ReportWire

Tag: Security

  • Covenant Health data breach affects nearly 500,000 patients

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When a healthcare data breach is first disclosed, the number of people affected is often far lower than the final tally. That figure frequently climbs as investigations continue. 

    That’s exactly what happened with Andover, Mass.-based Covenant Health. The Catholic healthcare provider has now confirmed that a cyberattack discovered last May may have affected nearly 500,000 patients, a sharp increase from the fewer than 8,000 people it initially reported earlier this year. 

    A ransomware group later claimed responsibility for the incident, though Covenant Health has not publicly confirmed the use of ransomware. The attackers accessed names, addresses, Social Security numbers and health information, among other sensitive data that could put patients at serious risk.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    UNIVERSITY OF PHOENIX DATA BREACH HITS 3.5M PEOPLE

    Covenant Health detected suspicious activity in late May 2025, but investigators later confirmed attackers had already accessed systems days earlier. (Kurt “CyberGuy” Knutsson)

    What happened in the Covenant Health breach

    Covenant Health says it detected unusual activity in its IT environment on May 26, 2025. A later investigation revealed that an attacker had actually gained access eight days earlier, on May 18, and was able to access patient data during that window.

    In July, Covenant Health told regulators that the breach impacted 7,864 individuals. After completing what it describes as extensive data analysis, the organization now says that up to 478,188 individuals may have been affected.

    Covenant Health operates hospitals, nursing and rehabilitation centers, assisted living residences and elder care organizations across New England and parts of Pennsylvania. That wide footprint means the breach potentially touched patients across multiple states and care settings.

    In late June, the Qilin ransomware group claimed responsibility for the attack, as reported by Bleeping Computer. The group alleged it stole 852 GB of data, totaling nearly 1.35 million files. Covenant Health has not confirmed those figures, but it did acknowledge that patient information was accessed.

    According to the organization, the exposed data may have included names, addresses, dates of birth, medical record numbers, Social Security numbers, health insurance details and treatment information such as diagnoses, dates of treatment and types of care received.

    700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

    A webpage with Covenant Health information

    Qilin ransomware lists Covenant Health on its data leak site. (Bleeping Computer)

    What Covenant Health is telling patients

    In a notice sent to regulators and patients, Covenant Health says it engaged third-party forensic specialists to investigate the incident and determine what data was involved. The organization says its data analysis is ongoing as it continues identifying individuals whose information may have been involved.

    Then there are the familiar statements every company makes after a breach, claiming they’ve strengthened the security of their IT systems to help prevent similar incidents in the future. Covenant Health says it has also set up a dedicated toll-free call center to handle questions related to the breach.

    Beginning Dec. 31, 2025, the organization started mailing notification letters to patients whose information may have been compromised. For individuals whose Social Security numbers may have been involved, Covenant Health is offering complimentary credit monitoring and identity theft protection services.

    We reached out to Covenant Health, and the company confirmed the expanded scope of the incident and outlined steps being taken to notify patients and enhance security safeguards.

    DATA BREACH EXPOSES 400K BANK CUSTOMERS’ INFO

    Outsmart hackers who are out to steal your identity

    The breach exposed highly sensitive information, including names, Social Security numbers, medical records and treatment details tied to nearly half a million patients. (Kurt “CyberGuy” Knutsson)

    7 steps you can take to protect yourself after the Covenant Health breach

    If you received a notice from Covenant Health or if your data has been exposed in any healthcare breach, these steps can help reduce the risk of misuse.

    1) Enroll in the free identity protection offered

    If the organization offers you credit monitoring or identity protection, take it. These services can alert you to suspicious activity tied to your Social Security number, credit file or identity details before real damage is done. If you’re not offered one and want to be on the safer side, you might consider getting one yourself.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    2) Monitor medical and insurance statements closely

    Medical identity theft often shows up quietly. Review an explanation of benefits (EOBs), insurance claims and billing statements for services you don’t recognize. If something looks off, report it to your insurer immediately.

    3) Place a fraud alert or credit freeze

    A fraud alert tells lenders to take extra steps to verify your identity before approving credit. A credit freeze goes further by blocking new accounts entirely unless you lift it. If Social Security numbers were exposed, a freeze is usually the safer option.

    To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    4) Use a password manager

    Healthcare breaches often lead to credential-stuffing attacks elsewhere. A password manager ensures every account uses a unique password, so one exposed dataset can’t unlock everything else. It also makes it easier to update passwords quickly after a breach.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Be cautious of phishing scams and use strong antivirus software

    Breaches are frequently followed by phishing emails, texts or calls that reference the incident to sound legitimate. Attackers may pose as the healthcare provider, an insurer or a credit bureau. Don’t click links or share information unless you verify the source independently.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    6) Consider a personal data removal service

    Once your data leaks, it often spreads across data broker sites. Personal data removal services help reduce your digital footprint by requesting takedowns from these databases. While they can’t erase everything, they lower your exposure and make targeted fraud harder.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Review your credit reports regularly

    You’re entitled to free credit reports from all major bureaus. Check them for unfamiliar accounts, hard inquiries or address changes. Catching fraud early makes it far easier to contain.

    Kurt’s key takeaway

    Healthcare organizations remain prime targets for cybercriminal groups because of the volume and sensitivity of the data they store. Medical records contain a mix of personal, financial, and health information that is difficult to change once exposed. Unlike a password, you cannot reset a diagnosis or treatment history. This breach also shows how early disclosures often underestimate impact. Large healthcare networks rely on complex systems and third-party vendors, which can slow forensic analysis in the early stages. As investigations continue, the number of affected individuals often climbs.

    Do you think healthcare organizations do enough to protect user data? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Why January is the best time to remove personal data online

    [ad_1]

    NEWYou can now listen to Fox News articles!

    January feels like a reset. A new calendar. New goals. New habits. While you clean out your inbox, organize paperwork or set resolutions, however, scammers also hit reset, and they start with your personal data.

    That is because January is one of the most important months for online privacy. This is when data brokers refresh profiles and scammers rebuild their target lists.

    As a result, the longer your information stays online, the more complete and valuable your profile becomes. To help address this, institutions like the U.S. Department of the Treasury have released advisories urging people to stay vigilant and avoid data-related scams. 

    For that reason, taking action early in the year can significantly reduce scam attempts, lower identity theft risks, and limit unwanted exposure for the rest of the year.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    January is when data brokers refresh profiles and scammers rebuild target lists, making early action critical for online privacy. (iStock)

    STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE

    Why personal data does not expire and keeps compounding online

    Many people assume old information eventually becomes useless. Unfortunately, that’s not how data brokers work.

    Data brokers don’t just store a snapshot of who you are today. They build living profiles that grow over time, pulling from:

    • Public records (property sales, court filings, voter registrations)
    • Retail purchases and loyalty programs
    • App usage and location data
    • Past addresses, phone numbers, and relatives
    • Marketing databases and online activity.

    Each year adds another layer. A new address. A changed phone number. A family connection. A retirement milestone. On its own, one data point doesn’t mean much. But together, they create a detailed identity profile that scammers can use to convincingly impersonate you. That’s why waiting makes things worse, not better.

    Why scammers ‘rebuild’ targets at the start of the year

    Scammers don’t randomly target people. They work from lists. At the beginning of the year, those lists get refreshed.

    Why January matters so much:

    • Data brokers update and resell profiles after year-end records close
    • New public filings from the previous year become searchable
    • Marketing databases reset campaigns and audience segments
    • Scam networks repackage data into “fresh” target lists.

    Think of it like the upcoming spring cleaning, except it’s criminals organizing identities to exploit for the next 12 months.

    If your data is still widely exposed in January, you’re far more likely to:

    Once your profile is flagged as responsive or profitable, it often stays in circulation.

    Spot fake online stores, avoid Facebook subscription scams

    As personal information accumulates across databases, digital profiles grow more detailed and more valuable to scammers over time. (Kurt “CyberGuy” Knutsson)

    Why taking action in January protects you all year long

    Removing your data early isn’t just about stopping scams today; it’s about cutting off the supply chain that fuels them. When your information is removed from data broker databases:

    • It’s harder for scammers to find accurate contact details
    • Phishing messages become less convincing
    • Impersonation attempts fail more often
    • Your identity becomes less valuable to resell.

    This has a compounding benefit in the opposite direction. The fewer lists you appear on in January, the fewer times your data gets reused, resold, and recycled throughout the year. That’s why I consistently recommend addressing data exposure before problems start, not after.

    Why retirees and families feel the impact first

    January is especially important for retirees and families because they’re more likely to become targets of fraud, scams, and other crimes.

    Retirees often have:

    • Long addresses and employment histories
    • Stable credit profiles
    • Fewer active credit applications
    • Public retirement and property records

    Families add another layer of risk:

    • Relatives are linked together in broker profiles
    • One exposed family member can expose others
    • Shared addresses and phone plans increase visibility

    Scammers know this. That’s why households with established financial histories are prioritized early in the year.

    Why quick fixes don’t work

    Many people try to “start fresh” in January by:

    Those steps help, but they don’t remove your data from broker databases. Credit monitoring services alert you after something goes wrong. Password changes don’t affect public profiles. And unsubscribing doesn’t stop data resale. If your personal information is still sitting in hundreds of databases, scammers can find you.

    The January privacy reset that actually works

    If you want fewer scam attempts for the rest of the year, the most effective step is removing your personal data at the source.

    You can do this in one of two ways. You can submit removal requests yourself, or you can use a professional data removal service to handle the process for you.

    Removing your data yourself

    Manually removing your data means identifying dozens or even hundreds of data broker websites, finding their opt-out forms and submitting removal requests one by one. You also need to verify your identity, track responses and repeat the process whenever your information reappears.

    This approach works, but it requires time, organization, and ongoing follow-up.

    Using a data removal service

    A data removal service handles this process on your behalf. These services typically:

    • Send legal data removal requests to large networks of data brokers
    • Monitor for reposted information and submit follow-up removals
    • Continue tracking your exposure throughout the year
    • Manage a process that most people cannot realistically maintain on their own
    Boy computer tired

    Removing your data at the start of the year helps reduce scam attempts, phishing messages and identity theft risks all year long. (iStock)

    Because these services handle sensitive personal information, it is important to choose one that follows strict security standards and uses verified removal methods.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    RETIREES LOSE MILLIONS TO FAKE HOLIDAY CHARITIES AS SCAMMERS EXPLOIT SEASONAL GENEROSITY

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Kurt’s key takeaways

    Scammers don’t wait for mistakes. They wait for exposed data. January is when profiles are refreshed, lists are rebuilt, and targets are chosen for the year ahead. The longer your personal information stays online, the more complete-and dangerous-your digital profile becomes. The good news? You can stop the cycle. Removing your data now reduces scam attempts, protects your identity, and gives you a quieter, safer year ahead. If you’re going to make one privacy move this year, make it early-and make it count.

    Have you ever been surprised by how much of your personal information was already online? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Hackers abuse Google Cloud to send trusted phishing emails

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals have found a clever new way to get phishing emails straight into inboxes.

    Instead of spoofing brands, they are abusing real cloud tools that people already trust. Security researchers say attackers recently hijacked a legitimate email feature inside Google Cloud

    The result was thousands of phishing messages that looked and felt like normal Google notifications. Many slipped past spam filters with ease.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – when you join my CYBERGUY.COM newsletter.

    How this Google Cloud phishing attack worked

    At the center of the campaign was Google Cloud Application Integration. This service allows businesses to send automated email notifications from workflows they build. Attackers exploited the Send Email task inside that system. Because the messages came from a real Google address, they appeared authentic to both users and security tools. 

    According to Check Point, a global cybersecurity firm that tracks and analyzes large-scale threat campaigns, the emails were sent from a legitimate Google-owned address and closely matched Google’s notification style. Fonts, wording, and layout all looked familiar. Over a two-week period in December 2025, attackers sent more than 9,000 phishing emails targeting roughly 3,200 organizations across the U.S., Europe, Canada, Asia Pacific, and Latin America.

    Attackers used trusted Google Cloud infrastructure to route victims through multiple redirects before revealing the scam. (Thomas Fuller/SOPA Images/LightRocket via Getty Images)

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    Why Google phishing emails were so convincing

    The messages looked like routine workplace alerts. Some claimed you had received a voicemail. Others said you were granted access to a shared document, like a Q4 file. That sense of normalcy lowered suspicion. Many people are used to seeing these exact messages every day. Even more concerning, the emails bypassed common protections like SPF and DMARC because they were sent through Google-owned infrastructure. To email systems, nothing looked fake.

    What happens after you click

    The attack did not stop at the email. Once a victim clicked the link, they were sent to a page hosted on storage.cloud.google.com. That added another layer of trust. From there, the link redirected again to googleusercontent.com. Next came a fake CAPTCHA or image check. This step blocked automated security scanners while letting real users continue. After passing that screen, victims landed on a fake Microsoft login page hosted on a non-Microsoft domain. Any credentials entered there were captured by the attackers.

    Who was targeted in the Google Cloud phishing attack

    Check Point says the campaign focused heavily on industries that rely on automated alerts and shared documents. That included manufacturing, technology, finance, professional services, and retail. Other sectors like healthcare, education, government, energy, travel and media were also targeted. These environments see constant permission requests and file-sharing notices, which made the lures feel routine.

    “We have blocked several phishing campaigns involving the misuse of an email notification feature within Google Cloud Application Integration,” a Google spokesperson told Cyberguy. “Importantly, this activity stemmed from the abuse of a workflow automation tool, not a compromise of Google’s infrastructure. While we have implemented protections to defend users against this specific attack, we encourage continued caution as malicious actors frequently attempt to spoof trusted brands. We are taking additional steps to prevent further misuse.”

    The incident demonstrates how attackers can weaponize legitimate cloud automation tools without resorting to traditional spoofing.

    Ways to stay safe from trusted-looking phishing emails

    Phishing emails are getting harder to spot, especially when attackers abuse real cloud platforms like Google Cloud. These steps help reduce risk when emails look familiar and legitimate.

    1) Slow down before acting on alerts

    Attackers rely on urgency. Messages about voicemails, shared files or permission changes are designed to make you click fast. Pause before taking action. Ask yourself whether you were actually expecting that alert. If not, verify it another way.

