ReportWire

Tag: Security

  • How to stop Google AI from scanning your Gmail

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Google shared a new update on Nov. 5, confirming that Gemini Deep Research can now use context from your Gmail, Drive and Chat. This allows the AI to pull information from your messages, attachments and stored files to support your research.

    Some people view this as a convenience. They like the idea of faster answers and easier searches. If you feel that way, too, that is completely fine.

    However, many people do not want AI scanning private messages or personal documents. If that sounds like you, there is good news. You can turn these features off with a few quick taps in Gmail.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    GOOGLE ISSUES WARNING ON FAKE VPN APPS

    Google’s new update allows Gemini to scan Gmail. These steps help you take control of your privacy. (Kurt “CyberGuy” Knutsson)

    Why this update matters

    This feature gives Google permission to scan every email in your Gmail account. That includes personal notes, financial documents, tax files and any sensitive information in your inbox. AI looks for patterns to improve responses, but Google says Gmail content is not used to train the Gemini model and that no user settings were changed automatically.  

    Google also says that Gmail, Docs and Sheets are not used for AI training unless you directly give Gemini that content yourself.

    While Google says the feature improves your experience, some users prefer more control. You may want privacy first and convenience second. If so, you can opt out today.

    GOOGLE CHROME AUTOFILL NOW HANDLES IDS

    How to stop AI from scanning your Gmail

    You can turn this off directly in Gmail settings. Follow these steps:

    Google homepage

    Open Gmail to start the process of turning off AI features. (Kurt “CyberGuy” Knutsson)

    • Tap the gear icon in the top right
    A screenshot of Google's account settings.

    Tap the gear icon to access your main Gmail settings. (Kurt “CyberGuy” Knutsson)

    A screenshot of Google's account settings.

    Select See all settings to reach the full menu. (Kurt “CyberGuy” Knutsson)

    • Scroll until you find Smart Features
    • Turn off Smart features by clicking it off.
    A screenshot of Google's account settings.

    Scroll until you find Smart features and personalization.  (Kurt “CyberGuy” Knutsson)

    • It will ask you to click “Turn off and reload.” 
    A screenshot of Google's account settings.

    Turn off Smart features to reduce scanning across your inbox. (Kurt “CyberGuy” Knutsson)

    • Now, scroll to Google Workspace smart features and click “Manage Workspace smart feature settings.”
    A screenshot of Google's account settings.

    Go to Google Workspace smart features for the next control. (Kurt “CyberGuy” Knutsson)

    • Turn off both checkboxes and then click Save. 
    A screenshot of Google's account settings.

    Turn off both checkboxes to stop extra data scanning. (Kurt “CyberGuy” Knutsson)

    • A pop-up will appear in the bottom left-hand corner of the screen that says “Your preferences have been saved.” 
    A screenshot of Google's account settings.

    Watch for the confirmation pop up that tells you the changes are active. (Kurt “CyberGuy” Knutsson)

    Once you switch these off, Gmail stops scanning your messages for smart features or AI enhancements. This returns control to you.

    What happens when you turn it off

    After you disable these settings, features like smart email suggestions may stop working. That includes predictive text, automatic bill reminders and quick booking prompts. You can always turn them back on if you change your mind.

    Turning these off does not break Gmail. Your inbox works the same. You simply gain more privacy while you use it.

    Want a more private inbox?

    If you’d rather keep your email fully separate from AI features, you may want to consider a privacy-focused email service. They don’t scan your messages or use your inbox to train any systems. Everything stays private and encrypted.

    For people who want more control over their digital privacy, these private and secure email providers offer a straightforward way to keep email activity protected. They give you peace of mind knowing your messages aren’t being analyzed in the background.

    For recommendations on private and secure email providers, visit Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Google’s newest update blends convenience with automation. It can simplify research by tapping into your Gmail, Drive and Chat. Still, many people want a clear boundary between AI tools and personal messages. With a few quick steps, you can keep your inbox private without losing access to core Gmail features. Just keep in mind: Google says Gmail content isn’t used to train Gemini unless you explicitly give that content to the AI.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Do you think AI tools should have access to your messages by default or should companies ask before scanning anything? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved. 

    [ad_2]

    Source link

  • Google issues warning on fake VPN apps

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Google is sounding the alarm for Android users after uncovering a wave of fake VPN apps that sneak malware onto phones and tablets. These dangerous apps pose as privacy tools but hide info stealers, banking trojans and remote access malware designed to loot personal data.

    More people are relying on VPNs to protect their privacy, secure home networks and shield personal information while using public Wi-Fi. Attackers know this demand is growing. They use it to lure users into downloading convincing VPN lookalikes that contain hidden malware.

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    Fake VPN apps are spreading across Android devices by posing as trusted privacy tools. (iStock)

    How fake VPN apps lure users

    Cybercriminals create malicious VPN apps that impersonate trusted brands. They use sexually suggestive ads, geopolitical headlines or fake privacy claims to push people into quick downloads. Google says many of these campaigns run across app stores and shady websites.

    DELETE THE FAKE VPN APP STEALING ANDROID USERS’ MONEY

    Once installed, these apps inject malware that steals passwords, messages and financial details. Attackers can hijack accounts, drain bank balances or lock devices with ransomware. Some campaigns even use professional ad creatives and influencer-style promotions to appear legitimate.

    Scammers now use AI tools to design ads, phishing pages and fake brands with alarming speed. This gives them the power to reach large groups of victims with very little effort.

    Why malicious VPN apps are spreading

    Fake VPN apps remain one of the most effective tools for attackers. These apps request sensitive permissions and often run silently in the background. Once active, they can collect browsing data, cryptocurrency wallet details or private messages.

    According to Google, the most dangerous apps pretend to be known enterprise VPNs or premium privacy tools. Many promote themselves through adult ads, push notifications and cloned social media accounts.

    How to recognize a genuine VPN app

    Google recommends installing VPN services only from trusted sources. In Google Play, legitimate VPNs include a verified VPN badge to show that the app passed an authenticity check.

    A real VPN will never ask for access to your contacts, photos or private messages. It will not ask you to sideload updates or follow outside links for installation.

    Be careful with free VPN claims. Many free privacy tools rely on excessive data collection or hide malware inside downloadable files.

    Ways to stay safe from fake VPN apps

    Staying ahead of these fake VPN scams starts with a few smart habits that make your device much harder for attackers to target.

    1) Download only from official app stores

    Stick to the Google Play Store. Avoid links from ads, pop-ups or messages that try to rush you. Many fake VPN campaigns depend on off-platform downloads because they cannot pass the Play Store security checks.

    2) Look for the VPN badge in Google Play

    Google now includes a special VPN badge that verifies an app has passed an authenticity review. This badge confirms that the developer followed strict guidelines and that the app went through additional screening.

    If you want a reliable VPN that has already been vetted for security and performance, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Use a data removal service

    Malicious VPN apps often target information already floating around the web, including your email, phone number and personal details exposed through data brokers. A trusted data removal service can help pull your information from people-search sites and broker databases, which reduces the amount of data scammers can use against you. This limits the damage if a fake VPN app steals your info or if attackers try to match stolen data with public records to build convincing scams.

    CAN YOU BE TRACKED WHEN USING A VPN?

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Sad elderly woman sit on sofa hold smartphone feels disappointed by received sms bad news, awful message, difficulties with modern device usage, unpleasant notification, stressed older person concept

    Once installed, these lookalike VPN apps steal passwords, messages and financial details. (iStock)

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Turn on Google Play Protect and use a strong antivirus software

    Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all emerging malware from Android devices. 

    Settings may vary depending on your Android phone’s manufacturer 

    How to turn it on: Open Google Play Store → Tap your profile icon → Select Play Protect → Tap Settings → Turn on Scan apps with Play Protect → Turn on Improve harmful app detection.

    While Google Play Protect offers a helpful first layer of defense, it is not a full antivirus. A strong antivirus software adds another layer of protection. It can block malicious downloads, detect hidden malware and warn you when an app acts in unusual ways. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    5) Review app permissions carefully

    A genuine VPN only needs network-related permissions. If a VPN asks for access to photos, contacts or messages, treat it as a major warning sign. Restrict permissions when possible.

    6) Avoid sideloading apps from unknown sources

    Sideloaded apps bypass Google’s security filters. Attackers often hide malware inside APK files or update prompts that promise extra features. If you’re unfamiliar with the term, sideloading means installing apps outside the Google Play Store, usually by downloading a file from a website, email or message. These apps never go through Google’s safety checks, which makes them far riskier to install.

    7) Watch for aggressive ads and scare tactics

    Fake VPN ads often claim your device is already infected or that your connection is not secure. Real privacy apps do not use panic-based marketing.

    8) Research the developer before downloading

    Look up the developer’s website and reviews. A legitimate VPN provider will have a clear privacy policy, customer support and a consistent history of app updates.

    9) Be skeptical of anything labeled free

    Free VPNs often rely on risky data practices or hide malware. If a service promises premium features at no cost, question how it pays its bills.

    DO YOU NEED A VPN AT HOME? HERE ARE 10 REASONS YOU DO

    10) Avoid recovery scams after an attack

    If someone contacts you claiming they can recover stolen money, cut contact. Real agencies never demand upfront fees and never request remote access to your device.

    11) Keep your device updated

    Install security patches as soon as they appear. Updates protect your phone from malware strains that rely on old software vulnerabilities.

    A woman looking at a VPN on a smartphone

    Scammers now use AI-generated ads and fake brands to trick you into quick downloads. (Kurt “CyberGuy” Knutsson)

    Kurt’s key takeaways

    Fake VPN apps are becoming a major threat to Android users as scammers exploit the rising demand for privacy tools and home network security. Attackers hide behind familiar logos, aggressive ads and AI-powered campaigns to push apps that steal data the moment you install them. Staying safe requires careful downloading habits, attention to permissions and a healthy amount of skepticism toward anything that claims instant privacy or premium features for free.

    Do you think Google should do more to block fake VPN apps in the Play Store? Let us know by writing to us at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • US Border Patrol Is Spying on Millions of American Drivers

    [ad_1]

    Eight years after a researcher warned WhatsApp that it was possible to extract user phone numbers en masse from the Meta-owned app, another team of researchers found that they could still do exactly that using a similar technique. The issue stems from WhatsApp’s discovery feature, which allows someone to enter a person’s phone number to see if they’re on the app. By doing this billions of times—which WhatsApp did not prevent—researchers from the University of Vienna uncovered what they’re calling “the most extensive exposure of phone numbers” ever.

