ReportWire

Tag: Security

  • Protect yourself from sneaky web injection scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’re checking your financial account online, moving money or paying bills, when suddenly a pop-up appears. It looks exactly like your bank’s page, complete with logo and branding, but asks for details you’ve already provided. Would you know what to do?

    This is the kind of situation Kent recently faced. He emailed us saying, “Two times this week, I had a financial account open, and I was doing transactions. In the middle of a transaction, up pops a box in the middle of a full page showing the company’s logo. Real, yes, looked as real as it gets. The first time, I fell for it. It asked for my email address to confirm, then my phone number. Sadly, I did. Then I saw about four or five seconds of a screen named CREDIT DONKEY. At that point, I woke up and decided it was a scam. I immediately closed down my computer and called the number on the back of my financial card to report it.”

    Kent’s quick thinking likely saved him from even more damage. But what exactly happened here?

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    A fake banking pop-up can appear while you’re making real transactions. (Kurt “CyberGuy” Knutsson)

    How web injection scams trick you

    This type of attack is called a web injection scam. It hijacks your browser session and overlays a fake login or verification screen. Because it appears while you’re already logged in, the fake page feels authentic. In Kent’s case, the appearance of “Credit Donkey” flashing on-screen was a red flag. Scammers sometimes abuse legitimate-looking redirects like this to convince victims they are dealing with their bank. The real aim is to capture login credentials or trick you into handing over two-factor authentication codes.

    SOCIAL SECURITY ADMINISTRATION PHISHING SCAM TARGETS RETIREES

    laptop keyboard

    Web injection scams aim to steal your login and security details. (Kurt “CyberGuy” Knutsson)

    Steps to protect yourself from web injection scams

    If you ever find yourself in a situation like Kent’s, here are the most important steps you should take right away to secure your accounts and information.

    1) Monitor your accounts

    Check your recent transactions daily. Turn on alerts for logins, withdrawals or transfers, so you’ll know instantly if someone is trying to move money. 

    2) Change your passwords

    Update the password for any financial account that may have been exposed. Use a strong, unique password generated by a password manager such as NordPass. Next, see if your email has been exposed in past breaches. Our #1 pick, NordPass, includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords 

    3) Remove your personal data from broker sites

    Scammers often get phone numbers, emails and other details from data broker sites before launching attacks like the one Kent faced. A personal data removal service can help wipe this information from those shady databases, so criminals have less fuel for scams. Consider tools that automatically scan and request removal from dozens of brokers at once, saving you the time and hassle of doing it manually.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Enable stronger multi-factor authentication

    Strengthen your account security with multifactor authentication. If your bank offers it, switch from SMS codes to app-based codes with Google Authenticator or Authy. These methods are far harder for scammers to intercept than text messages. 

    5) Scan your devices with antivirus software

    Since the scam appeared while Kent was logged in, malware or a browser hijack may be at play. Run a trusted antivirus to clear hidden phishing scripts. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    6) Notify your bank in writing

    Calling is smart, but also send a secure message or letter, so there’s a record. Ask them to put your account on high alert and require extra verification for any big moves.

    7) Freeze your credit

    Place a free credit freeze with Equifax, Experian and TransUnion. That way, scammers can’t open new accounts in your name even if they’ve stolen your personal info.

    8) Consider identity monitoring

    Services like Identity Guard can alert you if your Social Security number, email or phone number shows up where it shouldn’t. Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com/IdentityTheft

    CLICK HERE TO GET THE FOX NEWS APP

    Person using a credit card

    The bogus page asked for personal details before revealing it was a scam (iStock)

    Smart online banking habits to stay safe

    • Never enter personal details into a pop-up, no matter how real it looks.
    • Always log in fresh through your bank’s official website or app.
    • Keep your browser and operating system fully updated.
    • Use a private email address for your financial accounts that scammers won’t easily guess.

    For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com/Mail

    Kurt’s key takeaways

    Web injection scams are designed to catch you off guard while you’re doing something routine. Kent’s quick reaction to close the page and contact his bank shows how important it is to stay alert. With the right habits and tools, you can keep scammers out of your accounts.

    Have you ever experienced a scam attempt while banking online? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Apple and Google Pull ICE-Tracking Apps, Bowing to DOJ Pressure

    [ad_1]

    Plus: China sentences scam bosses to death, Europe is ramping up its plans to build a “drone wall” to protect against Russian airspace violations, and more.

    [ad_2]

    Matt Burgess, Andy Greenberg, Andrew Couts

    Source link

  • FEMA cuts anti-terrorism funding; AGs sue to block move

    [ad_1]

    The Trump administration is slashing anti-terrorism funding for Massachusetts and other Democratic-led states that refuse to cooperate with federal immigration crackdowns, drawing a new legal challenge.

    The Federal Emergency Management Agency announced its annual grant allocations through the Homeland Security Grant Program, which was approved by Congress in response to the Sept. 11, 2001 terrorist attacks. The funding supports intelligence operations, large-event security, planning, equipment purchases and police training.


    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAm%96 2==@42E:@?D[ 9@H6G6C[ :?4=F565 >@C6 E92? Sabb >:==:@? 😕 4FED E@ DE2E6D E92E 92G6 C6D:DE65 E96 (9:E6 w@FD6’D 677@CED E@ 4C24< 5@H? @? :==682= :>>:8C2E:@?[ :?4=F5:?8 Sf >:==:@? 7C@> |2DD249FD6EED’ Saa]a >:==:@? 8C2?E] %96 =@DE 7F?5:?8 H2D C62==@42E65 E@ @E96C DE2E6D[ 244@C5:?8 E@ E96 7656C2= 286?4J]k^Am

    kAmv@G] |2FC2 w62=6J C:AA65 E96 4FED – H9:49 42>6 “H:E9@FE ?@E:46” @?=J 52JD 367@C6 E96 6?5 @7 E96 7:D42= J62C[ D2J:?8 E96 >@G6 “E9C62E6?D E@ :>>65:2E6=J 56DE23:=:K6 AC6A2C65?6DD 677@CED DE2E6H:56]”k^Am

    kAm“~FC 4:E:6D 2?5 E@H?D FD6 E9:D 8C2?E 7F?5:?8 E@ <66A E96:C C6D:56?ED D276 7C@> E9C62ED 2?5 DFAA@CE =2H 6?7@C46>6?E[” E96 s6>@4C2E D2:5 %F6D52J] “!C6D:56?E %CF>A 😀 A=2J:?8 A@=:E:4D H:E9 @FC AF3=:4 D276EJ[ 2?5 96’D FD:?8 E96D6 7F?5:?8 4FED E@ AF?:D9 E9@D6 H9@ 5:D28C66 H:E9 9:>] w6 ?665D E@ C6DE@C6 E96 7F?5:?8 E92E H6 2C6 @H65]”k^Am

    kAms6>@4C2E:4 pEE@C?6J v6?6C2= p?5C62 r2>A36== 92D ;@:?65 2 4@2=:E:@? @7 “ s6>@4C2E:4=65 DE2E6D 😕 DF:?8 w@>6=2?5 $64FC:EJ E@ 3=@4< E96 5:C64E:G6] $96 244FD65 E96 %CF>A 25>:?:DEC2E:@? @7 “A=2J:?8 A@=:E:4D H:E9 E96 D276EJ 2?5 D64FC:EJ @7 @FC C6D:56?ED]”k^Am

    kAm“(6 H:== 7:89E E96 %CF>A 25>:?:DEC2E:@?’D :==682= 2EE6>AE E@ DEC@?82C> DE2E6D :?E@ 4@>A=J:?8 H:E9 :ED 4CF6= :>>:8C2E:@? 286?52 3J 56AC:G:?8 E96> @7 =:76D2G:?8 7F?5:?8 E92E 96=AD AC6A2C6 7@C 2?5 C6DA@?5 E@ 5:D2DE6CD 2?5 6>6C86?4:6D[” r2>A36== D2:5 😕 2 DE2E6>6?E]k^Am

    kAm%96 pvDV =2HDF:E 2==686D E92E E96 =2DE>:?FE6 >@G6 E@ 4FE E96 2?E:E6CC@C:D> 7F?5:?8 😀 “A@=:E:42==J >@E:G2E65” 2D E96 %CF>A 25>:?:DEC2E:@? E2C86ED DE2E6D E92E H:== ?@E 4@@A6C2E6 H:E9 :ED >2DD 56A@CE2E:@? 677@CED]k^Am

    kAmt2C=:6C E9:D J62C[ w@>6=2?5 $64FC:EJ $64C6E2CJ zC:DE: }@6> :DDF65 2 >6>@ E@ 7656C2= 286?4:6D 2?5 56A2CE>6?ED 42==:?8 7@C E96 C6DEC:4E:@? @7 7F?5:?8 E@ “D2?4EF2CJ” ;FC:D5:4E:@?D] %96 s6A2CE>6?E @7 yFDE:46 92D AF3=:D965 2 =:DE @7 D2?4EF2CJ DE2E6D[ H9:49 :?4=F56D q@DE@? 3FE ?@E |2DD249FD6EED 2D 2 H9@=6]k^Am

    kAm“p=E9@F89 sw$ 92D 7@C 564256D 25>:?:DE6C65 7656C2= 8C2?E AC@8C2>D 😕 2 72:C 2?5 6G6?92?565 >2??6C[ E96 4FCC6?E 25>:?:DEC2E:@? 😀 E2<:?8 >@?6J 7C@> :ED 6?6>:6D[” E96 =2HDF:E D2JD] “~C[ 2D 5676?52?E $64C6E2CJ }@6> AFE :E DF44:?4E=J 😕 2 u63CF2CJ `h :?E6C?2= >6>@C2?5F>[ DE2E6D H9@D6 A@=:4:6D D96 5:D=:<6D ‘D9@F=5 ?@E C646:G6 2 D:?8=6 5@==2C @7 E96 56A2CE>6?E’D >@?6J]’”k^Am

    kAm%96 s6A2CE>6?E @7 w@>6=2?5 $64FC:EJ 5:5 ?@E C6DA@?5 E@ 2 C6BF6DE 7@C >@C6 56E2:=D @? E96 5:C64E:G6]k^Am

    kAm%96 8C2?E AC@8C2> 5:DEC:3FE65 >@C6 E92? S` 3:==:@? 😕 7F?5:?8 E@ DE2E6D 😕 E96 AC6G:@FD 7:D42= J62C[ 244@C5:?8 E@ w@>6=2?5 $64FC:EJ]k^Am

