking for a better job? AI can help with that, too. It can even boost our health and fitness. Some tools, like AI-powered exoskeletons, can lighten heavy loads and improve performance. 

    But it’s not all sunshine and progress. Hackers are also turning to AI, and they’re using it to make phishing scams smarter and harder to spot. These scams are designed to trick people into handing over personal details or money. One woman recently lost $850,000 after a scammer, posing as Brad Pitt with the help of AI, convinced her to send money. Scary, right? 

    The good news is that you can learn to recognize the warning signs. Before we dive into how to protect yourself, let’s break down what AI phishing scams really are.

    HOW AI BROWSERS OPEN THE DOOR TO NEW SCAMS

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    A single click on a fake link could expose your personal information. (Kurt “CyberGuy” Knutsson)

    What are AI phishing scams?

    AI phishing scams are when hackers use AI to make their scams more convincing. AI helps them create super-realistic emails, messages, voices and even videos. This makes it harder for people to tell what’s real and what’s fake. Old-school phishing emails were easy to spot because of typos and bad grammar. However, thanks to AI tools like ChatGPT, hackers can now create flawless, professional-sounding emails that are much harder to detect. AI-generated phishing emails aren’t the only threat. Hackers are also using AI to pull off scams like:

    • Voice clone scams: They use AI to copy the voice of someone you know, like a friend or family member, to trick you.
    • Deepfake video scams: They create super-realistic videos of someone you trust, like a loved one or a celebrity, to manipulate you.

    Here’s how you can spot these AI-driven scams before they fool you.

    1) Spot common phishing email red flags

    Though hackers can use AI tools to write grammatically perfect email copy, AI phishing emails still have some classical red flags. Here are some telltale signs that it is an AI-driven phishing email:

    • Suspicious sender’s address that doesn’t match the company’s domain.
    • Generic greetings like “Dear Customer” instead of your name.
    • Urgent requests pressuring you to act immediately.
    • Unsolicited attachments and links requiring you to take action

    The biggest red flag is the sender’s email address. There is often a slight change in the spelling of the email address, or it is an entirely different domain name. For example, a hacker might use an email like xyz@PayPall.com or a personal address from Gmail.com, such as the email below, or Outlook.com while pretending to be from PayPal.

    An example of a phishing email

    Hackers are using AI to create scams that look frighteningly real. (Kurt “CyberGuy” Knutsson)

    2) Analyze the language for AI-generated patterns

    It used to be easier to spot phishing emails by noticing silly typos. Thanks to AI, hackers can now craft flawless emails. But you can still sense a phishing email if you analyze the language of the email body copy carefully. The most prominent sign of AI-generated email copy is that it looks highly formal with a dash of failed attempts to be personal. You might not notice it at first, but looking at it closely is likely to give a red flag. The language of such emails is often robotic.

    3) Watch for AI voice clone scam warning signs 

    With AI, it is possible to clone voices. So, there is no surprise that there is a steep rise in voice phishing, which is also known as vishing. Recently, a father lost $4 billion in Bitcoin to vishing. Though AI voice cloning has improved, it’s still flawed. You can spot inconsistencies by verifying the speaker’s identity. Ask specific questions that only the real person would know. This can reveal gaps in the scammer’s script. The voice, also, at times may sound robotic due to imperfections in voice cloning technology. So the next time, whenever you receive a call that creates a sense of urgency, ask as many questions as you can to verify the identity of the person. You may also consider verifying the claims through the second channel. If the person on the other side of the phone says something, you can get it confirmed by the official email to be on the safer side.

    GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS

    4) Identify visual glitches and oddities in video calls

    Deepfake videos are getting pretty convincing, but they’re not flawless yet. They have visual inconsistencies and oddities, which can make the voice or video appear fake. So watch the video carefully and try to catch the signs of unnatural eye movements, lip-sync issues, weird lighting, shadows and voice inconsistencies. You can also use a deepfake video detection tool to spot a fake video.

    5) Set up and use a shared secret

    A shared secret is something only you and your loved ones know. If someone claiming to be a friend or family member contacts you, ask for the shared secret. If they can’t answer, you’ll know it’s a scam.

    Young professional man works on laptop

    Hackers are turning to artificial intelligence to make phishing scams smarter and harder to spot. (miniseries/Getty Images)

    How to protect yourself from AI phishing scams

    AI phishing scams rely on tricking people into trusting what looks and sounds real. By staying alert and practicing safe habits, you can lower your risk. Here’s how to stay ahead of scammers:

    1) Stay cautious with unsolicited messages

    Never trust unexpected emails, texts or calls that ask for money, personal details or account access. Scammers use urgency to pressure you into acting fast. Slow down and double-check before clicking or responding. If something feels off, it probably is.

    2) Use a data removal service

    Protect your devices with a trusted data removal service to reduce the amount of personal info exposed online. Fewer exposed details make it harder for scammers to target you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    3) Check links before you click and install strong antivirus software

    Hackers often hide malicious links behind convincing text. Hover your cursor over a link to see the actual URL before you click. If the address looks odd, misspelled or unrelated to the company, skip it. Clicking blindly can download malware or expose your login details. Also, install strong antivirus software on all of your devices that blocks phishing links and scans for malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    4) Turn on two-factor authentication

    Even if a scammer steals your password, two-factor authentication (2FA) can keep them locked out. Enable 2FA on your email, banking and social media accounts. Choose app-based codes or a hardware key over text messages for stronger protection.

    5) Limit what you share online

    The more personal details you share, the easier it is for hackers to make AI scams believable. Avoid posting sensitive information like travel plans, birthdays or financial updates on social media. Scammers piece these details together to build convincing attacks.

    6) Verify requests through another channel

    If you get a message asking for money or urgent action, confirm it in another way. Call the person directly using a number you know, or reach out through official company channels. Don’t rely on the same email, text or call that raised suspicion in the first place.

    Kurt’s key takeaways 

    AI is making scams more convincing and harder to detect, but you can stay ahead by recognizing the warning signs. You should watch out for suspicious email addresses, unnatural language, robotic voices and visual glitches in videos, and always verify information through a second channel. You should also establish a shared secret with loved ones to protect yourself from AI-driven voice and video scams.

    Have you experienced any AI-driven phishing scams yet, and what do you think is the best way to spot such a scam? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data

    [ad_1]

    That suggests anyone could set up similar hardware somewhere else in the world and likely obtain their own collection of sensitive information. After all, the researchers restricted their experiment to only off-the-shelf satellite hardware: a $185 satellite dish, a $140 roof mount with a $195 motor, and a $230 tuner card, totaling less than $800.

    “This was not NSA-level resources. This was DirecTV-user-level resources. The barrier to entry for this sort of attack is extremely low,” says Matt Blaze, a computer scientist and cryptographer at Georgetown University and law professor at Georgetown Law. “By the week after next, we will have hundreds or perhaps thousands of people, many of whom won’t tell us what they’re doing, replicating this work and seeing what they can find up there in the sky.”

    One of the only barriers to replicating their work, the researchers say, would likely be the hundreds of hours they spent on the roof adjusting their satellite. As for the in-depth, highly technical analysis of obscure data protocols they obtained, that may now be easier to replicate, too: The researchers are releasing their own open-source software tool for interpreting satellite data, also titled “Don’t Look Up,” on Github.

    The researchers’ work may, they acknowledge, enable others with less benevolent intentions to pull the same highly sensitive data from space. But they argue it will also push more of the owners of that satellite communications data to encrypt that data, to protect themselves and their customers. “As long as we’re on the side of finding things that are insecure and securing them, we feel very good about it,” says Schulman.

    There’s little doubt, they say, that intelligence agencies with vastly superior satellite receiver hardware have been analyzing the same unencrypted data for years. In fact, they point out that the US National Security Agency warned in a 2022 security advisory about the lack of encryption for satellite communications. At the same time, they assume that the NSA—and every other intelligence agency from Russia to China—has set up satellite dishes around the world to exploit that same lack of protection. (The NSA did not respond to WIRED’s request for comment).

    “If they aren’t already doing this,” jokes UCSD cryptography professor Nadia Heninger, who co-led the study, “then where are my tax dollars going?”

    Heninger compares their study’s revelation—the sheer scale of the unprotected satellite data available for the taking—to some of the revelations of Edward Snowden that showed how the NSA and Britain’s GCHQ were obtaining telecom and internet data on an enormous scale, often by secretly tapping directly into communications infrastructure.

    “The threat model that everybody had in mind was that we need to be encrypting everything, because there are governments that are tapping undersea fiber optic cables or coercing telecom companies into letting them have access to the data,” Heninger says. “And now what we’re seeing is, this same kind of data is just being broadcast to a large fraction of the planet.”

    [ad_2]

    Andy Greenberg, Matt Burgess

    Source link

  • Don’t fall for fake settlement sites that steal your data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Sometimes, data breaches result in more than just free credit monitoring. Recently, Facebook began paying out its $725 million settlement, and AT&T is preparing to distribute $177 million. Those payouts caught scammers’ attention.

    Now, fake settlement claim emails and websites are flooding inboxes. They look convincing, but behind the plain design and official-sounding language is a trap for your Social Security number, banking info and more. So how can you make sure you get your money without losing even more in the process?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    TOP 5 OVERPAYMENT SCAMS TO AVOID

    Why fake settlement sites are so convincing

    Settlement claim websites rarely look polished. Most have generic layouts, long URLs and simple forms asking for a claim ID from your email or postcard. That makes it easy for scammers to mimic them. To test how simple it is, we created a fake settlement site (below) in minutes using AI tools like ChatGPT.

    To steal your data, scammers build fake settlement sites that mimic real sites (Kurt “CyberGuy” Knutsson)

    If we can do it, you can bet criminals are already exploiting the same shortcuts. Facebook has been the target. A fake site once popped up around the Equifax settlement, tricking thousands before it was shut down. The lesson? If the site appears unusual, it doesn’t necessarily mean it’s fake, but it should prompt you to double-check before entering your details or clicking on any links.

    Red flags that expose fake settlement sites

    Spotting a scam often comes down to noticing the little details. Watch for these common warning signs before you hand over your information.

