ReportWire

Tag: Smartphones

  • Google’s new Call Reason feature marks calls as urgent

    NEWYou can now listen to Fox News articles!

    Sometimes you need someone to answer right away. Maybe you are locked out. Maybe those concert tickets are about to go on sale. Android users are about to get a helpful upgrade that gives their calls more context when time matters.

    Google is rolling out a beta feature called Call Reason in the Phone by Google app that lets you mark a call as urgent before you dial.

    When you use it, the person receiving your call sees the urgent label on their screen. If they miss it, the same note shows up in their call history. That quick hint can give your call priority without you needing to send a separate message.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON

    Call Reason lets you flag a call as urgent before you dial, giving your contacts a clear signal that your call needs quick attention. (Google)

    How the Call Reason feature works

    Call Reason appears inside the Phone by Google app on Android devices. The feature only works when both people use Google’s default calling app and the contact is saved in your phone. Many Android phones ship with Phone by Google preinstalled, especially Pixel models, while others like Samsung may use their own dialer instead. If your device does not use Phone by Google by default, you may not see the feature until you install or switch to the Google version. Once marked as urgent, your call displays a clear indicator that tells the other person the conversation should not wait.

    This simple tool helps friends and family answer faster. It also gives them a reminder if they miss the call. Since the note stays in the call log, it nudges them to call back sooner.

    Why this Call Reason feature on Android can help you

    Missed calls are common. Many people silence their phones while working or driving. Call Reason bridges that gap with a small but meaningful alert that adds context. You can give someone a heads-up that the call needs quick attention without creating extra steps or confusion.

    Right now, Call Reason only supports the urgent label. Google has hinted that more options could come later, like short custom messages or emoji-style indicators. That could add even more clarity when your call is tied to a specific topic.

    5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOW

    A Google phone call with the notify button highlighted

    Both people need to use the Phone by Google app for the urgent label to work, which helps your calls stand out when timing matters most.  (Google)

    How to check if you have ‘Phone by Google’ on your Android

    Not every Android phone shows ‘Phone by Google’ in its settings. Some manufacturers, especially Samsung, use their own Phone app. Here is a quick way to confirm if you have the Google version on your device.

    Check the Play Store

    Open Google Play Store

    Search for Phone by Google

    If you see Open or Update, it is installed

    If you see Install, your phone does not have it yet.

    If the Install button appears, you can download it with one tap.

    After installing the Google Phone app

    Once it is installed, your phone may prompt you to set it as your default calling app. If it does not, you can change it manually.

    Switch to Phone by Google as your default

    Once Phone by Google is installed, you need to make it your main calling app. Call Reason only works when Phone by Google is set as your default calling app. Installing it is not enough. You must switch your phone to use the Google dialer for the feature to appear. Here’s how to enable it by following these steps.

    On Pixel devices

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap Default apps

    Tap Phone app

    Select Phone by Google, which uses a blue icon with a white phone handset

    On Samsung Galaxy phones

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap the three dots

    Tap Choose default apps

    Tap Phone app

    Select Phone by Google if available. It uses a blue icon with a white phone handset, which looks different from Samsung’s green Phone icon

    Samsung may block or hide the Google Phone app on some carrier models. If you do not see it after installation, your device may not support switching. 

    How to use the Call Reason urgent label on Android

    Once you have Phone by Google set as your default calling app, using Call Reason is very simple. Both you and the person you are calling must use the Phone by Google app for the urgent label to appear.

    How to mark your call as urgent

    When you are ready to call someone:

    Open the Phone by Google app

    Go to your Contacts or Recents

    Tap the contact you want to call

    Before you press the call button, look for the Call Reason option on the screen

    Tap Urgent to attach the urgent label

    Then tap the call button to place your call

    The urgent badge is sent with your outgoing call so the person knows your call needs attention.

    What the other person sees

    When your call reaches them, they will see:

    Your name and number

    A bold “Urgent” label under your name on the incoming call screen

    If they miss the call:

    The urgent label appears in their call history

    They can tap your missed call to return it quickly

    No extra steps are needed on their end. They do not need to press anything special to receive an urgent call. Their only requirement is that they also use Phone by Google as their default calling app.

    What both people must have for it to work

    For the urgent label to show:

    Both people must use Phone by Google

    Both devices must support the Call Reason beta rollout

    The person must be saved in your Contacts

    If any of those pieces are missing, the option will not appear.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    A Google phone call with the notify and urgent buttons highlighted

    When someone receives an urgent call, the label appears on their screen and in their call history if they miss it, making it easier to call back fast. (Google)

    Tips for getting the most out of Call Reason

    Use the urgent label only for situations that need fast attention

    Keep your contacts list updated so the feature works as intended

    Encourage close friends or family to use the Phone by Google app for full compatibility

    Check your call history for urgent notes if you miss an important call  

     Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Call Reason feels like one of those small upgrades that can make everyday calling a little smoother. It gives your friends a quick sense of why you’re reaching out and helps cut through the guesswork when timing matters. As the feature expands, it could turn into an even more helpful way to share context before someone taps Accept.

    What situation in your life would make you use the urgent label first? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Find a lost phone that is off or dead

    NEWYou can now listen to Fox News articles!

    Losing your phone can leave you in panic mode, especially when the battery dies. The good news is that both Apple and Android offer built-in tools that help you track a missing device even when it is powered off or offline.

    With an iPhone, you can use the Find My network on another Apple device or sign in from a browser. With Android, you can use Google’s Find My Device system to see the last known location and secure your phone fast.

    This guide walks you through clear steps for iPhone and Android so you know exactly what to do next.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    You can still find your lost Apple device even when it’s dead. (Apple)

    Does Find My work when your iPhone is dead?

    Yes, it does. Your iPhone uses low power mode in the background so it stays findable for a period after powering off. If other Apple devices are nearby, your phone can still send out a Bluetooth signal that helps pinpoint the last known location.

    You can check this location from any Apple device or a browser.

    Use Find My from another Apple device

    If you have an iPad, Mac, or another iPhone, you can look up your missing device in seconds. Family Sharing works too, so you can track a shared device even if it is offline. Here is how to do it:

    • Open the Find My app
    • Tap the Devices tab
    • Swipe up to see your full list of devices
    • Select your missing iPhone
    • View the location on the map
    • Tap Directions to navigate to it
    • Tap Play Sound if the phone is on and nearby
    Steps to enable Find My on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    • Turn on Lost Mode by tapping continue at the bottom of the screen to lock it and show a message with a callback number.
    • Enter a phone number that can be used when someone finds your iPhone and wants to contact you. Then, tap Next. 
    • If the screen icon is black, the phone is dead. You will still see the last known location, so you know where to start looking.
    Steps to enable Find my on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    Find your iPhone from a web browser

    If you only have access to a computer or an Android phone, use iCloud.com to locate your device. The browser version gives fewer tools, but it still shows your iPhone on the map. Follow these steps:

    • Go to iCloud.com/find
    • Sign in with your Apple ID
    • Approve two-factor if needed
    A Find Devices sign in screen

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Select All Devices
    • Choose your missing iPhone
    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Use Play Sound if the device is on
    • Turn on Lost Mode to lock the phone

    Use this method when you have no Apple hardware nearby.

    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    Use the Help a Friend feature in Find My

    If you need to borrow another person’s iPhone, avoid signing in to their device directly. That triggers security checks you cannot complete without your missing phone. Instead, use Help a Friend inside the Find My app:

    • Open Find My on your friend’s iPhone
    • Scroll to Help a Friend
    • Sign in with your Apple ID
    • View the last known location of your iPhone

    This tool bypasses two-factor prompts so you can get your location without any issues.

    Help a Friend feature on iPhone

    Steps to use the Help a Friend feature in Find My. (Kurt “CyberGuy” Knutsson)

    Can you find an iPhone without Find My

    If ‘Find My’ was never enabled, you must retrace your steps. You can check ‘Your Timeline’ in Google Maps if you use that app and have location history on.

    Without ‘Find My,’ there is no way to remotely lock, track, or erase the device.

    Once you recover your phone, turn on ‘Find My’ and enable ‘Send Last Location’ so you are covered next time.

    Best iPhone settings to turn on before your device goes missing

    Before your iPhone ever goes missing, take a minute to set up these key protections.

    1) Turn on Find My iPhone

    This keeps your device trackable whether it is on or off. Go to Settings, then tap your name, then click Find My, then Find My iPhone and enable it. 

    2) Enable Send Last Location

    Go to Settings, then tap your name, then click Find My, then Find My iPhone and scroll down and enable Sent Last Location. 

    Your phone will save its final location before the battery dies.

    3) Turn on Find My network

    Go to Settings, tap your name, click Find My, then tap Find My iPhone and enable Find My network.
    This keeps your iPhone discoverable through nearby Apple devices even when it is off or offline.

    4) Keep two-factor authentication on

    Go to Settings, tap your name, tap Sign-In & Security, select Two-Factor Authentication (2FA), then tap your iPhone and make sure 2FA is turned on.
    This blocks anyone from accessing your Apple ID without approval.

    5) Use a strong passcode

    Go to Settings, then tap Face ID & Passcode, then enter your current passcode.
    Tap Change Passcode and follow the prompts to set a unique passcode that is hard to guess.

    6) Add a recovery contact

    Go to Settings, tap your name, tap Sign-In & Security, then tap Recovery contacts. Then, click Add Recovery Contact. 
    Add a trusted person as your recovery contact so you can verify your identity if you ever lose your iPhone. 

    CAN’T FIND YOUR ANDROID PHONE? HERE’S WHAT TO DO TO TRACK IT DOWN

    How to find an Android phone that is off or dead

    Android users can also track a missing device using Google’s Find My Device system. While you cannot see live location when the phone is powered off, you can view the last known location, lock the phone, or display a message for anyone who finds it. Here is how to track it:

    Find your Android from a browser

    Settings may vary depending on your Android phone’s manufacturer.

    • Go to android.com/find
    • Sign in with your Google account
    • Select your missing device
    • View the last known location on the map
    • Select Secure Device to lock it and display a callback message
    • Select Play Sound if the phone is on and nearby

    Find your Android from another phone

    Settings may vary depending on your Android phone’s manufacturer.

    • Download the Find My Device app on another Android
    • Sign in with your Google account
    • Tap your missing phone to view its last known location

    If the phone is off or dead, the map will show its last saved location. You can still lock the device or leave a message for whoever finds it.

    Best Android settings to turn on before your device goes missing

    Before your Android phone ever goes missing, take a minute to set up these key protections.

    Settings may vary depending on your Android phone’s manufacturer.

    1) Turn on Find My Device

    This lets you track your phone or lock it from any browser.
    Go to Settings, tap Security & privacy, tap Find My Device or Device Finders and turn it on.
    (Names may vary by manufacturer.)

    2) Enable Location Services

    This improves accuracy and helps Google save your phone’s last known location.
    Go to Settings, tap Location and turn on Use Location.

    3) Turn on Google Location History

    This allows Google to show past locations even when your phone is off.
    Go to Settings, tap Location, tap Location Services, then choose Google Location History or Google Location Sharing and turn it on.

    4) Add a recovery phone number or email

    This helps you verify your identity and recover your account fast.
    Go to Settings, tap Google, tap Manage your Google Account, then open the Security tab and add a recovery phone number or email.

    5) Use a strong screen lock

    Choose a secure lock to keep your data safe.
    Go to Settings, tap Security, then Screen lock, and select a PIN, pattern, or password that is hard to guess.

    6) Turn on “Send last location” (If available)

    Some Android models save the phone’s last known location before the battery dies.
    Go to Settings, tap Security & privacy, tap Find My Device and enable Send last location if your device supports it.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    A dead or powered-off phone does not have to stay lost. Apple’s Find My network and Google’s Find My Device system both give you a last known location and fast tools that help you lock or secure your phone. With the right settings in place before anything happens, you can recover your device sooner and protect your personal data.

    What would you do first if your phone went missing today? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Don’t Fall for Sketchy iPhone VPNs—Here Are the Only 3 You Should Use

    iPhone VPNs, Compared

    You might be surprised how similar the three VPNs I chose are when you break down their features, but that’s not an accident. Given how restrictive I was with who made the final cut, there’s a pretty high bar for inclusion. Although there are some minor differences, I designed this list in a way that you can choose one of my picks without reading a single word and still come out the other side with an excellent VPN for iPhone.

