Reset what you see on social media
You went down a rabbit hole and now gardening (or hot rod
or political
) posts are all you see online. Algorithms are smart, but they don't know when you're ready to get back to your regularly scheduled programming. It's time to reset your feed and take control of what you see.
Win an iPhone 16 Pro with Apple Intelligence ($999 value).
No purchase necessary.
Enter to win now!
5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER
Start with Facebook
Goodbye, annoying ads. It only takes a minute to kick out the things you no longer want to see.
The fix:
Filter your advertising topics by going to
Settings & Privacy
>
Settings
>
Account Center
>
Ad Preferences
>
Customize ads
.Random
Facebook requests
can end badly.
This one lost a widow $40K.
Now, on to YouTube
Say your family is staying with you
for the holidays
and your niece is watching cartoons on your YouTube account all day long. Now that's all YouTube recommends. Delete your search history to get things back to normal.
The fix:
On the YouTube app, tap
You
to bring up your
History
. Tap the
cog icon > Settings > Manage All History
. At the bottom, you'll see
DELETE
with a blue down arrow. Tap from the dropdown menu to delete videos from
today
, a
custom range
or
all time
. Click
X
to remove items individually, if you prefer.
10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEAR
Going forward,
turn off
your viewing history any time you don't want those vids in your algorithm. You can set your video and search histories to autodelete, too. Now your YouTube is back to how you like it, with my video
podcast
at the very top. You'll love it!
TikTok tracks your habits
TikTok's algorithm is built to keep you on the app. Every time you like, follow or comment on something, it tells the algorithm you're interested in a video, and more videos like it will pop up on your
For You
page. Disliking a video or writing a nasty comment doesn't matter, by the way; you still kept watching.
The fix:
Reset your feed. Open your
Profile
in the bottom right corner then press the
three lines
at the top right >
Settings and Privacy
>
Content Preferences
>
Refresh Your For You Feed
>
Continue.
Fine-tune Instagram
Watch
Instagram Reels
instead? There's no way to reset them, but you can nudge the algorithm in the right direction.
The fix:
Tap the three dots in the upper right corner. From here, you can adjust:
I'M A TECH EXPERT: 10 AI PROMPTS YOU'LL USE ALL THE TIME
Here's the giveaway
that an email from Instagram about your security is fake.
Most apps have this option
On just about every social platform, you can hide or see less of certain things. The more you take this action, the more you steer the algorithm.
The fix:
Next to a post, video or anything else, look for the three-dot or three-line menu that opens more options. On YouTube, for example, tap the
three dots
next to a video and choose
Don't recommend channel
or
Not interested
.Feeling inspired to clean more of your digital traces? Wipe your browser history while you're at it.
Here's how.
Final piece of advice
Your social media feed is carefully curated based on who you follow, who follows you and, most importantly, what you do online. Sure, you can reset your algorithm, but don't be fooled. Every post you linger on, like, comment on or share gets tracked and used to shape what you see next. Even just scrolling tells the platform what grabs your attention. Before your next deep dive, remember: Big Tech is always watching, and your every move fine-tunes what pops up next.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for
navigating tech
.Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. |
Don't fall for that sneaky iCloud storage alert in your inbox
iCloud scams are becoming increasingly sophisticated, targeting unsuspecting users with urgent messages about their accounts. Our team recently received two suspicious iCloud emails. We want to share our experience and provide comprehensive steps on how to identify and protect yourself from these scams.
GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
d scams typically follow a pattern designed to create a sense of urgency and fear. Let's break down the two emails our team received below. Here is the urgent wording that the scammers used, "Payment Failure for iCloud Storage Renewal" and "iCloud Suspended. Fix it before Mon, 13 January 2025." Both emails share common characteristics of phishing attempts, including urgent language, threats of account suspension or data loss, requests to update payment information, links to external websites and vague or incorrect account details. These emails are crafted to look legitimate, often mimicking Apple's branding and tone. However, they contain several red flags that indicate they are scams.
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS
To protect yourself from falling victim to these scams, look out for these telltale signs:If you receive a suspicious email claiming to be from Apple or iCloud, follow these steps:
THAT APPLE ID DISABLED MESSAGE? IT'S A DANGEROUS SCAM
Follow these steps if you think you may have fallen for an iCloud scam.
1) Change your Apple ID password immediately:
Ensure you create a strong, unique password that you haven't used on other accounts.
2) Check for any unauthorized changes to your account settings or payment information:
Go to account.apple.com and review any devices, personal information or security settings that look unfamiliar.
3) Contact Apple Support directly through official channels for assistance:
Forward the suspicious email to reportphishing@apple.com or abuse@icloud.com to help Apple track and block these scams.
4) Monitor your financial accounts for any suspicious activity:
If you provided payment information, cancel and replace your credit card immediately and pay close attention to even small unauthorized charges.
5) Consider placing a fraud alert on your credit reports:
Report the scam to the
Federal Trade Commission
and
Internet Crime Complaint Center
to help combat these fraudulent activities.
6) Use an identity theft protection service:
Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft
.
FBI'S NEW WARNING ABOUT AI-DRIVEN SCAMS THAT ARE AFTER YOUR CASH
Remember, Apple will never ask you to provide personal information, passwords or security codes via email, text message or phone call. If you're ever in doubt about the legitimacy of a communication from Apple, always err on the side of caution and contact Apple directly through their official website or support channels. By staying vigilant and following these guidelines, you can better protect yourself from iCloud scams and keep your personal information secure. Don't let the urgency of these messages cloud your judgment. Take a moment to verify before you act, and you'll be much safer in the long run.Have you ever been targeted by an iCloud or Apple-related scam? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Top translation apps for travelers
Traveling abroad can be an incredible adventure, but the language barrier can make even the most intrepid explorer nervous. The fear of being unable to communicate or understand signs and menus keeps many would-be travelers from ever leaving their home country. But fear not. With the rise of powerful translation apps, you can harness the latest technology right on your smartphone to bridge the language gap wherever your journey takes you.I've tested out the top contenders to bring you my picks for the best translation apps for global travelers. Whether you have an iPhone or an Android, these apps have got you covered with features like live speech translation, text input and even AI-powered sign and menu translation.
GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Google Translate is the best translation app for most people. It supports the most languages, with 133 languages supported. It also features an incredibly user-friendly interface and design, and best of all, it's completely free. There are multiple ways to translate languages with Google Translate, be it by typing text into the translation box or utilizing text-to-speech translation, and you can even take advantage of Google's AI translator, which can translate text from photos that you take.If you are using an iOS device, you can
download Google Translate here
. If you are using an Android-based device, you can download Google Translate from the
Google Play Store here
. Additionally, you can access Google Translate in your web browser from any device by going to
translate.Google.com
.
THE BEST TRAVEL GEAR FOR 2025
If you're an iOS devotee, you may have already encountered
Apple Translate
, which comes pre-installed on all iOS devices. This powerful translation app is one of the best available exclusively to iOS users, capable of translating written text and images of text and facilitating direct speech translation to help you converse with speakers of other languages. Apple Translate currently supports 19 languages, including popular options like Spanish, French, German, Chinese and Arabic, making it a valuable tool for planning international vacations or communicating while traveling.Additionally, the Translate app is available on the
Apple Watch
, allowing you to access your favorite translations on the go. With its seamless integration across Apple devices, you can easily switch between your iPhone and Apple Watch for quick and convenient translations. Whether you're navigating a foreign city or engaging in conversation with locals, Apple Translate is designed to enhance your travel experience.
HOW TO STAY CONNECTED NO MATTER WHERE YOU TRAVEL IN THE WORLD
Microsoft Translator is a totally free-to-use translation app that is popular with business professionals. Featuring over translation for more than 120 languages, this is one of the most robust free-to-use translation apps. You can translate via text, spoken word or images with Microsoft Translate, and where the app really stands out is its ability to be used with multiple devices. You can create translation groups with Microsoft Translator and everyone can talk and translate together. The Microsoft Translator is available for both
iOS
and
Android
devices.
HOW TO SET UP FREE MESSAGING ON YOUR PHONE WHILE TRAVELING INTERNATIONALLY
With over 500,000 reviews on the Apple App Store, iTranslate is one of the most popular translation apps for travelers. It offers translation options for more than 100 languages, and its premium features make it well worth the cost of the app. You can use iTranslate for free, but you will be limited to just text translations. With the paid option, you can access both voice translations and text-via-camera translations. For those willing to pay $6 per month, users can save their translations and dictionaries offline, so you can use them from anywhere, even without service. iTranslate is available for both the
iOS platform
and the
Android
platform.
BEST GEAR FOR THE DARK OUTDOORS
There are a lot of different translation apps out there on the market aimed at travelers, and we highlighted our favorites today. While the majority of the apps in this list are free-to-use, and all the apps in this list have a free-to-use mode, you will need to pay for additional features from apps such as iTranslate.What challenges have you faced while communicating in a foreign language during your travels? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
ESA's space telescope Euclid discovers 'astonishing' Einstein ring
The European Space Agency (ESA) said Monday that its Euclid space telescope has detected a rare bright halo of light around a
nearby galaxy
.Known as an Einstein ring, the halo was captured in photos encircling a galaxy nearly 590 million light-years away, which is considered close by cosmic standards. A single light-year is measured at 5.8 trillion miles.While astronomers have known about the galaxy where the phenomenon was captured for over a century, they were surprised when Euclid revealed the bright glowing ring,
Euclid blasted off
from Cape Canaveral, Florida on July 1, 2023, to begin a six-year mission to explore the dark universe.
GIANT STELLAR NURSERY REVEALED IN NEW IMAGES FROM ESA'S SPACE TELESCOPE
But before the space telescope could begin its survey of the universe, scientists had to ensure everything onboard was working properly. During the early phase of testing, which took place in September 2023, Euclid sent images back to Earth.The ESA said the images were deliberately out of focus, but in one of the images,
Euclid Archive Scientist
Bruno Altieri saw what he believed was a very special phenomenon and decided to look at it a bit closer."I look at the data from Euclid as it comes in," Bruno said in a press release from the ESA. "Even from that first observation, I could see it, but after Euclid made more observations of the area, we could see a perfect Einstein ring. For me, with a lifelong interest in gravitational lensing, that was amazing."For most of the population out there, an Einstein Ring is an "extremely rare phenomenon," the ESA said.
POWERFUL WEBB TELESCOPE SPIES SPECTACULAR STAR BIRTH CLUSTER BEYOND THE MILKY WAY
When a distant galaxy is observed through a telescope, the light from that galaxy may encounter another galaxy on its way to the telescope. When that happens, the foreground galaxy acts like a magnifying glass, and gravity causes the traveling light rays to bend. When light rays bend, scientists call that gravitational lensing, according to the ESA.When the background galaxy, lensing galaxy and telescope are in perfect alignment, the image appears as a ring, also known as an Einstein Ring.The galaxy, called NGC 6506, is about 590 million light-years away, and this is the first time the ring of light around its center has ever been detected."All strong lenses are special, because they're so rare, and they're incredibly useful scientifically," Conor O'Riordan of the Max Planck Institute for Astrophysics said. "This one is particularly special, because it's so close to Earth and the alignment makes it very beautiful."