    Requests for too much personal data

    If a site asks for your full Social Security number or the names of your children, stop. For example, the official Equifax settlement only requested the last six digits of SSNs. Genuine claim sites may ask for limited info (like the last four digits of your SSN), but they rarely demand complete Social Security or bank details.

    Promises of payout estimates upfront

    Real administrators calculate payments only after the claim period closes.

    Texts or social media messages

    Settlements are announced by mail or email, not through random DMs or SMS.

    Red flags like odd URLs, urgent countdowns, or fee requests often expose the fraud (Kurt "CyberGuy" Knutsson) 

    Fraud can be found with red flags like odd URLs, urgent countdowns, or fee requests (Kurt “CyberGuy” Knutsson)

    Odd or misspelled URLs

    Even one extra letter in the web address is a sign of a spoof site. Legitimate settlements use official or clearly named administrator domains. Be wary of addresses with unusual add-ons, such as “secure-pay” or “claims-pay.”

    Urgent language or countdowns

    Scammers rely on urgency to pressure you into acting fast. Real settlement sites don’t demand 24-hour turnarounds.

    Processing fee checkboxes

    A sure giveaway of a fake. Real settlement administrators never require money to file or to receive your payout.

    Cheap trust badges

    Scam sites often throw in fake “secure” seals. Look for recognized security seals and make sure they’re clickable and verifiable.

    Generic contact info tied to the suspicious domain

    Official sites list multiple, verifiable contacts. If the email or phone number matches the weird domain, that’s a red flag.

    Grammar or spelling mistakes in the fine print

    Sloppy errors in legal-sounding text are a classic sign you’re looking at a scam.

    Always start at official FTC links or mailed notices to file claims safely (Kurt "CyberGuy" Knutsson) 

    Start with official FTC links or mailed notices to file claims safely (Kurt “CyberGuy” Knutsson)

    How to safely handle settlement claim notices

    Before filing any claim, follow these steps to ensure you’re dealing with a legitimate settlement site and protecting your information.

    1) Start at the FTC

    The Federal Trade Commission keeps updated lists of approved class action settlements at ftc.gov/enforcement/refunds. The legitimate links always point to a .gov website. If your email sends you elsewhere, treat it with caution. 

    2) Cross-check with other resources

    Trusted outlets often cover large settlements and include safe links. ClassAction.org is another resource for checking legitimate URLs.

    3) Skip the links, use the mail

    Your claim notice may include a mailing address. Sending a paper form avoids the digital phishing minefield altogether.

    4) Use strong antivirus software

    Strong antivirus software can block malicious links, warn you about dangerous websites and prevent malware from taking over your device.

    The best way to safeguard yourself from malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

    HOW RETIREES CAN STOP FAKE DEBT COLLECTOR SCAMS

    5) Try a data removal service

    Data removal services work to scrub your personal information from broker lists, making it more difficult for criminals to target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Never pay to file

    If a site asks for “administrative fees” or a “processing charge,” close it immediately. Real settlement administrators will never ask for money.

    7) Report suspicious sites

    Spot a fake? Protect others by reporting it to:

    • The FTC Complaint Assistant at reportfraud.ftc.gov/
    • The Internet Crime Complaint Center (IC3) at ic3.gov/
    • The Consumer Financial Protection Bureau (CFPB) at consumerfinance.gov/about-us/the-bureau/

    Quick reporting helps authorities shut down scams before more people fall victim.

    Can you tell a real email from a fake?

    Take our quick quiz at Cyberguy.com/ScamCheck to learn how to spot phishing scams, protect your inbox, and stay a step ahead of hackers. 

    Kurt’s key takeaways

    Class action settlements can feel like rare wins for consumers after data breaches. But scammers see them as easy hunting grounds. The best defense is skepticism. Check URLs, avoid clicking direct links and never give away details that don’t match the claim’s purpose. Your payout should help you recover, not put you at greater risk.

    Have you ever received a settlement notice that felt suspicious, and how did you handle it? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.

    CLICK HERE TO GET THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Ethernet vs Wi-Fi security comparison reveals surprising results for home users seeking protection

    [ad_1]

    NEWYou can now listen to Fox News articles!

    We spend so much time online that how we connect to the internet has become almost as important as the devices we use. Most people never give it a second thought. They connect their computer to Wi-Fi, type in a password and get on with their day. But if you have ever wondered whether plugging in an Ethernet cable is safer than sticking to wireless, you are asking the right question. The way you connect can have real consequences for your privacy and security. Recently, Kathleen reached out to me with the same doubt.

    “Is it more secure to use the Ethernet connection at home for my computer, or is it safer to use the Wi-Fi from my cable provider?”

    It’s a great question, Kathleen, because both options seem similar on the surface but work very differently under the hood. Those differences can mean the difference between a private, secure connection and one that’s more vulnerable to attackers.

    BEWARE OF FAKE WI-FI NETWORKS THAT STEAL YOUR DATA WHEN TRAVELING

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Ethernet offers direct, wired security without wireless risks. (Kurt “CyberGuy” Knutsson)

    How Ethernet and Wi-Fi differ when it comes to security

    Ethernet and Wi-Fi both get you online, but they do it in completely different ways. Ethernet uses a physical cable that connects your computer directly to the router. Since it is a wired connection, data travels straight through that cable, making it much harder for anyone to intercept it. There is no wireless signal to hijack, no airwaves to eavesdrop on.

    Wi-Fi, on the other hand, is built on convenience. It sends your data through the air to and from your router, which is what makes it so easy to connect from anywhere in your home. But that convenience comes with more risk. Anyone within range of your signal could potentially try to break into the network. If your Wi-Fi is protected by a weak password or uses outdated encryption, a skilled attacker might gain access without ever stepping inside your house. 

    At home, that risk is smaller than in a coffee shop or hotel, but it is not zero. Even a poorly secured smart device on your network can give attackers a way in. Ethernet removes many of those risks simply because it is harder to access a connection that requires physical access to a cable. Check out our steps for setting up a home network like a pro here.

    DON’T USE YOUR HOME WI-FI BEFORE FIXING CERTAIN SECURITY RISKS

    Why one connection might be safer than the other

    It is easy to think Ethernet is automatically safer, but that is not the whole story. Your real security depends on how your entire network is set up. For example, a Wi-Fi network with a strong password, up-to-date router firmware, and WPA3 encryption is going to be far more secure than a poorly configured Ethernet setup connected to an outdated router.

    There is also the question of who else uses your network. If it is just you and a handful of devices, your risk is low. But if you live in a shared space or run smart home gadgets, that changes the equation. Each device connected to Wi-Fi is a potential entry point. Ethernet reduces the number of devices that can connect, which limits the attack surface.

    Ultimately, the connection type is one piece of the puzzle. The bigger factors are how your router is configured, how often you update your software, and how careful you are with what devices you connect.

    Wireless router with four antennas glowing in blue and pink light.

    Wi-Fi brings convenience but also potential exposure to hackers.  (Kurt “CyberGuy” Knutsson)

    6 ways to make your internet safer

    Whether you stick with Wi-Fi or switch to Ethernet, there are several practical steps you can take to protect your devices and data. Each step adds an extra layer of security to your network.

    IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN

    1) Use a strong network password

    Choose a long and unique password for your Wi-Fi. Avoid obvious choices like your name, address, or simple sequences. A strong password makes it far harder for attackers to guess or crack your network. A password manager helps you create and store strong, unique passwords for every account, reducing the chances of a hacker gaining access through weak or repeated credentials.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    2) Enable the latest encryption on your router

    Most modern routers support WPA3, which is much more secure than older standards like WPA2. Check your router’s settings to enable the latest encryption and ensure your network traffic is harder to intercept.

    3) Keep your router firmware updated

    Router manufacturers regularly release updates that patch security vulnerabilities. Log into your router’s admin panel occasionally to check for updates and install them as soon as they are available. This prevents attackers from exploiting known flaws. 

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    4) Review connected devices

    Regularly check which devices are connected to your network and disconnect anything you no longer use. Each connected device is a potential entry point for attackers, so keeping the list limited reduces your network’s exposure.

    5) Install strong antivirus software

    Even on a secure network, malware can sneak in through downloads, phishing attacks, or compromised websites. A strong antivirus program will detect and block malicious activity, protecting your computer before damage occurs.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    Close-up of a Wi-Fi router showing Ethernet ports and connected network cables.

    Ethernet cables connect to a router as part of a home network setup. (Kurt “CyberGuy” Knutsson)

    6) Use a VPN for sensitive tasks

    A virtual private network encrypts your internet traffic, making it unreadable to outsiders. This is especially useful if you ever use Wi-Fi in public or need an extra layer of privacy at home. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com/VPN

    Kurt’s key takeaway

    So, which is safer, Ethernet or Wi-Fi? Ethernet wins in raw security because it eliminates many of the risks that come with wireless connections. But in a well-secured home network, the difference is often smaller than most people think. What matters more is how you manage your devices, passwords, software, and online habits.

    CLICK HERE TO GET THE FOX NEWS APP

    Would you trade the flexibility of wireless for the peace of mind of a wired connection? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Hackers leak children’s data in major nursery breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Over the past few years, data breaches targeting schools, healthcare providers, and childcare services have been making headlines, exposing sensitive personal information and leaving families vulnerable. Now, a new breach has come to light that targets a nursery chain. Kido, which operates in the U.S., U.K., China and India, has reportedly had sensitive data stolen from thousands of children. Names, photos, addresses, birthdates, parental details and even safeguarding notes and medical records were allegedly accessed by a hacker group called Radiant.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    The incident highlights how stolen data threatens not just privacy but also long-term child safety. (Kurt “CyberGuy” Knutsson)

    What you need to know about nursery breach

    According to reports, the hacker group Radiant claims to have stolen data related to around 8,000 children. To prove possession, they posted samples, including pictures and profiles of ten children, on a darknet website. They then issued a ransom demand, threatening to release more sensitive information unless Kido paid. In addition to targeting the nursery chain directly, Radiant reportedly called some of the children’s parents, pressuring them to push Kido into paying the ransom.