    Vaping is a major problem in US high schools. But is the solution to spy on students in the bathroom? An investigation by The 74, copublished with WIRED, found that schools around the country are turning to vape detectors in an effort to crack down on nicotine and cannabis consumption on school grounds. Some of the vape detectors go far beyond detecting vapor by including microphones that are surprisingly accurate and revealing. While few defend addiction and drug use, even non-vapers say the added surveillance and the punishments that result go too far.

    Don’t look now, but that old networking equipment your company hasn’t thought about in years may jump out and bite you. Tech giant Cisco this week launched a new initiative, warning companies that AI tools are making it increasingly simple for attackers to find vulnerabilities in outdated and unpatched networking infrastructure. The message: Upgrade or else.

    If you’ve ever attended a conference, you probably worried about getting sick in the cesspools that are a conference center. But one hacker conference in New Zealand, Kawaiicon, invented a novel way to keep attendees a little bit safer. By tracking the CO2 levels in each conference room, Kawaiicon’s organizers were able to create a real-time air-quality monitoring system, which would tell people which rooms were safe and which seemed … gross. The project brings new meaning to antivirus monitoring.

    And that’s not all. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    The US Border Patrol is operating a predictive-intelligence program that monitors millions of American drivers far beyond the border, according to a detailed investigation by the Associated Press. A network of covert license-plate readers—often hidden inside traffic cones, barrels, and roadside equipment—feeds data into an algorithm that flags “suspicious” routes, quick turnarounds, and travel to and from border regions. Local police are then alerted, resulting in traffic stops for minor infractions like window-tint violations, air fresheners, or marginal speeding. AP reviewed police records showing that drivers were questioned, searched, and sometimes arrested despite no contraband being found.

    Internal group chats obtained through public-records requests show Border Patrol agents and Texas deputies sharing hotel records, rental car status, home addresses, and social media details of US citizens in real time while coordinating what officers call “whisper stops” to obscure federal involvement. The AP identified plate-reader sites more than 120 miles from the Mexican border in the Phoenix area, as well as locations in metropolitan Detroit and near the Michigan-Indiana line that capture traffic headed toward Chicago and Gary. Border Patrol also taps DEA plate-reader networks and has, at various times, accessed systems run by Rekor, Vigilant Solutions, and Flock Safety.

    CBP says the program is governed by “stringent” policies and constitutional safeguards, but legal experts told AP that its scale raises new Fourth Amendment concerns. A UC Law San Francisco official said the system amounts to a “dragnet” tracking Americans’ movements, associations, and daily routines.

    Microsoft claims to have mitigated the largest distributed denial-of-service (DDoS) attack ever recorded in a cloud environment—a 15.72 Tbps, 3.64-billion-pps barrage launched on October 24 against a single Azure endpoint in Australia. Microsoft says The attack “originated from the Aisuru botnet,” a Turbo-Mirai–class IoT network of compromised home routers, cameras, and other consumer devices. More than 500,000 IP addresses are said to have participated, generating a massive DDoS attack with little spoofing. Microsoft says its global Azure DDoS Protection network absorbed the traffic without service disruption. Microsoft described the attack as the “the largest DDoS ever observed in the cloud,” emphasizing the single endpoint; however, Cloudflare also recently reported a 22.2 Tbps flood, naming it the largest DDoS attack ever seen.

    Researchers note that Aisuru has recently launched multiple attacks exceeding 20 Tbps and is expanding its capabilities to include credential stuffing, AI-driven scraping, and HTTPS floods via residential proxies.

    The US Securities and Exchange Commission has dropped its remaining claims against SolarWinds and its CISO, Tim Brown, ending a long-running case over the company’s 2020 supply-chain hack, in which Russian SVR operatives allegedly compromised SolarWinds’ Orion software and triggered widespread breaches across government and industry. The agency’s lawsuit—filed in 2023 and centered on alleged fraud and internal-control failures—had already been mostly dismantled by a federal judge in 2024. SolarWinds called the full dismissal a vindication of its argument that its disclosures and conduct were appropriate and said it hopes the outcome eases concerns among CISOs about the case’s potential chilling effect.

    Law enforcement records show that the FBI accessed messages from a private Signal group used by New York immigration court-watch activists—a network that coordinates volunteers monitoring public hearings at three federal immigration courts. According to a two-page FBI/NYPD “joint situational information report” dated August 28, 2025, agents quoted chat messages, labeled the nonviolent court watchers as “anarchist violent extremist actors,” and circulated the assessment nationwide. The report did not explain how the FBI penetrated an encrypted Signal group, but it claimed the information came from a “sensitive source with excellent access.”

    The documents, first reported by the Guardian, were original obtained by the government-transparency group Property of the People. They describe activists discussing how to enter courtrooms, film officers, and gather identifying details of federal personnel, but provide no evidence to support the FBI’s allegation that a member previously advocated violence. A separate set of records—also obtained by the group—shows the bureau framed ordinary observation of public immigration hearings as a potential threat, even as Immigration and Customs Enforcement has escalated courthouse arrests and set what advocates call “deportation traps.” Civil liberties experts told the paper that the surveillance mirrors earlier FBI campaigns targeting lawful dissent and risks chilling protected political activity.

    [ad_2]

    Dell Cameron, Andrew Couts

    Source link

  • ‘I was in a headlock’: 14-year-old boy recovering after violent attack at Pleasant Grove High School

    [ad_1]

    A violent attack at Pleasant Grove High School in Elk Grove sent a 14-year-old boy to the hospital after he was assaulted by a group of students, resulting in the arrest of four students. Hunter, who didn’t want to share his last name, said that it all started over a girl he used to date, who he said then dated one of the alleged attackers. “I just got out of class and then I just see that group of kids coming towards me,” Hunter said. He described how one of the students approached him while yelling and punched him. He said as he took off his backpack and tried to defend himself, three other students joined in the attack. “More kids started going in and I was in a headlock. And then, I got thrown to the floor and, like, this kid is like, three times my size, and he’s like sitting on me, throwing punches at me and then another kid joins in, kicks me and starts hitting me,” he said.Screenshots from a video sent to Hunter’s father by the Elk Grove Police Department show the fight ending with Hunter face down on the ground as a teacher intervened. “I literally got full-on stomped into concrete like face down,” Hunter said. “I’m just laying on the floor. I’m not even fighting back.”The four students involved, all 14 years old, were arrested on assault charges and taken to juvenile hall, according to the Elk Grove Police Department. Hunter was taken to the hospital following the attack, where he was treated for his injuries, including a concussion. “He told me he’s like, ‘Dad I could have been killed. I could be paralyzed. I couldn’t play football anymore,’” Sean, Hunter’s father, said. While Hunter is expected to recover, his father said he wished more had been done sooner. “It just blows my mind that where’s security? You know, there’s teachers there,” he said.The school principal sent a message to families on Thursday, stating that school staff and security responded immediately to de-escalate the situation and emphasized that safety is their top priority. “Today, an altercation occurred on campus involving several students. School staff, along with EGUSD Safety and Security, responded immediately to de-escalate the situation and ensure the safety of all students. Due to the nature of the incident, law enforcement was called as a precautionary measure.Thanks to the swift and coordinated actions of our staff, the situation was contained. School administration, law enforcement, and support staff are actively following up with the students involved and have contacted their parents/guardians directly,” the message reads.However, Hunter said he does not feel safe. “I got jumped twice in the same month,” he said. Now, his father is considering pulling him out of Pleasant Grove High School. “What’s going on at the school with social media, the violence, the just the kids getting off on it, like thinking it’s like it’s entertainment at school these days. It’s just, it blows my mind,” he said.Elk Grove Unified School District is investigating the incident.See more coverage of top California stories here | Download our app | Subscribe to our morning newsletter | Find us on YouTube here and subscribe to our channel

    A violent attack at Pleasant Grove High School in Elk Grove sent a 14-year-old boy to the hospital after he was assaulted by a group of students, resulting in the arrest of four students.

    Hunter, who didn’t want to share his last name, said that it all started over a girl he used to date, who he said then dated one of the alleged attackers.

    “I just got out of class and then I just see that group of kids coming towards me,” Hunter said.

    He described how one of the students approached him while yelling and punched him. He said as he took off his backpack and tried to defend himself, three other students joined in the attack.

    “More kids started going in and I was in a headlock. And then, I got thrown to the floor and, like, this kid is like, three times my size, and he’s like sitting on me, throwing punches at me and then another kid joins in, kicks me and starts hitting me,” he said.

    Screenshots from a video sent to Hunter’s father by the Elk Grove Police Department show the fight ending with Hunter face down on the ground as a teacher intervened.

    “I literally got full-on stomped into concrete like face down,” Hunter said. “I’m just laying on the floor. I’m not even fighting back.”

    The four students involved, all 14 years old, were arrested on assault charges and taken to juvenile hall, according to the Elk Grove Police Department.

    Hunter was taken to the hospital following the attack, where he was treated for his injuries, including a concussion.

    “He told me he’s like, ‘Dad I could have been killed. I could be paralyzed. I couldn’t play football anymore,’” Sean, Hunter’s father, said.

    While Hunter is expected to recover, his father said he wished more had been done sooner.

    “It just blows my mind that where’s security? You know, there’s teachers there,” he said.

    The school principal sent a message to families on Thursday, stating that school staff and security responded immediately to de-escalate the situation and emphasized that safety is their top priority.

    “Today, an altercation occurred on campus involving several students. School staff, along with EGUSD Safety and Security, responded immediately to de-escalate the situation and ensure the safety of all students. Due to the nature of the incident, law enforcement was called as a precautionary measure.

    Thanks to the swift and coordinated actions of our staff, the situation was contained. School administration, law enforcement, and support staff are actively following up with the students involved and have contacted their parents/guardians directly,” the message reads.

    However, Hunter said he does not feel safe.

    “I got jumped twice in the same month,” he said.

    Now, his father is considering pulling him out of Pleasant Grove High School.

    “What’s going on at the school with social media, the violence, the just the kids getting off on it, like thinking it’s like it’s entertainment at school these days. It’s just, it blows my mind,” he said.

    Elk Grove Unified School District is investigating the incident.

    See more coverage of top California stories here | Download our app | Subscribe to our morning newsletter | Find us on YouTube here and subscribe to our channel

    [ad_2]

    Source link

  • OpenAI Locks Down San Francisco Offices Following Alleged Threat From Activist

    [ad_1]

    OpenAI employees in San Francisco were told to stay inside the office on Friday afternoon after the company purportedly received a threat from an individual who was previously associated with the Stop AI activist group.

    “Our information indicates that [name] from StopAI has expressed interest in causing physical harm to OpenAI employees,” a member of the internal communications team wrote on Slack. “He has previously been on site at our San Francisco facilities.”

