ReportWire

Tag: Smartphones

  • Winter storms can knock out your tech fast: Prepare now

    NEWYou can now listen to Fox News articles!

    Weather forecasters are warning that a major winter storm is expected to impact large portions of the United States starting Friday. Forecasts call for snow, freezing rain and ice stretching from Texas and the Southern Plains through the Southeast, Mid-Atlantic and into the Northeast. This system is concerning because it combines ice accumulation, gusty winds and plunging temperatures. In many regions, especially across the South and parts of the Mid-Atlantic, infrastructure is not designed to handle prolonged ice events.

    That increases the risk of extended power outages and disrupted cell service. When the grid goes down, everyday tech becomes critical. Phones, alerts, vehicles and apps may be your only connection to updates and emergency help. Preparing now matters far more than reacting later.

     Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    RUSSIAN WINTER STRIKE LEAVES NEARLY 800K HOMES WITHOUT POWER AND HEAT IN UKRAINE’S DNIPRO REGION

    Ice storms can take down power lines fast, leaving homes without electricity and cell service for hours or even days.  (AP Photo/Charles Krupa)

    Why ice storms are especially disruptive

    Ice storms cause more damage than most people expect. Unlike snow, ice sticks to everything and adds significant weight. Ice builds up on trees and power lines, causing branches to snap and lines to fall. Utility crews often cannot begin repairs until conditions improve, which delays restoration. Forecasters at Fox Weather warn that freezing rain across the South and interior Southeast could be particularly damaging, while snow and wind farther north may slow emergency response. 

    Even if cell towers remain standing, networks often overload during severe weather. When thousands of people try to call at once, connections fail. Texts and alerts usually have a better chance of getting through. That is why you should assume you may be offline longer than expected.

    Immediate tech actions to take before the storm hits

    These steps are simple, but timing matters. Do them before the weather conditions worsen.

    Charge devices and prepare backup power

    • Charge all phones, laptops, tablets and battery packs
    • Fully charge wearable devices like smartwatches
    • Turn on Low Power Mode on phones now
    • Lower screen brightness to extend battery life, and check out these other tips to keep your phone battery charged longer
    • Make sure you have a reliable portable charger on hand, like those highlighted in our 5 best portable chargers for emergencies on Cyberguy.com.
    • For outages that could last days in this winter storm, a good generator can keep your home powered the longest and safest.
    • Reliable lighting matters during storms and blackouts. Invest in a high-output flashlight and hats with built-in lights that can be especially useful when visibility is poor.
    • Keep a battery-powered weather radio on hand so you can receive emergency updates even if power and cell service go out.

    A fully charged phone, smart power settings and a reliable portable charger can keep you connected early in an outage while longer-term home power solutions carry you through the days ahead.

    Woman in winter storm in Manhattan

    A woman walks with an umbrella in the rain in the Manhattan borough of New York, Feb. 5, 2014.  (REUTERS/Carlo Allegri)

    Plan for offline communication and limited cell service

    • Download offline maps for your area
    • Save emergency contacts locally on your device
    • Write down key phone numbers on paper
    • Plan to text instead of calling if networks are congested. Text messages use less bandwidth and often go through when calls fail.
    • Cold weather can also make phones harder to use. Touchscreen-compatible winter gloves let you stay connected without exposing your hands to the cold.

    Set up a family check-in plan before the storm

    • Agree on specific check-in times
    • Choose one out-of-area contact everyone can message
    • Avoid constant calling, which can overload networks

    Clear expectations reduce panic and unnecessary phone use.

    Make sure emergency alerts are enabled

    Emergency alerts can reach your phone even when apps and social media cannot. They are designed to cut through network congestion and deliver critical warnings.

    How to turn on emergency alerts on iPhone

    • Open Settings
    • Tap Notifications
    • Scroll to Government Alerts
    • Turn on Emergency Alerts
    • Enable Always Play Sound
    • Turn on Imminent Threat Alerts under Enhanced Safety Alerts

    US POWER CRUNCH LOOMS AS OKLO CEO SAYS GRID CAN’T KEEP UP WITHOUT NEW INVESTMENT

    Ice storms add heavy weight to trees and power lines, causing widespread damage and outages that can overwhelm repair crews and communication networks for longer than expected.

    Ice storms add heavy weight to trees and power lines, causing widespread damage and outages that can overwhelm repair crews and communication networks for longer than expected. (AP/Craig Ruttle)

    How to turn on emergency alerts on Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Safety and emergency or Notifications
    • Select Wireless emergency alerts
    • Turn on Severe threats and Extreme threats
    • Enable Allow alerts and Alert sound

    On some phones, you may also see options for Public safety messages or Emergency alerts, which should be turned on. These alerts may include evacuation notices, shelter updates and severe weather warnings.

    Both iPhone and Android let you preview alert sounds and settings in these menus, so take a moment to test them now and make sure alerts are loud enough before severe weather hits.

    Know how to use Emergency SOS on your phone

    If you need help during a winter storm, Emergency SOS can contact emergency services even when you cannot unlock your phone or make a normal call. Set this up now. Do not wait until you are stressed, cold or without power.

    How to set up and use Emergency SOS on iPhone

    • Open Settings
    • Tap Emergency SOS
    • Turn on Call with Hold and Release or Call with 5 Button Presses
    • Scroll down and add emergency contacts

    To activate Emergency SOS during an emergency, press and hold the side button and a volume button, or quickly press the side button five times, depending on your settings.

    How to set up and use Emergency SOS on Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Safety and emergency or Privacy and safety
    • Select Emergency SOS
    • Turn on Use Emergency SOS 
    • Choose how SOS is triggered, such as Require to swipe to call
    • Add emergency contacts and medical information by clicking Emergency sharing settings 

    On many Android phones, pressing the power button five times will trigger Emergency SOS. Emergency SOS can call for help, share your location and alert emergency contacts when conditions are dangerous.

    If cell towers go down during this storm, features like Emergency SOS can still help you reach emergency services. Our guide explains in more detail how these lifesaving settings work.

    Apps you should have installed ahead of time

    The right apps can deliver critical updates when power is out, cell networks are strained and social media is unreliable. Install and set these up before the storm arrives.

    Weather and severe alert apps

    • Fox Weather app: A trusted option for real-time forecasts, winter storm alerts, radar tracking and location-based notifications. Make sure local alerts are turned on.
    • MyRadar Weather Radar: A highly rated radar app that shows storm movement in real time and sends push alerts when severe weather is approaching your area.
    • Storm Shield Severe Weather App: Delivers National Weather Service alerts based on your exact location, similar to NOAA weather radio warnings, with clear push notifications for winter storms and ice events.
    • NOAA Weather Radio apps (iPhone and Android): These apps stream official NOAA Weather Radio broadcasts, providing continuous updates, watches and warnings directly from the National Weather Service. Weather radio streams often remain available even during major outages.

    Using more than one weather app can give you redundancy if one service is delayed or overloaded.

    Utility and outage tracking apps

    • Your local power utility app: Most utilities offer apps that allow you to report outages, view outage maps and track restoration progress in real time.
    • FEMA App: Provides official weather alerts, disaster resources, shelter locations and safety guidance during severe weather events.

    These apps can confirm outages, provide restoration updates and reduce unnecessary calls to utilities when systems are overwhelmed.

    Do not overlook vehicle tech and preparedness

    Your vehicle may become a critical resource during extended outages.

    Prep your car before conditions worsen

    • Fill your gas tank early. A full tank allows you to run the engine briefly for heat or charging if needed.
    • Keep a phone charger in the car.
    • Store a fully charged portable power bank in the glove box or center console. This gives you emergency phone power if your car battery dies or you cannot run the engine.
    • Download weather and road condition alerts.
    • Also, consider buying a Snow brush and ice scraper, jumper cables, a set of 6 LED Road Flares Emergency Lights and a First Aid Trauma Pack with QuikCloth, so you are not caught off guard in an emergency.
    • There are also portable tech solutions designed to help you stay warm and powered during outages or roadside delays, including heated gear worth purchasing in advance.

    Storms also bring scams and fraud attempts

    Severe weather creates ideal conditions for scams. Power outages, delayed responses and anxiety make people more likely to trust messages that appear urgent or official.

    Fake utility and restoration scams

    Scammers often impersonate electric, gas or water utilities.

    • Texts or calls claiming your power will be restored faster if you pay
    • Messages warning service will be shut off unless you act immediately
    • Spoofed phone numbers that look like your local utility

    What to know: Utilities do not charge fees to restore power and do not demand payment by text, gift cards or apps.

    Emergency aid and disaster relief scams

    These scams spike right after storms hit.

    • Messages promising emergency funds, fuel vouchers or hotel assistance
    • Fake charity links claiming to help storm victims
    • Social media posts asking for donations using stolen images

    What to know: Legitimate aid is announced through official government or well-known nonprofit channels, not unsolicited messages.

    Fake delivery, fuel and repair service scams

    Storms disrupt normal services, which scammers exploit.

    • Links claiming fuel delivery is available in your area
    • Messages about delayed packages that require confirmation
    • Ads for emergency home repairs that ask for upfront payment

    What to know: Do not click links or pay deposits without verifying the company independently.

    Charging your devices and lining up backup power now can make the difference between staying informed during an outage and being cut off once the storm hits.

    Charging your devices and lining up backup power now can make the difference between staying informed during an outage and being cut off once the storm hits. (Kurt “CyberGuy” Knutsson)

    Account takeover and identity theft attempts

    Storm chaos makes it easier for attackers to slip through unnoticed.

    • Password reset emails pretending to be from banks or retailers
    • Login alerts asking you to “secure” your account immediately
    • Calls claiming suspicious activity that push you to share codes

    What to know: Never share one-time codes or login details, even if the message looks legitimate.

    How to protect yourself before and during the storm

    Taking a few precautions now can help you avoid costly mistakes when outages, delays, and scam messages start piling up.

    1) Slow down and verify every urgent message

    Scammers rely on panic. If a message pressures you to act fast, stop and verify it through a trusted source.

    2) Avoid clicking links in unsolicited messages and use strong antivirus software 

    Go directly to official websites or apps instead of tapping links in texts or emails. Keep your operating system up to date and use strong antivirus software to block malicious links and fake websites.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    3) Lock down accounts before outages hit

    Enable two-factor authentication (2FA) on email, banking, and utility accounts so stolen passwords cannot be used alone.

    4) Reduce your exposure with a data removal service

    Many storm scams work because criminals already have your phone number, address or email. Using a data removal service to opt out of data broker sites can reduce how easily scammers target you during emergencies.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    5) Never pay to restore power or receive aid

    Utilities and government agencies do not charge fees to restore service or release emergency assistance.

    When power and internet access are limited, it is harder to verify messages quickly. That makes preparation just as important as awareness. A little skepticism now can prevent financial loss and identity theft when help is hardest to reach.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Winter storms can turn small tech decisions into critical ones. Ice, power outages and overloaded cell networks can leave people cut off faster than expected, especially in regions not built for prolonged winter weather. Preparing your devices, alerts, vehicles and accounts ahead of time gives you more control when conditions worsen. It also reduces panic and limits your exposure to scams that thrive during emergencies. A little planning now can make a big difference when help is harder to reach.

    Have you taken steps to prepare your tech for this winter storm, or did this checklist highlight something you still need to do? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.  

    Source link

  • ASUS will not release any new smartphones this year

    ASUS appears to be shifting its business operations away from smartphones. According to translations of recent quotes from Chairman Jonney Shih, the company does not plan to release new phone models in the future. The chairman did not confirm whether smartphones would be completely phased out, but he did acknowledge that possibility. Whatever direction ASUS takes, its existing phones will continue to receive software updates and warranty assistance. Shih suggested that its future plans may include a shift into AI-related projects such as robotics or smartglasses.

    Previous reports hinted that ASUS would not introduce any smartphones in 2026, but Shih’s recent comments indicate that the pause may stretch longer than a year. We’ve reached out to ASUS for additional comment and will update if the company shares any further information.

    ASUS had plenty of other updates emerging from CES at the start of the month unrelated to smartphones, such as dual-screen laptops and a pair of gaming smartglasses. So if it does decide to leave that product segment, there will still be other ASUS-branded gear on the market.

    Anna Washenko

    Source link

  • 5 simple tech tips to improve digital privacy

    NEWYou can now listen to Fox News articles!

    Protecting your privacy doesn’t require advanced tools or technical expertise. Some of the most effective protections are already built into your phone; you just need to know where to look.

    These five privacy tips show you exactly how to reduce tracking and limit data sharing on both iPhone and Android using the latest software.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

    Smartphone users can boost privacy by adjusting built-in settings that limit tracking, location sharing and background data collection on iPhone and Android devices. (Neil Godwin/Future via Getty Images)

    1) Reduce app permissions

    Apps often request access to your camera, microphone, contacts, photos and location, even when it’s not necessary. Limiting these permissions reduces background data collection.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Select a permission type such as Microphone, Camera, Photos or Contacts
    • Toggle off access for apps that don’t need it

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Choose a permission category and set apps to Don’t allow or Allow only while using the app

    2) Turn off location access you don’t need

    Location tracking can reveal where you live, work, shop and travel.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services
    • Select an app and choose While Using the App or Never
    • Turn off Precise Location when exact coordinates aren’t needed

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Location
    • Tap App location permissions or App permissions 
    • Scroll through the list and tap the app you want to change
    • Select Allow only while using the app or Don’t allow

    3) Turn off photo sharing with apps

    Some apps request full access to your photo library, giving them visibility into every image and video you’ve taken.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Photos
    • Select an app and choose Selected Photos or None

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security and Privacy
    • Scroll down and tap More privacy settings or Privacy controls  
    • Tap Permission Manager
    • Tap Photos and videos 
    • Scroll through the list and tap the app you want to change
    • Set apps to Don’t allow, or Allow limited access

    5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY

    Woman holding her phone.