    FBI WARNS ABOUT NEW EXTORTION SCAM TARGETING SENSITIVE DATA

    When questioned about their actions, the group defended their tactics as a form of “penetration testing” for which they supposedly deserved compensation. This defense is misleading, as such testing requires explicit permission from the organization being targeted or participation in an official bug bounty program. Without that consent, these actions are illegal and deeply unethical.

    A hacker types on a red, glowing keyboard.

    Hackers exploited children’s data in the Kido breach, exposing families to serious risks. (Kurt “CyberGuy” Knutsson)

    Why is this attack so disturbing?

    The Kido breach is alarming for multiple reasons. First, it involves children’s data, which is particularly sensitive and legally protected in most countries. Second, the attackers combined traditional data theft with intimidation tactics, reaching out to parents directly. History suggests that once criminals gain access to such information, the attacks can escalate.

    Breaches like this highlight how personal and digital security are intertwined. The potential misuse of data extends beyond simple identity theft. It can impact children’s safety, family privacy and long-term well-being. With attackers leveraging both the stolen data and psychological pressure on parents, the threat is particularly potent and long-lasting.

    A hacker types in a code terminal on a MacBook.

    Parents reported being directly contacted by attackers, showing how intimidation adds to the harm. (Kurt “CyberGuy” Knutsson)

    7 steps parents can take to protect their child’s data

    Even though the investigation into the Kido breach is ongoing, parents and schools can take immediate action to protect children’s data and reduce the risk of further exploitation. Here’s a detailed guide:

    1) Monitor your child’s online accounts regularly

    Log in to email, school portals and cloud storage accounts linked to your child. Look for unusual activity such as unrecognized logins, changes to passwords or new connected devices. Set up notifications for account activity whenever possible so you are alerted instantly if something suspicious happens.

    2) Enable two-factor authentication (2FA) on all accounts

    Adding 2FA creates an extra layer of security. Even if a hacker has a password, they won’t be able to access the account without the second verification step. Most email providers, school portals and messaging platforms support this, and it’s a simple step that dramatically improves security.

    3) Consider a personal data removal service

    Data broker sites often collect names, addresses and other personal details that hackers can use. Services that remove your child’s information from these databases can make it harder for attackers to find and exploit sensitive data.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScan

    THINK YOU’RE SAFE? IDENTITY THEFT COULD WIPE OUT YOUR ENTIRE LIFE’S SAVINGS

    4) Use identity theft protection services

    These services can continuously scan for your child’s personal information online and alert you if their data appears on suspicious websites or the dark web. This early warning allows you to take action before criminals attempt to exploit it.

    Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com/IdentityTheft

    5) Install antivirus software on all devices

    A strong antivirus program protects devices from malware, phishing scams, and suspicious scripts. It is particularly important on devices that children use to access school portals or personal accounts. This ensures that if a hacker tries to use malware to get deeper access, it is blocked.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech

    6) Use a secure mail provider for sensitive communications

    For communications with schools, healthcare providers or any service handling sensitive information about children, consider using an email service that offers strong encryption and built-in protection against spoofing. This makes it harder for attackers to impersonate a school or parent.

    For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com/Mail

    7) Educate your children about online safety

    Teach children not to share personal information online, including photos, addresses or school details. Encourage them to report anything suspicious and explain why it’s important to keep login information private.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Data breaches targeting children are particularly concerning because they can have long-lasting consequences. The Kido incident is a stark reminder of the importance of proactive digital security measures for families. While organizations bear responsibility for protecting sensitive data, parents can take significant steps to monitor, secure and respond to potential threats.

    Have you ever reviewed what personal information about your child is online? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Proton VPN Is the VPN Most People Should Use

    [ad_1]

    On average, Proton dropped about 15 percent of my unprotected speed, but that number needs some context. In a location like Atlanta, Georgia, midday on a Thursday, I experienced a drop of only around 3 percent. In Columbus, Ohio, in the evening on a Friday, that grew to a 25 percent drop. This type of variation is normal. Providers like Surfshark and NordVPN see similar variations and have similar speed drops on average.

    The difference for Proton is that I’ve yet to stumble upon a real stinker of a server. I’m sure they exist—with some 15,000+ servers, you’re bound to find one at some point—but I haven’t seen them after weeks of use. Windscribe and ExpressVPN are competitive with Proton on average, but they also have some locations where I saw anywhere from a 40 to 60 percent drop in speed. Those results aren’t indicative of the speed overall (you just swap to a different server), but Proton gets you there faster.

    That edge is likely due to Proton’s VPN Accelerator. I’ll admit, it sounded like nonsense. In the Proton VPN app, you’ll find a toggle for VPN Accelerator, which boldly claims to increase speed by up to 400 percent; not likely. Despite the speedup, I don’t think VPN Accelerator will reach anywhere near that quoted number, at least in the vast majority of cases.

    Still, there are some advantages, most notably, BBR. Bottleneck Bandwidth and Round-trip propagation time, or BBR, is a congestion control algorithm developed by Google that’s been deployed on YouTube and Google itself. Rather than limiting packet transfer when packets are lost, as most congestion control algorithms work, BBR models the network and estimates available bandwidth. It doesn’t need to see lost packets to kick in.

    Proton’s speeds aren’t entirely attributable to BBR, but I suspect it helps when connecting to servers over long distances. Connecting in the UK, for example, I saw an average speed loss of around 20 percent, which is much closer to my US results than it has any right to be.

    [ad_2]

    Jacob Roach

    Source link

  • K-12 districts are fighting ransomware, but IT teams pay the price

    [ad_1]

    Key points:

    The education sector is making measurable progress in defending against ransomware, with fewer ransom payments, dramatically reduced costs, and faster recovery rates, according to the fifth annual Sophos State of Ransomware in Education report from Sophos.

    Still, these gains are accompanied by mounting pressures on IT teams, who report widespread stress, burnout, and career disruptions following attacks–nearly 40 percent of the 441 IT and cybersecurity leaders surveyed reported dealing with anxiety.

    Over the past five years, ransomware has emerged as one of the most pressing threats to education–with attacks becoming a daily occurrence. Primary and secondary institutions are seen by cybercriminals as “soft targets”–often underfunded, understaffed, and holding highly sensitive data. The consequences are severe: disrupted learning, strained budgets, and growing fears over student and staff privacy. Without stronger defenses, schools risk not only losing vital resources but also the trust of the communities they serve.

    Indicators of success against ransomware

    The new study demonstrates that the education sector is getting better at reacting and responding to ransomware, forcing cybercriminals to evolve their approach. Trending data from the study reveals an increase in attacks where adversaries attempt to extort money without encrypting data. Unfortunately, paying the ransom remains part of the solution for about half of all victims. However, the payment values are dropping significantly, and for those who have experienced data encryption in ransomware attacks, 97 percent were able to recover data in some way. The study found several key indicators of success against ransomware in education:

    • Stopping more attacks: When it comes to blocking attacks before files can be encrypted, both K-12 and higher education institutions reported their highest success rate in four years (67 percent and 38 percent of attacks, respectively).
    • Following the money: In the last year, ransom demands fell 73 percent (an average drop of $2.83M), while average payments dropped from $6M to $800K in lower education and from $4M to $463K in higher education.
    • Plummeting cost of recovery: Outside of ransom payments, average recovery costs dropped 77 percent in higher education and 39 percent in K-12 education. Despite this success, K-12 education reported the highest recovery bill across all industries surveyed.

    Gaps still need to be addressed

    While the education sector has made progress in limiting the impact of ransomware, serious gaps remain. In the Sophos study, 64 percent of victims reported missing or ineffective protection solutions; 66 percent cited a lack of people (either expertise or capacity) to stop attacks; and 67 percent admitted to having security gaps. These risks highlight the critical need for schools to focus on prevention, as cybercriminals develop new techniques, including AI-powered attacks.

    Highlights from the study that shed light on the gaps that still need to be addressed include:

    • AI-powered threats: K-12 education institutions reported that 22 percent of ransomware attacks had origins in phishing. With AI enabling more convincing emails, voice scams, and even deepfakes, schools risk becoming test grounds for emerging tactics.
    • High-value data: Higher education institutions, custodians of AI research and large language model datasets, remain a prime target, with exploited vulnerabilities (35 percent) and security gaps the provider was not aware of (45 percent) as leading weaknesses that were exploited by adversaries.
    • Human toll: Every institution with encrypted data reported impacts on IT staff. Over one in four staff members took leave after an attack, nearly 40 percent reported heightened stress, and more than one-third felt guilt they could not prevent the breach.

    “Ransomware attacks in education don’t just disrupt classrooms, they disrupt communities of students, families, and educators,” said Alexandra Rose, director of CTU Threat Research at Sophos. “While it’s encouraging to see schools strengthening their ability to respond, the real priority must be preventing these attacks in the first place. That requires strong planning and close collaboration with trusted partners, especially as adversaries adopt new tactics, including AI-driven threats.”

    Holding on to the gains

    Based on its work protecting thousands of educational institutions, Sophos experts recommend several steps to maintain momentum and prepare for evolving threats:

    • Focus on prevention: The dramatic success of lower education in stopping ransomware attacks before encryption offers a blueprint for broader public sector organizations. Organizations need to couple their detection and response efforts with preventing attacks before they compromise the organization.
    • Secure funding: Explore new avenues such as the U.S. Federal Communications Commission’s E-Rate subsidies to strengthen networks and firewalls, and the UK’s National Cyber Security Centre initiatives, including its free cyber defense service for schools, to boost overall protection. These resources help schools both prevent and withstand attacks.
    • Unify strategies: Educational institutions should adopt coordinated approaches across sprawling IT estates to close visibility gaps and reduce risks before adversaries can exploit them.
    • Relieve staff burden: Ransomware takes a heavy toll on IT teams. Schools can reduce pressure and extend their capabilities by partnering with trusted providers for managed detection and response (MDR) and other around-the-clock expertise.
    • Strengthen response: Even with stronger prevention, schools must be prepared to respond when incidents occur. They can recover more quickly by building robust incident response plans, running simulations to prepare for real-world scenarios, and enhancing readiness with 24/7/365 services like MDR.