POWERFUL WEBB TELESCOPE CAPTURES PHOTOS OF ONE OF THE EARLIEST SUPERNOVA EVER SEEN
Einstein rings are based on physicist Albert Einstein's general theory of relativity, which predicts that light will bend around objects in space, so they focus the light like giant lenses, ESA said. The phenomenon allows scientists to sometimes see the light from distant galaxies that would otherwise be hidden."I find it very intriguing that this ring was observed within a well-known galaxy, which was first discovered in 1884," Valeria Pettorino, ESA Euclid project scientist, said. "The galaxy has been known to astronomers for a very long time. And yet this ring was never observed before. This demonstrates how powerful Euclid is, finding new things even in places we thought we knew well. This discovery is very encouraging for the future of the Euclid mission and demonstrates its fantastic capabilities."Over the course of the mission, scientists expect Euclid will reveal more about the role of gravity in the Universe, as well as the nature of dark energy and dark matter.Euclid will map over a third of the sky and observe billions of galaxies as far as 10 billion light-years away, ESA said. In doing so, scientists expect Euclid to find around 100,000 more strong lenses, though finding one so cosmically close to home and so spectacular, ESA added, "is astonishing.""Euclid is going to revolutionize the field, with all this data we've never had before," O'Riordan said.
The Associated Press contributed to this report.
|
Microsoft Teams is becoming a prime target for sophisticated scammers
If there is one corporation that is targeted by scammers more than anyone else, it is Microsoft. From customer support scams to impersonation and phishing attacks, the company's services are constantly under threat. Recently, even Russia-sponsored hackers managed to breach Microsoft and steal sensitive information.While Microsoft services as a whole are prime targets, one that stands out is Teams. The collaboration tool is used by more than 300 million people worldwide, making it a goldmine for attackers. Hackers are using it to spread
phishing
,
vishing
and
quishing campaigns
, relying on social engineering tactics to trick victims into sharing private and sensitive data.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Cybercriminals are increasingly targeting Microsoft Teams users with
sophisticated attack methods
. One such technique involves malicious GIF images that exploit worm-like vulnerabilities, allowing attackers to take over accounts and infiltrate chat sessions when the image is opened. Hackers also insert malware-laden files into chat threads, tricking users into downloading DLL files that enable system takeover. Phishing campaigns leverage compromised accounts or domains to send deceptive invitations, luring victims into downloading harmful files. Some attackers use email bombing and vishing, posing as tech support to overwhelm users with spam emails before tricking them into granting remote access. Compromised email addresses and stolen Microsoft 365 credentials provide another entry point for unauthorized access. Plus, external access settings in Microsoft Teams, which often allow outside users to initiate chats or meetings, can be exploited if not properly restricted. Another common tactic is sending phishing links through Teams chats, often disguised as invoices or payment notifications, leading to ransomware infections.
9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU
Scammers have been running fake job schemes for a while, but their tactics keep evolving. Lately, I reported how
fake job emails are being used to install crypto mining software
that slows down computers. Now, they are using Microsoft Teams chat to trick people. It usually starts with an email about a job followed by a suggestion to do the interview over Teams. The first red flag is that the entire interview happens over chat with no video and no call. After that, you are "hired" and asked to submit your details, often through a Google Doc requesting personal info like your social security or tax number. Some victims are even asked to buy equipment for the job, pay a hiring fee or purchase gift cards, which are classic signs that the whole thing is a scam.
SPOTIFY PLAYLISTS ARE BEING HIJACKED TO PROMOTE PIRATED SOFTWARE AND SCAMS
1) Avoid opening suspicious links and attachments
: Be cautious of unsolicited links or attachments, especially in chat messages or emails. Cybercriminals often use these to deliver malware or phishing links. Never click on links that seem unusual or come from unknown sources.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
2) Check for red flags in job offers
: If you receive a job offer that seems too good to be true or involves an interview conducted entirely via chat with no phone call or video meeting, it's likely a scam. Legitimate companies typically conduct interviews using multiple forms of communication. A job offer that insists on only text-based conversations is a major red flag. Other warning signs include being asked to provide personal information through Google Docs, being asked to pay for equipment, paying fees to secure the job or purchasing gift cards as part of the hiring process.
3) Use strong, unique passwords
: Ensure your Microsoft 365 and other accounts are protected with strong passwords. Consider using
two-factor authentication
to add an extra layer of protection against unauthorized access. Also, you might want to use a
password
manager
to generate and store complex passwords.
4) Be cautious with personal information
: Never share sensitive personal details, like social security numbers or tax information, through unsecured or unsolicited channels, such as Google Docs or messages on Teams. Always verify the legitimacy of such requests.
5) Report suspicious activity
: If you notice any suspicious activity on your Microsoft Teams account or receive unusual job offers, report it immediately. Prompt action can prevent a potential breach or further compromise. Notify your IT department or relevant authorities so they can investigate and take appropriate measures.
6) Verify IT support requests:
Be cautious of unsolicited messages or calls claiming to be from IT support, especially those asking you to install software or grant remote access. Cybercriminals often impersonate IT staff to deploy ransomware or steal sensitive data. Always verify such requests with your actual IT department before taking any action. If in doubt, contact your IT team directly using official channels, not through the message or call you received.
ENERGY-SAVING SCAM USES ELON MUSK'S NAME - HERE'S THE TRUTH
Scammers and hackers are not slowing down, so staying sharp is the only way to stay ahead. If something feels off, like a job that sounds too good to be true, a random Teams message with a sketchy link or an interview that is just a chat, trust your instincts. You should always be careful with external messages and invites that you to receive on Microsoft Teams. Even if it seems like it is from someone you know, it is best to double-check, especially if it involves a file, a link or an invitation to a chat you were not expecting to receive.Should Microsoft be doing more to prevent phishing and impersonation scams on Teams? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Is your camera ticket a fake? Here's how to tell
Suddenly, a red light camera ticket arrives in your mailbox bearing your name but you weren't even driving that day. This frustrating scenario is catching many drivers off guard. So, what's the deal here? Let's break down these tricky fake tickets and how to fight back when you're wrongly in the crosshairs.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
First things first, not all "tickets" are created equal. If you receive something that looks like a ticket but doesn't have the court's full address or phone number - or worse, it says "Do not contact the court" - you might be dealing with what's cheekily called a "snitch ticket." These aren't real tickets at all but rather attempts to get you to rat out whoever was actually driving. The dead giveaway is usually that they will say something like, "Courtesy Notice: This is not a ticket."
