ReportWire

Tag: Security

  • DHS Kept Chicago Police Records for Months in Violation of Domestic Espionage Rules

    [ad_1]

    On November 21, 2023, field intelligence officers within the Department of Homeland Security quietly deleted a trove of Chicago Police Department records. It was not a routine purge.

    For seven months, the data—records that had been requested on roughly 900 Chicagoland residents—sat on a federal server in violation of a deletion order issued by an intelligence oversight body. A later inquiry found that nearly 800 files had been kept, which a subsequent report said breached rules designed to prevent domestic intelligence operations from targeting legal US residents. The records originated in a private exchange between DHS analysts and Chicago police, a test of how local intelligence might feed federal government watchlists. The idea was to see whether street-level data could surface undocumented gang members in airport queues and at border crossings. The experiment collapsed amid what government reports describe as a chain of mismanagement and oversight failures.

    Internal memos reviewed by WIRED reveal the dataset was first requested by a field officer in DHS’s Office of Intelligence & Analysis (I&A) in the summer of 2021. By then, Chicago’s gang data was already notorious for being riddled with contradictions and error. City inspectors had warned that police couldn’t vouch for its accuracy. Entries created by police included people purportedly born before 1901 and others who appeared to be infants. Some were labeled by police as gang members but not linked to any particular group.

    Police baked their own contempt into the data, listing people’s occupations as “SCUM BAG,” “TURD,” or simply “BLACK.” Neither arrest nor conviction was necessary to make the list.

    Prosecutors and police relied on the designations of alleged gang members in their filings and investigations. They shadowed defendants through bail hearings and into sentencing. For immigrants, it carried extra weight. Chicago’s sanctuary rules barred most data sharing with immigration officers, but a carve-out at the time for “known gang members” left open a back door. Over the course of a decade, immigration officers tapped into the database more than 32,000 times, records show.

    The I&A memos—first obtained by the Brennan Center for Justice at NYU through a public records request—show that what began inside DHS as a limited data-sharing experiment seems to have soon unraveled into a cascade of procedural lapses. The request for the Chicagoland data moved through layers of review with no clear owner, its legal safeguards overlooked or ignored. By the time the data landed on I&A’s server around April 2022, the field officer who had initiated the transfer had left their post. The experiment ultimately collapsed under its own paperwork. Signatures went missing, audits were never filed, and the deletion deadline slipped by unnoticed. The guardrails meant to keep intelligence work pointed outward—toward foreign threats, not Americans—simply failed.

    Faced with the lapse, I&A ultimately killed the project in November 2023, wiping the dataset and memorializing the breach in a formal report.

    Spencer Reynolds, a senior counsel at the Brennan Center, says the episode illustrates how federal intelligence officers can sidestep local sanctuary laws. “This intelligence office is a workaround to so-called sanctuary protections that limit cities like Chicago from direct cooperation with ICE,” he says. “Federal intelligence officers can access the data, package it up, and then hand it off to immigration enforcement, evading important policies to protect residents.”

    [ad_2]

    Dell Cameron

    Source link

  • AI-powered scams target kids while parents stay silent

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Kids are spending more time online than ever, and that early exposure is opening the door to a new kind of danger. 

    Artificial intelligence has supercharged online scams, creating personalized and convincing traps that even adults can fall for. The latest Bitwarden “Cybersecurity Awareness Month 2025” poll shows that while parents know these risks exist, most still haven’t had a serious talk with their children about them. 

    This growing communication gap is leaving the youngest internet users vulnerable at a time when online safety depends more than ever on education and oversight.

    Young children face real risks online

    Children as young as preschool age are now part of the connected world, yet few truly understand how to stay safe. The Bitwarden survey found that 42% of parents with children between 3 and 5 years old said their child had accidentally shared personal information online.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    5 PHONE SAFETY TIPS EVERY PARENT SHOULD KNOW

    AI-powered scams are finding new ways to reach kids who go online earlier than ever. (Kurt “CyberGuy” Knutsson)

    Nearly 80% of kids between the ages of 3 and 12 already have their own tablet or another connected device. Many parents assume supervision software or family settings are enough, but that assumption breaks down when kids explore apps, games and chat spaces designed to hold their attention. Device access has become nearly universal by early elementary school, but meaningful supervision and honest safety conversations are lagging behind.

    The AI threat and the parental disconnect

    Artificial intelligence has changed the nature of online scams by making them sound familiar, personal and hard to recognize. Bitwarden’s data shows that 78% of parents worry their child could fall for an AI-enhanced threat, such as a voice-cloned message or a fake chat with a friend. Despite that fear, almost half of those same parents haven’t talked with their kids about what an AI-powered scam might look like. The disconnect is even stronger among Gen Z parents. 

    About 80% of them say they are afraid their child will fall victim to an AI-based scheme, yet 37% allow their kids full or nearly full autonomy online. In those households, problems are more common. Malware infections, unauthorized in-app purchases and phishing attempts appear at the highest rates among families who worry the most but monitor the least. The paradox is clear. Parents recognize the threat but fail to translate awareness into consistent action.

    Why parents haven’t had the talk

    There are many reasons this important talk keeps getting delayed. Some parents simply feel unprepared to explain AI, while others assume their existing safety tools will protect their children. Only 17% of parents in the United States actively seek information about AI technologies, according to related research by Barna Group. That leaves a large majority relying on partial knowledge or outdated advice. 

    Many parents also juggle multiple devices at home, making it difficult to track every app or game their child uses. Some overestimate how safe their own habits are, even though they admit to reusing passwords or skipping security updates. Without firsthand understanding or personal discipline, it becomes even harder to teach those lessons to children. As a result, many kids face the internet with curiosity but without proper guidance.

    Smart ways to protect your child online

    The Bitwarden findings make one thing clear: kids are getting connected younger, and scams powered by artificial intelligence are already targeting them. The good news is that parents can take practical steps right now to reduce those risks and build lasting online safety habits.

    1) Keep devices where you can see them

    Set up tablets, laptops and gaming consoles in shared family areas rather than bedrooms. When screens stay visible, you naturally become part of your child’s online world. This not only encourages open conversation but also helps spot suspicious messages, fake friend requests or scam links before they cause trouble.

    A mother surfs the web with her son.

    Staying involved in your child’s digital life is the best defense against today’s AI threats. (Kurt “CyberGuy” Knutsson)

    2) Use built-in parental controls

    Most devices have strong tools you can activate in minutes. Apple’s Screen Time and Google Family Link let you limit screen time, approve new app installs and monitor how long your child spends on specific apps. These controls are especially useful for younger kids who, according to the Bitwarden poll, often have little supervision despite heavy device use.

    TEENS TURNING TO AI FOR LOVE AND COMFORT

    3) Talk through every download

    Before your child installs a new game or app, take a moment to check it together. Read the reviews, look at what data it collects and confirm the developer’s name. Explain why some games or “free” apps might ask for camera or contact access they don’t need. This kind of shared review teaches healthy skepticism and helps children recognize red flags later on.

    4) Make password strength and 2FA a family rule

    AI scams thrive on weak or reused passwords. Use a password manager to create and store strong, unique logins for each account. Turn on two-factor authentication (2FA) wherever possible so that even if a password is stolen, the account stays protected. Let your kids see how you use these tools so they learn that security isn’t complicated, it’s just a habit.

    An exhausted mother uses her laptop while her son sits on her lap.

    Many parents delay important online safety talks because they feel unprepared to explain AI, leaving kids curious but without the guidance they need to stay safe. (Kurt “CyberGuy” Knutsson)

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Teach them to stop and tell

    One of the best defenses is simple: encourage your child to pause and talk before reacting to anything unusual online. Whether it’s a pop-up claiming a prize, a strange link in a chat or a voice message that sounds familiar, remind them it’s always okay to ask you first. Quick conversations like these can prevent costly mistakes and turn learning moments into trust-building ones.

    6) Keep devices updated and use strong antivirus software

    Outdated software can leave gaps that scammers exploit. Regularly update operating systems, browsers and apps to close those holes. Add strong antivirus software. Explain to your child that updates and scans keep their favorite games and videos running safely, not just their parents happy.

    The best way to safeguard from malicious links that install malware, potentially accessing private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    7) Make online safety part of everyday life

    Don’t save these conversations for when something goes wrong. Bring them up casually during family time or when watching YouTube or gaming together. Treat digital safety like any other life skill, something practiced daily and improved with time. The more normal it feels, the more confident your child becomes when facing online risks.

    A mother watches her son surf the web.

    Talking about online safety early helps build trust and awareness before trouble starts.  (Kurt “CyberGuy” Knutsson)

    What this means for you

    If you are a parent, guardian or anyone helping a child use technology, this issue deserves your attention. Start talking early, even before your child begins exploring the web on their own. Teach them simple concepts like asking before clicking or sharing. Instead of relying only on parental controls, have ongoing conversations that help them recognize suspicious links, messages or pop-ups. Show them that cybersecurity isn’t about fear but about awareness. Model strong digital habits at home by using unique passwords and turning on two-factor authentication. Explain why those steps matter. When your child understands the reasoning behind the rules, they are more likely to follow them. Make technology part of your family routine rather than a private space your child navigates alone. Regularly check the apps they use and the people they interact with. Set clear expectations and age-appropriate boundaries that can grow with your child’s experience. Staying engaged is the most powerful protection you can offer.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    The numbers from Bitwarden show a clear warning sign. Concern among parents is high, yet actual conversations about AI-powered scams remain rare. That silence gives scammers the upper hand. Children who learn about online safety early are more confident, more cautious and better equipped to handle unexpected messages or fake alerts. It only takes a few minutes of honest conversation to create awareness that lasts for years. By taking action now, you can close the gap between fear and understanding, protecting your family in a digital world that changes every day.

    Are you ready to start the conversation that could keep your child from becoming the next target of an AI-powered scam? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Google Chrome autofill now handles IDs

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Google has made Chrome even more capable. The browser can now fill in your passport, driver’s license and vehicle registration automatically. This upgrade joins the list of time-saving autofill options that already include passwords, addresses and payment details.

    Desktop users with enhanced autofill enabled will start seeing the new options right away. Chrome can even interpret complex form layouts and varying formats across different websites, improving accuracy with every entry.

    Google says these new autofill features were designed with privacy in mind. This from a company which makes money off of capturing your most intimate details in life. Google says Chrome only saves sensitive data after you give permission. It also encrypts stored information so it’s unreadable to anyone without your authorization. Before any personal info is filled into a webpage, Chrome asks you to confirm — keeping you in control.

    UPDATE CHROME NOW: GOOGLE PATCHES NEW ZERO-DAY THREAT

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Chrome’s enhanced autofill now saves and fills your passport, license and vehicle info with just a click. (Google)

    Still, autofill exploits by hackers have been known to happen. Infostealer malware has been used historically to capture data entered into web fields manually and with autofill. It is not perfect, but Google and others have come a long way to secure their browser. Keep in mind, Google may ask to share your information with third parties, so be cautious when you give it permission.

    Passport numbers, driver’s license details and other official records are valuable to cybercriminals, so be careful when you share them online. As always, use the strongest antivirus protection on all devices to ward off trouble. See my 2025 review of the best antivirus protection at Cyberguy.com.

    The company began rolling out these updates worldwide in all languages and plans to support even more document types soon.

    Car insurance information being autofilled in Google Chrome

    The Google Chrome browser encrypts personal data and always asks for confirmation before entering sensitive information. (Google)

    How to enable Enhanced Autofill in Chrome

    For Windows and Mac (Desktop):

    • Open Chrome on your computer.
    • Click the three-dot menu in the top right.
    • Click Settings.
    • On the left pane, select Autofill & passwords (or simply “Autofill” depending on version).
    • Click Enhanced autofill.
    • Toggle On “Enhanced autofill” to allow Chrome to fill in IDs (passport, driver’s license, vehicle info).
    • To enter or edit saved data: while still in the Enhanced autofill section, select Add/Edit under “Saved information” and input your document numbers or vehicle info.
    • Next time you visit a supported form (e.g., for vehicle registration or passport number), Chrome will prompt you to fill it in and ask you to confirm before submitting it.

    OVER 2B USERS FACE PHISHING RISKS AFTER GOOGLE DATA LEAK

    The settings of Google Chrome

    You can enable Enhanced Autofill in Chrome settings to securely manage and store official identification data. (Kurt “CyberGuy” Knutsson)

    For iPhone

    • Open Chrome on your iPhone or iPad.
    • Tap the three-dot menu (bottom or top right) and select Settings.
    • Go to Autofill & Payments (or similar label) and verify that “Addresses and More,” “Payment Methods” and “Passwords” are enabled for autofill.

    For Android

    Settings may vary depending on your Android phone’s manufacturer.

    • Open Chrome on your Android device.
    • Tap the three-dot menu (top right).
    • Go to Settings → Autofill & payments (or simply “Autofill and forms”).
    • Under “Addresses and more” (and possibly payment methods), enable the types of info you want filled in automatically.

    Note: The enhanced autofill update for passports, driver’s licenses and vehicle details is still expanding to mobile. You may not see it yet on iPhone or Android, even with the latest Chrome version. Keep your app updated and check back periodically as Google continues the global rollout.