    Turning off unnecessary app permissions and tracking features helps protect sensitive information stored on your phone. (Sebastian Kahnert/picture alliance via Getty Images)

    4) Turn off app tracking

    App tracking allows advertisers to follow your activity across multiple apps.

    iPhone

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn off Allow Apps to Request to Track

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Security & privacy
    • Scroll down and tap More privacy settings
    • Tap Ads
    • Tap Delete advertising ID to remove the existing ID tied to your device
    • Tap Reset advertising ID to generate a new, blank ID

    This removes the identifier apps use to track you for targeted ads and replaces it with a fresh ID that isn’t linked to your previous activity.

    5) Turn off unnecessary background app activity

    Some apps continue running and collecting data even when you’re not actively using them.

    iPhone

    • Open Settings
    • Tap General
    • Tap Background App Refresh
    • Turn it off entirely or disable it for individual apps

    Android

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Battery
    • Choose Restricted or turn off Allow background usage 

    Pro tip: Use a password manager

    A password manager reduces the need to store logins inside apps, which can limit unnecessary permissions and data collection.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    Person selecting an item on their phone.

    Privacy experts say small changes to phone settings can go a long way in reducing digital surveillance and data exposure. (Karl-Josef Hildenbrand/Picture Alliance via Getty Images)

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    Kurt’s key takeaways

    Protecting your privacy doesn’t have to be complicated. By reducing app permissions, limiting location access, controlling photo sharing, turning off app tracking and restricting background activity, you can significantly reduce how much personal data your phone shares. A few simple setting changes can go a long way in protecting your digital life.

    What privacy setting surprised you the most, or is there one you’re unsure about? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2026 CyberGuy.com. All rights reserved.

    Source link

  • 5 tech terms that shape your online privacy

    NEWYou can now listen to Fox News articles!

    Protecting your personal information online starts with understanding the language behind your apps, devices and accounts. We’ll break down five essential tech terms that directly impact your digital privacy, from app permissions and location tracking to VPNs and cross-app advertising. 

    Learning these concepts will help you limit data exposure and stay in control of who can see what.

    Stay tuned for more in this series as we dive deeper into privacy-related tech terms and other essential concepts, answering the top questions we get from readers like you!

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.    

    WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE

    1) App permissions

    What your apps are really allowed to see

    Every app on your phone requests permissions, approval to access features like your camera, microphone, location, contacts or photos. Some permissions are necessary for an app to function, but many apps ask for far more access than they actually need.

    Once granted, these permissions can allow apps to collect data in the background, sometimes even when you’re not actively using them. Over time, this can quietly expose sensitive personal information.

    Regularly reviewing and limiting app permissions in your phone’s settings is one of the easiest and most effective ways to improve your privacy. Pay special attention to apps with access to your location, microphone and photo library.

    iPhone steps (iOS 18 and later)

    To review permissions by category

    • Open Settings
    • Tap Privacy & Security
    • Select a category such as Location ServicesMicrophoneCameraPhotos or Contacts
    • Review each app listed
    • Change access to Never or While Using the App when available

    To review permissions by app

    • Open Settings
    • Scroll down and tap the app’s name
    • Toggle off any permissions the app does not truly need

    Extra privacy tip

    • For Photos, choose Limited Access instead of full library access when possible

    Many apps request more access than they need, quietly collecting data in the background. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review permissions by category

    • Open Settings
    • Tap Privacy
    • Tap Permission manager
    • Select a category such as LocationCameraMicrophone or Contacts
    • Review apps and change access to Don’t allow or Allow only while using the app

    To review permissions by app

    • Open Settings
    • Tap Apps
    • Select an app
    • Tap Permissions
    • Remove any permissions that aren’t essential

    Extra privacy tip

    • Disable Allow background usage for apps that don’t need constant access

    Why this matters

    • Apps can collect data even when you’re not using them
    • Location, microphone and photo access are the most sensitive
    • Fewer permissions mean less data exposure
    • You stay in control without breaking most apps

    Extra protection beyond settings:

    Even with careful permission management, malicious apps and phishing attempts can still slip through. A trusted antivirus solution helps block malware, fake pop-ups and dangerous downloads before they compromise your device. 

    Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    MALICIOUS CHROME EXTENSIONS CAUGHT STEALING SENSITIVE DATA

    2) Location services

    When your phone knows where you are, constantly

    Location services use GPS, Wi-Fi, Bluetooth, and nearby cell towers to determine your location. While this is helpful for maps and weather, many apps request constant access they don’t actually need.

    Reducing location access limits, tracking and helps protect your daily routines.

    iPhone steps (iOS 18 and later)

    To review all location access

    • Open Settings
    • Tap Privacy & Security
    • Tap Location Services

    For each app

    • Tap an app name
    • Select Never or While Using the App
    • Turn Precise Location off unless required

    Recommended settings

    • Avoid Always unless the app truly needs background tracking
    • Use While Using the App for most apps
    • Disable Precise Location for weather, shopping and social apps

    System services (optional)

    • Scroll down and tap System Services
    • Turn off items you don’t need, such as Location-Based Ads and Location-Based Suggestions
    Person typing on cellphone

    Location tracking can reveal your routines and movements long after you close an app. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    To review location access

    • Open Settings
    • Tap Privacy
    • Tap Location

    For each app

    • Tap Location access for apps
    • Select an app
    • Choose Don’t allow or Allow only while using the app
    • Turn Use precise location off when available

    Recommended settings

    • Avoid Allow all the time
    • Use Allow only while using for navigation apps
    • Disable precise location for apps that don’t require accuracy 

    Why this matters

    • Location data reveals routines, habits and patterns
    • Many apps track location in the background by default
    • Limiting access reduces profiling and data sharing
    • You keep core features without constant tracking

    3) Two-factor authentication (2FA)

    Your second line of defense

    Two-factor authentication (2FA) adds an extra layer of protection to your accounts by requiring something you know (your password) and something you have, like a one-time code sent to your phone or generated by an app.

    Even if hackers steal your password through a data breach or phishing attack, 2FA can stop them from accessing your accounts. That’s why security experts strongly recommend enabling it on email, banking, cloud storage and social media accounts.

    It may take a few extra seconds to log in, but 2FA can prevent identity theft and unauthorized access, making it one of the most powerful security tools available.

    Extra security tip:
    Strong passwords and two-factor authentication work best together. If remembering complex passwords or managing one-time codes feels overwhelming, a secure password manager can generate, store and autofill strong passwords safely.

    Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

    HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

    4) VPN (Virtual Private Network)

    Hiding your online activity

    A VPN creates a secure, encrypted tunnel between your device and the internet, masking your IP address and protecting your online activity from outsiders.

    VPNs are especially important when using public Wi-Fi at airports, hotels or coffee shops, where cybercriminals can intercept unprotected data. They also help limit tracking by advertisers and internet service providers.

    While a VPN doesn’t make you completely anonymous online, it adds a valuable layer of privacy and security, especially when browsing, shopping or accessing sensitive accounts.

    For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

    5) Cross-app tracking

    How companies follow you across apps

    Cross-app tracking lets advertisers and data brokers link your activity across multiple apps and websites. That data is used to build detailed profiles based on what you do, buy and watch.

    On iPhone, this tracking is controlled by Apple’s App Tracking Transparency system.
    On Android, it relies on advertising IDs and ad personalization controls.

    Turning these off limits how easily companies can connect your behavior across apps. You’ll still see ads, but they won’t be tailored to your personal activity.

    iPhone steps (iOS 18 and later)

    • Open Settings
    • Tap Privacy & Security
    • Tap Tracking
    • Turn Allow Apps to Request to Track off

    Optional extra protection

    • Review the app list below and make sure no apps are allowed to track you
    • Apps already denied cannot track you across other apps or websites
    Woman holds a phone

    Two-factor authentication (2FA) adds a critical extra step that helps stop account takeovers. (Kurt “CyberGuy” Knutsson)

    Android steps (Android 14 and later)

    Settings may vary depending on your Android phone’s manufacturer

    • Open Settings
    • Tap Privacy
    • Tap Ads
    • Turn Delete advertising ID on
    • Tap Ad topics and turn them off
    • Tap Ad measurement and turn it off

    What this does

    • Removes your advertising ID
    • Stops apps from sharing ad behavior across other apps
    • Limits interest-based and cross-app ad profiling

    One more thing to know:
    Turning off cross-app tracking helps going forward, but it doesn’t remove data that’s already been collected. Data removal services can help you request the deletion of your personal information from data broker sites.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.       

    Kurt’s key takeaways

    Online privacy doesn’t have to feel overwhelming. Once you understand what these common tech terms really mean, it becomes much easier to spot where your data is being collected and decide what you’re comfortable sharing. Small changes, like tightening app permissions or turning off cross-app tracking, can make a meaningful difference over time. Staying informed is the first step toward staying in control, and we’ll keep breaking it all down so you can protect your digital life with confidence.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Confused by a tech term or want something explained? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Source link

  • Don’t lock your family out: A digital legacy guide

    NEWYou can now listen to Fox News articles!

    This is not a happy topic. But it’s essential advice whether you’re 30 or 90.

    If something happened to you tomorrow, could your family get into your digital life? I’m talking about your bank accounts, emails, crypto and a lifetime of memories stored on your phone or computer.

    Big Tech and other companies won’t hand over your data or passwords, even to a spouse, without a hassle, if at all.

    1. The 10-minute setup

    Start with a Legacy Contact. Think of someone you trust who gets access only after you’re gone. Who is that? Good.

    SECRET PHRASES TO GET YOU PAST AI BOT CUSTOMER SERVICE

    One day, you won’t be here anymore, but your tech will bel. Here’s how to plan for that. (iStock)

    · iPhone: Open Settings > tap [Your Name]. Tap Sign-In & Security > Legacy Contact. Go to Add Legacy Contact and follow the prompts.

    · Google: Search for Inactive Account Manager in your Google Account settings. Choose how long Google should wait before acting (e.g., three months). Add up to 10 people to be notified and choose which data (Photos, Drive, Gmail) they can download.

    Google apps, including YouTube, Google and Chrome

    Google has an “Inactive Account Manager” feature. (Chesnot/Getty Images)

    2. The master key problem

    Apple and Google don’t help with banking, insurance, investment or other sites or apps. You need a solid password manager like NordPass that offers emergency access features.

    1. Open your Password Manager and look for Emergency Access.

    2. Add a Digital Heir: Enter the email of a spouse or trusted child.

    3. Set the Safety Delay: Choose a wait period. Usually 7 days is the sweet spot.

    4. How it works: If your contact ever requests access, the app sends you an alert. If you’re fine, you hit Deny. But if you’re incapacitated and can’t respond within those seven days, the vault automatically unlocks for them.

    Pro tip: Your Emergency Contact only gets viewing privileges. They can’t delete or change anything in your vault.

    YOU’LL NEVER TRUST VIDEO AGAIN ONCE YOU SEE WHAT SORA 2 CAN DO

    Facebook app on phone

    Facebook and Instagram have after-death options for accounts. (Karly Domb Sadof, File/AP )

    3. Crypto and social media

    · Crypto: Without your seed phrases, that money is gone. Store them physically along with any instructions and receipts of you buying crypto with your estate paperwork. If you use a crypto hardware wallet, keep that in a fireproof safe.

    · Social media: On Facebook or Instagram, go to Settings > Memorialization. Choose to either have your account deleted or managed by a contact who can post a final tribute.

    Be sure someone knows the passcode to your phone. That’s important for 2FA codes, among other things.

    One more thing. If you found this guide helpful, be sure to get my free newsletter at GetKim.com to stay tech-savvy and secure every day!

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    · National radio: Airing on 500-plus stations across the US, find yours at komando.com or get the free podcast

    · Daily newsletter: Join 650,000 people who read the Current (free!) at komando.com

    · Watch: Kim’s YouTube channel at youtube.com/@kimkomando

    Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

    Source link

  • How to send free digital invitations on iPhone

    NEWYou can now listen to Fox News articles!

    Creating invitations should feel easy, not stressful. Apple’s Invites app makes it simple to create free digital invitations with built-in RSVP tools, even if your guests do not use iPhones.

    You can design the invite, track responses, and share photos after the event, all from your iPhone. Below is a clear step-by-step guide with exact instructions so you can get it right the first time.