    Data for the State of Ransomware in Education 2025 report comes from a vendor-agnostic survey of 441 IT and cybersecurity leaders – 243 from K-12 education and 198 from higher education institutions hit by ransomware in the past year. The organizations surveyed ranged from 100-5,000 employees and across 17 countries. The survey was conducted between January and March 2025, and respondents were asked about their experience of ransomware over the previous 12 months.

    This press release originally appeared online.

    Latest posts by eSchool Media Contributors (see all)

    [ad_2]

    ESchool Media Contributors

    Source link

  • How public probate records fuel inheritance scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Grieving the loss of a loved one is hard enough, and families are lucky if they’re able to prepare in advance for the worst. What most families aren’t prepared for, though, are the predatory calls and letters that begin just weeks after filing probate paperwork – the records necessary to officially manage the estate and assets of the decedent. 

    Digital scams take advantage of families during this time. They rely on probate records in particular, as they contain sensitive information and are a part of the public record. Fraudsters pose as attorneys, debt collectors and estate service providers, each demanding the immediate payment of made-up fees. This is also known as the “inheritance trap.” It’s a growing kind of cybercrime where scammers exploit public probate records to target grieving families when they’re at their most vulnerable.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    The probate system’s problem with privacy

    Probate is a normal, legal process of settling a deceased person’s estate, and in most state jurisdictions, these filings become part of the public record. While transparency serves legitimate purposes, it creates an opportunity for scammers. Probate documents typically include:

    • Names and addresses of heirs and beneficiaries
    • Detailed asset inventories and estate values
    • Property descriptions and locations
    • Names of executors and personal representatives
    • Court dates and filing information.

    Digital inheritance scams take advantage of grieving families by relying on probate records. (uchar/Getty Images)

    These records are accessible to anyone, often through online databases that make bulk scraping simple. Criminals systematically monitor probate filings, building target lists of families who are emotionally vulnerable and potentially receiving significant inheritances.

    REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS

    How to spot a probate scam

    There are four common types of inheritance traps that use probate records as sources for their fraudulent claims:

    The fake fee scam: Just like the DMV notice scam that claims the recipient has unpaid toll fees, scammers use probate data to pose as attorneys or court officials, claiming heirs owe fees to release inheritance funds. They create urgency with threats of legal action or frozen assets, demanding payment via wire transfer or gift cards.

    The fake debt collector: Fraudsters send texts or make AI-generated voice calls, claiming that the deceased person owed debts that have to be settled immediately. They often have enough information from probate records to sound legitimate, pressuring families to pay non-existent debts.

    The fake estate service: Scams that offer seemingly helpful services like “property appraisals,” “finding hidden assets,” or “estate clean-out services” can look like they offer reasonable deals. Some take payment and disappear—others perform unnecessary services that families never requested.

    Elderly man using his phone.

    Cyberguy lays out ways to avoid inheritance scams. (Cyberguy.com)

    The “advanced fee” gift: Anyone who promises to expedite probate proceedings or secure larger inheritances for an upfront fee is probably in it to win it (for themselves). Some cases even involve disgruntled family members acting out of greed. These are not your run-of-the-mill remote scammers from a foreign country; these can be local “facilitators” who have no actual authority and simply pocket the money. If someone claims you have an inheritance coming, but they need “a fee to unlock it” or they promise to “handle your probate case” for a small upfront fee, you guessed it — nothing ever comes from it.

    Why probate scams work

    Grief is a beacon for fraudsters. With grief comes diminished critical thinking from even the hardiest of privacy diehards. Scammers deliberately strike during this window when defenses are low. A scammer who can reference your personal information, family information or property details doesn’t sound like a criminal, they sound like a legitimate professional. Scams often use the weapon of urgency — you have to purportedly act fast to avoid asset seizures, legal penalties or missed deadlines. When something demands immediate action, victims feel compelled to respond before verifying claims or consulting attorneys, which is exactly what fraudsters count on.

    HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

    How to protect yourself against the inheritance trap

    The good news is that with awareness and a few smart steps, you can lower your risk of falling victim to inheritance scams.

    1) Verify, verify, verify

    Never send money or give information to an unsolicited contact about an estate. If someone claims you owe fees or have obligations, independently verify their identity or company. Contact the probate court directly using publicly listed numbers, not information provided by the caller. Ask your estate attorney about any claims before making payments.

    2) Limit information sharing

    In most jurisdictions, you can’t prevent a probate filing from going public. But you can minimize additional data exposure by not sharing anything on social media and limiting contact to only key parties that you trust with financial information.

    3) Use personal data removal services

    Data removal services specialize in removing personal information from data broker sites that scammers use to supplement probate data. Personal information combined with probate records create the perfect setup for inheritance traps—scammers can make super-convincing, alarmist content that can bypass your intuition about scams, especially during times of grief.

    Person wearing a hoodie works on multiple computer screens displaying digital data in a dark room.

    Illustration of a cybercriminal. (Kurt “CyberGuy” Knutsson)

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    5 STEPS TO PROTECT YOUR FINANCES FROM FAMILY SCAMS

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    4) Let them leave a voicemail

    Legitimate attorneys and court officials will leave detailed messages and provide callback numbers you can verify independently by searching online. Unknown callers without legit numbers are likely scams. 

    5) Ask about your bank’s fraud detection

    Set up appropriate fraud alerts and prevention methods with the bank or estate holder, especially if the estate holds a significant value that would be a golden opportunity for thieves. 

    Elderly man holding credit card and phone

    Scammers use convincing calls and messages to pressure people into paying fake debts, authorities warn. (Cyberguy.com)

    6) Report inheritance scams immediately

    You can report potential probate scams to your probate court. They can issue a special order to protect assets, require executors to adopt formal procedures or even remove an executor for fraudulent behavior. You can also go to ReportFraud.ftc.gov to file a complaint. 

    7) Share what you know

    Ensure elderly relatives or those less familiar with scam tactics understand these risks. Scammers often target multiple heirs, seeking the most vulnerable respondent. 

    Kurt’s key takeaway

    The probate system creates a privacy trade-off. You can’t prevent much of this information from entering the public record, but you can control how you respond, and how much personal data is out there. Any probate topics should come through official court channels, and never an unsolicited phone call, email or text message. When in doubt, verify with your probate court, and always consult your estate attorney. With a little vigilance and a bit of data cleanup, you can ensure that the probate process doesn’t put you in harm’s way, during the time when you’re at your most vulnerable.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Have you or someone you know ever been targeted during a vulnerable time? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Jeep and Chrysler parent Stellantis confirms data breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Automotive giant Stellantis has just revealed that it suffered a data breach, exposing customer contact details, after attackers infiltrated a third-party platform used for North American customer services. The announcement comes at a time when large-scale attacks on cloud CRM systems have already shaken tech and retail sectors alike, with Salesforce clients such as Google, Allianz and Dior reporting similar intrusions. These earlier incidents exposed names, emails, and phone numbers, which were sufficient for attackers to launch phishing campaigns or extortion attempts.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

    What you need to know about the Stellantis breach

    Stellantis was formed in 2021 through the merger of the PSA Group and Fiat Chrysler Automobiles. Today, it ranks among the world’s largest automakers by revenue and is fifth in volume globally. The company houses 14 well-known brands, including Jeep and Dodge, as well as Peugeot, Maserati and Vauxhall, and operates manufacturing infrastructure across more than 130 countries. That global scale naturally makes it a tempting target for cyber adversaries.

    Stellantis confirmed hackers stole customer contact details in a recent breach. (Kurt “CyberGuy” Knutsson)

    In its public statement, Stellantis clarified that only contact information was taken. Since the compromised third-party platform does not host financial or deeply sensitive personal data, Stellantis asserts that social security numbers, payment details and health records were out of reach of the attackers. In response, the company activated its incident response protocols, launched a full investigation, contained the breach, notified authorities and began alerting affected customers. It also issued warnings about phishing and urged customers not to click suspicious links.

    Stellantis has not revealed how many customers the breach affected. The company also has not specified which contact fields, such as email, phone, or address, attackers accessed.

    The alleged culprit, ShinyHunters, and Salesforce breaches

    While Stellantis has not explicitly named the hacker group behind the breach, multiple sources tie this incident to the ShinyHunters extortion campaign, which has spearheaded a wave of data thefts targeting Salesforce this year.

    ShinyHunters claims to have stolen over 18 million records from Stellantis’ Salesforce instance, which includes names and contact details, according to Bleeping Computer. These attacks form part of a broader campaign aimed at Salesforce customers. In recent months, ShinyHunters has often worked in concert with groups like Scattered Spider and targeted companies including Google, Cisco, Adidas, Allianz Life, Qantas, and brands under LVMH such as Dior and Tiffany & Co.

    OVER 2B USERS FACE PHISHING RISKS AFTER GOOGLE DATA LEAK

    Stellantis brands

    The attack is linked to a wider wave of Salesforce data thefts this year. (Kurt “CyberGuy” Knutsson)

    Their reported method is fairly ingenious. Attackers exploit OAuth tokens tied to integrations like Salesloft’s Drift AI chat tool to pivot into Salesforce environments. Once inside, they can harvest valuable metadata, credentials, AWS keys, Snowflake tokens and more.

    In fact, the FBI recently issued a Flash alert that surfaced numerous indicators of compromise linked to these Salesforce environment attacks and warned organizations to harden defenses. The cumulative toll is staggering. ShinyHunters asserts it has stolen over 1.5 billion Salesforce records across some 760 companies.

    7 ways to protect yourself from breaches like Stellantis

    Even if only contact details were exposed, that’s enough for attackers to target you. Here’s how to stay protected.

    1) Clean up exposed personal data from the web

    Even basic contact details can be scraped from breaches and sold on data broker platforms, where they are used for spam, scams and targeted attacks. A data removal service can help track down and request the deletion of your information from these databases, reducing your long-term exposure.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    Jeep Wrangler Rubicon on sale at dealership

    Stolen emails and phone numbers could fuel phishing campaigns. (REUTERS /Rebecca Cook)

    2) Stay alert for phishing attempts and use antivirus software

    The most immediate risk after a breach like this is targeted phishing. Attackers now have legitimate contact details, so their emails and texts can look convincingly real. Be skeptical of any message claiming to be from Stellantis, your car brand or a related service, especially if it urges you to click a link, download an attachment or share personal details.