    kAm%96 %CF>A 25>:?:DEC2E:@? H2D DF65 @G6C E96 AFD9 E@ H:E99@=5 7656C2= 7F?5:?8 E@ D2?4EF2CJ ;FC:D5:4E:@?D[ 2?5 2 7656C2= ;F586 CF=65 =2DE H66< E92E E96 >@G6 H2D :==682=]k^Am

    kAm%96 AFD9 E@ H:E99@=5 7656C2= 8C2?ED 😀 D:>:=2C E@ 2 A@=:4J :>A=6>6?E65 3J E96 7:CDE %CF>A 25>:?:DEC2E:@?[ H9:49 H:E996=5 2446DD E@ 2 7656C2= AF3=:4 D276EJ 8C2?E AC@8C2> 7C@> =@42= 8@G6C?>6?ED E92E 5:5 ?@E 4@@A6C2E6 H:E9 :>>:8C2E:@? 2FE9@C:E:6D] %92E 677@CE[ E@@[ H2D 3=@4<65 3J 2 D6C:6D @7 7656C2= 4@FCE CF=:?8D]k^Am

    kAmx? yF?6[ 2 7656C2= ;F586 3=@4<65 E96 &]$] s6A2CE>6?E @7 %C2?DA@CE2E:@? 7C@> 6?7@C4:?8 2 5:C64E:G6 H:E99@=5:?8 7656C2= 8C2?ED E@ DE2E6D H:E9 “D2?4EF2CJ” A@=:4:6D E92E =:>:E 4@@A6C2E:@? H:E9 &]$] x>>:8C2E:@? 2?5 rFDE@>D t?7@C46>6?E 56A@CE2E:@? @A6C2E:@?D]k^Am

    kAmk6>mr9C:DE:2? |] (256 4@G6CD E96 |2DD249FD6EED $E2E69@FD6 7@C }@CE9 @7 q@DE@? |65:2 vC@FAUCDBF@jD ?6HDA2A6CD 2?5 H63D:E6D] t>2:= 9:> 2E k2 9C67lQ>2:=E@i4H256o4?9:?6HD]4@>Qm4H256o4?9:?6HD]4@>k^2m]k^6>mk^Am

    [ad_2]

    By Christian M. Wade | Statehouse Reporter

    Source link

  • Meta account suspension scam hides FileFix malware

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Cybercriminals continue to find new ways to target social media users, and Meta accounts remain one of the most common lures. Losing access to Facebook or Instagram can have real consequences for both individuals and businesses, making people more likely to fall for urgent security warnings. Attackers exploit this by sending convincing notifications that pressure you into taking quick action without thinking. 

    That’s exactly what makes the new FileFix campaign so dangerous; it looks like routine account maintenance, but it’s really a trap.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS

    Cybercriminals are targeting Facebook and Instagram accounts by sending fake security warnings. (Fox News)

    How the FileFix attack works

    As reported by researchers at Acronis, a leading cybersecurity and data protection company, the attack begins with a phishing page that looks like a message from Meta’s support team, claiming that your account will be disabled in seven days unless you view an “incident report.” Instead of providing an actual document, the page disguises a malicious PowerShell command as a file path.

    Victims are instructed to copy it, open File Explorer, and paste it into the address bar. While it appears harmless, this action secretly runs code that starts the malware infection process.

    This method is part of a family of attacks known as ClickFix, where people are tricked into pasting commands into system dialogs. FileFix, created by Red Team researcher mr.d0x, builds on that idea by exploiting the File Explorer address bar instead. In this campaign, the attackers improved the trick by hiding the malicious command behind long strings of spaces, so only the fake file path is visible to the victim.

    A hidden script then downloads what looks like a JPG image from Bitbucket, but the file contains embedded code. Once executed, it extracts another script and decrypts the final payload, bypassing many security tools in the process.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    A screenshot of a fake Facebook security alert

    FileFix sends out fake alerts urging users to review their account security. (Acronis)

    What StealC tries to steal

    The malware delivered by this campaign is StealC, an infostealer that collects a wide range of personal and organizational data. It is designed to grab browser credentials and authentication cookies from Chrome, Firefox, Opera, and other browsers.

    It also targets messaging apps like Discord, Telegram and Pidgin, along with cryptocurrency wallets such as Bitcoin, Ethereum and Exodus. StealC goes further by attempting to compromise cloud accounts from Amazon Web Services (AWS) and Azure, VPN services like ProtonVPN and even gaming accounts from Battle.net and Ubisoft. In addition, it can take screenshots of the victim’s desktop, giving attackers a live view of sensitive activity.

    Acronis reported that the campaign has already appeared in several different versions over a short period, with changes in payloads and infrastructure. This suggests that the attackers are actively testing and refining their methods to avoid detection and improve success rates.

    META DELETES 10 MILLION FACEBOOK ACCOUNTS THIS YEAR, BUT WHY?

    Facebook on a phone

    StealC also targets VPN software and cryptocurrency wallets. (iStock)

    5 ways you can protect yourself from FileFix attacks

    To stay protected against attacks like FileFix and prevent malware such as StealC from stealing sensitive information, you need to combine caution with practical security measures. The following steps can help safeguard accounts, devices, and personal data.

    1) Be skeptical of urgent warnings

    Attackers rely on panic. Treat any message claiming your Meta account or other services will be disabled within days with caution. Verify the alert directly through official platforms rather than clicking links or following instructions from an email or web page.

    2) Avoid copying commands from unknown sources

    FileFix relies on convincing you to paste hidden PowerShell commands disguised as file paths. Never paste commands into system dialogs, File Explorer, or terminals unless you are absolutely certain of their origin.

    3) Invest in personal data removal services

    FileFix and StealC thrive on the information they can extract from a device or linked accounts. By using data removal services, you reduce the amount of sensitive personal information that can be found online or left exposed on old platforms. This minimizes what attackers can exploit if they manage to gain access.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    4) Install reliable antivirus software

    A strong antivirus software can detect malware like StealC before it fully executes. Many solutions now include behavior-based detection that can flag suspicious scripts or hidden downloads, helping catch threats even when attackers try to disguise commands as harmless actions.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech

    5) Use a password manager

    While FileFix targets stored credentials, using a reputable password manager reduces risk by creating unique passwords for every site. This way, even if one browser or app is compromised, attackers cannot access your accounts elsewhere.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords 

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Cybercriminals keep finding creative ways to trick social media users, and FileFix proves how convincing these scams can look. A fake Meta alert may feel urgent, but pausing before you click or copy anything is the best defense. Relying on strong habits and security tools gives you the upper hand. Data removal services, antivirus software, and password managers each reduce risk in different ways. When you combine them, you make it much harder for attackers to turn a scare tactic into a real threat.

    Should platforms like Meta do more to warn users about these evolving phishing tactics? Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Here’s the latest design for the newly issued California driver’s license

    [ad_1]

    California driver’s licenses are getting yet another redesign with new security measures — but motorists don’t have to race to their nearest DMV office to update theirs.

    Starting Wednesday, newly issued driver’s license and identification cards will include additional features, including a first-in-the-nation digital signature, according to the Department of Motor Vehicles.

    The driver’s license or ID in your wallet is still valid until the expiration date.

    “While I know some of our customers will want the new version of the driver’s license, there is no need to replace an existing license or identification card until your current one expires,” said DMV Director Steve Gordon.

    The fee for renewing your driver’s license remains at $45. An ID renewal is $39.

    What’s changed for the license and ID

    Say goodbye to the gold miner, agricultural lands, sailboats and the shape of the Golden State shown on the backgrounds of existing driver’s licenses.

    The new design includes California’s redwoods, poppies and coastline.

    What hasn’t changed is the REAL ID symbol, which is a golden bear with a star in the upper-right corner.

    New security features

    The new cards use “next-generation technology to enhance security,” including anti-counterfeit measures, Gordon said.

    The DMV has added a digital security signature to one of the two bar codes on the back of the cards.

    The magnetic strip on the back of the old driver’s license and ID has been removed in this redesign.

    Why is there another update to the California ID?

    California driver’s license and identification cards are updated periodically to improve security, according to DMV officials.

    The last time the card had a new design and security features was in 2010.

    The look of the card was changed in 2018 with the implementation of REAL ID, which upgraded the security measures needed to fly on domestic airlines and enter federal buildings. It was a program that was first proposed after the terrorist attacks of 9/11.

    [ad_2]

    Karen Garcia

    Source link

  • Update Chrome now: Google patches new zero-day threat

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Google has released an urgent update for its Chrome browser to fix a newly discovered zero-day security flaw that hackers are already exploiting. This is the sixth zero-day Chrome has faced this year, highlighting just how quickly attackers move to take advantage of these hidden weaknesses. 

    Because zero-day threats strike before developers can patch them, your personal data and browsing activity could be at risk if you don’t update right away. If you use Chrome, now is the time to upgrade.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

    Chrome users are urged to update immediately to block active zero-day attacks. (Kurt “CyberGuy” Knutsson)

    A critical flaw in Chrome’s V8 engine

    The newly patched vulnerability, tracked as CVE-2025-10585, stems from a type confusion weakness in Chrome’s V8 JavaScript engine. Google’s Threat Analysis Group (TAG) discovered and reported the bug on Tuesday, and the company shipped a fix the following day, Bleeping Computer reported.

    Google confirmed that the flaw was being exploited in the wild, though it did not share technical details or name the groups behind the attacks. TAG has a history of uncovering zero-days tied to government-sponsored spyware campaigns aimed at high-risk individuals such as opposition leaders, journalists and dissidents.

    The fix was delivered through Chrome version 140.0.7339.185/.186 for Windows and macOS, and version 140.0.7339.185 for Linux. These updates will gradually reach all users in the Stable Desktop channel over the coming weeks.

    While Chrome typically updates automatically, you can apply the patch immediately by navigating to the ‘About Google Chrome’ section. Google stated that it is withholding full technical details until most users have installed the update, a precaution meant to prevent attackers from exploiting lagging systems.

    GOOGLE FIXES ANOTHER CHROME SECURITY FLAW BEING ACTIVELY EXPLOITED

    flash drive hacker 3

    Google races to patch the sixth major browser flaw discovered in 2025. (Kurt “CyberGuy” Knutsson)

    A growing list of zero-day attacks in 2025

    This marks the sixth zero-day flaw patched in Chrome this year. In March, Google addressed CVE-2025-2783, a sandbox escape bug exploited in espionage attacks against Russian organizations. In May, it pushed emergency updates for CVE-2025-4664, which let attackers hijack user accounts.