    Oh, and if you want more options beyond Apple’s Invites app, we also cover the best invitation apps for both iPhone and Android.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    HOW TO SHARE YOUR ESTIMATED ARRIVAL TIME ON IPHONE AND ANDROID

    Apple’s Invites app lets users create free digital invitations with built-in RSVP tools directly from an iPhone, making event planning faster and easier. (Katharina Kausche/picture alliance via Getty Images)

    Why Apple Invites makes event planning easier

    Apple Invites keeps everything in one place. You design the invite, manage RSVPs and share memories without switching apps. You can:

    • Create invitations for parties, meetings and family events
    • Let guests RSVP from any device
    • Share photos, playlists and links after the event

    Apple Invites system requirements

    Before you start, confirm these basics. You need:

    • An iPhone running iOS 18 or newer
    • An iCloud+ subscription to create invitations

    Guests can view and RSVP without an iCloud+ subscription. The steps in this article were tested on an iPhone 15 Pro Max running iOS 26.2.

    Download Apple Invites from the App Store

    First, install the Apple Invites app.

    • Open the App Store.
    • Search for Apple Invites.
    • Download the app named Apple Invites to avoid confusion.

    Open the Invites app after installation.

    How to create a free digital invitation with RSVP on iPhone

    You are now ready to build your invitation.

    Start a new invitation in Apple Invites

    • Open the Invites app.
    • If this is your first time, tap Create Invitation.

    If you have created invites before, tap the plus icon in the top corner.

    Add a background image to your invitation

    • Tap Add Background.
    • Choose one option:PhotosCameraPlayground using Apple Intelligence on supported modelsYou can also select Emoji, Photographic or Color backgrounds.
    • Photos
    • Camera
    • Playground using Apple Intelligence on supported models
    • You can also select Emoji, Photographic or Color backgrounds.

    Grant photo or camera access if prompted.

    Add event details like title, date and location

    Next, fill in the key information.

    • Tap Event Title and enter the name of your event.Choose from four available fonts.
    • Choose from four available fonts.
    • Tap Date and Time.Select a start and end time or mark the event as all day.
    • Select a start and end time or mark the event as all day.
    • Tap Location.Enable Location Services if prompted.
    • Enable Location Services if prompted.
    • Tap Add a Description to include event details or notes.

    If you add both a date and a location, the app automatically shows:

    • The weather forecast for that day
    • A Maps link with directions

    Add optional features like photos, links and playlists

    You can add several optional features to enhance your invitation.

    • Add a shared photo album so guests can view and upload photos by tapping Create Album
    • Add a website link, such as a gift registry, by tapping Add a Link
    • Add a shared Apple Music playlist guests can listen to and add songs to by tapping Add Playlist

    Add a Tile to bundle photos, playlists or links in one place by tapping Add Tile

    Preview and create your invitation

    Before sending, review everything.

    • Tap Preview.
    • Review how the invitation will look to guests.
    • Tap Next in the upper-right corner.
    • Wait a few seconds while the invite is created.

    NEVER LOSE YOUR CAR WITH MAPS PARKING TOOLS

    iPhone screen at a store.

    Apple Invites allows hosts to design invites, track guest responses and share photos without requiring guests to own an iPhone. (Nikolas Kokovlis/NurPhoto via Getty Images)

    How to send invitations and manage RSVPs on iPhone

    Once your invitation is live, you can share it in two different ways.

    Invite guests using a public link

    • Under Invite with Public Link, choose how you want to share the link:MessagesMailShare LinkCopy Link
    • Messages
    • Mail
    • Share Link
    • Copy Link
    • Toggle Approve Guests on if you want to review RSVPs before guests are added.
    • Leave Approve Guests off to allow anyone with the link to RSVP automatically.

    Guests who accept the invite will appear in your guest list.

    Invite guests individually

    • Scroll to Invite Individuals.
    • Tap Choose a Guest.
    • Then you’ll be prompted to access your contacts and click Continue.
    • Click Select Contacts
    • Select only the contacts you want to include for this invitation and click Continue 
    • Tap Allow Selected Contacts 
    • Select a contact to send a one-time invite link.
    • Then click Messages, Mail or Share Link

    This option sends a unique link to a single guest.

    Guests can RSVP even if they do not own an iPhone.

    How to send invitations and manage RSVPs on iPhone

    Once your invitation is live, you can share it in two different ways.

    Invite guests using a public link

    • Under Invite with Public Link, choose how you want to share the link:MessagesMailShare LinkCopy Link
    • Messages
    • Mail
    • Share Link
    • Copy Link
    • Toggle Approve Guests on if you want to review RSVPs before guests are added.
    • Leave Approve Guests off to allow anyone with the link to RSVP automatically.

    Guests who accept the invite will appear in your guest list.

    Invite guests individually

    • Scroll to Invite Individuals.
    • Tap Choose a Guest.
    • Then you’ll be prompted to access your contacts and click Continue.
    • Click Select Contacts
    • Select only the contacts you want to include for this invitation and click Continue 
    • Tap Allow Selected Contacts 
    • Select a contact to send a one-time invite link.
    • Then click Messages, Mail or Share Link

    This option sends a unique link to a single guest.

    Guests can RSVP even if they do not own an iPhone.

    Manage event settings and RSVP notifications

    You stay in control after sending.

    • Tap the Settings icon inside the invite.
    • Adjust guest permissions and RSVP options.
    • Enable notifications to receive alerts when guests respond.
    • Set plus one limits or block additional guests if needed.

    Your invitation appears on the app home screen under Upcoming.

    Edit an invite after sending it

    Plans change, and edits are allowed.

    • Open the invite from the Upcoming list.
    • Tap the More Button (three horizontal dots in the upper-right corner)
    • Click Edit to update details.
    • Changes sync automatically for guests.

    5 BEST APPS TO USE ON CHATGPT RIGHT NOW

    iPhones on a display at the store.

    With Apple Invites, users can manage event details, RSVPs and shared content all in one place using iOS 18 or newer. (Nikolas Kokovlis/NurPhoto via Getty Images)

    Pro tip: duplicate invitations for recurring events

    If you host a recurring event, such as a book club, save time.

    • Open an existing invitation.
    • Tap the More button. (three horizontal dots in the upper-right corner)
    • Select Duplicate.
    • Adjust the date, time or details as needed.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Apple Invites makes event planning feel simple again. You can create free digital invitations, send them in seconds and track RSVPs without chasing people down. Everything lives in one place, from guest lists to shared photos, which saves time and reduces stress. Best of all, guests do not need an iPhone to respond. That makes Apple Invites practical for real life, not just Apple users. Whether you are planning a birthday, a family dinner, or a casual meetup, this app helps you focus on the event rather than the logistics.

    Would you consider replacing paper invites or group texts with Apple Invites, or are you still planning events the old way? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Clicks debuts its own take on the BlackBerry smartphone, plus a $79 snap-on mobile keyboard | TechCrunch

    Clicks Technology, a company known for making physical keyboards for smartphones, is launching two new devices ahead of the Consumer Electronics Show in Las Vegas next week. In addition to a new, $79 slide-out keyboard for smart devices, the company is also unveiling its first smartphone: the Communicator, a smartphone with a physical keyboard, designed to be carried as your second device.

    Yes, it looks a lot like a BlackBerry. (Quick, someone tell Kim Kardashian, famous BlackBerry hoarder.)

    Image Credits:Clicks

    The $499 smartphone is described as being “purpose-built” for people who carry two phones — one for work and one for personal use. That is, the company believes its market will be people who do a lot of actual work on their devices — meaning messaging, emailing, working with documents, or other things where using a physical keyboard could be an advantage.

    While it offers a screen for viewing and responding to messages, the Communicator doesn’t provide access to addictive social media apps or games. Instead, the company partnered with the maker of an Android launcher, Niagara Launcher, to provide access to messaging apps and productivity tools like Gmail, Telegram, WhatsApp, and Slack.

    The phone’s standout feature is its Signal Light, a light-up button on the side of the device that can be customized with different colors and light patterns to indicate when you’ve received messages from certain people, groups, or apps. For instance, you could make messages from VIPs glow purple while chats from WhatsApp are green.

    Image Credits:Clicks

    You can press on this button, known as the Prompt Key, to dictate messages when you’re in a text field, or otherwise take a quick voice note, if not. The company is teasing the possibility of integrating AI applications with this button — like note takers, voice recordings, or AI agents — but nothing like that is yet available.

    Like Clicks’ other products, the Communicator features a tactile keyboard with ergonomic keys designed for faster typing. The keyboard is touch-sensitive, too, allowing users to scroll through messages, lists, and web pages without needing to use the touchscreen.

    Image Credits:Clicks

    The device also includes other old-school features, like a 3.5 mm headphone jack, physical SIM card tray (in addition to an eSIM), expandable microSD storage (up to 2TB), and a tactile switch for turning on or off airplane mode. This switch can also be configured to work with the Signal light or keyboard touch input, the company says.

    The back cover can be popped off so you can change the device’s style by swapping to a different color. The phone itself comes in Smoke, Clover (dark green), and Onyx.

    Image Credits:Clicks

    The device will be offered at $399 for early-bird customers who place a $199 deposit before February 27. Customers who pay the full early-bird price of $399 up front will receive two additional back covers. The phone is expected to ship sometime later this year.

    The phone’s full tech specs include:

    • Android 16 with 5 years of security updates
    • 131.5 mm tall; weighing 170 grams
    • Global 5G, 4G LTE, and 3G/2G support, unlocked
    • 4,000 mAh silicon-carbon battery
    • 256GB onboard storage plus expandable microSD
    • 50MP main camera with OIS and 24MP front camera
    • NFC with Google Pay, Bluetooth 5.4, Wi-Fi 6
    • USB-C and wireless charging
    • Interchangeable back covers in different colors to personalize the device
    Image Credits:Clicks

    Clicks CEO Adrian Li noted in an announcement that the company has shipped more than 100,000 of its earlier keyboards to customers in over 100 countries.

    “That response validated something we strongly believed: There’s growing demand for purpose-built products that help people communicate with confidence and take action. Clicks Communicator is a natural evolution of that idea,” he stated.

    Image Credits:Clicks

    The company’s other new product is a slide-out keyboard that can be attached to smartphones, tablets, or even used with smart TVs, to save you from the tedious on-screen typing with your remote control.

    The keyboard is powered by a built-in 2,150 mAh battery and attaches to phones via MagSafe or Qi2 magnetic connections. It can also be used with existing phone cases, the company claims. Multiple slider positions allow the keyboard to accommodate different phone sizes, and it can be attached when the phone is held in either portrait or landscape mode.

    Image Credits:Clicks

    When used with tablets, TVs, or other smart devices, like AR/VR headsets, the keyboard is used independently from the device it’s paired with.

    Similar to other Clicks keyboards, the Power Keyboard offers tactile buttons, and its settings can be customized using the Clicks mobile app for iOS and Android

    The Power Keyboard is priced at $79 for early-bird customers and will later retail for $109. Preorders start on January 2; the device should ship in the spring, the company says.

    Sarah Perez

    Source link

  • How to share your estimated arrival time on iPhone and Android

    NEWYou can now listen to Fox News articles!

    Sharing your estimated time of arrival (ETA) lets others know when to expect you without constant check-ins. Apple Maps and Google Maps both include built-in tools that send live arrival updates while you drive. Once turned on, the updates run automatically. That means fewer distractions and safer trips.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free — when you join my CYBERGUY.COM newsletter.

    NEVER LOSE YOUR CAR WITH MAPS PARKING TOOLS

    Apple Maps and Google Maps let drivers share live ETAs, so contacts can track arrival times without constant texts or calls. (Photographer: David Paul Morris/Bloomberg via Getty Images)

    Why this feature makes everyday travel easier

    Sharing your ETA is quick and practical. It lets contacts know you are on your way and see your updated arrival time in real time. It also adds peace of mind during late nights, long routes or unfamiliar areas. Most importantly, you stay focused on moving safely instead of responding to messages.

    We tested these steps using an iPhone 15 Pro Max running iOS 26.2 and a Samsung Galaxy Android phone running Android 16. Make sure Apple Maps or Google Maps is installed and updated to the latest version.

    Enable Share ETA Permissions on iPhone

    Before starting navigation, confirm that Apple Maps has the correct permissions. Without these settings enabled, ETA sharing may never appear.

    • Open Settings.
    • Tap Privacy & Security.
    • Tap Location Services and make sure it is turned on.
    • In Location Services, tap Maps.
    • Set location access to While Using the App or Always.
    • Turn on Precise Location.
    • Return to Settings.
    • Scroll down and tap Apps
    • Click Maps.
    • Scroll down, and next to Share ETA, enable it.

    ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

    Woman typing on her phone.

    Sharing your ETA updates automatically as traffic changes, helping drivers stay focused on the road. (Photo by Sebastian Kahnert/picture alliance via Getty Images)

    How to Share ETA on iPhone Using Apple Maps

    Follow these steps to share your live ETA with a contact using Apple Maps. Note: ETA sharing only works after navigation begins. You also need Location Services enabled for Maps and Contacts.

    • Open Apple Maps on your iPhone.
    • Search for your destination and tap it.
    • Select your travel mode, then tap Go to start navigation.

    Once navigation starts, tap the route card at the bottom of the screen to expand it.

    • Scroll down and tap Share ETA.
    • Choose a recent contact or tap Contacts to search for someone.
    • Your contact will get a notification and can see your live ETA until you arrive or stop sharing.

    How to share ETA on Android using Google Maps

    Android users can share their ETA just as easily with Google Maps. You can share your live arrival time on any Android phone using Google Maps. The feature is built into the Google Maps app.