    AI updates are driving Chrome forward

    This upgrade follows a wave of artificial intelligence-driven improvements in Chrome. Recently, Google added Gemini integration for all desktop users in the U.S. and previewed new “agentic” features that use AI to automate everyday tasks. Future updates will include password reset suggestions, smarter scam detection and AI-powered form assistance, all designed to make browsing safer and more convenient.

    CONGRESSIONAL BUDGET OFFICE HIT BY CYBERATTACK, RAISING CONCERNS OVER US GOVERNMENT NETWORK SECURITY

    A woman types on a laptop.

    The rollout of Enhanced Autofill continues worldwide, adding support for more ID types and expanding beyond desktop users. (Kurt “CyberGuy” Knutsson)

    Tips to keep your browser secure

    Even with encryption, there’s more you can do to protect what autofill stores.

    1) Use strong antivirus software

    Install trusted antivirus software on all your devices. It blocks malware that could record your keystrokes or hijack autofill data before encryption kicks in.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Use a password manager instead of browser storage

    Dedicated password managers store and encrypt your logins locally, reducing risk if your browser gets compromised.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Enable two-factor authentication (2FA)

    Pair your Google account with two-factor authentication (2FA). Even if hackers access your browser, they can’t reach your autofill data without your secondary code.

    4) Keep your browser and extensions clean

    Type chrome://extensions and remove anything unfamiliar. Malicious add-ons are a common way attackers steal autofill info.

    5) Use a data removal service

    Even with Chrome’s encryption, your personal information can still surface on data broker sites. A data removal service sends requests to these companies to delete your personal details, like your address, phone number and ID records, before they can be shared or sold. This lowers the risk of your data being used in phishing attempts or identity theft. Regularly clearing your digital footprint adds another layer of protection for Chrome’s autofill feature. It limits what hackers could use if they ever gain access through a breached website or browser extension.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    6) Use a secure email for verification

    If Chrome requests confirmation, make sure your linked Google account uses a private, encrypted email provider.

    For recommendations on private and secure email providers that offer encrypted addresses, visit Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Chrome’s latest autofill update blends convenience with stronger safeguards. But security still depends on your habits. Taking a few extra minutes to manage extensions, enable 2FA and use privacy tools will go a long way toward keeping your personal data safe.

    Would you trust your passport or driver’s license info to Google Chrome’s autofill, or is that a step too far? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • 3,000 Philly-area security guards get pay raises with new union contract

    [ad_1]

    A union representing about 3,000 security guards in the Philadelphia area ratified a four-year contract with some of the region’s largest employers, securing higher wages and better benefits for officers who have been working on an expired contract for over a month.

    The 32BJ division of the Service Employees International Union announced the new contract’s terms Monday.


    MORENorristown police find body in trash can along Schuylkill River Trail


    The security guards, who mostly work on the Temple, Drexel and Penn campuses and in high-rise buildings in Center City, joined another 4,600 employees in New Jersey, Washington D.C. and Northern Virginia to negotiate with Allied Universal, Colonial Security Services, GardaWorld, Harvard Protection Services and Securitas, according to Julie Karant, a media contact with the union chapter. 

    Allied Universal, the largest security employer in the country, did not immediately respond to a request for comment. 

    Contract terms include a $4.30 hourly wage increase to bring the hourly rate to $20.55, which the union chapter said represented the largest pay raise for security officers in its 91-year history.

    Workers will also see fully employer-paid dental, vision and life insurance, three additional paid holidays and new short-term disability benefits. There are also protections from hairstyle discrimination, working mandatory overtime hours and unpaid disciplinary time if employees are found to be not liable for an incident.

    Campus officers who typically don’t work during the summer will now be guaranteed to have their health benefits reinstated when they return in the fall. Employees with three years of seniority or more will receive an extra paid day off, and all job vacancies will be posted online. 

    “This was more than a union fighting for a contract,” Gabe Morgan, 32BJ SEIU executive vice president, said in a statement. “These jobs have the potential to be a path to the middle class that allows workers to live in the places they work so hard to protect.”

    The union’s previous contract expired Sept. 30, and employees spent last month rallying for fair wages and more trainingLegislation in Philadelphia City Council is pending that would enact minimum training standards for security officers. 

    “We are the people who protect this city from sunrise to sundown; the ones who stand in the cold, the rain, the dark,” Daquan Gardner, a Temple Hospital security officer, said in a statement. “We don’t wear capes, but every single day we carry courage on our shoulders. We didn’t just win a contract, we claimed dignity, respect and our rightful place in this city.” 

    [ad_2]

    Molly McVety

    Source link

  • The #1 Google search scam everyone falls for

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When something goes wrong with your bank account or delivery, your first instinct might be to type the company name into Google and call the first customer service number you see. But that simple search has become one of the biggest traps for scammers, and it’s costing people money, privacy and even control over their phones.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    A simple Google search for a company’s customer service number can lead straight to a scam. The first result isn’t always the safest one. (Kurt “CyberGuy” Knutsson)

    He Googled his bank’s number and lost control of his phone

    Here’s how one man’s quick search for help turned into a nightmare he never expected. Gabriel wrote to us in distress, asking,

    “I called my bank to check on some charges I didn’t authorize. I called the number on the bank statement, but they told me to go online. I googled the company and dialed the first number that popped up. Some foreign guy got on the phone, and I explained about the charges. Somehow, he took control of my phone, where I didn’t have any control. I tried to shut it down and hang up, but I couldn’t. He ended up sending an explicit text message to my 16-year-old daughter. How do I prove I didn’t send that message? Please help.”

    Gabriel’s story is frightening, and unfortunately, it’s not rare. This type of attack is called a remote access support scam. Scammers pretend to be bank or tech support, then trick you into installing a program that gives them control of your device. Once inside, they can steal passwords, send messages or lock you out completely.

    WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL

    A user searches on Google on a laptop.

    Gabriel thought he was calling his bank, but the number was fake. Within minutes, a scammer took control of his phone and invaded his privacy. (Kurt “CyberGuy” Knutsson)

    Why this scam works

    Search engines reward paid ads. Scammers take advantage of this by buying ad space to appear above legitimate customer service numbers. The fake pages look professional, complete with company logos and 800 numbers that seem real.

    Once you call, the fake “agent” sounds knowledgeable and polite. They build trust, then convince you to install remote access software such as AnyDesk or TeamViewer. From that point, they can control everything on your phone.

    What to do if this happens to you

    Gabriel, what you went through is incredibly upsetting, and you’re right to take it seriously. Here’s what to do right away:

    1) Disconnect and secure your phone

    Turn off your phone immediately. Restart it in Airplane Mode and don’t connect to Wi-Fi yet. Run a full antivirus scan with strong antivirus software. 

    2) Change all your passwords

    Use a secure device that has not been compromised to reset the passwords for your key accounts, including email, cloud storage, phone carrier and banking logins. Create strong, unique passwords for each account and enable two-factor authentication (2FA) for added protection on all your devices and platforms.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    3) Contact your carrier and your bank

    Let your phone provider know that your device was taken over. Ask them to check for unauthorized remote management apps or SIM-swap activity. Notify your bank’s fraud department and report the fake number you found on Google.

    4) Report the explicit message

    Take screenshots and save everything. Contact local police and explain that the message was sent from your number while your phone was under remote control. If a minor is involved, the case may be referred to the FBI’s Internet Crime Complaint Center (IC3.gov).

    5) Factory reset your phone

    Once your data is backed up, perform a factory reset on your iPhone or Android to remove any hidden software. Reinstall only apps you recognize from the official app store.

    HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET

    A user searches Google.

    Scammers use fake customer service numbers to sound convincing and gain remote access to your devices, turning a simple call for help into a digital takeover. (Kurt “CyberGuy” Knutsson)

    Tips to stay safe from fake customer service scams

    Falling for a fake customer service number can happen to anyone, especially when you’re in a rush or worried about your account. Here’s how to make sure you never get tricked by the same kind of scam that hijacked Gabriel’s phone.

    Go directly to the company’s official website

    Always type the company’s web address yourself or use the contact number printed on your card or statement. Scammers often create fake numbers that appear in search results, hoping you’ll call them instead of your real bank.

    Don’t trust the first search result on Google

    Search engines sell ad space to anyone, including criminals posing as real businesses. Those top “sponsored” listings can lead straight to scammers. Instead, scroll down until you find the official domain ending in .com, .org or .gov.

    Never allow remote access to your phone or computer

    No legitimate company needs to control your device to verify charges or fix an account issue. If someone asks you to install software like AnyDesk or TeamViewer, hang up immediately. These tools give strangers complete control of your screen and data.

    Hang up if the caller pressures you to act fast

    Scammers rely on panic. When someone insists you act “right now” or risk losing money, that’s a warning sign. Stay calm, hang up, and verify the problem through your bank’s official website or number.

    Use strong antivirus protection

    Install and regularly update a trusted antivirus app. Strong antivirus software can block remote-access tools and spyware before scammers gain access. Regular scans also detect hidden threats that may already be on your phone or computer.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    Consider using a data removal service

    Many scammers find victims through data brokers that sell phone numbers and personal details. A data removal service helps erase your information from these sites. As a result, it’s harder for criminals to target you with fake customer service scams in the first place.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    Monitor your identity with a trusted protection service

    Even a short breach can expose your private information. Identity-monitoring tools alert you when your name, email or Social Security number appears on the dark web. That gives you time to act before scammers can use it.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    The internet has made getting help easier than ever, but it has also made it easier for scammers to pretend to be helpful. The top way people are being scammed today isn’t through phishing emails or suspicious links; it’s by trusting fake phone numbers that look official. Take a few minutes to save the real customer service numbers for your bank, phone provider, and credit card company. One quick call to the wrong number could give a stranger access to your entire digital life.

    With fake customer service numbers flooding search results, should Google be held responsible for protecting you from these scams? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • The Government Shutdown Is a Ticking Cybersecurity Time Bomb

    [ad_1]

    Amid a government shutdown that has dragged on for more than five weeks, the United States Congressional Budget Office said on Thursday that it recently suffered a hack and moved to contain the breach. CBO provides nonpartisan financial and economic data to lawmakers, and The Washington Post reported that the agency was infiltrated by a “suspected foreign actor.”

    CBO spokesperson Caitlin Emma told WIRED in a statement that it has “implemented additional monitoring and new security controls to further protect the agency’s systems” and that “CBO occasionally faces threats to its network and continually monitors to address those threats.” Emma did not address questions from WIRED about whether the government shutdown has impacted technical personnel or cybersecurity-related work at CBO.

    With increasing instability in the Supplemental Nutrition Assistance Program (SNAP) leaving Americans hungry, air traffic control personnel shortages disrupting flights, financial devastation for federal workers, and mounting operational shortages at the Social Security Administration, the shutdown is increasingly impacting every corner of the US. But researchers, former and current government workers, and federal technology experts warn that gaps in foundational activities during the shutdown—things like system patching, activity monitoring, and device management—could have real effects on federal defenses, both now and for years to come.

    “A lot of federal digital systems are still just running in the cloud throughout the shutdown, even if the office is empty,” says Safi Mojidi, a longtime cybersecurity researcher who previously worked for NASA and as a federal security contractor. “If everything was set up properly, then the cloud offers an important baseline of security, but it’s hard to rest easy during a shutdown knowing that even in the best of times there are problems getting security right.”

    Even before the shutdown, federal cybersecurity workers were being impacted by reductions in force at agencies like the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency—potentially hindering digital defense guidance and coordination across the government. And CISA has continued cutting staff during the shutdown as well.

    In a statement, spokesperson Marci McCarthy said “CISA continues to execute on its mission” but did not answer WIRED’s specific questions about how its work and digital defenses at other agencies have been impacted by the government shutdown, which she blamed on Democrats.

    The government’s transition to the cloud over the last decade, as well as increased attention to cybersecurity in recent years, does provide an important backstop for a disruption like a shutdown. Experts emphasize, though, that the federal landscape is not homogenous, and some agencies have made more progress and are better equipped than others. Additionally, missed and overlooked digital security work that accumulates during the shutdown will create a backlog when workers return that could be difficult to surmount.

    [ad_2]

    Lily Hay Newman

    Source link

  • Apple releases iOS 26.1 with major security improvements and new features for iPhone users

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Apple’s iOS 26.1 update is more than a standard patch. It boosts security, speeds up performance and adds practical upgrades to features you already use. The update fixes dozens of vulnerabilities that impact Safari, Photos and Apple Account settings. 

    It also introduces stronger privacy controls, design tweaks and expanded support for Apple Intelligence. Since iOS 26.1 is the first major follow-up to iOS 26, it builds on the foundation of the original release with key fixes and refinements. 

    If you value protection, speed and reliability, updating now is an easy way to keep your iPhone secure and performing at its best.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    The new update focuses on privacy, stability, and performance, giving iPhone users stronger protection and a more polished overall experience. (Cyberguy.com)

    How to update to iOS 26.1

    Here are a few simple steps to install iOS 26.1:

    • Plug in your iPhone and connect to a reliable Wi-Fi network to prevent interruptions.
    • Go to Settings.
    • Tap General.
    • Click Software Update.
    • Tap Update Now or Download and Install when iOS 26.1 appears.
    • Follow the prompts and wait for your phone to restart.