    Then in June, another flaw in the V8 engine, CVE-2025-5419, was patched after being spotted by TAG. July saw the release of a fix for CVE-2025-6558, which allowed attackers to bypass Chrome’s sandbox protection. With this latest patch, Google continues a busy year of racing to secure its browser against rapidly emerging threats. 

    How to update Google Chrome on a desktop

    Updating Chrome only takes a minute, whether you’re on Mac or Windows. Here are the steps.

    • Open Chrome.
    • Click the three dots in the top-right corner.
    • Go to HelpAbout Google Chrome.
    • Wait while Chrome checks for updates.
    • Click Relaunch when the update finishes.

    How to update Chrome on iPhone

    • Open the App Store on your iPhone.
    • Tap your profile icon in the top-right corner.
    • Scroll down to see pending updates.
    • Find Google Chrome in the list.
    • Tap Update next to it (or Update All if you want to update everything).

    How to update Chrome on Android

    Settings may vary depending on your Android phone’s manufacturer. 

    • Open the Google Play Store on your Android device.
    • Tap your profile icon in the top-right corner.
    • Select Manage apps & device.
    • Under “Updates available,” look for Google Chrome.

    Tap Update to install the latest version.

    CLICK HERE TO GET THE FOX NEWS APP

    New CISA warning: Thanksgiving clickjacking threat in popular browsers

    Hackers are already exploiting the bug to steal data from unprotected devices. (Kurt “CyberGuy” Knutsson)

    5 ways to stay safe from Chrome zero-day attacks

    Updating Chrome is essential, but there are additional steps you can take to stay safe from attacks.

    1) Be cautious with links and downloads and use strong antivirus software

    Many zero-day attacks are delivered through malicious websites or email attachments. Avoid clicking unknown links or downloading files from unverified sources, especially if they prompt you to disable security settings. Also, use strong antivirus software to add another layer of defense to detect malicious code that tries to run through compromised browsers. A strong antivirus can spot suspicious activity before it takes hold. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com/LockUpYourTech 

    2) Enable two-factor authentication (2FA)

    Even if attackers manage to steal your login details through a browser exploit, 2FA makes it much harder for them to break into your accounts. Use an authenticator app instead of SMS when possible for stronger protection. 

    3) Rely on a password manager

    If attackers exploit the browser to steal login data, a password manager keeps your credentials safe and helps generate unique, complex passwords. Even if one account is targeted, it prevents a domino effect across your logins.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com/Passwords

    4) Limit browser extensions

    Some extensions can be abused to make attacks worse. Stick to extensions from trusted developers, review permissions carefully and uninstall anything you no longer need.

    5) Keep your operating system updated

    Chrome updates are critical, but attackers can also exploit holes in Windows, macOS, Android or iOS. Regular OS updates patch vulnerabilities across the system, reducing the chances of a browser exploit spreading further. 

    Kurt’s key takeaway

    The fact that Chrome has already faced six zero-day attacks this year shows how relentless attackers are and how even the most popular software can have serious gaps. These flaws are not just bugs, but opportunities for hackers to exploit millions of users before fixes roll out. The pattern also highlights the growing sophistication of threat actors, including state-backed groups targeting high-risk individuals. No browser is completely safe, and the battle to secure widely used software is ongoing and far from over.

    Do you think Google is reacting fast enough to keep your data secure? Let us know in the comments below. Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Preparing for the worst: First responders train for active shooter situations

    [ad_1]

    WEST NEWBURY — Looking to make sure they are as prepared as possible during a hostile shooter situation, first responders from nearly a dozen communities spent the weekend training with Advanced Law Enforcement Rapid Response Training (ALERRT) instructors at Pentucket Regional/Middle High School.

    “I think it’s extremely important. You never know when something like this is going to happen, or where, or how, but as first responders, we can control how we prepare and train our people to respond to these types of events,” Merrimac Police Chief Eric Shears said.


    This page requires Javascript.

    Javascript is required for you to be able to read premium content. Please enable it in your browser settings.

    kAmu:CDE C6DA@?56CD 7C@> |6CC:>24[ (6DE }6H3FCJ[ }6H3FCJ[ v6@C86E@H?[ %@AD7:6=5[ $2=:D3FCJ[ }6H3FCJA@CE[ #6G6C6[ q@DE@?[ |6=C@D6 2?5 w2G6C9:== E@@< A2CE 😕 E96 EC2:?:?8[ 2D H6== 2D >6>36CD @7 E96 DE2E6 A@=:46]k^Am

    kAm“p3@FE `f A@=:46[ @?6 5:DA2E496C 2?5 a` 7:C67:89E6CD^t|%D[” $962CD D2:5]k^Am

    kAm(6DE }6H3FCJ 7:C6 r9:67 |:<6 sHJ6C[ H9@ 9@DE65 E96 EC2:?:?8[ D2:5 :E 4@G6C65 2 3:E @7 6G6CJE9:?8[ 7C@> =64EFC6D E@ 7F== 5C:==D H:E9 AC@AD 2?5 4@>>2?5 A@DED D6E FA @FED:56 E96 3F:=5:?8]k^Am

    kAm“{62C?:?8 E96 32D:4D 2?5 E96? AC24E:4:?8] yFDE D@CE @7 2 G6CJ D:>A=6 D46?2C:@[ FA E@ 8C25F2E:?8 H:E9 2 G6CJ 4@>A=6I D46?2C:@ E92E 86ED 6G6CJ3@5J’D 962CE C2E6 FA 2?5 E62496D E96> 9@H E@ C6DA@?5 E@ DEC6DD[ H9:49 😀 A2CE @7 A@=:46[ 7:C6[ 2?J t|$[” sHJ6C D2:5k^Am

    kAm%96 p{t##% r6?E6C 2E %6I2D $E2E6 &?:G6CD:EJ H2D 4C62E65 😕 a__a 2D 2 A2CE?6CD9:A 36EH66? %6I2D $E2E6 &?:G6CD:EJ[ E96 $2? |2C4@D[ %6I2D !@=:46 s6A2CE>6?E [2?5 E96 w2JD r@F?EJ[ %6I2D[ $96C:77UCDBF@jD ~77:46 E@ 255C6DD E96 ?665 7@C 24E:G6 D9@@E6C C6DA@?D6 EC2:?:?8 7@C 7:CDE C6DA@?56CD] x? a_`b[ p{t##% 2E %6I2D $E2E6 H2D ?2>65 E96 }2E:@?2= $E2?52C5 😕 p4E:G6 $9@@E6C #6DA@?D6 %C2:?:?8 3J E96 uqx[ 244@C5:?8 E@ k2 9C67lQ9EEAi^^2=6CCE]@C8Qm2=6CCE]@C8k^2m]k^Am

    kAm$962CD D6CG65 2D =625 :?DECF4E@C 7@C E96 4=2DD[ 2F8>6?E65 3J D:I @E96C :?DECF4E@CD]k^Am

    kAm“%96C6 2C6 2 3F?49 @7 FD 7C@> E96 2C62 E92E E6249[” 96 D2:5]k^Am

    kAmt249 52J @7 EC2:?:?8 3682? 2E g 2]>] 2?5 H6?E F?E:= c A]>]k^Am

    kAm“xE H2D `e 9@FCD @7 EC2:?:?8 E@E2=[” 96 D2:5]k^Am

    kAm%96 EC2:?:?8 925 364@>6 :>A@CE2?E D:?46 E96 DE2E6 25@AE65 E96 }2E:@?2= u:C6 !C@E64E:@? pDD@4:2E:@? W}u!pX b___ $E2?52C5 7@C 2? p4E:G6 $9@@E6C^w@DE:=6 tG6?E #6DA@?D6 !C@8C2> 😕 a_ab[ $962CD D2:5]k^Am

    kAm%96 AC@8C2> 96=AD 4@>>F?:E:6D 9@=:DE:42==J @C82?:K6[ >2?286[ 4@>>F?:42E6[ 2?5 DFDE2:? 2? 24E:G6 D9@@E6C^9@DE:=6 6G6?E AC6A2C65?6DD[ C6DA@?D6[ 2?5 C64@G6CJ AC@8C2>[ 244@C5:?8 E@ k2 9C67lQ9EEAi^^?7A2]@C8Qm?7A2]@C8k^2m]k^Am

    kAm%96 H@C=5’D 7:CDE 24E:G6 D9@@E6C DE2?52C5[ }u!p b___ H2D 56G6=@A65 3J C6AC6D6?E2E:G6D 7C@> =2H 6?7@C46>6?E[ E96 7:C6 D6CG:46[ 6>6C86?4J >65:42= D6CG:46D[ 9@DA:E2=D[ 6>6C86?4J >2?286>6?E[ AC:G2E6 D64FC:EJ[ AC:G2E6 3FD:?6DD[ E96 s6A2CE>6?E @7 w@>6=2?5 $64FC:EJ[ E96 uqx 2?5 E96 s6A2CE>6?E @7 yFDE:46]k^Am

    kAmsHJ6C D2:5 96 H2D E9C:==65 E@ D66 DF49 2 DEC@?8 EFC?@FE]k^Am

    kAmxE’D 8C62E 7@C E62> 3F:=5:?8] p?5 J@F @H[ E96 H@C=5 H6’C6 😕 C:89E ?@H – :E 😀 G:@=6?E 2?5 H6 ?665 E@ 5@ 6G6CJE9:?8 H6 42? E@ <66A @FC 4@>>F?:E:6D D276[” 96 D2:5]k^Am

    kAmvC@G6=2?5 7:C6 r9:67 q@3 ‘2=6?E:?6 D2:5 9:D 56A2CE>6?E E@@< 7F== 25G2?E286 @7 E96 @AA@CEF?:EJ]k^Am

    kAm“x E9@F89E :E H2D G6CJ :?E6?D6[ G6CJ :>AC6DD:G6] p?5 x E9:?< E92E E96 `_ vC@G6=2?5 7:C67:89E6CD 8@E 2 8C62E 562= @7 @H=6586 2?5 65F42E:@? @FE @7 :E[” ‘2=6?E:?6 D2:5]k^Am

    kAmxE H2D 6DA64:2==J :>A@CE2?E E@ 92G6 A@=:46 2?5 7:C6 5@:?8 E96 EC2:?:?8 E@86E96C]k^Am

    kAm“x >62?[ A@=:46 5@ :E H:E9 A@=:46 2E E:>6D[” 96 D2:5] “u:C6 5@6D EC2:?:?8 H:E9 7:C6 2E E:>6D @E96C E:>6D[ 3FE E96 A@=:46 2?5 7:C6 E@86E96C x E9:?< 😀 9F86 3642FD6 H6 2C6 2== @? E96 D2>6 E62> 2?5 H6 D9@F=5 EC2:? E@86E96C 2D 2 E62>]”k^Am

    kAm|2EE !6ECJ 4@G6CD p>6D3FCJ 2?5 $2=:D3FCJ 7@C %96 s2:=J }6HD @7 }6H3FCJA@CE] t>2:= 9:> 2Ei k2 9C67lQ>2:=E@i>A6ECJo?@CE9@73@DE@?]4@>Qm>A6ECJo?@CE9@73@DE@?]4@>k^2m]k^Am

    [ad_2]

    By Matt Petry | mpetry@northofboston.com

    Source link

  • Inside a scammer’s day and how they target you

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You’re sipping your morning coffee when your phone rings. It’s a number you don’t recognize. On the other end is someone claiming to be from your bank, asking you to “confirm a recent charge.” Sound familiar?