    Menu wording or placement may vary slightly depending on your device and Android version.

    • Open the Google Maps app on your Android phone.
    • Search for your destination and tap Directions.
    • Tap Start to begin navigation.
    • While navigation is active, swipe up from the bottom of the screen to open the trip menu.
    • Tap Share trip progress (on some devices, this may appear as Share your trip).
    • Choose a contact or share a link using text message or another app.

    Your contact can follow your live location and see updated arrival times until you reach your destination or stop sharing.

    Pro tip: If you don’t see “Share trip progress,” make sure navigation has already started.

    HOLIDAY TRAVEL PRIVACY RISKS AND HOW TO STAY SAFE

    Person using their iPhone.

    iPhone and Android users can send real-time arrival updates directly from Apple Maps or Google Maps. (Photo by Sebastian Kahnert/picture alliance via Getty Images)

    What happens after you share your ETA

    Once sharing is active, both apps handle updates automatically.

    • Arrival times adjust with traffic
    • Delays appear without manual messages
    • Sharing ends when you arrive

    You can stop sharing at any time from the navigation screen. 

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Sharing your ETA on iPhone or Android removes the pressure of keeping others informed while driving. Apple Maps and Google Maps do the work for you. It is a simple habit that improves safety of communication and peace of mind.

    Do you use ETA sharing when you drive, walk, or take transit, and has it changed how often people check in on you? Let us know by writing to us at Cyberguy.com. 

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free — when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Android Sound Notifications help you catch key alerts

    NEWYou can now listen to Fox News articles!

    Staying aware of your surroundings matters. That includes hearing smoke alarms, appliance beeps or a knock at the door. Still, real life gets busy. You wear headphones. You get focused. Sounds slip by. That is where Android Sound Notifications help. This built-in accessibility feature listens for key sounds and sends an alert to your screen. Think of it as a gentle tap on the shoulder when something important happens.

    Although it was designed to help people who are hard of hearing, it is useful for anyone. If you work with noise-canceling headphones or often miss alerts at home, this feature can make a real difference.

    Now, if you use an iPhone, here’s how Apple’s Sound Recognition can alert you to alarms and other key sounds on your device. 

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Android Sound Notifications alert you when important sounds happen around you.  (Kurt “CyberGuy” Knutsson)

    CHROME ROLLS OUT AI PODCAST FEATURE ON ANDROID

    What Sound Notifications do on Android

    Sound Notifications use your phone’s microphone to listen for specific sounds nearby. When it detects one, it sends a visual alert. You will see a pop-up, feel a vibration and may even see the camera flash.

    By default, Android can detect sounds like:

    • Smoke alarms
    • Fire alarms
    • Sirens
    • Door knocks
    • Doorbells
    • Appliance beeps
    • A landline phone ringing
    • Running water
    • A baby crying
    • A dog barking

    That range makes the feature practical at home or at work. Even better, you control which sounds matter to you.

    Why this feature is worth using

    Here is the simple truth. You cannot hear everything all the time. Distractions happen. Headphones block sound. Focus takes over. Sound Notifications fill that gap. While you stay locked into a task, your phone keeps listening. When something important happens, you still get the message. As a result, you worry less about missing alarms or visitors. You gain awareness without extra effort.

    How to turn on Sound Notifications

    Getting started only takes a minute. Note: We tested these steps on a Samsung Galaxy S24 Ultra running the latest version of Android. Menu names and locations may differ slightly on other Android phones, depending on the manufacturer and software version.

    • Open the Settings app
    • Go to Accessibility
    • Tap Hearing enhancements
    • Select Sound Notifications
    • Turn the feature on
    Screens side-by-side displaying how to turn on Sound Notifications

    Turning on Sound Notifications only takes a few taps in Android’s Accessibility settings. (Kurt “CyberGuy” Knutsson)

    When you enable Sound Notifications for the first time, Android will ask how you want to start the feature. Choose the option that works best for you:

    • Tap the button in the quick settings panel
    • Tap the Accessibility button
    • Press the Side and Volume Up buttons
    • Press and hold the Volume Up and Volume Down buttons for three seconds

    After you select a shortcut, Click Ok.  Then, Sound Notifications will start listening in the background.

    ANDROID EMERGENCY LIVE VIDEO GIVES 911 EYES ON THE SCENE

    If you do not see the option, install the Live Transcribe & Notifications app from the Play Store. You can enable Sound Notifications from there. Once active, your phone listens for selected sounds and alerts you when it detects one. 

    Choose which sounds trigger alerts

    Not every sound deserves your attention. Thankfully, Android lets you fine-tune alerts.

    Settings may vary depending on your Android phone’s manufacturer

    • Go back to Settings
    • Tap Accessibility
    • Click Hearing enhancements
    • Tap Sound Notifications
    • Click Open Sound Notifications. This opens the actual Sound Notifications control screen.
    • On the Sound Notifications screen, tap Settings or the gear icon in the top corner
    • Tap Sound types

    You will now see the full list of detectable sounds.

    • Toggle on the sounds you want alerts for, such as smoke alarms or doorbells
    • Toggle off sounds you do not want, like dog barking or appliance beeps, if they are not important to you
    Screens side-by-side displaying how to turn on Sound Notifications

    You can choose exactly which sounds trigger alerts, helping you avoid unnecessary interruptions. (Kurt “CyberGuy” Knutsson)

    Check the sound history log

    Sound Notifications keep a log of detected sounds. This helps if you were away from your phone and want to see what happened.

    You can also save sounds and name them. That makes it easier to tell the difference between your washer finishing and your microwave timer.

    The log adds context, which makes alerts more helpful.

    GOOGLE’S NEW CALL REASON FEATURE MARKS CALLS AS URGENT

    Teach your phone custom sounds

    Android does not stop at presets. You can train it to recognize sounds unique to your space.

    Maybe your garage door has a distinct tone. Maybe an appliance uses a nonstandard beep. You can record it once, and your phone will listen for it going forward. To add a custom sound:

    Settings may vary depending on your Android phone’s manufacturer

    • Open Sound Notifications
    • Tap the gear icon
    • Select Custom sounds
    • Tap Add sound
    • Hit Record

    Record a clear 20-second clip. The better the audio, the better detection works later.

    Customize how alerts appear

    By default, Sound Notifications use vibration and the camera flash. That visual cue is helpful for urgent alerts. However, not every sound needs that level of attention. You can adjust how alerts appear based on importance.

    Settings may vary depending on your Android phone’s manufacturer

    • Open Sound Notifications
    • Open the gear icon
    • Tap Ways to be notified
    • From there, choose which alerts vibrate, flash or stay subtle

    This flexibility keeps the feature working for your routine.

    Your privacy stays on your phone

    It is reasonable to question constant listening. Here is the key detail. Sound Notifications process audio locally on your device. Sounds never leave your phone. Nothing gets sent to Google. The only exception is if you choose to include audio with feedback. That design keeps the feature private and secure.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Android Sound Notifications quietly solve a real problem. They help you stay aware when your ears cannot. Setup is fast. Controls are flexible. Privacy stays intact. Once you turn it on, you may wonder how you lived without it.

    What important sound have you missed lately that your phone could have caught for you? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Americans Won’t Ban Kids from Social Media. What Can We Do Instead?

    What seems most likely: the law will not be rigidly enforced, as teen-agers and social-media companies figure out ways to circumvent the ban, but the social norm established by the law and its robust popularity among politicians and voters will lead to a significant downturn in social-media use by minors nonetheless. Not every fourteen-year-old is going to draw a moustache on their photograph or get a fake I.D.—and the law should be easier to enforce among younger kids, which may mean that in five or so years it will be rare to find a fourteen- or fifteen-year-old in Australia who has ever posted anything on social media.

    This seems like a pretty good result—if you believe, as I do, that social media is obviously bad for children and adults alike. But it returns us to the question I posed at the start of this column, which has a particular relevance for Americans, who live in a country founded on the principle of free speech. The civil-libertarian argument against laws like the one that Australia has passed will probably win out in this country, if only because it happens to be aligned, in this case, with powerful domestic tech companies. That argument is simple, but bears repeating: we shouldn’t place arbitrary age limits on who gets to express themselves in the digital town square, and we shouldn’t require everyone who wants to express their opinions online to submit to an I.D. check. As a journalist, I’m also aware that, for many people, social media is a source of news. It may be a toxic and wildly imperfect alternative to legacy media, but I don’t think we should use government force to effectively reroute children to more traditional sources of information.

    In my column on this subject two years ago, I compared the attempt to restrict social-media use to adults to earlier efforts to do something similar with tobacco. The remarkably successful fight against youth smoking did rely, in part, on a shift in social norms; it also depended on a variety of legal restrictions, and heavy taxation—and I did not, at the time, see what equivalent measures might be taken with social media. Ultimately, I thought it might just come down to parents holding the line.

    I’m less pessimistic now. One of the recurring themes I discuss on “Time to Say Goodbye,” the podcast I host with the Atlantic’s Tyler Austin Harper, is what a good life looks like today. When politicians, especially liberal ones, discuss the society that they want to help bring into reality, what are the shared values that they imagine will hold people together? I’m not talking about kitchen-table issues, as important as they are, or even about tolerance and equality. What I have in mind is a vision of how Americans should live on a daily basis in a time when technology runs our lives. The Times columnist Ezra Klein addressed this recently in a piece about the “politics of attention” and the question of “human flourishing.” He concluded, “I don’t believe it will be possible for society to remain neutral on what it means to live our digital lives well.”

    I ultimately agree with Klein that we will not be neutral forever, even if our courts make an Australia-like ban nearly impossible. But I have come to believe that, in the not too distant future, the concerns of crusty civil libertarians such as myself will be pushed aside, and a new set of social norms will emerge, especially in the middle and upper classes. The signs of this quiet revolution waged on behalf of internet-addicted children are already all around us. School districts around the country are banning phones from the classroom. “The Anxious Generation,” by Jonathan Haidt, which directly informed the new law in Australia, has been on the Times best-seller list for eighty-five weeks, and has inspired little acts of tech rebellion by parents around the country.

    The nascent anti-smartphones movement in America is decidedly nonpartisan, for the most part, and this contributes to its potential and also to the vagueness of its outlines. It also has taken place almost entirely at the local and state level. More than thirty states in the country now have some form of cellphone ban in their schools, which should be applauded. I believe that teen-agers should have the right to post their opinions on social media, but I don’t think they need to do that in the middle of geometry class. If this means that First Amendment rights are further restricted in schools, that may be a compromise that free-speech absolutists have to accept.

    Jay Caspian Kang

    Source link

  • Australian politician calls country ‘guinea pig’ for censorship amid world-first social media ban

    NEWYou can now listen to Fox News articles!

    A world-first social media ban took effect in Australia last week, restricting children younger than 16 from using platforms such as Instagram, Snapchat and TikTok.

    “Australia has become an international guinea pig for the people who want internet censorship,” said Hon. John Ruddick, a member of the New South Wales Legislative Council.

    More than 200,000 accounts were deactivated Wednesday after Australia’s Online Safety Amendment went into effect.

    “It’s massive,” he explained. “It’s the only thing the country’s talking about.”

    AUSTRALIA IMPLEMENTS FIRST-EVER YOUTH SOCIAL MEDIA BAN

    A 13-year-old boy displays a message on his mobile phone from social media platform Snapchat after his account was locked for age verification in Sydney on December 9, 2025.  (Photo by AFP via Getty Images)

    The 10 social media giants included in the ban are Facebook, Instagram, X, TikTok, Snapchat, Kick, Reddit, Threads, Twitch and YouTube. By law, they are required to locate and deactivate accounts of Australian users under the age of 16. 

    “I have heard that every playground around Australia for months has been talking about censorship coming,” Ruddick told Fox News Digital.

    Children and parents won’t be penalized for violating the ban, but social media companies face fines of up to $33 million if they don’t take “reasonable steps” to remove underage users.

    Many Aussie children, Ruddick said, are already finding ways to skirt the sweeping ban.

    “They’re getting around it through fake IDs, opening new apps — which you know are popping up — VPNs,” he explained. “Kids are tech-savvy… This is what we predicted would happen.”

    instagram australia social media ban

    A teenager gets a notification from Instagram after the account was locked for age verification in Sydney on December 9, 2025.  (Photo by AFP via Getty Images)

    Ruddick, alongside two Australian teenagers, is taking legal action over the ban, filing a constitutional challenge to Australia’s High Court. Equivalent to the U.S. Supreme Court, the court can overturn laws it deems unconstitutional.

    Ruddick told Fox News Digital he believes the social media ban violates young Australians’ right to political communication.

    “We’re saying that this is breaching young kids’ ability to engage in politics, and a lot of them will be voting within two years of turning the age of 16,” he explained.

    The Australian politician is the president of the Digital Freedom Project, a group launched to raise public awareness about the ban that he calls a “dangerous violation” of free speech.

    AUSTRALIA BEGINS ENFORCING SOCIAL MEDIA LAW BANNING CHILDREN UNDER 16 FROM MAJOR PLATFORMS

    A judgment on their constitutional challenge is expected in March or April 2026.

    australia's prime minister speaking on social media ban

    Australia’s Prime Minister Anthony Albanese speaks during an official function to mark the start of Australia’s social media reform at Kirrilbilli House in Sydney on Dec. 10, 2025.  (DAVID GRAY / AFP via Getty Images)

    Australian Prime Minister Anthony Albanese says the ban is about shielding children from the harmful effects of social media.