    2) Inspect links before you click

    Always hover over links to preview the destination domain. In this campaign, links jumped across multiple trusted-looking Google domains before landing on a fake login page. If the final destination does not match the service asking you to sign in, close the page immediately.

    3) Treat file access and permission emails with caution

    Shared document alerts are a favorite lure because they feel routine at work. If an email claims you were granted access to a file you do not recognize, do not click directly from the message. Instead, open your browser and sign in to Google Drive or OneDrive manually to check for new files.

    Microsoft computer on table.

    The final step led users to a fake Microsoft login page, where entered credentials were silently stolen. (Stack Social)

    4) Use a password manager to catch fake login pages

    Password managers can be a strong last line of defense. They will not autofill credentials on fake Microsoft or Google login pages hosted on non-official domains. If your password manager refuses to fill in a login, that is a red flag worth paying attention to.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    NEW GOOGLE AI MAKES ROBOTS SMARTER WITHOUT THE CLOUD

    5) Run strong antivirus software with phishing protection

    Modern antivirus tools do more than scan files. Many now detect malicious links, fake CAPTCHA pages, and credential harvesting sites in real time. Strong antivirus software can block phishing pages even after a click, which matters in multi-stage attacks like this one.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    6) Reduce your exposure with a data removal service

    Phishing campaigns often succeed because attackers already know your email, employer or role. That information is commonly pulled from data broker sites. A data removal service helps remove your personal information from these databases, making it harder for attackers to craft convincing, targeted emails.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Enable two-factor authentication (2FA) everywhere

    Even if attackers steal your password, two-factor authentication (2FA) can stop them from accessing your account. Use app-based authentication or hardware keys when possible, especially for work email, cloud storage, and Microsoft accounts.

    8) Report suspicious emails immediately

    If something feels off, report it. Flag suspicious Google or Microsoft alerts to your IT or security team so they can warn others. Early reporting can stop a phishing campaign before it spreads further inside an organization.

    Is it safe to unsubscribe from spam you didn’t sign up for?

    Google phishing emails looked like routine workplace alerts. (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaways

    This campaign highlights a growing shift in phishing tactics. Attackers no longer need to fake brands when they can abuse trusted cloud services directly. As automation becomes more common, security awareness matters more than ever. Even familiar emails deserve a second look, especially when they push urgency or ask for credentials.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    If a phishing email comes from a real Google address, how confident are you that you would spot it before clicking? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Trump says the US ‘needs’ Greenland for Arctic security. Here’s why

    [ad_1]

    Location, location, location: Greenland’s key position above the Arctic Circle makes the world’s largest island a key part of security strategy in the High North. But for whom?Increasing international tensions, global warming and the changing world economy have put Greenland at the heart of the debate over global trade and security, and U.S. President Donald Trump wants to make sure his country controls this mineral-rich country that guards the Arctic and North Atlantic approaches to North America.Greenland is a self-governing territory of Denmark, a longtime U.S. ally that has rejected Trump’s overtures. Greenland’s own government also opposes U.S. designs on the island, saying the people of Greenland will decide their own future. The island, 80% of which lies above the Arctic Circle, is home to about 56,000 mostly Inuit people who until now have been largely ignored by the rest of the world.Here’s why Greenland is strategically important to Arctic security: Greenland sits off the northeastern coast of Canada, with more than two-thirds of its territory lying within the Arctic Circle. That has made it crucial to the defense of North America since World War II, when the U.S. occupied Greenland to ensure it didn’t fall into the hands of Nazi Germany and to protect crucial North Atlantic shipping lanes.Following the Cold War, the Arctic was largely an area of international cooperation. But climate change is thinning the Arctic ice, promising to create a northwest passage for international trade and reigniting competition with Russia, China and other countries over access to the region’s mineral resources.Video below: Stephen Miller says ‘obviously Greenland should be part of the United States’ Greenland is also a rich source of the so-called rare earth minerals that are a key component of mobile phones, computers, batteries and other gadgets that are expected to power the world’s economy in the coming decades.That has attracted the interest of the U.S. and other Western powers as they try to ease China’s dominance of the market for these critical minerals.Development of Greenland’s mineral resources is challenging because of the island’s harsh climate, while strict environmental controls have proved an additional bulwark against potential investors. The U.S. Department of Defense operates the remote Pituffik Space Base in northwestern Greenland, which was built after the U.S. and Denmark signed the Defense of Greenland Treaty in 1951. It supports missile warning, missile defense and space surveillance operations for the U.S. and NATO.Greenland also guards part of what is known as the GIUK (Greenland, Iceland, United Kingdom) Gap, where NATO monitors Russian naval movements in the North Atlantic. Denmark is moving to strengthen its military presence around Greenland and in the wider North Atlantic. Last year, the government announced a roughly 14.6 billion kroner ($2.3 billion) agreement with parties including the governments of Greenland and the Faroe Islands, another self-governing territory of Denmark, to “improve capabilities for surveillance and maintaining sovereignty in the region.” The plan includes three new Arctic naval vessels, two additional long-range surveillance drones and satellite capacity.Denmark’s Joint Arctic Command is headquartered in Greenland’s capital, Nuuk, and tasked with the “surveillance, assertion of sovereignty and military defense of Greenland and the Faroe Islands,” according to its website. It has smaller satellite stations across the island.The Sirius Dog Sled Patrol, an elite Danish naval unit that conducts long-range reconnaissance and enforces Danish sovereignty in the Arctic wilderness, is also stationed in Greenland. In 2018, China declared itself a “near-Arctic state” in an effort to gain more influence in the region. China has also announced plans to build a “Polar Silk Road” as part of its global Belt and Road Initiative, which has created economic links with countries around the world.Then-U.S. Secretary of State Mike Pompeo rejected China’s move, saying: “Do we want the Arctic Ocean to transform into a new South China Sea, fraught with militarization and competing territorial claims?”Meanwhile, Russian President Vladimir Putin has said Russia is worried about NATO’s activities in the Arctic and will respond by strengthening its military capability in the polar region. European leaders’ concerns were heightened following Russia’s full-scale invasion of Ukraine in 2022. Stefanie Dazio in Berlin contributed to this report.

    Location, location, location: Greenland’s key position above the Arctic Circle makes the world’s largest island a key part of security strategy in the High North. But for whom?

    Increasing international tensions, global warming and the changing world economy have put Greenland at the heart of the debate over global trade and security, and U.S. President Donald Trump wants to make sure his country controls this mineral-rich country that guards the Arctic and North Atlantic approaches to North America.

    Greenland is a self-governing territory of Denmark, a longtime U.S. ally that has rejected Trump’s overtures. Greenland’s own government also opposes U.S. designs on the island, saying the people of Greenland will decide their own future.

    The island, 80% of which lies above the Arctic Circle, is home to about 56,000 mostly Inuit people who until now have been largely ignored by the rest of the world.

    Here’s why Greenland is strategically important to Arctic security:

    Greenland sits off the northeastern coast of Canada, with more than two-thirds of its territory lying within the Arctic Circle. That has made it crucial to the defense of North America since World War II, when the U.S. occupied Greenland to ensure it didn’t fall into the hands of Nazi Germany and to protect crucial North Atlantic shipping lanes.

    Following the Cold War, the Arctic was largely an area of international cooperation. But climate change is thinning the Arctic ice, promising to create a northwest passage for international trade and reigniting competition with Russia, China and other countries over access to the region’s mineral resources.

    Video below: Stephen Miller says ‘obviously Greenland should be part of the United States’


    Greenland is also a rich source of the so-called rare earth minerals that are a key component of mobile phones, computers, batteries and other gadgets that are expected to power the world’s economy in the coming decades.

    That has attracted the interest of the U.S. and other Western powers as they try to ease China’s dominance of the market for these critical minerals.

    Development of Greenland’s mineral resources is challenging because of the island’s harsh climate, while strict environmental controls have proved an additional bulwark against potential investors.

    The U.S. Department of Defense operates the remote Pituffik Space Base in northwestern Greenland, which was built after the U.S. and Denmark signed the Defense of Greenland Treaty in 1951. It supports missile warning, missile defense and space surveillance operations for the U.S. and NATO.

    Greenland also guards part of what is known as the GIUK (Greenland, Iceland, United Kingdom) Gap, where NATO monitors Russian naval movements in the North Atlantic.

    Denmark is moving to strengthen its military presence around Greenland and in the wider North Atlantic. Last year, the government announced a roughly 14.6 billion kroner ($2.3 billion) agreement with parties including the governments of Greenland and the Faroe Islands, another self-governing territory of Denmark, to “improve capabilities for surveillance and maintaining sovereignty in the region.”

    The plan includes three new Arctic naval vessels, two additional long-range surveillance drones and satellite capacity.

    Denmark’s Joint Arctic Command is headquartered in Greenland’s capital, Nuuk, and tasked with the “surveillance, assertion of sovereignty and military defense of Greenland and the Faroe Islands,” according to its website. It has smaller satellite stations across the island.

    The Sirius Dog Sled Patrol, an elite Danish naval unit that conducts long-range reconnaissance and enforces Danish sovereignty in the Arctic wilderness, is also stationed in Greenland.

    In 2018, China declared itself a “near-Arctic state” in an effort to gain more influence in the region. China has also announced plans to build a “Polar Silk Road” as part of its global Belt and Road Initiative, which has created economic links with countries around the world.

    Then-U.S. Secretary of State Mike Pompeo rejected China’s move, saying: “Do we want the Arctic Ocean to transform into a new South China Sea, fraught with militarization and competing territorial claims?”

    Meanwhile, Russian President Vladimir Putin has said Russia is worried about NATO’s activities in the Arctic and will respond by strengthening its military capability in the polar region. European leaders’ concerns were heightened following Russia’s full-scale invasion of Ukraine in 2022.

    Stefanie Dazio in Berlin contributed to this report.

    [ad_2]

    Source link

  • Browser extension malware infected 8.8M users in DarkSpectre attack

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Browser extensions promise convenience. Many offer simple tools like new tab pages, translators or video helpers. 

    Researchers, however, uncovered a long-running malware operation that abused that trust on a massive scale. Koi Security analysts identified the threat while analyzing suspicious infrastructure tied to a campaign known as ShadyPanda. What started as one investigation quickly revealed something far larger.

    The group behind it is now known as DarkSpectre. According to Koi researchers, it infected more than 8.8 million users across Chrome, Edge and Firefox over seven years. This was not a smash-and-grab attack. It was slow, deliberate and highly organized. Instead of rushing malicious code into marketplaces, the group played the long game.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    Security researchers say millions of users unknowingly installed browser extensions that later turned malicious after years of appearing legitimate. (Donato Fasano/Getty Images)

    One threat actor behind three major campaigns

    At first, the activity looked like separate threats. That changed once Koi analysts followed the infrastructure breadcrumbs. By pivoting from domains linked to ShadyPanda, Koi researchers uncovered shared systems powering multiple extension clusters. That analysis confirmed that ShadyPanda, GhostPoster and Zoom Stealer were not separate actors. They were one coordinated operation. Together, these campaigns targeted both everyday users and corporate environments.

    ShadyPanda

    This campaign focused on mass surveillance and affiliate fraud. Researchers estimate it affected more than 4 million users, with some analyses suggesting the total could reach up to 5.6 million as additional related extensions were linked. In several cases, extensions remained legitimate for more than five years before quietly turning malicious.

    GhostPoster

    This campaign used a clever trick. It hid malicious code inside image files to bypass security checks. It impacted 1.05 million users.

    Zoom Stealer

    This operation targeted corporate meeting data across more than 28 conferencing platforms. It affected 2.2 million users.

    Different goals. Same operator.

    How Koi uncovered DarkSpectre’s hidden network

    The breakthrough came when Koi analysts examined two domains tied to ShadyPanda. Those domains powered legitimate extension features like weather widgets and new tab pages. They were not command servers. That was the trick. Those same clean domains appeared again and again across other extensions that quietly connected to entirely different malicious infrastructure.

    One domain led to extensions. Those extensions exposed new domains. Those domains were connected to even more extensions. Following that chain allowed Koi to uncover over 100 connected extensions across multiple browser marketplaces. Some extensions even reused infrastructure already flagged in earlier investigations. That overlap confirmed DarkSpectre was operating at a nation-state scale.

    How DarkSpectre stayed hidden for years

    DarkSpectre succeeded by blending legitimate functionality with hidden malware. Users got what they expected. Meanwhile, the threat ran quietly in the background.

    Time-delayed activation fooled reviewers

    Some extensions waited days before activating malicious behavior. Others triggered malware on only a small percentage of page loads. This made detection during marketplace reviews extremely difficult.

    Malicious code disguised as images

    The group hid JavaScript inside PNG image files. The extension loaded its own logo, extracted the hidden code and executed it silently.

    No updates required

    Instead of pushing new extension versions, DarkSpectre controlled everything from its servers. Operators could change behavior anytime without alerting users or marketplaces. Koi researchers noted this approach gave the attackers long-term flexibility and control.

    Why the Zoom Stealer campaign stands out

    Most malware focuses on consumer fraud. Zoom Stealer focused on intelligence.

    According to Koi analysts, these extensions collected the following:

    • Meeting links with embedded passwords
    • Meeting IDs, topics and schedules
    • Speaker names, titles, bios and photos
    • Company affiliations and branding

    Worse yet, the data streamed in real time. The moment a user joined or viewed a meeting, the information flowed out. This type of data enables phishing impersonation and corporate espionage at scale.

    Why browser extensions remain a weak link

    Extension marketplaces typically evaluate code only at submission or update. Koi’s investigation shows how attackers exploit that model. Once an extension earns trust badges and positive reviews, users stop questioning it. That trust becomes a weapon. A clean extension today can become a threat tomorrow.

    Ways to stay safe from malicious browser extensions

    You do not need to avoid extensions entirely. You do need to stay cautious.

    1)  Keep your browser up-to-date

    Make sure you turn on automatic updates for your browser (e.g., Chrome, Firefox, Edge) so you’re always running the latest version without thinking about it. 

    2) Review your installed extensions

    Remove anything you no longer use. Fewer extensions reduce risk. CyberGuy has step-by-step guides showing how to review and remove browser extensions safely, making it easy to clean up your browser in just a few minutes. In Chrome, Edge and Firefox, open the menu, go to Extensions or Add-ons, and remove anything you do not use or trust.