    Just before 11 am, San Francisco police received a 911 call about a man allegedly making threats and intending to harm others at 550 Terry Francois Boulevard, which is near OpenAI’s offices in the Mission Bay neighborhood, according to data tracked by the crime app Citizen. A police scanner recording archived on the app describes the suspect by name and alleges he may have purchased weapons with the intention of targeting additional OpenAI locations.

    Hours before the incident on Friday, the individual who police flagged as allegedly making the threat said he was no longer part of Stop AI in a post on social media.

    WIRED reached out to the man in question but did not immediately receive a response. San Francisco police also did not immediately respond to a request for comment. OpenAI did not provide a statement prior to publication.

    On Slack, the internal communications team provided three images of the man suspected of making the threat. Later, a high-ranking member of the global security team said “At this time, there is no indication of active threat activity, the situation remains ongoing and we’re taking measured precautions as the assessment continues.” Employees were told to remove their badges when exiting the building and to avoid wearing clothing items with the OpenAI logo.

    Over the past couple of years, protestors affiliated with groups calling themselves Stop AI, No AGI, and Pause AI have held demonstrations outside the San Francisco offices of several AI companies, including OpenAI and Anthropic, over concerns that the unfettered development of advanced AI could harm humanity. In February, protestors were arrested for locking the front doors to OpenAI’s Mission Bay office. Earlier this month, StopAI claimed its public defender was the man who jumped onstage to subpoena OpenAI CEO Sam Altman during an onstage interview in San Francisco.

    In a Pause AI press release from last year, the individual who police said was alleged to have made the threat against OpenAI staffers is described as an organizer and quoted as saying that he would find “life not worth living” if AI technologies were to replace humans in making scientific discoveries and taking over jobs. “Pause AI may be viewed as radical amongst AI people and techies,” he said. “But it is not radical amongst the general public, and neither is stopping AGI development altogether.”

    [ad_2]

    Zoë Schiffer, Maxwell Zeff, Paresh Dave

    Source link

  • Fake ChatGPT apps are hijacking your phone without you knowing

    [ad_1]

    NEWYou can now listen to Fox News articles!

    App stores are supposed to be reliable and free of malware or fake apps, but that’s far from the truth. For every legitimate application that solves a real problem, there are dozens of knockoffs waiting to exploit brand recognition and user trust. We’ve seen it happen with games, productivity tools and entertainment apps. Now, artificial intelligence has become the latest battleground for digital impostors.

    The AI boom has created an unprecedented gold rush in mobile app development, and opportunistic actors are cashing in. AI-related mobile apps collectively account for billions of downloads, and that massive user base has attracted a new wave of clones. They pose as popular apps like ChatGPT and DALL·E, but in reality, they conceal sophisticated spyware capable of stealing data and monitoring users.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    OPENAI ACCUSES NY TIMES OF WANTING TO INVADE MILLIONS OF USERS’ PRIVACY IN PAPER’S LAWSUIT AGAINST TECH GIANT

    Fake AI apps pose as trusted tools like ChatGPT and DALL·E while secretly stealing user data. (Kurt “CyberGuy” Knutsson)

    What you need to know about the fake AI apps

    The fake apps flooding app stores exist on a spectrum of harm, and understanding that range is crucial before you download any AI tools. Take the “DALL·E 3 AI Image Generator” found on Aptoide. It presents itself as an OpenAI product, complete with branding that mimics the real thing. When you open it, you see a loading screen that looks like an AI model generating an image. But nothing is actually being generated.

    Network analysis by Appknox showed the app connects only to advertising and analytics services. There’s no AI functionality, just an illusion designed to collect your data for monetization.

    Then there are apps like WhatsApp Plus, which are far more dangerous. Disguised as an upgraded version of Meta’s messenger, this app hides a complete malware framework capable of surveillance, credential theft and persistent background execution. It’s signed with a fake certificate instead of WhatsApp’s legitimate key and uses a tool often used by malware authors to encrypt malicious code.

    Once installed, it silently requests extensive permissions, including access to your contacts, SMS, call logs, device accounts and messages. These permissions allow it to intercept one-time passwords, scrape your address book and impersonate you in chats. Hidden libraries keep the code running even after you close the app. Network logs show it uses domain fronting to disguise its traffic behind Amazon Web Services and Google Cloud endpoints.

    Not every clone is malicious. Some apps identify themselves as unofficial interfaces and connect directly to real APIs. The problem is that you often can’t tell the difference between a harmless wrapper and a malicious impersonator until it’s too late.

    ChatGPT app

    Clones hide spyware that can access messages, passwords and contacts. (Kurt “CyberGuy” Knutsson)

    Users and businesses are equally at risk

    The impact of fake AI apps goes far beyond frustrated users. For enterprises, these clones pose a direct threat to brand reputation, compliance and data security.

    When a malicious app steals credentials while using your brand’s identity, customers don’t just lose data but also lose trust. Research shows customers stop buying from a brand after a major breach. The average cost of a data breach now stands at 4.45 million dollars, according to IBM’s 2025 report. In regulated sectors like finance and healthcare, such breaches can lead to violations of GDPR, HIPAA and PCI-DSS, with fines reaching up to 4% of global turnover.

    A folder labeled "AI" is seen on a smartphone.

    These impostors harm both users and brands, leading to costly data breaches and lost trust. (Kurt “CyberGuy” Knutsson)

    8 steps to protect yourself from fake AI apps

    While the threat landscape continues to evolve, there are practical measures you can take to protect yourself from malicious clones and impersonators.

    1) Install reputable antivirus software

    A quality mobile security solution can detect and block malicious apps before they cause damage. Modern antivirus programs scan apps for suspicious behavior, unauthorized permissions and known malware signatures. This first line of defense is especially important as fake apps become more sophisticated in hiding their true intentions.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Use a password manager

    Apps like WhatsApp Plus specifically target credentials and can intercept passwords typed directly into fake interfaces. A password manager autofills credentials only on legitimate sites and apps, making it significantly harder for impostors to capture your login information through phishing or fake app interfaces.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Consider identity theft protection services

    Given that malicious clones can steal personal information, intercept SMS verification codes and even impersonate users in chats, identity theft protection provides an additional safety net. These services monitor for unauthorized use of your personal information and can alert you if your identity is being misused across various platforms and services.

    Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    PROTECTING KIDS FROM AI CHATBOTS: WHAT THE GUARD ACT MEANS

    4) Enable two-factor authentication everywhere

    While some sophisticated malware can intercept SMS codes, 2FA still adds a critical layer of security. Use authenticator apps rather than SMS when possible, as they’re harder to compromise. Even if a fake app captures your password, 2FA makes it significantly more difficult for attackers to access your accounts.

    5) Keep your device and apps updated

    Security patches often address vulnerabilities that malicious apps exploit. Regular updates to your operating system and legitimate apps ensure you have the latest protections against known threats. Enable automatic updates when possible to stay protected without having to remember manual checks.

    6) Download only from official app stores

    Stick to the Apple App Store and Google Play Store rather than third-party marketplaces. While fake apps can still appear on official platforms, these stores have security review processes and are more responsive to removing malicious applications once they’re identified. Third-party app stores often have minimal or no security vetting.

    7) Verify the developer before downloading

    Check the developer name carefully. Official ChatGPT apps come from OpenAI, not random developers with similar names. Look at the number of downloads, read recent reviews and be suspicious of apps with few ratings or reviews that seem generic. Legitimate AI tools from major companies will have verified developer badges and millions of downloads.

    8) Use a data removal service

    Even if you avoid downloading fake apps, your personal information may already be circulating on data broker sites that scammers rely on. These brokers collect and sell details like your name, phone number, home address and app usage data, information that cybercriminals can use to craft convincing phishing messages or impersonate you.

    A trusted data removal service scans hundreds of broker databases and automatically submits removal requests on your behalf. Regularly removing your data helps reduce your digital footprint, making it harder for malicious actors and fake app networks to target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    The AI boom has driven massive innovation, but it has also opened new attack surfaces built on brand trust. As adoption grows across mobile platforms, enterprises must secure not only their own apps but also track how their brand appears across hundreds of app stores worldwide. In a market where billions of AI app downloads have happened, the clones aren’t coming. They’re already here, hiding behind familiar logos and polished interfaces.

    Have you ever downloaded a fake AI app without realizing it? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Craigslist car report scam targets vehicle sellers

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Selling your car online should be simple. Lately, though, more sellers are running into fake “vehicle report” demands from so-called buyers. The pitch looks routine, yet it leads straight to a payment page on a site you don’t know. 

    We heard from Nick K. of Washington, who spotted the pattern in real time.

    “In trying to sell a car, it has become apparent that there is a scam related to CarFax-type reports,” Nick wrote in an email to us. “The way it works is a guy texts or emails saying they are interested in your car, but they say they must have a car report from a specific service. At first, I thought it was just a way for a guy to sell more reports, but after thinking about it for a while, it seems like it could be a great way to harvest credit card numbers, etc. I have not been a victim of this, but in the course of selling a car recently, I had several instances of this. There are several warning signs: ‘Will you accept cash?’ Questions indicating they have not read the ad. Offering more than the ad asks for. Short nonsensical first contact. These are just the usual signs I am looking for when I am trying to decide if someone responding to a Craigslist or FB ad is legit.”

    Nick’s instincts are spot on. This Craigslist car report scam has been spreading across Craigslist, Facebook Marketplace and other online classifieds.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    CONNECTICUT MAN LOSES LIFE SAVINGS IN CRYPTO SCAM

    Scammers posing as buyers on Craigslist are asking sellers to buy fake “vehicle history reports” from fraudulent sites.  (Kurt “CyberGuy” Knutsson)

    How the Craigslist car report scam works

    This scam often starts with a message that looks completely normal. A supposed buyer texts asking something like, “1985 F150 Available?” and quickly follows up with friendly but vague questions such as, “OK, I’m interested in seeing it. When and where would be good for you?”

    Once you respond, the “buyer” develops just enough rapport to sound legitimate. Then comes the setup. The “buyer” says he is serious about purchasing but wants to see a detailed ASR report first, something most sellers have never heard of.

    That’s exactly what happened to Nick K. After he shared the Craigslist link and vehicle details, the fake buyer sent this reply:

    “Auto Smart Report, here’s the link you can get the papers from. Oh, I forgot to ask for your name? I’m Richard. Will you accept a cash payment? Let me know.”

    It sounds harmless, even reassuring. But the scam hinges on getting you to click that link. The site looks professional, promising a “Complete Vehicle History at Your Fingertips.” Yet once you enter your information, you’re not buying a report; you’re handing over your credit card details and personal data to criminals.