    Scammers don’t operate on luck. They don’t just throw darts at the phone book and hope to hit a target. Their calls, texts and emails are carefully planned. They already know things about you before they ever reach out, enough to make their pitch sound convincing.

    So, what does a scammer’s day actually look like? Let’s step into their shoes for a moment.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER 

    STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE

    Hacker looking up the information stolen from an unsuspecting victim. (Kurt “Cyberguy” Knutsson)

    Step 1: Morning scroll: Where scammers find your data

    Scammers don’t need to hack into top-secret databases. They start their day by tapping into data broker sites, those shady online directories that trade your personal information like baseball cards.

    Here’s what they can instantly see about you (yes, you):

    • Full name and age
    • Current and past addresses
    • Phone numbers (landline and mobile)
    • Relatives’ names
    • Property records and estimated home value.

    Some sites even list email addresses, voter registrations and criminal histories (whether accurate or not.) Imagine starting your morning with a full profile of someone, where they live, who their spouse is and what car they drive. For scammers, this is their to-do list.

    Step 2: Building the perfect scam story

    With your profile in hand, scammers craft a story that sounds tailor-made just for you.

    • If you’ve recently moved (public real estate records show this), they’ll call pretending to be from a “utilities department” asking for deposits.
    • If you’re retired, they might pose as Medicare reps offering “free benefits.”
    • If you’ve recently lost a loved one (obituaries are public), they’ll offer fake “bereavement services.”

    Scammers don’t invent details; they borrow them from your life. That’s why their calls are so believable.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Man on the phone

    A man receiving a fake scam phone call. (Kurt “CyberGuy” Knutsson)

    Step 3: Dialing for dollars

    Once the story is ready, it’s time to call, text, or email. Scammers often use auto-dialing software, blasting out thousands of calls a day. They acquire your personal and contact details from various data brokers. Imagine hundreds of scammers scraping the same databases and finding your profile. That’s why you get repeated calls. That’s why the scammer “knows” who you are when you pick up. And even if you hang up or reject the call without picking up, they log your number as “active.” Which means you’ve just made their list for the next round of calls. 

    Step 4: Afternoon profit: Cashing in on stolen trust

    Scammers don’t actually need every target to fall for the trick. They only need a small percentage. Here’s what happens when someone gives in:

    • Banking info stolen: Fake “fraud department” calls trick people into reading out card numbers.
    • Identity theft: A scammer collects your Social Security number and date of birth, then opens accounts in your name.
    • Wire transfers: Many victims are convinced to “verify funds” by wiring money, which is gone forever.

    It’s a numbers game, and personal data tilts the odds heavily in the scammers’ favor. 

    Step 5: Evening: Expanding the list

    At the end of the day, scammers aren’t done. They feed the information they’ve gathered back into the data cycle:

    • New phone numbers? Added to calling lists.
    • Addresses confirmed during a call? Updated in their files.
    • Relatives mentioned? Added as next targets.

    And the cycle continues tomorrow, with an even bigger pool of potential victims.

    New CISA warning: Thanksgiving clickjacking threat in popular browsers

    (Kurt “CyberGuy” Knutsson)

    Why removing your data makes scams harder

    Now, imagine if scammers couldn’t find your data online in the first place.

    • No name connected to your phone number.
    • No recent address tied to your age and relatives.
    • No property value or real estate history to suggest you’re “cash-rich.”

    Scammers would have no storyline, no details to exploit and, most importantly, no way to personalize their attack. When you remove your data from people-search sites and data broker databases, you don’t just “clean up the internet.” You slam the door shut on scammers’ playbooks. You could spend hours (or days) going site by site, filling out opt-out forms, sending emails and keeping track of who complied. The problem? Data brokers don’t stop. New ones pop up every week, and old ones often sneak your data back in.

    That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Scammers don’t stumble on your phone number by accident. They map out your life, one data point at a time. That’s why protecting your information online is the single most powerful step you can take to cut down on scam calls, phishing emails and identity theft risks. Remember: every piece of personal data you remove is one less tool in a scammer’s kit.

    What’s the most convincing scam attempt you’ve ever received? Let us know in the comments below. Let us know by writing to us at Cyberguy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM/NEWSLETTER

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • TriMet Expands Blue-Light Security Phone Network – KXL

    [ad_1]

    PORTLAND, OR – Over the past year, TriMet officials say crews have installed more blue-light security phone kiosks on MAX platforms.  The phone provide instant connection to dispatchers at public TriMet’s security operations center, which serves as the central hub for monitoring the transit system and dispatching public safety teams.

    “Security incidents reported at the locations where we have installed the phones have decreased,” TriMet’s Chief Safety and Security Officer Andrew Wilson said. “We think seeing a security kiosk, which has a light on it, and knowing there’s someone you can reach, helps to create a safer experience and a safer location.”

    The blue-light phones were introduced in October 2024 at a handful of MAX stations, and due to that successful rollout, an additional 30 phones are scheduled for installation on the MAX Yellow, Green, and Orange lines in the coming weeks.  Approximately 20 more are scheduled to be installed across the entire MAX system by June 2026.

    According to Trimet, the technology is simple to use.  A person presses the red button on the front of the emergency station and within seconds a dispatcher is supposed to respond.  Inside the security operations center, TriMet staff can see who is calling, get a good look at their surroundings thanks to a camera mounted near the phone.

    Along with providing people immediate access to security staff, the call stations are meant to provide deterrents.  The blue lights, similar to those used in shopping center parking lots and on college campuses, are easy to spot, especially at night.  The presence of cameras on the vibrant red towers, distinguished by the word “security,” are also supposed to discourage crime.

    However, TriMet notes the blue-light cameras not meant to be a substitute for 9-1-1 services.

    For more information about TriMet’s security efforts, visit trimet.org/security.

    More about:


    [ad_2]

    Tim Lantz

    Source link

  • The surprising reason you should not delete spam emails

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Spam is annoying and can sometimes be dangerous if it’s part of a widespread phishing attack. When you see spam, you delete it, at least that’s what conventional wisdom suggests. However, it now seems that this is the wrong approach, and spam can be used for the greater good.

    So, before you delete that junk email, consider keeping it to protect others from scammers. We will also tell you what you should do with them instead.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com/Newsletter 

    Mail app icon on iPhone (Kurt “CyberGuy” Knutsson)

    Why should you keep those spam emails?

    We know this sounds counter-intuitive, but keeping spam emails, at least for a short while, serves an important purpose. Your email provider can use them to refine their spam detection algorithms. The best course of action is to report them, so providers can develop better ways to identify harmful or unwanted messages. This will improve their chances of detecting them before they hit your inbox. Deleting these emails makes them useless to anyone. Furthermore, your failure to contribute to this improvement means the problem persists not only for you but for others.

    When we say “a short while,” we don’t mean forever. Usually, keeping them in your junk folder for a few days to a week is enough for your provider to process and learn from them. After you’ve reported the spam or phishing attempt, you can safely delete it.

    That’s the surprising reason not to delete spam emails right away: by holding onto and reporting them briefly, you’re helping email providers spot and block scams faster—protecting not just yourself, but everyone else too.

    AI-POWERED SCAM TARGETS 2.5 BILLION GMAIL USERS IN SOPHISTICATED PHISHING ATTACKS

    How to report spam emails to your email provider

    These algorithms that detect junk emails are already getting smarter. Just check your Spam folder, and you may have dozens of emails marked as spam that they have shielded you from. For those that slip through the cracks and appear in your inbox, reporting them is easy.

    Whether you’re using a desktop client like Microsoft Outlook or a web client like Gmail, Yahoo or AOL, the steps to report spam for analysis are similar.

    Report spam in Gmail (desktop or web)

    • Select the spam email by ticking the checkbox on its left side. You can select more than one.
    • Click Report spam in the top menu. Look for a stop sign or shield icon.
    Reporting spam on Gmail when it’s in the inbox 

    How to report spam emails in Gmail in your inbox

    Report scam in iCloud (desktop browser)

    If you’re using something like iCloud Mail on iCloud.com on a desktop browser, do the following:

    • Open the email.
    • Click the three-dot icon in the top menu.
    • Select Move Message to Junk.
    Reporting spam on iCloud.com when it’s in the inbox  

    How to report spam on iCloud.com in your inbox (Kurt “CyberGuy” Knutsson)

    Report spam in iCloud Mail (iPhone or iPad Mail app, iOS 18.6)

    If you’re using the Mail app on an iPhone or iPad, follow these steps instead:

    • Open the email in the Mail app.
    • Tap the reply arrow icon at the bottom of the screen.
    • Select Move to Junk from the menu.

    Report spam in Yahoo Mail

    On the web (desktop version):

    • Tick the checkbox next to the unwanted email(s) in your inbox.
    • Click Spam in the toolbar above. This moves the message to your Spam folder and helps Yahoo learn to catch similar messages.
    • You can also open the email directly and click Spam to report it.

    On the Yahoo Mail mobile app (iOS/Android):

    • Open the message.
    • Tap the three vertical dots or “More” icon.
    • Choose Mark as Spam to report it. 