    Other iPhone VPNs We Tested

    Surfshark

    Courtesy of Surfshark

    Surfshark: Surfshark was a strong contender for the main list. Even its Starter plan comes with extra features like a masked email generator. Features like ad and tracker blocking, as well as unlimited simultaneous connections, come standard across plans. However, it was a bit slower than my top picks, dropping around 20 percent of speed on average, compared to around 15 percent for the top options.

    Mullvad: Mullvad is a favorite among privacy enthusiasts, and for good reason. It doesn’t fuss with multi-year discounts or referral programs, and you don’t even need to provide an email to sign up for an account. You can even pay the static monthly fee by mailing Mullvad cash. It’s a great service if privacy is your top priority, but it trades speeds and features in the process. VPN services like Nord and Proton have quickly grown into full privacy and security suites, while Mullvad is more focused on making a robust VPN. In the context of an iPhone, the scales tip more toward those security suites, but Mullvad is still a great privacy-focused option to keep in mind.

    ExpressVPN: By the numbers, ExpressVPN should be at the top of the list. It has a ton of servers, a featureset that can go toe-to-toe with Nord, and speeds only a touch below Proton. However, ExpressVPN has found itself in a spiral of increasing controversies over the past four years, and the brand has yet to get back on solid footing. After being purchased by Kape Technologies—the company behind the infamous adware company Crossrider—former US intelligence official Daniel Gericke took over at CTO and continued in that role for two years, even after being fined over $300,000 by the US Department of Justice for hacking activities on behalf of a foreign government. Gericke left in 2023, but that same year, ExpressVPN experienced a large swath of layoffs, and Kape, its parent company, was delisted from the London Stock Exchange. The vast majority of shares went to Unikmind Holdings Limited, a company owned by Israeli billionaire Teddy Sagi, who got his start by creating gambling software Playtech. That’s an extremely condensed version of what ExpressVPN has gone through over the past few years. The company hasn’t done anything nefarious, but the revolving door of executive control tied to controversial names doesn’t inspire confidence.

    Private Internet Access: Private Internet Access, or PIA, is also owned by Kape Technologies, and it followed a similar playbook as ExpressVPN and CyberGhost, which Kape also owns. After the acquisition and community backlash, there’s been very little transparency about what’s going on in the company. A connection to Kape definitely raises questions, but that doesn’t immediately disqualify a service from being included. Unfortunately for PIA, it had much slower speeds than any of the other VPN services I tested, so regardless of ownership, it isn’t a top pick for iPhone VPNs.

    iPhone VPNs to Avoid

    X-VPN: X-VPN is one of many different VPNs that show up high in the search results on iPhone. There’s a desktop app, but X-VPN mainly targets mobile users with its free plan. It was featured in a Tech Transparency Project report about VPNs with ties to the Chinese government, alongside apps like TurboVPN. I haven’t tested TurboVPN, but X-VPN has issues. Even without questionable ties, X-VPN doesn’t have the best speeds, and it lacks basic features like split tunneling, all while charging the same price as top VPNs like NordVPN and Proton VPN.

    Hola: Hola is an infamous name if you’ve been around the VPN space long enough. Around a decade ago, Hola fell under fire. It owns a data collection company known as Bright Data (formerly Luminati), and that network is made up of users who use Hola. This network was used for a public distributed denial-of-service (DDoS) attack. Even a decade on, Hola still logs user data, including your IP address, and it still sells access to its peer-to-peer network, meaning you could become an exit node without knowing.

    EventVPN: EventVPN comes from the same team behind ExpressVPN, but it takes a very different approach to privacy. It’s free, and it’s only available on iPhone and Macs, but most importantly, it’s supported by ads. EventVPN says it’s able to leverage an ad-supported model with Apple’s advertising privacy features, which allows for tailored ads without giving out personally-identifiable information. That’s the story, at least, but as you can read in our iPhone privacy guide, Apple’s privacy-focused advertising model still shares some critical information, including your zip code. Further, the pervasiveness of ads in EventVPN makes it hard to recommend. You have to wait through a 30-second video each time you connect or disconnect from a server, and a banner ad lives at the top of the app at all times. EventVPN has a paid plan to remove ads, but at that point, you might as well pick up ExpressVPN. And, on the free end, there’s ProtonVPN and Windscribe, both of which I’d recommend over EventVPN.

    How We Tested

    To earn the best iPhone VPN title, a service needs to satisfy three criteria. It needs to be secure, fast, and easy to use. That may seem straightforward enough, but there’s a little more that goes into it. For ease of use, I only looked at VPNs that offer a one-tap connection. If you need to configure anything, that’s a disqualification. That still encompasses a lot of the most popular VPNs on iPhone, so I narrowed the field further by focusing on apps that balance usability with power. You should have all the relevant features in the iOS app that are available in the desktop app, and organized in a way that they don’t disrupt that one-tap experience.

    Speed testing is where I focused a lot of my testing time. Speed testing is highly variable, and trying to come out with one singular number to encompass the speed of thousands of servers is a fool’s errand. The numbers I gathered for this guide are the result of 20 tests I ran for each VPN, then averaged.

    I tested five locations for each VPN, measuring my unprotected speed immediately before testing and running three passes before averaging. Each location was tested at a different time of day, and I removed any outliers before averaging. For this guide, that meant if there was greater than a 10 percent deviation between two of the three passes. After averaging the speed drop for each location, I gathered all of those numbers together and averaged them for a final speed drop.

    Finally, security. The traditional wisdom with a VPN is that you, at some point, have to put some faith in the company that its privacy policy is accurate and it isn’t lying about its logging practices. That didn’t do it for me. Again, I set a high bar for inclusion.

    Every VPN I’ve included here has not only been independently audited, but also been forced to uphold its no-logs policy in legal proceedings. You indeed need to put some trust that the VPN provider you’re using is telling the truth, but the options I included all have rock-solid track records when it comes to transparency.


    Power up with unlimited access to WIRED. Get best-in-class reporting and exclusive subscriber content that’s too important to ignore. Subscribe Today.

    Jacob Roach

    Source link

  • How Android malware lets thieves access your ATM cash

    NEWYou can now listen to Fox News articles!

    Smartphone banking has made life easier, but it has also opened new opportunities for cybercriminals.

    Over the past few years, we have seen Android malware steal passwords, intercept OTPs and even take remote control of phones to drain accounts. Some scams focus on fake banking apps, while others rely on phishing messages that trick you into entering sensitive details.

    Security researchers have now discovered a new threat that goes a step further. Instead of simply stealing login information, this malware gives thieves the ability to walk up to an ATM and withdraw your money in real time.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Android malware like NGate tricks users into downloading fake banking apps that steal sensitive data. (Kurt “CyberGuy” Knutsson)

    How the NGate malware works

    The Polish Computer Emergency Response Team (CERT Polska) discovered a new Android malware called NGate that uses NFC activity to access a victim’s bank account. This malware monitors contactless payment actions on the victim’s phone and forwards all transaction data, including the PIN, directly to a server controlled by attackers. It does not just copy card details. Instead, it waits until the victim taps to pay or performs a verification step, then captures the fresh, one-time authentication codes that modern Visa and Mastercard chips generate.

    To pull this off, attackers need to infect the phone first. They typically send phishing messages claiming there is a security problem with the victim’s bank account. These messages often push people to download a fake banking app from a non-official source. Once the victim installs it, the app walks them through fake verification prompts and requests permissions that allow it to read NFC activity. As soon as the victim taps their phone or enters their PIN, the malware captures everything the ATM needs to validate a withdrawal.

    MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON

    A Google phone

    Once installed, the malware captures NFC tap-to-pay codes and PINs the moment the victim uses their phone. (Kurt “CyberGuy” Knutsson)

    What attackers do with the stolen data at the ATM

    The attackers rely on speed. The one-time codes generated during an NFC transaction are valid for only a short period. As soon as the infected phone captures the data, the information is uploaded to the attacker’s server. An accomplice waits near an ATM, holding a device capable of emulating a contactless card. This could be another phone, a smartwatch or custom NFC hardware.

    When the data arrives, the accomplice presents the card-emulating device at the ATM. Since the information contains fresh, valid authentication codes and the correct PIN, the machine treats it like a real card. The ATM authorizes the withdrawal because everything appears to match a legitimate transaction. All of this happens without the criminal ever touching the victim’s physical card. Everything depends on timing, planning and getting the victim to unknowingly complete the transaction on their own phone.

    A man holds a Google phone, powered by Android

    Criminals use the stolen, time-limited codes at an ATM to make real withdrawals without the victim’s card. (Kurt “CyberGuy” Knutsson)

    7 steps you can take to stay safe from Android NGate malware

    As attacks like NGate become more sophisticated, staying safe comes down to a mix of good digital habits and a few simple tools that protect your phone and your financial data.

    1) Download apps only from the Play Store

    Most malicious banking apps spread through direct links sent in texts or emails. These links lead to APK files hosted on random servers. When you install apps only from the Play Store, you get Google’s built-in security checks. Play Protect regularly scans apps for malware and removes harmful ones from your device. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Even if attackers send convincing messages, avoid installing anything from outside the official store. If your bank wants you to update an app, you will always find it on the Play Store.

    2) Use strong antivirus software

    One careless tap on a fake bank alert can hand criminals everything they need. Strong antivirus software can stop most threats before they cause damage. It scans new downloads, blocks unsafe links and alerts you when an app behaves in ways that could expose your financial data. Many threats like NGate rely on fake banking apps, so having real-time scanning turned on gives you an early warning if something suspicious tries to install itself.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    ATM ‘JACKPOTTING’ CRIME WAVE GROWS AFTER THIEVES WALK AWAY WITH HUNDREDS OF THOUSANDS IN CASH

    3) Keep your device and apps updated

    Security patches fix vulnerabilities that attackers use to hijack permission settings or read sensitive data. Updates also improve how Android monitors NFC and payment activity. Turn on automatic updates for both the operating system and apps, especially banking and payment apps. A fully updated device closes many of the holes that malware tries to exploit.

    4) Use a password manager to avoid phishing traps

    Phishing attacks often direct you to fake websites or fake app login pages that look identical to the real thing. A password manager saves your credentials and fills them in only when the website or app is authentic. If it refuses to autofill, it is a clear sign that you are on a fake page. Consider using a password manager to generate and store complex passwords.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Turn on two-factor authentication for all financial services

    Two-factor authentication gives you a second layer of protection, even if your password is compromised. App-based authenticators are more secure than SMS codes because they cannot be intercepted as easily. For banking apps, enabling 2FA adds friction for attackers trying to perform unauthorized actions. Combined with strong passwords from a password manager, it significantly reduces the chance of account takeover.

    6) Ignore suspicious texts, emails and calls

    Attackers rely on urgency to trick you. They often claim that your card is blocked, your account is frozen or a payment needs verification. These messages push you to act fast and install a fake app. Always pause and check your bank’s official channels. Contact the bank through verified customer care numbers or the official app. Never click links or open attachments in unsolicited messages, even if they look legitimate.

    7) Review app permissions

    Most people install apps and forget about them. Over time, unused apps pile up with unnecessary permissions that increase risk. Open your phone’s permission settings and check what each app can access. If a simple tool asks for access to NFC, messages or accessibility features, uninstall it. Attackers exploit these excessive permissions to monitor your activity or capture data without your knowledge.

    Kurt’s key takeaway

    Cybercriminals are now combining social engineering with the secure hardware features inside modern payment systems. The malware does not break NFC security. Instead, it tricks you into performing a real transaction and steals the one-time codes at that moment. This makes the attack difficult to spot and even harder to reverse once the withdrawal goes through. The best defense is simple awareness. If a bank ever urges you to download an app from outside the Play Store, treat it as an immediate warning sign. Keeping your phone clean is now as important as keeping your physical card safe.

    Have you ever downloaded an app from outside the Play Store? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Fake ChatGPT apps are hijacking your phone without you knowing

    NEWYou can now listen to Fox News articles!

    App stores are supposed to be reliable and free of malware or fake apps, but that’s far from the truth. For every legitimate application that solves a real problem, there are dozens of knockoffs waiting to exploit brand recognition and user trust. We’ve seen it happen with games, productivity tools and entertainment apps. Now, artificial intelligence has become the latest battleground for digital impostors.