    Once complete, your iPhone will have the latest protections and performance enhancements. iOS 26.1 is available for all iPhones from the iPhone 11 and later. Because it is a smaller point update, installation is quick and delivers immediate benefits without the delays of a major version upgrade.

    WHY WI-FI CALLING MAY BE KILLING YOUR PHONE’S BATTERY LIFE

    Top 10 Reasons to Update to iOS 26.1

    Apple packed plenty of improvements into this release, but these ten stand out as the most important reasons to install iOS 26.1 right now.

    1) Stronger security protections

    Apple fixed over 50 vulnerabilities in this update. Those include serious flaws that could let apps access sensitive data or take screenshots without permission. Installing iOS 26.1 keeps your personal information safer than before. 

    2) Streamlined security

    Apple added a new option in iOS 26.1 that quietly keeps your iPhone protected between major updates. Go to Settings > Privacy & Security > Background Security Improvements, then turn on the toggle for automatic background security updates. These smaller patches install automatically without waiting for the next iOS version, helping your device stay protected against new threats with less effort.

    EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES

    3) Alarm upgrade

    Apple changed how alarms work in iOS 26.1 to make mornings more reliable. You now need to swipe across the screen to turn an alarm off, rather than tapping it. The snooze button still works with a single tap, so you can easily tell the difference between stopping and snoozing. This simple change helps prevent accidental silencing and makes it easier to wake up on time.

    The new iPhone 14 and 14 Plus are displayed

    Apple’s iOS 26.1 update boosts security, speeds up performance and adds practical upgrades to already existing features. (BRITTANY HOSEA-SMALL/AFP via Getty Images)

    4) Customizable liquid glass look

    The semi-transparent iOS 26 design now includes new options for opacity. You can make screens easier to read and reduce glare with more visual clarity.

    Open Settings > Display & Brightness > then choose Liquid Glass. From there, select either Clear for a sharper background or Tinted for a softer, more subdued look that reduces glare.

    5) New camera toggle

    iOS 26.1 adds a new setting that gives you control over the camera shortcut on your lock screen. Go to Settings > Camera, then look for the option “Lock Screen Swipe to Open Camera.” You can now turn this feature off if you often trigger the camera by accident or prefer using the dedicated Camera Control instead. It’s a small but useful change for anyone who wants fewer unintentional photos or faster access to other lock screen tools.

    6) Expanded live translation

    Frequent travelers and language learners will appreciate the expanded real-time translation. iOS 26.1 adds Italian, Japanese, Korean and Chinese to AirPods translation, making global communication smoother.

    APPLE EXPECTED TO ROLL OUT TEXTING UPDATE THAT WOULD HIT GOP HARDEST AHEAD OF MIDTERMS, FUNDRAISERS SAY

    7) More languages for Apple Intelligence

    Apple Intelligence now understands additional languages, including Dutch, Danish, Swedish, Norwegian, Portuguese, Turkish and Vietnamese. That expands how Siri and on-device AI respond to more users. 

    8) Smarter music and audio controls

    Apple added handy gesture controls to the Apple Music MiniPlayer in iOS 26.1. You can now swipe left to go back or right to skip ahead while a song plays, making it easier to control music without opening the full player. The update also adds AutoMix support over AirPlay and lets creators adjust USB microphone gain directly from their iPhone for clearer recordings.

    9) Phone call haptics control

    iOS 26.1 adds a simple but welcome change for anyone who prefers fewer distractions. You can now turn off the vibration feedback that happens when a call connects or ends. Go to Settings > Apps > Phone and toggle Haptics off to stop those subtle buzzes that can feel like extra notifications. It’s a small tweak that makes phone calls feel cleaner and less intrusive.

    10) Local Capture options

    iOS 26.1 adds a new Local Capture menu that makes it easier to record high-quality audio and video from your own device during calls. Go to Settings > General > Local Capture to choose where your recordings are saved or to enable audio-only recording.

    10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

    A man scrolling on social media on his phone.

    The new IOS update also introduces stronger privacy controls, enhancing online security. (Kurt “CyberGuy” Knutsson)

    Pro Tip: Use strong antivirus software

    Use trusted antivirus software as an extra layer of protection for your iPhone or iPad. While Apple’s built-in defenses are strong, security threats evolve fast. Installing strong antivirus software adds real-time protection against phishing, unsafe links, and rogue apps. Keep it updated and run regular scans to catch potential risks early. This extra step helps your device stay clean, fast, and fully protected between iOS updates.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    The iOS 26.1 update brings more than simple fixes. It fine-tunes how your iPhone works, sounds and protects your information. With expanded translation, smarter music gestures, new privacy options and better camera controls, every improvement makes daily use smoother. Features like Local Capture, streamlined security updates and the ability to turn off phone call haptics highlight Apple’s focus on practical upgrades that matter. If you have not updated yet, now is a good time. iOS 26.1 strengthens your phone’s security, improves stability and adds thoughtful details that make your device easier to use every day.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Which new iOS 26.1 feature will you try first, the enhanced privacy tools or the camera and haptic settings? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • The economic squeeze: Understanding how inflation affects teacher well-being and career decisions

    [ad_1]

    Key points:

    In recent years, the teaching profession has faced unprecedented challenges, with inflation emerging as a significant factor affecting educators’ professional lives and career choices. This in-depth examination delves into the complex interplay between escalating inflation rates and the self-efficacy of educators–their conviction in their capacity to proficiently execute their pedagogical responsibilities and attain the desired instructional outcomes within the classroom environment.

    The impact of inflation on teachers’ financial stability has become increasingly evident, with many educators experiencing a substantial decline in their “real wages.” While nominal salaries remain relatively stagnant, the purchasing power of teachers’ incomes continues to erode as the cost of living rises. This economic pressure has created a concerning dynamic where educators, despite their professional dedication, find themselves struggling to maintain their standard of living and meet basic financial obligations.

    A particularly troubling trend has emerged in which teachers are increasingly forced to seek secondary employment to supplement their primary income. Recent surveys indicate that approximately 20 percent of teachers now hold second jobs during the academic year, with this percentage rising to nearly 30 percent during summer months. This necessity to work multiple jobs can lead to physical and mental exhaustion, potentially compromising teachers’ ability to maintain the high levels of energy and engagement required for effective classroom instruction.

    The phenomenon of “moonlighting” among educators has far-reaching implications for teacher self-efficacy. When teachers must divide their attention and energy between multiple jobs, their capacity to prepare engaging lessons, grade assignments thoroughly, and provide individualized student support may be diminished. This situation often creates a cycle where reduced performance leads to decreased self-confidence, potentially affecting both teaching quality and student outcomes.

    Financial stress has also been linked to increased levels of anxiety and burnout among teachers, directly impacting their perceived self-efficacy. Studies have shown that educators experiencing financial strain are more likely to report lower levels of job satisfaction and decreased confidence in their ability to meet professional expectations. This psychological burden can manifest in reduced classroom effectiveness and diminished student engagement.

    Perhaps most concerning is the growing trend of highly qualified educators leaving the profession entirely for better-paying opportunities in other sectors. This “brain drain” from education represents a significant loss of experienced professionals who have developed valuable teaching expertise. The exodus of talented educators not only affects current students but also reduces the pool of mentor teachers available to guide and support newer colleagues, potentially impacting the professional development of future educators.

    The correlation between inflation and teacher attrition rates has become increasingly apparent, with economic factors cited as a primary reason for leaving the profession. Research indicates that districts in areas with higher costs of living and significant inflation rates experience greater difficulty in both recruiting and retaining qualified teachers. This challenge is particularly acute in urban areas where housing costs and other living expenses have outpaced teacher salary increases.

    Corporate sectors, technology companies, and consulting firms have become attractive alternatives for educators seeking better compensation and work-life balance. These career transitions often offer significantly higher salaries, better benefits packages, and more sustainable working hours. The skills that make effective teachers, such as communication, organization, and problem-solving, are highly valued in these alternative career paths, making the transition both feasible and increasingly common.

    The cumulative effect of these factors presents a serious challenge to the education system’s sustainability. As experienced teachers leave the profession and prospective educators choose alternative career paths, schools face increasing difficulty in maintaining educational quality and consistency. This situation calls for systematic changes in how we value and compensate educators, recognizing that teacher self-efficacy is intrinsically linked to their financial security and professional well-being.

    Latest posts by eSchool Media Contributors (see all)

    [ad_2]

    Dr. Jason Richardson, Garden City Elementary School & the International University of the Caribbean

    Source link

  • How to stop impostor bank scams before they drain your wallet

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Losing your life savings to fraud is not a distant fear; it is a real and growing risk. Scams involving criminals pretending to be bank representatives have surged, with the Federal Trade Commission (FTC) reporting record-breaking losses exceeding $2.9 billion in recent data. These criminals no longer rely on basic phone tricks. Instead, they use caller ID spoofing and artificial-voice software to sound like trusted professionals, often imitating real bank employees down to the smallest detail.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS

    What impostor bank scams look like

    Scammers pretending to be from your bank follow a predictable yet terrifying pattern. They begin with an urgent phone call warning that your account has been compromised. The caller ID displays your bank’s real number, which builds instant trust.

    Impostor scams have become one of the fastest-growing crimes in America, costing victims billions each year. (Kurt “CyberGuy” Knutsson)

    Next, they instruct you to move your money into a so-called “safe” or “decoy” account while they “investigate” the issue. Their goal is to create fear and push you into action before you have time to think.

    One journalist reportedly learned this lesson the hard way when he answered what appeared to be a legitimate call from Chase Bank. After a series of convincing conversations with multiple “representatives,” he transferred nearly $30,000 to scammers. In another case, a 65-year-old caterer reportedly lost $162,000 when a friendly woman pretending to be a bank employee claimed her ATM card had been compromised. These stories are not rare; they reflect how sophisticated and believable modern scams have become.

    Why you and others are targets

    Banks are trusted institutions, and scammers know it. That trust makes impersonation one of the easiest and most effective fraud tactics today. With spoofing tools, criminals can mimic real bank phone numbers and even use AI to reproduce familiar voices. Their approach is psychological: they create panic and urgency to make victims act quickly and irrationally.

    Older adults are particularly vulnerable. The FTC found that losses of over $100,000 to impostor scams among people aged 60 and older have skyrocketed, from $55 million in 2020 to $445 million in 2024. These numbers highlight how no one is immune to manipulation when fear and urgency collide.

    A woman speaks on her cell phone.

    Criminals exploit fear, trust and technology to pressure victims into acting before they can think clearly. (Kurt “CyberGuy” Knutsson)

    9 smart tips to protect yourself from impostor scams 

    Impostor scams move fast, but with the right precautions, you can stop them before they strike.

    1) Never trust caller ID alone

    Spoofed numbers make a call appear as if it’s coming from your bank, even when it’s not.

    2) Hang up and call your bank using a verified number

    Do not return calls using numbers given to you by the person who contacted you. Always call the number printed on your debit or credit card.

    3) Use a data removal service to protect your identity

    Scammers often collect phone numbers, email addresses and other personal details from public records and data broker sites. Using a trusted data removal service helps wipe that information from the web, reducing the chances that criminals can use your data to impersonate you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    A woman talking on her cell phone

    Scammers often pose as bank employees, using fake caller IDs and urgent stories to trick people into sending money. (Kurt “CyberGuy” Knutsson)

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    4) Your bank will never ask you to transfer money

    Any request to move funds “for protection” is a red flag for fraud.

    NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE

    5) Use strong antivirus software

    Scammers often send fake links or pop-ups that install malicious programs on your device. A strong antivirus program can detect these threats, block phishing attempts and stop remote-access tools that give criminals control of your computer. Keeping your software updated adds another layer of protection against evolving scams.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    6) Never share verification codes or PINs

    Banks do not ask for your codes over the phone, text or email.

    7) Use call-blocking or scam-identifier apps

    Adding these tools to your phone can filter many spoofed calls before they reach you. Both iPhone and Android devices have built-in settings and apps that help you stop scam calls before you even pick up.

    If you use an iPhone:

    • Go to Settings
    • Tap Apps
    • Click Phone
    • Under Unknown Callers, click Silence to automatically block unsaved numbers that aren’t in your contacts.

    Android phones offer similar protection:

    Settings may vary depending on your Android phone’s manufacturer. 

    • Go to the Phone app
    • Click Settings
    • Tap Caller ID & Spam
    • Click Filter Spam Calls, or you might be asked to toggle on Caller ID and spam protection, to automatically identify and block numbers flagged as potential scams.

    8) Pause if something feels urgent and frightening

    Scammers depend on panic. Taking a moment to breathe could save your savings.

    9) Report suspicious activity immediately

    If you suspect a scam, contact your bank, file a complaint with the FTC at ReportFraud.ftc.gov and alert local law enforcement.

    What to do if you’ve been targeted

    If you believe you have fallen victim, act quickly.