    Report spam or phishing in Outlook / Outlook.com

    In Outlook on the web (Outlook.com):

    • Select the message(s) you want to report.
    • Click Report above the reading pane, then choose Report phishing or Report junk from the dropdown.

    In desktop Outlook (Windows, Mac) or Outlook mobile:

    • If you’re using a supported version (like Outlook for Microsoft 365, Outlook for Mac 16.89+ or recent mobile versions), you’ll see a Report button on the toolbar.
    • Select the message(s), click Report and then choose Phishing or Junk.

    Report spam in AOL Mail

    On the web or desktop:

    • Log into AOL Mail and select the spam email from your inbox.
    • Click the Spam button—often shown as an exclamation mark or explicitly labeled “Spam.” This moves the email to your Spam folder and helps train AOL’s filters.

    On mobile:

    In the AOL Mail app, you can usually tap and hold or open the message and select Mark as Spam from the options to report it.

    How to report deleted spam mail

    Even for those spam emails you deleted, they’re not gone forever. If it’s been less than 30 days, they’re probably still in the Trash folder.

    To report them to clients like Gmail, Outlook, Yahoo, and AOL, follow these steps:

    • Open the Trash or Deleted items folder in your mail client.
    • Select the spam email by ticking the checkbox on its left side.
    • Click Report spam in the top menu. Look for a stop sign or shield icon.
    Reporting spam on Gmail when it’s in the trash folder

    How to report spam in Gmail when it’s in the trash folder 

    You make yourself a target when you unsubscribe

    Some spam emails also come with an option to unsubscribe. If you think reporting is too harsh, you might think unsubscribing is the best option to stop the spam emails from coming back. However, this can make matters worse. The act of unsubscribing signals to scammers and spammers that you’re actively checking your email. This emboldens them to increase the volume of spam they send. Worse still, some unsubscribe links are malicious traps designed to steal personal information or distribute malware.

    GOOGLE SHUTS DOWN SOPHISTICATED GOOGLE DOCS PHISHING SCAM

    Tips to stay safe from spam

    Reporting spam helps your email provider protect you and others, but you can take additional steps to keep your inbox and personal information safe.

    1) Never click suspicious links and use strong antivirus software

    Even if an email appears to come from a company you trust, avoid clicking links unless you’re sure they’re legitimate. Phishing scams often use convincing logos and language to trick you into revealing sensitive information.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech 

    2) Use a personal data protection service

    Consider using a service that monitors the dark web for your personal information and requests the removal of exposed data. This reduces the chances of scammers targeting you in the first place. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/Delete

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScan

    3) Use private email providers and aliases

    One of the smartest ways to cut down on spam is by using a private, secure email provider. These services prioritize privacy, don’t sell your data and offer stronger protection against trackers hidden in emails.

    Another powerful feature is the ability to create email aliases. An alias is a throwaway address that forwards mail to your real inbox. You can use one when online shopping or using trial accounts. If that alias starts getting flooded with junk, you simply disable or delete it, without exposing your main address.

    By using aliases and secure providers, you take back control of your inbox. Spammers can’t easily tie unwanted emails to your real account and your personal email remains far more private.

    For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com/Mail

    4) Use strong, unique passwords

    Create long, complex passwords that are different for every account. A password manager can store them securely and help you generate new ones that are hard to crack.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at CyberGuy.com/Passwords

    5) Enable two-factor authentication (2FA)

    Turn on 2FA whenever possible. Even if a scammer gets your password, they won’t be able to log in without the second verification step.

    6) Keep your devices updated

    Install the latest software updates on your phone, tablet, and computer. These updates often include security patches that fix vulnerabilities scammers could exploit.

    7) Be cautious with email attachments

    Avoid opening attachments from senders you don’t recognize. They can contain viruses, ransomware or other types of malware designed to steal your data.

    8) Limit the information you share online

    The less personal information available about you publicly, the harder it is for scammers to craft convincing phishing emails that appear legitimate.

    By following these steps and regularly reporting spam, you’ll protect not only your own inbox but also contribute to a safer online environment for everyone.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaways

    Spam emails are annoying, but deleting them right away isn’t always the best move. By holding on to them and reporting them, you help your email provider improve its filters and block more junk in the future. At the same time, learn how to protect yourself from phishing attempts so you can recognize the warning signs quickly. With a little awareness and the right tools, spotting and avoiding these scams becomes much easier.

    Have you ever had a close call with a spam or phishing email? Let us know by writing to us at CyberGuy.com/Contact

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    [ad_2]

    Source link

  • Schools turn to AI gun detection for safety

    [ad_1]

    NEWYou can now listen to Fox News articles!

    A New Jersey school district has adopted artificial intelligence to help detect weapons and stop threats before they escalate. The Glassboro Public School District has become the first in the country to combine AI gun detection with a mass communication system that speeds up emergency responses and reduces the time it takes to notify law enforcement.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER 

    NORTH KOREAN HACKERS USE AI TO FORGE MILITARY IDS

    What’s new in school security

    The district is using ZeroEyes, an AI video analytics platform that integrates with existing security cameras. The software scans for visible firearms and sends an alert whenever a potential threat appears. A team of military and law enforcement veterans at a 24/7 operations center then reviews the image to confirm whether the gun is real. Once verified, the system pushes an alert to school staff and police within three to five seconds. At the same time, buildings go into lockdown automatically.

    South Jersey schools have deployed AI to spot weapons and alert police in seconds. (Jay Janner/The Austin American-Statesman via Getty Images)

    These alerts are distributed through Singlewire Software’s InformaCast platform. This system can send warnings across school PA systems, strobe lights, digital signs, desk phones and other communication tools. Together, the two technologies give law enforcement and educators a faster and more coordinated way to respond to potential dangers.

    How the system works

    Security cameras around each building feed video into the ZeroEyes software. When the AI detects what appears to be a firearm, it highlights the object and immediately shares the footage with human analysts. If those experts confirm that the weapon is real, they send the alert to the district and local authorities. InformaCast then pushes the message to every connected device, allowing staff and students to receive instructions within seconds. The goal is to shorten the time between detection and action so schools can respond before violence has a chance to unfold.

    Concerns to consider

    As with any new technology, questions remain. Even with human oversight, AI can make mistakes, and false alerts are always a possibility. Privacy also comes into play since the system depends on constant monitoring through security cameras. Cost is another factor because installing, maintaining and training staff for these systems requires significant funding. Finally, schools need to build community trust by explaining how the technology works and preparing students and parents for what to expect during drills or emergencies. 

    SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS

    Photo of an empty classroom.

    Glassboro district becomes first in U.S. to pair AI gun detection with mass alerts. (Lori Van Buren/Albany Times Union via Getty Images)

    What this means for you

    For parents, teachers and students, this technology represents an important shift in how schools approach safety. AI adds speed to the process by recognizing threats before most people would even notice them. Alerts reach law enforcement and staff almost immediately, creating a critical advantage in a crisis. The system also provides a layered approach to protection by combining cameras, AI and communication tools. Parents may also find reassurance in knowing that human experts verify each threat to help reduce false alarms. While no system is perfect, this integration builds confidence that schools are investing in stronger defenses.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.

    SOCIAL MEDIA VERIFICATION SYSTEMS LOSE POWER AS SCAMMERS PURCHASE CHECKMARKS TO APPEAR LEGITIMATE

    Photo of a classroom.

    New school security system scans cameras for firearms, pushes instant lockdowns. (Shelby Tauber/Bloomberg via Getty Images)

    Kurt’s key takeaways

    The decision to use AI gun detection with instant communication tools marks a major change in how schools can protect their communities. The Glassboro rollout demonstrates how technology can detect threats and share critical information in seconds. While no solution eliminates every risk, this approach gives schools more time to react when lives are at stake.

    Would you feel more at ease knowing your child’s school uses AI to detect weapons instantly, or would you worry about putting too much trust in technology? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO GET THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Hackers push fake apps with malware in Google searches

    [ad_1]

    NEWYou can now listen to Fox News articles!

    When you search Google for apps, it feels natural to trust the first results you see. They’re supposed to be the most reliable, right? Unfortunately, hackers know this too. They’re sneaking fake websites into search results that look just like the real thing. If you click and download from one of these sites, you could end up with malware instead of the app you wanted. In other words, the top search results aren’t always safe, and that’s exactly how scammers trick people.

     Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    NORTH KOREAN HACKERS USE AI TO FORGE MILITARY IDS

    What you need to know about malware in Google searches

    Researchers at FortiGuard Labs found that attackers are setting up websites that look almost identical to trusted providers. These sites host installers for apps like Signal, WhatsApp, Deepl, Chrome, Telegram, Line, VPN services and WPS Office. The catch is that these downloads include both the real app and hidden malware.

    Once you run one, the malware drops files into your system, asks for administrator access and quietly starts spying. It can collect personal information, log everything you type, monitor your screen and even disable your antivirus.

    Hackers are planting fake apps in Google search results and they look just like the real thing. (Harun Ozalp /Anadolu via Getty Images)

    Some versions were designed to snoop on Telegram messages. All of this is possible because hackers use a tactic called SEO poisoning, which manipulates Google’s search results so their fake websites appear near the top. Even if you stick to “safe-looking” search links, you could still land on a fraudulent page.

     How hackers disguise fake apps as real ones

    So how do these fake sites end up in your search results in the first place? The attackers use a technique called SEO poisoning. They register lookalike domains, use plugins to game search algorithms and then climb up Google’s rankings. That way, when you search for a trusted app, the fake site may appear as one of the first results.

    According to FortiGuard Labs, this particular campaign mainly targeted Chinese-speaking users, but the method is being used everywhere. In fact, earlier reports from Cisco Talos showed ransomware groups pushing fake downloads of AI tools like ChatGPT or InVideo. Others used spoofed sites for PayPal, Microsoft, Netflix and Apple. Sometimes, attackers even buy sponsored ads so that their malicious links appear right at the top.

    The scary part is that you might not even realize you installed something dangerous. Because the fake installer includes the real app, everything seems to work fine. Meanwhile, the hidden malware is already active on your device. That makes it harder to detect and much easier for attackers to steal your data.

    6 ways you can stay safe from malware in Google Searches

    I have listed some steps below that you can take to protect yourself from these fake apps and the malware they carry.

    1) Download apps only from official sources

    The safest way to avoid malware is to get software directly from the official website or verified app stores like Google Play or the Apple App Store. Avoid third-party download sites or search results that look suspicious, even if they appear at the top of Google.