    The AI boom has created an unprecedented gold rush in mobile app development, and opportunistic actors are cashing in. AI-related mobile apps collectively account for billions of downloads, and that massive user base has attracted a new wave of clones. They pose as popular apps like ChatGPT and DALL·E, but in reality, they conceal sophisticated spyware capable of stealing data and monitoring users.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    OPENAI ACCUSES NY TIMES OF WANTING TO INVADE MILLIONS OF USERS’ PRIVACY IN PAPER’S LAWSUIT AGAINST TECH GIANT

    Fake AI apps pose as trusted tools like ChatGPT and DALL·E while secretly stealing user data. (Kurt “CyberGuy” Knutsson)

    What you need to know about the fake AI apps

    The fake apps flooding app stores exist on a spectrum of harm, and understanding that range is crucial before you download any AI tools. Take the “DALL·E 3 AI Image Generator” found on Aptoide. It presents itself as an OpenAI product, complete with branding that mimics the real thing. When you open it, you see a loading screen that looks like an AI model generating an image. But nothing is actually being generated.

    Network analysis by Appknox showed the app connects only to advertising and analytics services. There’s no AI functionality, just an illusion designed to collect your data for monetization.

    Then there are apps like WhatsApp Plus, which are far more dangerous. Disguised as an upgraded version of Meta’s messenger, this app hides a complete malware framework capable of surveillance, credential theft and persistent background execution. It’s signed with a fake certificate instead of WhatsApp’s legitimate key and uses a tool often used by malware authors to encrypt malicious code.

    Once installed, it silently requests extensive permissions, including access to your contacts, SMS, call logs, device accounts and messages. These permissions allow it to intercept one-time passwords, scrape your address book and impersonate you in chats. Hidden libraries keep the code running even after you close the app. Network logs show it uses domain fronting to disguise its traffic behind Amazon Web Services and Google Cloud endpoints.

    Not every clone is malicious. Some apps identify themselves as unofficial interfaces and connect directly to real APIs. The problem is that you often can’t tell the difference between a harmless wrapper and a malicious impersonator until it’s too late.

    ChatGPT app

    Clones hide spyware that can access messages, passwords and contacts. (Kurt “CyberGuy” Knutsson)

    Users and businesses are equally at risk

    The impact of fake AI apps goes far beyond frustrated users. For enterprises, these clones pose a direct threat to brand reputation, compliance and data security.

    When a malicious app steals credentials while using your brand’s identity, customers don’t just lose data but also lose trust. Research shows customers stop buying from a brand after a major breach. The average cost of a data breach now stands at 4.45 million dollars, according to IBM’s 2025 report. In regulated sectors like finance and healthcare, such breaches can lead to violations of GDPR, HIPAA and PCI-DSS, with fines reaching up to 4% of global turnover.

    A folder labeled "AI" is seen on a smartphone.

    These impostors harm both users and brands, leading to costly data breaches and lost trust. (Kurt “CyberGuy” Knutsson)

    8 steps to protect yourself from fake AI apps

    While the threat landscape continues to evolve, there are practical measures you can take to protect yourself from malicious clones and impersonators.

    1) Install reputable antivirus software

    A quality mobile security solution can detect and block malicious apps before they cause damage. Modern antivirus programs scan apps for suspicious behavior, unauthorized permissions and known malware signatures. This first line of defense is especially important as fake apps become more sophisticated in hiding their true intentions.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Use a password manager

    Apps like WhatsApp Plus specifically target credentials and can intercept passwords typed directly into fake interfaces. A password manager autofills credentials only on legitimate sites and apps, making it significantly harder for impostors to capture your login information through phishing or fake app interfaces.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Consider identity theft protection services

    Given that malicious clones can steal personal information, intercept SMS verification codes and even impersonate users in chats, identity theft protection provides an additional safety net. These services monitor for unauthorized use of your personal information and can alert you if your identity is being misused across various platforms and services.

    Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    PROTECTING KIDS FROM AI CHATBOTS: WHAT THE GUARD ACT MEANS

    4) Enable two-factor authentication everywhere

    While some sophisticated malware can intercept SMS codes, 2FA still adds a critical layer of security. Use authenticator apps rather than SMS when possible, as they’re harder to compromise. Even if a fake app captures your password, 2FA makes it significantly more difficult for attackers to access your accounts.

    5) Keep your device and apps updated

    Security patches often address vulnerabilities that malicious apps exploit. Regular updates to your operating system and legitimate apps ensure you have the latest protections against known threats. Enable automatic updates when possible to stay protected without having to remember manual checks.

    6) Download only from official app stores

    Stick to the Apple App Store and Google Play Store rather than third-party marketplaces. While fake apps can still appear on official platforms, these stores have security review processes and are more responsive to removing malicious applications once they’re identified. Third-party app stores often have minimal or no security vetting.

    7) Verify the developer before downloading

    Check the developer name carefully. Official ChatGPT apps come from OpenAI, not random developers with similar names. Look at the number of downloads, read recent reviews and be suspicious of apps with few ratings or reviews that seem generic. Legitimate AI tools from major companies will have verified developer badges and millions of downloads.

    8) Use a data removal service

    Even if you avoid downloading fake apps, your personal information may already be circulating on data broker sites that scammers rely on. These brokers collect and sell details like your name, phone number, home address and app usage data, information that cybercriminals can use to craft convincing phishing messages or impersonate you.

    A trusted data removal service scans hundreds of broker databases and automatically submits removal requests on your behalf. Regularly removing your data helps reduce your digital footprint, making it harder for malicious actors and fake app networks to target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    The AI boom has driven massive innovation, but it has also opened new attack surfaces built on brand trust. As adoption grows across mobile platforms, enterprises must secure not only their own apps but also track how their brand appears across hundreds of app stores worldwide. In a market where billions of AI app downloads have happened, the clones aren’t coming. They’re already here, hiding behind familiar logos and polished interfaces.

    Have you ever downloaded a fake AI app without realizing it? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    Source link

  • Manage Android apps with the new ‘Uninstall’ button

    NEWYou can now listen to Fox News articles!

    If you use more than one Android device with the same Google account, you know how messy things can get.

    Tracking which apps are installed on which phone or tablet can quickly become confusing. The Google Play Store already showed how many of your devices had a particular app, but uninstalling apps across multiple devices required digging through several menus.

    That’s changing now, thanks to Google’s latest Play Store update.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

    A new Play Store update makes it easier to manage apps across all your Android devices. (Kurt “CyberGuy” Knutsson)

    The new uninstall button rolls out

    Google is rolling out version 48.8 of the Play Store, and it introduces a new ‘Uninstall’ button right on each app’s listing. You can now remove an app from any of your devices directly from your main phone. This eliminates the need to pick up each device and remove the app one by one. According to Android Authority and other reliable tech outlets, this feature appears beside each Android device listed under your account, making it faster to keep your devices organized and clutter-free.

    The update replaces the older process that required navigating through ‘Profile,’ then ‘Manage Apps and Devices,’ then applying a device filter before uninstalling. That long-winded method still works, but the new shortcut saves time and effort. The feature is rolling out gradually, so you might not see it right away, but it should appear soon as part of the stable update.

    Why this update matters

    For anyone juggling a phone, tablet or even a work device, this new feature makes a real difference. Over time, unused apps pile up, taking up storage space and slowing down performance. Being able to remove them remotely helps keep every device clean and efficient without switching between screens.

    The change also improves digital hygiene. Many people forget about apps on old phones that still have access to personal data or permissions. Now you can easily remove those apps before they become a privacy or security risk. The update also makes it simpler for parents managing family devices to stay in control of what’s installed on their kids’ phones.

    How to use the new uninstall button on Android 

    Settings may vary depending on your Android phone’s manufacturer. 

    • Open the Play Store app on your device.
    • Navigate to the listing of an app that you know is installed on another device signed in to your account.
    • Under the “Installed on X devices” section, you may see a new ‘Uninstall’ button next to each listed device.
    • Tap Uninstall next to the one you want to remove from your Android.

    Then click This Device.

    GOOGLE CHROME AUTOFILL NOW HANDLES IDS

    An Android screen tutorial

    Steps to use the new uninstall button on Android. (Kurt “CyberGuy” Knutsson)

    How to uninstall Android apps when the new Play Store button isn’t showing

    Wait for the update to roll out if key features aren’t showing yet. If the button isn’t present, you can still uninstall an app with these steps:

    Settings may vary depending on your Android phone’s manufacturer.

    • Click Profile.
    • Tap Manage apps & devices.
    • Click Manage.
    • Use the device filter to select the target device.
    • Press the app you want to uninstall.

    Click uninstall.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    A tutorial on how to uninstall apps from Android across multiple devices

    The new feature saves time and improves organization across a user’s Android devices. (Kurt “CyberGuy” Knutsson)

    What this means to you

    This feature saves time, improves organization and helps you keep your Android devices running smoothly. By uninstalling unused apps remotely, you free up valuable storage and reduce unnecessary background activity that can drain battery life. You also make your devices more secure by removing older apps that might not be receiving updates anymore. It’s a thoughtful update that shows how Google is paying attention to everyday usability rather than adding flashy new tools. Even if it seems like a small change, the impact adds up for people who live in a multi-device world.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    The new ‘Uninstall’ button in Play Store version 48.8 is a quiet but powerful improvement for Android users. It makes it easier to manage your apps and maintain a cleaner digital environment across all your devices. Once this update reaches your phone, it’s worth exploring which apps you no longer need and removing them in just a few seconds.

    Do you plan to tidy up your devices using the new Google Play Store feature, or do you prefer to manage apps directly from each phone? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Gizmodo’s Best Tech Gifts of 2025 list

    The holidays are here, and that only means one thing: gifting season!

    Skip the gift cards, ugly sweaters you found at Goodwill, or slapped-together macaroni photo frame, and get your friends and family some tech that they’ll actually appreciate. We’ve looked far and wide for gifts we hope will truly delight. From budgets under $50 all the way up to over $1,000 (if you’ve got the money to splurge), Gizmodo has you covered.

    At the very least, we hope our selection of gifts will inspire you to be thoughtful about gifting. Remember: you don’t need to spend a lot of money on a gadget. You just need to find the right gift for the right person!


    Gifts Under $50

    Oda SD Card Holder for Wallet

    Whenever your camera’s memory card fills up or becomes corrupted, you’ll always have a few spare ones tucked in your wallet with this slim sleeve from Oda.

    Anker Soundsync

    Anker SoundSync

    As great as wired audio is, sometimes you can’t beat the convenience of Bluetooth. Anker’s dongle, with a 3.5mm jack, can connect to old monitors and imbue them with the power of wireless audio.

    Maclock

    Maclock

    When it comes to desk clocks, the Maclock has a lot of charm. Shaped like the original Macintosh, the alarm clock can display the time, date, day, and temperature, and also comes with a tiny floppy disk that boots it up.

    Satechi Findall Card

    Satechi FindAll Card

    Losing your wallet sucks. But if Satechi’s FindAll Card is inside it, your iPhone’s Find My app can aid the search effort.

    Nekojita Fufu

    Nékojita FuFu

    Whether you’re drinking a steaming hot chocolate or a hot toddy, this little bear with a built-in fan will cool your cup with little blasts from its windpipe. The Nékojita Fufu sits on any mug or bowl to chill your beverage or soup, and it looks cute doing it.


    Gifts Under $100

    Jbl Grip

    JBL Grip

    Portability might not be everyone’s top priority in a Bluetooth speaker, but if it’s yours, JBL’s Grip is your buy. It may be small, but it’s mighty in volume.

    Retroid Pocket Classic

    Retroid Pocket Classic

    The Retroid Pocket Classic offers a return to retro gaming with a better AMOLED screen than the classic Game Boy offers. You can go with a six-button layout for classic Sega games or the traditional four-button model.

    Genki Shadowcast 2 Pro

    Genki Shadowcast 2 Pro

    For any loved ones with dreams of becoming streamers, the light and portable Genki Shadowcast 2 Pro is a great place to start. The 4K capture card can record or stream your activities on any console (including the Switch 2) or PC.

    Oneplus Buds 4

    OnePlus Buds 4

    There are lots of great wireless earbuds in this price range, but the OnePlus Buds 4 nail the essentials, sporting a healthy dose of bass, solid active noise cancellation, and a great personalized audio feature that EQs the device to your hearing.