    The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.

    3) Use a password manager to secure your accounts

    If attackers get your contact information, they may try the same password on other sites. This is called credential stuffing. A password manager can create strong, unique passwords for every account. That way, one breach will not put your other accounts at risk. It also helps you quickly update credentials in case you suspect a compromise.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com.

    DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATION

    4) Enable two-factor authentication (2FA) wherever possible

    2FA adds an extra step to your logins by requiring a temporary code or approval in addition to your password. Even if attackers manage to steal your password, they will need that second factor to gain access. This significantly reduces the chances of account takeover attempts succeeding.

    5) Invest in identity theft protection

    Attackers often combine exposed contact information with other data to build complete identity profiles. Identity theft protection services monitor for suspicious activity, such as unauthorized credit applications or changes to official records, and alert you early so you can act before serious damage occurs. Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com.

    6) Regularly review account activity

    After a breach, it is worth auditing your accounts, not just with Stellantis but also with related services such as financing portals, insurance accounts or loyalty programs. Look for unusual sign-ins, unfamiliar devices, or changes to your personal details. Most services offer tools to review login history and security events, making checking these a routine habit.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Even giants in manufacturing are vulnerable when cloud platforms and third-party systems are part of their customer workflow. The same patterns seen in attacks on Google, LVMH, and others have now reached the auto industry in a serious way. As Stellantis confronts the fallout, the broader lesson is clear. Organizations must treat the surfaces exposed by their service providers and SaaS integrations with as much vigilance as their own core systems.

    Do you trust companies to secure your data, or do you feel they’re not doing enough? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Buckle Up, the Smart Glasses Backlash Is Coming

    [ad_1]

    Smart glasses are having a moment right now. At Meta’s Connect conference last month, which is normally reserved for the latest and greatest advancements in VR and XR hardware, the humble Quest was all but forgotten. In its place were not one, not two, but three new pairs of smart glasses, one of which has a display—a first for Meta. That pivot to smart glasses is also apparently dragging Apple in its wake, with reports that the company is deprioritizing an affordable Vision Pro to focus on its own pair (or pairs plural, actually) of specs.

    The message is clear: smart glasses, as a category, have arrived, and with that big, bold promise of head-worn, AI-clad camera-equipped computers, is also impending (inevitable, I would say) backlash. Exhibit A: a new warning from San Francisco University. As reported by SFGate, the Bay Area college recently issued a campus-wide alert of a man wearing Ray-Ban Meta AI glasses and filming students (women, specifically) while asking them “inappropriate dating questions.” Those videos have already found their way to TikTok, Instagram, and the like.

    I’m not going to name the account, which San Francisco University, maybe somewhat misguidedly, called out in its warning, but I watched some of the self-described “pickup lines” since they’re still viewable on Instagram, and can confirm they’re indeed inappropriate. Great. If you’re reading this and thinking, “Okay, so what? Social media has been a cesspool since before people were mad about ‘Obamacare.’ Why is this news?” Well, smart glasses, that’s why.

    © Raymond Wong / Gizmodo

    The fact that San Francisco University bothered to call out the way these videos were recorded (citing the specific name of Meta’s smart glasses and everything) says a lot, and in a lot of ways, that specificity is absolutely fair. As ascendant as smart glasses (or AI glasses, as Meta calls them) have been, there’s a chance that a lot of people may not have them on their radar yet. And the thing is, you should know how to identify them. Registering when someone is recording with their phone is pretty obvious (they’re usually holding it in front of their face and pointing it at you), but smart glasses are discreet. Yes, there’s a light on the front of the smart glasses that indicates that someone is taking a video or picture, but you still have to know where to look and what that light means.

    What I’m getting at is, because of that lack of knowledge around smart glasses and the inherent discreetness of them, people will, and clearly already are, pushing the boundaries. And this example isn’t even the worst one. Last month, after getting to try Meta’s Ray-Ban Display glasses (the ones with a screen) myself, I proclaimed that “these are the smart glasses you’ve been waiting for.” I stand by that statement, but also what I said subsequently, which is that “it’s time to talk about smart glasses.” Specifically, it’s time to talk about how and when we use them.

    Last month, I spoke to Anshel Sag, a principal analyst at Moor Insights & Strategy who covers the wearable market, about the potential for another Google Glass-scale backlash, and while he says he doesn’t expect the pushback to be quite as severe as in 2013 (Ray-Ban Meta smart glasses do a much better job of blending in), I’m not so sure they’ll slide by unscathed. As desensitized to privacy incursions as people are nowadays, we just haven’t had a real reason to be angry about smart glasses. They’re rising, but they’re just not that popular yet. If they do become as pervasive as companies are speculating, I suspect people will have a lot more examples like the one above that could change their tune. That’s just how outrage works. People don’t care about stuff… until they do.

    And sure, this one incident at San Francisco University probably won’t move the needle. But what if there are more? What if someone records you with smart glasses without your knowledge, and it’s your face that ends up on some douchebag’s TikTok account? As much as I want to believe that people can use smart glasses responsibly, I think we all know where this is headed, and while the vast majority of people probably won’t abuse the ability to record their surroundings discreetly, an unfortunate and overrepresented subset just might. If smart glasses really are the next big thing, I’m willing to wager the road of public opinion might get a little bit choppy, and this little campus warning is just the start.

    [ad_2]

    James Pero

    Source link

  • How a single MacBook compromise spread across a user’s Apple devices

    [ad_1]

    NEWYou can now listen to Fox News articles!

    We trust Macs to be reliable, secure, and mostly resistant to viruses. Apple’s software reputation has long been built around the idea that macOS is harder to compromise than Windows. And while there is some truth to that, it does not mean that Macs are immune. Modern malware is smarter, more targeted, and often designed to slip past built-in defenses quietly. Recently, I heard from Jeffrey from Phoenix, AZ, who’s been dealing with this exact situation.

    “I used a MacBook at work and noticed it was performing oddly. I didn’t use an Apple ID on that machine per company protocol. But I had personal devices that I could work from that are now infected. The notepad, maps, and home, among others, seem to be getting hung up. I’ve tried to advise Apple but have had little success. It’s completely taken over my devices, and I don’t know how to resolve this.”

    If your Mac has started acting strange, you are not alone, Jeffrey. Malware infections are more common than many Mac users realize, and spotting them early can make all the difference. Let us break down how to tell if your system is compromised, what protections Apple already provides, and the steps you should take to keep your data safe. If you’re a Windows user facing similar issues, check out our guide: What to do if you think your PC has a virus for step-by-step help.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER  

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    Mac malware often hides in the background, making it hard to spot at first. (Kurt “CyberGuy” Knutsson)

    Signs your Mac might be infected

    Spotting malware on macOS is not always straightforward. Many threats are designed to stay hidden, running quietly in the background while collecting data or opening a backdoor for attackers. Still, there are a few red flags that usually signal something is wrong.

    One of the first signs is slower performance or frequent overheating. If your Mac suddenly takes a long time to boot, runs hot during light tasks, or lags when performing simple actions, it might be doing more behind the scenes than you realize. Apps that crash or freeze more often than usual are another warning sign. Occasional app failures are normal, but if built-in tools like Safari, Notes, or Mail begin acting unstable, it may point to malicious interference.

    It is also worth paying attention to what is happening under the hood. Checking Activity Monitor for unknown processes or unusually high CPU or memory usage can reveal malware that tries to hide itself with random or unfamiliar names. Redirected web traffic is another classic symptom. If your browser takes you to strange websites, shows pop-ups, or installs new extensions you never approved, adware or spyware might already be present.

    Finally, unexplained changes to your security settings should always raise suspicion. If you notice your firewall turned off, privacy permissions modified, or login items appearing without your knowledge, something could have gained unauthorized control of your system.

    SHAMOS MALWARE TRICKS MAC USERS WITH FAKE FIXES

    Apple logo glows on the front of an Apple Store building at night.

    Strange app behavior, pop-ups, or overheating may signal something’s wrong (Kurt “CyberGuy” Knutsson)

    How macOS protects you by default

    Apple has built several layers of defense into macOS, many of which run silently in the background to keep your system secure. Knowing how they work can help you understand what protections are already in place and where you might still need to add more safeguards.

    Gatekeeper is one of the most important built-in security tools. It checks every app before it runs to make sure it comes from a verified developer, warning or blocking you if the app is not trusted. Another layer of defense is XProtect, Apple’s built-in malware scanner. It updates automatically and can stop many known threats from running, although it is not as thorough as specialized antivirus software.

    System Integrity Protection, or SIP, is another important safeguard. It locks down critical system files and processes so that malware cannot tamper with them even if it gains access. macOS also uses sandboxing and strict permission controls to contain threats. Apps run in isolated environments and must explicitly request permission to access sensitive data such as your camera, files, or location.

    Together, these features make it significantly harder for malicious software to infect your Mac or cause serious damage. However, they are not perfect. Attackers are constantly developing new techniques to bypass these protections, and many threats rely on human error rather than technical exploits. That is why taking additional precautions is still essential, even on a Mac.

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Person typing on a laptop at a desk with computer monitors in the background.

    Even Apple’s built-in protections can miss new or advanced threats (Kurt “CyberGuy” Knutsson)

    What to do if your Mac is already infected

    If you find yourself dealing with a Mac that’s already compromised these steps can help you get back in control:

    1) Disconnect from the internet immediately

    Unplug Ethernet or turn off Wi-Fi and Bluetooth. This prevents malware from sending more data out or pulling in additional malicious code.

    2) Back up your important files safely

    Use an external drive or cloud service you trust. Avoid copying entire system folders-just grab personal documents, photos, and files you can’t replace. You don’t want to back up the malware along with them.

    3) Boot into Safe Mode

    Restart your Mac and hold the Shift key. Safe Mode prevents some malware from launching and makes it easier to run cleanup tools.