    1) Contact your bank and request a freeze or close monitoring of your accounts.

    2) File a report with the FTC and your local police department, even if you believe recovery is unlikely.

    3) Keep every piece of evidence, including phone records, text messages and transfer confirmations.

    4) Change all passwords and enable transaction alerts on every sensitive account to prevent further damage. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Sign up with an Identity Theft Protection service that can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Fraud can strike anyone, anywhere, at any time. Scammers have become smarter, faster and more convincing than ever before. They use fear, urgency and technology to make their lies sound real. But you can fight back with knowledge and caution. Stay alert every time your phone rings or your inbox pings. Slow down before you react. Verify before you trust. The few seconds you take to double-check could be what saves your life savings. Remember, even the most tech-savvy people fall for scams when emotions take over. The real key to protection isn’t fear, it’s awareness and action. Share what you know with friends, family and coworkers. The more people who understand how these scams work, the harder it becomes for criminals to win.

    Are banks really doing enough to protect you from impostor scams? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Stop foreign-owned apps from harvesting your personal data

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You might not think twice about that flashlight app you downloaded or the cute game your grandkids recommended. Yet with a single tap, your private data could travel halfway across the world into the hands of people who profit from selling it. A growing threat is emerging as foreign-owned apps quietly collect massive amounts of personal data about you, and older Americans are among the most vulnerable.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    The hidden cost of ‘free’ apps

    We all love free apps. Whether it’s a shopping deal finder, a weather tracker or a photo editor, they make life easier. But many of these “free” tools aren’t really free; they just don’t charge you money. Instead, they collect your personal information and sell it to make their profit.

    A recent study revealed that over half of the most popular foreign-owned apps available in U.S. app stores collect sensitive user data, including your location, contacts, photos and even keystrokes.

    Many “free” apps secretly collect personal data from users, sending private information to foreign servers without consent. (Kurt “CyberGuy” Knutsson)

    Some of the worst offenders are apps that seem completely harmless:

    • Flashlight and weather apps that track your GPS location 24/7.
    • Shopping apps that collect purchase history, payment preferences and home addresses.
    • Casual games that request access to your camera and contacts for no logical reason.

    These apps often share data with data brokers and ad networks overseas, where privacy laws are weaker and accountability is nearly impossible.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Why retirees are prime targets

    If you’re retired, you may already be on dozens of public databases like voter rolls, real estate listings and charity donor lists. Combine that with information harvested from apps, and scammers can build a frighteningly detailed profile of your life.

    Young woman types on smartphone

    Flashlight, weather and shopping apps often request unnecessary access to your camera, contacts and location to track you around the clock. (Portra/Getty Images)

    They can see:

    • Where you live and who lives with you.
    • What medications you search for.
    • What causes you support or charities you donate to.
    • What devices you own and which banks you use.

    From there, they can craft highly convincing scams like fake donation requests, Medicare scams or phishing texts that look eerily personal. Some even use your social media photos to mimic family members in “grandparent scams.” And it all starts with what you allowed that “harmless” app to access.

    Signs your data might already be exposed

    You don’t need to be a tech expert to spot the warning signs. Here’s what to look for:

    • Unfamiliar charges or new accounts in your name.
    • An increase in scam calls or texts, especially with personal details like your city or bank.
    • Emails from foreign domains claiming to offer rewards or urgent account updates.
    • Ads that seem to “read your mind,” which show up right after you talk about something offline.

    If you’ve noticed any of these, your information is likely circulating through data brokers who purchased it from app networks.

    A smartphone displays apps.

    Older Americans are prime targets, but simple steps like deleting risky apps and reviewing permissions can help protect your privacy. (Kurt “CyberGuy” Knutsson)

    How to stop the data drain

    You can take back control of your data starting right now.

    1) Audit your apps

    Go through your phone and delete any apps you don’t use regularly, especially free ones from unfamiliar developers.

    2) Stop data brokers from trading your info

    Even after deleting risky apps, your personal information may already be circulating online. This is where a data removal service can make a massive difference. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    3) Check permissions

    Open your settings and review which apps have access to your location, contacts or camera. Revoke any unnecessary permissions immediately.

    TEA APP HACKED AS WOMEN’S PHOTOS, IDS & EVEN DMS LEAKED ONLINE

    4) Avoid “foreign-owned” apps that request extensive access without a clear reason.

    Always read the privacy policy (yes, it’s tedious but eye-opening). If an app asks for permissions that do not match its purpose, like a calculator wanting your location or a flashlight needing camera access, that is a major red flag. Many foreign-owned apps hide behind vague privacy terms that allow data to be transferred to overseas servers where U.S. privacy laws do not apply.

    5) Use official stores only

    Stick to the Apple App Store or Google Play Store for downloads. Avoid third-party sites that host cloned or tampered versions of popular apps. Look for verified developers and check privacy ratings in reviews before installing anything new.

    6) Keep your device and apps updated

    Updates close security holes that hackers exploit through malicious apps. Turn on automatic updates so your phone and apps stay protected without you having to remember.

    7) Turn off ad tracking

    Limit how much of your activity is shared with advertisers. 

    On iPhone:

    Go to Settings Privacy & Security Tracking and toggle off “Allow Apps to Request to Track.” 

    On Android: 

    (Settings may vary depending on your Android phone’s manufacturer) 

    Go to Settings → Google → Ads (or Settings → Privacy → Ads) and choose “Delete advertising ID” or “Reset advertising ID.” This action removes or replaces your unique ID so apps and advertisers can no longer use it for personalized ad tracking.

    This step stops apps from following you across other platforms and building data profiles about your habits.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Foreign-owned apps are the new front line in data harvesting, and retirees are the easiest targets. But you don’t have to accept that your private life is public property. It’s time to take back control. Delete the apps you don’t need. Lock down your permissions. And let a data removal service erase your data trail before scammers can use it against you.

    Have you checked which of your apps might be secretly sending your personal data overseas? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Police/Fire

    [ad_1]

    In news taken from the logs of Cape Ann’s police and fire departments:

    Rockport


    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAmkDEC@?8m%F6D52J[ }@G] ck^DEC@?8mk^Am

    kAmkDEC@?8m`idb 2]>]ik^DEC@?8m p 3F:=5:?8 @? qC@25H2J H2D 4964<65 2?5 D64FC65]k^Am

    kAmkDEC@?8m|@?52J[ }@G] bk^DEC@?8mk^Am

    kAmkDEC@?8mdi`a A]>]ik^DEC@?8m p >65:42= 6>6C86?4J 2>3F=2?46 EC2?DA@CE H2D 4@?5F4E65 7C@> qC@25H2J]k^Am

    kAmkDEC@?8mciaa A]>]ik^DEC@?8m }2E:@?2= vC:5 H2D ?@E:7:65 @7 2 C6A@CE @7 5@H?65 H:C6D @? !=62D2?E $EC66E]k^Am

    kAmkDEC@?8m`_i_b 2]>]ik^DEC@?8m p A@=:46 H6==?6DD 4964< H2D 4@?5F4E65 @? |2:? $EC66E]k^Am

    kAmkDEC@?8mgibd 2]>]ik^DEC@?8m p7E6C 2 >65:42= 2=2C> H2D C6A@CE65 @? rFCE:D $EC66E[ >65:42= 2>3F=2?46 D6CG:46 H2D C67FD65]k^Am

    kAmkDEC@?8mu:C6 2=2C>Dk^DEC@?8m C6A@CE65 23@FE 2 A@DD:3=6 3CFD9 7:C6 2E {@?8 q6249 2E eiaf 2]>] 2?5 @? $@FE9 $EC66E 2E gi_e 2]>] H6C6 =2E6C 56E6C>:?65 E@ 36 72=D6]k^Am

    kAmkDEC@?8m“k^DEC@?8m%92E H2D 2 72=D6 2=2C>[” 7:C6 r9:67 |2C< (@?D@? D2:5 @7 E96 {@?8 q6249 2=2C>] “(6 D62C4965 E96 2C62 2?5 4@F=5?’E 7:?5 2?JE9:?8]”k^Am

    k9bm|2?496DE6C3JE96$62k^9bm

    kAmkDEC@?8m|@?52J[ }@G] bk^DEC@?8mk^Am

    kAmkDEC@?8m`_ibg A]>]ik^DEC@?8m p C6BF6DE C6=2E65 E@ 2 FE:=:EJ H2D >256 @? #2J>@?5 $EC66E]k^Am

    kAmkDEC@?8m`iab A]>]ik^DEC@?8m {@DE 2?5 7@F?5 AC@A6CEJ H2D C6A@CE65 @? r6?EC2= $EC66E]k^Am

    kAmkDEC@?8m`_ibg 2]>]ik^DEC@?8m p H6=72C6 4964< H2D 4@?5F4E65 @? }6HA@CE !2C< #@25]k^Am

    kAmkDEC@?8m`_i_d 2]>]ik^DEC@?8m p 4@>A=2:?E 23@FE ?@:D6 @? r6?EC2= $EC66E H2D =@5865]k^Am

    k9bmv=@F46DE6Ck^9bm

    kAmkDEC@?8muC:52J[ ~4E] ack^DEC@?8mk^Am

    kAmkDEC@?8mhi_g A]>]k^DEC@?8mi p A6CD@? C6A@CE65=J >@2?:?8 @FED:56 27E6C J6==:?8 @? $2C86?E $EC66E 4@F=5 ?@E 36 =@42E65]k^Am

    kAmkDEC@?8mgi_e A]>]k^DEC@?8mi p =:7E 2DD:DE @? u=F>6 #@25 H2D C676CC65 E@ E96 u:C6 s6A2CE>6?E]k^Am

    kAmkDEC@?8meia` A]>]k^DEC@?8mi $6CG:46D H6C6 C6?56C65 7@C 2 C6A@CE @7 >@E@CG69:4=6 E967E @? |2:? $EC66E]k^Am

    kAmkDEC@?8mdicc A]>]k^DEC@?8mi p 7:C6 2=2C> 24E:G2E:@? @? #@86CD $EC66E H2D C676CC65 E@ E96 u:C6 s6A2CE>6?E]k^Am

    kAmkDEC@?8mdibb A]>]k^DEC@?8mi p C6A@CE @7 E9C62ED @? |2A=6H@@5 pG6?F6 H2D F?7@F?565]k^Am

    kAmkDEC@?8mciaf A]>]k^DEC@?8mi }@ 24E:@? H2D C6BF:C65 7@C 2 C6A@CE @7 2 5:D23=65 G69:4=6 @? #@FE6 `ag ?@CE93@F?5]k^Am

    kAmkDEC@?8mbi`b A]>]k^DEC@?8mi p C6A@CE @7 2? :?42A24:E2E65 A6CD@? @? $49@@= w@FD6 2?5 v=@F46DE6C rC@DD:?8 C@25D H2D C676CC65 E@ 2?@E96C 286?4J]k^Am

    kAmkDEC@?8mbi`_ A]>]k^DEC@?8mi $6CG:46D H6C6 C6?56C65 7@C 2 C6A@CE @7 2 5:DEFC32?46 @? ‘6E6C2?D (2J]k^Am

    kAmkDEC@?8mbi_h A]>]k^DEC@?8mi p C6A@CE @7 2 5@H?65 H:C6 2E r2AE] y@6 2?5 $@?D u:D9 r@] 2E hd t2DE |2:? $E] H2D C676CC65 E@ 2?@E96C 286?4J] ‘6C:K@? H2D ?@E:7:65 @7 2 =@H92?8:?8 H:C6]k^Am

    kAmkDEC@?8maibg A]>]k^DEC@?8mi }@ 24E:@? H2D C6BF:C65 7@C 2 C6A@CE @7 2 DFDA:4:@FD G69:4=6 @? (2D9:?8E@? $EC66E]k^Am

    kAmkDEC@?8m“id_ 2]>]k^DEC@?8mi !6246 H2D C6DE@C65 27E6C 2 C6A@CE @7 5CF8 24E:G:EJ @? *@F?8D #@25] !@=:46 7@F?5 2 H@>2? 2C8F:?8 H:E9 2?@E96C A2CEJ 😕 2 %@J@E2 r2>CJ @G6C >@?6J]k^Am

    kAmkDEC@?8mhibg 2]>]k^DEC@?8mi !6246 H2D C6DE@C65 27E6C 2 C6A@CE @7 2 5:DEFC32?46 2E u@DE6C’D $96== @? t2DE6C? pG6?F6]k^Am

    kAmkDEC@?8mhi_a 2]>]k^DEC@?8mi $6CG:46 H2D >256 7@C 2 C6A@CE @7 563C:D 😕 E96 C@25H2J @? p] !:2EE p?5C6H qC:586]k^Am

    kAmkDEC@?8mfib` 2]>]k^DEC@?8mi $6CG:46D H6C6 C6?56C65 7@C 2 C6A@CE @7 2 A2C<:?8 4@>A=2:?E @? rC@DD $EC66E]k^Am

