ReportWire

Tag: Security

  • 149 million passwords exposed in massive credential leak

    [ad_1]

    NEWYou can now listen to Fox News articles!

    It has been a rough start to the year for password security. A massive database containing 149 million stolen logins and passwords was found publicly exposed online. 

    The data included credentials tied to an estimated 48 million Gmail accounts, along with millions more from popular services. Cybersecurity researcher Jeremiah Fowler, who discovered the database, confirmed it was not password-protected or encrypted. Anyone who found it could have accessed the data. 

    Here is what we know so far and what you should do next.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

    A publicly exposed database left millions of usernames and passwords accessible to anyone who found it online. (Wei Leng Tay/Bloomberg via Getty Images)

    What was found in the exposed database

    The database contained 149,404,754 unique usernames and passwords. It totaled roughly 96 GB of raw credential data. Fowler said the exposed files included email addresses, usernames, passwords and direct login URLs for accounts across many platforms. Some records also showed signs of info-stealing malware, which silently captures credentials from infected devices. 

    Importantly, this was not a new breach of Google, Meta or other companies. Instead, the database appears to be a compilation of credentials stolen over time from past breaches and malware infections. That distinction matters, but the risk to users remains real.

    Which accounts appeared most often

    Based on estimates shared by Fowler, the following services had the highest number of credentials in the exposed database.

    • 48 million – Gmail
    • 17 million – Facebook
    • 6.5 million – Instagram
    • 4 million – Yahoo Mail
    • 3.4 million – Netflix
    • 1.5 million – Outlook
    • 1.4 million – .edu email accounts
    • 900,000 – iCloud Mail
    • 780,000 – TikTok
    • 420,000 – Binance
    • 100,000 – OnlyFans

    Email accounts dominated the dataset, which matters because access to email often unlocks other accounts. A compromised inbox can be used to reset passwords, access private documents, read years of messages and impersonate the account holder. That is why Gmail appearing so frequently in this database raises concerns beyond any single service.

    SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

    Man typing

    Email accounts appeared most often in the leaked data, which is especially concerning because inbox access can unlock many other accounts. (Felix Zahn/Photothek via Getty Images)

    Why the exposed database creates serious security risks

    This exposed database was not abandoned or forgotten. The number of records increased while Fowler was investigating it, which suggests the malware feeding it was still active. There was also no ownership information attached to the database. After multiple attempts, Fowler reported it directly to the hosting provider. It took nearly a month before the database was finally taken offline. During that time, anyone with a browser could have searched it. That reality raises the stakes for everyday users.

    This was not a traditional hack or company breach

    Hackers did not break into Google or Meta systems. Instead, malware infected individual devices and harvested login details as people typed them or stored them in browsers. This type of malware is often spread through fake software updates, malicious email attachments, compromised browser extensions or deceptive ads. Once a device is infected, simply changing passwords does not solve the problem unless the malware is removed.

    TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

    Facebook login

    Researchers believe infostealing malware collected the credentials, silently harvesting logins from infected devices over time. (Jaap Arriens/NurPhoto via Getty Images)

    How to protect your accounts after a massive password leak

    This is the most important part. Take these steps even if everything seems fine right now. Credential leaks like this often surface weeks or months later.

    1) Stop reusing passwords immediately

    Password reuse is one of the biggest risks exposed by this database. If attackers get one working login, they often test it across dozens of sites automatically. Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    2) Switch to passkeys where available

    Passkeys replace passwords with device-based authentication tied to biometrics or hardware. That means there is nothing for malware to steal. Gmail and many major platforms already support passkeys, and adoption is growing fast. Turning them on now removes a major attack surface.

    3) Enable two-factor authentication on every account

    Two-factor authentication (2FA) adds a second checkpoint, even if a password is exposed. Use authenticator apps or hardware keys instead of SMS when possible. This step alone can stop most account takeover attempts tied to stolen credentials.

    4) Scan devices for malware with strong antivirus software

    Changing passwords will not help if malware is still on your device. Install strong antivirus software and run a full system scan. Remove anything flagged as suspicious before updating passwords or security settings. Keep your operating system and browsers fully updated as well.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Review account activity and login history

    Most major services show recent login locations, devices and sessions. Look for unfamiliar activity, especially logins from new countries or devices. Sign out of all sessions if the option is available and reset credentials right away if anything looks off.

    6) Use a data removal service to reduce exposure

    Stolen credentials often get combined with data scraped from data broker sites. These profiles can include addresses, phone numbers, relatives and work history. Using a data removal service helps reduce the amount of personal information criminals can pair with leaked logins. Less exposed data makes phishing and impersonation attacks harder to pull off.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Close accounts you no longer use

    Old accounts are easy targets because people forget to secure them. Close unused services and delete accounts tied to outdated app subscriptions or trials. Fewer accounts mean fewer chances for attackers to get in.

    Kurt’s key takeaways

    This exposed database is another reminder that credential theft has become an industrial-scale operation. Criminals move fast and often prioritize speed over security. The good news is that simple steps still work. Unique passwords, strong authentication, malware protection and basic cyber hygiene go a long way. Do not panic, but do not ignore this either.

    If your email account was compromised today, how many other accounts would fall with it? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Your phone shares data at night: Here’s how to stop it

    [ad_1]

    NEWYou can now listen to Fox News articles!

    If your smartphone stays on your bedside table overnight, it stays busy long after you fall asleep. 

    Even while it appears idle, your phone continues to send and receive data in the background. Some of that activity is expected. Your device checks for security patches, syncs system settings and keeps essential services running. Other data transfers are far less obvious and far less necessary.

    Experts warn that smartphones routinely transmit tracking and advertising signals without you fully realizing it. In many cases, that data includes information that should only be shared with clear and informed consent.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

    Even while you sleep, a nearby smartphone can continue sending and receiving data in the background. (Getty Images/monkeybusinessimages)

    What data your phone sends while you sleep

    Your phone is not just charging overnight. It operates in a continuous data loop that generally falls into two categories.

    Legitimate system data

    This includes updates, crash reports and basic diagnostics. Operating systems rely on this information to fix bugs, improve stability and protect against security threats. In most cases, this data collection is disclosed and configurable.

    Tracking and advertising data

    This is where concerns grow. Smartphones also transmit location signals, device identifiers, advertising IDs, usage patterns and app behavior data. Companies combine this information to build detailed user profiles and deliver targeted ads that promise higher engagement. The problem is that the line between necessary diagnostics and commercial tracking is often blurry. Many of us never realize how much data flows out of our phones overnight.

    TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

    Phone and alarm clock

    Phones often stay active overnight, syncing apps, checking networks and refreshing data unless you limit background activity. (Kurt “CyberGuy” Knutsson)

    What we know about phone tracking today

    Independent academic investigations found that some Android devices transmitted data linked to tracking behaviors involving major companies like Meta and Yandex. The research, conducted by teams from IMDEA Networks Institute and European universities, showed that certain apps and services continued communicating with external servers even after users attempted to limit tracking. The researchers observed data flows that could link web activity with app identifiers, raising concerns about how effectively privacy controls were enforced at the system level.

    There is also long-standing concern around smartphones appearing to “listen” to conversations. While no public evidence shows that phones actively record private speech for advertising, many users report ads that closely mirror recent conversations. At a minimum, aggressive data collection combined with location, app usage and search history can make these moments feel unsettling.

    Despite years of scrutiny, most smartphones still operate this way today. The good news is that you can reduce how much data leaves your device.

    How to protect yourself from overnight data sharing

    You do not need to give up your smartphone to regain control. Small settings changes can make a real difference.

    1) Review app permissions

    Start with your installed apps. Focus on those with access to your location, microphone, camera and tracking data. Only allow sensitive permissions while the app is in use. Be especially cautious with apps that run continuously in the background.

    How to review app permissions on iPhone 

    • Open Settings
    • Tap Privacy & Security
    • Tap Location ServicesMicrophoneCamera or Tracking
    • Select an app from the list
    • Choose While Using the App or Never when available

    For tracking controls:

    • Go to Settings
    • Click Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    This prevents apps from accessing your advertising identifier and sharing activity across apps and websites.

    AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

    Phone sharing data at night and how to stop it

    Turning off app tracking on your iPhone blocks apps from linking your activity across other apps and websites. (Kurt “CyberGuy” Knutsson)

    How to review app permissions on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Privacy & Security or Security and privacy 
    • Click More privacy settings 
    • Tap Permission Manager
    • Select LocationMicrophoneCamera or Sensors
    • Tap an app and choose Allow only while using the app or Don’t allow

    To review background access:

    • Go to Settings
    • Click Apps
    • Select an app
    • Tap Mobile data & Wi-Fi
    • Turn off Background data if the app does not need constant access

    This limits silent data transfers when the app is not actively open.

    2) Limit background activity

    Disabling background activity reduces how often apps sync data when you are not using them. This also limits automatic cloud activity. Keep in mind that this may affect real-time backups or notifications. Weigh the convenience against the privacy trade-off.

    How to limit background activity on iPhone

    Turn off Background App Refresh

    • Open Settings
    • Tap General
    • Tap Background App Refresh
    • Tap Background App Refresh at the top
    • Select Off or Wi-Fi

    To disable it for specific apps:

    • Stay on the Background App Refresh screen
    • Toggle off apps that do not need to update in the background

    This prevents apps from quietly syncing data when they are not open.

    How to limit background activity on Android 

    Settings may vary depending on your Android phone’s manufacturer.

    Restrict background data

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Mobile data & Wi-Fi
    • Turn off Background data

    Restrict background battery usage

    • From the app’s settings screen, tap Battery
    • Select Restricted or Limit background usage

    This reduces background syncing and prevents apps from running silently when you are not actively using them.

    3) Turn off personalized advertising

    Personalized ads rely on device identifiers and activity data collected across apps. Turning this off limits how your behavior is used for ad targeting, even when your phone is idle.

    How to turn off personalized ads on iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    To limit Apple ads:

    • Go to Settings
    • Click Privacy & Security
    • Tap Apple Advertising
    • Turn off Personalized Ads

    This reduces ad targeting based on your activity within Apple services.

    TAX SEASON SCAMS SURGE AS FILING CONFUSION GROWS

    Phone sharing data at night and how to stop it

    Disabling personalized ads reduces how your behavior is used to target ads, even when your phone is idle. (Kurt “CyberGuy” Knutsson)

    How to turn off personalized ads on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Settings
    • Tap Privacy & Security or Security and privacy
    • Click More privacy settings
    • Tap Ads or Advertising
    • Tap Delete advertising ID or Opt out of Ads Personalization
    • Click Delete advertising ID

    You can also reset your advertising ID from this menu to break the link between past activity and future ads.

    This limits how apps and advertisers track behavior across apps and websites.

    4) Consider a VPN

    A reputable VPN can help obscure your IP address and reduce certain forms of network-based tracking. It does not stop all data collection, but it adds a layer of protection, especially on shared or public networks.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Remove your data from broker sites

    Even if you lock down your phone, much of your personal information already exists online. Data brokers collect and sell details like your name, address, phone number and browsing behavior.

    Using a reputable data removal service can help locate and remove your information from these sites. This reduces how easily advertisers and third parties can link your phone activity to your real identity.

    For ongoing protection, these services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Use airplane mode or power off at night

    If overnight data sharing concerns you, the simplest option is also the most effective. Turning your phone off or using airplane mode cuts off wireless communication while still allowing alarms to work.

    How to turn on airplane mode on iPhone

    • Open Control Center by swiping down from the top right corner
    • Tap the airplane icon so it turns orange
    • Confirm that cellular, Wi Fi and Bluetooth turned off

    How to turn on airplane mode on Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Swipe down from the top of the screen to open Quick Settings
    • Tap the airplane mode icon
    • Check that mobile data, Wi Fi and Bluetooth are disabled

    If you still want Bluetooth for a watch or headphones, you can turn it back on manually after enabling airplane mode. This keeps most background data transfers blocked while you sleep.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Your smartphone works around the clock, even when you do not. Some background data sharing keeps your device secure and functional. Other data collection exists primarily to fuel tracking and advertising. The key is awareness and control. By tightening permissions, limiting background activity and disabling ad personalization, you reduce how much of your personal data leaves your phone while you sleep. Privacy is not about fear. It is about informed choices.

    Do you leave your phone fully on overnight, or will tonight be the night you finally switch it off? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Super Bowl scams surge in February and target your data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The Super Bowl is not only the biggest sporting event of the year, but it has also become one of the busiest scam seasons.

    Every February, millions of Americans receive texts, emails and calls tied to the game, such as “Your ticket couldn’t be delivered,” “Your streaming account needs verification” or “Your betting account was locked.” At first glance, these messages may seem like random spam, but in reality, they are carefully targeted.

    Instead of blasting messages blindly, scammers rely on data brokers – companies that collect, package and sell personal information. These brokers build detailed profiles, and scammers either buy or steal those lists to decide exactly who to target and when.

    Below, I’ll explain how this system works and, more importantly, how you can remove yourself from the data pipeline scammers depend on.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    TAX SEASON SCAMS SURGE AS FILING CONFUSION GROWS

    Scammers ramp up Super Bowl-themed fraud each February, using fake ticket, streaming and betting alerts to steal personal information from unsuspecting fans. (Elisa Schu/picture alliance via Getty Images)

    Why Super Bowl season is a gold mine for scammers

    Big events create urgency, emotion and distraction – perfect conditions for fraud. During Super Bowl week, scammers use the same themes real companies use:

    • Ticket confirmations
    • Streaming service alerts
    • Betting account warnings
    • Delivery delays for food or merchandise.

    But here’s the key: they don’t blast these messages randomly. They target people who look like likely buyers. That targeting comes from your digital profile.

    How scammers know you’re a ‘Super Bowl target’

    You might never have posted about football, yet you still receive a fake ticket message. That’s because data brokers build profiles using your:

    • Address history
    • Household size
    • Income range
    • Age
    • Shopping behavior
    • Most-used apps
    • Frequently visited websites
    • Household members.

    These details are stitched together from retailers, apps, public records and tracking tools – then sold to marketers and, eventually, leaked or resold to scammers. So when Super Bowl season arrives, scammers simply filter their lists: “People who look like they’d watch the game, place a bet, or order food.” And your phone number is right there.

    The most common Super Bowl scam messages

    During Super Bowl week, scammers flood inboxes and phones with messages that look like they came from legitimate companies. The goal is simple: create urgency, make you click and steal your information before you have time to think. Here are the scams I see spike every February:

    1) Fake ticket alerts

    “Your Super Bowl ticket transfer failed. Verify now.”