    4) Run a trusted malware removal tool

    While macOS includes XProtect, you may need something more powerful. A strong antivirus program can detect and remove infections. Run a full system scan to catch hidden threats.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    5) Check your login items and Activity Monitor

    Review what apps are set to launch at startup and remove anything you don’t recognize. If you spot unfamiliar processes hogging resources, don’t just guess. Use our guides at Cyberguy.com/LockUpYourTech to compare what’s safe and learn how to shut down anything suspicious before it causes more trouble.

    6) Consider a clean reinstall of macOS

    If malware persists, wiping your system may be the only option. Erase your Mac’s drive and reinstall macOS from scratch. Restore only the clean files you backed up earlier.

    7) Secure your other devices

    If your iPhone, iPad, or other personal devices are showing strange behavior, run security scans, update their software, and reset key passwords. Malware can sometimes spread through shared Wi-Fi networks, cloud accounts, or files.

    8) Reset key passwords and enable two-factor authentication

    Even after cleanup, assume some of your data may have been exposed. Update your Apple ID, email, banking, and work accounts with strong, unique passwords. Turn on 2FA wherever possible.

    9) Get professional help if needed

    If you’re overwhelmed, you can bring your Mac to an Apple Store for in-person help at the Genius Bar, or schedule a free appointment with Apple Support.

    Person working on a MacBook at a white desk with a smartphone and pen nearby.

    Simple steps like scanning, updating, and using strong passwords can keep your data safe (Kurt “CyberGuy” Knutsson)

    7 ways to keep your Mac from getting infected

    Some cyber threats do not reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they have stolen. These steps can help you strengthen your defenses and reduce the chances of future infections.

    1) Install strong antivirus software

    macOS’s built-in protections are useful but basic. A strong antivirus adds an extra layer by detecting threats in real time, blocking malicious downloads, and even identifying new types of malware before they spread. A strong antivirus also scans email attachments and browser activity, areas where many Mac users are most vulnerable.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    2) Consider a personal data removal service

    Many cyberattacks begin with information freely available online. A data removal service scrubs your personal details from broker sites, reducing the chances of targeted attacks or identity theft. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED

    3) Use a password manager

    Many malware attacks rely on stolen credentials rather than technical exploits. A password manager stores unique, complex passwords for every account and can automatically flag weak or reused ones. It also helps protect you from phishing attempts because it will only autofill passwords on legitimate websites.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    4) Enable two-factor authentication

    Even if someone steals your password, two-factor authentication (2FA) makes it much harder for them to access your accounts. It adds an extra step to the login process, requiring a code from your phone or a security key.

    5) Keep macOS and apps updated

    Outdated software is a common entry point for malware. Updates often patch vulnerabilities that attackers could exploit, so turning on automatic updates for both macOS and third-party apps is an easy but effective defense.

    6) Review login items and background processes

    Malware often tries to run at startup so it can operate undetected. Regularly check System Settings to make sure only trusted apps are launching automatically, and use Activity Monitor to investigate anything suspicious.

    7) Use identity theft protection

    If your personal data has already been exposed, an identity theft protection service can monitor for suspicious activity, alert you to breaches, and help you recover quickly if something does go wrong. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Macs have a reputation for being safer than other computers, but that does not mean they are untouchable. Malware has evolved to target macOS more aggressively than ever, and many attacks now rely on tricking users rather than breaking through security software. If your device is behaving strangely, taking action early is the best way to prevent deeper damage.

    How important is cybersecurity when choosing the devices you use every day? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Protect yourself from sneaky web injection scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’re checking your financial account online, moving money or paying bills, when suddenly a pop-up appears. It looks exactly like your bank’s page, complete with logo and branding, but asks for details you’ve already provided. Would you know what to do?

    This is the kind of situation Kent recently faced. He emailed us saying, “Two times this week, I had a financial account open, and I was doing transactions. In the middle of a transaction, up pops a box in the middle of a full page showing the company’s logo. Real, yes, looked as real as it gets. The first time, I fell for it. It asked for my email address to confirm, then my phone number. Sadly, I did. Then I saw about four or five seconds of a screen named CREDIT DONKEY. At that point, I woke up and decided it was a scam. I immediately closed down my computer and called the number on the back of my financial card to report it.”

    Kent’s quick thinking likely saved him from even more damage. But what exactly happened here?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    A fake banking pop-up can appear while you’re making real transactions. (Kurt “CyberGuy” Knutsson)

    How web injection scams trick you

    This type of attack is called a web injection scam. It hijacks your browser session and overlays a fake login or verification screen. Because it appears while you’re already logged in, the fake page feels authentic. In Kent’s case, the appearance of “Credit Donkey” flashing on-screen was a red flag. Scammers sometimes abuse legitimate-looking redirects like this to convince victims they are dealing with their bank. The real aim is to capture login credentials or trick you into handing over two-factor authentication codes.

    SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES

    laptop keyboard

    Web injection scams aim to steal your login and security details. (Kurt “CyberGuy” Knutsson)

    Steps to protect yourself from web injection scams

    If you ever find yourself in a situation like Kent’s, here are the most important steps you should take right away to secure your accounts and information.

    1) Monitor your accounts

    Check your recent transactions daily. Turn on alerts for logins, withdrawals or transfers, so you’ll know instantly if someone is trying to move money. 

    2) Change your passwords

    Update the password for any financial account that may have been exposed. Use a strong, unique password generated by a password manager such as NordPass. Next, see if your email has been exposed in past breaches. Our #1 pick, NordPass, includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords 

    3) Remove your personal data from broker sites

    Scammers often get phone numbers, emails and other details from data broker sites before launching attacks like the one Kent faced. A personal data removal service can help wipe this information from those shady databases, so criminals have less fuel for scams. Consider tools that automatically scan and request removal from dozens of brokers at once, saving you the time and hassle of doing it manually.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Enable stronger multi-factor authentication

    Strengthen your account security with multifactor authentication. If your bank offers it, switch from SMS codes to app-based codes with Google Authenticator or Authy. These methods are far harder for scammers to intercept than text messages. 

    5) Scan your devices with antivirus software

    Since the scam appeared while Kent was logged in, malware or a browser hijack may be at play. Run a trusted antivirus to clear hidden phishing scripts. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    6) Notify your bank in writing

    Calling is smart, but also send a secure message or letter, so there’s a record. Ask them to put your account on high alert and require extra verification for any big moves.

    7) Freeze your credit

    Place a free credit freeze with Equifax, Experian and TransUnion. That way, scammers can’t open new accounts in your name even if they’ve stolen your personal info.

    8) Consider identity monitoring

    Services like Identity Guard can alert you if your Social Security number, email or phone number shows up where it shouldn’t. Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft

    CLICK HERE TO GET THE FOX NEWS APP

    Person using a credit card

    The bogus page asked for personal details before revealing it was a scam (iStock)

    Smart online banking habits to stay safe

    • Never enter personal details into a pop-up, no matter how real it looks.
    • Always log in fresh through your bank’s official website or app.
    • Keep your browser and operating system fully updated.
    • Use a private email address for your financial accounts that scammers won’t easily guess.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com/Mail

    Kurt’s key takeaways

    Web injection scams are designed to catch you off guard while you’re doing something routine. Kent’s quick reaction to close the page and contact his bank shows how important it is to stay alert. With the right habits and tools, you can keep scammers out of your accounts.

    Have you ever experienced a scam attempt while banking online? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure

    [ad_1]

    Plus: China sentences scam bosses to death, Europe is ramping up its plans to build a “drone wall” to protect against Russian airspace violations, and more.

    [ad_2]

    Matt Burgess, Andy Greenberg, Andrew Couts

    Source link

  • ICE Wants to Build Out a 24/7 Social Media Surveillance Team

    [ad_1]

    United States immigration authorities are moving to dramatically expand their social media surveillance, with plans to hire nearly 30 contractors to sift through posts, photos, and messages—raw material to be transformed into intelligence for deportation raids and arrests.

    Federal contracting records reviewed by WIRED show that the agency is seeking private vendors to run a multiyear surveillance program out of two of its little-known targeting centers. The program envisions stationing nearly 30 private analysts at Immigration and Customs Enforcement facilities in Vermont and Southern California. Their job: Scour Facebook, TikTok, Instagram, YouTube, and other platforms, converting posts and profiles into fresh leads for enforcement raids.

    The initiative is still at the request-for-information stage, a step agencies use to gauge interest from contractors before an official bidding process. But draft planning documents show the scheme is ambitious: ICE wants a contractor capable of staffing the centers around the clock, constantly processing cases on tight deadlines, and supplying the agency with the latest and greatest subscription-based surveillance software.

    The facilities at the heart of this plan are two of ICE’s three targeting centers, responsible for producing leads that feed directly into the agency’s enforcement operations. The National Criminal Analysis and Targeting Center sits in Williston, Vermont. It handles cases across much of the eastern US. The Pacific Enforcement Response Center, based in Santa Ana, California, oversees the western region and is designed to run 24 hours a day, seven days a week.

    Internal planning documents show that each site would be staffed with a mix of senior analysts, shift leads, and rank-and-file researchers. Vermont would see a team of a dozen contractors, including a program manager and 10 analysts. California would host a larger, nonstop watch floor with 16 staff. At all times, at least one senior analyst and three researchers would be on duty at the Santa Ana site.

    Together, these teams would operate as intelligence arms of ICE’s Enforcement and Removal Operations division. They will receive tips and incoming cases, research individuals online, and package the results into dossiers that could be used by field offices to plan arrests.

    [ad_2]

    Dell Cameron

    Source link

  • Meta Will Soon Personalize Ads Based on What Users Type Into Its AI Tools

    [ad_1]

    Meta Platforms said on Wednesday it would begin using people’s interactions with its generative AI tools to personalize content and advertising across its apps such as Facebook and Instagram starting on December 16.

    Users will be notified of the changes from October 7 and they will not have an option to opt out, the social media giant said, though the update applies only to those who use Meta AI.

    Meta said users’ interactions with its AI features, whether by voice or text, would be added to existing data such as likes and follows to shape recommendations for content and ads, including Reels and ads. For example, a user talking about hiking with Meta AI could later be shown hiking groups, friends’ trail updates or ads for boots.

    “People’s interactions simply are going to be another piece of the input that will inform the personalization of feeds and ads,” said Christy Harris, privacy policy manager at Meta. “We’re still in the process of building the first offerings that will make use of this data.”