    kAmkDEC@?8mfiah 2]>]k^DEC@?8mi p c`J62C@=5 v=@F46DE6C C6D:56?E H2D 2CC6DE65 @? 2 492C86 @7 2DD2F=E 2?5 32EE6CJ @? 2? :?E:>2E6 A2CE?6C 27E6C 2 C6A@CE @7 2 5:DEFC32?46 @? xGJ r@FCE]k^Am

    kAmkDEC@?8meid` 2]>]k^DEC@?8mi $6CG:46D H6C6 C6?56C65 7@C 2 ;FG6?:=6 >2EE6C @? !6C<:?D $EC66E]k^Am

    kAmkDEC@?8meibg 2]>]k^DEC@?8mi !2C<:?8 6?7@C46>6?E H2D C6BF6DE65 2E u:CDE q2AE:DE r9FC49 @? v=@F46DE6C pG6?F6]k^Am

    kAmkDEC@?8m%9FCD52J[ ~4E] abk^DEC@?8mk^Am

    kAmkDEC@?8m`_iab A]>]k^DEC@?8mi p DFDA:4:@FD G69:4=6 C6A@CE65 (2D9:?8E@? $EC66E 4@F=5 ?@E 36 =@42E65]k^Am

    kAmkDEC@?8m`_i`b A]>]k^DEC@?8mi p 42==6C C6A@CE65 2 42C3@? >@?@I:56 2=2C> 24E:G2E:@? @? (966=6C $EC66E] %96 u:C6 s6A2CE>6?E H2D ?@E:7:65]k^Am

    kAmkDEC@?8mhidg A]>]k^DEC@?8mi !6246 H2D C6DE@C65 27E6C 2 C6A@CE @7 D@>6@?6 J6==:?8 @? w2C3@C {@@A 2E giac A]> 2?5 2 ?@:D6 4@>A=:2?E @? (2C?6C $EC66E 2E hidg A]>]k^Am

    kAmkDEC@?8mei_c A]>]k^DEC@?8mi }@ 24E:@? H2D C6BF:C65 7@C 2 C6A@CE @7 2 5:DEFC32?46 @? #2:=C@25 pG6?F6 2?5 $49@@= $EC66E]k^Am

    kAmkDEC@?8mdiae A]>]k^DEC@?8mi $6CG:46D H6C6 C6?56C65 7@C 2 C6A@CE @7 =@:E6C:?8 2E E96 u:EK w6?CJ {2?6 w@FD6 @? w2C3@C {@@A]k^Am

    kAmkDEC@?8mci_g A]>]k^DEC@?8mi $6CG:46D H6C6 C6?56C65 7@C 2 C6A@CE @7 EH@ A6@A=6 =@4<65 😕 2 DE@C6 @? |2:? $EC66E]k^Am

    kAmkDEC@?8m`icb A]>]k^DEC@?8mi $6CG:46D H6C6 C6?56C65 7@C 2 C6A@CE @7 563C:D 😕 E96 C@25H2J 367@C6 tI:E db @? #@FE6 `ag D@FE93@F?5]k^Am

    kAmkDEC@?8mrC2D96D H:E9 AC@A6CEJ 52>286 @?=Jk^DEC@?8mi ~?6 @? vC2?E r:C4=6 2E fid_ 2]>] H2D F?56C :?G6DE:82E:@?[ H9:=6 D6CG:46D H6C6 AC@G:565 7@C C6A@CED 2E t2DE |2:? $EC66E 2?5 !2C<6C r@FCE 2E ` A]>] 2?5 2E E96 C@E2CJ @? v=@F46DE6C rC@DD:?8 #@25 2E `i`c A]>]k^Am

    kAmkDEC@?8m`aica A]>]k^DEC@?8mi $6CG:46D H6C6 C6?56C65 7@C 2 C6A@CE @7 92C2DD>6?E E2<6? 2E E96 !@=:46 s6A2CE>6?E @? |2:? $EC66E]k^Am

    kAmkDEC@?8m`_i_d 2]>]k^DEC@?8mi %96 u:C6 s6A2CE>6?E H2D 2DD:DE65 H:E9 2 42== 7C@> E96 v=@F46DE6C u2>:=J w62=E9 r6?E6C @? (2D9:?8E@? $EC66E]k^Am

    kAmkDEC@?8mgid_ 2]>]k^DEC@?8mi p >2? H2D 2CC6DE65 @? 2? 24E:G6 H2CC2?E 😕 E96 !@A=2C !2C< 2C62 27E6C 2? @77:46C @? A2EC@=[ 2H2C6 @7 E96 H2CC2?E[ D2H 9:> C:5:?8 2 3:4J4=6 E96C6] !@=:46 AFE E96 >2?’D 3:4J4=6 2E 9:D >@E96C’D 2A2CE>6?E] w6 H2D 2CC6DE65 H:E9@FE :?4:56?E 2?5 6G6?EF2==J EC2?D76CC65 E@ 4@FCE 4FDE@5J]k^Am

    kAmkDEC@?8m`i`f 2]>]k^DEC@?8mi p A6CD@? 😕 4FDE@5J H2D E2<6? E@ p55:D@? v:=36CE w@DA:E2= @? (2D9:?8E@? $EC66E]k^Am

    [ad_2]

    Source link

  • Ghost-tapping scam targets tap-to-pay users

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new scam called ghost tapping is spreading across the country. The Better Business Bureau (BBB) warns that scammers are using this tactic to steal money from people who use tap-to-pay credit cards and mobile wallets.

    This scam exploits wireless technology to withdraw money without your awareness. Many victims only realize something is wrong after small, unnoticed transactions slowly drain their accounts.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    The Better Business Bureau warns of a new “ghost-tapping” scam draining money from tap-to-pay cards and mobile wallets. (Clara Margais/picture alliance via Getty Images)

    How the ghost-tapping scam works

    Scammers use near-field communication (NFC) devices that mimic legitimate tap-to-pay systems. In busy places such as festivals, markets, or public transportation, they move close enough to your wallet or phone to trigger a transaction.

    The BBB reports that some scammers pose as charity vendors or market sellers who only accept tap payments. Once you tap your card or phone, they charge far more than the agreed amount.

    Because the first few withdrawals are usually small, they often go undetected by fraud systems. Victims may not notice until much later, when more money has been taken.

    Real-life cases and warnings

    A Missouri resident reportedly lost $100 after being approached by a person carrying a handheld card reader. The BBB Scam Tracker has recorded many similar cases across the nation, with losses sometimes exceeding $1,000.

    Officials warn that scammers may pressure you to complete payments quickly, preventing you from verifying the amount or merchant name. Some even carry portable readers that can pick up signals through thin wallets or purses.

    How to protect yourself from ghost tapping

    While the threat of ghost tapping may sound alarming, protecting yourself is easier than you think. A few smart habits and security tools can greatly reduce your risk of falling victim.

    1) Use RFID-blocking technology

    Invest in an RFID-blocking wallet or card sleeve to create a physical barrier between your card and potential scanners. These inexpensive tools prevent scammers from reading your card information through clothing, bags, or wallets. Look for sleeves or wallets specifically designed to block wireless communication.

    2) Verify before you tap

    Always check the merchant name and transaction amount displayed on the payment terminal before tapping. Scammers often rush you to avoid scrutiny. Take an extra second to confirm what you see matches what you agreed to pay. If something looks off, cancel the transaction immediately.

    3) Set up instant alerts

    Enable instant transaction alerts from your bank or credit card provider. This lets you know the moment a payment is made, giving you a chance to spot unauthorized activity right away. Quick detection can prevent further charges and make it easier to dispute fraudulent transactions.

    Bonus protection: Even if you stop a scam early, your personal data can end up for sale online. Our No. 1 identity theft company monitors your credit and financial information, alerting you if your details appear on the dark web or in a data breach.  

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    You can also use a data removal service to automatically delete your personal information from data broker sites that sell it, keeping you off scam lists before the next attack.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

     

    Woman tapping her credit card at the groceries.

    The BBB says reports of “ghost tapping” are rising, with some victims losing more than $1,000 to contactless theft. (M. Scott Brauer/Bloomberg via Getty Images)

    4) Be cautious in crowded areas

    Crowded environments such as festivals, public transportation, or street fairs create perfect conditions for scammers to blend in. Limit tap-to-pay use in these situations. Instead, use chip or swipe methods, which require physical contact and are harder to exploit.

    5) Monitor your accounts regularly

    Make it a habit to check your financial accounts at least once a week. Review each transaction carefully and report anything suspicious to your bank immediately. Even small unexplained charges could signal a larger problem.

    6) Use payment app security features

    Most mobile wallet apps allow you to set PINs, facial recognition, or fingerprint verification before authorizing a transaction. Make sure these protections are enabled. This adds another barrier that prevents criminals from initiating payments without your consent.

    7) Keep your payment apps and devices updated

    Regularly update your smartphone’s software and mobile wallet apps. Updates often include security patches that protect against newly discovered vulnerabilities scammers might exploit. Outdated software can leave your data exposed.

    Stay protected from payment-stealing malware:

    In addition to keeping your apps updated, protect your device from hidden threats with strong antivirus software. It scans for malicious apps and spyware that can hijack your tap-to-pay data or record sensitive information. 

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    8) Avoid saving multiple cards on mobile wallets

    While convenient, storing several cards in one app can increase your exposure if your phone is compromised. Keep only the cards you use most often connected to your mobile wallet. This reduces the impact of potential fraudulent activity.

    9) Report suspicious activity promptly

    If you ever suspect ghost tapping or notice a strange charge, contact your bank immediately and report the scam to the BBB Scam Tracker. Quick action can help prevent additional losses and assist authorities in identifying scam trends.

    Man paying for his purchase.

    Victims of “ghost tapping” often lose money through small, unnoticed transactions before realizing they’ve been scammed. (Leonie Asendorpf/picture alliance via Getty Images)

    Kurt’s key takeaways

    As contactless payments become more common, scammers are getting more creative. Staying informed and cautious can help protect your money. Small steps like checking your transaction history and using protective gear can make a big difference. If you notice unauthorized charges, contact your bank immediately, freeze your card and report the scam to the BBB Scam Tracker. Technology offers convenience but can also create new risks. The ghost-tapping scam shows how quickly and easily payments can invite hidden dangers. Awareness and prevention remain the best ways to keep your finances safe.

    Will you keep using tap-to-pay after learning about ghost tapping, or switch back to more traditional payment methods? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 3,000+ YouTube videos deliver malware disguised as free software

    [ad_1]

    NEWYou can now listen to Fox News articles!

    YouTube is arguably the most popular and most visited platform for entertainment, education and tutorials. There’s a video for everything on YouTube, whether you want to learn how to cook, ride a bike or need help with work or school. But recent research by Check Point reveals a darker side: a sprawling malware distribution network quietly operating within the platform. Hackers are using compromised accounts, fake engagement and clever social engineering to spread information-stealing malware disguised in more than 3,000 software cracks and game hack videos.

    Most victims begin by searching for free or cracked software, cheat tools or game hacks, which is the root of the infection chain. This curiosity for “free” software opens the door to the Ghost Network’s traps.

    META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARE

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Cybercriminals are exploiting YouTube’s massive reach by disguising malware inside fake “how-to” and “free software” videos. (Kurt “CyberGuy” Knutsson)

    All about YouTube’s ghost network

    According to Check Point Research, the YouTube Ghost Network has been active since 2021, with activity surging threefold in 2025. It’s built around a simple but effective formula, which blends social manipulation with technical stealth. The network’s primary targets are people searching for “Game Hacks/Cheats” and “Software Cracks/Piracy.”

    Researchers discovered that these videos often feature positive comments, likes and community posts from compromised or fake accounts. This coordinated engagement gives potential victims a false sense of safety.

    The fake social proof and fabricated likes, comments and subscriber activity play a key psychological role. They trick viewers into believing the content is legitimate and widely trusted, allowing the operation to persist even when YouTube removes individual videos or channels. The network’s modular structure and constant replacement of banned accounts make takedowns only temporarily effective.

    Once a user clicks the provided links, they’re usually taken to file-sharing services or phishing sites hosted on Google Sites, MediaFire, Dropbox or similar platforms. The linked files are often password-protected archives, making them harder for antivirus tools to scan. Victims are then asked to disable Windows Defender before installation, effectively disarming their own protection before running the malware.

    Check Point found that the majority of these attacks deliver information-stealing malware such as Lumma Stealer, Rhadamanthys, StealC and RedLine. These programs harvest passwords, browser data and other sensitive information, sending it back to the attacker’s command and control servers.

    What makes the network particularly resilient is its role-based structure. Each compromised YouTube account serves a function; some upload malicious videos, others post download links and a third group boosts credibility by commenting and liking content. When an account gets banned, it’s quickly replaced, allowing the operation to continue largely uninterrupted.

    YouTube.com displayed on a laptop

    A single click on a malicious link can disable your defenses and install information-stealing malware in seconds. (Kurt “CyberGuy” Knutsson)

    Inside the malicious campaigns

    Two major campaigns stood out in Check Point’s investigation. The first involved the Rhadamanthys infostealer, spread through a compromised YouTube channel named @Sound_Writer, which had nearly 10,000 subscribers.