    These messages pretend to come from Ticketmaster, StubHub or SeatGeek. They claim your ticket couldn’t be delivered, your transfer is pending or your account needs verification. The link takes you to a fake login page that looks identical to the real site. The moment you enter your email and password, scammers capture your credentials. Many victims then find their real ticket accounts emptied, their payment methods used or their email taken over.

    How to spot it:

    • The sender’s address is misspelled
    • The link leads to a lookalike domain
    • The message creates panic and urgency.

    What to do: Never click. Go directly to the ticket site through your browser or app.

    2) Streaming account warnings

    “Your Super Bowl stream is on hold. Update billing now.”

    These messages impersonate major streaming platforms like YouTube TV, Hulu, ESPN, Peacock or cable providers. They claim your payment failed or your account is suspended just before kickoff. The link sends you to a fake billing page that steals your credit card details, login credentials or both. Some versions install malware that records keystrokes and login activity.

    Why this works: Millions of people stream the Super Bowl. Scammers know most recipients won’t even question it.

    What to do: Open the streaming app directly and check your account there. Ignore any links in the message.

    5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK

    Man typing into his smartphone.

    Super Bowl scams aren’t random; criminals use detailed data broker profiles to target likely viewers, bettors and shoppers. (Kim Kulish/Corbis via Getty Images)

    3) Betting account freezes

    “Your wager is pending. Confirm your identity.”

    These target people who have been flagged by data brokers as likely sports bettors. Messages claim your account with DraftKings, FanDuel or BetMGM is locked due to “suspicious activity.”

    The fake verification page asks for:

    • Your full name
    • Date of birth
    • Social Security number
    • Bank or card details.

    This gives scammers everything they need to commit identity theft.

    What to do: Never respond to betting account messages outside the official app.

    4) Merch and food delivery scams

    “Your Super Bowl order is delayed. Track here.”

    Scammers mimic popular retailers and delivery apps, like Amazon, DoorDash, Uber Eats, FedEx and USPS. They claim your food, jersey or party supplies couldn’t be delivered.

    Clicking the tracking link can:

    • Install malware
    • Redirect you to a fake login page
    • Steal your payment info.

    Why it works: People are expecting packages and food orders that week, so the message feels real.

    What to do: Use the retailer’s official app or website to check orders.

    Why families are hit even harder

    Your data isn’t isolated. Data brokers connect people living at the same address, spouses, children and roommates. So one exposed profile becomes an entire household target. During Super Bowl weekend, when everyone’s using phones, scanning QR codes and ordering food, one bad click can put the whole family at risk.

    The real problem: you’re still on the lists

    Most people try to protect themselves by:

    • Deleting emails
    • Blocking numbers
    • Installing antivirus software.

    Those help, but they don’t stop your data from being sold again tomorrow. As long as your information exists in data-broker databases, scammers can keep finding you. That’s why I recommend removing your data at the source.

    The ‘game-day cleanup’ that stops the targeting

    If you want fewer scam messages, not just better filters, you need to remove your personal data from data brokers. That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    What to do before Super Bowl weekend

    Here’s how to protect yourself right now:

    • Don’t click Super Bowl messages. Even if they look real, go directly to the company’s website instead. Use strong antivirus software to help block malicious links, fake websites and malware before they can steal your information.Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
    • Avoid QR codes from emails or texts. Many link to fake login pages.
    • Use credit cards, not debit cards. They offer stronger fraud protection.
    • Remove your data from broker sites. This is the single most effective way to reduce scam targeting.

    FBI WARNS QR CODE PHISHING USED IN NORTH KOREAN CYBER SPYING

    Woman using her phone.

    Fake Super Bowl tickets and streaming messages often create urgency, pushing victims to click malicious links or fake login pages. (Kyle Ericksen/Penske Media via Getty Images)

    Kurt’s key takeaways

    Super Bowl scams are not random. Instead, they are precision-targeted using personal data sold behind the scenes. While you cannot stop scammers from trying, you can make it harder for them to find you. By removing your data now, you reduce scam messages, limit fake alerts and lower your risk, not only this Super Bowl, but throughout the entire year. That kind of protection is a win worth celebrating.

    Have you received scam texts or emails tied to the Super Bowl? What did they look like, and did you almost fall for one? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • TikTok after the US sale: What changed and how to use it safely

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Since news broke in late January that TikTok’s U.S. operations would move under American-led ownership, many people who previously avoided the app are reconsidering. The shift has reopened conversations among parents, educators and older adults who once viewed TikTok as off-limits due to foreign ownership concerns.

    One reader summed up that hesitation clearly in an email we received. It reflects a question many families are asking right now.

    “I read a summary of the approved joint venture deal between China (20%) and U.S. Investors (80%). We do not have a TikTok account at this time. We’ve been following through the media about the helpful shorts and are considering opening an account, once the deal is consummated and control of accounts is in the hands of the U.S. side. Yet, we are not techies and are still concerned about the security of said accounts.”

    — Charlie

    That concern is understandable. For years, TikTok raised legitimate questions about foreign ownership, data access and national security. Those concerns were serious enough to trigger government bans, lawsuits and strong warnings to families. Now, that chapter has shifted. TikTok’s U.S. operations now sit under a U.S.-led ownership structure, with American investors holding a controlling interest and operational authority. That change matters. But it does not automatically change how the platform behaves. The more useful question today is not whether TikTok is allowed. It is how to use it wisely, with clear boundaries and better controls, especially for kids and teens. That is what this guide is about.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK

    TikTok’s shift to U.S.-led ownership has parents and older adults reconsidering the app after years of security concerns tied to foreign control. (Kayla Bartkowski/ Los Angeles Times via Getty Images)

    What the US ownership change actually improves

    It is important to acknowledge what is different now.

    US governance and control

    TikTok’s U.S. operations are no longer controlled by a China-based parent company. This removes the risk of direct access under Chinese national security laws.

    Stronger regulatory oversight

    The platform now operates under U.S. privacy expectations, enforcement standards and congressional scrutiny. That brings clearer guardrails around data handling.

    Clear accountability

    When something goes wrong, responsibility sits in one jurisdiction. There is no ambiguity about who answers for it. That is meaningful progress, especially for families who avoided TikTok entirely due to concerns about ownership.

    What TikTok says the new US structure safeguards

    TikTok says its U.S. operations now run through TikTok USDS Joint Venture LLC, a majority American-owned entity created under an executive order signed on Sept. 25, 2025. According to the company, the joint venture is designed to protect U.S. user data, secure the recommendation algorithm and oversee trust and safety decisions for American users. TikTok says U.S. user data is stored in Oracle’s secure U.S.-based cloud environment and protected through a comprehensive privacy and cybersecurity program that is audited and certified by third-party experts.

    The company also says the recommendation algorithm used for U.S. users is retrained, tested and secured within the United States. TikTok adds that the joint venture has decision-making authority over trust and safety policies and content moderation for U.S. users, with ongoing transparency reporting and independent oversight. These safeguards focus on where data is stored, who governs it and how systems are audited, not on eliminating data collection or personalization.

    What has not changed at all

    Here is the part many people overlook.

    Even with new ownership, TikTok still operates on the same core business model as every major social media platform.

    • It tracks what you watch and how long you watch.
    • It learns your interests and habits.
    • It uses that information to shape your feed and target advertising.

    TikTok remains exceptionally effective at this. Its recommendation system adapts quickly, which explains both its popularity and its influence. That power makes privacy settings more important than ever.

    A smarter way to use TikTok as a family

    Pretending TikTok does not exist rarely works. Kids hear about it from friends. Adults see useful videos shared across other platforms. A better approach is to set up intentionally from the start. The steps below do not ruin the experience. They simply reduce unnecessary exposure and give families more control.

    Step 1: Stop TikTok from accessing your contacts

    Limiting contact access prevents TikTok from mapping your personal network.

    How to turn off Contacts and Facebook syncing

    • Open the TikTok app
    • Tap your profile in the bottom right
    • Tap the three-line menu in the top right
    • Select Settings and Privacy
    • Click Privacy
    • Tap Sync Contacts and Facebook Friends
    • Toggle both options off so they appear gray

    Why this matters

    When contact syncing is on, TikTok can learn who you know, even if those people never use the app. Turning it off limits how the platform connects your account to real-world relationships, reduces account suggestions tied to your phone book and helps keep your personal network from becoming part of TikTok’s data profile.

    Step 2: Reduce ad targeting

    You will still see ads. They will rely less on activity outside TikTok.

    How to disable off-TikTok ad tracking

    • Open the TikTok app
    • Go to your profile in the bottom right of the screen
    • Click the three-line menu in the upper right
    • Tap Settings and Privacy
    • Scroll to Ads and tap it
    • Under Manage your off-TikTok data, toggle Targeted ads outside of TikTok off so it turns gray
    • If available, also toggle Targeted ads off to further limit personalization

    Why this matters

    Turning these off reduces how TikTok uses data collected beyond the app to personalize advertising. You will still see ads, but they will be less closely tied to your browsing and app activity elsewhere.

    Step 3: Make your account private

    This step is especially important for kids and teens. A private account limits who can view content, comment and interact.

    How to make your account private

    • Open the TikTok app
    • Go to your profile  in the bottom right of the screen
    • Click the three-line menu in the upper right
    • Tap Settings and Privacy
    • Click Privacy
    • Toggle Private Account on so it turns blue
    • Toggle Activity Status off so it turns gray

    Why this matters

    A private account puts you in control of who can view your content and interact with you. This is especially important for kids and teens, since it reduces exposure to strangers, spam accounts and unwanted messages.

    WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK

    Street view of the TikTok building.

    Families weighing TikTok now face a new question: how to use the platform safely, even under American oversight. (Kayla Bartkowski/ Los Angeles Times via Getty Images)

    Step 4: Control how people can find you

    TikTok suggests accounts based on contacts, phone numbers and shared connections unless you stop it.

    How to turn off account suggestions

    • Open the TikTok app
    • Go to your profile in the bottom right of the screen
    • Tap the three-line menu in the upper right
    • Tap Settings and Privacy
    • Click Privacy
    • Tap Suggest Your Account to Others
    • Turn off all options

    Why this matters

    Account suggestions are often driven by phone numbers, contacts and shared connections. Turning these off makes it harder for TikTok to link your account to your offline identity or surface it to people you did not choose to connect with.

    Step 5: Hide what you like and follow

    Likes and follows send signals about your interests and habits. Keeping them private adds another layer of protection.

    How to hide your activity

    • Open the TikTok app
    • Go to your profile in the bottom right of the screen
    • Tap the three-line menu in the upper right
    • Tap Settings and Privacy
    • Click Privacy
    • Tap Following List under Interactions
    • Set it to Only you

    Why this matters

    Likes and follows reveal interests, habits and patterns over time. Keeping them private limits how much others can infer about you and reduces the data signals TikTok can amplify across the platform.

    Step 6: Download your TikTok data

    This step often changes how people view the platform.

    How to request your TikTok data

    • Open the TikTok app
    • Go to your profile in the bottom right of the screen
    • Tap the three-line menu in the upper right
    • Tap Settings and Privacy
    • Tap Account
    • Tap Download Your Data
    • Under Request data, review the types of information included and click the box next to it or select all 
    • Choose a file format
    • Tap Request data

    TikTok will begin preparing your file. This process typically takes a few days. Once your data is ready, you must return to the Download data tab to retrieve it. The download link expires after a short window, so check back regularly.

    Why this matters

    Requesting your data shows the full scope of what TikTok stores about your account, from activity patterns to interaction history. Seeing that information firsthand helps you decide whether the level of tracking aligns with how you want to use the platform.

    Pro tip: Protect yourself beyond app settings

    Privacy settings help, but they cannot stop everything. Social media platforms like TikTok are common delivery points for malicious links, fake giveaways and look-alike login pages designed to steal passwords or install malware. Using strong, up-to-date antivirus software adds a critical layer of protection by blocking dangerous sites and downloads before a single click turns into a problem. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

     Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY

    TikTok logo on a smartphone screen.

    (Photo Illustration by Nikolas Kokovlis/NurPhoto via Getty Images)

    Kurt’s key takeaways

    TikTok says new safeguards protect where U.S. data lives and who controls it. Your personal settings still determine how much data exists in the first place. Ownership changes reduce certain risks, but they do not replace personal responsibility. Privacy on TikTok depends far more on how you configure it than who owns it. If you are considering opening an account now that control sits with U.S. investors, start slow, lock down the settings and review your data early. That approach keeps you in control rather than the algorithm.

    If a platform knows this much about you, how much access are you truly comfortable giving it? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Major US shipping platform left customer data wide open to hackers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cargo theft is no longer just about stolen trucks and forged paperwork. Over the past year, security researchers have been warning that hackers are increasingly targeting the technology behind global shipping, quietly manipulating systems that move goods worth millions of dollars. 

    In some cases, organized crime groups use hacked logistics platforms to redirect shipments, allowing criminals to steal goods without ever setting foot in a warehouse. One recent case involving a critical U.S. shipping technology provider shows just how exposed parts of the supply chain have been, and for how long.

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter     

    A key shipping platform was left wide open

    CRIME RINGS, HACKERS JOIN FORCES TO HIJACK TRUCKS NATIONWIDE, FUELING MAJOR HOLIDAY SHIPPING SECURITY FEARS

    Digital shipping platforms now control how goods move worldwide, making cybersecurity failures a direct risk to the global supply chain. (John Keeble/Getty Images)

    The company at the center of this incident is Bluspark Global, a New York-based firm whose Bluvoyix platform is used by hundreds of companies to manage and track freight moving around the world. While Bluspark isn’t a household name, its software supports a large slice of global shipping, including major retailers, grocery chains and manufacturers.

    For months, Bluspark’s systems reportedly contained basic security flaws that effectively left its shipping platform exposed to anyone on the internet. According to the company, five vulnerabilities were eventually fixed, including the use of plaintext passwords and the ability to remotely access and interact with the Bluvoyix platform. These flaws could have given attackers access to decades of shipment records and customer data.

    Bluspark says those issues are now resolved. But the timeline leading up to the fixes raises serious concerns about how long the platform was vulnerable and how difficult it was to alert the company in the first place.

    How a researcher uncovered the flaws

    Security researcher Eaton Zveare discovered the vulnerabilities in October while examining the website of a Bluspark customer. What started as a routine look at a contact form quickly escalated. By viewing the website’s source code, Zveare noticed that messages sent through the form passed through Bluspark’s servers using an application programming interface, or API.

    From there, things unraveled fast. The API’s documentation was publicly accessible and included a built-in feature that allowed anyone to test commands. Despite claiming authentication was required, the API returned sensitive data without any login at all. Zveare was able to retrieve large amounts of user account information, including employee and customer usernames and passwords stored in plaintext.