    3) Install extensions only from trusted sources

    Official browser stores like the Chrome Web Store have rules and scans to catch bad actors. They’re not perfect, but they are still a better option when compared to a random website on the internet. Extensions from unknown websites or third-party downloads are far more likely to hide malware or spyware. 

    FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

    Hacker on their laptop.

    A long-running malware operation quietly abused trusted browser extensions across Chrome, Edge and Firefox, infecting millions worldwide. (Morteza Nikoubazl/NurPhoto via Getty Images)

    4) Have strong antivirus software

    Strong antivirus software can warn you before you install malicious software, such as sketchy browser extensions. It can also alert you to phishing emails and ransomware scams, helping keep your personal information and digital assets safe.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Invest in personal data removal services

    If your personal data was exposed in this security incident, it’s crucial to act quickly to reduce your risk of identity theft and scams. A data removal service can help you remove all this personal information from the internet. 

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. 

    It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Be skeptical of extensions requesting unnecessary access

    Some extensions overreach on purpose. A calculator tool asking for your browsing history or a weather app wanting your login data is a huge red flag. Before installing, ask: “Does this permission match the extension’s job?” If the answer’s no, don’t install it. Watch out for broad permissions like “Read and change all your data on websites you visit” unless it’s clearly justified (e.g., a password manager). If an update suddenly adds new permission requests, dig into why. It might mean the extension’s been sold or hacked.

    7) Change your passwords — and do it safely

    If you’ve ever saved passwords in your browser (e.g., via the browser’s built-in password manager or the “Save Password” prompt), those credentials could be at risk if a malicious extension was installed. These built-in managers store passwords locally or in your Google, Microsoft or Firefox account, and a compromised browser can give bad actors a way in.

    This doesn’t typically apply to dedicated password manager extensions, which encrypt your data independently and don’t rely on browser storage. However, if you’re unsure whether an extension has been compromised, it’s always smart to update your master password and enable two-factor authentication. 

    For maximum safety, change your most important passwords (email, bank, shopping, cloud services) from a different, secure device, such as your phone or another computer where the questionable extension was never installed. Avoid using the same browser that may have been exposed. Then, consider switching to a password manager to create and store strong, unique logins going forward. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

     10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

    Hackers typing on a laptop.

    Analysts uncovered a coordinated campaign that hid spyware inside everyday browser tools like new tab pages and translators. (Morteza Nikoubazl/NurPhoto via Getty Images)

    8) Watch for behavior changes

    Subtle changes often appear before obvious damage. Sudden redirects, new tabs opening on their own, unfamiliar search results, popups, slower browsing or websites asking you to re-log in unexpectedly can all signal a malicious or compromised extension. Pay attention if ads appear where they never did before or if your browser settings change without your input.

    Koi’s investigation shows how attackers rely on patience. Once an extension earns trust and sits quietly for years, users stop watching it. That makes small behavior changes easy to miss. If something feels off, do not ignore it. Disable extensions one by one to identify the culprit. If the issue disappears, remove that extension permanently.

    When in doubt, trust your instincts. Browsers should not surprise you.

     CLICK HERE TO DOWNLOAD THE FOX NEWS APP 

    Kurt’s key takeaways

    DarkSpectre is a reminder that online threats are getting smarter and quieter. This was not a smash-and-grab attack. It unfolded slowly, over years, and relied on trust most people never think twice about. Koi analysts connected the dots by tracking shared infrastructure across campaigns, but they also warn that some sleeper extensions may still be installed and trusted today. Browser extensions can be helpful, but every extra add-on is another door into your browser. Paying attention, cleaning house now and then, and questioning what you install can make a real difference.

    When was the last time you checked what your browser extensions are really doing behind the scenes? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Malicious Chrome extensions caught stealing sensitive data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Chrome extensions are supposed to make your browser more useful, but they’ve quietly become one of the easiest ways for attackers to spy on what you do online. Security researchers recently uncovered two Chrome extensions that have been doing exactly that for years.

    These extensions looked like harmless proxy tools, but behind the scenes, they were hijacking traffic and stealing sensitive data from users who trusted them. What makes this case worse is where these extensions were found. Both were listed on Chrome’s official extension marketplace.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

    Security researchers uncovered malicious Chrome extensions that quietly routed users’ web traffic through attacker-controlled servers to steal sensitive data. (Gokhan Balci/Anadolu Agency/Getty Images)

    Malicious Chrome extensions hiding in plain sight

    Researchers at Socket discovered two Chrome extensions using the same name, “Phantom Shuttle,” that were posing as tools for proxy routing and network speed testing (via Bleeping Computer). According to the researchers, the extensions have been active since at least 2017.

    Both extensions were published under the same developer name and marketed towards foreign trade workers who need to test internet connectivity from different regions. They were sold as subscription-based tools, with prices ranging from roughly $1.40 to $13.60.

    At a glance, everything looked normal. The descriptions matched the functionality. The pricing seemed reasonable. The problem was what the extensions were doing after installation.

    How Phantom Shuttle steals your data

    Socket researchers say Phantom Shuttle routes all your web traffic through proxy servers controlled by the attacker. Those proxies use hardcoded credentials embedded directly into the extension’s code. To avoid detection, the malicious logic is hidden inside what appears to be a legitimate jQuery library.

    The attackers didn’t just leave credentials sitting in plain text. The extensions hide them using a custom character-index encoding scheme. Once active, the extension listens to web traffic and intercepts HTTP authentication challenges on any site you visit.

    To make sure traffic always flows through their infrastructure, the extensions dynamically reconfigure Chrome’s proxy settings using an auto-configuration script. This forces your browser to route requests exactly where the attacker wants them.

    In its default “smarty” mode, Phantom Shuttle routes traffic from more than 170 high-value domains through its proxy network. That list includes developer platforms, cloud service dashboards, social media sites and adult content portals. Local networks and the attacker’s own command-and-control domain are excluded, likely to avoid breaking things or raising suspicion.

    While acting as a man-in-the-middle, the extension can capture anything you submit through web forms. That includes usernames, passwords, card details, personal information, session cookies from HTTP headers and API tokens pulled directly from network requests.

    CyberGuy contacted Google about the extensions, and a spokesperson confirmed that both have been removed from the Chrome Web Store.

    10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

    A person typing on their computer.

    Two Chrome extensions posing as proxy tools were found spying on users for years while listed on Google’s official Chrome Web Store. (Yui Mok/PA Images via Getty Images)

    How to review the extensions installed in your browser (Chrome)

    The step-by-step instructions below apply to Windows PCs, Macs and Chromebooks. In other words, desktop Chrome. Chrome extensions cannot be fully reviewed or removed from the mobile app.

    Step 1: Open your extensions list

    • Open Chrome on your computer.
    • Click the three-dot menu in the top-right corner.
    • Select Extensions
    • Then click Manage Extensions.

    You can also type this directly into the address bar and press Enter:
    chrome://extensions

    Step 2: Look for anything you do not recognize

    Go through every extension listed and ask yourself:

    • Do I remember installing this?
    • Do I still use it?
    • Do I know what it actually does?

    If the answer is no to any of these, take a closer look.

    Step 3: Review permissions and access

    Click Details on any extension you are unsure about. Pay attention to:

    • Permissions, especially anything that can read or change data on websites you visit
    • Site access, such as extensions that run on all sites
    • Background access, which allows the extension to stay active even when not in use

    Proxy tools, VPNs, downloaders and network-related extensions deserve extra scrutiny.

    Step 4: Disable suspicious extensions first

    If something feels off, toggle the extension off. This immediately stops it from running without deleting it. If everything still works as expected, the extension was likely not essential.

    Step 5: Remove extensions you no longer need

    To fully remove an extension:

    • Click Remove
    • Confirm when prompted

    Unused extensions are a common target for abuse and should be cleaned out regularly.

    Step 6: Restart Chrome

    Close and reopen Chrome after making changes. This ensures disabled or removed extensions are no longer active.

    MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

    Google Chrome screen on a laptop.

    Cybersecurity experts warn that trusted browser extensions can become powerful surveillance tools once installed. (Gabby Jones/Bloomberg via Getty Images)

    6 steps you can take to stay safe from malicious Chrome extensions

    You can’t control what slips through app store reviews, but you can reduce your risk by changing how you install and manage extensions.

    1) Install extensions only when absolutely necessary

    Every extension increases your attack surface. If you don’t genuinely need it, don’t install it. Convenience extensions often come with far more permissions than they deserve.

    2) Check the publisher carefully

    Reputable developers usually have a history, a website and multiple well-known extensions. Be cautious with tools from unknown publishers, especially those offering network or proxy features.

    3) Read multiple user reviews, not just ratings

    Star ratings can be faked or manipulated. Look for detailed reviews that mention long-term use. Watch out for sudden waves of generic praise.

    4) Review permissions before clicking install

    If an extension asks to “read and change all data on websites you visit,” take that seriously. Proxy tools and network extensions can see everything you do.

    5) Use a password manager

    A password manager won’t stop a malicious extension from spying on traffic, but it can limit damage. Unique passwords mean stolen credentials can’t unlock multiple accounts. Many managers also refuse to autofill on suspicious pages.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    6) Install strong antivirus software

    Strong antivirus software can flag suspicious network activity, proxy abuse and unauthorized changes to browser settings. This adds a layer of defense beyond Chrome’s own protections.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    This attack doesn’t rely on phishing emails or fake websites. It works because the extension itself becomes part of your browser. Once installed, it sees nearly everything you do online. Extensions like Phantom Shuttle are dangerous because they blend real functionality with malicious behavior. The extensions deliver the proxy service they promise, which lowers suspicion, while quietly routing user data through attacker-controlled servers.

    When was the last time you reviewed the extensions installed in your browser? Let us know by writing to us at Cyberguy.com.
     

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • U.S. national intelligence director is silent on Venezuela operation

    [ad_1]

    Director of National Intelligence Tulsi Gabbard had yet to weigh in on the U.S. operation to remove Nicolás Maduro from power in Caracas as of Saturday night, more than 24 hours since President Trump approved the audacious mission that captured the Venezuelan leader.

    Her silence on the operation surprised some in the U.S. intelligence community, which laid the groundwork for the mission over several months, and which had assets in harm’s way on the ground in Venezuela as the operation unfolded.

    CIA Director John Ratcliffe, by contrast, accompanied Trump in Mar-a-Lago throughout the night as the extraction was underway, and stood beside the president as he conducted a news conference announcing the results.

    “Teamwork at its finest,” Ratcliffe wrote on social media, posted alongside photos of him with the president’s team in the temporary situation room set up at Trump’s Florida estate.

    Gabbard, a native of Hawaii who, according to her X account, spent the holidays in her home state, made a name for herself as a member of Congress campaigning against “regime change wars,” particularly the U.S. war in Iraq that toppled Saddam Hussein.

    In a speech at Turning Point USA’s annual conference last month, Gabbard criticized “warmongers” in the “deep state” of the intelligence community she leads trying to thwart Trump’s efforts to broker peace between Russia and Ukraine.

    “Too often we, the American people, are told we must choose between liberty or security, and which side often wins out in that proposition,” she told the gathered crowd. “Liberty loses, and the warmongers claim that they are doing what they are doing for the sake of our security. It’s a lie.”

    Outside of government, during Trump’s first term, Gabbard also criticized advocates for regime change in Venezuela, writing in 2019, “It’s about the oil … again.”

    “The United States needs to stay out of Venezuela,” Gabbard wrote at the time. “Let the Venezuelan people determine their future.

    “We don’t want other countries to choose our leaders,” she added, “so we have to stop trying to choose theirs.”

    [ad_2]

    Michael Wilner

    Source link

  • OpenAI admits AI browsers face unsolvable prompt attacks

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals don’t always need malware or exploits to break into systems anymore. Sometimes, they just need the right words in the right place. OpenAI is now openly acknowledging that reality. The company says prompt injection attacks against artificial intelligence (AI)-powered browsers are not a bug that can be fully patched, but a long-term risk that comes with letting AI agents roam the open web. This raises uncomfortable questions about how safe these tools really are, especially as they gain more autonomy and access to your data.

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY

    AI-powered browsers can read and act on web content, which also makes them vulnerable to hidden instructions attackers can slip into pages or documents. (Kurt “CyberGuy” Knutsson)

    Why prompt injection isn’t going away

    In a recent blog post, OpenAI admitted that prompt injection attacks are unlikely to ever be completely eliminated. Prompt injection works by hiding instructions inside web pages, documents or emails in ways that humans don’t notice, but AI agents do. Once the AI reads that content, it can be tricked into following malicious instructions.

    OpenAI compared this problem to scams and social engineering. You can reduce them, but you can’t make them disappear. The company also acknowledged that “agent mode” in its ChatGPT Atlas browser increases risk because it expands the attack surface. The more an AI can do on your behalf, the more damage it can cause when something goes wrong.

    OpenAI launched the ChatGPT Atlas browser in October, and security researchers immediately started testing its limits. Within hours, demos appeared showing that a few carefully placed words inside a Google Doc could influence how the browser behaved. That same day, Brave published its own warning, explaining that indirect prompt injection is a structural problem for AI-powered browsers, including tools like Perplexity’s Comet.

    This isn’t just OpenAI’s problem. Earlier this month, the National Cyber Security Centre in the U.K. warned that prompt injection attacks against generative AI systems may never be fully mitigated.

    FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

    ChatGPT Atlas screen in an auditorium

    Prompt injection attacks exploit trust at scale, allowing malicious instructions to influence what an AI agent does without the user ever seeing it. (Kurt “CyberGuy” Knutsson)

    The risk trade-off with AI browsers

    OpenAI says it views prompt injection as a long-term security challenge that requires constant pressure, not a one-time fix. Its approach relies on faster patch cycles, continuous testing and layered defenses. That puts it broadly in line with rivals like Anthropic and Google, which have both argued that agentic systems need architectural controls and ongoing stress testing.

    Where OpenAI is taking a different approach is with something it calls an “LLM-based automated attacker.” In simple terms, OpenAI trained an AI to act like a hacker. Using reinforcement learning, this attacker bot looks for ways to sneak malicious instructions into an AI agent’s workflow.

    The bot runs attacks in simulation first. It predicts how the target AI would reason, what steps it would take and where it might fail. Based on that feedback, it refines the attack and tries again. Because this system has insight into the AI’s internal decision-making, OpenAI believes it can surface weaknesses faster than real-world attackers.