BEWARE OF FAKE PARKING TICKETS ON YOUR WINDSHIELD WITH FAKE FINES
Because cities often have to pay camera vendors for every ticket issued, whether or not they ever collect a dime. So, when the footage is too blurry to ID the driver, they toss out these "Whoops, was this you?" tickets, hoping you'll do their homework for them. It's basically a shady game of "Guess Who?" except you never agreed to play, the rules are rigged and the only prize is an unwanted fine.
THESE 5 FUZZ BUSTER APPS CAN HELP GET YOU OUT OF A SPEEDING TICKET
If you've received a "snitch ticket" (a fake ticket designed to get you to identify the driver), here's what you can do.
Ignore it:
Since it's not a real ticket, you're not legally obligated to respond. Many people simply disregard these notices.
Don't identify the driver:
Remember, you're under no legal obligation to name who was driving your car.
Check for red flags:
Confirm it's a fake by looking for missing court information or the phrase "Do not contact the court regarding this notice."
Stay informed:
Keep the notice for your records, but don't let it stress you out. It's not a legal document.Remember, these fake tickets are just fishing expeditions. You're well within your rights to toss them in the recycling bin and go about your day.
BEWARE OF THE NEW SNEAKY PARKING QR CODE SCAM
If you receive a genuine ticket (one with all the court info) but you weren't the driver, you've got options.
1) Contact the police (optional):
You can try calling the number on the ticket and explaining the situation. But beware, they might pressure you to identify the actual driver.
2) Stand your ground:
Remember, you're not legally required to identify the driver. It's not your job to play detective for them.
3) Go to court:
If push comes to shove, you can always contest the ticket in court. Just be prepared for some potential pushback.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Dealing with red light camera tickets can feel like navigating a legal minefield. The key is to know your rights, stand firm and don't let anyone pressure you into admitting guilt or identifying others if you're not comfortable doing so. Remember, the burden of proof is on them, not you. Stay informed, stay calm, and if all else fails, seek legal advice. After all, justice shouldn't be a game of "gotcha."Has a "snitch ticket" ever landed in your mailbox? Tell us how you handled it by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Top 20 apps tracking you every day
If something is free, you're the product being sold. This is especially true for most online services we use. For example,
Google's primary source
of revenue is ads. They make money by collecting data about you and me and selling targeted advertising to companies, which then show us products relevant to our interests.You might have noticed that the moment you search for a product on Google, you start seeing ads for it on Facebook. The same applies to apps like Instagram, Threads and LinkedIn. In fact, research shows that the apps collecting the most data about you are also among the most widely used. Let's look at the top 20 of them and explore how you can take control of your
personal information
.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Apps collect all sorts of data about you, but let's get one thing straight. Not all data collection is bad. Some apps genuinely need access to certain information to function properly. For example, Uber stores your location data to help you find a ride faster, while WhatsApp requires access to your contacts so you can send messages.The real issue is data collection that serves no purpose other than showing you ads or selling your information to third parties. According to Marin Marinčić, head of IT Infrastructure at
Nsoft
, the top 20 most invasive apps collect data that is not necessary for their core functions.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Leading the list is Meta with all four of its
major apps
. Facebook, Messenger, Instagram and Threads share 68% of collected data with third parties while also using it for targeted ads. LinkedIn follows, sharing around 37% of user data, with Amazon in third place, followed by YouTube.What makes this concerning is how deeply embedded these apps are in our daily lives, making it nearly impossible to find alternatives or avoid data collection altogether.The list also includes Elon Musk's X at No. 5, followed by Uber Eats, PayPal, Uber, Google and Amazon Prime Video. TikTok, despite ongoing scrutiny over its data policies, ranks 14th. While many of these names were expected, one surprising entry is the mobile game Candy Crush, which uses 28% of collected data for ads. You can find the full list in the image below.
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
Avoiding data collection is nearly impossible if you use the apps above. The only way to dodge these invasive apps is to switch to apps that respect your privacy. While it may seem impossible to replace some of the biggest platforms, there are alternatives that collect little to no unnecessary data.Switching to these alternatives may require some effort, but it is the best way to limit how much of your personal data is being collected. Taking control of your privacy starts with making conscious choices about the apps you use.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES
If you're not able to delete the apps listed above, follow the simple steps below to minimize how much information is being collected and shared.
1. Review app permissions:
Most apps request access to data they do not actually need. Go to your phone settings and check app permissions on your
iPhone
and
Android
. Disable access to location, microphone, contacts and other sensitive data unless absolutely necessary.
2. Turn off ad personalization:
Many companies track your online activity to show targeted ads. You can limit this by disabling ad personalization in
Google
,
Facebook
, and other accounts. This reduces the amount of data collected about your interests and behavior.
3. Limit social media tracking:
Social media platforms track your activity even when you are not using them.
Adjust privacy settings
to restrict data collection.
4. Avoid signing in with Google or Facebook:
Many websites offer login options using Google or Facebook. While convenient, this shares even more data with these platforms. Instead, create separate accounts using email whenever possible.