    Lego Game Boy

    Lego Game Boy

    This nearly 1:1 replica of the 1989 Game Boy is guaranteed to make any weekend more fun. Lego went to great lengths to make the buttons pressable, include swappable Game Paks, and offer interchangeable lenticular game screens.


    Gifts Under $300

    Casio G Shock Nano Dw 5600

    Casio G-Shock Nano DW-5600

    Smart rings may be all the rage, but may we introduce you to a watch ring? This G-Shock device, resembling Casio’s classic DW-5600, is sure to catch people’s eyes.

    Govee Rgbicww Floor Lamp Pro

    Govee RGBICWW Floor Lamp Pro

    Govee is known for delivering incredible value when it comes to smart lights, and this floor lamp is no exception. The Floor Lamp Pro is slim and sleek, with 300 degrees of rotation to light large swaths of your living room.

    Nomad Stratos Band

    Nomad Stratos Band

    Metal smartwatch bands are stylish but not the most comfortable, especially while working out. The titanium Stratos band pairs perfectly with the Apple Watch Ultra and provides flexibility during exercise.

    Teenage Engineering Ep 133 K.o. Ii

    Teenage Engineering EP-133 K.O. II

    Nothing will delight the hipster in your life more than a gadget from Teenage Engineering. This multipurpose sampler and sequencer does it all and is perfect for musicians in your life (especially electronic ones) with a soft spot for hardware.

    Razer Iskur V2 X

    Razer Iskur V2 X

    When it comes to ergonomics, there are few better-value gaming chairs than Razer’s Iskur V2 X. You don’t have to be a gamer to enjoy Iskur’s smooth-rolling action and back support.


    Gifts Under $500

    Ray Ban Meta Gen 2

    Ray-Ban Meta Gen 2

    The Ray-Ban Meta Gen 2 may lack a display, but they improve on the previous screenless generation in almost every way, bringing doubled battery life and the ability to record 3K video.

    Gopro Max 2

    GoPro Max2

    If you can’t be bothered to rig up several GoPros for multiple angles, the Max2 is the one-stop-shop 360 camera you need. Shoot in 8K and recompose shots from any POV after capture.

    Lomography Mc A

    Lomography MC-A

    Shooting film isn’t a cheap hobby, but if you want to get into 35mm, the Lomo MC-A is an easy way to start. The camera has a 32mm lens, apertures from f/2.8 up to f/16, and a built-in flash.

    Nothing Phone 3

    Nothing Phone 3

    Some people think it’s ugly. Others see the Nothing Phone 3 as challenging the status quo of boring mobile designs. Gimmick or not, the round Glyph Matrix screen on the back is a fun feature that competitors don’t have.

    Roli Keyboard

    Roli Piano

    Learning to play music is hard, but Roli’s light-up keyboard uses color coding to make the process just a little bit easier. Even if you’re not a beginner, the RGB still looks pretty rad.


    Gifts Over $500

    Macbook Air (13 Inch, M4)

    MacBook Air (13-Inch, M4)

    Apple’s entry-level MacBook is easily one of its best deals for those who want tons of performance in a thin and light clamshell design. The MacBook Air is fast enough for regular browsing as well as more intense activities like photo and video editing.

    Lego Death Star

    Lego Death Star

    The Lego Game Boy not enough of a challenge? Maybe this massive set with 9,023 pieces will give you enough blisters to appreciate the process of connecting plastic bricks.

    Framework 13

    Framework Laptop 13

    A Framework laptop is a gift that keeps on giving, so long as the recipient is willing to open it up and learn what makes it tick. The Framework Laptop 13 can come as both a prebuilt system and a DIY kit, so anybody who’s good with their hands can enjoy putting this laptop together.

    Samsung Galaxy Z Fold 7

    Samsung Galaxy Z Fold 7

    Book-style foldables have been thick and heavy—until now. Samsung’s Galaxy Z Fold 7 is as thin and light as a regular flagship and brings a freshly slim vibe to its maturing category.

    Sony Bravia 9

    Sony Bravia 9

    Sony’s Bravia 9 4K TV is still pushing the boundaries of what’s possible with an ultra-high-end screen. The company’s flagship mini LED display offers brilliant picture quality and easy access to your favorite apps through Google TV.

    Gizmodo Staff

    Source link

  • Adaptive Power in iOS 26 boosts iPhone battery life

    NEWYou can now listen to Fox News articles!

    Battery life matters more than ever as your iPhone takes on heavier workloads from streaming and gaming to AI-driven tasks. Every extra minute of charge now makes a difference in how smoothly your day runs.

    With iOS 26, Apple introduced Adaptive Power, an intelligent feature that quietly learns how you use your phone and adjusts performance to stretch battery life when you need it most. It is designed to keep your iPhone running stronger for longer without you having to lift a finger.

    What Adaptive Power does

    Adaptive Power helps your iPhone battery last longer when your daily use increases. It works automatically in the background and learns your recent activity to predict when extra power will be needed. When active, it can make small adjustments, such as lowering screen brightness, limiting background activity or turning on Low Power Mode when your battery reaches 20%.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    APPLE, MICROSOFT HIT $4T MILESTONE

    It uses on-device intelligence to understand your habits, then fine-tunes performance without requiring any input from you. Apple notes that Adaptive Power pauses its adjustments during tasks that demand maximum performance, like using the camera or gaming with Game Mode turned on.

    Adaptive Power in iOS 26 learns your daily habits to extend your iPhone’s battery life automatically. (Apple)

    How Adaptive Power affects real-world use

    Think of Adaptive Power as a smart battery assistant that adjusts only when needed. It balances performance and power consumption throughout the day, helping your phone last longer without noticeable slowdowns. It trims energy use in high-demand moments, like recording videos, editing photos or multitasking, without disrupting what you’re doing. When it activates, you might see a small notification letting you know it’s working, but otherwise, it operates quietly in the background.

    Settings in the iPhone

    The Adaptive Power feature uses on-device intelligence to adjust brightness, limit background tasks and keep performance balanced throughout the day. (Apple)

    Make sure you have iOS 26 installed

    To use Adaptive Power, your iPhone must be running iOS 26. If you’re unsure, here’s how to check and update:

    • Open Settings on your iPhone.
    • Tap General.
    • Tap Software Update.
    • If you see iOS 26 available, tap Download and Install.
    • Keep your phone plugged in and connected to Wi-Fi during the update.

    Once the update finishes, restart your phone. The feature activates automatically on supported models.

    Which iPhones support Adaptive Power

    Only iPhones that can run Apple Intelligence will see this feature. Here’s the list:

    • iPhone 17, 17 Pro and 17 Pro Max
    • iPhone Air
    • iPhone 16, 16 Plus, 16 Pro and 16 Pro Max
    • iPhone 16e
    • iPhone 15 Pro and 15 Pro Max

    Adaptive Power is on by default for iPhone 17 models and iPhone Air. It’s off by default for iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 16e, iPhone 15 Pro and iPhone 15 Pro Max.

    While some iPad and Mac models also run Apple Intelligence, Adaptive Power is currently exclusive to iPhones.

    APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

    How to turn Adaptive Power on

    If you’ve got a newer model like the iPhone 17 or Air, Adaptive Power is already on. For others, it’s just a few taps away:

    • Open Settings on your iPhone
    • Tap Battery
    • Select Power Mode
    • Toggle Adaptive Power to turn it on
    • To be notified when it activates during the day, turn on Adaptive Power Notifications. Even if you turn off alerts, the feature will continue to extend battery life automatically.
    A guide shows how to enable Adaptive Power in iOS 26 on iPhone.

    Steps to enable Adaptive Power in iOS 26 on iPhone. (Kurt “CyberGuy” Knutsson)

    What this means for your charging habits

    You may not see dramatic gains every day, but the effect adds up. Adaptive Power could extend the lifespan of your iPhone just by updating to iOS 26. Even though you might still need to charge overnight, the feature can buy you extra hours when you’re away from an outlet. Just remember: battery life often dips briefly after major updates while your system re-indexes data, but it levels out in a few days.

    Pro tip: Use strong antivirus software

    Use trusted antivirus software as an extra layer of protection for your iPhone. While Apple’s built-in defenses are strong, security threats evolve fast. Installing strong antivirus software adds real-time protection against phishing, unsafe links and rogue apps. Keep it updated and run regular scans to catch potential risks early. This extra step helps your device stay clean, fast and fully protected between iOS updates.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Adaptive Power represents Apple’s move toward smarter, self-managing devices that adapt to you. By learning your habits and adjusting power use dynamically, it helps your battery last longer without sacrificing performance. It’s one of those invisible upgrades that can quietly make your phone feel newer for longer.

    Would you trust your iPhone to manage power automatically, or do you still prefer to control it yourself? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Never forget to reply to an email again with hidden phone trick that actually works

    NEWYou can now listen to Fox News articles!

    If you’ve ever told yourself you’d reply to an email later and then forgot, there’s a simple fix built right into your phone. Android and iPhone users both have ways to set reminders that bring messages back to your attention at the perfect time. 

    Whether you use Apple’s Mail app or Gmail on Android, these features help you stay organized, reduce stress and never miss an important reply again.

    Why the message reminder feature matters

    Many people leave emails unread as a reminder to reply later, but that method often fails. The built-in Mail reminder gives you a clear alert at a time you choose. It helps you follow through on tasks, maintain better communication and avoid missed opportunities.

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    Reminders can be set in the iPhone Mail app to ensure you don’t miss an email. (Reuters/Thomas Peter/File)

    To make sure you can use this feature, update your iPhone to the latest iOS version. Here’s how:

    • Open Settings.
    • Tap General.
    • Select Software Update.
    • If an update is available, tap Download and Install.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    If you’re on Android, you’ll also want to make sure your Gmail app and system software are up-to-date so the Snooze feature runs smoothly. Here’s how:

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Google Play Store.
    • Tap your profile icon in the upper right corner.
    • Select Manage apps and device.
    • Tap Update all or locate Gmail and tap Update.
    • To check your Android version, open Settings > About phone > Android version.

    5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOW

    Keeping your phone updated ensures you have the newest tools, features and security improvements.

    How to set up a reminder in the Mail app on iPhone 

    • Open the Mail app.
    • Find the email you want to be reminded about and swipe right on it.
    • Tap Remind Me.
    • Choose a preset time or tap Remind Me Later to pick your own.
    • Select the date and time that fits your schedule and tap the check mark in the upper right corner of the screen.

    That’s it. When the time comes, you’ll get a fresh notification as if you just received the email again. It’s a great way to stay organized without using third-party apps.

    Person using iPhone

    Android and iPhone users can set built-in email reminders to manage messages and stay organized through Apple’s Mail and Gmail apps. (Sean Gallup/Getty Images)

    10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

    How to cancel a reminder early in the Mail app on iPhone 

    If you’ve already handled the message and no longer need the alert, you can end it early:

    • Open the Mail app and go to Mailboxes.
    • Tap Remind Me.
    • Swipe left on the email you want to remove.
    • Tap Clear to cancel the reminder.

    This prevents duplicate notifications and keeps your inbox tidy.

    Android users can do this, too

    If you’re on Android, you can set up a similar email reminder using Gmail’s built-in Snooze feature. It works much like Apple’s Mail reminder. Instead of choosing “Remind Me,” Gmail lets you snooze an email so it pops back to the top of your inbox later, right when you want to deal with it.

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    How to snooze an email in Gmail on Android 

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Gmail app on your Android phone.
    • Tap and hold the email you want to be reminded about.
    • Tap the three dots in the upper right corner or the clock icon at the top.
    • Select Snooze.
    • Choose a preset time or tap Pick date & time to set a custom reminder.

    When the time arrives, Gmail automatically moves the message back to the top of your inbox and marks it unread so it stands out.

    BEST WAYS TO TRACK YOUR MEDS ON IPHONE AND ANDROID

    How to cancel a snooze quickly in Gmail on Android 

    If you change your mind before the reminder triggers, you can easily cancel it:

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Gmail app.
    • Tap the Menu icon (three lines) in the top left corner.
    • Select Snoozed.
    • Find the email and swipe it left or right, or open it and tap Unsnooze.

    Your email will return to its original spot in the inbox right away, so you can handle it or leave it as is.