    When the seller, in this case, pushed back, the scammer doubled down with more pressure tactics.

    “If you can show me the Auto Smart Report, that would be great, as it’s the most reliable and complete report. My offer to you is $7,000. I have no issue with that.” Notice the scammer just increased the amount that he is willing to pay for the vehicle by $500.

    They’ll say anything to keep you engaged and make the transaction sound routine. But the moment you pay for the fake report, the buyer disappears. His only goal is to harvest your financial information, not purchase your vehicle.

    INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU

    A fraudulent email exchange

    Behind the friendly text messages, these fake buyers are after your payment info, not your vehicle. (Kurt “CyberGuy” Knutsson)

    Warning signs to watch for

    • Requests for unknown report names like “ASR”
    • Messages that ignore your ad details
    • Offers above your asking price
    • Phrases like “will you accept cash?” or “I just need to see a report first”
    • Demands for a specific site instead of accepting a Carfax, AutoCheck or NMVTIS report
    • Generic greetings like “dear,” “brother” or “friend”

    If you see two or more of these at once, treat the lead as suspicious.

    TOP 5 OVERPAYMENT SCAMS TO AVOID

    A fraudulent email exchange

    These convincing messages often include phrases like “I just need to see an ASR report first” or “will you accept cash?” to appear legitimate. (Kurt “CyberGuy” Knutsson)

    How to stay safe from Craigslist car report scams

    Even the most convincing buyer could turn out to be a scammer, but these smart moves can help you stay safe, protect your money and keep your personal data out of the wrong hands.

    1) Do not click buyer-sent links, and use strong antivirus software

    Avoid clicking any link sent through text, email or messaging apps. These often lead to phishing sites or hidden malware downloads. Keep your devices protected with strong antivirus software. Run regular scans and keep your software updated to block new threats.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Never enter payment info on unfamiliar sites

    If a buyer insists you use a website you’ve never heard of, stop immediately. Always verify a site’s legitimacy before sharing any financial or personal details.

    3) Use a data removal service

    Consider a data removal service to remove your personal details from data broker sites. This limits how easily scammers can find and target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    4) Use trusted report services

    Stick to established names like Carfax, AutoCheck or NMVTIS. These are widely recognized and accepted by real buyers.

    5) Share your VIN in the ad

    Including your vehicle’s VIN lets genuine buyers run their own reports safely without needing your involvement.

    6) Block and report scammers

    Report suspicious messages directly to the platform and to the FTC at reportfraud.ftc.gov. Sharing details helps others stay safe.

    7) If you paid on a fake site

    Contact your bank right away, cancel the card and monitor your account for unauthorized charges. Quick action can prevent further loss.

    8) Meet smart and stay cautious

    When meeting a buyer, choose a public place with security cameras. Bring a friend, keep your phone charged and document all communication.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    This scam works because a vehicle report sounds routine. A fake buyer pushes you to a site you’ve never heard of, then applies pressure to act fast. Slow down, verify and stick to well-known services. Real buyers will accept a report you provide or will run one themselves. You can still sell safely on marketplaces by following a few simple rules. Control the process, choose the report source and avoid links sent by strangers. Thanks to readers like Nick, more sellers can spot the trap before any money or data is at risk.

    Have you seen buyers pushing odd report sites when you sell online? What tipped you off first?  Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Security startup Guardio nabs $80M from ION Crossover Partners | TechCrunch

    [ad_1]

    The Internet today has a new worry. Alongside vibe coding tools, and the codebases, sites and apps built with them, security issues and blind spots have proliferated, too.

    Cybersecurity company Guardio is taking aim at a fresh market born amid this flux: finding malicious code written using AI tools. The company says it has found that with AI tools, malicious actors now find it easier than ever to build scam and phishing sites as well as the infrastructure needed to run them.

    Now, Guardio is leveraging its experience building browser extensions and apps that scan for malicious and phishing sites to build a tool that looks for artifacts in code and websites made with vibe coding tools.

    It’s already found a buyer. Earlier this month, Lovable announced a partnership with Guardio to scan all websites made on its platform and weed out the ones that may pose threats to users. The deal came after a report highlighted that several sites built on Lovable had gaping security holes.

    “Everyone is racing for innovation and market capture. But security is kind of an afterthought. And not many AI tools are partnering with any cybersecurity company to make sure that content generated on their platform is secured and used for good,” Michael Vainshtein, the startup’s CTO, told TechCrunch.

    To fund its expansion, the company has raised $80 million in a new institutional funding round led by ION Crossover Partners. Existing backers Union Tech Ventures, Vintage Investment Partners, and Emerge also invested.

    Image Credits: Guardio

    Guardio, founded in 2018 by Vainshtein, CEO Amos Peled, and chief architect Daniel Sirota, did not disclose its exact valuation, but it did say that it has tripled its valuation since its previous fundraise: a $47 million round led by Tiger Global in 2021. The company, however, said it doesn’t consider itself a unicorn yet.

    Techcrunch event

    San Francisco
    |
    October 13-15, 2026

    Guardio started out as a browser extension that would monitor malicious sites and alert users about data leaks. Since then, it has added phishing protection, and built mobile apps that offer identity management, spam filtering, and scam protection. The company says today it has 500,000 paying users, and claims it reached $100 million in annual recurring revenue this year.

    Guardio is also launching new visibility features to tell users more about what documents they have shared publicly, and if they have any sensitive information, along with notifying you of accounts that don’t have multi-factor authentication. The startup said these features are based on enterprise Data Loss Prevention and SaaS Security Posture Management products.

    “We use so many services, and our data is so fragmented with so many security settings to deal with. We feel every consumer is an enterprise in itself,” Vainshtein said. “While we don’t want them to become security officers of their accounts, we want to offer capabilities of visibility into their accounts that enterprises have.”

    The startup said it is working to let users plug its tool into Outlook and Facebook to surface more details on the security risks users might face in relation to these accounts.

    Peled noted that next year, the startup plans to bring some of the new visibility features to its free subscription plan.

    Gilad Shany, founder and partner at ION Crossover, said that the investment firm had been monitoring the company for years, and even though Guardio was not actively fundraising, ION started a conversation with the company last year.

    “We have been investors in both the cyber and consumer markets, and have had multiple successful IPOs and exits. Guardio is the first company we invest in at the intersection of these two markets – having a team that can lead best-in-class cyber product innovation, while having intimate knowledge about how to scale a direct-to-consumer business,” Shany said.

    [ad_2]

    Ivan Mehta

    Source link

  • Hyundai AutoEver America breached: Know the risks to you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Hyundai AutoEver America discovered on March 1, 2025, that hackers had compromised its systems. Investigators found the intrusion began on February 22 and continued until March 2. 

    Hyundai AutoEver America (HAEA) provides IT services for Hyundai Motor America, including systems that support employee operations and certain connected-vehicle technologies. While the company works across Hyundai’s broader ecosystem, this incident did not involve customer or driver data.

    According to the statement provided to CyberGuy, the breach was limited to employment-related information tied to Hyundai AutoEver America and Hyundai Motor America. The company confirmed that about 2,000 current and former employees were notified of the incident in late October. HAEA said it immediately alerted law enforcement and hired outside cybersecurity experts to assess the damage.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Cybercriminals targeted Hyundai AutoEver America’s systems, exposing sensitive data. (Kurt “CyberGuy” Knutsson)

    Why this Hyundai AutoEver America breach matters

    The exposed data reportedly includes names, Social Security numbers and driver’s license numbers, making this breach far more serious than one involving passwords alone. Experts warn that these details can be used for long-term identity theft and financial fraud. Because Social Security numbers cannot easily be changed, criminals have more time to create fake identities, open fraudulent accounts and launch targeted phishing attacks long after the initial breach.

    A red Hyundai automobile

    Experts warn that stolen Social Security and driver’s license information could be used for identity theft and fraud. (Kurt “CyberGuy” Knutsson)

    Who was affected in the Hyundai AutoEver America data incident

    AEA manages select IT systems tied to Hyundai Motor America’s employee operations, along with broader technology functions for Hyundai and Genesis across North America. Its role includes supporting connected-vehicle infrastructure and dealership systems.

    According to the company, this incident was limited to employment-related data and primarily affected approximately 2,000 current and former employees of Hyundai AutoEver America and Hyundai Motor America. No customer information or Bluelink driver details were exposed. While some filings reference sensitive data types such as Social Security numbers or driver’s license information, the incident did not involve Hyundai customers or the millions of connected vehicles HAEA supports.

    Earlier reports suggested that 2.7 million individuals were affected, but Hyundai says that figure is unrelated to the breach. Instead, 2.7 million is the estimated number of connected vehicles that Hyundai AutoEver America helps support across North America. None of that consumer or vehicle data was accessed.

    GENESIS PREVIEWS G70 SPORTS SEDAN WITH NEW YORK CONCEPT

    Hyundai also clarified that the United States has about 850 Hyundai dealerships and emphasized that the scope of this incident was narrow and contained.

    We reached out to HAEA for a comment, and a representative for the company provided CyberGuy with this statement:

    “Hyundai AutoEver America, an IT vendor that manages certain Hyundai Motor America employee data systems, experienced an incident to that area of business that impacted employment-related data and primarily affected current and former employees of Hyundai AutoEver America and Hyundai Motor America. Approximately 2,000 primarily current and former employees were notified of the incident. The 2.7 million figure that is cited in many media articles has no relation to the actual security incident. The 2.7 million figure represents the alleged total number of connected vehicles that may be supported by Hyundai AutoEver America across North America. No Hyundai consumer data was exposed, and no Hyundai Motor America customer information or Bluelink driver data was compromised.”

    A blue Kia

    Scammers may now pose as company representatives, contacting people to steal more personal details. (Kurt “CyberGuy” Knutsson)

    What you should do right now

    • Monitor your bank, credit card and vehicle-related accounts for suspicious activity.
    • Check for a notification letter from Hyundai AutoEver America or your car brand.
    • Enroll in the two years of complimentary credit monitoring offered by HAEA if you qualify.
    • Enable multi-factor authentication (MFA) on all important accounts, including those tied to your vehicle.
    • Be cautious of emails, texts or calls claiming to be from Hyundai, Kia or Genesis. Always verify through official websites.

    Smart ways to stay safe after the Hyundai AutoEver America breach

    Whether you were directly affected or just want to stay alert, this breach is a reminder of how important it is to protect your personal information. Follow these practical steps to keep your data secure and reduce the risk of identity theft or scams.