    Albanese said Wednesday that the nation is taking a leading role in challenging major tech platforms and demanding accountability for how social media impacts children’s well-being.

    “It’s a profound reform which will continue to reverberate around the world in coming months, to assist not just this generation, but generations to come,” Albanese said.

    The politician counters Albanese’s argument, saying the ban will create the “worst of both worlds,” with children turning to dangerous underground media platforms while parents let their guard down, assuming the ban is protecting them.

    AFTER AUSTRALIA PASSES SOCIAL MEDIA BAN, LAWMAKERS PROBED ON WHY CONGRESS HASN’T DONE MORE TO PROTECT KIDS

    us capitol building

    US lawmakers are being probed on whether a social media ban could come to America. (J. David Ake/Getty Images)

    Back in the U.S., lawmakers on both sides of the aisle are signaling an interest in tougher social media restrictions for young people following the Aussies’ one-of-a-kind ban.

    “I think we ought to look at what Australia’s doing, for example, requiring access to these social media platforms to not be available to anybody under the age of 16,” Sen. John Cornyn, R-Texas, said.

    “I think protecting children is an avenue that should be pursued,” Sen. Dick Durbin, D-Ill., said. “I won’t rule out some sort of limitation in sales or distribution or use of those devices… Parents and grandparents need a helping hand; this is getting out of hand.”

    australia social media teen ban

    Social media giants like Meta could face multi-million-dollar fines if they fail to ban underage Australian users. (Anna Barclay/Getty Images)

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Ruddick warned that Australia’s ban is making “very prominent people” interested in a dangerous strategy of censorship.

    “I was assuming that the U.S. First Amendment was going to protect you from this,” the politician told Fox News Digital. “But this is why I think we’re a guinea pig. We’re having very prominent people all around the world coming out and supporting this ban.”

    “They’re going to try and say it’s a success, and then they’re going to say, ‘Oh, the rest of the world needs to do this.’ This is not about protecting kids. This is about internet censorship, which all governments crave,” he added.

    Source link

  • Google’s new Call Reason feature marks calls as urgent

    NEWYou can now listen to Fox News articles!

    Sometimes you need someone to answer right away. Maybe you are locked out. Maybe those concert tickets are about to go on sale. Android users are about to get a helpful upgrade that gives their calls more context when time matters.

    Google is rolling out a beta feature called Call Reason in the Phone by Google app that lets you mark a call as urgent before you dial.

    When you use it, the person receiving your call sees the urgent label on their screen. If they miss it, the same note shows up in their call history. That quick hint can give your call priority without you needing to send a separate message.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON

    Call Reason lets you flag a call as urgent before you dial, giving your contacts a clear signal that your call needs quick attention. (Google)

    How the Call Reason feature works

    Call Reason appears inside the Phone by Google app on Android devices. The feature only works when both people use Google’s default calling app and the contact is saved in your phone. Many Android phones ship with Phone by Google preinstalled, especially Pixel models, while others like Samsung may use their own dialer instead. If your device does not use Phone by Google by default, you may not see the feature until you install or switch to the Google version. Once marked as urgent, your call displays a clear indicator that tells the other person the conversation should not wait.

    This simple tool helps friends and family answer faster. It also gives them a reminder if they miss the call. Since the note stays in the call log, it nudges them to call back sooner.

    Why this Call Reason feature on Android can help you

    Missed calls are common. Many people silence their phones while working or driving. Call Reason bridges that gap with a small but meaningful alert that adds context. You can give someone a heads-up that the call needs quick attention without creating extra steps or confusion.

    Right now, Call Reason only supports the urgent label. Google has hinted that more options could come later, like short custom messages or emoji-style indicators. That could add even more clarity when your call is tied to a specific topic.

    5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOW

    A Google phone call with the notify button highlighted

    Both people need to use the Phone by Google app for the urgent label to work, which helps your calls stand out when timing matters most.  (Google)

    How to check if you have ‘Phone by Google’ on your Android

    Not every Android phone shows ‘Phone by Google’ in its settings. Some manufacturers, especially Samsung, use their own Phone app. Here is a quick way to confirm if you have the Google version on your device.

    Check the Play Store

    Open Google Play Store

    Search for Phone by Google

    If you see Open or Update, it is installed

    If you see Install, your phone does not have it yet.

    If the Install button appears, you can download it with one tap.

    After installing the Google Phone app

    Once it is installed, your phone may prompt you to set it as your default calling app. If it does not, you can change it manually.

    Switch to Phone by Google as your default

    Once Phone by Google is installed, you need to make it your main calling app. Call Reason only works when Phone by Google is set as your default calling app. Installing it is not enough. You must switch your phone to use the Google dialer for the feature to appear. Here’s how to enable it by following these steps.

    On Pixel devices

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap Default apps

    Tap Phone app

    Select Phone by Google, which uses a blue icon with a white phone handset

    On Samsung Galaxy phones

    Settings may vary depending on your Android phone’s manufacturer.

    Open Settings

    Tap Apps

    Tap the three dots

    Tap Choose default apps

    Tap Phone app

    Select Phone by Google if available. It uses a blue icon with a white phone handset, which looks different from Samsung’s green Phone icon

    Samsung may block or hide the Google Phone app on some carrier models. If you do not see it after installation, your device may not support switching. 

    How to use the Call Reason urgent label on Android

    Once you have Phone by Google set as your default calling app, using Call Reason is very simple. Both you and the person you are calling must use the Phone by Google app for the urgent label to appear.

    How to mark your call as urgent

    When you are ready to call someone:

    Open the Phone by Google app

    Go to your Contacts or Recents

    Tap the contact you want to call

    Before you press the call button, look for the Call Reason option on the screen

    Tap Urgent to attach the urgent label

    Then tap the call button to place your call

    The urgent badge is sent with your outgoing call so the person knows your call needs attention.

    What the other person sees

    When your call reaches them, they will see:

    Your name and number

    A bold “Urgent” label under your name on the incoming call screen

    If they miss the call:

    The urgent label appears in their call history

    They can tap your missed call to return it quickly

    No extra steps are needed on their end. They do not need to press anything special to receive an urgent call. Their only requirement is that they also use Phone by Google as their default calling app.

    What both people must have for it to work

    For the urgent label to show:

    Both people must use Phone by Google

    Both devices must support the Call Reason beta rollout

    The person must be saved in your Contacts

    If any of those pieces are missing, the option will not appear.

    5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE

    A Google phone call with the notify and urgent buttons highlighted

    When someone receives an urgent call, the label appears on their screen and in their call history if they miss it, making it easier to call back fast. (Google)

    Tips for getting the most out of Call Reason

    Use the urgent label only for situations that need fast attention

    Keep your contacts list updated so the feature works as intended

    Encourage close friends or family to use the Phone by Google app for full compatibility

    Check your call history for urgent notes if you miss an important call  

     Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Call Reason feels like one of those small upgrades that can make everyday calling a little smoother. It gives your friends a quick sense of why you’re reaching out and helps cut through the guesswork when timing matters. As the feature expands, it could turn into an even more helpful way to share context before someone taps Accept.

    What situation in your life would make you use the urgent label first? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Find a lost phone that is off or dead

    NEWYou can now listen to Fox News articles!

    Losing your phone can leave you in panic mode, especially when the battery dies. The good news is that both Apple and Android offer built-in tools that help you track a missing device even when it is powered off or offline.

    With an iPhone, you can use the Find My network on another Apple device or sign in from a browser. With Android, you can use Google’s Find My Device system to see the last known location and secure your phone fast.

    This guide walks you through clear steps for iPhone and Android so you know exactly what to do next.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

    You can still find your lost Apple device even when it’s dead. (Apple)

    Does Find My work when your iPhone is dead?

    Yes, it does. Your iPhone uses low power mode in the background so it stays findable for a period after powering off. If other Apple devices are nearby, your phone can still send out a Bluetooth signal that helps pinpoint the last known location.

    You can check this location from any Apple device or a browser.

    Use Find My from another Apple device

    If you have an iPad, Mac, or another iPhone, you can look up your missing device in seconds. Family Sharing works too, so you can track a shared device even if it is offline. Here is how to do it:

    • Open the Find My app
    • Tap the Devices tab
    • Swipe up to see your full list of devices
    • Select your missing iPhone
    • View the location on the map
    • Tap Directions to navigate to it
    • Tap Play Sound if the phone is on and nearby
    Steps to enable Find My on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    • Turn on Lost Mode by tapping continue at the bottom of the screen to lock it and show a message with a callback number.
    • Enter a phone number that can be used when someone finds your iPhone and wants to contact you. Then, tap Next. 
    • If the screen icon is black, the phone is dead. You will still see the last known location, so you know where to start looking.
    Steps to enable Find my on iPhone

    Steps to use Find My from another Apple device. (Kurt “CyberGuy” Knutsson)

    Find your iPhone from a web browser

    If you only have access to a computer or an Android phone, use iCloud.com to locate your device. The browser version gives fewer tools, but it still shows your iPhone on the map. Follow these steps:

    • Go to iCloud.com/find
    • Sign in with your Apple ID
    • Approve two-factor if needed
    A Find Devices sign in screen

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Select All Devices
    • Choose your missing iPhone
    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    • Use Play Sound if the device is on
    • Turn on Lost Mode to lock the phone

    Use this method when you have no Apple hardware nearby.

    A map with location of iPhone

    Steps to find your iPhone from a web browser. (Kurt “CyberGuy” Knutsson)

    Use the Help a Friend feature in Find My

    If you need to borrow another person’s iPhone, avoid signing in to their device directly. That triggers security checks you cannot complete without your missing phone. Instead, use Help a Friend inside the Find My app:

    • Open Find My on your friend’s iPhone
    • Scroll to Help a Friend
    • Sign in with your Apple ID
    • View the last known location of your iPhone

    This tool bypasses two-factor prompts so you can get your location without any issues.

    Help a Friend feature on iPhone

    Steps to use the Help a Friend feature in Find My. (Kurt “CyberGuy” Knutsson)

    Can you find an iPhone without Find My

    If ‘Find My’ was never enabled, you must retrace your steps. You can check ‘Your Timeline’ in Google Maps if you use that app and have location history on.

    Without ‘Find My,’ there is no way to remotely lock, track, or erase the device.

    Once you recover your phone, turn on ‘Find My’ and enable ‘Send Last Location’ so you are covered next time.

    Best iPhone settings to turn on before your device goes missing

    Before your iPhone ever goes missing, take a minute to set up these key protections.

    1) Turn on Find My iPhone

    This keeps your device trackable whether it is on or off. Go to Settings, then tap your name, then click Find My, then Find My iPhone and enable it. 

    2) Enable Send Last Location

    Go to Settings, then tap your name, then click Find My, then Find My iPhone and scroll down and enable Sent Last Location. 

    Your phone will save its final location before the battery dies.

    3) Turn on Find My network

    Go to Settings, tap your name, click Find My, then tap Find My iPhone and enable Find My network.
    This keeps your iPhone discoverable through nearby Apple devices even when it is off or offline.

    4) Keep two-factor authentication on

    Go to Settings, tap your name, tap Sign-In & Security, select Two-Factor Authentication (2FA), then tap your iPhone and make sure 2FA is turned on.
    This blocks anyone from accessing your Apple ID without approval.

    5) Use a strong passcode

    Go to Settings, then tap Face ID & Passcode, then enter your current passcode.
    Tap Change Passcode and follow the prompts to set a unique passcode that is hard to guess.

    6) Add a recovery contact

    Go to Settings, tap your name, tap Sign-In & Security, then tap Recovery contacts. Then, click Add Recovery Contact. 
    Add a trusted person as your recovery contact so you can verify your identity if you ever lose your iPhone. 

    CAN’T FIND YOUR ANDROID PHONE? HERE’S WHAT TO DO TO TRACK IT DOWN

    How to find an Android phone that is off or dead

    Android users can also track a missing device using Google’s Find My Device system. While you cannot see live location when the phone is powered off, you can view the last known location, lock the phone, or display a message for anyone who finds it. Here is how to track it:

    Find your Android from a browser

    Settings may vary depending on your Android phone’s manufacturer.

    • Go to android.com/find
    • Sign in with your Google account
    • Select your missing device
    • View the last known location on the map
    • Select Secure Device to lock it and display a callback message
    • Select Play Sound if the phone is on and nearby

    Find your Android from another phone

    Settings may vary depending on your Android phone’s manufacturer.

    • Download the Find My Device app on another Android
    • Sign in with your Google account
    • Tap your missing phone to view its last known location

    If the phone is off or dead, the map will show its last saved location. You can still lock the device or leave a message for whoever finds it.

    Best Android settings to turn on before your device goes missing

    Before your Android phone ever goes missing, take a minute to set up these key protections.

    Settings may vary depending on your Android phone’s manufacturer.

    1) Turn on Find My Device

    This lets you track your phone or lock it from any browser.
    Go to Settings, tap Security & privacy, tap Find My Device or Device Finders and turn it on.
    (Names may vary by manufacturer.)