5. Use a Virtual Private Network (VPN) and private browsing mode:
A
VPN
hides your IP address, helping to obscure your location and online activity, making it harder for websites to track you. Combined with private browsing or incognito mode, this reduces the amount of data companies can collect about your online activity. Using a VPN service can also enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. While VPNs don't directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your
Windows, Mac, Android & iOS devices
6. Regular app cleanup:
Uninstall apps
you no longer use to reduce passive data collection.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Protect your personal information across the popular platforms mentioned above with these essential privacy adjustments.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
The best way to reduce companies from collecting your data is to remove invasive apps from your phone. Many apps request unnecessary permissions that can track your activity, so deleting them limits exposure. Instead of downloading standalone apps, try using the browser versions of popular social media platforms, as they typically have fewer permissions. However, web tracking still exists through cookies and fingerprinting, so using a
privacy-focused browser
like Brave, Firefox with enhanced tracking protection, or Safari with Intelligent Tracking Prevention (ITP) can further reduce data collection. However, some apps are so deeply integrated that replacing them is difficult. For example, if you use an Android phone, avoiding Google's ecosystem is nearly impossible. Apple, on the other hand, offers more privacy controls, giving users better options to limit data collection.Do you check app permissions before installing? How do you decide which permissions are acceptable? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. |
Never lose cell service again with this space-age satellite tech
Imagine never being without a
cell signal
again, anywhere, any time on the planet. That's exactly what AST SpaceMobile is working to achieve. Founded in the heart of Texas in 2017, this innovative company is developing the world's first global cellular broadband network that can connect directly to your everyday smartphone, no special equipment required. Its mission? To ensure that no matter where you are
around the globe
- from remote mountain ranges to isolated islands - you'll never be out of touch again.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
AST SpaceMobile
made history in April 2023 by completing the first two-way phone call via space on an unmodified cellphone. This milestone was achieved using its low Earth orbit satellite, Blue Walker 3 (BW3), which was launched aboard a SpaceX Falcon 9 rocket in September 2022.
IPHONE'S SATELLITE MESSAGING: A CRUCIAL LIFELINE DURING A STORM
Since its inception, AST SpaceMobile has made remarkable
technological advancements
. In September 2023, it achieved a 14-Mbps data stream on the BW3 satellite. A year later, in September 2024, the company launched five additional satellites, BlueBird 1 through 5. The ultimate goal is to establish a constellation of 168 satellites, offering speeds up to 120 Mbps.
IS YOUR PHONE READY FOR AN EMERGENCY? TURN ON THESE LIFESAVING SETTINGS
AST SpaceMobile has forged strategic partnerships with major telecom players across the globe. In the United States, it has partnered with AT&T and Verizon. Internationally, it has teamed up with Bell Canada, Rakuten, Vodafone and other telecommunications providers. These partnerships potentially give about 2.8 billion people worldwide access to its satellite network.
BAD WEATHER? HOW TO GET SURVIVAL-READY IN ANY STORM
AST SpaceMobile's approach to satellite connectivity is uniquely innovative. It focuses solely on direct-to-cell service, distinguishing itself from other competitors. Its current BlueBird satellites unfold to approximately 700 square feet in space, with future satellites planned to be three times larger and offer ten times the data capacity. Impressively, 95% of its manufacturing process is completed in house in the United States.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
CELLPHONE BOOSTERS VS MOBILE HOT SPOTS: WHAT'S THE DIFFERENCE AND HOW DO YOU CHOOSE?
While both AST SpaceMobile and Elon Musk's
Starlink
aim to provide global connectivity, their approaches significantly differ. AST SpaceMobile is built for direct-to-cell service, requiring no special equipment for users.Starlink, primarily a data-focused service, has only recently launched modified satellites for direct-to-cell capabilities. AST's focus on unmodified smartphones gives it a unique advantage in accessibility.Despite the promising technology, the company faces several challenges. The brightness of satellites like BW3 could potentially interfere with astronomical observations. There are concerns about possible interference with radio-quiet zones used for scientific research. The increasing number of satellites also contributes to growing space debris concerns.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
As of January 2025, AST SpaceMobile has not yet announced specific pricing for its services. However, given its partnerships with major carriers like AT&T and Verizon, it's likely that the service will be offered as an add-on to existing cellular plans. The company aims to provide coverage to remote areas and eliminate dead zones, suggesting that pricing may be competitive to attract a wide user base.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
AST SpaceMobile's innovative approach to global connectivity has the potential to revolutionize how we stay connected, especially in remote areas. While challenges remain, the benefits of ubiquitous communication, particularly in emergency situations, are compelling. As the company continues to expand its satellite network and partnerships, we may soon see a world where being "out of range" is a thing of the past.If universal satellite connectivity could solve one major communication challenge in your life, what would it be? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Huge healthcare data breach exposes over 1 million Americans' sensitive information
The healthcare industry
has recently been a major target for hackers. You might remember the 2024 Ascension attack, which led to significant disruptions. The Change Healthcare breach was also on a massive scale. UnitedHealth initially
claimed that 100 million Americans were affected
, but later raised that number to 190 million. There have been countless other incidents, and now you can add another to the list. Community Health Center, Inc. (CHC), a Connecticut-based federally qualified health center, has disclosed a data breach following a criminal cyberattack on its systems. The attack has affected over a million
people in the U.S
.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Community Health Center, Inc. (CHC)
detected a data breach on Jan. 2
after identifying unusual activity within its computer systems. An investigation confirmed that a skilled hacker had accessed and extracted data but did not delete or lock any information. If CHC's claims are accurate, this is a positive outcome, as hackers often deploy ransomware, a type of attack in which they lock systems and demand payment before restoring access.In a
regulatory filing
with the Maine Attorney General's Office, CHC said that 1,060,936 people were affected by the data breach. The type of information compromised varies depending on an individual's relationship with CHC. Patient data that may have been accessed includes names, dates of birth, addresses, phone numbers, email addresses, diagnoses, treatment details, test results, Social Security numbers and health insurance information.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
For individuals who are not regular CHC patients but
received COVID-19 services
at a CHC clinic, the breached data may include names, dates of birth, phone numbers, email addresses, addresses, gender, race, ethnicity and insurance details if provided. Additional information, such as test dates, results and vaccine details, including type, dose and administration date, may also have been affected. In rare cases, Social Security numbers were also included in the breach.The organization did not disclose how the hackers gained access to the data or whether proper cybersecurity measures were in place at the time of the breach. While CHC has assured that its systems are no longer at risk, the same cannot be said for its patients, who may now be targets of various cyberattacks.