    Even with these defenses, AI browsers aren’t safe. They combine two things attackers love: autonomy and access. Unlike regular browsers, they don’t just display information, but also read emails, scan documents, click links and take actions on your behalf. That means a single malicious prompt hidden in a webpage, document or message can influence what the AI does without you ever seeing it. Even when safeguards are in place, these agents operate by trusting content at scale, and that trust can be manipulated.

    THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

    Person wearing a hoodie works on multiple computer screens displaying digital data in a dark room.

    As AI browsers gain more autonomy and access to personal data, limiting permissions and keeping human confirmation in the loop becomes critical for safety. (Kurt “CyberGuy” Knutsson)

    7 steps you can take to reduce risk with AI browsers

    You may not be able to eliminate prompt injection attacks, but you can significantly limit their impact by changing how you use AI tools.

    1) Limit what the AI browser can access

    Only give an AI browser access to what it absolutely needs. Avoid connecting your primary email account, cloud storage or payment methods unless there’s a clear reason. The more data an AI can see, the more valuable it becomes to attackers. Limiting access reduces the blast radius if something goes wrong.

    2) Require confirmation for every sensitive action

    Never allow an AI browser to send emails, make purchases or modify account settings without asking you first. Confirmation breaks long attack chains and gives you a moment to spot suspicious behavior. Many prompt injection attacks rely on the AI acting quietly in the background without user review.

    3) Use a password manager for all accounts

    A password manager ensures every account has a unique, strong password. If an AI browser or malicious page leaks one credential, attackers can’t reuse it elsewhere. Many password managers also refuse to autofill on unfamiliar or suspicious sites, which can alert you that something isn’t right before you manually enter anything.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    4) Run strong antivirus software on your device

    Even if an attack starts inside the browser, antivirus software can still detect suspicious scripts, unauthorized system changes or malicious network activity. Strong antivirus software focuses on behavior, not just files, which is critical when dealing with AI-driven or script-based attacks.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    5) Avoid broad or open-ended instructions

    Telling an AI browser to “handle whatever is needed” gives attackers room to manipulate it through hidden prompts. Be specific about what the AI is allowed to do and what it should never do. Narrow instructions make it harder for malicious content to influence the agent.

    6) Be careful with AI summaries and automated scans

    When an AI browser scans emails, documents or web pages for you, remember that hidden instructions can live inside that content. Treat AI-generated actions as drafts or suggestions, not final decisions. Review anything the AI plans to act on before approving it.

    7) Keep your browser, AI tools and operating system updated

    Security fixes for AI browsers evolve quickly as new attack techniques emerge. Delaying updates leaves known weaknesses open longer than necessary. Turning on automatic updates ensures you get protection as soon as they’re available, even if you miss the announcement.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    There’s been a meteoric rise in AI browsers. We’re now seeing them from major tech companies, including OpenAI’s Atlas, The Browser Company’s Dia and Perplexity’s Comet. Even existing browsers like Chrome and Edge are pushing hard to add AI and agentic features into their current infrastructure. While these browsers can be useful, the technology is still early. It’s best not to fall for the hype and to wait for it to mature.

    Do you think AI browsers are worth the risk today, or are they moving faster than security can keep up? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • University of Phoenix data breach hits 3.5M people

    [ad_1]

    NEWYou can now listen to Fox News articles!

    The University of Phoenix has confirmed a major data breach affecting nearly 3.5 million people. The incident traces back to August when attackers accessed the university’s network and quietly stole sensitive information.

    The school detected the intrusion on Nov. 21. That discovery came after the attackers listed the university on a public leak site. In early December, the university disclosed the incident, and its parent company filed an 8-K with regulators.

    The scope is large. Notification letters filed with Maine’s Attorney General show 3,489,274 individuals are impacted. Those affected include current and former students, faculty, staff and suppliers.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    DATA BREACH EXPOSES 400K BANK CUSTOMERS’ INFO

    The University of Phoenix data breach exposed sensitive personal and financial information tied to nearly 3.5 million people. (Kurt “CyberGuy” Knutsson)

    What happened and how attackers got in

    According to the university, hackers exploited a zero-day vulnerability in Oracle E-Business Suite. This application handles financial operations and contains highly sensitive data.

    Based on the technical details shared so far, security researchers believe the attack aligns with tactics used by the Clop ransomware gang. Clop has a long track record of stealing data through zero-day flaws rather than encrypting systems.

    The vulnerability tied to this campaign is tracked as CVE-2025-61882. Investigators say it has been abused since early August.

    What data was exposed

    The university says the attackers accessed highly sensitive personal and financial information. That includes:

    • Full names
    • Contact information
    • Dates of birth
    • Social security numbers
    • Bank account numbers
    • Routing numbers

    This type of data creates a serious risk. It can fuel identity theft, financial fraud, and targeted phishing scams.

    700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

    A hacker uses a laptop in to steal data.

    Stolen University of Phoenix records could be used by criminals to launch targeted phishing and identity theft attacks.  (Kurt “CyberGuy” Knutsson)

    Nearly 3.5 million people impacted

    In letters sent to affected individuals, the university confirmed the breach affects 3,489,274 people. If you are a current or former student or employee, watch your mail closely.

    These notifications often arrive by postal mail, not email. The letter explains what data was exposed and includes instructions for protective services.

    We reached out to The University of Phoenix for comment, and a rep provided CyberGuy with the following statement: 

    “We recently experienced a cybersecurity incident involving the Oracle E-Business Suite software platform. Upon detecting the incident on November 21, 2025, we promptly took steps to investigate and respond with the assistance of leading third-party cybersecurity firms. We are reviewing the impacted data and will provide the required notifications to affected individuals and regulatory entities.”

    Free identity protection is now available

    The University of Phoenix is offering impacted individuals free identity protection services. These include:

    • 12 months of credit monitoring
    • Identity theft recovery assistance
    • Dark web monitoring
    • A $1 million fraud reimbursement policy

    To enroll, you must use the redemption code provided in the notification letter. Without that code, you cannot activate the service.

    This attack fits a larger Clop campaign

    The University of Phoenix breach is not an isolated case. Clop has used similar tactics in past campaigns involving GoAnywhere MFT, Accellion FTA, MOVEit Transfer, Cleo, and Gladinet CentreStack.

    Other universities have also reported Oracle EBS-related incidents. These include Harvard University and the University of Pennsylvania.

    The U.S. government is taking notice. The U.S. Department of State is now offering a reward of up to $10 million for information linking Clop’s attacks to a foreign government.

    Why colleges are prime targets

    Universities store massive amounts of personal data. Student records, financial aid files, payroll systems, and donor databases all live under one roof.

    Like healthcare organizations, colleges present a high-value target. A single breach can expose years of data tied to millions of people.

    MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

    Outsmart hackers who are out to steal your identity

    Affected University of Phoenix students and staff should act quickly to monitor accounts and protect their identities. (Kurt “CyberGuy” Knutsson)

    Steps to stay safe right now

    If you believe you may be affected, act quickly. These steps can reduce your risk.

    1) Watch for your breach notification letter

    Read it carefully. It explains what data was exposed and how to enroll in protection services.

    2) Enroll in the free identity protection

    First, use the redemption code provided. Because social security and banking data are involved, credit monitoring and recovery services matter. Even if you do not qualify for the free service, an identity theft protection service is still a smart move.

    In addition, these services actively monitor sensitive details like your social security number, phone number and email address. If your information appears on the dark web or if someone tries to open a new account, you receive an alert right away. As a result, many services also help you quickly freeze bank and credit card accounts to limit further fraud.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    3) Use a data removal service

    Because this breach exposed names, contact details and other identifiers, reducing what is publicly available about you matters. A data removal service can help remove your personal information from data broker sites, which lowers the risk of targeted phishing or fraud tied to the stolen University of Phoenix records.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Monitor financial accounts daily

    Check bank statements and credit card activity for unfamiliar charges. Report anything suspicious immediately.

    5) Consider freezing your credit

    A credit freeze can stop criminals from opening new accounts in your name. It is free and reversible. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

    6) Be alert for phishing attempts and use strong antivirus software 

    Expect more scam emails and phone calls. Criminals may reference the breach to sound legitimate.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    7) Secure your devices

    Keep your operating systems and apps up to date, as attackers often exploit outdated software to gain access. In addition, enable automatic updates and review app permissions to prevent stolen personal data from being combined with device-level access and causing further harm.

    Kurt’s key takeaways

    The University of Phoenix data breach highlights a growing problem across higher education. When attackers exploit trusted enterprise software, the fallout spreads fast and wide. While free identity protection helps, long-term vigilance matters most. Staying alert can limit damage long after the headlines fade.

    If universities cannot protect this level of sensitive data, should students demand stronger cybersecurity standards before enrolling? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Fake AI chat results are spreading dangerous Mac malware

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals have always chased whatever people trust the most. First, it was email. Then search results. Now it’s AI chat answers. Researchers are warning about a new campaign where fake AI conversations are showing up in Google search results and quietly pushing Mac users to install dangerous malware. What makes this especially risky is that everything looks helpful, legitimate and step-by-step, right up until your system is compromised.

    The malware being spread is Atomic macOS Stealer, often called AMOS, and the attacks abuse conversations generated by tools people increasingly rely on for everyday help. Investigators have confirmed that both ChatGPT and Grok were misused as part of this campaign.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS

    One copied terminal command is all it takes for malware like AMOS to quietly install itself on a Mac. (Kurt “CyberGuy” Knutsson)

    How fake AI chat results lead to malware

    Researchers traced one infection back to a simple Google search: “clear disk space on macOS.” Instead of landing on a normal help article, the user was shown what looked like an AI conversation result embedded directly in search. That conversation offered clear, confident instructions and ended by telling the user to run a command in the macOS Terminal. That command installed AMOS.

    When researchers followed the same trail, they found multiple poisoned AI conversations appearing for similar searches. That consistency strongly suggests this was a deliberate operation aimed at Mac users searching for routine maintenance help.

    If this feels familiar, it should. A previous campaign used sponsored search results and SEO-poisoned links that pointed to fake macOS software hosted on GitHub. In that case, attackers impersonated legitimate apps and walked users through terminal commands that installed the same AMOS infostealer.

    According to researchers, once the terminal command is executed, the infection chain kicks off immediately. The base64 string in the command decodes into a URL that hosts a malicious bash script. That script is designed to harvest credentials, escalate privileges and establish persistence, all without triggering a visible security warning.

    The danger here is how clean the process looks. There’s no installer window, obvious permission prompt or any option for you to review what’s about to run. Because everything happens through the command line, normal download protections are sidestepped and the attacker gets to execute whatever they want.

    MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

    A fake chatGPT website

    Fake AI chat results can look polished and trustworthy, even when they are designed to trick you into running harmful commands. (Kurt “CyberGuy” Knutsson)

    Why is this attack so effective?

    This campaign combines two powerful ideas. Trust in AI answers and trust in search results. Most major chat tools, including Grok on X, let users delete parts of conversations or share only selected snippets. That means an attacker can carefully curate a short, polished exchange that looks genuinely helpful while hiding the manipulative prompts that produced it.

    Using prompt engineering, attackers get ChatGPT to generate a step-by-step cleanup or installation guide that actually installs malware. ChatGPT’s sharing feature then creates a public link that lives inside the attacker’s account. From there, criminals either pay for sponsored search placement or use SEO tactics to push that shared conversation high in the results.

    Some ads are designed to look almost identical to legitimate links. Unless you check who the advertiser actually is, it’s easy to assume it’s safe. One example documented by researchers showed a sponsored result advertising a fake “Atlas” browser for macOS, complete with professional branding.

    Once those links are live, attackers don’t need to do much else. They wait for users to search, click, trust the AI output and follow the instructions exactly as written.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    An iPhone app screen

    Attackers rely on trust in search results and AI answers, knowing most people will not question step-by-step instructions. (Kurt “CyberGuy” Knutsson)

    8 steps you can take to stay safe from fake AI chat malware

    AI tools are useful, but attackers are now shaping answers that lead you straight into trouble. These steps help you stay protected without giving up search or AI entirely.

    1) Never paste terminal commands from search results or AI chats

    This is the most important rule. If an AI response or webpage tells you to open Terminal and paste a command, stop. Legitimate macOS fixes almost never require you to blindly run scripts copied from the internet. Once you press Enter, you lose visibility into what happens next. Malware like AMOS relies on this moment of trust to bypass normal security checks.

    2) Treat AI instructions as suggestions

    AI chats are not authoritative sources. They can be manipulated through prompt engineering to produce dangerous step-by-step guides that look clean and confident. Before acting on any AI-generated fix, cross-check it with Apple’s official documentation or a trusted developer site. If you cannot verify it easily, do not run it.

    3) Use a password manager to limit the damage

    A password manager creates strong, unique passwords for every account you use. If malware steals one password, it cannot unlock everything else. Many password managers also refuse to autofill credentials on fake or unfamiliar sites, which can alert you that something is wrong before you type anything manually. This single tool dramatically reduces the impact of credential-stealing malware.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com 

    4) Keep macOS and browsers fully updated

    AMOS and similar malware often rely on known weaknesses after the initial infection. Updates patch these holes. Delaying updates gives attackers more room to escalate privileges or maintain persistence. Turn on automatic updates so you are protected even if you forget.

    5) Use a strong antivirus software on macOS

    Modern macOS malware often runs through scripts and memory-only techniques. A strong antivirus software doesn’t just scan files. It monitors behavior, flags suspicious scripts, and can stop malicious activity even when nothing obvious is downloaded. This is especially important when malware is delivered through Terminal commands.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    6) Be skeptical of sponsored search results

    Paid search ads can look almost identical to legitimate results. Always check who the advertiser is before clicking. If a sponsored result leads to an AI conversation, a download or instructions to run commands, close it immediately.

    7) Avoid “cleanup” and “installer” guides from unknown sources

    Search results promising quick fixes, disk cleanup or performance boosts are common malware entry points. If a guide is not hosted by Apple or a well-known developer, assume it could be risky, especially if it pushes command-line solutions.

    8) Slow down when instructions look unusually polished

    Attackers spend time making fake AI conversations look helpful and professional. Clear formatting and confident language are not signs of safety. They are often part of the deception. Slowing down and questioning the source is usually enough to break the attack chain.