    2) Enable Location Services

    This improves accuracy and helps Google save your phone’s last known location.
    Go to Settings, tap Location and turn on Use Location.

    3) Turn on Google Location History

    This allows Google to show past locations even when your phone is off.
    Go to Settings, tap Location, tap Location Services, then choose Google Location History or Google Location Sharing and turn it on.

    4) Add a recovery phone number or email

    This helps you verify your identity and recover your account fast.
    Go to Settings, tap Google, tap Manage your Google Account, then open the Security tab and add a recovery phone number or email.

    5) Use a strong screen lock

    Choose a secure lock to keep your data safe.
    Go to Settings, tap Security, then Screen lock, and select a PIN, pattern, or password that is hard to guess.

    6) Turn on “Send last location” (If available)

    Some Android models save the phone’s last known location before the battery dies.
    Go to Settings, tap Security & privacy, tap Find My Device and enable Send last location if your device supports it.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    A dead or powered-off phone does not have to stay lost. Apple’s Find My network and Google’s Find My Device system both give you a last known location and fast tools that help you lock or secure your phone. With the right settings in place before anything happens, you can recover your device sooner and protect your personal data.

    What would you do first if your phone went missing today? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.

    Source link

  • Don’t Fall for Sketchy iPhone VPNs—Here Are the Only 3 You Should Use

    iPhone VPNs, Compared

    You might be surprised how similar the three VPNs I chose are when you break down their features, but that’s not an accident. Given how restrictive I was with who made the final cut, there’s a pretty high bar for inclusion. Although there are some minor differences, I designed this list in a way that you can choose one of my picks without reading a single word and still come out the other side with an excellent VPN for iPhone.

    Other iPhone VPNs We Tested

    Surfshark

    Courtesy of Surfshark

    Surfshark: Surfshark was a strong contender for the main list. Even its Starter plan comes with extra features like a masked email generator. Features like ad and tracker blocking, as well as unlimited simultaneous connections, come standard across plans. However, it was a bit slower than my top picks, dropping around 20 percent of speed on average, compared to around 15 percent for the top options.

    Mullvad: Mullvad is a favorite among privacy enthusiasts, and for good reason. It doesn’t fuss with multi-year discounts or referral programs, and you don’t even need to provide an email to sign up for an account. You can even pay the static monthly fee by mailing Mullvad cash. It’s a great service if privacy is your top priority, but it trades speeds and features in the process. VPN services like Nord and Proton have quickly grown into full privacy and security suites, while Mullvad is more focused on making a robust VPN. In the context of an iPhone, the scales tip more toward those security suites, but Mullvad is still a great privacy-focused option to keep in mind.

    ExpressVPN: By the numbers, ExpressVPN should be at the top of the list. It has a ton of servers, a featureset that can go toe-to-toe with Nord, and speeds only a touch below Proton. However, ExpressVPN has found itself in a spiral of increasing controversies over the past four years, and the brand has yet to get back on solid footing. After being purchased by Kape Technologies—the company behind the infamous adware company Crossrider—former US intelligence official Daniel Gericke took over at CTO and continued in that role for two years, even after being fined over $300,000 by the US Department of Justice for hacking activities on behalf of a foreign government. Gericke left in 2023, but that same year, ExpressVPN experienced a large swath of layoffs, and Kape, its parent company, was delisted from the London Stock Exchange. The vast majority of shares went to Unikmind Holdings Limited, a company owned by Israeli billionaire Teddy Sagi, who got his start by creating gambling software Playtech. That’s an extremely condensed version of what ExpressVPN has gone through over the past few years. The company hasn’t done anything nefarious, but the revolving door of executive control tied to controversial names doesn’t inspire confidence.

    Private Internet Access: Private Internet Access, or PIA, is also owned by Kape Technologies, and it followed a similar playbook as ExpressVPN and CyberGhost, which Kape also owns. After the acquisition and community backlash, there’s been very little transparency about what’s going on in the company. A connection to Kape definitely raises questions, but that doesn’t immediately disqualify a service from being included. Unfortunately for PIA, it had much slower speeds than any of the other VPN services I tested, so regardless of ownership, it isn’t a top pick for iPhone VPNs.

    iPhone VPNs to Avoid

    X-VPN: X-VPN is one of many different VPNs that show up high in the search results on iPhone. There’s a desktop app, but X-VPN mainly targets mobile users with its free plan. It was featured in a Tech Transparency Project report about VPNs with ties to the Chinese government, alongside apps like TurboVPN. I haven’t tested TurboVPN, but X-VPN has issues. Even without questionable ties, X-VPN doesn’t have the best speeds, and it lacks basic features like split tunneling, all while charging the same price as top VPNs like NordVPN and Proton VPN.

    Hola: Hola is an infamous name if you’ve been around the VPN space long enough. Around a decade ago, Hola fell under fire. It owns a data collection company known as Bright Data (formerly Luminati), and that network is made up of users who use Hola. This network was used for a public distributed denial-of-service (DDoS) attack. Even a decade on, Hola still logs user data, including your IP address, and it still sells access to its peer-to-peer network, meaning you could become an exit node without knowing.

    EventVPN: EventVPN comes from the same team behind ExpressVPN, but it takes a very different approach to privacy. It’s free, and it’s only available on iPhone and Macs, but most importantly, it’s supported by ads. EventVPN says it’s able to leverage an ad-supported model with Apple’s advertising privacy features, which allows for tailored ads without giving out personally-identifiable information. That’s the story, at least, but as you can read in our iPhone privacy guide, Apple’s privacy-focused advertising model still shares some critical information, including your zip code. Further, the pervasiveness of ads in EventVPN makes it hard to recommend. You have to wait through a 30-second video each time you connect or disconnect from a server, and a banner ad lives at the top of the app at all times. EventVPN has a paid plan to remove ads, but at that point, you might as well pick up ExpressVPN. And, on the free end, there’s ProtonVPN and Windscribe, both of which I’d recommend over EventVPN.

    How We Tested

    To earn the best iPhone VPN title, a service needs to satisfy three criteria. It needs to be secure, fast, and easy to use. That may seem straightforward enough, but there’s a little more that goes into it. For ease of use, I only looked at VPNs that offer a one-tap connection. If you need to configure anything, that’s a disqualification. That still encompasses a lot of the most popular VPNs on iPhone, so I narrowed the field further by focusing on apps that balance usability with power. You should have all the relevant features in the iOS app that are available in the desktop app, and organized in a way that they don’t disrupt that one-tap experience.

    Speed testing is where I focused a lot of my testing time. Speed testing is highly variable, and trying to come out with one singular number to encompass the speed of thousands of servers is a fool’s errand. The numbers I gathered for this guide are the result of 20 tests I ran for each VPN, then averaged.

    I tested five locations for each VPN, measuring my unprotected speed immediately before testing and running three passes before averaging. Each location was tested at a different time of day, and I removed any outliers before averaging. For this guide, that meant if there was greater than a 10 percent deviation between two of the three passes. After averaging the speed drop for each location, I gathered all of those numbers together and averaged them for a final speed drop.

    Finally, security. The traditional wisdom with a VPN is that you, at some point, have to put some faith in the company that its privacy policy is accurate and it isn’t lying about its logging practices. That didn’t do it for me. Again, I set a high bar for inclusion.

    Every VPN I’ve included here has not only been independently audited, but also been forced to uphold its no-logs policy in legal proceedings. You indeed need to put some trust that the VPN provider you’re using is telling the truth, but the options I included all have rock-solid track records when it comes to transparency.


    Power up with unlimited access to WIRED. Get best-in-class reporting and exclusive subscriber content that’s too important to ignore. Subscribe Today.

    Jacob Roach

    Source link

  • How Android malware lets thieves access your ATM cash

    NEWYou can now listen to Fox News articles!

    Smartphone banking has made life easier, but it has also opened new opportunities for cybercriminals.

    Over the past few years, we have seen Android malware steal passwords, intercept OTPs and even take remote control of phones to drain accounts. Some scams focus on fake banking apps, while others rely on phishing messages that trick you into entering sensitive details.

    Security researchers have now discovered a new threat that goes a step further. Instead of simply stealing login information, this malware gives thieves the ability to walk up to an ATM and withdraw your money in real time.

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Android malware like NGate tricks users into downloading fake banking apps that steal sensitive data. (Kurt “CyberGuy” Knutsson)

    How the NGate malware works

    The Polish Computer Emergency Response Team (CERT Polska) discovered a new Android malware called NGate that uses NFC activity to access a victim’s bank account. This malware monitors contactless payment actions on the victim’s phone and forwards all transaction data, including the PIN, directly to a server controlled by attackers. It does not just copy card details. Instead, it waits until the victim taps to pay or performs a verification step, then captures the fresh, one-time authentication codes that modern Visa and Mastercard chips generate.

    To pull this off, attackers need to infect the phone first. They typically send phishing messages claiming there is a security problem with the victim’s bank account. These messages often push people to download a fake banking app from a non-official source. Once the victim installs it, the app walks them through fake verification prompts and requests permissions that allow it to read NFC activity. As soon as the victim taps their phone or enters their PIN, the malware captures everything the ATM needs to validate a withdrawal.

    MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON

    A Google phone

    Once installed, the malware captures NFC tap-to-pay codes and PINs the moment the victim uses their phone. (Kurt “CyberGuy” Knutsson)

    What attackers do with the stolen data at the ATM

    The attackers rely on speed. The one-time codes generated during an NFC transaction are valid for only a short period. As soon as the infected phone captures the data, the information is uploaded to the attacker’s server. An accomplice waits near an ATM, holding a device capable of emulating a contactless card. This could be another phone, a smartwatch or custom NFC hardware.

    When the data arrives, the accomplice presents the card-emulating device at the ATM. Since the information contains fresh, valid authentication codes and the correct PIN, the machine treats it like a real card. The ATM authorizes the withdrawal because everything appears to match a legitimate transaction. All of this happens without the criminal ever touching the victim’s physical card. Everything depends on timing, planning and getting the victim to unknowingly complete the transaction on their own phone.

    A man holds a Google phone, powered by Android

    Criminals use the stolen, time-limited codes at an ATM to make real withdrawals without the victim’s card. (Kurt “CyberGuy” Knutsson)

    7 steps you can take to stay safe from Android NGate malware

    As attacks like NGate become more sophisticated, staying safe comes down to a mix of good digital habits and a few simple tools that protect your phone and your financial data.

    1) Download apps only from the Play Store

    Most malicious banking apps spread through direct links sent in texts or emails. These links lead to APK files hosted on random servers. When you install apps only from the Play Store, you get Google’s built-in security checks. Play Protect regularly scans apps for malware and removes harmful ones from your device. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Even if attackers send convincing messages, avoid installing anything from outside the official store. If your bank wants you to update an app, you will always find it on the Play Store.

    2) Use strong antivirus software

    One careless tap on a fake bank alert can hand criminals everything they need. Strong antivirus software can stop most threats before they cause damage. It scans new downloads, blocks unsafe links and alerts you when an app behaves in ways that could expose your financial data. Many threats like NGate rely on fake banking apps, so having real-time scanning turned on gives you an early warning if something suspicious tries to install itself.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    ATM ‘JACKPOTTING’ CRIME WAVE GROWS AFTER THIEVES WALK AWAY WITH HUNDREDS OF THOUSANDS IN CASH

    3) Keep your device and apps updated

    Security patches fix vulnerabilities that attackers use to hijack permission settings or read sensitive data. Updates also improve how Android monitors NFC and payment activity. Turn on automatic updates for both the operating system and apps, especially banking and payment apps. A fully updated device closes many of the holes that malware tries to exploit.

    4) Use a password manager to avoid phishing traps

    Phishing attacks often direct you to fake websites or fake app login pages that look identical to the real thing. A password manager saves your credentials and fills them in only when the website or app is authentic. If it refuses to autofill, it is a clear sign that you are on a fake page. Consider using a password manager to generate and store complex passwords.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    5) Turn on two-factor authentication for all financial services

    Two-factor authentication gives you a second layer of protection, even if your password is compromised. App-based authenticators are more secure than SMS codes because they cannot be intercepted as easily. For banking apps, enabling 2FA adds friction for attackers trying to perform unauthorized actions. Combined with strong passwords from a password manager, it significantly reduces the chance of account takeover.

    6) Ignore suspicious texts, emails and calls

    Attackers rely on urgency to trick you. They often claim that your card is blocked, your account is frozen or a payment needs verification. These messages push you to act fast and install a fake app. Always pause and check your bank’s official channels. Contact the bank through verified customer care numbers or the official app. Never click links or open attachments in unsolicited messages, even if they look legitimate.

    7) Review app permissions

    Most people install apps and forget about them. Over time, unused apps pile up with unnecessary permissions that increase risk. Open your phone’s permission settings and check what each app can access. If a simple tool asks for access to NFC, messages or accessibility features, uninstall it. Attackers exploit these excessive permissions to monitor your activity or capture data without your knowledge.

    Kurt’s key takeaway

    Cybercriminals are now combining social engineering with the secure hardware features inside modern payment systems. The malware does not break NFC security. Instead, it tricks you into performing a real transaction and steals the one-time codes at that moment. This makes the attack difficult to spot and even harder to reverse once the withdrawal goes through. The best defense is simple awareness. If a bank ever urges you to download an app from outside the Play Store, treat it as an immediate warning sign. Keeping your phone clean is now as important as keeping your physical card safe.