    The attackers uploaded fake cryptocurrency-related videos and used phishing pages on Google Sites to distribute malicious archives. These pages instructed viewers to “turn off Windows Defender temporarily,” assuring them it was a false alert. The archives contained executable files that quietly installed the Rhadamanthys malware, which connected to multiple control servers to exfiltrate stolen data.

    The second campaign, involving HijackLoader and Rhadamanthys, leveraged a much larger channel, @Afonesio1, with around 129,000 subscribers. Here, attackers uploaded videos offering cracked versions of Adobe Photoshop, Premiere Pro, and FL Studio.

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    One of these videos gained over 291,000 views and dozens of glowing comments claiming the software worked perfectly. The malware was hidden inside a password-protected archive linked through a community post. The installer used HijackLoader to drop the Rhadamanthys payload, which then connected to rotating control servers every few days to avoid detection.

    Even if you never complete the installation, you can still be at risk. Simply visiting the phishing or file-hosting sites may expose you to malicious scripts or credential theft prompts disguised as “verification” steps. Clicking the wrong link can compromise login data before any software is even installed.

    youtube smartphone

    Strong passwords, two-factor authentication, and regular security scans are your best defense against YouTube’s Ghost Network. (Cyberguy.com)

    7 steps you can take to stay safe from YouTube’s ghost network

    The Ghost Network succeeds by exploiting curiosity and trust. It disguises malware as “free software” or “game hacks,” relying on users to click before thinking. Protecting yourself means adopting habits that make it harder for attackers to fool you. Here are seven steps to stay safe:

    1) Avoid cracked software and cheat downloads

    Most infections start with people trying to download pirated or modified programs. These files are often hosted on unregulated file-sharing websites where anyone can upload malicious content. Even if a YouTube video looks polished or filled with positive comments, that doesn’t mean it’s safe. Official software developers and gaming studios never distribute downloads through YouTube links or third-party sites.

    Besides being dangerous, downloading cracked software also poses legal risks. Piracy violates copyright law and can lead to serious consequences, while giving cybercriminals a perfect delivery channel for malware.

    2) Use a strong antivirus

    Make sure you have a trusted antivirus solution installed and always running. Real-time protection can detect suspicious downloads and block harmful files before they do any damage. Schedule regular system scans and keep your antivirus updated so it can recognize the latest threats.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE

    3) Never disable your antivirus or Windows Defender

    If a tutorial or installer tells you to disable your security software, that’s a red flag. Malware creators use this trick to bypass detection. There’s no legitimate reason to turn off protection, even temporarily. The moment a file asks you to do so, delete it immediately.

    4) Be cautious with YouTube links and download sources

    Always inspect links before clicking. Hover over them to check the destination and avoid shortened or redirected URLs that hide their true target. Downloads hosted on unfamiliar domains or file-sharing sites should be treated as unsafe. If you need software, get it directly from the official website or trusted open-source communities.

    5) Use a password manager and enable two-factor authentication (2FA)

    Turning on 2FA for important accounts adds another layer of protection, ensuring that even if someone gets your password, they can’t access your account. Malware often aims to steal saved passwords and browser data. Storing credentials in a password manager keeps them encrypted and separate from your browser, making them harder to steal. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com

    6) Keep your operating system and apps updated

    Software updates don’t just bring new features, but they also fix security flaws that malware can exploit. Enable automatic updates for your system, browser, and commonly used applications. Staying up to date is one of the simplest ways to prevent infections.

    7) Use a trusted data removal service

    Even after securing your system, your personal information might already be circulating online from past breaches. A reliable data removal service can continuously scan and request deletion of your data from people-search and broker sites, making it harder for cybercriminals to exploit your exposed information.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Cybercriminals have evolved beyond traditional phishing and email scams. By exploiting a platform built on trust and engagement, they have created a scalable, self-sustaining system for malware distribution. Frequent file updates, password-protected payloads, and shifting control servers make these campaigns difficult for both YouTube and security vendors to detect and shut down.

    Do you think YouTube is doing enough to stop malware distribution on its platform? Let us know by writing to us at CyberGuy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Mexican mayor who waged war on cartels is slain while celebrating Day of the Dead

    [ad_1]

    Carlos Manzo was famous in Mexico for saying what few other politicians would: That cartels operated with impunity and needed to be confronted with brute force. The mayor of a city in an avocado-growing region beset by crime and violence, Manzo suggested authorities should beat criminals into submission — or simply kill them.

    It was a provocative message that resonated in some sectors of a country long afflicted by drug war bloodshed. Many here viewed Manzo, with his trademark white cowboy hat, as a hero.

    But his iron fist rhetoric and criticism of the federal government’s security strategy also earned him enemies. Manzo acknowledged as much, saying he knew he could be targeted by organized crime. “I don’t want to be just another murdered mayor,” he said last month. “But it is important not to let fear control us.”

    Manzo, 40, was gunned down Saturday night as he presided over a public celebration of Day of the Dead in a central square in Uruapan, a city of 300,000 in the western state of Michoacán. One suspected gunman was killed and two others arrested.

    The slaying, captured on video, provoked outcry throughout Mexico and in Washington.

    Mexican President Claudia Sheinbaum, with whom Manzo often sparred on issues of security, mourned an “irreparable loss.” U.S. Deputy Secretary of State Christopher Landau posted a photograph of Manzo smiling and holding his young son just moments before the attack. “The U.S. stands ready to deepen security cooperation with Mexico to wipe out organized crime,” Landau wrote.

    Manzo was a part of a new wave of leaders throughout the Americas who have called for a hard line against criminals.

    It’s a club that includes President Nayib Bukele of El Salvador, who has locked up tens of thousands of people accused of gang ties, with little to no due process, and President Trump, who has pushed a more militaristic approach to combating cartels, saying the U.S. should “wage war” on drug traffickers.

    The U.S. military has killed 65 people in recent months who it alleges were smuggling drugs in the Caribbean and the Pacific, including several attacks off Mexico’s coastline. Trump administration leaders have warned of the possibility of U.S. attacks on cartel targets on Mexican soil.

    Calls for a violent crackdown on organized crime are at odds with the security strategy embraced by Sheinbaum and her predecessor, Andrés Manuel López Obrador. Both emphasized the need to address root causes of violence, including poverty and social disintegration.

    López Obrador, especially, vowed to break with the confrontational approaches of past Mexican administrations, whose military operations he said failed to weaken cartels and only fueled violence. What Mexico needed, López Obrador often said, was “hugs, not bullets.”

    Manzo — who got his start in politics as a member of López Obrador and Sheinbaum’s Morena party but later became an independent — fiercely criticized that mantra.

    “Hugs … are for Mexicans who live in extreme poverty,” Manzo said. “Criminals, assassins … they deserve beatings and the full force of the Mexican state.” He encouraged police officers in Uruapan to use lethal force against criminals who resist arrest.

    The mayor frequently criticized Sheinbaum for not doing more to confront cartels, even though there has been a decrease in homicides and an uptick in drug seizures and arrests since she took office. Sheinbaum has said that security in Mexico depends on reinforcing the rule of law, including giving suspects a fair trial.

    The son of a community activist, Manzo became mayor of Uruapan in 2024. The city has been the site of some of Mexico’s worst drug war atrocities — kidnappings, bombings, bodies hung from highway overpasses — as a volatile mix of criminal groups battle for control of trafficking routes and profits from the lucrative avocado industry.

    Manzo appeared Saturday with his family at a crowded public event in Uruapan’s central plaza to mark the Day of the Dead holiday. He posed for photographs with fans and broadcast the candle-lighting event live on social media, sending “blessings to all.”

    When a journalist asked about security at the event, Manzo responded: “There is a presence from different levels of government. We hope everything goes well, is peaceful, and that you enjoy the evening.”

    Minutes later, shots — then screams — rang out. Manzo lay on the ground, bleeding. Nearby lay his white cowboy hat.

    Security consultant David Saucedo, who said Manzo was accompanied at the event by local police and 14 members of Mexico’s national guard, described the killing as a “kamikaze attack,” saying it was clear the shooter would be killed.

    Manzo, Saucedo said, had been “brave but reckless” in his quest to confront organized crime. “Carlos lacked the human, financial, and material resources to defeat the cartels,” Saucedo said. His killing “makes it clear that even with political will, defeating the cartels at the municipal level is an impossible mission.”

    The mayor’s slaying was the latest in a string of violent incidents in Michoacán. Last month, officials announced they had discovered the body of Bernardo Bravo Manríquez, the head of a lime growers association who had repeatedly denounced extortion demands against agricultural producers.

    Cecilia Sánchez Vidal in The Times’ Mexico City bureau contributed to this report.

    [ad_2]

    Kate Linthicum

    Source link

  • Hackers target online stores with new attack

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A security researcher found a serious weakness in the software that powers thousands of e-commerce sites. The platform, called Magento, and its paid version Adobe Commerce, has a bug that lets attackers break into active shopping sessions. Some attackers can even take control of the entire store.

    The flaw is known as SessionReaper. It allows hackers to pretend they are real customers without needing a password. Once they are inside, they can steal data, make fake orders, or install tools that collect credit card details.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Why is this attack so serious?

    The problem starts in the part of the system that handles how a store communicates with other online services. Because the software does not properly check the information it receives, it sometimes trusts data that it should not. Hackers take advantage of this by sending fake session files that the store accepts as real.

    Researchers at SecPod warn that successful attacks can lead to stolen customer data, fake purchases, and even full control of the store’s server.

    Once the attack method was shared publicly, cybercriminals began using it right away. Security experts at Sansec reported that more than 250 online stores were compromised within a single day. This shows how quickly attacks can spread once a vulnerability becomes public.

    Hackers are exploiting a new flaw called SessionReaper to hijack active shopping sessions on thousands of e-commerce sites running Adobe Commerce and Magento. (Kurt Knutsson)

    Why are many stores still unprotected?

    Adobe released a security update on September 9 to fix the issue. Weeks later, about 62 percent of affected stores still have not installed it. Some store owners are afraid an update might break features on their site. Others simply do not know how serious the risk is.

    Every unpatched store remains an open door for attackers who want to steal information or install malicious code.

    MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

    How can you stay safe when shopping online?

    While store owners are responsible for fixing the problem, you can still take smart steps to protect yourself when shopping online. These actions can help you spot danger early and keep your personal information safe.

    1) Look for warning signs

    Always pay attention to how a website behaves. If a page looks odd, loads slowly, or shows error messages, it could mean something is wrong behind the scenes. Check for the small padlock symbol in the address bar that shows the site uses HTTPS encryption. If it is missing or the site redirects you to an unfamiliar page, stop and close the browser tab immediately. Trust your instincts if something feels off.

    2) Be careful with email links and use a data removal service 

    Cybercriminals often use fake promotional emails or ads that look like real store offers. Instead of clicking links in messages or banners, type the store’s web address directly into your browser to avoid phishing pages designed to steal your login details or card information. Since attacks like SessionReaper can expose your personal data to criminal marketplaces, consider using a reputable data removal service that continuously scans and deletes your private information, such as your address, phone number, and email, from data broker sites. This reduces your risk of identity theft if your information has been leaked through a compromised online store.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    A person types on a laptop computer in a home office setting, representing remote access points targeted in data breaches.

    Cybersecurity teams at SecPod and Sansec tracked more than 250 stores breached within 24 hours of the exploit going public, showing how fast these attacks spread. (Kurt “CyberGuy” Knutsson)

    3) Use strong antivirus software

    Strong antivirus protection is your silent guard online. Choose reputable software that offers real-time protection, safe browsing alerts, and automatic updates. A strong antivirus program can detect malicious code that tries to run on your device, block unsafe sites, and alert you to potential threats. This adds another crucial layer of defense when visiting online stores that may not be fully secure.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 

    4) Use safe payment options

    Whenever possible, choose payment services that add an extra layer of protection between your bank account and the online store. Platforms like PayPal, Apple Pay, or Google Pay do not share your card number with the retailer. This reduces the chance of your information being stolen if the store is compromised. These payment gateways also offer dispute protection if a purchase turns out to be fraudulent.

    5) Shop with trusted retailers

    Stick to stores with a solid reputation. Well-known brands usually have better security and faster response times when issues arise. Before buying from a new website, check its reviews on trusted consumer sites. Look for signs of credibility such as clear contact information, a professional design, and verified payment options. A few minutes of research can save you from weeks of frustration.

    TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED

    6) Keep your devices updated

    Updates may seem annoying, but they are one of the most effective ways to protect your data. Make sure your computer, smartphone, and web browser all have the latest security patches installed. Updates often fix the exact kinds of flaws hackers use to spread attacks like SessionReaper. Enable automatic updates if you can, so your devices stay protected without extra effort.

    7) Use unique, strong passwords

    If you create accounts on shopping sites, make sure each one has its own strong password. Avoid using the same password across multiple platforms. Consider using a password manager to generate and store long, random passwords. That way, if one account is compromised, your other logins stay safe.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    8) Turn on two-factor authentication

    If a site or payment service offers two-factor authentication, enable it. This adds a second security step, such as a code sent to your phone or generated by an app. Even if hackers steal your password, they will not be able to access your account without that second verification.