    When people have conversations with Meta AI about more sensitive topics such as their religious views, sexual orientation, political views, health, racial or ethnic origin, Meta will not use those topics to show them ads, it said.

    The rollout will begin in most regions on December 16 and expand over time, excluding the UK, the European Union and South Korea.

    Meta AI now has 1 billion monthly active users across the company’s family of apps.

    CEO Mark Zuckerberg said at the company’s annual shareholder meeting this year that the “focus for this year is deepening the experience and making Meta AI the leading personal AI with an emphasis on personalization, voice conversations and entertainment.”

    Meta launched its first consumer-ready smart glasses with a built-in display at its annual Connect conference last month. 

    The company’s use of AI interactions for ads comes as other tech giants, including Google and Amazon, have begun monetizing AI tools, often through cloud-based services. But few have used AI chat interactions to personalize content and advertising across multiple platforms at the scale Meta is attempting.

    Reporting by Echo Wang in New York; Editing by Jamie Freed.

    [ad_2]

    Reuters

    Source link

  • Update Chrome now: Google patches new zero-day threat

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Google has released an urgent update for its Chrome browser to fix a newly discovered zero-day security flaw that hackers are already exploiting. This is the sixth zero-day Chrome has faced this year, highlighting just how quickly attackers move to take advantage of these hidden weaknesses. 

    Because zero-day threats strike before developers can patch them, your personal data and browsing activity could be at risk if you don’t update right away. If you use Chrome, now is the time to upgrade.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    Chrome users are urged to update immediately to block active zero-day attacks. (Kurt “CyberGuy” Knutsson)

    A critical flaw in Chrome’s V8 engine

    The newly patched vulnerability, tracked as CVE-2025-10585, stems from a type confusion weakness in Chrome’s V8 JavaScript engine. Google’s Threat Analysis Group (TAG) discovered and reported the bug on Tuesday, and the company shipped a fix the following day, Bleeping Computer reported.

    Google confirmed that the flaw was being exploited in the wild, though it did not share technical details or name the groups behind the attacks. TAG has a history of uncovering zero-days tied to government-sponsored spyware campaigns aimed at high-risk individuals such as opposition leaders, journalists and dissidents.

    The fix was delivered through Chrome version 140.0.7339.185/.186 for Windows and macOS, and version 140.0.7339.185 for Linux. These updates will gradually reach all users in the Stable Desktop channel over the coming weeks.

    While Chrome typically updates automatically, you can apply the patch immediately by navigating to the ‘About Google Chrome’ section. Google stated that it is withholding full technical details until most users have installed the update, a precaution meant to prevent attackers from exploiting lagging systems.

    GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED

    flash drive hacker 3

    Google races to patch the sixth major browser flaw discovered in 2025. (Kurt “CyberGuy” Knutsson)

    A growing list of zero-day attacks in 2025

    This marks the sixth zero-day flaw patched in Chrome this year. In March, Google addressed CVE-2025-2783, a sandbox escape bug exploited in espionage attacks against Russian organizations. In May, it pushed emergency updates for CVE-2025-4664, which let attackers hijack user accounts.

    Then in June, another flaw in the V8 engine, CVE-2025-5419, was patched after being spotted by TAG. July saw the release of a fix for CVE-2025-6558, which allowed attackers to bypass Chrome’s sandbox protection. With this latest patch, Google continues a busy year of racing to secure its browser against rapidly emerging threats. 

    How to update Google Chrome on a desktop

    Updating Chrome only takes a minute, whether you’re on Mac or Windows. Here are the steps.

    • Open Chrome.
    • Click the three dots in the top-right corner.
    • Go to HelpAbout Google Chrome.
    • Wait while Chrome checks for updates.
    • Click Relaunch when the update finishes.

    How to update Chrome on iPhone

    • Open the App Store on your iPhone.
    • Tap your profile icon in the top-right corner.
    • Scroll down to see pending updates.
    • Find Google Chrome in the list.
    • Tap Update next to it (or Update All if you want to update everything).

    How to update Chrome on Android

    Settings may vary depending on your Android phone’s manufacturer. 

    • Open the Google Play Store on your Android device.
    • Tap your profile icon in the top-right corner.
    • Select Manage apps & device.
    • Under “Updates available,” look for Google Chrome.

    Tap Update to install the latest version.

    CLICK HERE TO GET THE FOX NEWS APP

    New CISA warning: Thanksgiving clickjacking threat in popular browsers

    Hackers are already exploiting the bug to steal data from unprotected devices. (Kurt “CyberGuy” Knutsson)

    5 ways to stay safe from Chrome zero-day attacks

    Updating Chrome is essential, but there are additional steps you can take to stay safe from attacks.

    1) Be cautious with links and downloads and use strong antivirus software

    Many zero-day attacks are delivered through malicious websites or email attachments. Avoid clicking unknown links or downloading files from unverified sources, especially if they prompt you to disable security settings. Also, use strong antivirus software to add another layer of defense to detect malicious code that tries to run through compromised browsers. A strong antivirus can spot suspicious activity before it takes hold. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    2) Enable two-factor authentication (2FA)

    Even if attackers manage to steal your login details through a browser exploit, 2FA makes it much harder for them to break into your accounts. Use an authenticator app instead of SMS when possible for stronger protection. 

    3) Rely on a password manager

    If attackers exploit the browser to steal login data, a password manager keeps your credentials safe and helps generate unique, complex passwords. Even if one account is targeted, it prevents a domino effect across your logins.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    4) Limit browser extensions

    Some extensions can be abused to make attacks worse. Stick to extensions from trusted developers, review permissions carefully and uninstall anything you no longer need.

    5) Keep your operating system updated

    Chrome updates are critical, but attackers can also exploit holes in Windows, macOS, Android or iOS. Regular OS updates patch vulnerabilities across the system, reducing the chances of a browser exploit spreading further. 

    Kurt’s key takeaway

    The fact that Chrome has already faced six zero-day attacks this year shows how relentless attackers are and how even the most popular software can have serious gaps. These flaws are not just bugs, but opportunities for hackers to exploit millions of users before fixes roll out. The pattern also highlights the growing sophistication of threat actors, including state-backed groups targeting high-risk individuals. No browser is completely safe, and the battle to secure widely used software is ongoing and far from over.

    Do you think Google is reacting fast enough to keep your data secure? Let us know in the comments below. Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Idaho judge bars release of graphic photos from scene where Bryan Kohberger killed 4

    [ad_1]

    BOISE, Idaho — An Idaho judge is blocking the release of some graphic photos taken by investigators after Bryan Kohberger killed four University of Idaho students in 2022.

    Second District Judge Megan Marshall made the ruling Wednesday, saying the dissemination of “incredibly disturbing” photos across the internet — where the victims’ families might inadvertently see them — is an unwarranted invasion of personal privacy.

    She ordered the city of Moscow to black out portions of the images that show any portion of the victims’ bodies or the blood immediately surrounding them.

    But the judge said the public also has an interest in seeing investigation records, and so other photos, videos and documents connected to the case can be released, including videos showing distraught friends of the victims on the morning their bodies were found.

    Kohberger was sentenced to life without parole in July for the stabbing murders of Kaylee Goncalves, Xana Kernodle, Madison Mogen and Ethan Chapin at an off-campus rental home in Moscow, Idaho.

    Family members of two of the victims, Mogen and Chapin, had asked the judge to keep parts of the crime scene photos and videos hidden from public view, saying the images are invasive and traumatizing.

    The criminal case drew worldwide attention, and the Moscow Police Department received hundreds of requests to release investigatory records. Idaho law generally allows for the sealing of investigation records to be lifted once a criminal investigation is complete.

    After Kohberger’s sentencing, the city of Moscow responded to one such request for public records by releasing some of the photos and videos taken by law enforcement at the crime scene, blurring out the bodies of the killed students as well as the faces of other victims and witnesses who talked to police outside the home.

    “There is little to be gained by the public in seeing the decedents’ bodies, the blood soaked sheets, blood spatter or other death-scene depictions,” Marshall wrote, and she noted that those images have already caused the families “extreme emotional distress.”

    “The fact remains: the murder investigation and the criminal case are closed,” Marshall wrote. “Releasing these records will have minor effect upon those who continue to be perplexed by the facts or fixated on unfounded conspiracies whereas it has and will continue to have profound effect upon the decedents’ loved ones.”

    [ad_2]

    Source link

  • Inside a scammer’s day and how they target you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’re sipping your morning coffee when your phone rings. It’s a number you don’t recognize. On the other end is someone claiming to be from your bank, asking you to “confirm a recent charge.” Sound familiar?

    Scammers don’t operate on luck. They don’t just throw darts at the phone book and hope to hit a target. Their calls, texts and emails are carefully planned. They already know things about you before they ever reach out, enough to make their pitch sound convincing.

    So, what does a scammer’s day actually look like? Let’s step into their shoes for a moment.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE

    Hacker looking up the information stolen from an unsuspecting victim. (Kurt “Cyberguy” Knutsson)

    Step 1: Morning scroll: Where scammers find your data

    Scammers don’t need to hack into top-secret databases. They start their day by tapping into data broker sites, those shady online directories that trade your personal information like baseball cards.

    Here’s what they can instantly see about you (yes, you):

    • Full name and age
    • Current and past addresses
    • Phone numbers (landline and mobile)
    • Relatives’ names
    • Property records and estimated home value.

    Some sites even list email addresses, voter registrations and criminal histories (whether accurate or not.) Imagine starting your morning with a full profile of someone, where they live, who their spouse is and what car they drive. For scammers, this is their to-do list.

    Step 2: Building the perfect scam story

    With your profile in hand, scammers craft a story that sounds tailor-made just for you.

    • If you’ve recently moved (public real estate records show this), they’ll call pretending to be from a “utilities department” asking for deposits.
    • If you’re retired, they might pose as Medicare reps offering “free benefits.”
    • If you’ve recently lost a loved one (obituaries are public), they’ll offer fake “bereavement services.”