    HYUNDAI TO RECALL GENESIS CARS TO FIX BRAKES

    1) Freeze or alert your credit

    Contact major credit bureaus — Experian, TransUnion and Equifax — to set a fraud alert or freeze. This helps block new accounts from being opened in your name.

    2) Protect your vehicle apps

    If you use apps tied to your vehicle, update passwords and enable multi-factor authentication. Avoid saving login details in unsecured places. Also, consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    3) Watch for fake support messages

    Scammers may use news of the Hyundai AutoEver America breach as a way to contact Hyundai, Kia or Genesis owners, pretending to be from customer support or the dealership. They might claim to help verify your account, update your information or fix a security issue. Do not share personal details or click any links. Type the brand’s web address directly into your browser instead of clicking links in messages or emails. Always confirm through the official brand website or by calling the verified customer service number.

    4) Use strong antivirus protection

    Using strong antivirus software helps block phishing links, malware downloads and fake websites that might appear after a data breach. It can also scan your devices for hidden threats that may try to steal login data or personal files.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Use a data removal service

    Data removal tools automatically find and delete your personal information from people-search and data-broker sites. These services reduce the chances that criminals will use leaked data to target you with phishing or social-engineering scams.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Monitor your digital footprint

    Consider using identity monitoring services to track your personal information and detect possible misuse early.

    Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    7) Keep your devices updated

    Regularly install security updates on your phone, laptop and smart car systems to reduce the risk of further attacks.

    8) Report suspicious activity the right way

    If you notice unusual account activity, fraudulent charges, or suspicious messages that appear tied to this breach, report it immediately. Start by contacting your bank or credit card provider to freeze or dispute any unauthorized transactions. Then, file a report with the Federal Trade Commission (FTC) at IdentityTheft.gov, where you can create an official recovery plan. If you suspect a scam message or call, forward phishing emails to reportphishing@apwg.org and report fake texts to 7726 (SPAM).

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    This incident highlights how much personal data is connected to modern cars and how vulnerable those systems can be. When your vehicle is linked to your identity, protecting your data becomes just as important as maintaining the car itself. Stay alert, use the tools available to safeguard your accounts and report any suspicious activity right away.

    Should companies like Hyundai AutoEver be doing more to keep customer data secure? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers

    [ad_1]

    WhatsApp’s mass adoption stems in part from how easy it is to find a new contact on the messaging platform: Add someone’s phone number, and WhatsApp instantly shows whether they’re on the service, and often their profile picture and name, too.

    Repeat that same trick a few billion times with every possible phone number, it turns out, and the same feature can also serve as a convenient way to obtain the cell number of virtually every WhatsApp user on earth—along with, in many cases, profile photos and text that identifies each of those users. The result is a sprawling exposure of personal information for a significant fraction of the world population.

    One group of Austrian researchers have now shown that they were able to use that simple method of checking every possible number in WhatsApp’s contact discovery to extract 3.5 billion users’ phone numbers from the messaging service. For about 57 percent of those users, they also found that they could access their profile photos, and for another 29 percent, the text on their profiles. Despite a previous warning about WhatsApp’s exposure of this data from a different researcher in 2017, they say, the service’s parent company, Meta, still failed to limit the speed or number of contact discovery requests the researchers could make by interacting with WhatsApp’s browser-based app, allowing them to check roughly a hundred million numbers an hour.

    The result would be “the largest data leak in history, had it not been collated as part of a responsibly conducted research study,” as the researchers describe it in a paper documenting their findings.

    “To the best of our knowledge, this marks the most extensive exposure of phone numbers and related user data ever documented,” says Aljosha Judmayer, one of the researchers at the University of Vienna who worked on the study.

    The researchers say they warned Meta about their findings in April and deleted their copy of the 3.5 billion phone numbers. By October, the company had fixed the enumeration problem by enacting a stricter “rate-limiting” measure that prevents the mass-scale contact discovery method the researchers used. But until then, the data exposure could have also been exploited by anyone else using the same scraping technique, adds Max Günther, another researcher from the university who cowrote the paper. “If this could be retrieved by us super easily, others could have also done the same,” he says.

    In a statement to WIRED, Meta thanked the researchers, who reported their discovery through Meta’s “bug bounty” system, and described the exposed data as “basic publicly available information,” since profile photos and text weren’t exposed for users who opted to make it private. “We had already been working on industry-leading anti-scraping systems, and this study was instrumental in stress-testing and confirming the immediate efficacy of these new defenses,” writes Nitin Gupta, vice president of engineering at WhatsApp. Gupta adds, “We have found no evidence of malicious actors abusing this vector. As a reminder, user messages remained private and secure thanks to WhatsApp’s default end-to-end encryption, and no non-public data was accessible to the researchers.”

    [ad_2]

    Andy Greenberg

    Source link

  • Knog Scout Travel Is a High-Tech Way to Track and Secure Luggage

    [ad_1]

    Protect your belongings with Knog’s Scout Travel, the world’s smartest luggage tag. It combines your digital contact information, an accurate luggage finder, and an 85dB motion-sensing alarm to provide unparalleled luggage security. Compatible with iOS, it uses Apple’s Find My tech, alerts the owner if triggered, and easy to use with Knog’s iOS app.

    [ad_2]

    Vic Arkoff

    Source link

  • Knog Scout Travel Is a High-Tech Way to Track and Secure Luggage

    [ad_1]

    Protect your belongings with Knog’s Scout Travel, the world’s smartest luggage tag. It combines your digital contact information, an accurate luggage finder, and an 85dB motion-sensing alarm to provide unparalleled luggage security. Compatible with iOS, it uses Apple’s Find My tech, alerts the owner if triggered, and easy to use with Knog’s iOS app.

    [ad_2]

    Vic Arkoff

    Source link

  • TikTok malware scam tricks you with fake activation guides

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals are again turning TikTok into a trap for unsuspecting users. This time, they’re disguising malicious downloads as free activation guides for popular software like Windows, Microsoft 365, Photoshop and even fake versions of Netflix and Spotify Premium.

    Security expert Xavier Mertens first spotted the campaign, confirming that the same kind of scheme was seen earlier this year. According to BleepingComputer, these fake TikTok videos show short PowerShell commands and instruct viewers to run them as administrators to “activate” or “fix” their programs.

    In reality, those commands connect to a malicious website and pull in malware known as Aura Stealer, which quietly siphons saved passwords, cookies, cryptocurrency wallets and authentication tokens from the victim’s computer.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    3,000+ YOUTUBE VIDEOS DELIVER MALWARE DISGUISED AS FREE SOFTWARE

    Cybercriminals are using fake TikTok videos to trick users into downloading malware disguised as free activation guides. (Kurt “CyberGuy” Knutsson)

    How the TikTok scam works

    This campaign uses what experts call a ClickFix attack. It’s a social engineering trick that makes victims feel they’re following legitimate tech instructions. The instructions seem quick and simple: run one short command and get instant access to premium software.

    But instead of activating anything, the PowerShell command connects to a remote domain named slmgr[.]win, which downloads harmful executables from Cloudflare-hosted pages. The main file, updater.exe, is a variant of the Aura Stealer malware. Once inside the system, it hunts for your credentials and sends them back to the attacker.

    Another file, source.exe, uses Microsoft’s C# compiler to launch code directly in memory, making it even harder to detect. The purpose of this extra payload isn’t fully known yet, but the pattern follows previous malware used for crypto theft and ransomware delivery.

    META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE

    Person holding up their phone and accessing TikTok.

    Those short “activation” commands secretly connect to malicious servers that install info-stealing malware like Aura Stealer. (Kurt “CyberGuy” Knutsson)

    How to stay safe from TikTok malware scams

    Even though these scams look convincing, you can avoid becoming a victim with the right precautions.

    1) Avoid shortcuts

    Never copy or run PowerShell commands from TikTok videos or random websites. If something promises free access to premium software, it’s likely a trap.

    2) Use trusted sources

    Always download or activate software directly from the official website or through legitimate app stores.

    3) Keep security tools updated

    Outdated antivirus or browsers can’t detect the latest threats. Update your software regularly to stay protected.

    4) Use strong antivirus software

    Install strong antivirus software that offers real-time scanning and protection against trojans, info-stealers and phishing attempts.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    5) Sign up for a data removal service

    If your personal data ends up on the dark web, a data removal or monitoring service can alert you and help remove sensitive information.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    6) Reset credentials

    If you’ve ever followed suspicious instructions or entered credentials after watching a “free activation” video, reset all your passwords immediately. 

    7) Reset passwords

    If you’ve ever followed suspicious instructions or entered credentials after watching a “free activation” video, reset all your passwords immediately. Start with your email, financial and social media accounts. Use unique passwords for each site. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    8) Enable multi-factor authentication

    Add an extra layer of security by turning on multi-factor authentication wherever possible. Even if your passwords are stolen, attackers won’t be able to log in without your verification. 

    person looking at apps on phone

    If you’ve followed suspicious steps, change your passwords, enable two-factor authentication and stay alert for future scams. (Getty Images)

    Kurt’s key takeaways

    TikTok’s global reach makes it a prime target for scams like this. What looks like a helpful hack could end up costing your security, your money and your peace of mind. Stay alert, trust only verified sources and remember that there’s no such thing as a free activation shortcut.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Is TikTok doing enough to protect its users from scams like this? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • NordVPN Is Still a Pretty Dang Good VPN

    [ad_1]

    One of my favorite new additions isn’t on the desktop app, though. NordVPN recently introduced scam call protection on Android, with an iOS version planned for the future. I’ve been using it for months, and it has easily flagged more than a hundred spam calls to my phone. It works a treat, even if it’s not one of NordVPN’s big advertised features.

    Almost the Fastest VPN

    NordVPN is fast. It’s not the fastest VPN I’ve tested—that’s Proton VPN—but that’s more of a rounding error than a notable difference in speed. Across five US locations, NordVPN dropped 15.32 percent of my unprotected speed on average. For context, Proton dropped 15.23 percent. Surfshark, which is also owned by Nord Security, dropped 18.84 percent, while Mullvad closed in on 24 percent.

    So, NordVPN is fast, but more importantly, it’s consistent. Across the locations I tested, it never posted a slowdown of more than 20 percent, and in one location (Chicago), it only dropped a meager 6.6 percent of my unprotected speed. Overall, though, that 15 percent drop is a good representation of the speeds you can expect, at least in the US.

    Speed testing with any VPN is tricky. There are a ton of factors that influence speeds beyond the server you’re connecting to. My speed testing—and any VPN speed testing, for that matter—is a snapshot in time. It provides insight into the kind of speeds you can expect on average, not a concrete number you should expect from every server at every time of day. To get the most accurate snapshot possible, I tested across five US locations at three different times of day over the course of a week. Before each test, I ran three passes of my unprotected speed to get an accurate comparison, and I threw out any results with a greater than 10 percent deviation between passes.