    2) Double-check website domains

    Before clicking “download,” carefully inspect the domain name. Hackers often create lookalike domains that look nearly identical to real ones, adding small spelling changes or extra words. Even small differences can indicate a fake site designed to deliver malware.

    TOP 5 OVERPAYMENT SCAMS TO AVOID

    Google search on a laptop screen.

    Cybercriminals are disguising malware as trusted apps, tricking users through poisoned search results. (Dilara Irem Sancar/Anadolu via Getty Images)

    3) Install a reliable antivirus software

    Malware can install itself quietly and avoid detection. Using a strong antivirus solution can help identify and block malicious files before they cause damage. Make sure your antivirus is always updated so it can recognize the latest threats, including Hiddengh0st and Winos variants.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Use a password manager

    If malware tries to capture your passwords, a password manager can protect you. It generates strong, unique passwords for each account and stores them securely. Many password managers can also alert you if your credentials appear in a data breach.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Be cautious with ads in search results

    Attackers sometimes buy sponsored Google ads to push malware. Even if an ad looks like it comes from a trusted brand, verify it carefully before clicking. Stick to official websites whenever possible.

    6) Keep your software and system updated

    Outdated operating systems and applications can have vulnerabilities that malware exploits. Regularly updating your software ensures you have the latest security patches and reduces the risk of infection.

    HOW RETIREES CAN STOP FAKE DEBT COLLECTOR SCAMS

    Google search on a smartphone.

    SEO poisoning is letting hackers hijack Google results targeting user’s data. (Nicolas Economou/NurPhoto via Getty Images)

    Kurt’s key takeaway

    Hackers are turning Google search into their delivery system for malware. By blending real apps with hidden spyware, they can make almost anyone a victim. The rise of SEO poisoning shows that you cannot rely only on search rankings to stay safe. If you are careful about where you download your apps, you can keep your devices and data out of a hacker’s hands.

    CLICK HERE TO GET THE FOX NEWS APP

    How much do you trust Google to filter out malicious sites before you click? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link

  • Where Do Your Passwords Go When You Die?

    [ad_1]

    It’s not fun to talk about, but there’s only one thing certain in life. You need to have a plan for your digital legacy, just like you make a plan for your physical assets; otherwise, your accounts, services, and logins will rot away in a data center before they’re inevitably erased by a data retention policy.

    Some services recognize how important digital legacy is. Apple and Facebook have legacy contacts that can gain access to your accounts, and the American Bar Association is still grappling with the legalities of accessing online accounts when someone passes away. Most online services don’t.

    Recognition of digital legacy is still spotty, and without dedicated legacy contacts, accessing the deceased’s online accounts often involves court orders or legal documentation (and plenty of time). Digital legacy doesn’t need to have so many hurdles, though. Password managers have digital legacy features built in that can unlock your digital life in the event of an emergency.

    Table of Contents

    Defining a Digital Legacy

    There’s a lot that goes into your digital legacy, from your online banking login to any digital assets you own, but even a seemingly straightforward online life can quickly snowball into a mess. Does the Netflix account just keep draining the checking account until you can break in and change the payment option? Are photos that have been uploaded to the cloud now lost in a data center, never to be recovered? Add some passkeys, maybe some social sign-on features, and you have a complex web of data that’s almost impossible to untangle.

    So-called digital executors exist, operating in the same way as the executor of the will, just for digital assets. It’s a good idea to set up a digital executor to ensure your digital assets are handled properly, but that doesn’t help in the immediate aftermath of someone passing away. The probate process can take at least a few months, and sometimes several years.

    Password managers like Bitwarden offer a shortcut. You can transfer access to a trusted relative, spouse, or even your closest friend, along with a rundown of what to do with your accounts.

    The legality of this is a little murky, with the American Bar Association noting that accessing someone else’s account, even with their username and password, isn’t legal if it violates the platform’s terms of service. The law regarding digital assets varies from state to state, so it’s still a good idea to consult an attorney for long-term access.

    Here’s the advice NordPass gave: “For anyone thinking about digital legacy, the best step is to set up Emergency Access in advance, clearly communicate the use cases of the credentials with your trusted contacts, and follow the terms of service of respective platforms.”

    Immediate access is still important, not only in the event of death but also in the event of incapacitation. If you, for whatever reason, can’t access your online accounts, you can transfer those accounts easily using an emergency contact feature available in a password manager.

    Password Managers With Digital Legacy Features

    There are some excellent password managers, and most of them have some way to unlock your account in the event of an emergency. They go about it in different ways, however. Here are the three I recommend for most people. (Read more in our Best Password Managers guide.)

    Proton Pass

    Courtesy of Proton

    Proton recently added an emergency access feature, and it’s not just restricted to Proton Pass. Unlike most password managers, Proton Pass is just one app available in the Proton suite. Proton also makes our favorite VPN, and it offers an encrypted crypto wallet, cloud storage, and even a calendar.

    Emergency access isn’t restricted to one app with Proton. Rather, it’s access to your entire account, so if you have multiple Proton apps, you can pass them along. It’s not hard to see where this could be useful, especially if you have a lot of data stored in Proton Drive or money in your crypto wallet.

    [ad_2]

    Jacob Roach

    Source link

  • Proton Pass Finally Has the Goods to Compete With Other Password Managers

    [ad_1]

    You can rename your vaults, but you can also assign them one of a few dozen icons, as well as choose from a handful of color presets. It’s a small addition, but a little color-coding goes a long way in finding what you need at a glance.

    Beyond logins, you can also generate and store email aliases, similar to NordPass. It’s a standard feature, even if you don’t subscribe. Free users are capped at 10 aliases, while paying users can create as many as they want.

    It’s not just a fake email tied to a real one. You can set up aliases like that, but Proton allows you to forward emails to multiple addresses, create catch-all addresses, and even reply directly from the web app. I appreciate the activity log most, though. Proton automatically creates contacts for everyone who interacts with your alias, and you can block spammy addresses without ever opening your email client.

    No Desktop App

    Proton Pass via Jacob Roach

    Proton Pass was originally available only as a browser extension, but it now has apps for Windows, macOS, and even Linux, as long as you’re on a Fedora- or Debian-based distribution. I mainly used Pass in the browser, not only because it’s convenient but also because the extension is available on just about everything—Chromium-based browsers have access, and there are separate extensions for Firefox, Safari, and Brave.

    The browser app has everything you need, and it works a treat when it comes to password capture and autofill. Proton occasionally asked me to save a password a second time after initially dismissing a capture notification. But outside of that small hiccup, I never encountered an issue with autofill for forms, logins, or credit cards.

    Inside the app, you have a few features that aren’t available through the extension. The key feature is Pass Monitor, which is Proton’s security watchdog feature. It’ll show you weak passwords, accounts where you can enable 2FA, and critically, accounts that have been victims of a data breach. If you want to go further, you can turn on Proton Sentinel, as well.

    Pass Monitor is great, but breach notifications have a problem. By default, Proton only monitors the email associated with your Proton account. If you’re importing passwords from another app, as I did, and you have different emails, those aren’t a part of the monitoring by default. And Proton doesn’t tell you that. You have to click into breach details and manually add addresses.

    Proton Pass Review  Finally Standing Tall

    Proton Pass via Jacob Roach

    [ad_2]

    Jacob Roach

    Source link

  • An App Used to Dox Charlie Kirk Critics Doxed Its Own Users Instead

    [ad_1]

    New research released this week shows that over the past few years the US Department of Homeland Security has collected DNA data of nearly 2,000 US citizens. The activity raises questions about legality and oversight given that DHS has been putting the information into an FBI crime database. Some of the genetic data is from US citizens as young as 14.

    The US Secret Service said on Tuesday that it had discovered facilities across the “New York tristate area” running so-called SIM servers—devices that manage and coordinate 100,000 SIM cards at a time for illicit operations. The Secret Service warned, though, that in addition to being used by cybercriminals for scamming, the apparatuses could also be used to launch critical infrastructure attacks that could disrupt mobile networks.

    A cyberattack on the UK-based automaker Jaguar Land Rover has been causing a supply chain meltdown, halting vehicle production, costing JLR tens of millions of dollars, and forcing its parts suppliers to lay off workers. The beleaguered company will have to shoulder the full cost of the attack because of inadequate insurance coverage, prompting talks of possible UK government assistance.

    If you’re worried about phone searches while traveling or doing specific activities, the password manager known as 1Password has a Travel Mode feature that can help you manage sensitive data and temporarily remove it from your device. We’ve got advice on how to use the tool most effectively.

    And there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

    An app used to out those who spoke ill of the murdered right-wing activist Charlie Kirk was found to be leaking its users’ personal information, doxing the very people it had invited to dox its targets.

    The app Cancel the Hate, founded in the wake of Kirk’s September 10 assassination, suspended its services this week after it was revealed that security flaws in the website where the app was hosted exposed users’ email addresses and phone numbers. That site had asked its users to collect and share employment and other personal information of critics of Kirk and others “supporting political violence.” But a security researcher who identified themselves only as BobDaHacker demonstrated to news outlet Straight Arrow News that privacy settings on the site didn’t work as advertised, publicly leaking users’ information even when it was set to private. The hacker also reportedly had the ability to delete users’ accounts at will.

    Cancel the Hate, which displayed a photo of Kirk on its homepage and was founded by a Kirk supporter who cited his death as the motivation for creating the site, has since taken down its reporting features. It now displays a message on its homepage that it’s moving to a “new service provider.” The page that allows visitors to buy a $23 T-shirt remains online.

    Ransomware groups continued to plumb the depths of abject immorality this week with a new tactic: extorting preschools by stealing toddlers’ personal information and threatening their parents. The BBC reports that a hacker group says it has stolen the names, addresses, and photos of around 8,000 children from the preschool chain Kido, which has sites largely around London but also in the US and India. The hackers are threatening to leak the data if a ransom isn’t paid, going so far as to contact some of the children’s parents to reinforce their threat. The group has also posted sample information and photos of 10 children on their dark-web site.

    In August, The Guardian, Israeli-Palestinian publication +972 Magazine, and Hebrew-language publication Local Call revealed how Israeli signals intelligence agency Unit 8200 had built a comprehensive surveillance system to intercept and store Palestinian phone calls. More than “a million calls an hour” could be collected by the system, which reportedly amassed around 8,000 terabytes of call data and stored it in Microsoft’s Azure cloud service in the Netherlands, the publications reported.