    Kurt’s key takeaway

    This campaign shows how attackers are shifting from breaking systems to manipulating trust. Fake AI conversations work because they sound calm, helpful and authoritative. When those conversations are boosted through search results, they inherit credibility they don’t deserve. The technical tricks behind AMOS are complex, but the entry point is simple. Someone follows instructions without questioning where they came from.

    Have you ever followed an AI-generated fix without double-checking it first? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Make 2026 your most private year yet by removing broker data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    As you think about New Year’s resolutions, consider one that protects every part of your life in 2026: removing your personal data from the internet. Not your social media posts. Not your email subscriptions. Your personal data, the files companies quietly collect and sell without your consent.

    Most people do not realize how much of their life already circulates inside massive databases run by data brokers. These companies exist for one purpose: to collect, package and sell personal information. They do it continuously, often without your knowledge or approval, to anyone willing to pay. As 2026 begins, this is the digital cleanup that matters most.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

    Data brokers quietly collect and sell personal information, creating detailed profiles that fuel scams, identity theft and privacy risks heading into 2026. (Photo by Kira Hofmann/picture alliance via Getty Images)

    What’s in your “digital file” and why it’s a problem in 2026

    Data brokers work like factories. They pull information from the apps you use, websites you visit, loyalty cards you scan, public records and even location data from your phone. Then they combine it into a shockingly detailed picture of your life, including:

    • Your full name and past addresses
    • Your phone numbers and email accounts
    • Your shopping history
    • Predicted income, political leanings, age and marital status
    • Your internet browsing habits
    • Where you go daily, down to the GPS coordinates.

    This data is packaged and sold to advertisers, insurers, political groups, background-check sites and, most worryingly, scammers. And going into 2026, the threat landscape is completely different:

    • AI-powered scams rely on data brokers: Scammers don’t guess anymore-they buy. They use broker data to tailor scams, impersonate companies you interact with and even mimic family members.
    • Deepfake phone scams are exploding: When a scammer knows your relatives’ names, phone numbers, travel dates and habits, a deepfake call becomes dangerously believable.
    • Data breaches are more frequent than ever: Your info doesn’t get leaked once; it gets leaked again and again because brokers constantly resell it.
    • The more data you leave exposed, the easier identity theft becomes: One exposed address or phone number is annoying. Hundreds of exposed data points? That’s a permanent risk until you remove them.

    If you want 2026 to be your safest year yet, the best thing you can do is reduce the amount of personal data available about you online, starting with data brokers.

    Why data brokers make it so hard to delete your information

    Technically, data brokers have to delete your data if you request it. But here’s the part they don’t advertise: They want you to give up. Some brokers hide their opt-out pages behind dozens of clicks. Others require you to fax forms, upload IDs, or repeat the request every 30–90 days because they reactivate your profile without warning. Now multiply that by 180–500+ data brokers, depending on your location. This is why most people never delete their information: it’s just too time-consuming.

    The simplest fix: automate the removals

    This is where a data removal service helps. These services automatically request the removal of your personal information from hundreds of data brokers on your behalf. That includes people-search websites, marketing databases, background-check services and similar data marketplaces. Instead of tracking down each site yourself, automation handles the process for you. Here’s what it does:

    • Identifies which brokers are storing your data
    • Sends legal removal requests for you
    • Follows up continually until your data is deleted
    • Stops brokers from relisting you
    • Keeps monitoring throughout 2026.

    For most people, that means removing your data from hundreds of databases in just a few minutes of setup. If you want a clean digital slate for 2026, this is the closest thing to hitting “erase.”

    Why the New Year is the best time to act

    You can remove your data at any time. However, early January is one of the most effective moments to do it. Here’s why.

    700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS

    Person typing on their computer.

    Cybersecurity experts warn that personal data circulating online makes consumers more vulnerable to AI-powered scams and deepfake fraud. (Photo by Nikolas Kokovlis/NurPhoto via Getty Images)

    1) Your data footprint is the largest after the holidays

    The holiday season creates a surge in data sharing. Retailers, loyalty programs, airlines, travel sites and apps collect huge amounts of personal information in November and December. Shoppers often share email addresses, phone numbers and location data to unlock discounts and faster checkout.

    Holiday spending continues to rise year over year. More spending means more data. As a result, your personal information spreads across more databases than at any other time of the year.

    2) Data brokers refresh profiles at the start of the year

    After the holiday rush, data brokers update and expand their profiles using newly collected information. January is when many of these companies organize, repackage and resell their datasets.

    Starting the removal process early helps limit how widely your information gets shared. Since removals can take days or even weeks, acting now reduces exposure before that data circulates further.

    3) Scams increase during tax season

    From January through April, scammers ramp up activity tied to tax season. Common threats include IRS impersonation scams, fake refund messages and W-2 fraud. Many of these attacks rely on data pulled from broker databases.

    When scammers have accurate personal details, their messages feel more convincing. Reducing your data exposure now lowers the risk. Removing your information from major data broker sites is a strong first step. It also helps to check smaller, lesser-known sites that may still list your details.

    PORNHUB HIT BY MASSIVE USER DATA LEAK EXPOSING 200 MILLION RECORDS

    Person working on their Macbook.

    Removing personal data from data broker sites can reduce exposure to scammers and help protect finances and privacy in the new year. (Photo by Phil Barker/Future Publishing via Getty Images)

    How to start 2026 with a clean data slate (3 steps)

    Using a reputable data removal service can simplify the entire process. These services automate requests to remove your personal information from data brokers, including many sites that are difficult to handle on your own.

    Step 1) Run a quick exposure check

    Start by searching for your name on Google. Look for results that show your address, date of birth, phone number, or email address. Sites that display this information often belong to data brokers or businesses that sell personal data for profit.

    Make a short list of the pages where your information appears.

    Step 2) Automate the removals

    Instead of spending weeks contacting each site manually, a data removal service can handle the work for you. You submit the links you found, and the service requests removals on your behalf across hundreds of databases.

    This approach is especially helpful if:

    • You have moved recently
    • You shop online often
    • You receive frequent spam or scam messages
    • You want stronger privacy protections in 2026

    Many people see multiple removals within the first few weeks.

    Step 3) Keep it clean all year

    Data brokers do not stop collecting information. Even after removals, your data can reappear months later. Ongoing monitoring helps catch new listings and remove them before they spread further.

    That long-term protection is what keeps your data footprint smaller throughout the year.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    If you want 2026 to be the year you take control of your digital life, start with the one thing that influences your security, your inbox, your finances and your peace of mind: Clearing your personal data from data broker sites. You can spend months trying to do it manually, or sign up once and let a data removal service handle all the hard work. A safer, quieter, more private 2026 is just minutes away.

    How much of your personal information do you think is already being bought and sold without your knowledge? Let us know by writing to us at Cyberguy.com. 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 10 simple cybersecurity resolutions for a safer 2026

    [ad_1]

    NEWYou can now listen to Fox News articles!

    We could not let 2025 end without one last reminder about digital safety. Cybercriminals never slow down. In fact, the holidays and the start of a new year often bring a surge in scams, account takeovers and data theft. The good news is that cybersecurity need not feel overwhelming. You do not need advanced skills or expensive tools. With a few smart habits, you can lower your risk and protect your digital life throughout 2026. To help you start the year strong, here are 10 simple cybersecurity resolutions that actually work.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    AMERICA’S MOST-USED PASSWORD IN 2025 REVEALED

    Strong passwords and two-factor authentication stop most account takeovers before they start. (Peter Steffen/picture alliance)

    1) Start the year with strong passwords

    Passwords remain your first line of defense. Weak or reused passwords make it easy for attackers to break into multiple accounts at once. Use a unique password for every account. Longer passphrases work better than short, complex strings. A reputable password manager can generate and securely store passwords, so you do not have to memorize them. One rule matters most. Never reuse passwords.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Enable two-factor authentication (2FA) everywhere

    Two-factor authentication (2FA) adds a second step after your password. This usually includes a code from an app or a physical security key. Even if someone steals your password, 2FA can block access. App-based authenticators provide stronger protection than text messages. Turn it on for email, banking, social media and shopping accounts first.

    3) Audit your digital presence

    Old accounts create new risks. Take time to review shopping sites, forums, apps and subscriptions you no longer use. Delete what you do not need. Update privacy settings on what you keep. Share less personal information whenever possible, especially birthdays, locations and phone numbers. A smaller digital footprint limits abuse.

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    Simple habits like updating software and thinking before you click block common scams.

    Simple habits like updating software and thinking before you click block common scams. (Kurt “CyberGuy” Knutsson)

    4) Keep software and devices up to date

    Security updates fix real vulnerabilities that attackers actively exploit. Skipping updates leaves doors open. Enable automatic updates for operating systems, browsers, apps, routers and smart devices. This habit blocks many common attacks without extra effort. Outdated software remains one of the top causes of successful hacks.

    5) Use a personal data removal service

    Your personal information appears on hundreds of data broker sites. These sites collect names, addresses, phone numbers and relatives, then sell access to anyone willing to pay. A personal data removal service helps locate and remove that information. This step reduces scam attempts, phishing messages and identity fraud risks throughout the year. Less exposed data means fewer threats.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    6) Consider identity theft protection

    Identity theft often starts quietly. A breach happens. Data leaks. Fraud follows months later. Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Many services can also scan for accounts tied to multiple email addresses, making cleanup easier. Early alerts help you act before damage spreads.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS

    laptop keyboard

    Backups, secure Wi-Fi and identity monitoring help limit damage when breaches happen. (Kurt “CyberGuy” Knutsson)

    7) Think before you click and use strong antivirus protection

    Most cyberattacks still begin with a click. Fake shipping notices, refund alerts and urgent messages push people to act fast. Pause before clicking links or opening attachments. Many scams now use AI to generate realistic messages, fake voices and convincing images, making it even more important to pause before you click. Verify messages through official websites or apps instead. Strong antivirus software adds another layer of protection by blocking malware, ransomware and malicious downloads across your devices, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    8) Secure your home Wi-Fi network

    Your Wi-Fi network connects everything. That makes it a valuable target. Change the default router password right away. Enable WPA3 encryption if your router supports it. Keep router firmware up to date and avoid sharing your network with unknown devices. A secure network protects every connected device.

    9) Back up your data regularly

    Backups protect you from ransomware, hardware failure and accidental deletion. Many people still skip them. Use cloud backups, an external hard drive or both. Automate the process so it runs without reminders. If something goes wrong, backups let you recover quickly.

    10) Freeze your credit if you do not need it

    A credit freeze prevents new accounts from opening in your name. It remains one of the strongest defenses against identity fraud heading into 2026. Freezing credit is free and reversible. You can temporarily lift it when applying for loans or credit cards. This single step blocks many identity crimes outright. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.”

    Pro tip: Lock down your email and use aliases

    Your email account controls password resets, alerts and account recovery. If attackers get in, they can reach nearly everything else. Secure your primary email with a long, unique password and two-factor authentication. Then create email aliases for shopping, subscriptions and sign-ups. Aliases limit exposure when a company suffers a data breach and make phishing easier to spot. Protecting email this way strengthens every other cybersecurity resolution.

    By creating email aliases, you can protect your information and reduce spam. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com.

    Kurt’s key takeaways

    A safer digital life starts with small, consistent decisions. Strong passwords, updates, backups and awareness go a long way. By committing to these cybersecurity resolutions, you set yourself up for a more secure 2026. You also make it harder for criminals to profit from stolen data. There is no better time to start than now.

    Which of these cybersecurity habits are you still delaying, and what would it take to address them today? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Microsoft typosquatting scam swaps letters to steal logins

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new phishing campaign is exploiting a visual trick that is easy to miss and hard to unsee once you know it. Attackers are using the domain rnicrosoft.com to impersonate Microsoft and steal login credentials. The trick is simple. Instead of the letter m, scammers place r and n side by side. In many fonts, those letters blur together and look almost identical to an m at a quick glance.

    Security experts are sounding the alarm because this tactic works. These emails closely copy Microsoft branding, layout and tone, which makes them feel familiar and trustworthy. That false sense of legitimacy is often all it takes to get a quick click before you realize something is wrong.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    MOST PARKED DOMAINS NOW PUSH SCAMS AND MALWARE

    Cybersecurity experts warn of a new phishing scam that uses the fake domain rnicrosoft.com to mimic Microsoft and steal login credentials. (Photo by Oliver Berg/picture alliance via Getty Images)

    Why your brain falls for the rn trick

    This attack relies on how people read. Your brain predicts words instead of scanning each letter. When something looks familiar, you fill in the gaps automatically. On a large desktop monitor, a careful reader might spot the flaw. On a phone, the risk jumps. The address bar often shortens URLs, and the screen leaves little room for close inspection. That is exactly where attackers want you. Once trust is established, you are more likely to enter passwords, approve fake invoices or download harmful attachments.

    Common typosquatting variations to watch for

    Attackers rarely rely on a single trick. They mix several visual deceptions to increase their odds.

    Letter combinations

    rnicrosoft.com
    Uses r and n together to mimic m

    Number swapping

    micros0ft.com
    Replaces the letter o with the number 0

    Hyphenation

    microsoft-support.com
    Adds official-sounding words to look legitimate

    TLD switching

    microsoft.co
    Uses a different domain ending to appear real

    What attackers do after you click

    Typosquatting domains like rnicrosoft.com are rarely used for a single purpose. Criminals reuse them across multiple scams. Common follow-ups include credential phishing, fake HR notices and vendor payment requests. In every case, the attacker benefits from speed. The faster you act, the less likely you are to notice the mistake.

    Why these fake domains keep working

    Most people do not slow down to read URLs character by character. Familiar logos and language reinforce trust, especially during a busy workday. Mobile use makes this worse. Smaller screens, shortened links and constant notifications create perfect conditions for mistakes. This is not a Microsoft-only problem. Banks, retailers, healthcare portals and government services all face the same risk.

    How to stay safe from typosquatting attacks

    Typosquatting scams work because they rush you into trusting what looks familiar. These steps slow that moment down and help you spot fake domains before damage is done.

    1) Expand the full sender address every time

    Before clicking anything, open the full sender address in the email header. Display names and logos are easy to fake, but domains tell the real story. Look closely for swapped letters like rn in place of m, added hyphens or strange domain endings. If the address feels even slightly off, treat the message as hostile.