    Scammers don’t invent details; they borrow them from your life. That’s why their calls are so believable.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Man on the phone

    A man receiving a fake scam phone call. (Kurt “CyberGuy” Knutsson)

    Step 3: Dialing for dollars

    Once the story is ready, it’s time to call, text, or email. Scammers often use auto-dialing software, blasting out thousands of calls a day. They acquire your personal and contact details from various data brokers. Imagine hundreds of scammers scraping the same databases and finding your profile. That’s why you get repeated calls. That’s why the scammer “knows” who you are when you pick up. And even if you hang up or reject the call without picking up, they log your number as “active.” Which means you’ve just made their list for the next round of calls. 

    Step 4: Afternoon profit: Cashing in on stolen trust

    Scammers don’t actually need every target to fall for the trick. They only need a small percentage. Here’s what happens when someone gives in:

    • Banking info stolen: Fake “fraud department” calls trick people into reading out card numbers.
    • Identity theft: A scammer collects your Social Security number and date of birth, then opens accounts in your name.
    • Wire transfers: Many victims are convinced to “verify funds” by wiring money, which is gone forever.

    It’s a numbers game, and personal data tilts the odds heavily in the scammers’ favor. 

    Step 5: Evening: Expanding the list

    At the end of the day, scammers aren’t done. They feed the information they’ve gathered back into the data cycle:

    • New phone numbers? Added to calling lists.
    • Addresses confirmed during a call? Updated in their files.
    • Relatives mentioned? Added as next targets.

    And the cycle continues tomorrow, with an even bigger pool of potential victims.

    New CISA warning: Thanksgiving clickjacking threat in popular browsers

    (Kurt “CyberGuy” Knutsson)

    Why removing your data makes scams harder

    Now, imagine if scammers couldn’t find your data online in the first place.

    • No name connected to your phone number.
    • No recent address tied to your age and relatives.
    • No property value or real estate history to suggest you’re “cash-rich.”

    Scammers would have no storyline, no details to exploit and, most importantly, no way to personalize their attack. When you remove your data from people-search sites and data broker databases, you don’t just “clean up the internet.” You slam the door shut on scammers’ playbooks. You could spend hours (or days) going site by site, filling out opt-out forms, sending emails and keeping track of who complied. The problem? Data brokers don’t stop. New ones pop up every week, and old ones often sneak your data back in.

    That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Scammers don’t stumble on your phone number by accident. They map out your life, one data point at a time. That’s why protecting your information online is the single most powerful step you can take to cut down on scam calls, phishing emails and identity theft risks. Remember: every piece of personal data you remove is one less tool in a scammer’s kit.

    What’s the most convincing scam attempt you’ve ever received? Let us know in the comments below. Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • The surprising reason you should not delete spam emails

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Spam is annoying and can sometimes be dangerous if it’s part of a widespread phishing attack. When you see spam, you delete it, at least that’s what conventional wisdom suggests. However, it now seems that this is the wrong approach, and spam can be used for the greater good.

    So, before you delete that junk email, consider keeping it to protect others from scammers. We will also tell you what you should do with them instead.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter 

    Mail app icon on iPhone (Kurt “CyberGuy” Knutsson)

    Why should you keep those spam emails?

    We know this sounds counter-intuitive, but keeping spam emails, at least for a short while, serves an important purpose. Your email provider can use them to refine their spam detection algorithms. The best course of action is to report them, so providers can develop better ways to identify harmful or unwanted messages. This will improve their chances of detecting them before they hit your inbox. Deleting these emails makes them useless to anyone. Furthermore, your failure to contribute to this improvement means the problem persists not only for you but for others.

    When we say “a short while,” we don’t mean forever. Usually, keeping them in your junk folder for a few days to a week is enough for your provider to process and learn from them. After you’ve reported the spam or phishing attempt, you can safely delete it.

    That’s the surprising reason not to delete spam emails right away: by holding onto and reporting them briefly, you’re helping email providers spot and block scams faster—protecting not just yourself, but everyone else too.

    AI-POWERED SCAM TARGETS 2.5 BILLION GMAIL USERS IN SOPHISTICATED PHISHING ATTACKS

    How to report spam emails to your email provider

    These algorithms that detect junk emails are already getting smarter. Just check your Spam folder, and you may have dozens of emails marked as spam that they have shielded you from. For those that slip through the cracks and appear in your inbox, reporting them is easy.

    Whether you’re using a desktop client like Microsoft Outlook or a web client like Gmail, Yahoo or AOL, the steps to report spam for analysis are similar.

    Report spam in Gmail (desktop or web)

    • Select the spam email by ticking the checkbox on its left side. You can select more than one.
    • Click Report spam in the top menu. Look for a stop sign or shield icon.
    Reporting spam on Gmail when it’s in the inbox 

    How to report spam emails in Gmail in your inbox

    Report scam in iCloud (desktop browser)

    If you’re using something like iCloud Mail on iCloud.com on a desktop browser, do the following:

    • Open the email.
    • Click the three-dot icon in the top menu.
    • Select Move Message to Junk.
    Reporting spam on iCloud.com when it’s in the inbox  

    How to report spam on iCloud.com in your inbox (Kurt “CyberGuy” Knutsson)

    Report spam in iCloud Mail (iPhone or iPad Mail app, iOS 18.6)

    If you’re using the Mail app on an iPhone or iPad, follow these steps instead:

    • Open the email in the Mail app.
    • Tap the reply arrow icon at the bottom of the screen.
    • Select Move to Junk from the menu.

    Report spam in Yahoo Mail

    On the web (desktop version):

    • Tick the checkbox next to the unwanted email(s) in your inbox.
    • Click Spam in the toolbar above. This moves the message to your Spam folder and helps Yahoo learn to catch similar messages.
    • You can also open the email directly and click Spam to report it.

    On the Yahoo Mail mobile app (iOS/Android):

    • Open the message.
    • Tap the three vertical dots or “More” icon.
    • Choose Mark as Spam to report it. 

    Report spam or phishing in Outlook / Outlook.com

    In Outlook on the web (Outlook.com):

    • Select the message(s) you want to report.
    • Click Report above the reading pane, then choose Report phishing or Report junk from the dropdown.

    In desktop Outlook (Windows, Mac) or Outlook mobile:

    • If you’re using a supported version (like Outlook for Microsoft 365, Outlook for Mac 16.89+ or recent mobile versions), you’ll see a Report button on the toolbar.
    • Select the message(s), click Report and then choose Phishing or Junk.

    Report spam in AOL Mail

    On the web or desktop:

    • Log into AOL Mail and select the spam email from your inbox.
    • Click the Spam button—often shown as an exclamation mark or explicitly labeled “Spam.” This moves the email to your Spam folder and helps train AOL’s filters.

    On mobile:

    In the AOL Mail app, you can usually tap and hold or open the message and select Mark as Spam from the options to report it.

    How to report deleted spam mail

    Even for those spam emails you deleted, they’re not gone forever. If it’s been less than 30 days, they’re probably still in the Trash folder.

    To report them to clients like Gmail, Outlook, Yahoo, and AOL, follow these steps:

    • Open the Trash or Deleted items folder in your mail client.
    • Select the spam email by ticking the checkbox on its left side.
    • Click Report spam in the top menu. Look for a stop sign or shield icon.
    Reporting spam on Gmail when it’s in the trash folder

    How to report spam in Gmail when it’s in the trash folder 

    You make yourself a target when you unsubscribe

    Some spam emails also come with an option to unsubscribe. If you think reporting is too harsh, you might think unsubscribing is the best option to stop the spam emails from coming back. However, this can make matters worse. The act of unsubscribing signals to scammers and spammers that you’re actively checking your email. This emboldens them to increase the volume of spam they send. Worse still, some unsubscribe links are malicious traps designed to steal personal information or distribute malware.

    GOOGLE SHUTS DOWN SOPHISTICATED GOOGLE DOCS PHISHING SCAM

    Tips to stay safe from spam

    Reporting spam helps your email provider protect you and others, but you can take additional steps to keep your inbox and personal information safe.

    1) Never click suspicious links and use strong antivirus software

    Even if an email appears to come from a company you trust, avoid clicking links unless you’re sure they’re legitimate. Phishing scams often use convincing logos and language to trick you into revealing sensitive information.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech 

    2) Use a personal data protection service

    Consider using a service that monitors the dark web for your personal information and requests the removal of exposed data. This reduces the chances of scammers targeting you in the first place. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScan

    3) Use private email providers and aliases

    One of the smartest ways to cut down on spam is by using a private, secure email provider. These services prioritize privacy, don’t sell your data and offer stronger protection against trackers hidden in emails.

    Another powerful feature is the ability to create email aliases. An alias is a throwaway address that forwards mail to your real inbox. You can use one when online shopping or using trial accounts. If that alias starts getting flooded with junk, you simply disable or delete it, without exposing your main address.

    By using aliases and secure providers, you take back control of your inbox. Spammers can’t easily tie unwanted emails to your real account and your personal email remains far more private.

    For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com/Mail

    4) Use strong, unique passwords

    Create long, complex passwords that are different for every account. A password manager can store them securely and help you generate new ones that are hard to crack.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com/Passwords

    5) Enable two-factor authentication (2FA)

    Turn on 2FA whenever possible. Even if a scammer gets your password, they won’t be able to log in without the second verification step.

    6) Keep your devices updated

    Install the latest software updates on your phone, tablet, and computer. These updates often include security patches that fix vulnerabilities scammers could exploit.

    7) Be cautious with email attachments

    Avoid opening attachments from senders you don’t recognize. They can contain viruses, ransomware or other types of malware designed to steal your data.

    8) Limit the information you share online

    The less personal information available about you publicly, the harder it is for scammers to craft convincing phishing emails that appear legitimate.

    By following these steps and regularly reporting spam, you’ll protect not only your own inbox but also contribute to a safer online environment for everyone.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Spam emails are annoying, but deleting them right away isn’t always the best move. By holding on to them and reporting them, you help your email provider improve its filters and block more junk in the future. At the same time, learn how to protect yourself from phishing attempts so you can recognize the warning signs quickly. With a little awareness and the right tools, spotting and avoiding these scams becomes much easier.

    Have you ever had a close call with a spam or phishing email? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link