    This week, following an external investigation commissioned by Microsoft, the company pulled some of the Israeli military’s access to its technology. In a statement, Microsoft president Brad Smith said the firm has taken the decision to “cease and disable” some “specific cloud storage and AI services and technologies” that it was providing to Israeli forces. Microsoft’s action—its investigation is still ongoing—follows a wave of staff protests at its ties to Israel and its ongoing war in Gaza. “We do not provide technology to facilitate mass surveillance of civilians. We have applied this principle in every country around the world, and we have insisted on it repeatedly for more than two decades,” Smith wrote in a statement.

    [ad_2]

    Andy Greenberg, Matt Burgess, Lily Hay Newman

    Source link

  • Inside the Nuclear Bunkers, Mines, and Mountains Being Retrofitted as Data Centers

    [ad_1]

    Data centers are responsible for running many of the services that underpin the systems we interact with every day. Transportation, logistics, energy, finance, national security, health systems, and other lifeline services all rely on up-to-the-second data stored in and accessed through data centers. Everyday activities such as debit and credit card payments, sending emails, booking tickets, receiving text messages, using social media, search engines, and AI chatbots, streaming TV, making video calls, and storing digital photos all rely on data centers.

    These buildings now connect such an incredible range of activities and utilities across government, business, and society that any downtime can have major consequences. The UK government has officially classified data centers as forming part of the country’s critical national infrastructure—a move that also conveniently enables the government to justify building many more of these energy-guzzling facilities.

    As I sit pondering the concrete reality of the cloud in Cyberfort’s waiting area, the company’s chief digital officer, Rob Arnold, emerges from a corridor. It was Arnold who arranged my visit, and we head for his office—through a security door with a biometric fingerprint lock—where he talks me through the logic of the bunkered data center.

    “The problem with most above-ground data centers is they are often constructed quickly, and not built to withstand physical threats like strong winds, car bombs, or server theft from breaking and entering.” Arnold says that “most people tend to think of the cyber side of data security—hackers, viruses, and cyberattacks—which dangerously overlooks the physical side.”

    Amid increasing geopolitical tension, internet infrastructure is now a high-value target as “hybrid” or “cyber-physical” sabotage (when cyberattacks are combined with physical attacks) becomes increasingly common.

    The importance of physical internet security has been highlighted by the war in Ukraine, where drone strikes and other attacks on digital infrastructure have led to internet shutdowns. While precise details about the number of data centers destroyed in the conflict remain scant, it has been observed that Russian attacks on local data centers in Ukraine have led many organizations to migrate their data to cloud facilities located outside of the conflict zone.

    Bunkers appeal to what Arnold calls “security-conscious” clients. He says: “It’s difficult to find a structure more secure than a bunker”—before adding drily: “The client might not survive the apocalypse, but their data will.”

    Cyberfort specializes in serving regulated industries. Its customer base includes companies working in defense, health care, finance, and critical infrastructure. “Our core offering focuses on providing secure, sovereign, and compliant cloud and data-center services,” Arnold explains in a well-rehearsed sales routine. “We do more for our customers than just host systems—we protect their reputations.”

    Arnold’s pitch is disrupted by a knock at the door. The head of security (who I’m calling Richard Thomas here) enters—a 6-foot-tall ex-Royal Marine wearing black cargo trousers, black combat boots, and a black Cyberfort-branded polo shirt. Thomas is going to show me around the facility today.

    [ad_2]

    A.R.E. Taylor

    Source link

  • Scammers are abusing iCloud Calendar to send phishing emails

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Phishing attacks are becoming increasingly sophisticated, and the latest scam takes exploitation of a trusted platform to a new level. Instead of sending generic or suspicious-looking emails, attackers are now abusing Apple’s iCloud Calendar invite system to deliver phishing content directly from Apple’s own email servers.

    This clever tactic allows the fraudulent messages to bypass spam filters and appear more legitimate to unsuspecting users. The goal is to alarm you into calling a scammer’s fake support number under the pretense of disputing a fraudulent PayPal transaction. Once contacted, you are manipulated into granting remote access to your devices or sharing sensitive data.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    NEW EVITE PHISHING SCAM USES EMOTIONAL EVENT INVITATIONS TO TARGET VICTIMS

    Scammers exploit Apple’s iCloud Calendar to deliver phishing invites that bypass spam filters. (Brent Lewin/Bloomberg via Getty Images)

    How the scam uses iCloud Calendar invites to bypass security

    The heart of this scam lies in abusing Apple’s official infrastructure to lend credibility to a phishing attempt. Instead of using a suspicious or easily flagged email address, the attackers send calendar invites from Apple’s genuine domain, noreply@email.apple.com, as reported by Bleeping Computer.

    The attacker embeds the phishing message in the “Notes” section of the calendar event, making it appear as a legitimate notification. They send the calendar invite to a Microsoft 365 email address they control, which is part of a mailing list. As a result, the invite is automatically forwarded to multiple real targets, broadening the scam’s reach.

    Typically, when emails are forwarded, SPF (Sender Policy Framework) checks fail because the forwarding server isn’t listed as an authorized sender. However, Microsoft 365 uses a technique called the Sender Rewriting Scheme (SRS), which rewrites the return path so that the message still passes SPF checks.

    This makes the email appear fully legitimate to both the recipient’s inbox and automated spam filters. As a result, the message is far more likely to reach a user’s inbox without being flagged, increasing the chance the victim will take the bait.

    SCAMMERS ARE USING DOCUSIGN EMAILS TO PUSH APPLE PAY FRAUD

    Hospital phishing warning.

    Cybercriminals leverage Microsoft 365 forwarding and Apple’s email domain to outsmart filters. (Lindsey Nicholson/UCG/Universal Images Group via Getty Images)

    Why these phishing scams are particularly dangerous

    What makes this campaign especially dangerous is the sense of legitimacy it conveys. Because Apple’s official servers send the email directly, users are far less likely to suspect foul play. The message itself aims to panic the recipient by falsely claiming a large PayPal transaction occurred without the recipient’s consent. The message includes a phone number to “contact support” and dispute the charge, but, in reality, it connects the victim to a scammer.

    Once the victim calls the number, the scammer poses as a technical support agent and attempts to convince the caller that the computer has been compromised. The next step is typically to ask the victim to download remote access software under the guise of issuing a refund or securing the account.

    In reality, this access is used to steal banking information, install malware or exfiltrate personal data. Because the original message passed security checks and seemed credible, victims often don’t think twice before acting.

    DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

    Graphic of a hacker wearing a Guy Fawkes mask.

    Fraudsters are hijacking iCloud Calendar invites to trick users into calling fake support lines. (Jonathan Raa/NurPhoto via Getty Images)

    6 ways you can stay safe from iCloud Calendar scammers

    I have listed some useful steps you can take to protect yourself from falling victim to these increasingly sophisticated phishing scams:

    1) Treat unexpected calendar invites with caution

    If you receive an unexpected calendar invite, especially one containing a strange message or alarming claims, don’t open it or respond. Legitimate companies rarely send payment disputes or security warnings through calendar invites. Always verify suspicious claims by logging into your official account directly.

    2) Avoid calling numbers listed in emails or calendar invites

    Phishing scams often include phone numbers that connect you to fraudsters posing as support agents. Instead of calling the number in the message, use official contact details found on the company’s official website.

    3) Install trusted antivirus software

    Antivirus programs protect your computer from malware and phishing sites by blocking suspicious downloads and warning you about unsafe websites.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Also, keeping your antivirus updated ensures it can defend against the latest threats.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    4) Remove your personal data from public listings

    Hackers are able to send you these phishing emails because they have your data. Using a personal data removal service helps scrub your personal information from data broker websites. This makes it significantly harder for attackers to gather details about you and craft convincing, targeted phishing attacks.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Use a password manager

    A password manager helps you generate and securely store strong, unique passwords for every account. This reduces the risk of reusing weak passwords that scammers can easily exploit to gain unauthorized access to your accounts.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    6) Keep software and systems updated

    Regularly updating your operating system, browser and applications helps patch security vulnerabilities that attackers often exploit in phishing scams. Staying current with updates minimizes your exposure to known threats.

    CLICK HERE TO GET THE FOX NEWS APP

    Kurt’s key takeaway

    Scammers are taking phishing attacks in a disturbing new direction by manipulating trusted platforms to deliver malicious content. The safest approach is to treat any unexpected calendar invite, especially those with alarming messages or strange contact numbers, with extreme caution. Never call the number provided in the message or click on any links. Instead, go directly to official websites or your account’s official dashboard to verify suspicious activity.

    Have you ever been targeted by a phishing scam disguised as an official message? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    [ad_2]

    Source link

  • Top 5 overpayment scams to avoid

    [ad_1]

    NEWYou can now listen to Fox News articles!

    Overpayment scams are on the rise, and they can leave victims thousands of dollars in debt. The setup usually looks harmless: someone sends you a check for more than the agreed amount, asks you to forward the difference and disappears once the check bounces. Below are five of the most common overpayment scams you need to watch for today.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING IT

    1. The dog walker overpayment scam

    Bob from Harrison, Ohio, recently shared how he was nearly tricked by a scammer posing as a pet owner. The con began with a request for dog sitting. Bob was promised $250 for care and food, but then a fake check for $4,358 arrived.

    The scammer instructed Bob to send $4,000 of it to an “appliance retailer.” Why an appliance retailer when the service was for dog sitting? Scammers often use a third party to make the request sound more believable. If they simply asked for the money back, it would raise red flags. By inventing another company, whether a retailer, shipping service or contractor, they add urgency and legitimacy to the story. In reality, that “retailer” is just another front that the scammer controls. Here’s the catch: the check appears to be real, but it’s actually counterfeit. The bank may release the funds temporarily, but once it bounces, you’re on the hook for the entire amount.

    Making a payment by scanning a QR code with a phone. (Kurt “CyberGuy” Knutsson)

    Tip: If you’re asked to forward money to a third party, especially one unrelated to the original deal, treat it as a scam. Keep the check and envelope as evidence, and report it to the FTC and your state attorney general.

    2. The online marketplace scam

    Selling a couch, bike or electronics online? Some buyers “accidentally” send too much. They then ask you to return the difference through Zelle, Venmo or a wire transfer. Once the check or payment reverses, you’ve lost both the product and the money you returned.

    Tip: Always insist on verified payment methods. If a buyer pushes you for a refund quickly, walk away. 