    NETFLIX SUSPENSION SCAM TARGETS YOUR INBOX

    Scammer typing on his laptop.

    Scammers are replacing the letter “m” with “rn” in web addresses, a subtle trick that can fool users at a quick glance. (Photo By Paul Chinn/The San Francisco Chronicle via Getty Images)

    2) Preview links before you click

    On a desktop, hover your mouse over links to reveal the real destination. On a phone, long-press the link to preview the URL. This simple pause often exposes lookalike domains designed to steal logins. If the link does not match the exact site you expect, do not proceed.

    3) Avoid email links for password or security alerts

    When an email claims your account needs urgent action, do not use its links. Instead, open a new browser tab and manually go to the official website using a saved bookmark. Legitimate companies do not require you to act through surprise links, and this habit cuts off most typosquatting attempts instantly.

    4) Use strong antivirus software for added protection

    Strong antivirus software can block known phishing domains, flag malicious downloads and warn you before you enter credentials on risky sites. While it cannot catch every new typo trick, it adds an important safety net when human attention slips.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    5) Check the Reply To field for hidden red flags

    Even if the sender’s address looks correct, inspect the Reply To field. Many phishing campaigns route replies to external inboxes that have nothing to do with the real company. A mismatch here is a strong signal that the message is a scam.

    HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

    Person using their computer.

    A typosquatting campaign targeting Microsoft users highlights how small visual changes in URLs can lead to major security risks. (Photo by THOMAS SAMSON / AFP) (Photo by THOMAS SAMSON/AFP via Getty Images)

    6) Consider a data removal service to reduce targeting

    Typosquatting attacks often begin with leaked or scraped contact details. A data removal service can help remove your personal information from data broker sites, reducing the number of scam emails and targeted phishing attempts that reach your inbox.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    7) Rely on saved bookmarks for critical accounts

    For email, banking and work portals, use bookmarks you created yourself. This eliminates the risk of mistyping addresses or trusting links in messages. It is one of the simplest and most effective defenses against lookalike domain attacks.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Typosquatting works because it targets human behavior, not software flaws. A single swapped character can bypass filters and fool smart people in seconds. Knowing these tricks slows attackers down and gives you back control. Awareness turns a sophisticated scam into an obvious fake.

    If a single letter can decide whether you get hacked, how closely are you really reading the links you trust every day? Let us know by writing to us at Cyberguy.com. 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 700Credit data breach exposes SSNs of 5.8M consumers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Data breaches tied to financial services companies are no longer rare, but they still hit harder when Social Security numbers are involved. In the latest incident, U.S.-based fintech company 700Credit has confirmed that the personal data of more than 5.8 million people was exposed. The breach did not originate from a direct compromise of 700Credit’s internal network, which makes it more concerning. It began with a third-party integration partner and quietly snowballed over several months before it was detected. By the time the issue was contained, hackers had managed to steal a significant amount of sensitive consumer data.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    DATA BREACH EXPOSES 400K BANK CUSTOMERS’ INFO

    A data breach at fintech firm 700Credit exposed the personal information of more than 5.8 million people after hackers accessed data through a third-party vendor. (Photo by Philip Dulian/picture alliance via Getty Images)

    What went wrong at 700Credit

    The company says the breach traces back to July, when a threat actor compromised one of its third-party integration partners, as reported by Bleeping Computer. During that intrusion, the attacker discovered an exposed API that could be used to access customer information linked to 700Credit’s dealership clients. The integration partner failed to inform 700Credit about the compromise, allowing the access to continue unnoticed.

    Suspicious activity was only detected on October 25, when 700Credit flagged unusual behavior on its systems and launched an internal investigation. The company says it brought in third-party computer forensic specialists to assess the scope of the incident and determine what data had been affected.

    According to the company’s findings, certain records within its web application were copied without authorization. These records are related to customers of auto dealerships that use 700Credit’s services. Managing Director Ken Hill later confirmed that roughly 20% of the consumer data accessible through the affected system was stolen between May and October.

    What data was exposed and why it matters

    While 700Credit has not published an exhaustive list of every data field involved, the company has confirmed that highly sensitive personal information was exposed. This includes Social Security numbers, which significantly raises the risk of identity theft and financial fraud. When SSNs are compromised, the impact is long-term. You cannot simply change them like a password.

    The company has published a dedicated page on its website outlining the breach and the types of information impacted. As part of its response, 700Credit is offering affected individuals 12 months of free identity protection and credit monitoring through TransUnion. You have a 90-day window to enroll in this service after receiving the notification.

    Notably, audio streaming platform SoundCloud and adult video sharing platform Pornhub also suffered data breaches tied to third-party vendors. There is no indication that the same vendor was involved in all three incidents, but the cases highlight how risky third-party access can be when vendors handle sensitive consumer data.

    CyberGuy reached out to 700Credit for comment but did not receive a response before publication.

    PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH

    Person on their smartphone.

    Social Security numbers were among the sensitive data stolen in a monthslong breach involving 700Credit and an outside integration partner. (Photo by Matt Cardy/Getty Images)

    6 steps you can take to stay safe after a data breach

    When breaches like this happen, the damage is not always immediate. Your data can sit in underground markets for months before it is abused. That is why it helps to lock things down early. Here are six practical steps you can take.

    1) Use strong antivirus software 

    A good antivirus helps block malicious downloads, phishing links and spyware that often follow large data leaks. Attackers know your details are exposed and may try to target you directly with malware-based scams.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

    2) Switch to a password manager

    If you are still reusing passwords, this is the time to stop. A password manager helps you generate strong, unique passwords for every service and keeps them stored securely. If one site is breached, the rest of your accounts stay protected.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Enable two-factor authentication everywhere

    Turn on 2FA for email, banking, social media and cloud accounts. Even if someone has your password, they cannot log in without the second factor. App-based authenticators are more secure than SMS, where possible.

    4) Sign up for identity theft and credit monitoring

    Monitoring services alert you when new accounts, loans or credit checks appear in your name. Early alerts give you a chance to act before serious financial damage is done.

    Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    PETCO CONFIRMS MAJOR DATA BREACH INVOLVING CUSTOMER DATA

    Photo of a phone with malware.

    Hackers quietly accessed consumer data tied to auto dealerships using 700Credit services before the breach was discovered in October. (Photo by Jaque Silva/NurPhoto via Getty Images)

    5) Consider a personal data removal service

    Your phone number, address and other details are often already scattered across data broker sites. Data removal services help reduce your digital footprint, making it harder for attackers to profile and target you after a breach.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Freeze your credit if SSNs are exposed

    If your Social Security number is involved, a credit freeze is one of the strongest defenses. It prevents new credit accounts from being opened without your approval and can be lifted temporarily when needed. To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.”

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Third-party APIs and integrations are essential for modern digital services, but they also expand the attack surface. When third-party partners fail to disclose breaches quickly, the downstream impact can be massive, as this case shows. If you receive a notification from 700Credit, take it seriously. Enroll in the credit monitoring service, review your credit reports, and consider locking them down. Even if no fraud has occurred yet, breaches involving SSNs often lead to delayed abuse months or even years later.

    Should companies be held accountable when a third-party vendor exposes customer information? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    [ad_2]

    Source link

  • AI takes on return fraud as holiday returns surge

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Data from Happy Returns, a UPS-owned reverse logistics company, shows that nearly one in every 10 retail returns in the United States involves fraud. Retailers now lose an estimated $76.5 billion a year to the problem. 

    To slow those losses, Happy Returns, which specializes in boxless in-store returns for online purchases, is testing a new artificial intelligence tool that flags fraudulent returns before refunds go out.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    NEW IPHONE SCAM TRICKS OWNERS INTO GIVING PHONES AWAY

    Return fraud is costing U.S. retailers billions, with nearly 1 in 10 returns flagged as suspicious, according to data from Happy Returns. (Photo by Tim Boyle/Getty Images)

    How return fraud works in the real world

    Return fraud often looks harmless on the surface. A shopper requests a refund for a legitimate item. Instead of sending back the real product, they ship something cheaper, damaged or completely different. Retailers often issue refunds before anyone inspects the item. That speed allows fraud to slip through and drives up costs.

    Industry data from Happy Returns and the National Retail Federation shows retailers will handle nearly $850 billion in returned goods in 2025, representing almost 16% of total retail sales. According to the same research, an estimated 9% of those returns are fraudulent. The report also finds that many shoppers admit to some form of return policy abuse. Importantly, because Happy Returns conducts in-person item verification and uses AI-powered automated flagging plus audit processes to catch mismatches, the rate of confirmed fraud in its network is much lower than the industry-wide estimate. 

    Why boxless returns changed the equation

    Happy Returns operates nearly 8,000 in-person return drop-off locations inside stores such as Ulta Beauty and Staples, as well as at UPS locations. Shoppers can return eligible items without a box or shipping label, and refunds are often issued quickly after verification. Like any returns channel, fraud attempts can happen, but in-person drop-off, item verification, ongoing flagging and audits help keep confirmed fraud far lower than broader industry averages.

    Happy Returns says its boxless, in-person model already blocks many common fraud tactics, including empty boxes, partial returns and fake tracking numbers. “If you never touch the product, you can’t actually know what’s being returned matches what was sold,” the company says. Everlane says that physical handling alone acts as a deterrent. “Just the fact of knowing an individual will physically handle and verify the product at the Return Bar deters fraudsters from even attempting to commit fraud,” said Jim Green, director of logistics and fulfillment at Everlane. 

    Still, Happy Returns acknowledges that fraud tactics continue to evolve. Lookalike products and knockoffs can closely resemble the real thing, making subtle differences hard to spot without close inspection.

    THE FAKE REFUND SCAM: WHY SCAMMERS LOVE HOLIDAY SHOPPERS

    Woman shopping at a store.

    Happy Returns is testing a new artificial intelligence system designed to flag fraudulent retail returns before refunds are issued. (Photo By Helen H. Richardson/The Denver Post via Getty Images)

    How Return Vision uses AI to detect fraudulent returns

    This holiday season, Happy Returns is piloting its new AI system with select retailers, including Everlane, Revolve and Under Armour, as return volumes spike.

    The new AI tool is called Return Vision. It starts working the moment a shopper initiates a return online. The system looks for unusual patterns across return timing, frequency and location. A single return may appear normal on its own. When those signals overlap in suspicious ways, the return is flagged for review before a refund is issued.

    At drop-off points, workers can scan item barcodes and see photos of what the item should look like. They can reject obvious mismatches on the spot. Once returns reach Happy Returns hubs in California, Pennsylvania and Mississippi, flagged packages are sent to human auditors. The items are opened and photographed, including images of the front, back and identifying labels.

    Those photos are fed back into the AI system, which compares them against official product images and past transaction data. Human teams review the AI assessment and make the final decision. The goal is not automation alone. It is adding multiple layers of review where fraud is harder to hide.

    Early results show how effective AI is at catching return fraud

    While still in pilot, Happy Returns says Return Vision is showing early results. Less than 1% of returns flowing through its network are flagged as high risk. Of those flagged returns, about 10% are ultimately confirmed as fraud. The average prevented loss per confirmed case is just over $200. 

    Happy Returns says the system focuses on high-confidence cases, allowing most shoppers to move through returns without delay. The company notes that the tool does not address every form of abuse, such as wardrobing, when customers return worn items.

    WHY YOUR HOLIDAY SHOPPING DATA NEEDS A CLEANUP NOW

    Shoppers walking with their purchases.

    Boxless, in-person returns are helping retailers cut down on common fraud tactics like empty boxes and fake tracking numbers. (Photographer: David Paul Morris/Bloomberg via Getty Images)

    Why retailers are turning to AI to stop return fraud

    Happy Returns is not alone in turning to AI to stop return fraud. Amazon and FedEx both offer boxless returns and use automated systems to flag risky behavior. The U.S. Postal Service is rolling out similar services. Across retail, 85% of surveyed merchants say they use AI or machine learning to combat fraud. Many say the results have been mixed. Happy Returns says combining behavioral signals with physical product verification helps close gaps that data-only systems often miss.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Retail returns have changed, and so has the fraud that comes with them. Easy drop-offs and instant refunds made life better for shoppers, but they also created new vulnerabilities. Happy Returns is betting that AI, combined with hands-on inspection, can tip the balance back toward retailers. Early results suggest it can help, even if it is not a cure-all. As fraudsters adapt, retailers are learning they have to adapt faster.