    The best way to get around speed hurdles is to change servers, and NordVPN is solid on that front. It has around 7,400 servers, but the exact number is constantly changing. It maintains a database of its servers and locations, complete with details on the features those servers support and whether they’re virtual or physical servers.

    NordVPN lives up to its monumental name. It still has a massive network, fast speeds, and a ton of features, and despite its infamous data breach, it has continued to double down on security measures. The main issue with Nord is the price. You can score a good deal on a two-year discount, but that price jumps up significantly when it comes time to renew. This is why I rank it slightly below Proton VPN, despite the two services going toe-to-toe on features and speeds. Proton Unlimited clocks in at the same monthly price as NordVPN Basic, and it comes with Proton Pass, Proton Mail, and a handful of other apps.

    [ad_2]

    Jacob Roach

    Source link

  • Geek Squad scam email: How to spot and stop it

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You open your inbox and see a message titled “Payment order settled” with an official-looking invoice from Geek Squad. At first glance, it looks legitimate. It includes your email address and even a phone number for help. That is exactly what happened when I received one of these messages this week.

    This new Geek Squad scam email is designed to make you panic, call the fake number and share sensitive information before realizing it is a trap. Before you know it, your curiosity could turn into a costly mistake, so let’s look at the red flags to watch for and how you can protect yourself.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    THE #1 GOOGLE SEARCH SCAM EVERYONE FALLS FOR

    Fake Geek Squad invoice emails are flooding inboxes, seeking to trick recipients into handing over private financial information. (pixelfit/Getty Images)

    Red flags that give the scam away

    When I looked closer, several warning signs stood out:

    • The email said “Dear User” instead of using my name.
    • It also says TO: KAREN HILL, which is obviously not me.
    • The sender’s address was from a Gmail account, not Geek Squad.
    • It listed a phone number urging me to call customer support to cancel the renewal, or my account would be debited.
    • The invoice said $580.57 would be charged for a two-year Geek Squad subscription, even though I never signed up for one.

    These details are meant to create urgency and push you to react before thinking.

    BEWARE OF FAKE CREDIT CARD ACCOUNT RESTRICTION SCAMS

    A fake Geek Squad invoice email

    This fake Geek Squad invoice looks professional, but small red flags, like a generic greeting, expose the scam. (Kurt “CyberGuy” Knutsson)

    How the scam works

    The scam depends on fear and confusion. Once you call the number, the person on the line sounds polite and professional. They might say they need to verify your payment or reverse a charge. In reality, they are trying to get your credit card number or convince you to install software that gives them access to your computer.

    In some cases, they claim to refund too much money by accident and ask you to send part of it back. That is how victims lose hundreds or even thousands of dollars.

    SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

    A woman typing on a computer

    Scammers want you to panic and call their number. Remember, real companies never ask for sensitive details over the phone or email. (Kurt “CyberGuy” Knutsson)

    Why these scam emails look so real

    Scammers have refined their tactics. In this Geek Squad scam email I received, they copied the official logo, used clean layouts and included my actual email address to make it look legitimate. They often get this information from data leaks or security breaches found online.

    Artificial Intelligence (AI) now makes these scams even harder to spot. It helps scammers write natural messages, design fake invoices and create support scripts that sound real. With these tools, they can make almost anyone believe the email is genuine.

    Always pause before reacting. Read carefully, check the sender, and question anything that feels suspicious. If you want to stay one step ahead, here are some other things that can help keep you safe.

    How to stay safe from scam emails

    Scam emails like the fake Geek Squad invoice are becoming more common and more convincing. They use fear and urgency to make you click or call before you think. Protecting yourself means slowing down, verifying every detail and strengthening your digital defenses. Here is how you can stay safe.

    1) Do not call or click anything in the email, and use strong antivirus software

    The phone number or link in the message connects you directly to scammers, so don’t click or call.  Once you engage, they can pressure you into sharing personal details or even install harmful software on your device. The moment I saw that “Payment order settled” email, I realized something was off because I don’t even have a Geek Squad account. That alone was a major red flag. If you ever get a message about a service you never signed up for, delete it right away. Instead of calling the number in the message, go to the official Best Buy or Geek Squad website to confirm if there is a real issue with your account. Also, sign up for strong antivirus software. Antivirus software acts as your digital guard. It scans downloads, detects malicious links and warns you before dangerous sites load. Choose a trusted program that updates automatically and includes email protection features. This extra layer of defense can prevent malware from taking hold if you accidentally click something suspicious.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Check the sender’s email address carefully

    Scammers often use email addresses that look real but have slight differences, such as extra numbers, misspelled words, or unusual domains. A genuine Geek Squad or Best Buy email will come from @bestbuy.com. Always hover over the sender’s name to see the actual address before responding.

    3) Never share personal or payment details with unexpected callers

    If someone contacts you claiming to be from Geek Squad or Best Buy, stay calm and skeptical. Real companies do not ask for banking details, gift card payments, or remote access to your computer over the phone. Hang up and contact the company directly through its verified website or customer service number.

    4) Use a data removal service

    Many scams start with stolen or leaked personal data. A data removal service can help delete your information from data broker sites that sell contact lists to marketers and scammers. Reducing your digital footprint makes it harder for criminals to target you with fake invoices or phishing emails.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Watch your bank and credit card statements

    Even with precautions, it is smart to monitor your accounts. Check your bank and credit card activity weekly for any charges you do not recognize. If you see something suspicious, contact your financial institution right away to report and dispute the charge.

    6) Enable Two-Factor Authentication (2FA)

    Two-factor authentication adds another barrier between you and scammers. Even if someone steals your password, they cannot log in without the secondary code sent to your phone or authentication app. Turn on 2FA for your email, online shopping and banking accounts.

    7) Use strong, unique passwords

    Weak or repeated passwords make you an easy target. Create long, unique passwords for each account. A password manager can securely store them and generate complex combinations that are hard to guess or crack.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    8) Update your software regularly

    Old software is one of the easiest ways for hackers to slip in. Keep your operating system, browser and security programs updated. Turn on automatic updates so you do not have to think about it. These patches often close known security holes that scammers exploit.

    9) Check official accounts before panicking

    Before reacting to any invoice or payment alert, go straight to the official account or service mentioned, such as Geek Squad, PayPal, Amazon or your bank. Log in directly through their website or app to verify the details. If nothing shows up there, the email is a scam. This quick step can save you from a costly mistake.

    10) Report the email as phishing

    Reporting suspicious emails helps stop scammers from targeting others. Most email services, including Gmail, Outlook and Yahoo, allow you to mark messages as phishing. You can also forward the email to reportphishing@apwg.org, which goes to the Anti-Phishing Working Group (APWG), or to abuse@bestbuy.com to alert the proper teams.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Receiving one of these fake invoices can be stressful, but remember that many people get the same message every day. The goal is to recognize the signs, refuse to respond and report them to protect others.

    Have you ever received a convincing scam email like this? How did you handle it? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • A Major Leak Spills a Chinese Hacking Contractor’s Tools and Targets

    [ad_1]

    The United States issued a seizure warrant to Starlink this week related to satellite internet infrastructure used in a scam compound in Myanmar. The action is part of a larger US law enforcement interagency initiative announced this week called the District of Columbia Scam Center Strike Force.

    Meanwhile, Google moved this week to sue 25 people that it alleges are behind a “staggering” and “relentless” scam text operation that uses a notorious phishing-as-a-service platform called Lighthouse.

    WIRED reported this week that the US Department of Homeland Security collected data on Chicago residents accused of gang ties to test if police files could feed an FBI watchlist—and then, crucially, kept the records for months in violation of domestic espionage rules.

    And there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    China’s massive intelligence apparatus has never quite had its Edward Snowden moment. So any peak inside its surveillance and hacking capabilities represents a rare find. One such glimpse has now arrived in the form of about 12,000 documents leaked from the Chinese hacking contractor firm KnownSec, first revealed on the Chinese-language blog Mxrn.net and then picked up by Western news outlets this week. The leak includes hacking tools such as remote-access Trojans, as well as data extraction and analysis programs. More interesting, perhaps, is a target list of more than 80 organizations from which the hackers claim to have stolen information. The listed stolen data, according to Mrxn, includes 95 GB of Indian immigration data, three TB of call records from South Korean telecom operator LG U Plus, and a mention of 459 GB of road-planning data obtained from Taiwan, for instance. If there were any doubts as to whom KnownSec was carrying out this hacking for, the leak also reportedly includes details of its contracts with the Chinese government.

    The cybersecurity community has been warning for years that state-sponsored hackers would soon start using AI tools to supercharge their intrusion campaigns. Now the first known AI-run hacking campaign has surfaced, according to Anthropic, which says it discovered a group of China-backed hackers using its Claude tool set extensively in every step of the hacking spree. According to Anthropic, the hackers used Claude to write malware and extract and analyze stolen data with “minimal human interaction.” Although the hackers bypassed Claude’s guardrails by couching the malicious use of its tools in terms of defensive and whitehat hacking, Anthropic says it nonetheless detected and stopped them. By that time, however, the spy campaign had successfully breached four organizations.

    Even so, fully AI-based hacking still isn’t necessarily ready for prime time, points out Ars Technica. The hackers had a relatively low intrusion rate, given that they targeted 30 organizations, according to Anthropic. The AI startup also notes that the tools hallucinated some stolen data that didn’t exist. For now, state-sponsored spies still have some job security.

    The North Koreans raising money for the regime of Kim Jong Un by getting jobs as remote IT workers with false identities aren’t working alone. Four Americans pleaded guilty this week to letting North Koreans pay to use their identities, as well as receiving and setting up corporate laptops for the North Korean workers to remotely control. Another man, Ukrainian national Oleksandr Didenko, pleaded guilty to stealing the identities of 40 Americans to sell to North Koreans for use in setting up IT worker profiles.

    A report from 404 Media shows that a Customs and Border Protection app that uses face recognition to identify immigrants is being hosted by Google. The app can be used by local law enforcement to determine whether a person is of potential interest to Immigration and Customs Enforcement. While platforming the CBP app, Google has meanwhile recently taken down some apps in the Google Play Store used for community discussion about ICE activity and ICE agent sightings. Google justified these app takedowns as necessary under its terms of service, because the company says that ICE agents are a “vulnerable group.”