    Wallet with multiple debit/credit cards

    Even weeks after Adobe issued a critical patch for the SessionReaper vulnerability, nearly two-thirds of affected online stores remain unprotected, leaving customer data and payment information at high risk of theft. (CyberGuy.com)

    9) Avoid public Wi-Fi for purchases

    FARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANS

    Public Wi-Fi networks in places like cafés, airports, and hotels are often unsecured. Avoid entering payment information or logging in to accounts while connected to public networks. If you must make a purchase while away from home, use a mobile data connection or a reliable VPN to encrypt your activity. 

    10) Monitor your bank and credit statements

    Check your financial statements regularly for any unusual activity. Small, unauthorized charges can be early signs of fraud. Report any suspicious transactions to your bank or credit card company right away so they can freeze your account or issue a new card.

    11) Report suspicious activity

    If you notice anything strange during or after an online purchase, act quickly. Contact the store’s customer service to report what you saw. You should also inform your payment provider or credit card company so they can block unauthorized transactions. Reporting early can help stop further damage and alert other shoppers to potential risks.

    Kurt’s key takeaways

    The SessionReaper attack shows how fast online threats can appear and how long they can linger when updates are ignored. Even well-known stores can become unsafe overnight. For retailers, installing patches quickly is critical. For shoppers, staying alert and choosing secure payment methods are the best ways to stay protected.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Would you still shop online if you knew hackers could be hiding behind a store’s checkout page? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • 5 phone safety tips every parent should know

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Kids today are growing up in a world where screens, apps and social platforms are part of everyday life. From homework to gaming to group chats, their digital lives can move faster than parents can keep up. But behind every app and device are settings and systems that can impact their privacy, safety, and focus.

    Whether you’re trying to set healthy limits, track screen time or just understand what your child’s phone can do, knowing a few key tech terms can make parenting in the digital age a lot less stressful. Here’s a quick guide to help you stay informed, confident and in control.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

    Setting healthy screen time limits helps kids learn balance and keeps tech use from taking over family time. (Kurt “CyberGuy” Knutsson)

    1) Screen time limits

    The boundary that helps restore balance

    Screen time limits let you manage how long your child spends on apps, games or devices each day. It’s not about punishment, it’s about setting healthy boundaries that help kids disconnect and recharge.

    Why it matters: Too much screen time has been linked to reduced focus, sleep disruption and overstimulation. Setting limits helps your child create a better balance between online fun and real-world rest.

    How to set screen time limits

    On iPhone:

    • Go to Settings
    • Tap Screen Time
    • Click App Limits
    • Select Add Limit, choose categories or specific apps and set daily time limit

    On Android:

    Settings may vary depending on your Android phone’s manufacturer

    • Go to Settings
    • Tap Digital Wellbeing & Parental Controls. If you don’t see it right away, try searching “Digital Wellbeing” in the Settings search bar
    • Open the Dashboard or App Timers section. On some phones (like Samsung), it may appear as “App Timers”. On others (like Google Pixel), tap Dashboard to view your app usage list
    • Tap the hourglass icon next to the app you want to limit
    • Set a daily time limit, then tap OK or Done
    • The timer resets every night at midnight

    Pro tip: Make it a family routine. Review screen time reports together so kids feel involved in the process rather than restricted. 

    TEENS HACK SCHOOL CELL PHONE BANS WITH CREATIVE WORKAROUNDS

    2) Parental controls

    Your built-in safety net

    Parental controls are tools that let you manage what your child can see and do on their devices – from blocking explicit content to approving downloads and monitoring usage. Every major device, app and streaming service has its own version.

    Why it matters: Parental controls can help prevent exposure to inappropriate content, manage purchases and set up age-appropriate experiences.

    Woman using Iphone

    Built-in parental controls make it easier to guide what kids can see and do on their devices. (Kurt “CyberGuy” Knutsson)

    How to turn parental controls on

    On iPhone:

    • Go to Settings
    • Click Screen Time 
    • Tap Content & Privacy Restrictions
    • Turn it on so the toggle turns green.
    • Within Content & Privacy Restrictions you can go to sections like Allowed AppsiTunes & App Store Purchases, etc, to set filters and restrict what apps the device can do.

    On Android:

    Settings may vary depending on your Android phone‘s manufacturer

    • Go to Settings
    • Tap Digital Wellbeing & Parental Controls
    • Select Parental Controls, then follow the steps to set up a supervised account through Google Family Link, which lets you manage screen time on a child’s device remotely

    Pro tip: Most streaming apps, like YouTube, Netflix and Disney+, also have parental settings, so make sure you adjust those separately.

    3) Geolocation

    The invisible map in your child’s pocket

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    Geolocation allows apps and devices to track physical location in real time. It powers navigation and “Find My” features but can also share more than you intend if left unchecked.

    Why it matters: While location sharing helps families stay connected, it can pose privacy and safety concerns if apps broadcast your child’s whereabouts.

    How to manage location access

    On iPhone:

    • Go to Settings
    • Click Privacy & Security
    • Then, click Location Services
    • Tap each app and change “Always” to “While Using the App” or “Never”

    On Android:

    Settings may vary depending on your Android phone’s manufacturer

    • Go to Settings
    • Tap Location (or “Location & security” or “Privacy → Location” depending on device)
    • Tap App location permissions (or “Permission manager → Location”)
    • Select an app from the list
    • Change the app permission from, “Allow all the time” to “Allow only while using the app” or “Don’t Allow”

    Pro tip: For younger kids, use “Share My Location” within Family Sharing (iPhone) or Google Family Link (Android) instead of third-party tracking apps to ensure safer monitoring.

    4) Private browsing

    The mode that hides – but doesn’t erase

    Private browsing, also called Incognito Mode, lets users browse the internet without saving history, cookies or logins. While it may sound harmless, it can make it harder for parents to see what kids are accessing online.

    Why it matters: Private browsing prevents history tracking on the device, but your internet provider, school or router may still record activity. It’s a reminder that no browsing mode is completely private.

    TEENS FACE NEW PG-13 LIMITS ON INSTAGRAM

    How to disable private browsing

    On iPhone (Safari):

    • Open Settings
    • Tap Screen Time
    • Tap Content & Privacy Restrictions
    • If prompted, enter or set a Screen Time passcode
    • Turn on Content & Privacy Restrictions (toggle to green)
    • Tap App Store, Media & Purchases (or similarly named) and optionally set limits
    • Click Web Content 
    • Choose one of the options such as, Limit Adult Websites (this will disable Private Browsing in Safari) or Only Approved Websites 

    On Android (Chrome):

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Family Link app on your Android phone (or download it if it isn’t installed)
    • Select your child’s profile
    • Tap Controls
    • Click Google Chrome & Web
    • Choose Try to block explicit sites (or select “Only allow approved sites” for stricter filtering)
    • This setting automatically disables Incognito Mode in Chrome for your child’s supervised account
    • (Optional) You can also review SafeSearch and YouTube restrictions under the same section for extra protection
    Worried young mother watching teen girl using smartphone.

    Conversations about online safety matter more than rules alone because openness builds digital trust. (iStock)

    SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

    Pro tip: Talk to your child about why transparency matters. Turning off private browsing is most effective when paired with open, ongoing conversations about online safety.

    5) Digital footprint

    The trail your child leaves behind

    Every post, comment or photo shared online becomes part of your child’s digital footprint, a permanent record of their online presence. Even deleted posts can live on through screenshots, data archives or algorithms.

    Why it matters: Colleges, employers and even peers can access public digital traces. Teaching kids to think before posting helps them build a positive and professional online reputation.

    How to check what’s out there

    • Search your child’s name on Google and image results
    • Review old accounts or unused apps that may still contain personal info
    • Help them make their social media profiles private and share selectively

    Pro tip: You can also set up Google Alerts for your child’s name to get notified whenever new content appears online, a simple, free way to stay aware of their digital footprint as it evolves. 

    Also, you may want to consider using a data removal service to help clean up your child’s personal information that may appear on people-search sites or data-broker platforms. These tools scan the web for outdated profiles, cached pages and databases containing sensitive details like addresses, phone numbers and photos. They can automatically submit takedown requests and continue monitoring for new exposures over time.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    Parenting in the digital age doesn’t mean knowing every app or trend. It means understanding the fundamentals that shape your child’s online experience. From screen time limits to digital footprints, these five terms give you the language to set boundaries, foster trust and keep your family safer online.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Want more help building healthy digital habits at home? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

    Copyright 2025 CyberGuy.com. All rights reserved.  

    [ad_2]

    Source link

  • Windows 10 users face ransomware nightmare as Microsoft support ends in 2025 worldwide

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Microsoft’s blog recently gave a firm warning: unsupported systems aren’t just outdated, they’re unprotected. That message targets anyone still using Windows 10, and it’s serious. In Microsoft’s Digital Defense Report, over 90% of ransomware attacks hit unsupported PCs. That statistic alone should make every Windows 10 user think twice.

    When an operating system stops receiving updates, it becomes an open door for hackers. Security patches dry up, and vulnerabilities grow. So while your computer might seem fine today, it could already be compromised without your knowledge.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

    10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

    Why are unsupported systems dangerous

    Unsupported Windows 10 systems no longer get the updates that keep you safe. Without those patches, ransomware and malware have easy access to your files. Once inside, attackers can encrypt your personal data or steal credentials and banking details.

    It’s not just about losing files. Identity theft and financial fraud often start with outdated systems. The older the software, the easier it is for cybercriminals to exploit weaknesses that will never be fixed.

    The “just one more year” trap

    Many people tell themselves they’ll upgrade later. Microsoft calls this “just one more year” thinking. The problem is that every delay increases your risk. Extended security updates only offer limited coverage, and they don’t stop new types of attacks.

    Without Microsoft’s regular monitoring, new vulnerabilities stay hidden. You could be using your computer for months while attackers quietly collect your data. That’s a frightening thought, especially when most of it can be prevented by upgrading.

    Upgrading to Windows 11 keeps your system protected with ongoing security updates. (Microsoft)

    MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

    The hidden costs of waiting to upgrade to Windows 11

    It’s easy to think upgrading costs too much. But what about the cost of losing your photos, business files or financial information? Data recovery, fraud resolution and downtime can cost far more than a new device.

    Hackers know users delay updates, and they actively look for outdated systems. Even one unsupported device in a home or office network can create a weak spot that exposes everything else.

    How to stay safe from unsupported Windows 10 security risks

    You can protect yourself right now with a few smart steps. These actions reduce your exposure, tighten your online defenses and prepare you for a smooth upgrade to Windows 11. The good news is that most of these changes only take a few minutes but make a major difference in your security.

    1) Upgrade your system to Windows 11

    HACKERS FOUND A WAY TO TURN OFF WINDOWS DEFENDER REMOTELY

    Start by checking whether your PC can handle Windows 11. Most modern AMD and Intel processors already meet the system requirements. Upgrading keeps your computer protected with ongoing updates that patch vulnerabilities and improve overall performance. It’s one of the simplest ways to defend against ransomware and malware before they strike.

    2) Watch out for phishing scams and install strong antivirus software

    Be cautious with every link and attachment you receive. Cybercriminals love sending fake update notifications that look like official Microsoft messages. These phishing scams often contain malicious links that install malware in seconds. Before you click, hover over links to verify their source and only download updates directly from Microsoft’s official site. To add an extra layer of protection, install strong antivirus software that can detect and block malicious files before they infect your system.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Signage outside the Microsoft Campus

    Delaying your Windows 11 upgrade only gives cybercriminals more time to strike. (Photographer: Chona Kasinger/Bloomberg via Getty Images)

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Use a data removal service

    HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

    Use a personal data removal service to take your information off people-search and data broker websites. These services help remove your name, address, phone number and other personal details that scammers often use for phishing or social-engineering attacks. By limiting what’s publicly available about you, you make it much harder for cybercriminals to target you, especially if your older, unsupported Windows 10 system is ever exposed online.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    4) Secure your logins

    Strong logins make a huge difference. Turn on two-factor authentication (2FA) for your most sensitive accounts, such as banking and email. Also, create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. This extra layer stops hackers, even if they manage to steal a password.

    WINDOWS 10 SUPPORT ENDS: UPGRADE TO WINDOWS 11 SAFELY

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords, and secure those accounts with new, unique credentials.

    Man typing on his laptop.

    Without Windows updates, hidden vulnerabilities give hackers easy access to your data. (Felix Zahn/Photothek via Getty Images)

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    5) Back up your data regularly

    Think of backups as your safety net. Save copies of important files to an external hard drive or a trusted cloud service. Schedule automatic backups so you don’t have to remember to do it yourself. If your PC ever gets locked by ransomware, a clean backup means you can restore everything without paying a cent.

    6) Stay informed and proactive

    Cyber threats evolve every day, and knowledge is your best defense. Keep an eye on official Microsoft announcements and alerts. Small changes, like applying updates quickly and revisiting your privacy settings, can keep you a step ahead of attackers.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Unsupported systems might look harmless, but they create silent risks that grow over time. Every day you stay on Windows 10 after support ends, you depend on luck instead of protection. Upgrading isn’t just about staying current; it’s about keeping your data safe and your privacy intact.