    Worse, the API allowed the creation of new administrator-level accounts without proper checks. That meant an attacker could grant themselves full access to Bluvoyix and view shipment data going back to 2007. Even security tokens designed to limit access could be bypassed entirely.

    Why it took weeks to fix critical shipping security flaws

    One of the most troubling parts of this story isn’t just the vulnerabilities themselves, but how hard it was to get them fixed. Zveare spent weeks trying to contact Bluspark after discovering the flaws, sending emails, voicemails, and even LinkedIn messages, without success.

    With no clear vulnerability disclosure process in place, Zveare eventually turned to Maritime Hacking Village, which helps researchers notify companies in the shipping and maritime industries. When that failed, he contacted the press as a last resort.

    Only after that did the company respond, through its legal counsel. Bluspark later confirmed it had patched the flaws and said it plans to introduce a formal vulnerability disclosure program. The company has not said whether it found evidence that attackers exploited the bugs to manipulate shipments, stating only that there was no indication of customer impact. It also declined to share details about its security practices or any third-party audits.

    10 ways you can stay safe when cyberattacks hit supply chains

    Hackers can break into a shipping or logistics platform without you ever realizing your data was involved. These steps help you reduce risk when attacks like this happen.

    1) Watch for delivery-related scams and fake shipping notices

    After supply chain breaches, criminals often send phishing emails or texts pretending to be shipping companies, retailers, or delivery services. If a message pressures you to click a link or “confirm” shipment details, slow down. Go directly to the retailer’s website instead of trusting the message.

    2) Use a password manager to protect your accounts

    If attackers gain access to customer databases, they often try the same login details on shopping, email, and banking accounts. A password manager ensures every account has a unique password, so one breach doesn’t give attackers the keys to everything else.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

    3) Reduce your exposed personal data online

    Young woman types on smartphone

    Security researchers found exposed APIs that allowed access to sensitive shipping data without proper authentication. (Portra/Getty Images)

    Criminals often combine data from one breach with information scraped from data broker sites. Personal data removal services can help reduce how much of your information is publicly available, making it harder for criminals to target you with convincing scams.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Run strong antivirus software on your devices

    Strong antivirus software can block malicious links, fake shipping pages, and malware-laced attachments that often follow high-profile breaches. Keeping real-time protection enabled adds an important layer when criminals try to exploit confusion.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    HUGE DATA LEAK EXPOSES 14 MILLION CUSTOMER SHIPPING RECORDS

    5) Enable two-factor authentication wherever possible

    Two-factor authentication (2FA) makes it much harder for attackers to take over accounts, even if they have your password. Prioritize email, shopping accounts, cloud storage and any service that stores payment or delivery information.

    6) Review your account activity and delivery history

    Check your online shopping accounts for unfamiliar orders, address changes, or saved payment methods you don’t recognize. Catching changes early can prevent fraud from escalating.

    7) Consider identity theft protection

    Identity theft protection services can alert you to suspicious credit activity and help you recover if attackers access your name, address or other personal details. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    8) Place a free credit freeze to stop new fraud

    If your name, email, or address was exposed, consider placing a credit freeze with the major credit bureaus. A freeze prevents criminals from opening new accounts in your name, even if they obtain additional personal data later. It’s free, easy to lift temporarily, and one of the most effective steps you can take after a breach. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    9) Lock down your shipping and retailer accounts

    Review the security settings on major shopping and delivery accounts, including retailers, grocery services and shipping providers. Pay close attention to saved delivery addresses, default shipping locations and linked payment methods. Attackers sometimes add their own address quietly and wait before making a move.

    10) Businesses should review third-party logistics access

    If you run a business that relies on shipping or logistics platforms, incidents like this are a reminder to review vendor access controls. Limit administrative permissions, rotate API keys regularly, and confirm vendors have a clear vulnerability disclosure process. Supply chain security depends on more than just your own systems.

    Someone typing on a computer in a dark room.

    Hackers increasingly target logistics technology, manipulating systems to redirect shipments without physical theft.  (Thomas Trutschel/Photothek via Getty Images)

    Kurt’s key takeaway

    Shipping platforms sit at the intersection of physical goods and digital systems, making them attractive targets for cybercriminals. When basic protections like authentication and password encryption are missing, the consequences can spill into the real world, from stolen cargo to supply chain disruption. The incident also highlights how many companies still lack clear, public ways for researchers to report vulnerabilities responsibly.

    Do you think companies that quietly power global supply chains are doing enough to protect themselves from cyber threats?  Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Firmness, flattery and phone calls: How Mexico’s president won over Trump

    [ad_1]

    He has called Colombian President Gustavo Petro “a sick man” and Ukrainian President Volodymyr Zelensky a “dictator.” He once slammed French President Emmanuel Macron as “publicity-seeking,” and former Canadian Prime Minister Justin Trudeau as “dishonest and weak.”

    President Trump is known for hurling scathing insults at world leaders.

    Then there’s Mexican President Claudia Sheinbaum. The U.S. president has described her, at turns, as “fantastic,” “terrific” and “elegant.”

    In a social media post Thursday, he offered his most glowing compliments yet, extolling Sheinbaum as “wonderful and highly intelligent” and saying Mexicans “should be very happy” to have her as their leader.

    Trump’s emphatic praise for Sheinbaum is surprising, given their marked differences in temperament and politics.

    Sheinbaum, a leftist known for her patience and pragmatism, labeled Israel’s U.S.-backed war in Gaza a “genocide” and condemned the recent U.S. capture of Venezuelan President Nicolás Maduro.

    She disagrees with Trump on three of his firmly held beliefs: that the U.S. should raise tariffs on Mexican imports, expel migrants en masse, and attack drug traffickers inside Mexico.

    But Sheinbaum is keenly aware of how Trump’s actions on trade, immigration and security could plunge Mexico into turmoil, potentially threatening her own popularity and the legacy of the ruling party founded by her populist predecessor, Andrés Manuel López Obrador.

    So she has tread strategically, requesting frequent phone calls with Trump, making concessions on issues such as security and heaping praise right back at him. She described her conversation with Trump on Thursday as “productive and cordial” and added: “I had the pleasure of greeting his wife, Melania.”

    So far, her tactics have worked. Trump’s repeated threats of sweeping tariffs on Mexican goods and drone attacks on cartel targets have not yet come to pass.

    Managing Trump has been one of the biggest — and perhaps most consequential — focal points of Sheinbaum’s presidency. “It’s not something that just happened today,” she said recently of her relationship with Trump. “Communication, coordination, and defending the people of Mexico … are constants.”

    Sheinbaum has been quelling nerves in Mexico since Trump’s election in late 2024, just weeks after she assumed the presidency. She promised to forge strong bonds with the incoming U.S. leader, who is widely disliked here for his diatribes against immigrants. Sheinbaum vowed to emulate Kalimán, a beloved Mexican comic-book superhero known for defeating villains with “serenity and patience.”

    She has sought to command Trump’s respect in other ways, holding massive public rallies that demonstrate widespread support for her government. “We will always hold our heads high,” she said at one event shortly before Trump took office. “Mexico is a free, independent, and sovereign country. We coordinate, we collaborate, but we do not submit.”

    In some ways, Trump has actually galvanized support for Sheinbaum by sparking a surge in nationalism. Polls show most Mexicans approve of her handling of the bilateral relationship. According to a poll conducted by El País newspaper, her approval rating soared to 83% in May after she persuaded Trump to postpone the implementation of heavy tariffs. It now stands around 74%.

    Still, some political analysts point out that Trump may like Sheinbaum because, despite her talk of defending Mexico’s sovereignty, she has actually acquiesced to him many times, particularly on issues of security.

    “The list of concessions to Trump accumulated in a single year far surpasses in scope and depth those made by supposedly more ‘subservient’ governments,” wrote columnist Jorge Lomonaco in El Universal newspaper.

    Sheinbaum has deployed Mexican troops to stop migrants from reaching the U.S. border. She has sent dozens of accused drug criminals to the U.S. to face trial there, sidestepping the standard extradition process to do so. She imposed tariffs on some imports from China and other countries, and her government reportedly paused shipments of oil to Cuba, signaling a possible end to what Sheinbaum had lauded as a “humanitarian” effort to aid the embattled island nation — another possible target of Trump.

    “In public, Sheinbaum’s government has maintained a sovereign and patriotic rhetoric, but it is evident that, in private, it has been very docile with the U.S.,” Lomonaco wrote.

    Trump’s discourse with Mexico continues to be infused with threats. While he calls Sheinbaum a “good woman,” he also said in May that she is “so afraid of the cartels she can’t even think straight.”

    Many believe Trump’s decision to send U.S. special forces to arrest Maduro and his wife in Caracas could embolden him to launch a U.S. military attack on cartels in Mexico — a move that Sheinbaum would clearly see as crossing a red line, and could probably ignite a political crisis here.

    “I do think there’s a real risk of a strike on Mexican soil against cartels, especially after what happened in Venezuela,” said Gustavo Flores-Macías, dean of the School of Public Policy at the University of Maryland.

    Mexico, he said, is attempting “a delicate balance of keeping U.S. authorities happy without falling into this perennial game of trying to appease the White House and do everything that Trump wants.”

    Trump has also threatened to pull out of a trilateral trade deal with Canada, which was negotiated during his first term. The U.S., Mexico and Canada must launch a joint review of the free trade pact by July 1, its sixth anniversary, to determine whether the nations intend to renew it for 16 more years or make modifications. Trump has called the deal “irrelevant,” but the pact is fundamental to a Mexican economy heavily dependent on cross-border trade.

    Meantime, a controversy arose last week surrounding the mysterious capture in Mexico of Ryan Wedding, the former Canadian Olympic snowboarder who faces federal charges in California of running a billion-dollar drug-trafficking ring.

    Sheinbaum dismissed reports that FBI agents on the ground in Mexico participated in the the arrest of Wedding, who, according to U.S. authorities, had been hiding for years in Mexico.

    Sheinbaum insisted that Wedding turned himself in at the U.S. Embassy in Mexico City and, at a news briefing, displayed a photograph that she said depicted Wedding outside the embassy.

    But Canadian media said the image was probably fake, a creation of artificial intelligence. Sheinbaum dodged questions about the image’s authenticity. Wedding’s lawyer, Anthony Colombo, disputed Sheinbaum’s account that Wedding turned himself in. “He was arrested,” Colombo told reporters outside the federal courthouse in Santa Ana, where Wedding entered a not guilty plea. “He did not surrender.”

    Sheinbaum was able to weather the dispute, but the episode again raised questions about how far the Mexican president is willing to go to keep Trump happy.

    “It would be very very concerning — and certainly illegal under Mexican law — if the FBI operated and arrested an individual on Mexican soil,” said Flores-Macías, who added: “I think there are some clear signs that this took place without the involvement of Mexican authorities.”

    Special correspondent Cecilia Sánchez Vidal contributed to this report.

    [ad_2]

    Kate Linthicum, Patrick J. McDonnell

    Source link

  • Democrats, White House Strike Spending Deal That Would Avert Government Shutdown – KXL

    [ad_1]

    WASHINGTON (AP) — Democrats and White House have struck a deal to avert a partial government shutdown and temporarily fund the Department of Homeland Security as they negotiate new restrictions for President Donald Trump’s surge of immigration enforcement.

    As the country reels from the deaths of two protesters at the hands of federal agents in Minneapolis, the two sides have agreed to separate homeland security funding from the rest of the legislation and fund DHS for two weeks while they debate Democratic demands for curbs on the U.S. Immigration and Customs Enforcement agency. The potential deal comes after Democrats voted to block legislation to fund DHS on Thursday.

    Trump said in a social media post that “Republicans and Democrats have come together to get the vast majority of the government funded until September,” while extending current funding for Homeland Security. He encouraged members of both parties to cast a “much needed Bipartisan ‘YES’ vote.”

    Speaker Mike Johnson, R-La., told The Associated Press on Thursday that he had been “vehemently opposed” to breaking up the funding package, but “if it is broken up, we will have to move it as quickly as possible. We can’t have the government shut down.”

    Democrats have requested a short extension—two weeks or less—and say they are prepared to block the wide-ranging spending bill if their demands aren’t met, denying Republicans the votes they need to pass it and potentially triggering a shutdown.

    Republicans were pushing for a longer extension of the Homeland Security funding, but the two sides were “getting closer,” said Senate Majority Leader John Thune, R-S.D.

    Rare bipartisan talks
    The rare bipartisan talks between Trump and his frequent adversary, Senate Democratic leader Chuck Schumer, came after the fatal shooting of 37-year-old Alex Pretti in Minnesota over the weekend and calls by senators in both parties for a full investigation. Schumer called it “a moment of truth.”

    “The American people support law enforcement. They support border security. They do not support ICE terrorizing our streets and killing American citizens,” Schumer said.

    With no final agreement yet and an uncertain path ahead, the standoff threatened to plunge the country into another shutdown, just two months after Democrats blocked a spending bill over expiring federal health care subsidies. That dispute closed the government for 43 days as Republicans refused to negotiate.

    The fall shutdown ended when a small group of moderate Democrats broke away to strike a deal with Republicans, but Democrats are more unified this time after the fatal shootings of Pretti and Renee Good by federal agents.

    Democrats lay out demands
    Democrats have laid out several demands, asking the White House to “end roving patrols” in cities and coordinate with local law enforcement on immigration arrests, including requiring tighter rules for warrants.

    They also want an enforceable code of conduct so agents are held accountable when they violate rules. Schumer said agents should be required to have “masks off, body cameras on” and carry proper identification, as is common practice in most law enforcement agencies.

    The Democratic caucus is united in those “common sense reforms,” and the burden is on Republicans to accept them, Schumer said.

    “Boil it all down, what we are talking about is that these lawless ICE agents should be following the same rules that your local police department does,” said Democratic Sen. Tina Smith of Minnesota. “There has to be accountability.”

    Earlier on Thursday, Tom Homan, the president’s border czar, stated during a press conference in Minneapolis that federal immigration officials are developing a plan to reduce the number of agents in Minnesota, but this would depend on cooperation from state authorities.

    Still far apart on policy
    As the two sides narrowed in on a spending deal, the length of a temporary extension for Homeland Security funding emerged as a sticking point. Thune said Thursday that two weeks wasn’t enough time to negotiate a final compromise.

    “We’ll see where discussions are going between (Democrats) and the White House on that,” Thune said.

    Even if the two sides strike a deal, negotiations down the road on a final agreement on the Homeland Security bill are likely to be difficult.