    Woman smiles at her Android

    Built-in reminder features on iPhone and Android help users follow up on emails and prevent missed messages. (Cyberguy.com)

    What this means for you

    If you manage a busy inbox, this feature can be a game-changer. It helps reduce mental clutter since you won’t have to rely on memory or endless email flags. You decide when you want to be reminded, and your phone takes care of the rest.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Whether you’re using an iPhone or Android device, built-in email reminders can keep your digital life running smoothly. These features help you manage your inbox with less effort and more control. By setting a time to follow up, you stay productive and avoid letting key emails slip through the cracks. Both platforms make it easy to stay focused and keep your conversations on track.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Would a reminder like this have saved you from missing an important email recently? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    Source link

  • The OnePlus 15 Has Two-Day Battery Life. ’Nuff Said

    On days with light use, I have 70 percent left by bedtime. When I spent more time on the phone, using it for music streaming, navigation, and Instagram Reels-ing, I often ended with around 60 or 50 percent. I’d leave it on my nightstand without bothering to plug it in, a refreshing change of pace. Over the course of two days, I hit an amazing 10.5 hours of screen-on time.

    This might be the best battery life on a flagship smartphone today in the US, especially when you pair it with the incredibly fast recharge times. OnePlus remains one of the only companies to include a charger in the box—mostly because it’s the only way to take advantage of its SuperVooc fast-charging technology. I was able to ramp from 15 to 80 percent in 30 minutes (50 percent in 15 minutes). It’s hard to worry about a dead phone if you don’t mind keeping the bulky charger on your person (is a folding prong too much of an ask?).

    But there’s always a compromise somewhere. If you’re a fan of wireless charging and are especially interested in Qi2 smartphones that use magnets (like Apple’s MagSafe) for more convenient and faster charging, you’ll be disappointed here. The OnePlus 15 supports wireless charging, but only the standard Qi technology. OnePlus is selling magnetic cases as a salve, but unlike Samsung’s current crop of top-end phones, this doesn’t even turn it into a Qi2 Ready phone. It will only charge at slow Qi wireless charging speeds. (You can buy OnePlus’ proprietary wireless charger to fast-charge, but that’s a separate purchase, and that wireless charger will only recharge select OnePlus devices quickly.)

    The beefy battery and super-fast wired charging may outshine the lackluster wireless charging, but now it’s time to talk about the second most impressive feat of the OnePlus 15: performance.

    Power Play

    Photograph: Julian Chokkattu

    This is the first smartphone in the US to employ Qualcomm’s Snapdragon 8 Elite Gen 5, a processor we’ll see in most high-end Android phones in 2026. The benchmark numbers are excellent. In a Geekbench 6 test, the OnePlus 15 is officially the first phone to pass 10,000 in multi-core CPU performance, even besting the iPhone 17 Pro Max. However, the iPhone still had a slight leg up in single-core performance (it’s also generally more efficient).

    Julian Chokkattu

    Source link

  • Nothing’s Budget-Friendly Phone (3a) Lite Is a Diluted Disappointment

    The 5,000-mAh battery is ample for most days, and the Nothing Phone (3a) Lite could maybe even last two days of light use. You’ll have to plug in when it runs low (there’s no wireless charging), and the rate tops out at 33 watts. That’s not bad, enabling you to go from zero to 80 percent in less than an hour. There’s 5G, Wi-Fi 6, and Bluetooth 5.3 support, but expect the battery to drain much faster on 5G networks.

    Where the MediaTek Dimensity 7300 Pro chipset and 8 GB of RAM really struggled for me was the camera. On several occasions, it took seconds to open, and I had to reboot the phone at one point to get the camera app to load at all. I encountered occasional lag on opening and switching apps, but the camera performance was jarring because general use feels relatively slick for a budget phone.

    It doesn’t help that the camera system is disappointing. The main 50-megapixel shooter is capable, if a little slow, with a large-ish 1/1.57-inch sensor and an f/1.8 aperture that handles a range of scenarios quite well. But the 8-megapixel ultrawide is poor, and the 2-megapixel macro is a complete waste of time. Comparing a close-up with the macro and the main camera (see the flower photos) shows how useless it is. There’s a 16-megapixel shooter around front that’s fine for selfies and video calls.

    You’d think a design-led company like Nothing would be more calculated in adding features that only add value. If the ultrawide and macro are only going to offer lackluster results, cut them and stick with a single, solid primary camera.

    Simon Hill

    Source link

  • The #1 Google search scam everyone falls for

    NEWYou can now listen to Fox News articles!

    When something goes wrong with your bank account or delivery, your first instinct might be to type the company name into Google and call the first customer service number you see. But that simple search has become one of the biggest traps for scammers, and it’s costing people money, privacy and even control over their phones.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    A simple Google search for a company’s customer service number can lead straight to a scam. The first result isn’t always the safest one. (Kurt “CyberGuy” Knutsson)

    He Googled his bank’s number and lost control of his phone

    Here’s how one man’s quick search for help turned into a nightmare he never expected. Gabriel wrote to us in distress, asking,

    “I called my bank to check on some charges I didn’t authorize. I called the number on the bank statement, but they told me to go online. I googled the company and dialed the first number that popped up. Some foreign guy got on the phone, and I explained about the charges. Somehow, he took control of my phone, where I didn’t have any control. I tried to shut it down and hang up, but I couldn’t. He ended up sending an explicit text message to my 16-year-old daughter. How do I prove I didn’t send that message? Please help.”

    Gabriel’s story is frightening, and unfortunately, it’s not rare. This type of attack is called a remote access support scam. Scammers pretend to be bank or tech support, then trick you into installing a program that gives them control of your device. Once inside, they can steal passwords, send messages or lock you out completely.

    WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL

    A user searches on Google on a laptop.

    Gabriel thought he was calling his bank, but the number was fake. Within minutes, a scammer took control of his phone and invaded his privacy. (Kurt “CyberGuy” Knutsson)

    Why this scam works

    Search engines reward paid ads. Scammers take advantage of this by buying ad space to appear above legitimate customer service numbers. The fake pages look professional, complete with company logos and 800 numbers that seem real.

    Once you call, the fake “agent” sounds knowledgeable and polite. They build trust, then convince you to install remote access software such as AnyDesk or TeamViewer. From that point, they can control everything on your phone.

    What to do if this happens to you

    Gabriel, what you went through is incredibly upsetting, and you’re right to take it seriously. Here’s what to do right away:

    1) Disconnect and secure your phone

    Turn off your phone immediately. Restart it in Airplane Mode and don’t connect to Wi-Fi yet. Run a full antivirus scan with strong antivirus software. 

    2) Change all your passwords

    Use a secure device that has not been compromised to reset the passwords for your key accounts, including email, cloud storage, phone carrier and banking logins. Create strong, unique passwords for each account and enable two-factor authentication (2FA) for added protection on all your devices and platforms.

    Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

    3) Contact your carrier and your bank

    Let your phone provider know that your device was taken over. Ask them to check for unauthorized remote management apps or SIM-swap activity. Notify your bank’s fraud department and report the fake number you found on Google.

    4) Report the explicit message

    Take screenshots and save everything. Contact local police and explain that the message was sent from your number while your phone was under remote control. If a minor is involved, the case may be referred to the FBI’s Internet Crime Complaint Center (IC3.gov).

    5) Factory reset your phone

    Once your data is backed up, perform a factory reset on your iPhone or Android to remove any hidden software. Reinstall only apps you recognize from the official app store.

    HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET

    A user searches Google.

    Scammers use fake customer service numbers to sound convincing and gain remote access to your devices, turning a simple call for help into a digital takeover. (Kurt “CyberGuy” Knutsson)

    Tips to stay safe from fake customer service scams

    Falling for a fake customer service number can happen to anyone, especially when you’re in a rush or worried about your account. Here’s how to make sure you never get tricked by the same kind of scam that hijacked Gabriel’s phone.

    Go directly to the company’s official website

    Always type the company’s web address yourself or use the contact number printed on your card or statement. Scammers often create fake numbers that appear in search results, hoping you’ll call them instead of your real bank.

    Don’t trust the first search result on Google

    Search engines sell ad space to anyone, including criminals posing as real businesses. Those top “sponsored” listings can lead straight to scammers. Instead, scroll down until you find the official domain ending in .com, .org or .gov.

    Never allow remote access to your phone or computer

    No legitimate company needs to control your device to verify charges or fix an account issue. If someone asks you to install software like AnyDesk or TeamViewer, hang up immediately. These tools give strangers complete control of your screen and data.

    Hang up if the caller pressures you to act fast

    Scammers rely on panic. When someone insists you act “right now” or risk losing money, that’s a warning sign. Stay calm, hang up, and verify the problem through your bank’s official website or number.

    Use strong antivirus protection

    Install and regularly update a trusted antivirus app. Strong antivirus software can block remote-access tools and spyware before scammers gain access. Regular scans also detect hidden threats that may already be on your phone or computer.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    Consider using a data removal service

    Many scammers find victims through data brokers that sell phone numbers and personal details. A data removal service helps erase your information from these sites. As a result, it’s harder for criminals to target you with fake customer service scams in the first place.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

    Monitor your identity with a trusted protection service

    Even a short breach can expose your private information. Identity-monitoring tools alert you when your name, email or Social Security number appears on the dark web. That gives you time to act before scammers can use it.

    Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    The internet has made getting help easier than ever, but it has also made it easier for scammers to pretend to be helpful. The top way people are being scammed today isn’t through phishing emails or suspicious links; it’s by trusting fake phone numbers that look official. Take a few minutes to save the real customer service numbers for your bank, phone provider, and credit card company. One quick call to the wrong number could give a stranger access to your entire digital life.

    With fake customer service numbers flooding search results, should Google be held responsible for protecting you from these scams? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Why Are We All Still Carrying Around Car Keys?

    My iPhone Wallet stores theater and transit tickets and all of my credit and debit cards, and it lets me sashay like a boss through my gym’s turnstile. The tech works flawlessly, requiring only my proximity or the merest tilt of the device toward my face. Biometric goodness means I have few worries about security, even accessing my bank accounts.

    So … why am I still opening my EV with a key?

    OK, it’s more than just a metal key; it’s a passive electronic fob with proximity-based radio signaling, which means I don’t have to press anything to unlock my car. But it’s nevertheless a bacteria-rich, easily lost, marque-branded plastic blob that, in truth, I no longer need. And I haven’t needed it for some years.

    BMW 5 Series owners have been using smartphones to unlock, start, and digitally share access to their luxury vehicles since 2021, the year after Apple’s introduced its plainly titled Car Key. Audi, Kia, and Hyundai later implemented support for ‌the feature. During the WWDC 2025 keynote in June, Apple said that 13 additional vehicle brands would “soon” join them, including Chevrolet, Cadillac, GMC, and Porsche. “Soon” appears to mean 2026.

    Tesla Model 3 owners have had digital key access since 2017, when the midsize sedan launched without a fob; it could only be opened with a smartphone. Subsequently, digital-native carmakers Rivian and Polestar also enabled digital key use. (“Digital Key has been removed from the upcoming 2025.34 software update for further testing,” noted a recent update from Rivian. The company’s comms team tells WIRED it’ll be available again “soon.”)

    Owners of the latest high-end Ford vehicles can use digital keys. Still, the Dearborn, Michigan, company clearly isn’t ready to ditch fobs—in October it launched the $200 Truckle, an ornate Western-style belt buckle with a cavity to fit the oversized F-150 fob, so it need never get lost or spoil the line of your jeans.

    Courtesy of Ford

    Digital for All

    Phone-as-a-key functionality isn’t just for select luxury cars. The wire-in MoboKey device turns a smartphone into a digital key and can be fitted by an auto electrician to almost any modern car, gas or electric.

    Similarly, KeyDIY, a Chinese smart key maker, sells a USB-powered box of tricks that allows almost any car to operate with a digital key. The box grabs car connectivity signals–Flipper-Zero-style–emulating the rolling codes that key fobs use to foil signal boosting “relay” attacks where criminals use antennas and extenders to capture the signals from a car’s key fob. (Always store your fob in a Faraday cage.) KeyDIY’s box, which lives in the car, is actuated by a device connected momentarily to the vehicle’s onboard diagnostic port.

    The Key to Meaning

    In short, the picture here is that digital key tech is mature and (mostly) secure, and we’re perfectly happy using Bluetooth Low Energy, near-field communication (NFC), and ultra-wideband (UWB) in the rest of our life—unless you’re a conspiracy theorist who clings to cash, that is—so why are so many of us still seemingly so attached to our physical car fobs?