    FAKE AGENT PHONE SCAMS ARE SPREADING FAST ACROSS THE US

    A woman shopping for clothes

    Scammers may try to recruit buyers into buying gift cards before a false check they provided bounces. (Kurt “CyberGuy” Knutsson)

    3. The mystery shopper scam

    You might get an email or letter offering a job as a mystery shopper. They send you a large check to “test” stores by buying gift cards. You’re asked to send the gift card numbers back as proof of purchase. After the bank reverses the fake check, you’ve lost the money you spent on those gift cards.

    Tip: Real companies never pay upfront with extra funds or ask for gift card codes by email.

    4. The rental deposit scam

    Scammers target renters by mailing a check for more than the deposit or rent. They claim it was a mistake and ask you to refund the difference. The check later bounces, leaving you stuck.

    Tip: Only accept payments through secure online portals or in person with verified funds.

    5. The work-from-home equipment scam

    This one lures jobseekers. The “employer” sends a large check to buy office equipment, then directs you to forward the extra funds to a vendor. Of course, the check is fake, and the supposed vendor is also the scammer.

    Tip: Legitimate employers provide equipment directly or reimburse verified expenses, not through overpayments.

    CLICK HERE TO GET THE FOX NEWS APP

    Treadmill desk

    Scammers target remote workers by promising to provide a stipend for work-from-home tech. (iStock)

    How to protect yourself from overpayment scams

    Now that you’ve seen how these scams play out, from fake dog sitting gigs to marketplace frauds and bogus job offers, it’s clear they all follow the same playbook. Someone sends you too much money and pressures you to forward the extra. That “extra” never existed, and once the check bounces, you’re left holding the bag. The good news is, there are clear steps you can take to protect yourself and keep your money safe.

    Pause before acting

    Every scam in this article, from the dog walker hoax to rental deposit tricks, begins with an overpayment that looks harmless. If someone pays you more than you’re owed, it’s not a mistake. It’s a scam. Do not respond or send money to any third party. Save the check and envelope as evidence, then report it.

    Verify funds with your bank

    Scammers count on you trusting what you see in your account. In Bob’s case, his $4,358 check looked real because the bank showed it as “available.” But available isn’t the same as cleared. Always ask your bank to confirm when funds are fully verified before you spend a dime. 

    Avoid rushing

    Urgency is the scammer’s strongest weapon. Marketplace fraudsters, renters and fake employers will pressure you to “fix” the mistake right away. Slow down, double-check and don’t let anyone force you into quick action. 

    Use secure payment systems

    Whether it’s for rent, freelance work or selling a used item, scammers prefer paper checks because they’re easy to fake. Stick with secure, traceable payment platforms or in-person verified funds. That way, you don’t get stuck when a check bounces.

    Keep records of all communication

    If you receive a suspicious check, save everything: the envelope, emails, texts and any names used. In the dog sitting scam, Bob’s saved emails and the scammer’s phone number became valuable evidence. This documentation helps law enforcement and protects you if the scammer tries again under another identity.

    Use a personal data removal service

    Scammers often find victims by scraping personal details from online data brokers. That’s how they target renters, pet sitters or jobseekers. Using a personal data removal service can limit your exposure and make you harder to target in the first place. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Enable fraud alerts with your bank

    Many banks let you set fraud alerts for large deposits or unusual transactions. Turning these on gives you a chance to review suspicious activity before a scammer pressures you into acting on it.

    Report scams

    Just like Bob did when he cut contact with the fake pet owner, reporting scams helps protect others. File with the Federal Trade Commission (FTC) at reportfraud.ftc.gov and your state attorney general. You can also alert your local police and community groups to stop scammers from targeting someone else.

    Kurt’s key takeaways

    Overpayment scams prey on trust and urgency. They can pop up in online sales, job offers, rental agreements and even friendly community boards. By knowing the warning signs, you can stop scammers before they reach your wallet. Stay cautious whenever you’re asked to deposit more than expected and forward the extra. If it sounds strange, it’s probably a scam.

    What should be done to stop overpayment scams now that they’ve gotten out of hand? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    [ad_2]

    Source link

  • New security measures at high school sporting events in Prince George’s County after fights, robbery – WTOP News

    [ad_1]

    A high school football game marred by fights and a robbery in the parking lot last weekend has led Prince George’s County Public Schools to institute new security protocols for football games.

    A high school football game marred by fights and a robbery in the parking lot last weekend has led Prince George’s County Public Schools to institute new security protocols for football games.

    Interim Superintendent Shawn Joseph said extra police officers and sheriff’s deputies will be on hand outside the events, where they tend to experience the most problems.

    “We typically don’t have issues inside the game,” Joseph said. “Inside the game, you’ve got students that we know, and we have the administrators, and we have our security teams in there monitoring, and it’s rare that there’s an issue in the game. When there are issues, it’s typically outside, in the dark.”

    Spectators will also be required to purchase tickets in advance, and anyone who hasn’t already bought a ticket won’t be allowed inside. Only students of the two schools competing will be allowed in the events, and they’ll need to have a student ID that proves they go there.

    The same protocols will be applied to high school basketball games once the season starts.

    It comes after two high profile incidents that occurred at nighttime events at Wise High School in recent months, both of which, according to Joseph, involved students from other schools causing trouble.

    “That’s what makes it hard, when you don’t know the kids coming to your games,” Joseph said. “It wasn’t their kids or their community.”

    Less than two weeks ago, D.C. Public Schools made a similar decision to enhance security at football games, citing “multiple instances of spectator conflict.”

    Joseph said it’s really a national issue.

    “We’ve got a parenting crisis where parents aren’t putting their expectations on their kids as properly as we would like or hope,” Joseph said. “So kids are coming in and they’re acting like no one has taught them issues of civility, and how to be a good citizen.”

    Get breaking news and daily headlines delivered to your email inbox by signing up here.

    © 2025 WTOP. All Rights Reserved. This website is not intended for users located within the European Economic Area.

    [ad_2]

    John Domen

    Source link

  • How retirees can stop fake debt collector scams

    [ad_1]

    NEWYou can now listen to Fox News articles!

    You pick up the phone and hear a stern voice claiming you owe money. Maybe it’s for a credit card you don’t recognize, a loan you never took out or some old bill you thought was long gone. Panic sets in, especially if the caller threatens arrest, wage garnishment or lawsuits.

    Unfortunately, this scenario is becoming all too common. Scammers are posing as debt collectors, and retirees are among their favorite targets. Even legitimate debt collection companies have crossed the line. One such company was ordered to pay over $8 million for harassing people into paying fake debts.

    The good news? With a little knowledge and some practical steps, you can spot these calls, protect yourself and stop them before they get too close for comfort.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    JURY DUTY PHONE SCAMS ON THE RISE AS FRAUDSTERS IMPERSONATE LOCAL OFFICIALS, THREATEN ARREST

    A 96-year-old woman sits in an armchair in her apartment in Germany on Sept. 1, 2025, and makes a phone call.  (Matthias Balk/picture alliance via Getty Images)

    Why retirees are prime targets

    Scammers don’t call at random. Retirees often make ideal marks because:

    • Less frequent monitoring: Many retirees check credit reports and bank accounts less often, making it easier for fraud to go unnoticed.
    • Accumulated assets: Retirement savings, pensions and home equity make seniors look “cash-rich” to scammers.
    • Trust factor: Politeness and trust on the phone can be exploited.
    • Less tech-savvy: Some retirees feel less comfortable with online verification.

    This combination creates a perfect storm for fake debt collection scams.

    Red flags of fake debt collector calls

    Recognizing the signs can stop scammers in their tracks.

    • Immediate threats or pressure: Real collectors cannot threaten arrest or use abusive language under the Fair Debt Collection Practices Act (FDCPA).
    • Unusual payment methods: Gift cards, wire transfers and cryptocurrency are red flags. Legitimate collectors use checks, debit or bank payments.
    • Refusal to verify debt: If they won’t send written proof, hang up.
    • Mismatch with public records: Fake companies often use official-sounding names that don’t exist.

    Requests for unrelated personal information: Collectors don’t need your Social Security number or bank logins.

    FAKE AGENT PHONE SCAMS ARE SPREADING FAST ACROSS THE US

    An elderly person hanging up a phone

    Kurt “Cyberguy” Knutsson lays out red flags of fake debt collector calls. (Matthias Balk/picture alliance via Getty Images)

    How to safely verify debt collector calls

    Even if a call raises red flags, it’s essential to verify the information before taking action. Here’s how:

    1) Request written verification

    Under the FDCPA, you have the right to ask for a debt validation letter. This document should include:

    • The creditor’s name
    • Original amount owed
    • Verification that the collector is legally authorized to collect the debt.

    Ask for this before paying or sharing any personal info.

    2 Look up the collector

    Check with state attorneys general offices or the Consumer Financial Protection Bureau (CFPB). Verify that the company exists and is licensed to collect in your state.

    3) Contact the original creditor

    If you recognize the debt or think it may be legitimate, call the creditor directly using a verified phone number. Do not rely on the caller’s number; scammers often spoof official-looking numbers.

    4) Use trusted resources

    The FTC offers a “Debt Collection” section on its website with tips and complaint forms. If you suspect fraud, filing a report can help stop the scammers from targeting others.

    CLICK HERE TO GET THE FOX NEWS APP

    A woman on the phone

    Experts warn retirees to be vigilant regarding fake debt collector calls. (Kurt “CyberGuy” Knutsson)

    Pro tip: Extra step to protect your personal information

    Fraudsters rely on personal data to make calls sound convincing. Reducing the amount of information available about you online lowers your risk. Data brokers collect and sell details like your name, phone, address and even past debts. A data removal service can automatically remove your data from hundreds of broker sites, making it harder for scammers to find and target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    When and where to report a scam

    If you’ve encountered a fake debt collector, report them right away:

    • FTC: File at FTC.gov
    • State Attorney General: Use the consumer complaint division in your state
    • CFPB (Consumer Financial Protection Bureau): Submit a complaint online at consumerfinance.gov/complaint/or by phone

    Reporting helps protect other retirees from falling victim.

    Kurt’s key takeaways

    Protecting your retirement isn’t just about managing your savings; it’s about defending your personal information, too. Scammers thrive on fear, urgency and trust, but you now have the knowledge to push back. By spotting red flags, verifying calls and reducing what’s available about you online, you can stop fake debt collectors in their tracks.

    If a scammer called you tomorrow, would you be ready to spot the lies and protect your hard-earned savings? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    [ad_2]

    Source link