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
CHC said the hacker's access was terminated within hours, and daily operations were not disrupted. To strengthen cybersecurity, CHC claims it has implemented advanced monitoring software and reinforced system protections. The organization said there is no evidence at this time that the compromised data has been misused.The health center is offering free identity theft protection services for all patients and COVID-19 service recipients whose Social Security numbers were involved in the breach. The organization is also encouraging individuals whose Social Security numbers were not affected to take additional steps to protect their information.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
rget=_new href="https://cyberguy.com/privacy/best-services-for-removing-your-personal-information-from-the-internet/" target="_blank" rel="nofollow noopener">
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
1. Remove your personal information from the internet:
The breach has exposed sensitive personal data, making it essential to reduce your online footprint. While no service can guarantee complete data removal, a reputable data removal service can significantly limit your exposure. These services systematically monitor and erase your personal information from numerous websites and data brokers.
Check out my top picks for data removal services here.
2. Be wary of mailbox communications:
With addresses among the compromised data, scammers may exploit this breach to send fraudulent letters. Be aware of mail claiming
missed deliveries
, account suspensions or security alerts. Always verify the authenticity of such communications before responding or taking action.
3. Be cautious of phishing attempts and use strong antivirus software:
Scammers may use your compromised email or phone number to target you with
phishing attacks
. Be wary of messages asking for personal information or containing suspicious links. To protect yourself, ensure strong antivirus software is installed on all your devices.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
4. Monitor your accounts:
Given the scope of this breach, regular monitoring of your bank accounts, credit card statements and other financial accounts is critical. Look for unauthorized transactions or suspicious activity, and report any issues immediately to your bank or credit card provider.
5. Recognize and report a Social Security scam:
If your Social Security number is exposed, you could become a target for related scams. Official communication regarding Social Security issues usually comes via mail, not phone calls or emails. Learn more about spotting and reporting scams by visiting the Social Security Administration's
scam information page
.
6. Invest in identity theft protection:
Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you'll be notified if and when you are affected. An identity theft protection service can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using an identity theft protection service is that it might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses.
See my tips and best picks on how to protect yourself from identity theft.
MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC
The CHC breach may not be as large as the UnitedHealth attack, but with over a million individuals affected, it's still a serious incident. Cybercriminals can exploit stolen data in various ways, from identity theft to targeted phishing scams. While CHC has taken steps to secure its systems, those impacted should remain vigilant. Be wary of unexpected emails, calls or messages requesting personal information, and consider monitoring financial and medical accounts for any suspicious activity.Do you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener">
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels for the latest tech tips and tricks:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. |
Fox News AI Newsletter: Bill would ban DeepSeek
IN TODAY'S NEWSLETTER:- House reps unveil bill banning DeepSeek from US government devices over alleged ties to Chinese government
- Perplexity AI bids on TikTok, CEO says it's a win-win for Trump
- Donny Osmond adds AI version of himself as a teen to Las Vegas residency
'DEEPLY DISTURBING EVIDENCE':
House lawmakers are introducing legislation Thursday to ban the
Chinese AI DeepSeek
from U.S. government devices, arguing that the software is "directly linked to the Chinese Communist Party" and poses a "five-alarm national security fire."
AN AMERICAN TIKTOK:
The CEO of AI startup Perplexity, Aravind Srinivas, confirmed his company's bid for
TikTok U.S.
and said the deal checks all the boxes for investors and President Donald Trump, including an ownership stake for the U.S.
SEEING DOUBLE:
Donny Osmond
is bringing on a new co-star for his Las Vegas residency: himself.
'AI POWERHOUSE' :
The White House is opening its
artificial intelligence
plan up to Americans to contribute policy ideas to the Trump administration to ensure that the United States is "the undeniable leader" in AI technology.
PEDAL TO THE METAL:
For a commander on the battlefield, a split second of decision advantage can determine the difference between victory and defeat. In every battlespace,
AI is critical
to enabling action at the speed of kinetic and non-kinetic conflict. It is already being successfully applied to rapid data processing, target recognition, combat simulation, countering drones and strategic decision-making for defense missions. And looking across current conflict zones and hot spots, we need its benefits faster than ever before, in environments from urban terrain to cyber, sea and space.
TAKING CHARGE:
Sylvester Stallone is the latest celebrity embracing artificial intelligence. The "Rocky" star invested, along with several others, in
Largo.ai
, an AI-driven analytics platform for film, TV and advertising, raising $7.5 million in financing for the company.
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
Twitter
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News
here
. |
Identify any mystery caller for free with this phone number lookup tool
Got an unknown number that's been driving you nuts? We totally get it. Those random calls on
your cellphone
can be seriously frustrating. And now you can fight back with a simple, free solution. In just a few easy clicks, you'll go from feeling annoyed to being in total control, uncovering exactly who's behind that mysterious phone number.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
The TruePeopleSearch.com website works with both landline and cellphone numbers. It allows you to do a
reverse phone lookup
for any type of phone number, whether it's a cellphone or a landline. It's important to note that the availability and completeness of information can vary depending on the specific number and its associated public records. However, in most cases, with just a few simple steps, you'll go from "Who the heck is calling me?" to "Aha! Now I know exactly who this is." Note that you can also search by name, address and email, as well, but for our example, we'll use a phone number.