    Is holding on to Windows 10 worth risking everything stored on your computer? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • 183 million email passwords leaked: Check yours now

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A massive online leak has exposed more than 183 million stolen email passwords gathered from years of malware infections, phishing campaigns and older data breaches. Cybersecurity experts say it is one of the largest compilations of stolen credentials ever discovered.

    Security researcher Troy Hunt, who runs the website Have I Been Pwned, found the 3.5-terabyte dataset online. The credentials came from infostealer malware and credential stuffing lists. This malware secretly collects usernames, passwords and website logins from infected devices.

    Researchers say the data contains both old and newly discovered credentials. Hunt confirmed that 91% of the data had appeared in previous breaches, but about 16.4 million email addresses were completely new to any known dataset.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    DISCORD CONFIRMS VENDOR BREACH EXPOSED USER IDS IN RANSOM PLOT

    Cyber experts uncovered a 3.5-terabyte data dump containing millions of stolen logins. (Kurt “CyberGuy” Knutsson)

    The real risk behind the password leak

    The leak puts millions of users at risk. Hackers often collect stolen logins from multiple sources and combine them into large databases that circulate on dark web forums, Telegram channels and Discord servers.

    If you have reused passwords across multiple sites, attackers can use this data to break into your accounts through credential stuffing. This method tests stolen username and password pairs on many different platforms.

    The risk remains real for anyone using old or repeated credentials. One compromised password can unlock social media, banking and cloud accounts.

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices.

    Researcher Troy Hunt traced the leak to malware that secretly steals passwords from infected devices. (Jens Büttner/picture alliance via Getty Images)

    Google responds to the reports

    Google confirmed there was no Gmail data breach. In a post on X, the company stated “reports of a Gmail security breach impacting millions of users are false. Gmail’s defenses are strong, and users remain protected.”

    Google clarified that the leak came from infostealer databases that compile years of stolen credentials from across the web. These databases are often mistaken for new breaches when, in fact, they represent ongoing theft activity. Troy Hunt also confirmed the dataset originated from Synthient’s collection of infostealer logs, not from a single platform or recent attack. While no new breach occurred, experts warn that leaked credentials remain dangerous because cybercriminals reuse them for future attacks.

    How to check if you were exposed

    To see if your email was affected, visit Have I Been Pwned. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the Synthient leak.

    Many password managers also include built-in breach scanners that use the same data sources. However, they may not yet include this new collection until their databases update.

    If your address shows up, treat it as compromised. Change your passwords immediately and turn on stronger security features to protect your accounts.

    COLUMBIA UNIVERSITY DATA BREACH HITS 870,000 PEOPLE

    hacker on laptop

    The 183 million exposed credentials came from malware, phishing and old data breaches. (Kurt “CyberGuy” Knutsson)

    9 steps to protect yourself now

    Protecting your online life starts with consistent action. Each step below adds another layer of defense against hackers, malware and credential theft.

    1) Change your passwords immediately

    Start with your most important accounts, such as email and banking. Use strong, unique passwords with letters, numbers and symbols. Avoid predictable choices like names or birthdays. 

    Never reuse passwords. One stolen password can unlock multiple accounts. Each login should be unique to protect your data.

    A password manager makes this simple. It stores complex passwords securely and helps you create new ones. Many managers also scan for breaches to see if your current passwords have been exposed.

    Next, check whether your email has been caught in a recent credential leak. Our No. 1 password manager pick includes a built-in Breach Scanner that searches trusted databases, including the newly added Synthient data from Have I Been Pwned. It helps you find out if your email or passwords have appeared in any known leaks. If you see a match, change any reused passwords right away and secure those accounts with strong, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    2) Enable two-factor authentication (2FA)

    Turn on 2FA wherever possible. It adds a powerful second layer of defense that blocks intruders even if they have your password. You will receive a code by text, app or security key. That code ensures only you can log in to your accounts.

    3) Use an identity theft service for continuous monitoring

    Identity Theft companies can monitor personal information like your Social Security number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. It’s a smart way to stay one step ahead of hackers.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    4) Protect your devices with strong antivirus software 

    Infostealer malware hides inside fake downloads and phishing attachments. A strong antivirus software scans your devices to stop threats before they spread. Keep your antivirus updated and run frequent scans. Even one unprotected device can put your whole digital life at risk.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Avoid saving logins in your web browser

    Browsers are convenient but risky. Infostealer malware often targets saved passwords in your web browser. 

    6) Keep software updated

    Updates fix security flaws that hackers exploit. Turn on automatic updates for your operating system, antivirus and apps. Staying current keeps threats out. 

    7) Download only from trusted sources

    Avoid unknown websites that offer free downloads. Fake apps and files often contain hidden malware. Use official app stores or verified company websites. 

    8) Review your account activity often

    Check your accounts regularly for unusual logins or device connections. Many platforms show a login history. If something looks off, change your password and enable 2FA immediately.

    9) Consider a personal data removal service

    The massive leak of 183 million credentials shows just how far your personal information can spread and how easily it can resurface years later in aggregated hacker databases. Even if your passwords were part of an old breach, data like your name, email, phone number or address may still be available through data broker sites. Personal data removal services can help reduce your exposure by scrubbing this information from hundreds of these sites.

    While no service can guarantee total removal, they drastically reduce your digital footprint, making it harder for scammers to cross-reference leaked credentials with public data to impersonate or target you. These services monitor and automatically remove your personal info over time, which gives me peace of mind in today’s threat landscape.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    This leak highlights the ongoing danger of malware and password reuse. Prevention remains the best defense. Use unique passwords, enable 2FA and stay alert to keep your data safe. Visit Have I Been Pwned today to check your email and take action. The faster you respond, the better you protect your identity.

    Have you ever discovered your data in a breach? What did you do next? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.   

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Inside the Star-Studded, Mob-Run Poker Games That Allegedly Steal Millions From Players

    [ad_1]

    The host’s role in these games can be quite fraught.

    “When you’re talking about home games, the phrase ‘absolute power corrupts absolutely’ kind of applies here,” Berkey asserts. “Because you’re fully at the hands of whoever is hosting the game … They’re in control of the dealers, they’re in control of the decks, they’re in control of the tables, the shuffle machines.”

    They’re also in charge of the books, and that’s where the drama often begins.

    These aren’t casinos with cages, cameras, and fully monitored methods of depositing and withdrawing money. Credit is regularly utilized, both to appease players and to avoid issues with traceable movements of large cash sums.

    “People don’t always pay,” Berkey says. “And when that becomes an issue, now it’s the host’s job to make good on the books in some capacity, otherwise they’re going to lose all their clientele.”

    Enter the mafia, who, in addition to running some of the poker games, often fill a role they’re well known for in popular culture: settling debts.

    “Say you have someone who loses a lot of money,” says Zach Jensen, a content developer and mafia expert at Las Vegas’ Mob Museum. “Getting them to pay up, the mob can step in and do that. Extortion, intimidation, and violence too.”

    As Jensen explains it, the mob may not be anywhere near the size or power of its one-time might. It operates in a more under-the-radar manner today. But it’s still very active in many of its old tricks, and illegal gambling remains a big part of the picture.

    In fact, at least one name that appears in the Billups indictment has roots in the mafia’s glory days.

    “There’s an Angelo Ruggiero Jr. listed in there,” Jensen says. “His father, Angelo Ruggiero, also known as ‘Quack Quack,’ was a close friend of John Gotti and part of his crew.”

    [ad_2]

    Ben Dowsett

    Source link

  • AI truck system matches top human drivers in massive safety showdown with perfect scores

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A new safety evaluation shows the Kodiak Driver, an autonomous system from Kodiak AI, tied for the top safety score among more than 1,000 commercial fleets run by human drivers. The evaluation came from Nauto, Inc., creator of the Visually Enhanced Risk Assessment, or VERA Score. This system uses AI to measure fleet safety on a scale of 1 to 100.

    The Kodiak Driver earned a remarkable score of 98. That result placed it beside the safest human fleets in Nauto’s global network. The findings sparked discussion across the trucking industry and raised new questions about the role of automation in freight transport.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    WILL AUTONOMOUS TRUCKS REPLACE DRIVERS BY 2027?

    The Kodiak Driver, an autonomous trucking system powered by AI, earned a top VERA Score of 98 in a new safety evaluation. (Kodiak)

    Kodiak Driver’s autonomous truck safety evaluation results

    Kodiak’s VERA Score of 98 matched the highest rating among all fleets evaluated. Fleets with Nauto’s safety technology average a score of 78, while those without the technology average only 63.

    The Kodiak Driver achieved perfect scores of 100 in inattentive driving, high-risk driving and traffic violations. Its lowest score, 95, came in aggressive driving. The VERA Score combines over 20 vision-based AI variables into one clear safety rating.

    Nauto found that every ten-point increase in VERA Score cuts collision risk by about 21 percent. A near-perfect score like Kodiak’s represents a strong improvement over typical human performance on the road.

    The strong results didn’t come as a surprise to Kodiak’s leadership. Don Burnette, founder and CEO of Kodiak, told CyberGuy: “Achieving the top safety score among more than 1,000 commercial fleets in Nauto’s Visually Enhanced Risk Assessment (VERA Score®) proprietary safety benchmark is a testament to the Kodiak’s focus on safety. Safety is at the foundation of everything Kodiak builds. Our core value is ‘safety first and always.’ We believe independent safety evaluations like Nauto’s help to validate what we already know: the Kodiak Driver is already among the safest drivers on American highways. They also help to establish and build public awareness around how safe our technology truly is.”

    FOX NEWS AI NEWSLETTER: TRUMP, MUSK AIM FOR DOMINANCE

    The growing impact of AI on truck driving safety

    Nauto equipped the trucks with advanced monitoring and hazard detection systems. These tools track both the driving environment and vehicle behavior in real time. Removing human factors such as distraction, fatigue and delayed reaction directly improves safety.

    Burnette said in a company statement that the system “is never drowsy, never drunk, and always paying attention.” That constant awareness allows the Kodiak Driver to operate defensively and predictably, two traits linked to safe driving.

    The VERA Score also gives fleets a consistent way to measure safety. Companies can now shift from reacting to crashes to preventing them.

    Federal Motor Carrier Safety Administration data support the trend. U.S. commercial truck crashes dropped from more than 124,000 in 2024 to roughly 104,000 this year. Fewer crashes mean fewer fatalities and safer highways overall.

    A red Kodiak self-driving semi-truck drives on a highway under a blue sky near an exit sign.

    Kodiak’s self-driving trucks combine AI vision and real-time data to reduce risky behavior and improve on-road performance. (Kodiak)

    THE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKING

    Concerns about autonomous truck safety

    Not everyone is ready to hand over the wheel to artificial intelligence. Some industry experts point out that while systems like the Kodiak Driver perform well in controlled evaluations, real-world roads can still pose unpredictable challenges. Weather, human drivers and mechanical issues remain complex variables for autonomous systems to manage.

    Others worry about the impact on jobs. As AI takes on more driving responsibilities, professional drivers wonder what the shift will mean for employment and pay across the trucking industry.

    Safety advocates also call for clearer regulations and public transparency.

    Even supporters of the technology agree that continued oversight, testing and gradual rollout are essential. Progress is promising, but trust takes time.

    AI DRONE FINDS MISSING HIKER’S REMAINS IN MOUNTAINS AFTER 10 MONTHS

    What this means for you

    If you work in logistics, fleet management or transportation tech, this news hits close to home. The Kodiak Driver’s near-perfect score proves that autonomous systems aren’t just catching up to human drivers; they’re starting to edge ahead in safety.

    Businesses could see big gains. AI-powered safety tools help cut liability, lower costs and keep fleets running smoothly. The technology doesn’t need rest breaks or reminders to stay focused, which makes every mile more efficient.

    Regulators are also paying attention. Verified data like this builds trust and clears the way for safer, wider use of autonomous trucks. It’s proof that technology can deliver real-world safety, not just promise it.

    Drivers on everyday roads benefit too. Fewer crashes mean safer highways and more reliable deliveries. When trucks drive smarter, everyone shares the reward. Human drivers aren’t going anywhere soon, but AI is quickly becoming their most reliable partner. It helps prevent fatigue, distraction and those risky split-second decisions that lead to trouble.

    A semi truck on a road

    AI-driven fleets are proving that technology and human expertise can work together to make highways safer for everyone. (PlusAI)

    TESLA’S SELF-DRIVING CARS UNDER FIRE AGAIN

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my quiz here: Cyberguy.com

    Kurt’s key takeaways

    This study marks a major step in redefining what safe driving means. An autonomous system equaling the best human fleets signals that automation is moving from theory to reality. Still, the shift raises questions. How soon will public trust catch up with technology? Can regulations evolve fast enough to support widespread adoption? Will drivers adapt to sharing the road with machines that never tire or lose focus? What remains certain is that safety innovation is transforming transportation. Autonomous systems like the Kodiak Driver are proving that technology and safety can move forward together.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    So here’s something to think about: If AI-driven trucks already match the safest human fleets, are we ready to let them take the wheel on our highways? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report

    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link