    “Most people are reluctant to go without the physical backup of an actual key,” says Sean Tucker, managing editor of automotive research company Kelley Blue Book. And, he adds, picking up a fob is now an ingrained habit. There are also emotional factors to consider.

    “A car key is full of meaning,” says Stefan Gössling, a professor at Linnaeus University, Sweden, and author of The Psychology of the Car. “Jingling them gives some motorists the opportunity to show off their automobile, even if the car is not close by. Car keys are also comforting to some, a physical reminder that your vehicle is there to take you away; to protect you.”

    Carlton Reid

    Source link

  • Nightly Smartphone Use at Bedtime Isn’t as Bad as You Think, Study Suggests

    Everyone has heard the advice to not use your smartphone before going to sleep—and many of us have ignored it. In fact, you might be reading this very article while in bed. If that’s the case, it might come in handy next time someone nags you about your sleep hygiene.

    That’s because a study published this summer in the journal Sleep Health suggests that adults’ nightly bedtime screen use might not be as detrimental to sleep as previously believed. While further research is needed to confirm these unexpected results, the study highlights the enduring uncertainty about the consequences of our smartphone addictions.

    Bedtime screen use

    The researchers investigated the self-reported bedtime screen use (using screens in bed or within an hour of bedtime) and sleep health of over 1,000 adults in Canada. More than 80% reported being on screens during bedtime in the past month, and almost half reported bedtime screen use every night. Researchers classified the participants into three types of bedtime screen users: occasional (less than once a week), moderate (one to four times a week), and regular (5 or more times a week).

    Notably, “after accounting for biological sex, age, and income, both occasional and regular screen users reported the best overall sleep health,” the team wrote in the study. Occasional bedtime screen users had the highest sleep regularity and sleep satisfaction, and regular bedtime screen users had the best sleep timing and daytime alertness. Moderate users reported the worst sleep health.

    It’s worth noting that participants’ self-reported claims about sleep health might not be as accurate as researchers physically tracking their sleep in a lab. Nonetheless, these results seem to challenge findings from previous studies. For example, in a 2021 paper, researchers write that “screen exposure, especially near bedtime, directly leads to poor sleep quality.” A 2023 paper on medical students in Egypt reported a remarkably greater occurrence of poor sleep quality among smartphone users at bedtime. A 2022 study explains that smartphone screens emit blue light, which can impact sleep quality.

    However, “the previous coverage of blue light has not factored in age, timing and intensity of the blue light exposure when making sweeping generalizations about this research,” Colleen Carney, a co-author of the study and director of the Sleep and Depression Laboratory at Toronto Metropolitan University, said in a university statement. “There may be reason to be cautious about excessive blue light exposure in the evening for teens as puberty increases light-sensitivity. As we age, we are not as light sensitive and there are age-related effects of the eye that make light less disruptive.”

    Test it out for yourself

    Adults’ sleep health might also be impacted by how one uses a smartphone or similar device before bed, not just when. For example, some apps can help relax users. On the other hand, others can heighten emotions that hinder sleep, according to the statement.

    “The association between bedtime screen use and sleep health appears complex as bedtime screen use frequency, the sleep health dimension measured, and biological sex can all influence this relationship,” the researchers admitted in the new study. “More research is needed to understand the sleep health and bedtime screen use association and moderators of this relationship in adults.”

    Adults can test out the effects of bedtime screen use on their sleep directly by monitoring their current sleep for one week and then monitoring it for a second week during which they don’t use devices at least one hour before bedtime, according to Carney.

    “If you sleep and feel better with an earlier bedtime for your device, make it a new habit. If you don’t notice a difference, like the people in this study, the device is not the problem we have been led to believe,” Carney concluded, though this might seem like a simplistic conclusion to some.

    Margherita Bassi

    Source link

  • Apple releases iOS 26.1 with major security improvements and new features for iPhone users

    NEWYou can now listen to Fox News articles!

    Apple’s iOS 26.1 update is more than a standard patch. It boosts security, speeds up performance and adds practical upgrades to features you already use. The update fixes dozens of vulnerabilities that impact Safari, Photos and Apple Account settings. 

    It also introduces stronger privacy controls, design tweaks and expanded support for Apple Intelligence. Since iOS 26.1 is the first major follow-up to iOS 26, it builds on the foundation of the original release with key fixes and refinements. 

    If you value protection, speed and reliability, updating now is an easy way to keep your iPhone secure and performing at its best.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    The new update focuses on privacy, stability, and performance, giving iPhone users stronger protection and a more polished overall experience. (Cyberguy.com)

    How to update to iOS 26.1

    Here are a few simple steps to install iOS 26.1:

    • Plug in your iPhone and connect to a reliable Wi-Fi network to prevent interruptions.
    • Go to Settings.
    • Tap General.
    • Click Software Update.
    • Tap Update Now or Download and Install when iOS 26.1 appears.
    • Follow the prompts and wait for your phone to restart.

    Once complete, your iPhone will have the latest protections and performance enhancements. iOS 26.1 is available for all iPhones from the iPhone 11 and later. Because it is a smaller point update, installation is quick and delivers immediate benefits without the delays of a major version upgrade.

    WHY WI-FI CALLING MAY BE KILLING YOUR PHONE’S BATTERY LIFE

    Top 10 Reasons to Update to iOS 26.1

    Apple packed plenty of improvements into this release, but these ten stand out as the most important reasons to install iOS 26.1 right now.

    1) Stronger security protections

    Apple fixed over 50 vulnerabilities in this update. Those include serious flaws that could let apps access sensitive data or take screenshots without permission. Installing iOS 26.1 keeps your personal information safer than before. 

    2) Streamlined security

    Apple added a new option in iOS 26.1 that quietly keeps your iPhone protected between major updates. Go to Settings > Privacy & Security > Background Security Improvements, then turn on the toggle for automatic background security updates. These smaller patches install automatically without waiting for the next iOS version, helping your device stay protected against new threats with less effort.

    EVEN WITH TRUMP’S TARIFF BLESSING, APPLE HIKES IPHONE PRICES

    3) Alarm upgrade

    Apple changed how alarms work in iOS 26.1 to make mornings more reliable. You now need to swipe across the screen to turn an alarm off, rather than tapping it. The snooze button still works with a single tap, so you can easily tell the difference between stopping and snoozing. This simple change helps prevent accidental silencing and makes it easier to wake up on time.

    The new iPhone 14 and 14 Plus are displayed

    Apple’s iOS 26.1 update boosts security, speeds up performance and adds practical upgrades to already existing features. (BRITTANY HOSEA-SMALL/AFP via Getty Images)

    4) Customizable liquid glass look

    The semi-transparent iOS 26 design now includes new options for opacity. You can make screens easier to read and reduce glare with more visual clarity.

    Open Settings > Display & Brightness > then choose Liquid Glass. From there, select either Clear for a sharper background or Tinted for a softer, more subdued look that reduces glare.

    5) New camera toggle

    iOS 26.1 adds a new setting that gives you control over the camera shortcut on your lock screen. Go to Settings > Camera, then look for the option “Lock Screen Swipe to Open Camera.” You can now turn this feature off if you often trigger the camera by accident or prefer using the dedicated Camera Control instead. It’s a small but useful change for anyone who wants fewer unintentional photos or faster access to other lock screen tools.

    6) Expanded live translation

    Frequent travelers and language learners will appreciate the expanded real-time translation. iOS 26.1 adds Italian, Japanese, Korean and Chinese to AirPods translation, making global communication smoother.

    APPLE EXPECTED TO ROLL OUT TEXTING UPDATE THAT WOULD HIT GOP HARDEST AHEAD OF MIDTERMS, FUNDRAISERS SAY

    7) More languages for Apple Intelligence

    Apple Intelligence now understands additional languages, including Dutch, Danish, Swedish, Norwegian, Portuguese, Turkish and Vietnamese. That expands how Siri and on-device AI respond to more users. 

    8) Smarter music and audio controls

    Apple added handy gesture controls to the Apple Music MiniPlayer in iOS 26.1. You can now swipe left to go back or right to skip ahead while a song plays, making it easier to control music without opening the full player. The update also adds AutoMix support over AirPlay and lets creators adjust USB microphone gain directly from their iPhone for clearer recordings.

    9) Phone call haptics control

    iOS 26.1 adds a simple but welcome change for anyone who prefers fewer distractions. You can now turn off the vibration feedback that happens when a call connects or ends. Go to Settings > Apps > Phone and toggle Haptics off to stop those subtle buzzes that can feel like extra notifications. It’s a small tweak that makes phone calls feel cleaner and less intrusive.

    10) Local Capture options

    iOS 26.1 adds a new Local Capture menu that makes it easier to record high-quality audio and video from your own device during calls. Go to Settings > General > Local Capture to choose where your recordings are saved or to enable audio-only recording.

    10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

    A man scrolling on social media on his phone.

    The new IOS update also introduces stronger privacy controls, enhancing online security. (Kurt “CyberGuy” Knutsson)

    Pro Tip: Use strong antivirus software

    Use trusted antivirus software as an extra layer of protection for your iPhone or iPad. While Apple’s built-in defenses are strong, security threats evolve fast. Installing strong antivirus software adds real-time protection against phishing, unsafe links, and rogue apps. Keep it updated and run regular scans to catch potential risks early. This extra step helps your device stay clean, fast, and fully protected between iOS updates.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    The iOS 26.1 update brings more than simple fixes. It fine-tunes how your iPhone works, sounds and protects your information. With expanded translation, smarter music gestures, new privacy options and better camera controls, every improvement makes daily use smoother. Features like Local Capture, streamlined security updates and the ability to turn off phone call haptics highlight Apple’s focus on practical upgrades that matter. If you have not updated yet, now is a good time. iOS 26.1 strengthens your phone’s security, improves stability and adds thoughtful details that make your device easier to use every day.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Which new iOS 26.1 feature will you try first, the enhanced privacy tools or the camera and haptic settings? Let us know by writing to us at Cyberguy.com

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Stop foreign-owned apps from harvesting your personal data

    NEWYou can now listen to Fox News articles!

    You might not think twice about that flashlight app you downloaded or the cute game your grandkids recommended. Yet with a single tap, your private data could travel halfway across the world into the hands of people who profit from selling it. A growing threat is emerging as foreign-owned apps quietly collect massive amounts of personal data about you, and older Americans are among the most vulnerable.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    The hidden cost of ‘free’ apps

    We all love free apps. Whether it’s a shopping deal finder, a weather tracker or a photo editor, they make life easier. But many of these “free” tools aren’t really free; they just don’t charge you money. Instead, they collect your personal information and sell it to make their profit.

    A recent study revealed that over half of the most popular foreign-owned apps available in U.S. app stores collect sensitive user data, including your location, contacts, photos and even keystrokes.

    Many “free” apps secretly collect personal data from users, sending private information to foreign servers without consent. (Kurt “CyberGuy” Knutsson)

    Some of the worst offenders are apps that seem completely harmless:

    • Flashlight and weather apps that track your GPS location 24/7.
    • Shopping apps that collect purchase history, payment preferences and home addresses.
    • Casual games that request access to your camera and contacts for no logical reason.

    These apps often share data with data brokers and ad networks overseas, where privacy laws are weaker and accountability is nearly impossible.

    HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

    Why retirees are prime targets

    If you’re retired, you may already be on dozens of public databases like voter rolls, real estate listings and charity donor lists. Combine that with information harvested from apps, and scammers can build a frighteningly detailed profile of your life.

    Young woman types on smartphone

    Flashlight, weather and shopping apps often request unnecessary access to your camera, contacts and location to track you around the clock. (Portra/Getty Images)

    They can see:

    • Where you live and who lives with you.
    • What medications you search for.
    • What causes you support or charities you donate to.
    • What devices you own and which banks you use.

    From there, they can craft highly convincing scams like fake donation requests, Medicare scams or phishing texts that look eerily personal. Some even use your social media photos to mimic family members in “grandparent scams.” And it all starts with what you allowed that “harmless” app to access.

    Signs your data might already be exposed

    You don’t need to be a tech expert to spot the warning signs. Here’s what to look for:

    • Unfamiliar charges or new accounts in your name.
    • An increase in scam calls or texts, especially with personal details like your city or bank.
    • Emails from foreign domains claiming to offer rewards or urgent account updates.
    • Ads that seem to “read your mind,” which show up right after you talk about something offline.