AN ALARMING SPIKE IN SCAM CALLS ORIGINATING FROM ROBOCALLS
Grab your preferred device - be it a computer, smartphone
or tablet
. Any browser will do, so launch Chrome, Safari or whatever you're comfortable with. Type in truepeoplesearch.com in your browser's address bar. The layout might vary slightly depending on your device, but don't worry - the functionality remains the same.
TOP 10 ROBOCALL HOTSPOTS IN AMERICA
Now, type in that
perplexing phone numbe
r that's been nagging at you. Hit the
search button
and watch the magic unfold.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Prepare to be amazed by the wealth of information at your fingertips. Click the
"View Details" button
next to or under the actual search results, depending on your device. You might discover the person's name, age, date of birth, current address or previous addresses, as well as email addresses, relatives, friends, associates and more. It's astounding how much data a simple phone number can unlock.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
Now, beware of Sponsored Links that might try to lure you into signing up for other services.While TruePeopleSearch.com can be a helpful tool, not every phone number search will yield comprehensive results. The information available varies depending on several factors:Always use this service responsibly, respect individual privacy and understand that results may be incomplete or vary significantly between different phone numbers.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Try searching for your own phone number. You might be surprised at the amount of information that pops up. If you're uncomfortable with the information available about you, consider investing in a personal data removal service to have that information taken down. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services here.
This free tool empowers you to take control of solving the mystery of who is calling you. No more wondering about unknown callers or potential spam. With just a few clicks, you can unmask the mystery and decide whether to answer, ignore or
block that call
.How do you usually handle unknown callers? Have you ever used a reverse phone lookup tool before? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels for the latest tech tips and tricks:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. |
Robot dog sprints into history books by breaking speed records
A
Chinese team
has unveiled a groundbreaking quadruped robot that is pushing the boundaries of robotics and speed. The Black Panther 2.0, developed by Zhejiang University's humanoid innovation institute in collaboration with the Hangzhou-based startup Mirror Me, has achieved a remarkable feat by running approximately 100 meters in under 10 seconds.The design of
the Black Panther 2.0
draws inspiration from various animals, resulting in a highly efficient biomechanical structure. Its carbon-fiber shins are modeled after jerboa desert rodents, increasing stiffness by an impressive 135% while only adding 16% to its weight.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
The robot features spring-loaded knee joints that act as shock absorbers, mimicking the powerful movements of black panthers. Additionally, its "running shoes," inspired by cheetah claws, enhance grip performance by an astonishing 200%. Standing at 2 feet and 0.8 inches tall and weighing 83.8 pounds, this robot achieves a peak stride frequency of five times per second.
CHINESE TECH FIRM SHARES ROBOT TRAINING SECRETS WITH THE WORLD
The impressive performance of the Black Panther 2.0 is not solely due to its hardware; it also incorporates
artificial intelligence
and machine learning to adapt its gait in real time for specific situations. This technology allows the robot to coordinate its limb movements using the concept of Huygens' coupled pendulum principle, enabling it to maintain fluid motion on various terrains and pushing it closer to the agility of living organisms.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
GET FOX BUSINESS ON THE GO BY CLICKING HERE
In addition to breaking records, the Black Panther 2.0 has joined the prestigious "10-second club" for the 100-meter sprint, surpassing the previous record holder, HOUND, which was developed at Korea's Advanced Institute of Science and Technology. This achievement positions the robotic dog ahead of most human sprinters, although it still trails behind some of nature's fastest runners, like cheetahs, ostriches and wildebeests.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOT
The development of the Black Panther 2.0 opens up exciting possibilities for the future of robotics. Its high-power-density motor drivers suggest potential industrial applications, while its design invites further exploration into the differences between robotic and biological mobility. This technology could also be utilized in search and rescue operations or for exploring hazardous environments.Would you feel comfortable having a robot like the Black Panther 2.0 working alongside you, or would its advanced capabilities make you nervous about potential job displacement or safety concerns? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. |
Beware of fake Reddit solutions delivering dangerous malware
Sometimes, when you need an answer to a complex life situation or a way to troubleshoot an error on
your computer
, regular articles on the web don't help. Some issues are so niche that no one writes about them, and those who do often say nothing useful in 1,000 words. In these cases, adding Reddit to your search query can be a game changer. Nine times out of 10, someone on Reddit has faced the same issue, and there's probably a solution. But bad actors have caught on to this, too. They're now mimicking Reddit to spread malware that can steal your personal information.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Hackers are distributing nearly
1,000 fake websites
mimicking Reddit and WeTransfer to spread the Lumma Stealer malware. These sites are designed to trick you into downloading malicious software by imitating legitimate discussions and file-sharing services.On these fake Reddit pages, attackers create a fabricated discussion where one user asks for help downloading a tool, another offers a WeTransfer link and a third expresses gratitude to make the exchange seem real. Clicking the link redirects victims to a counterfeit WeTransfer site, where the download button delivers the Lumma Stealer malware.All these fake pages have the following things in common:These fake websites were discovered by
Sekoia researcher crep1x
, who compiled a full list of the pages involved in the scheme. In total, 529 of these sites mimic Reddit, while 407 impersonate WeTransfer to trick users into downloading malware.According to
BleepingComputer
, hackers may be driving traffic to these fake pages through methods like malicious ads (
malvertising
), search engine manipulation (SEO poisoning), harmful websites, direct messages on social media and other deceptive tactics.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Hackers are using fake Reddit pages to spread Lumma Stealer, a powerful malware designed to steal personal data while staying under the radar. Once it infects a device, it can grab passwords stored in web browsers and session tokens, allowing attackers to hijack accounts without even needing a password.But Reddit isn't the only way this malware spreads. Hackers also push it through GitHub comments, deepfake websites and shady online ads. Once they
steal login credentials
, they often sell them on hacker forums, where others can use them for further attacks.This type of malware has already played a role in major security breaches, including attacks on
PowerSchool
,
Hot Topic
, CircleCI and Snowflake. It's a growing threat, especially for companies that rely on password-based security.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS
1. Be cautious with download links:
Avoid downloading files from random Reddit discussions, social media messages or unfamiliar websites. If an unknown user shares the link or seems out of place in the context, it's better to err on the side of caution. If the link is directing you to a file-sharing site like WeTransfer or Google Drive, double-check the URL for any signs of manipulation-like random characters added to the domain name.