    [ad_2]

    Andy Greenberg, Lily Hay Newman

    Source link

  • DOJ Issued Seizure Warrant to Starlink Over Satellite Internet Systems Used at Scam Compound

    [ad_1]

    As scam compounds in Southeast Asia continue to rake in billions of dollars in stolen funds from victims around the world, United States law enforcement aims to cut scammers off at the source by issuing seizure warrants for Starlink satellite internet terminals that provide cybercriminals with connectivity. Two US warrants and affidavits seen by WIRED detail how Starlink devices are allegedly being used by cybercriminals running scam compounds in Myanmar.

    One warrant, issued on Wednesday by US magistrate judge G. Michael Harvey, authorized the seizure of nine Starlink terminals and two Starlink accounts allegedly used in scam compounds in Payathonzu, near Three Pagodas Pass at the Myanmar-Thai border. A linked affidavit, written by FBI investigators, claims that the Starlink devices and accounts played a “substantial role” in an alleged money laundering and wire fraud operation targeting US citizens—saying Starlink parent company SpaceX should “disable service” to the devices. It also claims that at least 26 Starlink dishes appeared to be on the roofs of several buildings making up one scam center of several in the Three Pagodas Pass area.

    The second warrant and affidavit—which was not issued to Starlink but focused on seizing websites used in scamming—also claims that “at least” 79 Starlink dishes appear on the roofs of buildings at the notorious Tai Chang compound in Myanmar, which US officials say is controlled by the Democratic Karen Benevolent Army, an armed group in Myanmar that was sanctioned by the US government this week. The warrant was signed on Monday by US magistrate judge Matthew J. Sharbaugh.

    Both sets of legal documents cite a WIRED investigation from earlier this year, which revealed that scam compounds in Myanmar have been using Starlink for internet access. Starlink, which is owned and operated by Elon Musk’s SpaceX, is a high-speed satellite internet service available in more than 150 countries around the world.

    The action comes as part of a new US law enforcement initiative known as the District of Columbia Scam Center Strike Force that was announced by the Justice Department, FBI, and Secret Service on Wednesday. The effort aims to combat cryptocurrency scams targeting Americans, specifically fraud that originates from an ecosystem of systematized scamming that has evolved in multiple Southeast Asian countries and is often linked to Chinese organized crime. The “Strike Force” is already operational, and the Justice Department says it has seized roughly $400 million in cryptocurrency so far that was stolen in scams.

    “The Department of Justice will not stand by while Chinese organized crime victimizes Americans and bleeds dry the hard-earned investments of American citizens,” Jeanine Pirro, the US attorney for the District of Columbia, said in a press conference. “We have seized websites being used by these compounds in Southeast Asia that are used to victimize Americans. We are seeking warrants to see satellite terminals and accounts being used by the perpetrators to connect to the internet.”

    [ad_2]

    Matt Burgess, Lily Hay Newman

    Source link

  • Building a Trusted Gaming Future: How Security Powers Fair Play – Xbox Wire

    [ad_1]

    With the launch of Call of Duty: Black Ops 7, it’s a timely reminder of the responsibility we share to uphold the integrity of play. We put together this guide on the latest security features and actions players can take to make sure they’re ready to jump into Call of Duty today.  

    We’re focused on creating environments where competition thrives. At the heart of every great game is a simple promise: everyone deserves an equal shot at victory. Cheating breaks that promise, undermining the excitement and integrity of the experience for players and developers alike. Through close collaboration with game developers, anti-cheat technology providers, and players, we’re committed to protecting fair play and ensuring everyone can enjoy a level playing field. 

    Why Security Features Matter for Fair Play 

    Cheat software isn’t like traditional malware that sneaks in unnoticed; it’s installed and run by players who deliberately disable and circumvent built-in protections to gain an unfair edge. That’s why Microsoft’s security features alone can’t stop cheating if someone turns them off. The real value comes when these protections stay enabled by all – they create a trusted state that developers can count on. Using that state, developers can better safeguard their games and their players, by reliably distinguishing systems that are more likely to have cheaters vs. systems that are configured for trust and security. 

    Cheating has grown increasingly sophisticated, moving from simple memory hacks to exploits that try to compromise a system before it even verifies your PC is in a trusted state through the hardware and Windows boot process. While most modern PCs include essential security features for gaming, Windows 11 takes protection a step further with advanced defenses tailored for players and developers. Working closely with hardware providers and anti-cheat providers, we have established a set of standards for hardware and software security, creating a root of trust. These technologies work together to make your PC ready for gaming, making it harder for cheats to take hold: 

    • Trusted Platform Module (TPM) 2.0: Creates a modern, hardware-based secure key storage and root of trust, from which the system and Windows can generate information that can be trusted with cryptographic keys.  
    • Secure Boot: Ensures only trusted software loads during the boot process. So, when it is enabled, developers can have confidence that cheats weren’t inserted into the system early to evade detection by the anti-cheat providers. Plus, it extends the root of trust from the TPM all the way through the hardware initialization process to the time that Windows begins to boot.  
    • Virtualization-based Security (VBS): Provides another layer of protection, strengthening security by creating a secure, isolated environment within your system where it is difficult to run unauthorized code that could interfere with your game or anti-cheat software. Like secure boot, when it is enabled, developers can have greater certainty that cheats are not interfering with fair game play. 
    • Remote Attestation: Provides a well-documented and industry wide approach for remotely validating every important step of both the hardware and Windows boot process by leveraging the TPM and creating cryptographically secure evidence that verifies your PC in a trusted state as it initializes and boots into Windows. 

    These same technologies sit at the heart of Xbox console security, a proven and trusted model, and we’re excited to see anti-cheat providers leveraging them on Windows 11 today.  

    How You Can Help Game Developers Build Trusted Communities  

    We’re working with partners to build the tools and standards that make gaming safer, but players have an important role too. By keeping your firmware and security features up to date, you’re helping developers maintain a trusted environment for everyone. Enabling these protections sends a signal that you value fair play.

    That signal matters because developers increasingly rely on these standards when designing multiplayer experiences. When security features stay on, it becomes easier for developers to differentiate genuine gameplay from cheating and keep the community competitive and fun.   

    Here’s how you can help ensure your PC is ready for secure, fair play: 

    1. Keep Windows Up to Date: Make sure to regularly install Windows 11 updates. These updates are delivered automatically through Windows Update and provide essential security enhancements to help safeguard your gaming experience. 
    1. Stay Current with Firmware/BIOS Patches: Be proactive about checking for and installing firmware/BIOS updates from your PC manufacturer. Firmware/BIOS patches aren’t always automatic, so reviewing your manufacturer’s support site or tools ensures your device receives the latest protections against emerging threats.  We’ve included some links below for many of the top manufacturers to help get you started. 
    1. Enable TPM 2.0 and Secure Boot: Most modern gaming PCs come with these features enabled by default. If you’ve built your own system or use an older device, check your firmware/BIOS settings and manufacturer’s or Windows’ instructions to activate them. 
    1. Review Security Requirements: Major titles such as Call of Duty and Valorant provide dedicated pages that outline the necessary protections needed for secure and fair gameplay. Check the official website for your favorite game to find its recommended security requirements before you play to ensure your system complies with the latest standards. 
    1. Stay Informed: Follow Microsoft’s official channels for guidance on best practices and the latest news.  Bookmark the Security blog to keep up with our expert coverage on security matters.  Also, follow us on LinkedIn (Microsoft Security) and X (@MSFTSecurity) for the latest news and updates on cybersecurity. We’ll keep you updated so you can focus on playing, not worrying. 

    Manufacturer Instructions 

    Additionally, here are a few resources to help: 

    What’s Next 

    The fight against cheating is always evolving, and so are the tools we use to protect the gaming community. As new games and anti-cheat solutions adopt modern security technologies, you’ll see more titles requiring features like TPM, Secure Boot, and advanced protections such as VBS. 

    We’re here to listen to your feedback as we work toward our shared goal of fair play for all.  Together, we can build a gaming ecosystem that’s secure, fair, and fun for everyone. See you in-game! 

    [ad_2]

    Joe Skrebels, Xbox Wire Editor-in-Chief

    Source link

  • 10M Americans hit in government contractor data breach

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Data breaches hit every kind of business, from hospitals to tech firms to major retailers. Now a leading government contractor has joined that list.

    Conduent, which manages critical public services across the United States, says hackers infiltrated its systems for nearly three months. The cyberattack exposed personal information linked to more than 10 million people.

    All about the Conduent breach and its scale

    Conduent discovered the intrusion in January 2025 and said hackers had infiltrated its network as early as Oct. 21, 2024. During this period, attackers reportedly stole large amounts of data linked to state-level programs such as Medicaid, child support, food assistance and toll systems. Conduent claims that its investigation found no ongoing malicious activity and said operations were safely restored after the breach was contained.

    Conduent manages technology and payment systems for dozens of U.S. state governments, processing roughly $85 billion in annual disbursements and handling over 2 billion customer service interactions every year. According to its own estimates, it supports around 100 million residents through various government health and welfare programs.

    MAJOR DATA BROKER HACK IMPACTS 364,000 INDIVIDUALS’ DATA

    Hackers accessed Conduent’s network for nearly three months, exposing sensitive data from major state programs like Medicaid and child support. (Felix Zahn/Photothek via Getty Images)

    The company reported that at least 400,000 people in Texas were affected, with compromised data including Social Security numbers, medical records and health insurance details. Other affected states include Washington, South Carolina, New Hampshire, Maine, Oregon, Massachusetts and California. Notifications are being sent to all impacted individuals, and a dedicated call center has been established to answer questions about the breach.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    How the Conduent breach unfolded

    In January, Conduent described the event as an “operational disruption caused by a third-party compromise.” The breach led to several days of downtime, disrupting vital services in multiple states. In Wisconsin, for instance, parents and beneficiaries were unable to process payments due to system outages, leaving many struggling to meet obligations related to child support and welfare programs.

    The SafePay ransomware group later claimed responsibility for the attack, alleging it had stolen 8.5 terabytes of data. Conduent confirmed in a Securities and Exchange Commission (SEC) filing that hackers had indeed exfiltrated files belonging to a limited number of clients. The company says it hired cybersecurity experts to analyze the stolen data and recently confirmed that it contained significant amounts of personal information from end-users across multiple programs.

    Despite the massive theft, Conduent said there is currently no evidence that the stolen data has been published online or on dark web marketplaces.

    HACKERS TARGET ONLINE STORES WITH NEW ATTACK

    We reached out to Conduent for a comment, and a rep for the company provided CyberGuy with the following statement:

    “As previously disclosed in its April 2025 Form 8-K filing with the SEC, in January 2025, Conduent discovered that it was the victim of a cybersecurity incident.  With respect to that incident, Conduent has agreed to send notification letters, on behalf of its customers, to individuals whose personal information may have been affected by this incident.  In addition, a dedicated call center has been set up to address consumer inquiries. At this time, Conduent has no evidence of any attempted or actual misuse of any information potentially affected by this incident.