    Democrats want Trump’s aggressive immigration crackdown to end. “If the Trump administration resists reforms, we shut down the agency,” said Connecticut Sen. Richard Blumenthal.

    “We need to take a stand,” he said.

    But Republicans are unlikely to agree to all of the Democrats’ demands.

    North Carolina Sen. Thom Tillis said he is opposed to requiring immigration enforcement officers to show their faces, even as he blamed Homeland Security Secretary Kristi Noem for decisions that he said are “tarnishing” the agency’s reputation.

    “You know, there’s a lot of vicious people out there, and they’ll take a picture of your face, and the next thing you know, your children or your wife or your husband are being threatened at home,” Tillis said.

    South Carolina Sen. Lindsey Graham said some of the Democratic proposals “make sense,” such as better training and body cameras. Still, he said he was putting his Senate colleagues “on notice” that if Democrats try to make changes to the funding bill, he would insist on new language preventing local governments from resisting the Trump administration’s immigration policies.

    “I think the best legislative solution for our country would be to adopt some of these reforms to ICE and Border Patrol,” Graham posted on X, but also end so-called “sanctuary city” policies.

    Uncertainty in the House
    Across the Capitol, House Republicans have said they do not want any changes to the bill they passed last week. In a letter to Trump on Tuesday, the conservative House Freedom Caucus wrote that its members stand with the Republican president and ICE.

    “The package will not come back through the House without funding for the Department of Homeland Security,” they wrote.

    Speaker Johnson appeared open to the changes, albeit reluctantly, and told the AP he would want to approve the bills “as quickly as possible” once the Senate acts.

    “The American people will be hanging in the balance over this,” Johnson said. “A shutdown doesn’t help anybody.”

    [ad_2]

    Jordan Vawter

    Source link

  • 5 myths about identity theft that put your data at risk

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Most people think identity theft starts with a massive hack. In reality, it usually starts much more quietly, with bits of personal information you didn’t even realize were public: old addresses, family connections, phone numbers and shopping habits. 

    All are sitting on data broker sites that most people have never heard of. During Identity Theft Awareness Week, organized by the Federal Trade Commission, it’s a good time to clear up some dangerous myths that keep putting people at risk, especially retirees, families and anyone who thinks they’re “careful enough.” 

    Let’s break them down.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.   

    Myth #1: ‘I wasn’t in a data breach, so I’m safe’

    FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

    Identity theft often starts quietly, with bits of personal information collected and shared long before a scam ever happens. (Kira Hofmann/picture alliance via Getty Images)

    Reality: You don’t need to be in a breach to have your data exposed.

    Data brokers legally collect personal information from public records, loyalty programs, apps and online purchases. Over time, they build detailed profiles that can exist for decades, even if you’ve never been hacked. Scammers often use this data as a starting point. It helps them sound legitimate, personalize messages and choose the right angle to trick you.

    Actionable tips:

    • Don’t assume “no breach” means “no risk”
    • Avoid oversharing details on social media
    • Remove your personal data from data broker sites so it can’t be reused

    Myth #2: ‘Scammers don’t have enough info to impersonate me’

    Reality: They usually have more than enough.

    Scammers don’t need your Social Security number to cause damage. A name, address history, phone number and family connections can be enough for someone to:

    This is why scams often feel unsettlingly personal.

    Actionable tips:

    • Be suspicious of messages that reference personal details
    • Don’t confirm information just because the sender “knows” something about you
    • Reduce what’s available by removing your data from broker databases

    Myth #3: ‘Retirees aren’t targeted because they’re cautious’

    Reality: Retirees are one of the most targeted groups.

    Why? Because scammers assume:

    • Stable income from pensions or benefits
    • More savings
    • Greater trust in official-looking messages
    • Less familiarity with newer scam tactics

    Many scams are designed specifically for retirees, from Medicare updates to fake government notices and investment fraud. A recent widespread scam involves fake IRS calls and the illegitimate “Tax Resolution Oversight Department” that tries to steal your money.

    Actionable tips:

    • Never act on urgent requests involving benefits or finances
    • Verify messages by contacting organizations directly
    • Encourage family discussions about scams and warning signs
    • Remove publicly available data that helps scammers profile retirees
    Person typing on computer

    Data brokers build detailed profiles using public records, apps, purchases and loyalty programs, even if you have never been hacked. (Kurt “CyberGuy” Knutsson)

    Myth #4: ‘Credit monitoring will stop identity theft’

    Reality: Credit monitoring only tells you after something has gone wrong.

    It doesn’t stop scammers from:

    • Targeting you
    • Attempting account takeovers
    • Using your information in phishing or social engineering scams

    Think of credit monitoring like a smoke alarm-helpful, but it doesn’t prevent the fire.

    Actionable tips:

    • Use credit monitoring as a backup, not your main defense
    • Lock down accounts with strong passwords and two-factor authentication
    • Reduce exposure by removing your data before it’s misused

    Myth #5: “There’s nothing I can do about data brokers”

    Reality: You can take control, but doing it manually is time-consuming and frustrating.

    Most data broker sites allow opt-outs, but each one has a different process. Some require forms. Others need ID verification. And many re-add your data months later. That’s why I recommend a data removal service. These services contact hundreds of data brokers on your behalf, request the removal of your personal information and keep monitoring them so it doesn’t quietly reappear. For families and retirees, this matters even more because once scammers connect relatives through broker profiles, multiple people can become targets.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

    Why identity theft often starts long before you notice

    Identity theft rarely begins with a dramatic moment.

    It usually starts with:

    • Data collected quietly over the years
    • Profiles that grow more detailed with time
    • Information being sold and resold without your knowledge

    By the time fraud shows up on a credit report, the damage has often already been done.

    What you can do during Identity Theft Awareness Week

    If there’s one takeaway this week, it’s this: reducing your exposed data lowers your risk.

    1) Be skeptical of unexpected messages

    Do not trust surprise emails, texts or calls, even if they appear to come from a bank, retailer or government agency. Scammers often copy logos, language and phone numbers to look legitimate.

    2) Verify requests on your own

    If a message claims there’s a problem with an account, pause and verify it independently. Use the official website or phone number you already know, not the one provided in the message.

    3) Reduce your digital footprint with a data removal service 

    Remove your personal information from data broker websites that collect and sell names, addresses, phone numbers and other details. A data removal service can help you do just that. Less exposed data means fewer opportunities for identity thieves. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    4) Turn on two-factor authentication

    Enable two-factor authentication (2FA) wherever it’s available. Even if a criminal gets your password, 2FA adds a second barrier that can stop account takeovers.

    5) Strengthen your account security

    Use strong, unique passwords for important accounts and avoid reusing them across sites. A reputable password manager can securely store and generate complex passwords, making it easier to stay protected without memorizing everything.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    Person on their smartphone.

    Scammers use this background data to sound legitimate, personalize their messages and pressure victims into acting fast. (Matt Cardy/Getty Images)

    6) Use identity theft protection software

    Consider identity theft protection software that monitors your personal information, alerts you to suspicious activity and helps you respond quickly if something goes wrong. Some services also assist with data broker removal and recovery support if your identity is compromised.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    7) Help family members stay protected

    Scammers often target seniors and teens. Walk family members through these steps, help them secure accounts and encourage them to slow down before responding to urgent messages.

    Kurt’s key takeaways

    Identity theft isn’t about being careless; it’s about how much information is floating around without your permission. The fewer places your data lives online, the harder it is for scammers to use it against you. Taking action now won’t just protect you this week; it can reduce scams, fraud attempts and identity theft risks all year long.

    Which of these myths did you believe, and what personal information do you think is already out there about you without your consent? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Grubhub confirms data breach amid extortion claims

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Food delivery platform Grubhub has confirmed a recent data breach after unauthorized actors accessed parts of its internal systems. 

    The disclosure comes as sources tell BleepingComputer the company is now facing extortion demands linked to stolen data.

    In a statement to BleepingComputer, Grubhub said it detected and stopped the activity quickly.

    “We’re aware of unauthorized individuals who recently downloaded data from certain Grubhub systems,” the company said. “We quickly investigated, stopped the activity, and are taking steps to further increase our security posture.”

    Grubhub added that sensitive information, such as financial details or order history, was not affected. However, the company declined to answer follow-up questions about when the breach occurred, whether customer data was involved or if it is actively being extorted.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    RANSOMWARE ATTACK EXPOSES SOCIAL SECURITY NUMBERS AT MAJOR GAS STATION CHAIN

    Grubhub confirmed a data breach after unauthorized actors accessed parts of its internal systems, prompting an investigation and heightened security measures. (Michael Nagle/Bloomberg via Getty Images)

    What Grubhub has confirmed so far

    While details remain limited, Grubhub confirmed several key points. It has brought in a third-party cybersecurity firm and notified law enforcement. Beyond that, the company has stayed largely silent. That lack of detail has raised concern, especially given Grubhub’s recent security history. Just last month, the company was linked to scam emails sent from its own b.grubhub.com subdomain. Those messages promoted a cryptocurrency scam promising large returns on Bitcoin payments. Grubhub said it contained the incident and blocked further unauthorized emails. It did not clarify whether the two events are related.

    Sources link the breach to ShinyHunters extortion

    According to multiple sources cited by BleepingComputer, the ShinyHunters hacking group is behind the extortion attempt. The group has not publicly commented on the claims and declined to respond when contacted. Sources say the attackers are demanding a Bitcoin payment to prevent the release of stolen data. That data reportedly includes older Salesforce records from a February 2025 breach and newer Zendesk data taken during the most recent intrusion. Grubhub uses Zendesk to run its online customer support system. That platform handles order issues, account access and billing questions, making it a valuable target for attackers.

    How stolen credentials may have enabled the attack

    Investigators believe the breach may be tied to credentials stolen during earlier Salesloft Drift attacks. In August 2025, threat actors used stolen OAuth tokens from Salesloft’s Salesforce integration to access sensitive systems over a 10-day period. According to a report from Google Threat Intelligence Group, also known as Mandiant, attackers used that stolen data to launch follow-up attacks across multiple platforms. “GTIG observed UNC6395 targeting sensitive credentials such as AWS access keys, passwords and Snowflake-related access tokens,” Google reported. ShinyHunters previously claimed responsibility for that campaign, stating it stole roughly 1.5 billion records from Salesforce environments tied to hundreds of companies.

    Why this breach still matters

    Even if payment data and order history were not affected, support systems often contain personal details. Names, email addresses and account notes can be enough to fuel phishing attacks or identity scams. More importantly, this incident highlights how older breaches can continue to cause damage long after the initial attack. Stolen credentials that are never rotated remain a powerful entry point for threat actors.

    Ways to stay safe after the Grubhub data breach

    If you use Grubhub or any online delivery service, a few smart steps can reduce your risk after a breach.

    1) Update your password and stop re-use

    Start by changing your Grubhub password right away. Make sure you do not reuse that password anywhere else. Reused passwords give attackers an easy path into other accounts. A password manager can help here. It creates strong, unique logins and stores them securely so you do not have to remember them all.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

    Man delivering Grubhub.

    The food delivery platform says it quickly stopped the intrusion but has not disclosed when the breach occurred or whether customers were targeted. (Leonardo Munoz/VIEWpress)

    2) Turn on two-factor authentication

    If two-factor authentication (2FA) is available, enable it. This adds a second step when you sign in, such as a code sent to your phone or app. Even if a hacker steals your password, two-factor authentication can stop them from getting in.

    3) Watch closely for phishing attempts and use strong antivirus software

    Be alert for emails or texts that mention orders, refunds or support issues. Attackers often use stolen support data to make messages feel urgent and real. Do not click links or open attachments unless you are certain they are legitimate. Strong antivirus software can also help block malicious links and downloads before they cause harm.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Remove your data from people-search sites

    Consider using a data removal service to reduce your online footprint. These services help remove your personal details from data broker sites that attackers often use to build profiles. Less exposed data means fewer tools for scammers to exploit.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Ignore crypto messages using trusted brands

    Be skeptical of any cryptocurrency offers tied to familiar companies. Grubhub was previously linked to scam emails promoting crypto schemes, which shows how often attackers abuse trusted names. Legitimate companies do not promise fast returns or pressure you to act immediately.

    6) Monitor your Grubhub account and email activity

    Check your Grubhub account for anything that looks unfamiliar. Watch for unexpected password reset emails, order confirmations or support messages you did not request. Attackers often test stolen data quietly before making bigger moves.

    7) Secure the email linked to your Grubhub account

    Your email account is the key to password resets. Change that password and enable two-factor authentication if it is not already on. If attackers control your email, they can regain access even after you change other passwords.

    8) Stay alert for delayed scams tied to the breach

    Breach data is often reused weeks or months later. Phishing attempts may appear long after headlines fade. Treat any future messages claiming to reference Grubhub support, refunds or account issues with extra caution.

    These steps will not undo a breach, but they can limit how attackers exploit stolen information and reduce your risk going forward.

    FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

    Laptop on the Grubhub site.

    Sources tell BleepingComputer the Grubhub breach is tied to extortion demands involving allegedly stolen customer support data. (Gabby Jones/Bloomberg via Getty Images)

    Kurt’s key takeaways

    Grubhub’s confirmation puts an official stamp on what sources have warned about for weeks. While the company says sensitive data was not affected, unanswered questions remain. As extortion-driven breaches rise, transparency and rapid credential rotation matter more than ever. What stands out most is how past compromises continue to create new risks. When access tokens live too long, attackers do not need to break in again. They simply walk back through an open door.

    If companies stay quiet after breaches, how can customers know when it is time to protect themselves? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Malicious Google Chrome extensions hijack accounts

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybersecurity researchers have uncovered a serious threat hiding inside Google Chrome. 

    Several browser extensions pretend to be helpful tools. In reality, they quietly take over user accounts. These extensions impersonate popular human resources and business platforms such as Workday, NetSuite and SAP SuccessFactors. Once installed, they can steal login data and block security controls designed to protect users.

    Many people who installed them had no warning signs that anything was wrong.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK

    Cybersecurity researchers warn that fake Google Chrome extensions are silently hijacking user accounts by stealing login data and bypassing security protections. (Bildquelle/ullstein bild via Getty Images)

    The fake Chrome extensions to watch out for

    Security researchers from Socket’s Threat Research Team identified five malicious Chrome extensions connected to this campaign. The add-ons were marketed as productivity or security tools, but were designed to hijack accounts.

    The extensions include:

    • DataByCloud Access
    • Tool Access 11
    • DataByCloud 1
    • DataByCloud 2
    • Software Access

    We reached out to Google, and a spokesperson told CyberGuy that the extensions are no longer available on the Chrome Web Store. However, some are still available on third-party software download sites, which continues to pose a risk. If you see any of these names installed in your browser, remove them immediately.