    If you’ve noticed any of these, your information is likely circulating through data brokers who purchased it from app networks.

    A smartphone displays apps.

    Older Americans are prime targets, but simple steps like deleting risky apps and reviewing permissions can help protect your privacy. (Kurt “CyberGuy” Knutsson)

    How to stop the data drain

    You can take back control of your data starting right now.

    1) Audit your apps

    Go through your phone and delete any apps you don’t use regularly, especially free ones from unfamiliar developers.

    2) Stop data brokers from trading your info

    Even after deleting risky apps, your personal information may already be circulating online. This is where a data removal service can make a massive difference. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

    3) Check permissions

    Open your settings and review which apps have access to your location, contacts or camera. Revoke any unnecessary permissions immediately.

    TEA APP HACKED AS WOMEN’S PHOTOS, IDS & EVEN DMS LEAKED ONLINE

    4) Avoid “foreign-owned” apps that request extensive access without a clear reason.

    Always read the privacy policy (yes, it’s tedious but eye-opening). If an app asks for permissions that do not match its purpose, like a calculator wanting your location or a flashlight needing camera access, that is a major red flag. Many foreign-owned apps hide behind vague privacy terms that allow data to be transferred to overseas servers where U.S. privacy laws do not apply.

    5) Use official stores only

    Stick to the Apple App Store or Google Play Store for downloads. Avoid third-party sites that host cloned or tampered versions of popular apps. Look for verified developers and check privacy ratings in reviews before installing anything new.

    6) Keep your device and apps updated

    Updates close security holes that hackers exploit through malicious apps. Turn on automatic updates so your phone and apps stay protected without you having to remember.

    7) Turn off ad tracking

    Limit how much of your activity is shared with advertisers. 

    On iPhone:

    Go to Settings Privacy & Security Tracking and toggle off “Allow Apps to Request to Track.” 

    On Android: 

    (Settings may vary depending on your Android phone’s manufacturer) 

    Go to Settings → Google → Ads (or Settings → Privacy → Ads) and choose “Delete advertising ID” or “Reset advertising ID.” This action removes or replaces your unique ID so apps and advertisers can no longer use it for personalized ad tracking.

    This step stops apps from following you across other platforms and building data profiles about your habits.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    Foreign-owned apps are the new front line in data harvesting, and retirees are the easiest targets. But you don’t have to accept that your private life is public property. It’s time to take back control. Delete the apps you don’t need. Lock down your permissions. And let a data removal service erase your data trail before scammers can use it against you.

    Have you checked which of your apps might be secretly sending your personal data overseas? Let us know by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    Source link

  • Here’s What Happens When Your Phone’s Clock Changes Itself on Nov. 2

    “Spring ahead; fall back.” That’s the mnemonic we all use to remember how much pain is coming when the time changes. It’s fall, the less painful one, and since the time on everyone’s smartphone changes itself now, your alarm will feel like it’s going off an hour late. Pro: You might get more sleep. Con: Your cat won’t care what the clock says, and will just wake you up to get fed at 7:00 a.m. instead of 8:00 a.m.

    But if you’ve never given the time change more than a moment’s thought, and you’re up late tonight when the shift from daylight saving to standard time occurs, here’s what will literally happen.

    Time is tweaked right now, with the day unnaturally stretched to give us more the daylight. Every place that observes daylight saving time agrees that during the sunny months, astronomical high noon—the point at which the sun is straight up—is 1:00 p.m. We fix this in the fall by repeating an hour, putting noon back in its correct place, and making sundials accurate again. 

    If you watch the time change in the wee hours of the morning on your smartphone or smartwatch, you can literally see time. If you’re using an android phone, set your lock screen clock to analog in Settings>Style. If you’re on an iPhone, just stare at the icon of the Clock app, which is a fully functional analog clock. In my experience, the time change will occur at 2:00:01 a.m. on Apple devices. I don’t know why.

    When the big moment comes, the little hand will jump back to the left, and your perception of quantifiable time as a fixed law of the universe will be shattered. Truth will be exposed as an artificial construct, and everything you believe is meaningful will be replaced with a void. 

    For one hour, you will now exist in a sort of purgatory of extraneous time. You shouldn’t be awake. If you’ve ever read Stephen King’s The Langoliers, you know what to expect in this zone. No birds in the sky. Food tastes stale. The air in your lungs feels empty. Machines don’t work. Giant disembodied mouths may eat you. The usual. (Obviously I’m kidding. But read The Langoliers.)

    And you’re probably going to hate what happens tonight: the clock time you associated with the sunset on November 1 will now suddenly shift to one hour earlier on November 2, meaning the day will feel “an hour shorter.” The sun will hurtle below the horizon in the late afternoon, and you’ll suddenly feel vampiric and nocturnal, eating dinner in the dead of night. Young kids unaccustomed to staying up late will suddenly feel like they’re learning the secrets of night time, because they are.

    Oh, and don’t forget to manually change the little clock by the speedometer in your car. That one’s really important.

    Mike Pearl

    Source link

  • Gear News of the Week: Withings Launches Its Pee Scanner, and Samsung Shows Off a Trifold Phone

    A few weeks ago, bathroom and plumbing company Kohler debuted the Dekoda, a health and wellness sensor that lives on your toilet bowl and records signs of your gut health and hydration. Now, Withings has launched the U-Scan. First shown at CES in 2023, the U-Scan also sits inside the toilet bowl. A thermal sensor detects when a fresh, er, sample is being deposited. The U-Scan takes a small sample and analyzes it on-site with miniature biochemical sensors inside an interchangeable cartridge.

    There are two separate U-Scans. U-Scan Nutrio analyzes your diet, checking for biomarkers like bio-acidity, hydration status, and ketone levels, which shows that you’ve started burning body fat instead of sugar. U-Scan Calci also checks for calcium, which is a sign that you might have kidney stones. Results are then transmitted via Wi-Fi to the Withings app.

    The cartridges are replaceable, and the sensor comes with a docking station to clean and recharge the sensor. Purchasing the U-Scan comes with a complimentary subscription to Withings+, the company’s upgraded app, which also includes a free consultation with a nutritionist.

    The U-Scan packages start at $380, which comes with one U-Scan, either Nutrio or Calci, one cartridge, and two to four scans weekly (each cartridge lasts about 2.5 months). For more intensive monitoring, the Intensive package includes two cartridges for five to seven weekly measurements. Replacement cartridges are $100 for one cartridge or $180 for two, and Withings sends you the cartridge automatically depending on which package you select. The U-Scan is now available at Withings.com. We’ll be testing it soon. —Adrienne So

    Samsung Brings Its Browser to Windows, and Teases a Trifold Phone

    Samsung has long offered its own browser on its smartphones—Samsung Internet—but now the app is finally available on another platform: Windows. Considering Samsung makes Windows laptops and Android phones, this move allows folks who use the company’s browser to share their browsing history and bookmarks between phone and laptop, and if you have saved passwords with Samsung Pass, you can use it to autofill passwords on websites.

    The company is taking this opportunity to bring some Galaxy AI features over as well, including Browsing Assist, which lets you instantly summarize webpages or translate them to another language. Samsung says its browser also blocks third-party web trackers, and there’s a Privacy Dashboard that lets you see what has been blocked.

    Samsung Internet for PC is only available as a beta right now, but anyone in the US or South Korea on Windows 11 or Windows 10 (version 1809 and above) can download it now.

    Julian Chokkattu

    Source link

  • 5 hidden battery drainers you can fix right now

    NEWYou can now listen to Fox News articles!

    You plug in your phone overnight, but by lunchtime, it’s already gasping for charge. Sound familiar? Hidden background features, sneaky settings and apps you forgot existed can quietly drain your battery faster than you think. The good news is a few quick tweaks can help your device stay powered all day, without sacrificing performance or convenience.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    1) Turn off background app refresh

    Stop apps from sapping power when you’re not using them. Even when you’re not actively scrolling or tapping, many apps continue running in the background, fetching updates, refreshing data and sending notifications. It’s convenient, but it drains your battery faster than you realize.

    For iPhone 

    • Go to Settings.
    • Tap General.
    • Click Background App Refresh.
    • Tap Background App Refresh again.
    • Select Off, or choose Wi-Fi to limit data use and battery drain.
    • You can also toggle off refresh for individual apps if you still want certain ones to run.

    WHY WI-FI CALLING MAY BE KILLING YOUR PHONE’S BATTERY LIFE

    Stop background apps from quietly draining your battery. (Kurt “CyberGuy” Knutsson)

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer. 

    • Open Settings.
    • Tap Battery (or Battery & device care, Power management, or similar).
    • Select Background usage limitsApp battery management, or Battery optimizationwording depends on your device.
    • Choose the apps you rarely use, then set them to Restricted or Optimized, or Put unused apps to sleep.
    • To let Android manage this automatically, turn on Adaptive Battery (found under Settings › Battery › Adaptive Battery).

    Pro tip: Keep essential apps, such as messaging, navigation, or weather, active so they can update in real time. Restricting background activity for apps you don’t open often can extend battery life by several hours a day.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    3 phones are plugged in with dark screens

    Turn off background refresh to stop unused apps from quietly draining your battery. (Kurt Knutsson)

    2) Disable Always-in Display

    That sleek clock on your screen might look cool, but it’s constantly using power. Always-On Display keeps your screen partially lit, even when you’re not touching it, to show time, notifications or widgets. Over time, that adds up, especially overnight.

    For iPhone (14 Pro and later)

    • Go to Settings.
    • Tap Display & Brightness.
    • Click Always On Display.
    • Toggle Off next to Always On Display to stop your phone from lighting up when locked.

    For Android

    Settings may vary, depending on your Android phone’s manufacturer. 

    • Open Settings.
    • Tap Lock screen (sometimes labeled “Lock screen & security,” “Lock screen & AOD,” “Display & lock screen,” etc.).
    • Look for Always On Display (AOD) (or similar, such as “Always show time & info”, “Ambient display”, “Screen always on when locked”).
    • Toggle Off to disable the AOD entirely, or choose an alternative mode (for example: “Tap to show” / “Show on tap” so the AOD only appears when you tap the screen) if available.
    • (Optional) Some devices allow scheduling of AOD or limiting it to when notifications are present. If you want more control, explore the sub-options under the AOD setting.

    Turning off Always-On Display can extend standby battery life by up to 10 to 15%.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    Samsung Galaxy S23 Ultra smartphone is seen in South Korea

    Turn off Always-On Display to save more power each day.  (SeongJoon Cho/Bloomberg via Getty Images)

    3) Limit location access

    GPS is one of the biggest hidden battery drains. Apps that track your location in the background, from ride-sharing to retail, can quietly sap your phone’s power even when you’re not using them. Adjusting permissions keeps your phone secure and efficient.

    For iPhone 

    • Go to Settings.
    • Tap Privacy & Security.
    • Click Location Services.
    • Tap each app individually and change Always to While Using the App or Never.
    • Now, scroll to the bottom and tap System Services.
    • Tap Significant Locations, then toggle it Off to stop your iPhone from storing detailed location and travel history. (You can also tap “Clear History” here to erase past entries.)

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Location (or sometimes Privacy & Security → Location).
    • Tap App permissions (or App location permissionsLocation permissions for apps).
    • Select an app, then choose the appropriate permission, such as “Allow only while using the app” (or “Allow only when in use”) or “Don’t allow” (or “Deny”).
    • On the same screen (for that app), you may see a toggle for “Use precise location”. If the app doesn’t need GPS accuracy, toggle Off to let it use only an approximate location.

    Apps like Maps and Weather need access, but most don’t. Tightening this setting not only boosts battery life, it also improves your privacy by limiting background tracking.

    Pro tip: Leaving essential features like Find My iPhone or Emergency Calls & SOS enabled under System Services ensures your phone can still help locate or protect you if it’s lost, even with other location options turned off.

    CLICK HERE TO GET THE FOX NEWS APP

    Limit location tracking to protect privacy and extend battery life.

    Limit location tracking to protect privacy and extend battery life. (Fernando Gutierrez-Juarez/picture alliance via Getty Images)

    4) Turn off Raise to Wake and Tap to Wake

    Ever notice your screen lighting up when you simply pick up your phone? Those quick flashes add up. Every time your display activates — even for a second, it consumes battery power. Turning off these motion-activated features can reduce unnecessary screen wake-ups.