    Should retailers slow down instant refunds if it helps stop return fraud, or should convenience always come first? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Trump-Zelenskyy talks will address security guarantees, reconstruction, Ukraine leader says

    [ad_1]

    Ukrainian President Volodymyr Zelenskyy said Friday that he will meet with U.S. President Donald Trump in Florida over the weekend.Related video above: Ukraine and U.S. discuss peace proposals on Christmas Day amid Russian attacksZelenskyy told journalists that the two leaders will discuss security guarantees for Ukraine during Sunday’s talks and that the 20-point plan under discussion “is about 90% ready.”The meeting will take place at Mar-a-Lago.An “economic agreement” also will be discussed, Zelenskyy said, but added that he was unable to confirm “whether anything will be finalized by the end.”The Ukrainian side will also raise “territorial issues,” he said. Moscow has insisted that Ukraine relinquish the remaining territory it still holds in the Donbas — an ultimatum that Ukraine has rejected. Russia has captured most of Luhansk and about 70% of Donetsk — the two areas that make up the Donbas.Zelenskyy said that Ukraine “would like the Europeans to be involved,” but doubted whether it would be possible at short notice.“We must, without doubt, find some format in the near future in which not only Ukraine and the U.S. are present, but Europe is represented as well,” he said.The announced meeting is the latest development in an extensive U.S.-led diplomatic push to end the nearly four-year Russia-Ukraine war, but efforts have run into sharply conflicting demands by Moscow and Kyiv.Zelenskyy’s comments came after he said Thursday that he had a “good conversation” with U.S. special envoy Steve Witkoff and Jared Kushner, Trump’s son-in-law.Kremlin spokesman Dmitry Peskov told reporters Friday that the Kremlin had already been in contact with U.S. representatives since Russian presidential envoy Kirill Dmitriev recently met with U.S. envoys in Florida.“It was agreed upon to continue the dialogue,” he said.Trump is engaged in a diplomatic push to end Russia’s all-out war, which began on Feb. 24, 2022, but his efforts have run into sharply conflicting demands by Moscow and Kyiv. Zelenskyy said Tuesday that he would be willing to withdraw troops from Ukraine’s eastern industrial heartland as part of a plan to end the war if Russia also pulls back and the area becomes a demilitarized zone monitored by international forces.Though Russian Foreign Ministry spokeswoman Maria Zakharova said Thursday that there had been “slow but steady progress” in the peace talks, Russia has given no indication that it will agree to any kind of withdrawal from land it has seized.On the ground, two people were killed and six more wounded Friday when a guided aerial bomb hit a busy road and set cars aflame in Ukraine’s second biggest city, Kharkiv, mayor Ihor Terekhov wrote on Telegram.One person was killed and three others were wounded when a guided aerial bomb hit a house in Ukraine’s Zaporizhzhia region, while six people were wounded in a missile strike on the city of Uman, local officials said Friday.Russian drone attacks on the city of Mykolaiv and its suburbs overnight into Friday left part of the city without power. Energy and port infrastructure were damaged by drones in the city of Odesa on the Black Sea.Meanwhile, Ukraine said that it struck a major Russian oil refinery on Thursday using U.K.-supplied Storm Shadow missiles.Ukraine’s General Staff said that its forces hit the Novoshakhtinsk refinery in Russia’s Rostov region.“Multiple explosions were recorded. The target was hit,” it wrote on Telegram.Rostov regional Gov. Yuri Slyusar said that a firefighter was wounded when extinguishing the fire.Ukraine’s long-range drone strikes on Russian refineries aim to deprive Moscow of the oil export revenue it needs to pursue its full-scale invasion. Russia wants to cripple Ukraine’s power grid, seeking to deny civilians access to heat, light and running water in what Ukrainian officials say is an attempt to “weaponize winter.”

    Ukrainian President Volodymyr Zelenskyy said Friday that he will meet with U.S. President Donald Trump in Florida over the weekend.

    Related video above: Ukraine and U.S. discuss peace proposals on Christmas Day amid Russian attacks

    Zelenskyy told journalists that the two leaders will discuss security guarantees for Ukraine during Sunday’s talks and that the 20-point plan under discussion “is about 90% ready.”

    The meeting will take place at Mar-a-Lago.

    An “economic agreement” also will be discussed, Zelenskyy said, but added that he was unable to confirm “whether anything will be finalized by the end.”

    The Ukrainian side will also raise “territorial issues,” he said. Moscow has insisted that Ukraine relinquish the remaining territory it still holds in the Donbas — an ultimatum that Ukraine has rejected. Russia has captured most of Luhansk and about 70% of Donetsk — the two areas that make up the Donbas.

    Zelenskyy said that Ukraine “would like the Europeans to be involved,” but doubted whether it would be possible at short notice.

    “We must, without doubt, find some format in the near future in which not only Ukraine and the U.S. are present, but Europe is represented as well,” he said.

    The announced meeting is the latest development in an extensive U.S.-led diplomatic push to end the nearly four-year Russia-Ukraine war, but efforts have run into sharply conflicting demands by Moscow and Kyiv.

    Zelenskyy’s comments came after he said Thursday that he had a “good conversation” with U.S. special envoy Steve Witkoff and Jared Kushner, Trump’s son-in-law.

    Kremlin spokesman Dmitry Peskov told reporters Friday that the Kremlin had already been in contact with U.S. representatives since Russian presidential envoy Kirill Dmitriev recently met with U.S. envoys in Florida.

    “It was agreed upon to continue the dialogue,” he said.

    Trump is engaged in a diplomatic push to end Russia’s all-out war, which began on Feb. 24, 2022, but his efforts have run into sharply conflicting demands by Moscow and Kyiv.

    Zelenskyy said Tuesday that he would be willing to withdraw troops from Ukraine’s eastern industrial heartland as part of a plan to end the war if Russia also pulls back and the area becomes a demilitarized zone monitored by international forces.

    Though Russian Foreign Ministry spokeswoman Maria Zakharova said Thursday that there had been “slow but steady progress” in the peace talks, Russia has given no indication that it will agree to any kind of withdrawal from land it has seized.

    On the ground, two people were killed and six more wounded Friday when a guided aerial bomb hit a busy road and set cars aflame in Ukraine’s second biggest city, Kharkiv, mayor Ihor Terekhov wrote on Telegram.

    One person was killed and three others were wounded when a guided aerial bomb hit a house in Ukraine’s Zaporizhzhia region, while six people were wounded in a missile strike on the city of Uman, local officials said Friday.

    Russian drone attacks on the city of Mykolaiv and its suburbs overnight into Friday left part of the city without power. Energy and port infrastructure were damaged by drones in the city of Odesa on the Black Sea.

    Meanwhile, Ukraine said that it struck a major Russian oil refinery on Thursday using U.K.-supplied Storm Shadow missiles.

    Ukraine’s General Staff said that its forces hit the Novoshakhtinsk refinery in Russia’s Rostov region.

    “Multiple explosions were recorded. The target was hit,” it wrote on Telegram.

    Rostov regional Gov. Yuri Slyusar said that a firefighter was wounded when extinguishing the fire.

    Ukraine’s long-range drone strikes on Russian refineries aim to deprive Moscow of the oil export revenue it needs to pursue its full-scale invasion. Russia wants to cripple Ukraine’s power grid, seeking to deny civilians access to heat, light and running water in what Ukrainian officials say is an attempt to “weaponize winter.”

    [ad_2]

    Source link

  • Trump-Zelenskyy talks will address security guarantees, reconstruction, Ukraine leader says

    [ad_1]

    Ukrainian President Volodymyr Zelenskyy said Friday that he will meet with U.S. President Donald Trump in Florida over the weekend.Related video above: Ukraine and U.S. discuss peace proposals on Christmas Day amid Russian attacksZelenskyy told journalists that the two leaders will discuss security guarantees for Ukraine during Sunday’s talks and that the 20-point plan under discussion “is about 90% ready.”An “economic agreement” also will be discussed, Zelenskyy said, but added that he was unable to confirm “whether anything will be finalized by the end.”The Ukrainian side will also raise “territorial issues,” he said. Moscow has insisted that Ukraine relinquish the remaining territory it still holds in the Donbas — an ultimatum that Ukraine has rejected. Russia has captured most of Luhansk and about 70% of Donetsk — the two areas that make up the Donbas.Zelenskyy said that Ukraine “would like the Europeans to be involved,” but doubted whether it would be possible at short notice.“We must, without doubt, find some format in the near future in which not only Ukraine and the U.S. are present, but Europe is represented as well,” he said.The announced meeting is the latest development in an extensive U.S.-led diplomatic push to end the nearly four-year Russia-Ukraine war, but efforts have run into sharply conflicting demands by Moscow and Kyiv.Zelenskyy’s comments came after he said Thursday that he had a “good conversation” with U.S. special envoy Steve Witkoff and Jared Kushner, Trump’s son-in-law.Kremlin spokesman Dmitry Peskov told reporters Friday that the Kremlin had already been in contact with U.S. representatives since Russian presidential envoy Kirill Dmitriev recently met with U.S. envoys in Florida.“It was agreed upon to continue the dialogue,” he said.Trump is engaged in a diplomatic push to end Russia’s all-out war, which began on Feb. 24, 2022, but his efforts have run into sharply conflicting demands by Moscow and Kyiv. Zelenskyy said Tuesday that he would be willing to withdraw troops from Ukraine’s eastern industrial heartland as part of a plan to end the war if Russia also pulls back and the area becomes a demilitarized zone monitored by international forces.Though Russian Foreign Ministry spokeswoman Maria Zakharova said Thursday that there had been “slow but steady progress” in the peace talks, Russia has given no indication that it will agree to any kind of withdrawal from land it has seized.On the ground, two people were killed and six more wounded Friday when a guided aerial bomb hit a busy road and set cars aflame in Ukraine’s second biggest city, Kharkiv, mayor Ihor Terekhov wrote on Telegram.One person was killed and three others were wounded when a guided aerial bomb hit a house in Ukraine’s Zaporizhzhia region, while six people were wounded in a missile strike on the city of Uman, local officials said Friday.Russian drone attacks on the city of Mykolaiv and its suburbs overnight into Friday left part of the city without power. Energy and port infrastructure were damaged by drones in the city of Odesa on the Black Sea.Meanwhile, Ukraine said that it struck a major Russian oil refinery on Thursday using U.K.-supplied Storm Shadow missiles.Ukraine’s General Staff said that its forces hit the Novoshakhtinsk refinery in Russia’s Rostov region.“Multiple explosions were recorded. The target was hit,” it wrote on Telegram.Rostov regional Gov. Yuri Slyusar said that a firefighter was wounded when extinguishing the fire.Ukraine’s long-range drone strikes on Russian refineries aim to deprive Moscow of the oil export revenue it needs to pursue its full-scale invasion. Russia wants to cripple Ukraine’s power grid, seeking to deny civilians access to heat, light and running water in what Ukrainian officials say is an attempt to “weaponize winter.”

    Ukrainian President Volodymyr Zelenskyy said Friday that he will meet with U.S. President Donald Trump in Florida over the weekend.

    Related video above: Ukraine and U.S. discuss peace proposals on Christmas Day amid Russian attacks

    Zelenskyy told journalists that the two leaders will discuss security guarantees for Ukraine during Sunday’s talks and that the 20-point plan under discussion “is about 90% ready.”

    An “economic agreement” also will be discussed, Zelenskyy said, but added that he was unable to confirm “whether anything will be finalized by the end.”

    The Ukrainian side will also raise “territorial issues,” he said. Moscow has insisted that Ukraine relinquish the remaining territory it still holds in the Donbas — an ultimatum that Ukraine has rejected. Russia has captured most of Luhansk and about 70% of Donetsk — the two areas that make up the Donbas.

    Zelenskyy said that Ukraine “would like the Europeans to be involved,” but doubted whether it would be possible at short notice.

    “We must, without doubt, find some format in the near future in which not only Ukraine and the U.S. are present, but Europe is represented as well,” he said.

    The announced meeting is the latest development in an extensive U.S.-led diplomatic push to end the nearly four-year Russia-Ukraine war, but efforts have run into sharply conflicting demands by Moscow and Kyiv.

    Zelenskyy’s comments came after he said Thursday that he had a “good conversation” with U.S. special envoy Steve Witkoff and Jared Kushner, Trump’s son-in-law.

    Kremlin spokesman Dmitry Peskov told reporters Friday that the Kremlin had already been in contact with U.S. representatives since Russian presidential envoy Kirill Dmitriev recently met with U.S. envoys in Florida.

    “It was agreed upon to continue the dialogue,” he said.

    Trump is engaged in a diplomatic push to end Russia’s all-out war, which began on Feb. 24, 2022, but his efforts have run into sharply conflicting demands by Moscow and Kyiv.

    Zelenskyy said Tuesday that he would be willing to withdraw troops from Ukraine’s eastern industrial heartland as part of a plan to end the war if Russia also pulls back and the area becomes a demilitarized zone monitored by international forces.

    Though Russian Foreign Ministry spokeswoman Maria Zakharova said Thursday that there had been “slow but steady progress” in the peace talks, Russia has given no indication that it will agree to any kind of withdrawal from land it has seized.

    On the ground, two people were killed and six more wounded Friday when a guided aerial bomb hit a busy road and set cars aflame in Ukraine’s second biggest city, Kharkiv, mayor Ihor Terekhov wrote on Telegram.

    One person was killed and three others were wounded when a guided aerial bomb hit a house in Ukraine’s Zaporizhzhia region, while six people were wounded in a missile strike on the city of Uman, local officials said Friday.

    Russian drone attacks on the city of Mykolaiv and its suburbs overnight into Friday left part of the city without power. Energy and port infrastructure were damaged by drones in the city of Odesa on the Black Sea.

    Meanwhile, Ukraine said that it struck a major Russian oil refinery on Thursday using U.K.-supplied Storm Shadow missiles.

    Ukraine’s General Staff said that its forces hit the Novoshakhtinsk refinery in Russia’s Rostov region.

    “Multiple explosions were recorded. The target was hit,” it wrote on Telegram.

    Rostov regional Gov. Yuri Slyusar said that a firefighter was wounded when extinguishing the fire.

    Ukraine’s long-range drone strikes on Russian refineries aim to deprive Moscow of the oil export revenue it needs to pursue its full-scale invasion. Russia wants to cripple Ukraine’s power grid, seeking to deny civilians access to heat, light and running water in what Ukrainian officials say is an attempt to “weaponize winter.”

    [ad_2]

    Source link

  • New iPhone scam tricks owners into giving phones away

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Getting a brand-new iPhone should be a moment you enjoy. You open the box. You power it on. Everything feels secure. Unfortunately, scammers know that moment too. 

    Over the past few weeks, we’ve heard from a number of people who received unexpected phone calls shortly after activating a new iPhone. The callers claimed to be from a major carrier. They said a shipping mistake was made. They insisted the phone needed to be returned right away. One message stood out because it shows exactly how convincing and aggressive this scam can be.

    “Somebody called me (the call said it was from Spectrum) and told me they sent the wrong iPhone and needed to replace it. I was to rip off the label on the box, tape it up and set it on my porch steps. FedEx was going to pick it up and they’d put a label on it. And just for my trouble, he’d send me a $100 gift card! However, the guy was just too anxious. He called me again at 7 am to make sure I would follow his instructions. Right after that, I picked up my box on the steps and called Spectrum, who confirmed it was a scam. There are no such things as refurbished i17 phones because they’re brand new. I called the guy back, said a few choice words and hung up on him. Since then, they have called at least twice for the same thing. Spectrum should be warning its customers!”

    — Kris L, Columbus, Montana

    That second early morning call was the giveaway. Pressure is the scammer’s favorite tool.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

    Scammers often strike right after a new iPhone purchase, using urgency and fake carrier calls to catch you off guard before you have time to verify. (Kurt “CyberGuy” Knutsson)

    How the new iPhone replacement scam works

    This scam relies on timing and pressure. First, criminals focus on people who recently bought a new iPhone. That information often comes from data-broker sites, leaked purchase data or marketing lists sold online. Next, scammers spoof a carrier phone number. As a result, the call appears legitimate. They sound confident and informed because they already know the device model you ordered.