    Why malicious Chrome extensions look legitimate

    These malicious add-ons are designed to look legitimate. They use professional names, polished dashboards and business-focused descriptions. Some claim to offer faster access to workplace tools. Others say they restrict user actions to protect company accounts. Privacy policies often promise that no personal data is collected. For people juggling daily work tasks or managing business accounts, the pitch sounds helpful rather than suspicious.

    What these extensions actually do

    After installation, the extensions operate silently in the background. They steal session cookies, which are small pieces of data that tell websites you are already logged in. When attackers get these cookies, they can access accounts without a password. At the same time, some extensions block access to security pages. Users may be unable to change passwords, disable accounts or review login history. One extension even allows criminals to insert stolen login sessions into another browser. That lets them sign in instantly as the victim.

    Why malicious Chrome extensions are so dangerous

    This attack goes beyond stealing credentials. It removes the ability to respond. Security teams may detect unusual activity, but cannot fix it through normal controls. Password changes fail. Account settings disappear. Two-factor authentication tools become unreachable. As a result, attackers can maintain access for long periods without being stopped.

    How to check for these extensions on your computer

    If you use Google Chrome, review your extensions now. The process only takes a few minutes.

    • Open Google Chrome
    • Click the three-dot menu in the top right corner
    • Select Extensions, then choose Manage Extensions
    • Review every extension listed

    Look for unfamiliar names, especially those claiming to offer access to HR platforms or business tools.

    WEB SKIMMING ATTACKS TARGET MAJOR PAYMENT NETWORKS

    Woman using Google on her laptop.

    Malicious Chrome add-ons disguised as productivity tools targeted users of popular business platforms like Workday, NetSuite and SAP SuccessFactors. (Photo by S3studio/Getty Images)

    How to remove suspicious Chrome extensions

    If you find one of these extensions, remove it immediately.

    • Open Manage Extensions in Chrome
    • Find the suspicious extension
    • Click Remove
    • Confirm when prompted

    Restart your browser after removal to ensure the extension is fully disabled. If Chrome sync is enabled, repeat these steps on all synced devices before turning sync back on.

    What to do after removing the extension

    Removal is only the first step. Change passwords for any accounts accessed while the extension was installed. Use a different browser or device if possible.

    A password manager can help you create strong, unique passwords for each account and store them securely. This reduces the risk of reused passwords being exploited again.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    Finally, review account activity for unfamiliar logins, locations or devices and be sure to follow the steps below to stay safe moving forward.

    Ways to stay safe going forward

    Simple habits can significantly reduce your risk.

    1) Limit browser extensions

    Only install extensions you truly need. The fewer extensions you use, the smaller your attack surface becomes.

    2) Be cautious with add-ons

    Avoid extensions that promise premium access or special tools for enterprise platforms. Legitimate companies rarely require browser add-ons for account access.

    3) Check permissions carefully

    Be wary of extensions that request access to cookies, browsing data or account management. These permissions can be abused to hijack sessions.

    4) Review extensions regularly

    Check your browser every few months and remove tools you no longer use or recognize.

    WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY

    Person typing on their computer.

    Several fake browser extensions were removed from the Chrome Web Store after researchers linked them to account takeover attacks. (Photo Illustration by Serene Lee/SOPA Images/LightRocket via Getty Images)

    5) Use strong antivirus software

    Strong antivirus software can help detect malicious extensions, block suspicious behavior and alert you to browser-based threats before damage occurs.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Consider a data removal service

    If your work or personal information has been exposed, a data removal service can help reduce your digital footprint by removing your details from data broker sites. This lowers the risk of follow-up scams or identity misuse.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Avoid third-party download sites

    Do not reinstall extensions from third-party websites, even if they claim to offer the same features. These sites often host outdated or malicious versions.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Browser extensions can be useful, but this research shows how easily they can also be abused. These fake Chrome add-ons did not rely on flashy tricks or obvious warnings. They blended in, looked professional and quietly did their damage in the background. The good news is that you do not need to be a tech expert to protect yourself. Taking a few minutes to review your extensions, remove anything unfamiliar and lock down your accounts can make a real difference. Small habits, repeated regularly, go a long way in reducing risk. If there is one takeaway here, it is this: convenience should never come at the cost of security. A clean browser and strong account protections give you back control.

    How many browser extensions do you have installed right now that you have never looked at twice? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts  and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Google Fast Pair flaw lets hackers hijack headphones

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Google designed Fast Pair to make Bluetooth connections fast and effortless. One tap replaces menus, codes and manual pairing. That convenience now comes with serious risk. Security researchers at KU Leuven uncovered flaws in Google’s Fast Pair protocol that allows silent device takeovers. They named the attack method WhisperPair. An attacker nearby can connect to headphones, earbuds or speakers without the owner knowing. In some cases, the attacker can also track the user’s location. Even more concerning, victims do not need to use Android or own any Google products. iPhone users are also affected.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    APPLE WARNS MILLIONS OF IPHONES ARE EXPOSED TO ATTACK

    Fast Pair makes connecting Bluetooth headphones quick, but researchers found that some devices accept new pairings without proper authorization.       (Kurt “CyberGuy” Knutsson)

    What WhisperPair is and how it hijacks Bluetooth devices

    Fast Pair works by broadcasting a device’s identity to nearby phones and computers. That shortcut speeds up pairing. Researchers found that many devices ignore a key rule. They still accept new pairings while already connected. That opens the door to abuse.

    Within Bluetooth range, an attacker can silently pair with a device in about 10 to 15 seconds. Once connected, they can interrupt calls, inject audio or activate microphones. The attack does not require specialized hardware and can be carried out using a standard phone, laptop, or low-cost device like a Raspberry Pi. According to the researchers, the attacker effectively becomes the device owner.

    Audio brands affected by the Fast Pair vulnerability

    The researchers tested 17 Fast Pair compatible devices from major brands, including Sony, Jabra, JBL, Marshall, Xiaomi, Nothing, OnePlus, Soundcore, Logitech and Google. Most of these products passed Google certification testing. That detail raises uncomfortable questions about how security checks are performed.

    How headphones can become tracking devices

    Some affected models create an even bigger privacy issue. Certain Google and Sony devices integrate with Find Hub, which uses nearby devices to estimate location. If a headset has never been linked to a Google account, an attacker can claim it first. That allows continuous tracking of the user’s movements. If the victim later receives a tracking alert, it may appear to reference their own device. That makes the warning easy to dismiss as an error.

    GOOGLE NEST STILL SENDS DATA AFTER REMOTE CONTROL CUTOFF, RESEARCHER FINDS

    A screenshot of a location screen

    Attacker’s dashboard with location from the Find Hub network. (KU Leuven)

    Why many Fast Pair devices may stay vulnerable

    There is another problem most users never consider. Headphones and speakers require firmware updates. Those updates usually arrive through brand-specific apps that many people never install. If you never download the app, you never see the update. That means vulnerable devices could remain exposed for months or even years.

    The only way to fix this vulnerability is by installing a software update issued by the device manufacturer. While many companies have released patches, updates may not yet be available for every affected model. Users should check directly with the manufacturer to confirm whether a security update exists for their specific device.

    Why convenience keeps creating security gaps

    Bluetooth itself was not the problem. The flaw lives in the convenience layer built on top of it. Fast Pair prioritized speed over strict ownership enforcement. Researchers argue that pairing should require cryptographic proof of ownership. Without it, convenience features become attack surfaces. Security and ease of use do not have to conflict. But they must be designed together.

    Google responds to the Fast Pair WhisperPair security flaws

    Google says it has been working with researchers to address the WhisperPair vulnerabilities and began sending recommended patches to headphone manufacturers in early September. Google also confirmed that its own Pixel headphones are now patched.

    In a statement to CyberGuy, a Google spokesperson said, “We appreciate collaborating with security researchers through our Vulnerability Rewards Program, which helps keep our users safe. We worked with these researchers to fix these vulnerabilities, and we have not seen evidence of any exploitation outside of this report’s lab setting. As a best security practice, we recommend users check their headphones for the latest firmware updates. We are constantly evaluating and enhancing Fast Pair and Find Hub security.”

    Google says the core issue stemmed from some accessory makers not fully following the Fast Pair specification. That specification requires accessories to accept pairing requests only when a user has intentionally placed the device into pairing mode. According to Google, failures to enforce that rule contributed to the audio and microphone risks identified by the researchers.

    To reduce the risk going forward, Google says it updated its Fast Pair Validator and certification requirements to explicitly test whether devices properly enforce pairing mode checks. Google also says it provided accessory partners with fixes intended to fully resolve all related issues once applied.

    On the location tracking side, Google says it rolled out a server-side fix that prevents accessories from being silently enrolled into the Find Hub network if they have never been paired with an Android device. According to the company, this change addresses the Find Hub tracking risk in that specific scenario across all devices, including Google’s own accessories.

    Researchers, however, have raised questions about how quickly patches reach users and how much visibility Google has into real-world abuse that does not involve Google hardware. They also argue that weaknesses in certification allowed flawed implementations to reach the market at scale, suggesting broader systemic issues.

    For now, both Google and the researchers agree on one key point. Users must install manufacturer firmware updates to be protected, and availability may vary by device and brand.

    SMART HOME HACKING FEARS: WHAT’S REAL AND WHAT’S HYPE

    A location screen

    Unwanted tracking notification showing the victim’s own device. (KU Leuven)

    How to reduce your risk right now

    You cannot disable Fast Pair entirely, but you can lower your exposure.

    1) Check if your device is affected

    If you use a Bluetooth accessory that supports Google Fast Pair, including wireless earbuds, headphones or speakers, you may be affected. The researchers created a public lookup tool that lets you search for your specific device model and see whether it is vulnerable. Checking your device is a simple first step before deciding what actions to take. Visit whisperpair.eu/vulnerable-devices to see if your device is on the list.

    2) Update your audio devices

    Install the official app from your headphone or speaker manufacturer. Check for firmware updates and apply them promptly.

    3) Avoid pairing in public places

    Pair new devices in private spaces. Avoid pairing in airports, cafés or gyms where strangers are nearby.

    4) Factory reset if something feels off

    Unexpected audio interruptions, strange sounds or dropped connections are warning signs.  A factory reset can remove unauthorized pairings, but it does not fix the underlying vulnerability. A firmware update is still required.

    5) Turn off Bluetooth when not needed

    Bluetooth only needs to be on during active use. Turning off Bluetooth when not in use limits exposure, but it does not eliminate the underlying risk if the device remains unpatched.

    6) Reset secondhand devices

    Always factory reset used headphones or speakers before pairing them. This removes hidden links and account associations.

    7) Take tracking alerts seriously

    Investigate Find Hub or Apple tracking alerts, even if they appear to reference your own device.

    8) Keep your phone updated

    Install operating system updates promptly. Platform patches can block exploit paths even when accessories lag behind.

    Kurt’s key takeaways

    WhisperPair shows how small shortcuts can lead to large privacy failures. Headphones feel harmless. Yet they contain microphones, radios and software that need care and updates. Ignoring them leaves a blind spot that attackers are happy to exploit. Staying secure now means paying attention to the devices you once took for granted.

    Should companies be allowed to prioritize fast pairing over cryptographic proof of device ownership? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Web skimming attacks target major payment networks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Online shopping feels familiar and fast, but a hidden threat continues to operate behind the scenes. 

    Researchers are tracking a long-running web skimming campaign that targets businesses connected to major payment networks. Web skimming is a technique where criminals secretly add malicious code to checkout pages so they can steal payment details as shoppers type them in. 

    These attacks work quietly inside the browser and often leave no obvious signs. Most victims only discover the problem after unauthorized charges appear on their statements.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY

    Web skimming attacks hide inside checkout pages and steal card details as shoppers type them in. (Kurt “CyberGuy” Knutsson)

    What Magecart is and why it matters

    Magecart is the name researchers use for groups that specialize in web-skimming attacks. These attacks focus on online stores where shoppers enter payment details during checkout. Instead of hacking banks or card networks directly, attackers slip malicious code into a store’s checkout page. That code is written in JavaScript, which is a common type of website code used to make pages interactive. Legitimate sites use it for things like forms, buttons and payment processing.

    In Magecart attacks, criminals abuse that same code to secretly copy card numbers, expiration dates, security codes and billing details as shoppers type them in. The checkout still works, and the purchase goes through, so there is no obvious warning sign. Magecart originally described attacks against Magento-based online stores. Today, the term applies to web-skimming campaigns across many e-commerce platforms and payment systems.

    Which payment providers are being targeted?

    Researchers say this campaign targets merchants tied to several major payment networks, including:

    • American Express
    • Diners Club
    • Discover, a subsidiary of Capital One
    • JCB Co., Ltd.
    • Mastercard
    • UnionPay

    Large enterprises that rely on these payment providers face a higher risk due to complex websites and third-party integrations.

    700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

    A woman holds a credit card as she types on her laptop.

    Criminals use hidden code to copy payment data while the purchase still goes through normally. (Kurt “CyberGuy” Knutsson)

    How attackers slip skimmers into checkout pages

    Attackers usually enter through weak points that are easy to overlook. Common entry paths include vulnerable third-party scripts, outdated plugins and unpatched content management systems. Once inside, they inject JavaScript directly into the checkout flow. The skimmer monitors form fields tied to card data and personal details, then quietly sends that information to attacker-controlled servers.

    Why web skimming attacks are hard to detect

    To avoid detection, the malicious JavaScript is heavily obfuscated. Some versions can remove themselves when they detect an admin session, which makes inspections appear clean. Researchers also found the campaign uses bulletproof hosting. These hosting providers ignore abuse reports and takedown requests, giving attackers a stable environment to operate. Because web skimmers run inside the browser, they can bypass many server-side fraud controls used by merchants and payment providers.

    Who Magecart web skimming attacks affect most

    Magecart campaigns impact three groups at the same time:

    • Shoppers who unknowingly give up card data
    • Merchants whose checkout pages are compromised
    • Payment providers that detect fraud after the damage is done

    This shared exposure makes detection slower and response more difficult.

    NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY

    Selling on the internet? Beware of sneaky tactics scammers use to trick you

    Simple protections like virtual cards and transaction alerts can limit damage and expose fraud faster. (Kurt “CyberGuy” Knutsson)

    How to stay safe as a shopper

    While shoppers cannot fix compromised checkout pages, a few smart habits can reduce exposure, limit how stolen data is used, and help catch fraud faster.