    Have you ever downloaded an app from outside the Play Store? Let us know by writing to us at Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Sign up for my FREE CyberGuy Report 
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.  

    Source link

  • Fake ChatGPT apps are hijacking your phone without you knowing

    NEWYou can now listen to Fox News articles!

    App stores are supposed to be reliable and free of malware or fake apps, but that’s far from the truth. For every legitimate application that solves a real problem, there are dozens of knockoffs waiting to exploit brand recognition and user trust. We’ve seen it happen with games, productivity tools and entertainment apps. Now, artificial intelligence has become the latest battleground for digital impostors.

    The AI boom has created an unprecedented gold rush in mobile app development, and opportunistic actors are cashing in. AI-related mobile apps collectively account for billions of downloads, and that massive user base has attracted a new wave of clones. They pose as popular apps like ChatGPT and DALL·E, but in reality, they conceal sophisticated spyware capable of stealing data and monitoring users.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    OPENAI ACCUSES NY TIMES OF WANTING TO INVADE MILLIONS OF USERS’ PRIVACY IN PAPER’S LAWSUIT AGAINST TECH GIANT

    Fake AI apps pose as trusted tools like ChatGPT and DALL·E while secretly stealing user data. (Kurt “CyberGuy” Knutsson)

    What you need to know about the fake AI apps

    The fake apps flooding app stores exist on a spectrum of harm, and understanding that range is crucial before you download any AI tools. Take the “DALL·E 3 AI Image Generator” found on Aptoide. It presents itself as an OpenAI product, complete with branding that mimics the real thing. When you open it, you see a loading screen that looks like an AI model generating an image. But nothing is actually being generated.

    Network analysis by Appknox showed the app connects only to advertising and analytics services. There’s no AI functionality, just an illusion designed to collect your data for monetization.

    Then there are apps like WhatsApp Plus, which are far more dangerous. Disguised as an upgraded version of Meta’s messenger, this app hides a complete malware framework capable of surveillance, credential theft and persistent background execution. It’s signed with a fake certificate instead of WhatsApp’s legitimate key and uses a tool often used by malware authors to encrypt malicious code.

    Once installed, it silently requests extensive permissions, including access to your contacts, SMS, call logs, device accounts and messages. These permissions allow it to intercept one-time passwords, scrape your address book and impersonate you in chats. Hidden libraries keep the code running even after you close the app. Network logs show it uses domain fronting to disguise its traffic behind Amazon Web Services and Google Cloud endpoints.

    Not every clone is malicious. Some apps identify themselves as unofficial interfaces and connect directly to real APIs. The problem is that you often can’t tell the difference between a harmless wrapper and a malicious impersonator until it’s too late.

    ChatGPT app

    Clones hide spyware that can access messages, passwords and contacts. (Kurt “CyberGuy” Knutsson)

    Users and businesses are equally at risk

    The impact of fake AI apps goes far beyond frustrated users. For enterprises, these clones pose a direct threat to brand reputation, compliance and data security.

    When a malicious app steals credentials while using your brand’s identity, customers don’t just lose data but also lose trust. Research shows customers stop buying from a brand after a major breach. The average cost of a data breach now stands at 4.45 million dollars, according to IBM’s 2025 report. In regulated sectors like finance and healthcare, such breaches can lead to violations of GDPR, HIPAA and PCI-DSS, with fines reaching up to 4% of global turnover.

    A folder labeled "AI" is seen on a smartphone.

    These impostors harm both users and brands, leading to costly data breaches and lost trust. (Kurt “CyberGuy” Knutsson)

    8 steps to protect yourself from fake AI apps

    While the threat landscape continues to evolve, there are practical measures you can take to protect yourself from malicious clones and impersonators.

    1) Install reputable antivirus software

    A quality mobile security solution can detect and block malicious apps before they cause damage. Modern antivirus programs scan apps for suspicious behavior, unauthorized permissions and known malware signatures. This first line of defense is especially important as fake apps become more sophisticated in hiding their true intentions.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    2) Use a password manager

    Apps like WhatsApp Plus specifically target credentials and can intercept passwords typed directly into fake interfaces. A password manager autofills credentials only on legitimate sites and apps, making it significantly harder for impostors to capture your login information through phishing or fake app interfaces.

    Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

    Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

    3) Consider identity theft protection services

    Given that malicious clones can steal personal information, intercept SMS verification codes and even impersonate users in chats, identity theft protection provides an additional safety net. These services monitor for unauthorized use of your personal information and can alert you if your identity is being misused across various platforms and services.

    Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

    PROTECTING KIDS FROM AI CHATBOTS: WHAT THE GUARD ACT MEANS

    4) Enable two-factor authentication everywhere

    While some sophisticated malware can intercept SMS codes, 2FA still adds a critical layer of security. Use authenticator apps rather than SMS when possible, as they’re harder to compromise. Even if a fake app captures your password, 2FA makes it significantly more difficult for attackers to access your accounts.

    5) Keep your device and apps updated

    Security patches often address vulnerabilities that malicious apps exploit. Regular updates to your operating system and legitimate apps ensure you have the latest protections against known threats. Enable automatic updates when possible to stay protected without having to remember manual checks.

    6) Download only from official app stores

    Stick to the Apple App Store and Google Play Store rather than third-party marketplaces. While fake apps can still appear on official platforms, these stores have security review processes and are more responsive to removing malicious applications once they’re identified. Third-party app stores often have minimal or no security vetting.

    7) Verify the developer before downloading

    Check the developer name carefully. Official ChatGPT apps come from OpenAI, not random developers with similar names. Look at the number of downloads, read recent reviews and be suspicious of apps with few ratings or reviews that seem generic. Legitimate AI tools from major companies will have verified developer badges and millions of downloads.

    8) Use a data removal service

    Even if you avoid downloading fake apps, your personal information may already be circulating on data broker sites that scammers rely on. These brokers collect and sell details like your name, phone number, home address and app usage data, information that cybercriminals can use to craft convincing phishing messages or impersonate you.

    A trusted data removal service scans hundreds of broker databases and automatically submits removal requests on your behalf. Regularly removing your data helps reduce your digital footprint, making it harder for malicious actors and fake app networks to target you.

    While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

    Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

    Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaway

    The AI boom has driven massive innovation, but it has also opened new attack surfaces built on brand trust. As adoption grows across mobile platforms, enterprises must secure not only their own apps but also track how their brand appears across hundreds of app stores worldwide. In a market where billions of AI app downloads have happened, the clones aren’t coming. They’re already here, hiding behind familiar logos and polished interfaces.

    Have you ever downloaded a fake AI app without realizing it? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved. 

    Source link

  • Manage Android apps with the new ‘Uninstall’ button

    NEWYou can now listen to Fox News articles!

    If you use more than one Android device with the same Google account, you know how messy things can get.

    Tracking which apps are installed on which phone or tablet can quickly become confusing. The Google Play Store already showed how many of your devices had a particular app, but uninstalling apps across multiple devices required digging through several menus.

    That’s changing now, thanks to Google’s latest Play Store update.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

    A new Play Store update makes it easier to manage apps across all your Android devices. (Kurt “CyberGuy” Knutsson)

    The new uninstall button rolls out

    Google is rolling out version 48.8 of the Play Store, and it introduces a new ‘Uninstall’ button right on each app’s listing. You can now remove an app from any of your devices directly from your main phone. This eliminates the need to pick up each device and remove the app one by one. According to Android Authority and other reliable tech outlets, this feature appears beside each Android device listed under your account, making it faster to keep your devices organized and clutter-free.

    The update replaces the older process that required navigating through ‘Profile,’ then ‘Manage Apps and Devices,’ then applying a device filter before uninstalling. That long-winded method still works, but the new shortcut saves time and effort. The feature is rolling out gradually, so you might not see it right away, but it should appear soon as part of the stable update.

    Why this update matters

    For anyone juggling a phone, tablet or even a work device, this new feature makes a real difference. Over time, unused apps pile up, taking up storage space and slowing down performance. Being able to remove them remotely helps keep every device clean and efficient without switching between screens.

    The change also improves digital hygiene. Many people forget about apps on old phones that still have access to personal data or permissions. Now you can easily remove those apps before they become a privacy or security risk. The update also makes it simpler for parents managing family devices to stay in control of what’s installed on their kids’ phones.

    How to use the new uninstall button on Android 

    Settings may vary depending on your Android phone’s manufacturer. 

    • Open the Play Store app on your device.
    • Navigate to the listing of an app that you know is installed on another device signed in to your account.
    • Under the “Installed on X devices” section, you may see a new ‘Uninstall’ button next to each listed device.
    • Tap Uninstall next to the one you want to remove from your Android.

    Then click This Device.

    GOOGLE CHROME AUTOFILL NOW HANDLES IDS

    An Android screen tutorial

    Steps to use the new uninstall button on Android. (Kurt “CyberGuy” Knutsson)

    How to uninstall Android apps when the new Play Store button isn’t showing

    Wait for the update to roll out if key features aren’t showing yet. If the button isn’t present, you can still uninstall an app with these steps:

    Settings may vary depending on your Android phone’s manufacturer.

    • Click Profile.
    • Tap Manage apps & devices.
    • Click Manage.
    • Use the device filter to select the target device.
    • Press the app you want to uninstall.

    Click uninstall.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    A tutorial on how to uninstall apps from Android across multiple devices

    The new feature saves time and improves organization across a user’s Android devices. (Kurt “CyberGuy” Knutsson)

    What this means to you

    This feature saves time, improves organization and helps you keep your Android devices running smoothly. By uninstalling unused apps remotely, you free up valuable storage and reduce unnecessary background activity that can drain battery life. You also make your devices more secure by removing older apps that might not be receiving updates anymore. It’s a thoughtful update that shows how Google is paying attention to everyday usability rather than adding flashy new tools. Even if it seems like a small change, the impact adds up for people who live in a multi-device world.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    The new ‘Uninstall’ button in Play Store version 48.8 is a quiet but powerful improvement for Android users. It makes it easier to manage your apps and maintain a cleaner digital environment across all your devices. Once this update reaches your phone, it’s worth exploring which apps you no longer need and removing them in just a few seconds.

    Do you plan to tidy up your devices using the new Google Play Store feature, or do you prefer to manage apps directly from each phone? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Gizmodo’s Best Tech Gifts of 2025 list

    The holidays are here, and that only means one thing: gifting season!

    Skip the gift cards, ugly sweaters you found at Goodwill, or slapped-together macaroni photo frame, and get your friends and family some tech that they’ll actually appreciate. We’ve looked far and wide for gifts we hope will truly delight. From budgets under $50 all the way up to over $1,000 (if you’ve got the money to splurge), Gizmodo has you covered.

    At the very least, we hope our selection of gifts will inspire you to be thoughtful about gifting. Remember: you don’t need to spend a lot of money on a gadget. You just need to find the right gift for the right person!


    Gifts Under $50

    Oda SD Card Holder for Wallet

    Whenever your camera’s memory card fills up or becomes corrupted, you’ll always have a few spare ones tucked in your wallet with this slim sleeve from Oda.

    Anker Soundsync

    Anker SoundSync

    As great as wired audio is, sometimes you can’t beat the convenience of Bluetooth. Anker’s dongle, with a 3.5mm jack, can connect to old monitors and imbue them with the power of wireless audio.

    Maclock

    Maclock

    When it comes to desk clocks, the Maclock has a lot of charm. Shaped like the original Macintosh, the alarm clock can display the time, date, day, and temperature, and also comes with a tiny floppy disk that boots it up.

    Satechi Findall Card

    Satechi FindAll Card

    Losing your wallet sucks. But if Satechi’s FindAll Card is inside it, your iPhone’s Find My app can aid the search effort.

    Nekojita Fufu

    Nékojita FuFu

    Whether you’re drinking a steaming hot chocolate or a hot toddy, this little bear with a built-in fan will cool your cup with little blasts from its windpipe. The Nékojita Fufu sits on any mug or bowl to chill your beverage or soup, and it looks cute doing it.


    Gifts Under $100

    Jbl Grip

    JBL Grip

    Portability might not be everyone’s top priority in a Bluetooth speaker, but if it’s yours, JBL’s Grip is your buy. It may be small, but it’s mighty in volume.

    Retroid Pocket Classic

    Retroid Pocket Classic

    The Retroid Pocket Classic offers a return to retro gaming with a better AMOLED screen than the classic Game Boy offers. You can go with a six-button layout for classic Sega games or the traditional four-button model.

    Genki Shadowcast 2 Pro

    Genki Shadowcast 2 Pro

    For any loved ones with dreams of becoming streamers, the light and portable Genki Shadowcast 2 Pro is a great place to start. The 4K capture card can record or stream your activities on any console (including the Switch 2) or PC.

    Oneplus Buds 4

    OnePlus Buds 4

    There are lots of great wireless earbuds in this price range, but the OnePlus Buds 4 nail the essentials, sporting a healthy dose of bass, solid active noise cancellation, and a great personalized audio feature that EQs the device to your hearing.

    Lego Game Boy

    Lego Game Boy

    This nearly 1:1 replica of the 1989 Game Boy is guaranteed to make any weekend more fun. Lego went to great lengths to make the buttons pressable, include swappable Game Paks, and offer interchangeable lenticular game screens.