    “Upon discovery of the incident, Conduent acted quickly to secure its networks, restore its systems and operations, notify law enforcement and conduct an investigation with the assistance of third-party forensics experts. In addition, given the nature and complexity of the data involved, Conduent has been working diligently with a dedicated review team, including internal and external experts, to conduct a detailed analysis of the affected files to identify the personal information contained therein, which was a time-intensive process. Conduent takes this matter seriously and regrets any inconvenience this incident may have caused.”

    6 steps you can take to protect yourself from Conduent data breach

    If your information may have been exposed in the Conduent breach or any similar data leak, you’re not without defenses. There are several steps you can take right now to reduce the risks.

    Person wearing a hoodie works on multiple computer screens displaying digital data in a dark room.

    The cyberattack disrupted critical public services across multiple states, with some families temporarily unable to process benefits or payments. (Kurt “CyberGuy” Knutsson)

    1) Consider a personal data removal service

    Data brokers collect and sell personal information such as your name, home address, phone number and relatives’ names. This data can be used for scams or social engineering attacks. Personal data removal services find these records across dozens of sites and submit takedown requests on your behalf.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    HACKERS STEAL MEDICAL RECORDS AND FINANCIAL DATA FROM 1.2M PATIENTS IN MASSIVE HEALTHCARE BREACH

    2) Monitor your accounts regularly

    After a major data breach, one of the most effective ways to protect yourself is to stay alert. Check your bank and credit card statements every few days for unusual transactions, even small ones. Watch your benefit accounts or tax filings for irregular activity. Early detection gives you time to freeze accounts or stop fraudulent charges before they escalate.

    3) Install a reputable antivirus program

    Antivirus software is your first line of defense against cyber threats that often follow large breaches. Stolen data can be used to launch targeted phishing attacks or spread malware through fake links and emails. A reliable antivirus solution actively scans for malicious activity, blocks suspicious downloads and keeps your devices safe from newer online threats through automatic updates.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    OVER 8M PATIENT RECORDS LEAKED IN HEALTHCARE DATA BREACH

    4) Enable two-factor authentication (2FA)

    Even if your login credentials are compromised, two-factor authentication (2FA) can stop attackers from getting in. It requires an additional code sent to your phone, email, or authentication app, making unauthorized access nearly impossible. Enable 2FA on your banking, email and government-related accounts, as these often hold the most sensitive information.

    5) Use a password manager

    Many breaches happen because people reuse the same password across multiple websites. A password manager eliminates that risk by creating and storing strong, unique passwords for every account.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    Hacker looks at computer code while sitting in a dark room

    Conduent says the stolen files contained significant amounts of personal information, but has found no signs the data has surfaced online or on dark web marketplaces. (Kurt Knutsson)

    6) Consider an identity theft protection service

    Identity theft protection services monitor your personal data across multiple sources, including the dark web and public records. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    Kurt’s key takeaway

    Even though Conduent claims the stolen data hasn’t surfaced online, that doesn’t mean it’s safe. Data exfiltration on this scale has long-term implications, from identity theft to potential fraud within public benefit systems. The real test will be how both Conduent and its government partners adapt their cybersecurity oversight to prevent similar breaches. Because at this point, the question isn’t whether these systems will be targeted again, but whether they’ll be any better prepared when it happens.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Do you think government contractors handling sensitive information should face stricter cybersecurity regulations? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Apple passkey technology transforms Mac security with biometric authentication, encrypted storage

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Your Mac holds a lot more than just files. It carries your personal information, payment data, messages and every online account you access. Keeping that information safe starts with how you sign in. For years, passwords have been the standard way to protect accounts, but they are also one of the weakest links in digital security. They can be guessed, stolen or reused across multiple sites.

    Apple’s introduction of passkeys marks a major step forward. Instead of relying on something you need to remember, passkeys rely on something you have (your trusted Apple device) and something you are, like your fingerprint or face. Together with iCloud Keychain and two-factor authentication, passkeys create a seamless and much safer way to secure your Mac and your digital life.

    What are passkeys?

    Passkeys are a modern alternative to passwords. They use public key cryptography to let you sign in without ever creating or typing a password. When you register for an account using a passkey, your Mac creates two unique keys. One is public and stored by the website or app, and the other is private and stays securely on your device.

    The public key is not sensitive information. The private key, on the other hand, never leaves your Mac and is protected behind your device’s security features. When you sign in, Touch ID or Face ID confirms your identity before your Mac uses the private key to authenticate you. This process prevents phishing and password leaks because no shared secret is ever transmitted to the website.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOW TO USE PASSKEYS TO KEEP YOUR COMPUTER SAFE

    A passkey on your Mac replaces passwords with a faster, more secure way to sign in. (Kurt “CyberGuy” Knutsson)

    How Apple keeps passkeys secure

    Passkeys are stored and synced across your devices through iCloud Keychain, which is protected by end-to-end encryption. This means that not even Apple can access your passkeys or passwords. iCloud Keychain also has built-in protection against brute force attacks, even if someone were to gain unauthorized access to Apple’s servers.

    If you lose your devices, you can still recover your passkeys through iCloud Keychain recovery. To do this, you must sign in with your Apple ID and password, verify your identity with a code sent to your trusted number and confirm using your device passcode. The system limits the number of attempts, and if too many failed attempts occur, the recovery record is locked or destroyed to prevent misuse.

    You can also set an account recovery contact to make sure you never lose access, even if you forget your Apple ID password or device passcode. This multi-layered design ensures that your data remains secure even in extreme scenarios, such as a compromised Apple account or cloud breach.

    How to set up passkeys on your Mac

    Setting up passkeys is simple and requires iCloud Keychain to be enabled.

    • Choose the Apple menu, then select System Settings.
    • Click your name, then click iCloud.
    • Click Passwords. In macOS Sonoma or earlier, click Passwords & Keychain.
    • Click Sync this Mac, then click Done.
    • When you sign up for a website or app that supports passkeys, you’ll now see the option to create a passkey.
    • If your Mac has Touch ID, place your finger on the sensor to confirm.
    • If you are using an iPhone or iPad nearby, select Other Options and scan the QR code shown on your Mac to confirm with Face ID.
    • You can also replace an existing password by visiting the account settings of a supported website or app and selecting the option to switch to a passkey.

    Once created, your passkeys are automatically stored in iCloud Keychain and available on all devices signed in with the same Apple ID.

    Major services that support passkeys

    Passkey adoption is growing quickly across major tech platforms. As of now, many of the biggest online services already let you sign in without a password.

    Some of the key ones include:

    • Google
    • Microsoft
    • Apple
    • Amazon
    • PayPal
    • GitHub
    • Uber
    • eBay
    • WhatsApp
    • Facebook

    Support for passkeys continues to expand every month as more companies integrate the technology into their login systems. On most of these platforms, you can now create new accounts or switch your existing ones to passkeys for faster, more secure sign-ins.

    Man sitting with a MacBook on his lap with the Google search engine on the screen

    Each passkey is unique to your account and safely stored in your device’s iCloud Keychain. (iStock)

    6 additional steps to keep your Mac safe

    Passkeys add a strong layer of protection, but good security habits still matter. Here are more steps to strengthen your Mac’s defenses. 

    1) Enable two-factor authentication

    Two-factor authentication (2FA) adds another layer of protection to your Apple ID. It works by requiring two forms of verification: your password and a one-time code sent to a trusted device or phone number. This means that even if someone somehow gets your password, they still cannot access your account without also having your device.

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    2) Review your trusted devices and numbers

    Regularly check which devices and phone numbers are linked to your Apple ID. On your Mac, click the Apple icon in the upper left of the screen. Then go to System Settings → Apple ID → Devices and remove anything you don’t recognize. Make sure your trusted phone number is still current, since it’s critical for account recovery.

    3) Use a password manager

    Even though passkeys are replacing passwords, many sites still rely on traditional logins. A password manager helps you create, store and fill in unique passwords for every account. iCloud Keychain can do this automatically across all your Apple devices, but if you want more flexibility, you might want to consider a third-party password manager.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    4) Be wary of phishing attempts and install strong antivirus software

    Phishing remains one of the most common ways attackers try to steal personal information. They may send fake emails or messages pretending to be from Apple or other trusted companies, urging you to click links or provide login details. Always double-check the sender’s address and avoid clicking on links that seem suspicious. Instead, visit the website directly by typing the address into your browser.

    While macOS has strong built-in defenses such as Gatekeeper and XProtect, installing strong antivirus software adds another layer of protection against malware, adware and potentially unwanted programs. Strong antivirus software continuously monitors your system for suspicious behavior and can alert you to threats before they cause damage. It is especially useful if you download files from outside the App Store or connect external drives frequently.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    securing passwords 1

    Using a passkey with Touch ID or Face ID keeps your information protected from phishing and leaks. (Kurt “CyberGuy” Knutsson)

    5) Turn On FileVault disk encryption

    FileVault protects everything stored on your Mac by encrypting the entire hard drive. That means if your computer is ever lost or stolen, your data stays locked away from prying eyes. Go to System Settings → Privacy & Security → FileVault to enable it.

    6) Keep macOS updated automatically

    Apple regularly releases software updates that include important security patches. Cybercriminals often target outdated systems because they contain known vulnerabilities. By keeping macOS and your apps up to date, you make it harder for attackers to exploit weaknesses. To make this effortless, turn on Automatic Updates under System Settings → General → Software Update → Automatic Updates.

    7) Back up with time machine

    Backing up your Mac is just as important as protecting it. Time Machine automatically backs up your files to an external drive or network disk, keeping your data safe from ransomware, hardware failure or accidental deletion. Make sure your backup drive is encrypted for extra protection.

    HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

    8) Use a data removal service

    Even with passkeys, your personal information can still be exposed through data broker sites that collect and sell your details. Using a data removal service can help remove your private data from hundreds of these sites automatically. It’s an effective way to reduce your online footprint and protect your identity, especially when combined with Apple’s built-in security tools.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Passwords have served us for decades, but they are no longer enough to protect our digital identities. Passkeys make signing in faster, easier and significantly more secure by removing the weaknesses of traditional passwords. Combined with Apple’s encryption, iCloud Keychain and two-factor authentication, they represent one of the safest ways to protect your Mac and everything on it.

    Have you tried using passkeys yet on your Mac, and what was your experience like? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link