    1) Use virtual or single-use cards

    Virtual and single-use cards are digital card numbers that link to your real credit or debit account without exposing the actual number. They work like a normal card at checkout, but add an extra layer of protection. Most people already have access to them through services they use every day, including:

    Major banks and credit card issuers that offer virtual card numbers inside their apps

    Mobile wallet apps like Apple Pay and Google Pay generate temporary card numbers for online purchases, keeping your real card number hidden.

    Some payment apps and browser tools that create one-time or merchant-locked card numbers

    A single-use card typically works for one purchase or expires shortly after use. A virtual card can stay active for one store and be paused or deleted later. If a web skimming attack captures one of these numbers, attackers usually cannot reuse it elsewhere or run up repeat charges, which limits financial damage and makes fraud easier to stop.

    2) Turn on transaction alerts

    Transaction alerts notify you the moment your card is used, even for small purchases. If web skimming leads to fraud, these alerts can expose unauthorized charges quickly and give you a chance to freeze the card before losses grow. For example, a $2 test charge on your card can signal fraud before larger purchases appear.

    3) Lock down financial accounts

    Use strong, unique passwords for banking and card portals to reduce the risk of account takeover. A password manager helps generate and store them securely.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    4) Install strong antivirus software

    Strong antivirus software can block connections to malicious domains used to collect skimmed data and warn you about unsafe websites.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Use a data removal service

    Data removal services can reduce how much personal information is exposed online, making it harder for criminals to pair stolen card data with full identity details.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Watch for unexpected card activity

    Review statements regularly, even for small charges, since attackers often test stolen cards with low-value transactions.

    Kurt’s key takeaways

    Magecart web skimming shows how attackers can exploit trusted checkout pages without disrupting the shopping experience. While consumers cannot fix compromised sites, simple safeguards can reduce risk and help catch fraud early. Online payments rely on trust, but this campaign shows why that trust should always be paired with caution.

    Does knowing how web skimming works make you rethink how safe online checkout really is?  Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • FBI warns QR code phishing used in North Korean cyber spying

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The Federal Bureau of Investigation has issued a warning about a growing cyber threat that turns everyday QR codes into spying tools.

    According to the bureau, a North Korean government-sponsored hacking group is using a tactic known as quishing to target people in the United States. 

    The goal is simple. Trick you into scanning a QR code that sends you to a malicious website. From there, attackers can steal login credentials, install malware or quietly collect device data.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY

    The FBI is warning Americans about a growing cyber threat that uses QR codes to steal data and spy on victims, tying the attacks to a North Korean hacking group. (Photo by Kevin Carter/Getty Images)

    What quishing is and why it works

    Quishing is short for QR code phishing. Instead of clicking a suspicious link in an email, the victim scans a QR code that hides the real destination. QR codes themselves are harmless. The danger lies in the link embedded inside them. Once scanned, the link can redirect users to fake login pages, malware downloads or tracking sites. Because QR codes feel familiar and fast, many people scan them without thinking twice. That split second of trust is exactly what attackers rely on.

    Who is behind the attacks

    The FBI says the activity is tied to a hacking group known as Kimsuky. The group has operated for years as a cyber espionage arm for North Korea. What is new is the delivery method. According to the FBI, the QR code-based attacks began in May 2025. In one example, attackers posed as a foreign policy advisor and emailed a think tank leader with a QR code that linked to a fake questionnaire. Scanning the code sent the victim to a malicious site designed to harvest information.

    What happens after you scan the QR code

    Once a victim lands on one of these sites, several things can happen. Some pages prompt users to download files that contain malware. Others mimic mobile login portals for popular services such as Okta, Microsoft 365 or VPN services. Even if no form is filled out, the site can still collect device details. That includes IP address, operating system, browser type and approximate location. Over time, that data helps attackers build intelligence profiles on their targets.

    Why QR code phishing attacks are highly targeted

    The FBI describes these campaigns as spear phishing rather than mass spam. That means the emails are crafted for specific individuals. The language context and sender details are tailored to look relevant and credible. When an email feels personal, people are more likely to trust it. That is why these attacks are especially dangerous for professionals, researchers, executives and anyone working in policy or technology.

    Why QR code phishing threats are growing

    QR codes are everywhere now. Restaurants, parking meters, event tickets and ads all rely on them. As their use grows, so does the opportunity for abuse. Attackers know people are conditioned to scan without hesitation. That makes caution more important than ever.

    Ways to stay safe from QR code phishing

    The FBI says one of the best defenses against quishing is slowing down. QR codes remove the visual clues people rely on, so a few extra checks can make a big difference.

    1) Be cautious with unexpected QR codes

    Treat QR codes like links in emails. If you did not expect it, do not scan it. QR codes sent by email, text or messaging apps are a common entry point for quishing attacks. Criminals rely on curiosity and urgency to push you into scanning without thinking.

    2) Verify the source before scanning

    Always confirm who sent the QR code. If a message claims to come from a coworker, vendor or organization, reach out through a separate channel before scanning. A quick call or direct message can stop a phishing attempt cold.

    JANUARY SCAMS SURGE: WHY FRAUD SPIKES AT THE START OF THE YEAR

    Hacker using a laptop.

    Federal investigators say hackers are using “quishing,” or QR code phishing, to lure victims to malicious websites that steal credentials and device data. (Jens Schlueter/Getty Images)

    3) Never enter logins after scanning a QR code

    QR code phishing often leads to fake mobile login pages. Attackers mimic sign-in screens for email, VPNs and cloud services to steal usernames and passwords. If a QR code takes you to a login page, close it and visit the site manually instead.

    4) Inspect the website URL carefully

    Once a QR code opens a page, check the address bar. Look for misspellings, extra words or unfamiliar domain endings. A strange URL is often the only warning sign that the site is malicious.

    5) Use strong antivirus software for QR-based threats

    Strong antivirus software adds an extra layer of protection against quishing. Security tools can block known phishing sites, stop malicious downloads and warn you before harmful pages load. This is especially important on mobile devices, where QR codes are most often scanned.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Use a data removal service to limit exposure

    Some quishing sites collect device and location data even if you do nothing. A data removal service helps reduce how much personal information is publicly available online. That makes it harder for attackers to target you with convincing spear phishing emails that include QR codes.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Avoid QR code downloads entirely

    Do not download files from QR code links unless you are absolutely certain they are safe. Malware delivered through QR codes can quietly install spyware or remote access tools without obvious warning signs.

    INSTAGRAM PASSWORD RESET SURGE: PROTECT YOUR ACCOUNT

    Hacker typing code on his laptop.

    A North Korea-linked cyber group is targeting U.S. professionals by embedding harmful links inside seemingly harmless QR codes, according to the FBI. (Jaap Arriens/NurPhoto via Getty Images)

    Kurt’s key takeaways

    QR codes are convenient, but convenience can lower defenses. As this FBI warning shows, attackers are evolving and using familiar tools in dangerous ways. A moment of verification can prevent weeks or months of damage.

    When was the last time you stopped to question a QR code before scanning it? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Illinois DHS data breach exposes 700K residents’ records

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Illinois residents are once again being reminded how fragile government data systems can be. The Illinois Department of Human Services has confirmed a data breach that exposed sensitive records belonging to roughly 700,000 people.

    The breach is believed to have exposed two distinct sets of records. One is personal and program-related data tied to more than 672,000 Medicaid and Medicare Savings Program recipients, including addresses, case numbers, demographic details and medical assistance plan names, and another 32,000 Division of Rehabilitation Services customers whose names, addresses, case details and referral information were also exposed over multiple years.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

    The Illinois Department of Human Services confirmed a data breach that exposed sensitive records tied to roughly 700,000 residents, including Medicaid and disability services recipients. (Jakub Porzycki/NurPhoto via Getty Images)

    What happened in the Illinois DHS data breach

    As spotted by Bleeping Computer, the Illinois Department of Human Services disclosed that unauthorized access to one of its systems led to the exposure of records tied to approximately 700,000 Illinois residents. The affected data was connected to individuals who interacted with DHS programs, which can include benefits, assistance services and support programs across the state.

    According to the agency, the breach involved personally identifiable information. While officials have not publicly released every technical detail, DHS confirmed that sensitive records were accessed, prompting notifications to impacted individuals. As is typical in cases like this, the investigation is ongoing, and the full scope of how the intrusion occurred is still being reviewed.

    For residents, the key issue is not just that data was accessed, but the type of data DHS holds. Government agencies like DHS often store names, addresses, dates of birth, case numbers and, in some instances, Social Security numbers or benefits-related information. Once that data escapes, it can be misused in ways that last for years.

    Why breaches like this are especially risky

    When a private company is breached, you can often change a password or close an account. Government data is different. You can’t change your Social Security number easily. You can’t erase past interactions with public assistance programs. That makes breaches involving state agencies particularly dangerous.

    Exposed records can be used for identity theft, fraudulent benefit claims, phishing scams and long-term impersonation. Criminals often combine government data with information from other breaches to build detailed profiles that make scams far more convincing. Even if there’s no immediate misuse, stolen data frequently resurfaces months or years later.

    As with many large breaches, DHS has stated that it is taking steps to secure its systems and prevent similar incidents in the future. That’s an expected response. But for affected residents, the burden of protection now shifts largely to you.

    We reached out to the Illinois Department of Human Services for comment, but did not receive a response before our deadline.

    JANUARY SCAMS SURGE: WHY FRAUD SPIKES AT THE START OF THE YEAR

    Hacker committing cybercrimes.

    Personal information from Illinois DHS programs was accessed without authorization, raising concerns about long-term identity theft and fraud risks. (Philip Dulian/picture alliance via Getty Images)

    7 steps you can take to stay safe after the Illinois DHS breach

    If you received a notification from Illinois DHS, or if you’ve ever interacted with DHS programs, these steps can help reduce your risk.

    1) Enroll in identity theft protection if it’s offered

    If DHS provides free identity monitoring or credit protection, sign up. These services can alert you to suspicious activity involving your Social Security number or credit file before the damage spreads. Beyond basic monitoring, full identity theft services can help with recovery, paperwork and financial reimbursement if fraud occurs. This can be especially useful after large-scale government breaches.

    Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    2) Use a password manager immediately

    A password manager helps you create and store strong, unique passwords for every account. If your personal data is leaked, attackers often try the same credentials across multiple services. Unique passwords stop one breach from turning into many.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    3) Run strong antivirus software on your devices

    Strong antivirus tools do more than scan files. They monitor suspicious behavior, phishing attempts and malicious links that often follow large data breaches. This matters because breach victims are frequently targeted with follow-up scams.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Place a fraud alert or credit freeze on your credit file

    A fraud alert tells lenders to verify your identity before opening new accounts. A credit freeze goes further by blocking new credit entirely unless you lift it. If Social Security numbers were exposed, a freeze is often the safest option.

    5) Use a personal data removal service

    Once your information leaks, it often spreads to data broker sites that sell personal details. Personal data removal services work to request takedowns and reduce how much of your information is publicly available. While they can’t erase everything, they significantly lower your exposure.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Watch for phishing and impersonation scams

    After breaches involving government agencies, scammers often pretend to be state officials, benefits offices, or support hotlines. Don’t click links or share information unless you independently verify the source through official websites or phone numbers.

    7) Review your credit reports regularly

    You’re entitled to free credit reports from major credit bureaus. Check them for unfamiliar accounts, inquiries or address changes. Early detection makes identity theft far easier to contain.

    COVENANT HEALTH DATA BREACH AFFECTS NEARLY 500,000 PATIENTS

    Hacker typing in code.

    State officials say the breach involved Medicaid, Medicare Savings Program and rehabilitation services records spanning multiple years. (Silas Stein/picture alliance via Getty Images)

    Kurt’s key takeaway

    Even government agencies are not immune to large-scale security failures. When nearly 700,000 residents are affected, the impact goes far beyond a single system or department. While DHS works through its investigation, protecting your identity now depends largely on the steps you take next. Acting early, layering protections and staying vigilant can make the difference between a breach being an inconvenience or a long-term nightmare.

    Do you trust state agencies to protect your personal data? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Apple warns millions of iPhones are exposed to attack

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The Apple iPhone is the most popular smartphone in the United States and one of the most widely used devices in the world. An estimated 1.6 billion people rely on iPhones every day. That massive user base also makes the platform a prime target. 

    Over the past few weeks, Apple has been sending out warnings about a serious security flaw. New data suggests the risk could affect roughly half of all iPhone users.

    That puts hundreds of millions of devices in potential danger right now.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WHATSAPP WEB MALWARE SPREADS BANKING TROJAN AUTOMATICALLY

    Apple is warning iPhone users about a serious Safari security flaw that could leave hundreds of millions of devices vulnerable if updates are delayed. (Thomas Trutschel/Photothek via Getty Images)

    What Apple discovered in Safari and WebKit

    Late last month, Apple confirmed two critical vulnerabilities in WebKit. WebKit powers Safari and every browser that runs on iOS. According to Apple, the flaws were used in an extremely sophisticated attack that targeted specific individuals. The problem allowed malicious websites to trick iPhones and iPads into running harmful code. Once that happens, attackers could gain control of the device, steal passwords or access payment information. In simple terms, visiting the wrong website could have been enough.

    Why millions of iPhones are still exposed

    Apple moved quickly to release a fix. The patch is included in the latest software update. The problem is that many people have not installed it yet. Estimates suggest that about 50 percent of eligible users have not upgraded from iOS 18 to iOS 26. That would leave around 800 million devices vulnerable worldwide. Data from StatCounter paints an even worse picture. It estimates that only 20 percent of users have updated so far. Once security details become public, the risk grows fast. Attackers know exactly what to exploit.

    iPhone and iPad models at the highest risk

    Apple says the following devices are affected if they are not updated:

    • iPhone 11 and later
    • iPad Pro 12.9-inch 3rd generation and later
    • iPad Pro 11-inch 1st generation and later
    • iPad Air 3rd generation and later
    • iPad 8th generation and later
    • iPad mini 5th generation and later

    If your device appears on this list and you have not updated it, it is vulnerable.

    INSTAGRAM PASSWORD RESET SURGE: PROTECT YOUR ACCOUNT

    An iPhone resting on a keyboard.

    New data suggests nearly half of all iPhone users worldwide may still be exposed to a critical WebKit exploit Apple says was actively used in attacks. (Jakub Porzycki/NurPhoto via Getty Images)

    Why upgrading is the only real protection

    There is no setting to flip and no safe browsing habit that fixes this issue. The vulnerability lives deep inside the browser engine. Security experts say there is no workaround or user behavior that meaningfully reduces the risk. Installing the latest software is the only effective defense. Apple is no longer offering a security-only update for users who want to stay on iOS 18. Unless your device cannot run iOS 26, the fix is only available through iOS 26.2 and iPadOS 26.2.