    Once the call begins, the story moves quickly. The scammer claims a shipping mistake occurred. Then they insist the phone must be returned right away. To reinforce urgency, they say a courier is already scheduled. If you follow the instructions, you hand over a brand-new iPhone. At that point, the device is gone. The scammer either resells it or strips it for parts. By the time you realize something is wrong, recovery is unlikely.

    Why this scam feels so believable

    This scam copies real customer service processes. Carriers do ship replacement phones. FedEx does handle returns. Gift cards are often used as apologies. Scammers blend those facts together and add urgency. They count on you acting before you verify. They also rely on one risky assumption, that a phone call that looks real must be real.

    REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

    iphone

    By spoofing trusted phone numbers and knowing details about your device, criminals make these calls feel real enough to push you into acting fast. (Kurt “CyberGuy” Knutsson)

    Red flags that give this scam away

    Once you know what to watch for, the warning signs are clear.

    • Unsolicited calls about returns you did not request

    • Pressure to act fast

    • Instructions to leave a phone outside

    • Promises of gift cards for cooperation

    • Follow-up calls to rush you

    Legitimate carriers do not handle returns this way.

    THE FAKE REFUND SCAM: WHY SCAMMERS LOVE HOLIDAY SHOPPERS

    Woman on her phone while sitting down.

    Once a phone is handed over, it is usually resold or stripped for parts, leaving victims with no device and little chance of recovery. (Kurt “CyberGuy” Knutsson)

    Ways to stay safe from iPhone return scams

    Protecting yourself starts with slowing things down. Scammers rely on speed and confusion. You win by pausing and verifying.

    1) Never return a device based on a phone call alone

    Hang up and contact the carrier using the number on your bill or the official website. If the issue is real, they will confirm it.

    2) Do not leave electronics outside for pickup

    Legitimate returns use tracked shipping labels tied to your account. Carriers do not ask you to leave phones on porches or doorsteps.

    3) Be skeptical of urgency

    Scammers rush you on purpose. Pressure shuts down careful thinking. Any demand for immediate action should raise concern.

    4) Use a data removal service

    Scammers often know what phone you bought because your personal data is widely available online. Data removal services help reduce your exposure by removing your information from data broker sites that criminals rely on. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Install strong antivirus software

    Strong antivirus software adds another layer of protection. Many antivirus tools help block scam calls, warn about phishing links and alert you to suspicious activity before damage is done.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android, & iOS devices at Cyberguy.com.

    6) Save messages and call details

    Keep voicemails, phone numbers and timestamps. This information helps carriers warn other customers and spot repeat scams.

    7) Share this scam with others

    Criminals reuse the same script again and again. A quick warning to friends or family could stop the next victim.

    Kurt’s key takeaways

    Scams aimed at new iPhone owners are getting more targeted and more aggressive. Criminals are timing their calls carefully and copying real carrier language. The simplest defense still works best. Verify before you act. If a call pressures you to rush or hand over a device, pause and contact the company directly. That one step can save you hundreds of dollars and a major headache.

    If a carrier called you tomorrow claiming a mistake with your new phone, would you verify first or would urgency take over? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Amazon adds controversial AI facial recognition to Ring

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Amazon’s Ring video doorbells are getting a major artificial intelligence (AI) upgrade, and it is already stirring controversy.

    The company has started rolling out a new feature called Familiar Faces to Ring owners across the United States. Once enabled, the feature uses AI-powered facial recognition to identify people who regularly appear at your door. Instead of a generic alert saying a person is at your door, you might see something far more personal, like “Mom at Front Door.” On the surface, that sounds convenient.

    Privacy advocates, however, say this shift comes with real risks.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    GOOGLE NEST STILL SENDS DATA AFTER REMOTE CONTROL CUTOFF, RESEARCHER FINDS

    Ring’s new Familiar Faces feature uses AI facial recognition to identify people who regularly appear at your door and personalize alerts. (Chip Somodevilla/Getty Images)

    How Ring’s Familiar Faces feature works

    Ring says Familiar Faces helps you manage alerts by recognizing people you know. Here is how it works in practice. You can create a catalog of up to 50 faces. These may include family members, friends, neighbors, delivery drivers, household staff or other frequent visitors. After labeling a face in the Ring app, the camera will recognize that person as they approach. Anyone who regularly passes in front of your Ring camera can be labeled by the device owner if they choose to do so, even if that person is unaware they are being identified.

    From there, Ring sends personalized notifications tied to that face. You can also fine-tune alerts on a per-face basis, which means fewer pings for your own comings and goings. Importantly, the feature is not enabled by default. You must turn it on manually in the Ring app settings. Faces can be named directly from Event History or from the Familiar Faces library. You can edit names, merge duplicates or delete faces at any time.

    Amazon says unnamed faces are automatically removed after 30 days. Once a face is labeled, however, that data remains stored until the user deletes it.

    Why privacy groups are pushing back

    Despite Amazon’s assurances, consumer protection groups and lawmakers are raising alarms. Ring has a long history of working with law enforcement. In the past, police and fire departments were able to request footage through the Ring Neighbors app. More recently, Amazon partnered with Flock, a company that makes AI-powered surveillance cameras widely used by police and federal agencies. Ring has also struggled with internal security. In 2023, the FTC fined Ring $5.8 million after finding that employees and contractors had unrestricted access to customer videos for years. The Neighbors app previously exposed precise home locations, and Ring account credentials have repeatedly surfaced online. Because of these issues, critics argue that adding facial recognition expands the risk rather than reducing it.

    Electronic Frontier Foundation (EFF) staff attorney Mario Trujillo tells CyberGuy, “When you step in front of one of these cameras, your faceprint is taken and stored on Amazon’s servers, whether you consent or not. Today’s feature to recognize your friend at your front door can easily be repurposed tomorrow for mass surveillance. It is important for state regulators to investigate.” The Electronic Frontier Foundation is a well-known nonprofit organization that focuses on digital privacy, civil liberties and consumer rights in the tech space. 

    WASHINGTON COURT SAYS FLOCK CAMERA IMAGES ARE PUBLIC RECORDS

    Photo of a mounted ring camera.

    Once a face is labeled by the device owner, Ring can replace generic notifications with named alerts tied to that individual. (CyberGuy.com)

    Where the feature is blocked and why that matters

    Legal pressure is already limiting where Familiar Faces can launch. According to the EFF, privacy laws are preventing Amazon from offering the feature in Illinois, Texas and Portland, Oregon. These jurisdictions have stricter biometric privacy protections, which suggests regulators see facial recognition in the home as a higher-risk technology. U.S. Senator Ed Markey has also called on Amazon to abandon the feature altogether, citing concerns about surveillance creep and biometric data misuse.

    Amazon says biometric data is processed in the cloud and not used to train AI models. The company also claims it cannot identify all locations where a face appears, even if law enforcement asks. Still, critics point out the similarity to Ring’s Search Party feature, which already scans neighborhoods to locate lost pets.

    We reached out to Amazon for comment but did not receive a response before our deadline.

    Ring’s other AI feature feels very different

    Not all of Ring’s AI updates raise the same level of concern. Ring recently introduced Video Descriptions, a generative AI feature that summarizes motion activity in plain text. Instead of guessing what triggered an alert, you might see messages like “A person is walking up the steps with a black dog” or “Two people are peering into a white car in the driveway.”

    HOW RESTAURANT RESERVATION PLATFORM OPENTABLE TRACKS CUSTOMER DINING HABITS

    A Ring doorbell alert with two people getting out of a car

    Ring’s Video Descriptions feature takes a different approach by summarizing activity without identifying people by name. (Amazon)

    How Video Descriptions decides what matters

    This AI focuses on actions rather than identities. It helps you quickly decide whether an alert is urgent or routine. Over time, Ring says the system can recognize activity patterns around a home and only notify you when something unusual happens. However, as with any AI system, accuracy can vary depending on lighting, camera angle, distance and environmental conditions. Video Descriptions is currently rolling out in beta to Ring Home Premium subscribers in the U.S. and Canada. Unlike facial recognition, this feature improves clarity without naming or tracking specific people. That contrast matters.

    Ring doorbell notifications on an iPhone screen

    Video Descriptions turns motion alerts into short summaries, helping you understand what is happening without identifying who is involved. (Amazon)

    Should you turn Familiar Faces on?

    If you own a Ring doorbell, caution is wise. While Familiar Faces may reduce notification fatigue, labeling people by name creates a detailed record of who comes to your home and when. Given Ring’s past security lapses and close ties with law enforcement, many privacy experts recommend keeping the feature disabled. If you do use it, avoid full names and remove faces you no longer need. In many cases, simply checking the live video feed is safer than relying on AI labels. Not every smart home feature needs to know who someone is.

    How to turn Familiar Faces on or off in the Ring app

    If you want to review or change this setting, you can do so at any time in the Ring mobile app.

    To enable Familiar Faces:

    • Open the Ring app
    • Tap the menu icon
    • Select Control Center
    • Tap Video and Snapshot Capture
    • Select Familiar Faces
    • Toggle the feature on and follow the on-screen prompts

    To turn Familiar Faces off:

    • Open the Ring app
    • Go to Control Center
    • Tap Video and Snapshot Capture
    • Select Familiar Faces
    • Toggle the feature off

    Turning the feature off stops facial recognition and prevents new faces from being identified. Any labeled faces can also be deleted manually from the Familiar Faces library if you want to remove stored data.

    Alexa is now answering your door for you

    Amazon is also rolling out a very different kind of AI feature for Ring doorbells, and it lives inside Alexa+. Called Greetings, this update gives Ring doorbells a conversational AI voice that can interact with people at your door when you are busy or not home. Instead of identifying who someone is, Greetings focuses on what they appear to be doing. Using Ring’s video descriptions, the system looks at apparel, actions, and objects to decide how to respond. 

    For example, if someone in a delivery uniform drops off a package, Alexa can tell them exactly where to leave it based on your instructions. You can even set preferences to guide delivery drivers toward a specific spot, or let them know water or snacks are available. If a delivery requires a signature, Alexa can ask the driver when they plan to return and pass that message along to you. The feature can also handle sales representatives or service vendors. You might set a rule such as politely declining sales pitches without ever coming to the door yourself.

    Greetings can also work for friends and family. If someone stops by while you are away, Alexa can greet them and ask them to leave a message for you. That interaction is saved so you can review it later. That said, the system is not perfect. Because it relies on visual context rather than identity, mistakes can happen. A friend who works in logistics could show up wearing a delivery uniform and be treated like a courier instead of being invited to leave a message. Amazon acknowledges that accuracy can vary. Importantly, Amazon says Greetings does not identify who a person is. It uses Ring’s video descriptions to determine the main subject in front of the camera and generate responses, without naming or recognizing individuals. That makes it fundamentally different from the Familiar Faces feature, even though both rely on AI.

    Greetings is compatible with Ring Wired Doorbell Pro (3rd Gen) and Ring Wired Doorbell Plus (2nd Gen). It is available to Ring Premium Plan subscribers who have video descriptions enabled and is currently rolling out to Alexa+ Early Access users in the United States and Canada.

    Thinking about a Ring doorbell?

    If you are already in the Ring ecosystem or considering a video doorbell, Ring’s lineup includes models with motion alerts, HD video, night vision, and optional AI-powered features such as Video Descriptions. While Familiar Faces remains controversial and can be turned off, many homeowners still use Ring doorbells for basic security awareness and package monitoring. 

    If you decide Ring is right for your home, you can check out the latest Ring Video Doorbell models or compare features and pricing with other options by visiting Cyberguy.com and searching “Top Video Doorbells.”

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Amazon Ring’s AI facial recognition feature shows how quickly convenience can collide with privacy. Familiar Faces may offer smarter alerts, but it also expands surveillance into deeply personal spaces. Meanwhile, features like Video Descriptions prove that AI can be useful without identifying people. As smart home tech evolves, the real question is not what AI can do but what it should do.

    Would you trade fewer notifications for a system that recognizes and names everyone who comes to your door? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • Trump-backed Nasry Asfura wins presidential elections in Honduras

    [ad_1]

    Tegucigalpa [Honduras], December 25 (ANI): Nasry Asfura, a conservative candidate, has won the presidential elections in Honduras, the country’s election council said, as reported by Al Jazeera.

    According to the Consejo Nacional Electoral, the electoral authority in the North American country, Asfura won 40.3 per cent of the vote in the closely contested polls, defeating centre-right Liberal Party candidate Salvador Nasralla, who received 39.5 per cent of the votes.

    According to Al Jazeera, Asfura was backed by United States President Donald Trump.

    In a social media post, Asfura said, ‘Honduras: I am prepared to govern. I will not fail you.’

    Donald Trump had supported Asfura, attacking Nasralla and left-wing candidate Rixi Moncada, who ended up winning 20 per cent of the votes.

    US Secretary of State Marco Rubio congratulated Nasry Asfura, saying that Washington DC is looking forward to working with him.

    ‘The people of Honduras have spoken: Nasry Asfura is Honduras’ next president. The United States congratulates President-Elect @titoasfura @papialaordenh and looks forward to working with his administration to advance prosperity and security in our hemisphere,’ Rubio said on X.

    In a separate statement, Rubio urged ‘all parties to respect the confirmed results’ of the elections.

    ‘The United States congratulates President-Elect Nasry Asfura of Honduras on his clear electoral victory, confirmed by Honduras’ National Electoral Council. We look forward to working with his incoming administration to advance our bilateral and regional security cooperation, end illegal immigration to the United States, and strengthen the economic ties between our two countries. The United States urges all parties to respect the confirmed results so that Honduran authorities may swiftly ensure a peaceful transition of authority to President-Elect Nasry Asfura,’ Rubio said.

    Deputy Secretary Christopher Landau also posted on X, ‘Congratulations to President-elect Nasry ‘Tito’ Asfura @titoasfura and the great people of Honduras on a successful and hard-fought election. The US looks forward to working closely with the new Asfura Administration.’

    Earlier this month, Trump had also pardoned former Honduran President and a member of Asfura’s National Party, Juan Orlando Hernandez, who was serving a sentence in the US in a drug trafficking case, Al Jazeera reported. (ANI)

    [ad_2]

    Source link