    Gifts Under $300

    Casio G Shock Nano Dw 5600

    Casio G-Shock Nano DW-5600

    Smart rings may be all the rage, but may we introduce you to a watch ring? This G-Shock device, resembling Casio’s classic DW-5600, is sure to catch people’s eyes.

    Govee Rgbicww Floor Lamp Pro

    Govee RGBICWW Floor Lamp Pro

    Govee is known for delivering incredible value when it comes to smart lights, and this floor lamp is no exception. The Floor Lamp Pro is slim and sleek, with 300 degrees of rotation to light large swaths of your living room.

    Nomad Stratos Band

    Nomad Stratos Band

    Metal smartwatch bands are stylish but not the most comfortable, especially while working out. The titanium Stratos band pairs perfectly with the Apple Watch Ultra and provides flexibility during exercise.

    Teenage Engineering Ep 133 K.o. Ii

    Teenage Engineering EP-133 K.O. II

    Nothing will delight the hipster in your life more than a gadget from Teenage Engineering. This multipurpose sampler and sequencer does it all and is perfect for musicians in your life (especially electronic ones) with a soft spot for hardware.

    Razer Iskur V2 X

    Razer Iskur V2 X

    When it comes to ergonomics, there are few better-value gaming chairs than Razer’s Iskur V2 X. You don’t have to be a gamer to enjoy Iskur’s smooth-rolling action and back support.


    Gifts Under $500

    Ray Ban Meta Gen 2

    Ray-Ban Meta Gen 2

    The Ray-Ban Meta Gen 2 may lack a display, but they improve on the previous screenless generation in almost every way, bringing doubled battery life and the ability to record 3K video.

    Gopro Max 2

    GoPro Max2

    If you can’t be bothered to rig up several GoPros for multiple angles, the Max2 is the one-stop-shop 360 camera you need. Shoot in 8K and recompose shots from any POV after capture.

    Lomography Mc A

    Lomography MC-A

    Shooting film isn’t a cheap hobby, but if you want to get into 35mm, the Lomo MC-A is an easy way to start. The camera has a 32mm lens, apertures from f/2.8 up to f/16, and a built-in flash.

    Nothing Phone 3

    Nothing Phone 3

    Some people think it’s ugly. Others see the Nothing Phone 3 as challenging the status quo of boring mobile designs. Gimmick or not, the round Glyph Matrix screen on the back is a fun feature that competitors don’t have.

    Roli Keyboard

    Roli Piano

    Learning to play music is hard, but Roli’s light-up keyboard uses color coding to make the process just a little bit easier. Even if you’re not a beginner, the RGB still looks pretty rad.


    Gifts Over $500

    Macbook Air (13 Inch, M4)

    MacBook Air (13-Inch, M4)

    Apple’s entry-level MacBook is easily one of its best deals for those who want tons of performance in a thin and light clamshell design. The MacBook Air is fast enough for regular browsing as well as more intense activities like photo and video editing.

    Lego Death Star

    Lego Death Star

    The Lego Game Boy not enough of a challenge? Maybe this massive set with 9,023 pieces will give you enough blisters to appreciate the process of connecting plastic bricks.

    Framework 13

    Framework Laptop 13

    A Framework laptop is a gift that keeps on giving, so long as the recipient is willing to open it up and learn what makes it tick. The Framework Laptop 13 can come as both a prebuilt system and a DIY kit, so anybody who’s good with their hands can enjoy putting this laptop together.

    Samsung Galaxy Z Fold 7

    Samsung Galaxy Z Fold 7

    Book-style foldables have been thick and heavy—until now. Samsung’s Galaxy Z Fold 7 is as thin and light as a regular flagship and brings a freshly slim vibe to its maturing category.

    Sony Bravia 9

    Sony Bravia 9

    Sony’s Bravia 9 4K TV is still pushing the boundaries of what’s possible with an ultra-high-end screen. The company’s flagship mini LED display offers brilliant picture quality and easy access to your favorite apps through Google TV.

    Gizmodo Staff

    Source link

  • Adaptive Power in iOS 26 boosts iPhone battery life

    NEWYou can now listen to Fox News articles!

    Battery life matters more than ever as your iPhone takes on heavier workloads from streaming and gaming to AI-driven tasks. Every extra minute of charge now makes a difference in how smoothly your day runs.

    With iOS 26, Apple introduced Adaptive Power, an intelligent feature that quietly learns how you use your phone and adjusts performance to stretch battery life when you need it most. It is designed to keep your iPhone running stronger for longer without you having to lift a finger.

    What Adaptive Power does

    Adaptive Power helps your iPhone battery last longer when your daily use increases. It works automatically in the background and learns your recent activity to predict when extra power will be needed. When active, it can make small adjustments, such as lowering screen brightness, limiting background activity or turning on Low Power Mode when your battery reaches 20%.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    APPLE, MICROSOFT HIT $4T MILESTONE

    It uses on-device intelligence to understand your habits, then fine-tunes performance without requiring any input from you. Apple notes that Adaptive Power pauses its adjustments during tasks that demand maximum performance, like using the camera or gaming with Game Mode turned on.

    Adaptive Power in iOS 26 learns your daily habits to extend your iPhone’s battery life automatically. (Apple)

    How Adaptive Power affects real-world use

    Think of Adaptive Power as a smart battery assistant that adjusts only when needed. It balances performance and power consumption throughout the day, helping your phone last longer without noticeable slowdowns. It trims energy use in high-demand moments, like recording videos, editing photos or multitasking, without disrupting what you’re doing. When it activates, you might see a small notification letting you know it’s working, but otherwise, it operates quietly in the background.

    Settings in the iPhone

    The Adaptive Power feature uses on-device intelligence to adjust brightness, limit background tasks and keep performance balanced throughout the day. (Apple)

    Make sure you have iOS 26 installed

    To use Adaptive Power, your iPhone must be running iOS 26. If you’re unsure, here’s how to check and update:

    • Open Settings on your iPhone.
    • Tap General.
    • Tap Software Update.
    • If you see iOS 26 available, tap Download and Install.
    • Keep your phone plugged in and connected to Wi-Fi during the update.

    Once the update finishes, restart your phone. The feature activates automatically on supported models.

    Which iPhones support Adaptive Power

    Only iPhones that can run Apple Intelligence will see this feature. Here’s the list:

    • iPhone 17, 17 Pro and 17 Pro Max
    • iPhone Air
    • iPhone 16, 16 Plus, 16 Pro and 16 Pro Max
    • iPhone 16e
    • iPhone 15 Pro and 15 Pro Max

    Adaptive Power is on by default for iPhone 17 models and iPhone Air. It’s off by default for iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 16e, iPhone 15 Pro and iPhone 15 Pro Max.

    While some iPad and Mac models also run Apple Intelligence, Adaptive Power is currently exclusive to iPhones.

    APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

    How to turn Adaptive Power on

    If you’ve got a newer model like the iPhone 17 or Air, Adaptive Power is already on. For others, it’s just a few taps away:

    • Open Settings on your iPhone
    • Tap Battery
    • Select Power Mode
    • Toggle Adaptive Power to turn it on
    • To be notified when it activates during the day, turn on Adaptive Power Notifications. Even if you turn off alerts, the feature will continue to extend battery life automatically.
    A guide shows how to enable Adaptive Power in iOS 26 on iPhone.

    Steps to enable Adaptive Power in iOS 26 on iPhone. (Kurt “CyberGuy” Knutsson)

    What this means for your charging habits

    You may not see dramatic gains every day, but the effect adds up. Adaptive Power could extend the lifespan of your iPhone just by updating to iOS 26. Even though you might still need to charge overnight, the feature can buy you extra hours when you’re away from an outlet. Just remember: battery life often dips briefly after major updates while your system re-indexes data, but it levels out in a few days.

    Pro tip: Use strong antivirus software

    Use trusted antivirus software as an extra layer of protection for your iPhone. While Apple’s built-in defenses are strong, security threats evolve fast. Installing strong antivirus software adds real-time protection against phishing, unsafe links and rogue apps. Keep it updated and run regular scans to catch potential risks early. This extra step helps your device stay clean, fast and fully protected between iOS updates.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

    Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Kurt’s key takeaways

    Adaptive Power represents Apple’s move toward smarter, self-managing devices that adapt to you. By learning your habits and adjusting power use dynamically, it helps your battery last longer without sacrificing performance. It’s one of those invisible upgrades that can quietly make your phone feel newer for longer.

    Would you trust your iPhone to manage power automatically, or do you still prefer to control it yourself? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com.  All rights reserved.

    Source link

  • Never forget to reply to an email again with hidden phone trick that actually works

    NEWYou can now listen to Fox News articles!

    If you’ve ever told yourself you’d reply to an email later and then forgot, there’s a simple fix built right into your phone. Android and iPhone users both have ways to set reminders that bring messages back to your attention at the perfect time. 

    Whether you use Apple’s Mail app or Gmail on Android, these features help you stay organized, reduce stress and never miss an important reply again.

    Why the message reminder feature matters

    Many people leave emails unread as a reminder to reply later, but that method often fails. The built-in Mail reminder gives you a clear alert at a time you choose. It helps you follow through on tasks, maintain better communication and avoid missed opportunities.

    WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

    Reminders can be set in the iPhone Mail app to ensure you don’t miss an email. (Reuters/Thomas Peter/File)

    To make sure you can use this feature, update your iPhone to the latest iOS version. Here’s how:

    • Open Settings.
    • Tap General.
    • Select Software Update.
    • If an update is available, tap Download and Install.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    If you’re on Android, you’ll also want to make sure your Gmail app and system software are up-to-date so the Snooze feature runs smoothly. Here’s how:

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Google Play Store.
    • Tap your profile icon in the upper right corner.
    • Select Manage apps and device.
    • Tap Update all or locate Gmail and tap Update.
    • To check your Android version, open Settings > About phone > Android version.

    5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOW

    Keeping your phone updated ensures you have the newest tools, features and security improvements.

    How to set up a reminder in the Mail app on iPhone 

    • Open the Mail app.
    • Find the email you want to be reminded about and swipe right on it.
    • Tap Remind Me.
    • Choose a preset time or tap Remind Me Later to pick your own.
    • Select the date and time that fits your schedule and tap the check mark in the upper right corner of the screen.

    That’s it. When the time comes, you’ll get a fresh notification as if you just received the email again. It’s a great way to stay organized without using third-party apps.

    Person using iPhone

    Android and iPhone users can set built-in email reminders to manage messages and stay organized through Apple’s Mail and Gmail apps. (Sean Gallup/Getty Images)

    10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

    How to cancel a reminder early in the Mail app on iPhone 

    If you’ve already handled the message and no longer need the alert, you can end it early:

    • Open the Mail app and go to Mailboxes.
    • Tap Remind Me.
    • Swipe left on the email you want to remove.
    • Tap Clear to cancel the reminder.

    This prevents duplicate notifications and keeps your inbox tidy.

    Android users can do this, too

    If you’re on Android, you can set up a similar email reminder using Gmail’s built-in Snooze feature. It works much like Apple’s Mail reminder. Instead of choosing “Remind Me,” Gmail lets you snooze an email so it pops back to the top of your inbox later, right when you want to deal with it.

    5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

    How to snooze an email in Gmail on Android 

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Gmail app on your Android phone.
    • Tap and hold the email you want to be reminded about.
    • Tap the three dots in the upper right corner or the clock icon at the top.
    • Select Snooze.
    • Choose a preset time or tap Pick date & time to set a custom reminder.

    When the time arrives, Gmail automatically moves the message back to the top of your inbox and marks it unread so it stands out.

    BEST WAYS TO TRACK YOUR MEDS ON IPHONE AND ANDROID

    How to cancel a snooze quickly in Gmail on Android 

    If you change your mind before the reminder triggers, you can easily cancel it:

    Settings may vary depending on your Android phone’s manufacturer

    • Open the Gmail app.
    • Tap the Menu icon (three lines) in the top left corner.
    • Select Snoozed.
    • Find the email and swipe it left or right, or open it and tap Unsnooze.

    Your email will return to its original spot in the inbox right away, so you can handle it or leave it as is.

    Woman smiles at her Android

    Built-in reminder features on iPhone and Android help users follow up on emails and prevent missed messages. (Cyberguy.com)

    What this means for you

    If you manage a busy inbox, this feature can be a game-changer. It helps reduce mental clutter since you won’t have to rely on memory or endless email flags. You decide when you want to be reminded, and your phone takes care of the rest.

    Take my quiz: How safe is your online security?

    Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

    Kurt’s key takeaways

    Whether you’re using an iPhone or Android device, built-in email reminders can keep your digital life running smoothly. These features help you manage your inbox with less effort and more control. By setting a time to follow up, you stay productive and avoid letting key emails slip through the cracks. Both platforms make it easy to stay focused and keep your conversations on track.

    CLICK HERE TO DOWNLOAD THE FOX NEWS APP

    Would a reminder like this have saved you from missing an important email recently? Let us know by writing to us at Cyberguy.com.

    Sign up for my FREE CyberGuy Report
    Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

    Copyright 2025 CyberGuy.com. All rights reserved.  

    Source link