    Steps to update your iPhone or iPad now

    Updating is quick and usually painless. If automatic updates are enabled, the fix may already be installed.

    If not, follow these steps:

    • Open the Settings app on iPhone
    • Tap General
    • Select Software Update
    • Download and install iOS 26.2 or iPadOS 26.2 or later 

    Make sure your device is connected to Wi-Fi and has enough battery life or is plugged in.

    Pro tip: Use strong antivirus software

    Keeping your iPhone updated is critical, but it should not be your only line of defense. Strong antivirus software adds another layer of protection by scanning malicious links, blocking risky websites and alerting you to suspicious activity before damage is done.

    This matters even more when attacks rely on compromised websites or hidden browser exploits. Security software can help catch threats that slip through and give you extra visibility into what is happening on your device.

    Think of it as backup protection. Software updates close known holes, while strong antivirus tools help guard against the next one.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

     FAKE ERROR POPUPS ARE SPREADING MALWARE FAST

    A person using their iPhone.

    Apple says malicious websites could exploit a Safari flaw to steal passwords or payment information from unpatched iPhones and iPads. (David Paul Morris/Bloomberg via Getty Images)

    Kurt’s key takeaways

    Apple rarely uses language like “extremely sophisticated” unless the threat is serious. This flaw shows how even trusted browsers can become attack paths when updates are delayed. Waiting weeks or months to update now carries real consequences. If you use your iPhone for banking, shopping or work, this update should be treated as urgent.

    How long do you usually wait before installing major iPhone updates, and is that delay worth the risk anymore? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Arlo Europe launches Ultra 3 and Pro 6 Security Cameras – Tech Digest

    [ad_1]

    Share

    Arlo Ultra 3

    Arlo Europe has announced the launch of two new security cameras, the Ultra 3 and the Pro 6.

    These devices are designed to integrate with the Arlo Secure Early Warning System, an AI-powered platform that uses real-time recognition to identify potential threats.

    The Arlo Ultra 3 serves as the brand’s flagship model, featuring 4K HDR video and a 180-degree field of view. It uses a SmartHub connection to manage data transmission and local storage.

    The camera’s AI is capable of identifying specific subjects, including people, vehicles, animals, packages, and fire. Users can also use custom detection settings to prioritize specific types of alerts.

    According to Adrienne Sharkey-Perves, Managing Director at Arlo Europe, the focus of these releases is on proactive monitoring. “Our Early Warning System gives users something no other brand can: a DIY home security camera system with smarter AI that learns, adapts, and acts faster,” Sharkey-Perves stated.

    The Arlo Pro 6 offers 2K+ HDR video and utilizes a 12-bit color sensor. This sensor is designed to improve color accuracy for night vision, assisting in the identification of faces, clothing, and vehicles in low-light conditions. The Pro 6 includes 12x zoom with an auto-tracking feature that follows movement within its 160-degree field of view.

    Both cameras include a built-in spotlight and siren to act as visible deterrents. They support two-way audio, allowing users to communicate with visitors through the Arlo app.

    The systems are engineered for outdoor use with weather-resistant housings and with different power options, including USB-C charging and removable batteries for the Pro 6.

    Addressing the importance of visual data, Sharkey-Perves noted that “color accuracy adds another critical layer—it can mean the difference between identifying a suspect or missing a vital detail.” Both models are available starting today (January 19, 2026) via Arlo’s website and major retailers.

    Arlo Ultra 3 Specifications:

    • Video Quality: 4K HDR video

    • Field of View: 180-degree wide angle

    • Connectivity: Arlo SmartHub required

    • AI Detection: People, vehicles, animals, packages, fire, and custom events

    • Night Vision: Color night vision

    • Security Features: Built-in spotlight, siren, and two-way audio

    • Retail Price: From £529.99/€599.99 for a 2-camera kit


    Arlo Pro 6 Specifications:

    • Video Quality: 2K+ HDR video

    • Color Sensor: 12-bit sensor for improved color accuracy

    • Field of View: 160-degree wide-angle

    • Zoom: 12x zoom with auto-tracking

    • Night Vision: Advanced color night vision

    • Security Features: Built-in spotlight, siren, and two-way audio

    • Power: USB-C charging with optional removable battery

    • Retail Price: £169.99/€199.99 for a single camera kit


    For latest tech stories go to TechDigest.tv


    Discover more from Tech Digest

    Subscribe to get the latest posts sent to your email.

    [ad_2]

    Chris Price

    Source link

  • January scams surge: Why fraud spikes at the start of the year

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Every January, I hear from people who say the same thing: “I just got an email that looked official, and I almost fell for it.” That’s not a coincidence. January is one of the busiest months of the year for scammers. While most of us are focused on taxes, benefits, subscriptions, and getting our finances in order, criminals are doing their own kind of cleanup, refreshing scam lists and going after people with newly updated personal data. If you’ve ever received a message claiming your account needs to be “verified,” your benefits are at risk, or your tax information is incomplete, this article is for you.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

    Scam messages often look urgent and official, pushing you to act before you have time to think. That pressure is exactly what criminals rely on. (Kurt “CyberGuy” Knutsson)

    Why January is prime time for scammers

    January is when scammers have everything they need. According to YouMail’s Robocall Index, U.S. consumers received just over 4.7 billion robocalls in January 2025, a roughly 9% increase from December 2024. This year, we can expect the same pattern from scammers.

    They know:

    But the biggest reason scams spike now? Your personal data is easier to find than you think. Data brokers quietly collect and update profiles year after year. By January, those profiles are often more complete than ever, and scammers know it.

    The “account verification” scam you’ll see everywhere

    One of the most common January scams looks harmless at first. You get a message saying:

    • “Your Social Security account needs verification”
    • “Your Medicare information has to be updated”
    • “Your benefits could be delayed without action”

    The message sounds official. Sometimes it even uses your real name or location. That’s where people get tricked. Government agencies don’t ask for sensitive information through random emails or texts. Scammers rely on urgency and familiarity to push you into reacting before thinking.

    My rule: If you didn’t initiate the request, don’t respond to it. Always go directly to the agency’s official website or phone number, never through a link sent to you.

    MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

    A person typing on a laptop. (Kurt "CyberGuy" Knutsson)  

    January is a prime time for fraud because people are dealing with taxes, benefits and account updates. Scammers know these messages feel expected and familiar. (Kurt “CyberGuy” Knutsson)

    Fake tax and benefits notices ramp up in January

    Another favorite scam this time of year involves taxes and refunds.

    You may see:

    • Emails claiming you owe back taxes
    • Messages saying you’re due a refund
    • Notices asking you to “confirm” banking information.

    These scams work because they arrive at exactly the moment people expect to hear from tax agencies or benefits programs.

    Scammers don’t need much to sound convincing. A name, an email address or an old address is often enough. If you get a tax-related message out of the blue, slow down. Real agencies don’t pressure you to act immediately.

    Subscription “problems” that aren’t real

    January is also when subscription scams explode. Fake messages claim:

    Scammers know most people have subscriptions, so they play the odds. Instead of clicking, open the app or website directly. If there’s a real problem, you’ll see it there.

    Why these scams feel so personal

    People often tell me, “But they used my name, how did they know?” Here’s the uncomfortable truth: They probably bought it. Data brokers compile massive profiles that include:

    • Address histories
    • Phone numbers and emails
    • Family connections
    • Shopping behavior.

    That data is sold, shared and leaked. Once scammers have it, they can tailor messages that feel real, because they’re built on real information.

    10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

    The more personal data scammers have, the more convincing their messages become. Removing your information from data broker sites can help reduce targeted scams over time.

    The more personal data scammers have, the more convincing their messages become. Removing your information from data broker sites can help reduce targeted scams over time. (Kurt “CyberGuy” Knutsson)

    What you should do right now

    Before January gets any busier, take these steps to reduce your exposure to scams and fraud:

    1) Remove your personal data from broker sites

    Deleting emails or blocking numbers helps, but it does not stop scams at the source. Scammers rely on data broker sites that quietly collect, update and sell your personal information. Removing your data from those sites reduces scam calls, phishing emails and targeted texts over time. It also makes it harder for criminals to personalize messages using your real name, address or family connections. You have two ways to do this:

    Do it yourself:

    You can visit individual data broker websites, search for your profile and submit opt-out requests.This method works, but it takes time. Each site has its own rules, identity verification steps, and response timelines. Many brokers also re-add data later, which means you have to repeat the process regularly.

    Use a data removal service:

    A data removal service automates the opt-out process by contacting hundreds of data brokers on your behalf and monitoring for re-listings. This option saves time and provides ongoing protection, especially if you want long-term results without constant follow-ups.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    2) Don’t click links in unexpected messages

    If you did not initiate the request, do not click. Scam messages are designed to create urgency, especially around taxes, benefits and account issues. Instead, go directly to the official website by typing the address yourself or using a saved bookmark. This single habit prevents most phishing attacks.

    3) Turn on two-factor authentication wherever possible

    Two-factor authentication (2FA) adds a critical second layer of protection. Even if someone gets your password, they still cannot access your account without the second verification code. Start with email, financial accounts, social media and government services.

    4) Check accounts only through official apps or websites

    If you receive a warning about an account problem, do not trust the message itself. Open the official app or website, and check there. If something is wrong, you will see it immediately. If not, you just avoided a scam.

    5) Watch for account alerts and login activity

    Enable login alerts and security notifications on important accounts. These alerts can warn you if someone tries to sign in from a new device or location. Early warnings give you time to act before real damage occurs.

    6) Use strong, unique passwords and a password manager

    Reusing passwords makes it easy for scammers to take over multiple accounts at once. If one service is compromised, attackers try the same login on email, banking, and social media accounts. A password manager helps you create and store strong, unique passwords for every account without needing to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    January scams aren’t random. They’re targeted, timed and fueled by personal data that shouldn’t be public in the first place. The longer your information stays online, the easier it is for scammers to use it against you. If you want a quieter inbox, fewer scam calls and less risk this year, take action early, before criminals finish rebuilding their lists. Protect your data now, and you’ll be safer all year long.

    Have you noticed more scam emails, texts or calls since the new year started? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 5 simple tech tips to improve digital privacy

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Protecting your privacy doesn’t require advanced tools or technical expertise. Some of the most effective protections are already built into your phone; you just need to know where to look.

    These five privacy tips show you exactly how to reduce tracking and limit data sharing on both iPhone and Android using the latest software.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

    Smartphone users can boost privacy by adjusting built-in settings that limit tracking, location sharing and background data collection on iPhone and Android devices. (Neil Godwin/Future via Getty Images)

    1) Reduce app permissions

    Apps often request access to your camera, microphone, contacts, photos and location, even when it’s not necessary. Limiting these permissions reduces background data collection.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Select a permission type such as Microphone, Camera, Photos or Contacts
    • Toggle off access for apps that don’t need it

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Choose a permission category and set apps to Don’t allow or Allow only while using the app

    2) Turn off location access you don’t need

    Location tracking can reveal where you live, work, shop and travel.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services
    • Select an app and choose While Using the App or Never
    • Turn off Precise Location when exact coordinates aren’t needed

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Location
    • Tap App location permissions or App permissions 
    • Scroll through the list and tap the app you want to change
    • Select Allow only while using the app or Don’t allow

    3) Turn off photo sharing with apps

    Some apps request full access to your photo library, giving them visibility into every image and video you’ve taken.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Photos
    • Select an app and choose Selected Photos or None

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Tap Photos and videos 
    • Scroll through the list and tap the app you want to change
    • Set apps to Don’t allow, or Allow limited access

    5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY

    Woman holding her phone.

    Turning off unnecessary app permissions and tracking features helps protect sensitive information stored on your phone. (Sebastian Kahnert/picture alliance via Getty Images)

    4) Turn off app tracking

    App tracking allows advertisers to follow your activity across multiple apps.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security & privacy
    • Scroll down and tap More privacy settings
    • Tap Ads
    • Tap Delete advertising ID to remove the existing ID tied to your device
    • Tap Reset advertising ID to generate a new, blank ID

    This removes the identifier apps use to track you for targeted ads and replaces it with a fresh ID that isn’t linked to your previous activity.

    5) Turn off unnecessary background app activity

    Some apps continue running and collecting data even when you’re not actively using them.

    iPhone

    • Open Settings
    • Tap General
    • Tap Background App Refresh
    • Turn it off entirely or disable it for individual apps

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Battery
    • Choose Restricted or turn off Allow background usage 

    Pro tip: Use a password manager

    A password manager reduces the need to store logins inside apps, which can limit unnecessary permissions and data collection.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    Person selecting an item on their phone.

    Privacy experts say small changes to phone settings can go a long way in reducing digital surveillance and data exposure. (Karl-Josef Hildenbrand/Picture Alliance via Getty Images)

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    Kurt’s key takeaways

    Protecting your privacy doesn’t have to be complicated. By reducing app permissions, limiting location access, controlling photo sharing, turning off app tracking and restricting background activity, you can significantly reduce how much personal data your phone shares. A few simple setting changes can go a long way in protecting your digital life.

    What privacy setting surprised you the most, or is there one you’re unsure about? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Teen hackers recruited through fake job ads

    [ad_1]

    NEWYou can now listen to Fox News articles!

    At first glance, the job posts look completely harmless. They promise fast money, flexible hours and paid training. No experience required. Payment comes in crypto. But these are not tutoring gigs or customer service roles. They are recruiting ads for ransomware operations. 

    And many of the people responding are middle and high school students. Some posts openly say they prefer inexperienced workers. Others quietly prioritize young women. All of them promise big payouts for “successful calls.”

    What they leave out is the risk. Federal charges. Prison time. Permanent records. This underground ecosystem goes by a familiar name. Insiders often refer to it as “The Com,” short for “The Community.”

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    Fake job ads promising fast cash and flexible hours are quietly recruiting teens into ransomware and extortion schemes, often paying in cryptocurrency to hide criminal activity. (Donato Fasano/Getty Images)

    How The Com operates behind the scenes

    The Com is not a single organized gang. It functions as a loose network of groups that regularly change names and members. Well-known offshoots tied to this ecosystem include Scattered Spider, Lapsus$, ShinyHunters and related splinter crews. Some groups focus on data theft. Others specialize in phishing or extortion. Collaboration happens when it benefits the operation. 

    Since 2022, these networks have targeted more than 100 major companies in the U.S. and UK. Victims include well-known brands across retail, telecom, finance, fashion and media, including companies such as T-Mobile, Nike and Instacart. The combined market value of affected companies exceeds one trillion dollars.