    For iPhone

    • Go to Settings.
    • Tap Display & Brightness.
    • Turn off Raise to Wake.

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Display (or Lock screen & security, or Advanced features, depending on your device).
    • Look for Lift/ Raise to wakeTap to wake, or Double tap to wake (sometimes found under Gestures or Motion settings).
    • Turn off “Lift/Raise to wake” and “Tap/Double tap to wake” (or choose to disable whichever is active).
    • If you want a simpler way to wake your phone only when you intend to, rely on the power-button wake (which is the default on nearly all phones).

    5) Review battery usage and spot the culprits

    If your phone is dying faster than usual, the Battery Usage tool can reveal the exact cause. You’ll see which apps are using the most power, both on screen and in the background, so you can take action.

    For iPhone

    • Go to Settings.
    • Tap Battery.
    • Scroll to view the battery usage graph and list of apps and system processes that are using power.
    • Look for any highlighted items (indicating unusually high usage).
    • Tap an app or process to view more details about its usage and background activity.
    • If you notice an app draining power in the background on an ongoing basis, consider limiting its background activity or uninstalling it if it’s not needed.

    For Android 

    Settings may vary, depending on your Android phone’s manufacturer.

    • Open Settings.
    • Tap Battery (or Battery & device carePower & battery, depending on your device).
    • Tap Battery usage or Battery usage by app (or similar).
    • Look through the list of apps and sort or filter by App usage or Screen time, if available, to identify top battery consumers.
    • Tap a high-drain app, then choose something like Restrict background usageOptimize, or Disallow background activity (depending on the options your phone offers).

    Common battery-draining culprits include social media apps, streaming apps, location-based apps and apps with heavy background update behavior. Reviewing this every few weeks can help catch new drains early. 

    Bonus: Check your battery health

    If your phone still drains quickly after these fixes, your battery might be aging. Both iPhones and Android devices offer built-in diagnostics to check battery health and capacity.

    For iPhone

    • Go to Settings.
    • Tap Battery.
    • Tap Battery Health & Charging (on some older versions, it may simply be “Battery Health”).
    • On the Battery Health screen, look at the Maximum Capacity percentage. This tells you how the battery’s current capacity compares to when it was new.
    • If the percentage is well below ~80%, it may be a good time to replace the battery to restore performance and capacity. (Apple notes that batteries are designed to retain around 80 % of their original capacity at 500 full charge cycles under ideal conditions.)

    For Android

    Settings may vary, depending on your Android phone’s manufacturer.

    • Go to Settings.
    • Tap Battery (or “Battery & device care,” “Power & battery,” depending on your phone).
    • Look for an option called Battery healthBattery capacityBattery status or Battery Information. Note: this may not appear on all phones.
    • If the built-in health indicator isn’t available, you can open the hidden test menu by dialing *#*#4636#*#* in the Phone app. If “Battery information” appears, you may see stats such as health, capacity, or cycle count.
    • If your battery health or capacity is shown as “Reduced” or significantly lower than expected, consider replacing the battery for better performance and longevity.

    Replacing an aging battery can dramatically improve performance and lifespan, often more than any software tweak.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

    Kurt’s key takeaways

    With a few quick tweaks, your phone can finally keep up with you all day. Adjusting settings, limiting background activity and checking battery health really do make a difference. You’ll spend less time stressing about a low battery and more time actually using your phone. Stay proactive, and your device will stay powered when you need it most.

    Got a tip you’d like to share, and/or what other everyday tech challenges would you like help solving? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM. newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • 5 social media safety tips to protect your privacy online

    NEWYou can now listen to Fox News articles!

    Let’s face it: Social media can feel like a minefield. Between oversharing personal details, friend requests from strangers and sneaky scams sliding into your DMs, it’s easy to put yourself at risk without realizing it. But staying safe online doesn’t have to be complicated. With a few smart settings and habits, you can enjoy social media without giving away more than you mean to.

    Settings and menus on social media platforms can change over time and may vary by device (iOS vs. Android vs. Web) or region. The steps below were accurate at the time of publishing, but you may see slightly different wording or paths depending on updates, app version or mobile device manufacturer.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter

    HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES

    1) Turn off Location Sharing

    Many apps automatically tag your posts with your location. That can let strangers know your routines or even your home address.

    Scammers have a harder time learning about your life the less you share online.    (Kurt “CyberGuy” Knutsson)

    How to turn off Location Sharing

    On iPhone

    • Go to Settings.
    • Click Privacy & Security.
    • Tap Location Services.
    • Then pick the app.
    • Set it to “Never” or “While Using the App.”

    On Android

    (Settings may vary depending on your Android phone’s manufacturer.)

    • Go to Settings.
    • Tap Location.
    • Click App permissions.
    • Then select the app and toggle location off or select Don’t allow.

    Note: Some apps may still have permission for “While using the app” or “Only this time.” So, you should check each app individually, especially camera and social-media apps, for location permissions.

    Pro tip: Even turning off location for just your camera app helps keep photos from carrying hidden location data.

    META TO ALLOW TEENS’ PARENTS TO DISABLE PRIVATE CHATS WITH AI AFTER BACKLASH OVER FLIRTY CHATBOTS

    A child holds an iPhone at an Apple store on Sept. 25, 2015 in Chicago.

    Parents — and even some teens — are growing increasingly concerned about the effects of social media use on young people. (AP Photo/Kiichiro Sato, File)

    2) Use a private account

    A private account means only people you approve can see your posts and photos. Think of it like putting a lock on your front door.

    How to set private accounts

    Facebook

    • Go to Settings & Privacy.
    • Tap Settings.
    • Scroll to the Audience & Visibility (or Your Activity) section.
    • Click Posts.
    • Find “Who can see your future posts?” and set it to Friends.

    Instagram

    • Tap your profile.
    • Tap the menu (☰).
    • Tap Account Privacy.
    • Toggle on Private account.

    TikTok

    • Go to your Profile.
    • Tap the menu (☰).
    • Select Settings and privacy.
    • Tap Privacy.
    • Toggle on Private account.

    X (formerly Twitter)

    • Click on your profile icon in the top left of the screen.
    • Open Settings and privacy.
    • Select Privacy and safety.
    • Tap Audience and tagging.
    • Toggle Protect your posts (or Protect your Tweets).
    • Once enabled, only approved followers can see your posts.

    Snapchat

    • Open Settings (gear icon).
    • Scroll to Privacy Controls.
    • Under “Who Can,” adjust options like Contact Me, View My Story and See Me in Quick Add to Friends only.

    YouTube

    • Go to your YouTube Studio (desktop or mobile app).
    • When uploading, set visibility to Private or Unlisted.
    • For existing videos, open the video’s settings and change visibility as needed.

    Note: Entire channels cannot be made private, only individual videos.

    LinkedIn

    • Tap your profile photo
    • Settings.
    • Go to Visibility.
    • Under Profile viewing options, select Private mode.
    • You can also control who sees your connections and activity under “Visibility of your LinkedIn activity.”
    identity theft tech scam

    Identity theft has become so commonplace that it no longer shocks you to hear about the latest scam. (Cyberguy.com)

    3) Report suspicious accounts

    Fake profiles are everywhere. Scammers may pose as friends, celebrities or even customer service reps. Reporting them helps keep you (and others) safe.

    How to report an account

    Facebook

    • Go to the fake or impersonating profile.
    • Tap the three-dot menu (Options).
    • Select Find support or report profile.
    • Choose a reason, such as pretending to be someone else.
    • Follow the on-screen prompts to submit the report.

    Instagram

    • Go to the profile.
    • Tap the three-dot menu.
    • Select Report.
    • Choose a reason.
    • Follow the on-screen instructions to complete the report.

    TikTok

    • Open the profile.
    • Tap the three-dot menu (or sometimes the Share icon).
    • Select Report.
    • Choose Report account.
    • Select the reason.
    • Submit the report.

    X (formerly Twitter)

    • Go to the account profile.
    • Tap the three-dot or overflow icon.
    • Select Report.
    • Choose the type of issue.
    • If you’re reporting an entire profile rather than a single post, select Report @username from the profile page.

    YouTube

    • Go to the channel page.
    • Tap the About tab (on desktop) or the three-dot menu (on mobile).
    • Select Report.
    • Choose the reason.
    • Submit the report.

    Snapchat

    • Go to the user’s profile.
    • Tap the three-dot menu or gear icon.
    • Select Report.
    • Choose the reason.
    • Submit the report.

    LinkedIn

    • Visit the fake or suspicious profile.
    • Tap the More button (or three dots).
    • Select Report abuse.
    • Select a reason and follow the prompts.

    Pro tip: Don’t just block. Report alerts to the platform so they can remove the account for everyone.

    Teenage boy on smartphone

    With a few smart settings and habits, you can enjoy social media without giving away more than you mean to. (Thai Liang Lim/Getty Images)

    4) Enable two-factor authentication (2FA)

    Even if someone steals your password, 2FA makes it harder for them to break in. It adds an extra step, like a code texted to your phone.

    How to enable two-factor authentication (2FA)

    Facebook

    • Go to the menu and select Settings & Privacy, then Settings.
    • Tap Accounts Center.
    • Then click Password and Security.
    • Tap Two-factor authentication.
    • It may ask you to choose an account to set up two-factor authentication. 
    • Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.

    Instagram

    • Go to your profile and open Settings.
    • Click Accounts Center. 
    • Select Password and Security.
    • Then Two-Factor Authentication.
    • It may ask you to choose an account to set up two-factor authentication. 
    • Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.

    TikTok

    • Go to your Profile.
    • Then open the Menu.
    • Select Settings and privacy.
    • Then, Security and permissions.
    • Tap 2-step verification.
    • Choose one or more verification methods, such as text message, email or an authentication app.
    • Click Turn On. 
    • Follow the prompts to finish setup.

    X (formerly Twitter)

    • Click on your profile on the upper left of the screen.
    • Open Settings and privacy.
    • Select Security and account access, then Security.
    • Tap Two-factor authentication.
    • Choose your preferred method, such as text message, authentication app or security key.
    • Follow the steps to turn it on.

    Note: Text message (SMS) verification on X may only be available for paid (Premium) users or in certain regions. If SMS isn’t available, you can still use an authentication app or a physical security key for two-factor authentication.

    Pro tip: Use an authenticator app (like Google Authenticator or Authy) instead of text messages for stronger protection.

    5) Check your photos before posting

    Your photos may reveal more than you think — house numbers, car license plates or even vacation details that signal you’re away from home.

    Quick fixes before posting

    • Crop or blur backgrounds that show personal details.
    • Avoid posting in real time while traveling. Wait until you’re back.
    • Review old posts to make sure you’re not unintentionally sharing private info.

    SOCIAL MEDIA VERIFICATION SYSTEMS LOSE POWER AS SCAMMERS PURCHASE CHECKMARKS TO APPEAR LEGITIMATE

    Bonus tip: Keep personal info under wraps

    Every time you post, share or comment online, you’re leaving small clues about your life, and scammers are great at putting those pieces together. The less information fraudsters can find about you, the weaker their scams become.

    Many impersonators use public details like your hometown, workplace or family connections to build fake profiles that seem trustworthy. Even information like your email address or phone number can be exploited if it’s floating around the internet.

    A personal data removal service can help reduce that risk by scrubbing your personal details from people search sites and data brokers. While no solution is perfect, minimizing your digital footprint makes you a much harder target for impersonation and social-engineering scams. These services actively monitor and systematically remove your information from hundreds of sites, saving you time and giving you peace of mind.

    Protecting your privacy online isn’t just about what you share on social media; it’s also about controlling what’s out there already. Limiting that data means scammers can’t easily cross-reference your information with data from breaches or the dark web.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

    Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.

    Kurt’s key takeaways

    Staying safe on social media isn’t about deleting your accounts; it’s about taking control of your information. Turning off location sharing keeps your whereabouts private. Switching to a private account gives you more say over who sees your posts. Being cautious with friend requests and DMs helps you avoid scams. And double-checking your photos before posting prevents oversharing. With just a few quick settings and habits, you can enjoy social media with peace of mind.

    Have you ever spotted a scam or fake account online? Tell us what happened by writing to us at CyberGuy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link