    Teenagers often take on the riskiest roles within these schemes. Phone calls, access testing and social engineering scripts typically fall to younger participants. More experienced criminals remain in the background, limiting their exposure.

    That structure mirrors what identity and fraud experts are seeing across the industry. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification company, says fake job ads are effective because they borrow trust from a familiar social contract. 

    “A job post feels structured, normal and safe, even when the actual behavior being requested is anything but,” Amper said. “A job posting implies a real process – a role, a manager, training and a paycheck. That’s exactly why it works. It lowers skepticism and makes risky requests feel like normal onboarding.”

    Amper notes that what’s changed is not just the scale of recruitment, but how criminals package it. “Serious crime is now being sold as ‘work.’”

    Why teens excel at social engineering attacks

    Teenagers bring a unique mix of skills that make them highly convincing. Fluent English and comfort with modern workplace technology help them sound legitimate. Familiarity with tools like Slack, ticketing systems and cloud platforms makes impersonation easier.

    According to Amper, teens don’t need technical expertise to get pulled in. “The on-ramp is usually social, a Discord server, a DM, a ‘quick gig,’” he said. “It can feel like trolling culture, but the targets are real companies and the consequences are real people.”

    Risk awareness is often lower. Conversations frequently take place in public chats, where tactics and mistakes are shared quickly. That visibility accelerates learning and increases the likelihood of detection and arrest.

    Gaming culture feeds the pipeline

    For many teens, it starts small. Pranks in online games turn into account takeovers. Username theft becomes crypto theft. Skills escalate. So do the stakes.

    Recruitment often begins in gaming spaces where fast learning and confidence are rewarded. Grooming is common. Sextortion sometimes appears. By the time real money enters the picture, legal consequences feel distant.

    Amper compares the progression to gaming itself. “These crews package crime as a ladder,” he said. “Join the group, do small tasks, level up, get paid, get status.”

    Why young women are being targeted

    Cybercrime remains male-dominated, but recruiters adapt. Young women are increasingly recruited for phone-based attacks. Some use AI tools to alter accents or tone. Others rely on stereotypes. Distress lowers suspicion faster than authority. Researchers say women often succeed because they are underestimated. That same dynamic puts them at risk inside these groups. Leadership remains overwhelmingly male. Girls often perform low-level work. Training stays minimal. Exploitation is frequent.

    Red flags that signal fake job scams and ransomware recruitment

    These warning signs show up repeatedly in cases involving teen hackers, social engineering crews and ransomware groups.

    Crypto-only pay is a major warning sign

    Legitimate employers do not pay workers exclusively in cryptocurrency. Crypto-only pay makes transactions hard to trace and protects criminals, not workers.

    Per-call or per-task payouts should raise concern

    Promises of hundreds of dollars for a single call or quick task often point to illegal activity. Real jobs pay hourly or a salary with documentation.

    Recruitment through Telegram or Discord is a red flag

    Criminal groups rely on private messaging apps to avoid oversight. Established companies do not recruit employees through gaming chats or encrypted DMs.

    Anonymous mentors and vague training are dangerous

    Being “trained from scratch” by unnamed individuals is common in ransomware pipelines. These mentors disappear when arrests happen.

    Secrecy requests signal manipulation

    Any job that asks teens to hide work from parents or employees to hide tasks from employers is crossing a line. Secrecy protects the recruiter, not the recruit.

    Amper offers a simple rule of thumb: “If a ‘job’ asks you to pretend to be someone else, obtain access, move money, or share sensitive identifiers before you’ve verified the employer, you’re not in a hiring process. You’re in a crime pipeline.”

    He adds that legitimate employers collect sensitive information only after a real offer, through verified HR systems. “The scam version flips the order,” he said. “It asks for the most sensitive details first, before anything is independently verifiable.”

    Urgency and emotional pressure are deliberate tactics

    Rushing decisions or creating fear lowers judgment. Social engineering depends on speed and emotional reactions.

    If you see more than one of these signs, pause immediately. Walking away early can prevent serious legal consequences later.

    MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

    Hacker using a computer.

    Cybercrime recruiters are targeting middle and high school students for risky roles like social engineering calls, exposing them to federal charges and prison time. (Philip Dulian/picture alliance via Getty Images)

    Law enforcement is cracking down on teen cybercrime

    Since 2024, government indictments and international arrests have shown cybercriminal groups tied to The Com and Scattered Spider are under increasing scrutiny from law enforcement. In Sept. 2025, U.S. prosecutors unsealed a Department of Justice complaint against 19-year-old Thalha Jubair, accusing him of orchestrating at least 120 ransomware and extortion attacks that brought in over $115 million in ransom payments from 47 U.S. companies and organizations, including federal court networks. Prosecutors charged Jubair with computer fraud, wire fraud and money laundering conspiracy.

    Across the Atlantic, British authorities charged Jubair and 18-year-old Owen Flowers for their alleged roles in a Transport for London cyberattack in 2024 that compromised travel card data and disrupted live commuter information. Both appeared in court under the U.K.’s Computer Misuse Act. Earlier law enforcement action in the U.S. included criminal charges against five Scattered Spider suspects for mass phishing campaigns that stole login credentials and millions in cryptocurrency, laying out how members of this collective staged coordinated extortion and data theft.

    Federal agencies are also issuing advisories about the group’s social engineering techniques, noting how attackers impersonate help desks, abuse multi-factor authentication and harvest credentials to access corporate networks.

    Parents often learn the truth late. In many cases, the first warning comes when federal agents arrive at the door. Teens can move from online pranks to serious federal crimes without realizing where the legal line lies.

    How parents and teens can avoid ransomware recruitment traps

    This type of cybercrime thrives on silence and speed. Slowing things down protects families and futures.

    Tips for parents and guardians to spot fake job scams early

    Parents play a critical role in spotting early warning signs, especially when online “work” starts happening behind closed doors or moves too fast to explain.

    1) Pay attention to how online “jobs” are communicated

    Ask which platforms your child uses for work conversations and who they talk to. Legitimate employers do not recruit through Telegram or Discord DMs.

    2) Question sudden income with no clear employer

    Money appearing quickly, especially in crypto, deserves scrutiny. Real jobs provide paperwork, supervisors and pay records.

    3) Treat secrecy as a serious warning sign

    If a teen is told to keep work private from parents or teachers, that is not independence. It is manipulation.

    4) Talk early about legal consequences online

    Many teens do not realize that cybercrime can lead to federal charges. Honest conversations now prevent life-changing outcomes later. Also, monitoring may feel uncomfortable. However, silence creates more risk.

    Tips for teens to avoid fake job offers and cybercrime traps

    Teenagers with tech skills have real opportunities ahead, but knowing how to spot fake offers can mean the difference between building a career and facing serious legal trouble.

    1) Be skeptical of private messages offering fast money

    Real companies do not cold-recruit through private chats or gaming servers.

    2) Avoid crypto-only payment offers

    Being paid only in cryptocurrency is a common tactic used to hide criminal activity.

    3) Choose legal paths to build skills and reputation

    Bug bounty programs, cybersecurity clubs and internships offer real experience without risking your future. Talent opens doors. Prison closes them.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    FBI WARNS OF FAKE KIDNAPPING PHOTOS USED IN NEW SCAM

    Person typing on a keyboard.

    A loose cybercrime network known as “The Com” has been linked to major U.S. and U.K. data breaches affecting companies worth trillions combined. (Photo by Uli Deck/picture alliance via Getty Images)

    Kurt’s key takeaways

    What makes this trend so unsettling is how ordinary it all looks. The job ads sound harmless. The chats feel friendly. The crypto payouts seem exciting. But underneath that surface is a pipeline pulling teenagers into serious crimes with real consequences. Many kids do not realize how far they have gone until it is too late. What starts as a quick call or a side hustle can turn into federal charges and years of fallout. Cybercrime moves fast. Accountability usually shows up much later. By the time it does, the damage is already done.

    If fake job ads can quietly recruit teenagers into ransomware gangs, how confident are you that your family or workplace would spot the warning signs before it is too late? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Why your Android TV box may secretly be a part of a botnet

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Android TV streaming boxes that promise “everything for one price” are everywhere right now. 

    You’ll see them on big retail sites, in influencer videos, and even recommended by friends who swear they’ve cut the cord for good. And to be fair, they look irresistible on paper, offering thousands of channels for a one-time payment. But security researchers are warning that some of these boxes may come with a hidden cost.

    In several cases, devices sold as simple media streamers appear to quietly turn your home internet connection into part of larger networks used for shady online activity. And many buyers have no idea it’s happening.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    Android TV streaming boxes promising unlimited channels for a one-time fee may quietly turn home internet connections into proxy networks, according to security researchers. (Photo By Paul Chinn/The San Francisco Chronicle via Getty Images)

    What’s inside these streaming boxes

    According to an investigation by Krebs on Security, media streaming devices don’t behave like ordinary media streamers once they’re connected to your network. Researchers closely examine SuperBox, which is an Android-based streaming box sold through third-party sellers on major retail platforms. On paper, SuperBox markets itself as just hardware. The company claims it doesn’t pre-install pirated apps and insists users are responsible for what they install. That sounds reassuring until you look at how the device actually works.

    To unlock the thousands of channels SuperBox advertises, you must first remove Google’s official app ecosystem and replace it with an unofficial app store. That step alone should raise eyebrows. Once those custom apps are installed, the device doesn’t just stream video but also begins routing internet traffic through third-party proxy networks.

    What this means is that your home internet connection may be used to relay traffic for other people. That traffic can include ad fraud, credential stuffing attempts and large-scale web scraping.

    During testing by Censys, a cyber intelligence company that tracks internet-connected devices, SuperBox models immediately contacted servers tied to Tencent’s QQ messaging service, run by Tencent, as well as a residential proxy service called Grass.

    Grass describes itself as an opt-in network that lets you earn rewards by sharing unused internet bandwidth. This suggests that SuperBox devices may be using SDKs or tooling that hijack bandwidth without clear user consent, effectively turning the box into a node inside a proxy network.

    Why SuperBox activity resembles botnet behavior

    In simple terms, a botnet is a large group of compromised devices that work together to route traffic or perform online tasks without the owners realizing it.

    Researchers discovered SuperBox devices contained advanced networking and remote access tools that have no business being on a streaming box. These included utilities like Tcpdump and Netcat, which are commonly used for network monitoring and traffic interception.

    The devices performed DNS hijacking and ARP poisoning on local networks, techniques used to redirect traffic and impersonate other devices on the same network. Some models even contained directories labeled “secondstage,” suggesting additional payloads or functionality beyond streaming.

    SuperBox is just one brand in a crowded market of no-name Android streaming devices. Many of them promise free content and quick setup, but often come preloaded with malware or require unofficial app stores that expose users to serious risk.

    In July 2025, Google filed a lawsuit against operators behind what it called the BADBOX 2.0 botnet, a network of more than ten million compromised Android devices. These devices were used for advertising fraud and proxy services, and many were infected before consumers even bought them.

    Around the same time, the Feds warned that compromised streaming and IoT devices were being used to gain unauthorized access to home networks and funnel traffic into criminal proxy services.

    We reached out to SuperBox for comment but did not receive a response before our deadline.

    8 steps you can take to protect yourself

    If you already own one of these streaming boxes or are thinking about buying one, these steps can help reduce your risk significantly.

    1) Avoid devices that require unofficial app stores

    If a streaming box asks you to remove Google Play or install apps from an unknown marketplace, stop right there. This bypasses Android’s built-in security checks and opens the door to malicious software. Legitimate Android TV devices don’t require this.

    2) Use strong antivirus software on your devices

    Even if the box itself is compromised, strong antivirus software on your computers and phones can detect suspicious network behavior, malicious connections or follow-on attacks like credential stuffing. Strong antivirus software monitors behavior, not just files, which matters when malware operates quietly in the background. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Put streaming devices on a separate or guest network

    If your router supports it, isolate smart TVs and streaming boxes from your main network. This prevents a compromised device from seeing your laptops, phones or work systems. It’s one of the simplest ways to limit damage if something goes wrong.

    4) Use a password manager

    If your internet connection is being abused, stolen credentials often come next. A password manager ensures every account uses a unique password, so one leak doesn’t unlock everything. Many password managers also refuse to autofill on suspicious or fake websites, which can alert you before you make a mistake.

    MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

    AndroidTV logo on a phone.

    Investigators warn some Android-based streaming boxes route user bandwidth through third-party servers linked to ad fraud and cybercrime. (Photo Illustration by Thomas Fuller/SOPA Images/LightRocket via Getty Images)

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    5) Consider using a VPN for sensitive activity

    A VPN won’t magically fix a compromised device, but it can reduce exposure by encrypting your traffic when browsing, banking or working online. This makes it harder for third parties to inspect or misuse your data if your network is being relayed.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Watch your internet usage and router activity

    Unexpected spikes in bandwidth, slower speeds or strange outbound connections can be warning signs. Many routers show connected devices and traffic patterns.

    If you notice suspicious traffic or behavior, unplug the streaming box immediately and perform a factory reset on your router. In some cases, the safest option is to stop using the device altogether.

    Also, make sure your router firmware is up to date and that you’ve changed the default admin password. Compromised devices often try to exploit weak router settings to persist on a network.

    7) Be wary of “free everything” streaming promises

    Unlimited premium channels for a one-time fee usually mean you’re paying in some other way, often with your data, bandwidth or legal exposure. If a deal sounds too good to be true, it usually is.

    8) Consider a data removal service

    If your internet connection or accounts have been abused, your personal details may already be circulating among data brokers. A data removal service can help opt you out of people-search sites and reduce the amount of personal information criminals can exploit for follow-up scams or identity theft. While it won’t fix a compromised device, it can limit long-term exposure.

    10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

    An AndroidTV display.

    Cyber experts say certain low-cost streaming devices behave more like botnet nodes than legitimate media players once connected to home networks. (Photo by Alessandro Di Ciommo/NurPhoto via Getty Images)

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Kurt’s key takeaway

    Streaming boxes like SuperBox thrive on frustration. As subscriptions pile up, people look for shortcuts. But when a device promises everything for nothing, it’s worth asking what it’s really doing behind the scenes. Research shows that some of these boxes don’t just stream TV. They quietly turn your home network into a resource for others, sometimes for criminal activity. Cutting the cord shouldn’t mean giving up control of your internet connection. Before plugging in that “too good to be true” box, it’s worth slowing down and looking a little closer.

    Would you still use a streaming box if it meant sharing your internet with strangers? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2026 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link