2. Have strong antivirus software:
The best way to safeguard yourself from malicious links that install malware originating from these Reddit discussions, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
3.
Verify website URLs:
Fake websites often look convincing but have slight differences in their URLs. Check for misspellings, extra characters or unusual domains (e.g., ".org" or ".net" instead of the official ".com").
4. Use strong, unique passwords and enable 2FA:
A
password manager
can help generate and store strong passwords for each site. Meanwhile, enabling two-factor authentication (
2FA
) adds an extra layer of security, making it harder for attackers to hijack your accounts. Get more details about my
best expert-reviewed Password Managers of 2025 here.
5. Keep your software updated:
Regularly
update
your operating system, apps, browsers and other software on your PC or mobile devices. Updates often include patches for security vulnerabilities that hackers can exploit.
6. Watch out for malvertising and SEO traps:
Hackers manipulate search engine results and
run deceptive ads to trick users into visiting fake sites
. Stick to official sources and avoid clicking on ads or search results that seem too good to be true.
HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY
Hackers are getting sneakier, using fake Reddit and WeTransfer pages to spread dangerous malware like Lumma Stealer. These sites might look real, but they're designed to steal your personal info. To stay safe, always double-check links and be cautious about downloading files from unfamiliar sources. Use strong, unique passwords, enable two-factor authentication and keep your software updated to stay one step
ahead of cybercriminals
.Have you ever encountered a suspicious link on Reddit or social media? How did you handle it? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Smart windows take a page from nature's pinecone playbook
Have you ever wondered how a pine cone knows when to open and close? It's not magic,
it's science
. Now, researchers have taken this cue from nature to create something pretty cool for our homes. Let's dive into how this revolutionary window technology works, keeping your home comfortable without using a single watt of electricity.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Pine cones have these amazing scales that respond to moisture. When it's damp, they close up tight. But when it's warm and dry, they open wide to release their seeds. This simple yet effective mechanism has inspired scientists to develop a smart window system that could change the way we think about
energy efficiency in buildings
.
SOLAR DEVICE TRANSFORMS USED TIRES TO HELP PURIFY WATER SO THAT ITS DRINKABLE
Scientists from Germany's universities of Stuttgart and Freiburg have developed what is known as the
Solar Gate window facade system
. It's like having tiny pinecones built right into your windows. These smart windows have special elements that curl up when it's cool and moist, letting in sunlight to warm your home. But when it's hot and dry, they flatten out to block the sun and keep things cool inside.
NEVER NEED AN EV CHARGING STATION AGAIN WITH THESE ROOFTOP SOLAR POWER PANELS
The Solar Gate system consists of a gridded array of pine-cone-scale-inspired self-bending elements housed between two panes of glass in an aluminum-frame window unit. Each element is ingeniously crafted with three distinct layers, each serving a unique purpose. The bottom layer is composed of a cellulose powder and a thermoplastic blend that swells when exposed to moisture. Above this lies a middle layer made of thermoplastic, which remains unaffected by moisture.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
The top layer consists of flexible biocomposite filaments that serve to hold the entire structure together. When exposed to moist air, the bottom layer expands, causing the element to curl upwards. Conversely, in dry conditions, it returns to its flattened state. This simple yet effective mechanism allows the window to respond automatically to
changing weather conditions
, providing optimal shading and light penetration as needed.
SOLAR-POWERED BLIMP COULD BRING HIGH SPEED INTERNET TO YOUR AREA
The Solar Gate system underwent rigorous real-world testing to prove its effectiveness. In a comprehensive year-long study, researchers installed 424 Solar Gate elements in the south-facing skylight of a research building at the University of Freiburg. The results of this extensive trial were nothing short of impressive.During the cool, wet winter months, the elements responded by curling upwards, allowing ample sunlight to penetrate the building. This natural response effectively warmed and illuminated the interior spaces, reducing the need for artificial heating and lighting. Conversely, as the seasons changed and brought warmer, drier summer conditions, the elements automatically flattened out.This flattening action served to block excess sunlight, effectively keeping the building's interior cool and comfortable without the need for energy-intensive air conditioning. The test demonstrated the system's ability to autonomously adapt to changing weather conditions, providing optimal comfort and energy efficiency throughout the year.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
5 BEST PORTABLE CHARGERS FOR ANY OCCASION
This innovative approach to building technology has far-reaching implications beyond just window systems. Researchers have already begun exploring similar biomimetic principles in a variety of applications. For instance, studies have investigated the development of shading systems using wooden slats that can open and close in response to environmental conditions.In the realm of textiles, scientists are working on "smart" clothing fabrics that can adapt to ambient temperature, providing optimal comfort for wearers. Perhaps most intriguingly, these principles are even being applied to the field of robotics, with researchers developing tiny mobile robots that can respond to environmental stimuli in ways inspired by natural mechanisms. As we continue to draw inspiration from nature's ingenious designs, the potential for creating more sustainable and responsive technologies seems boundless.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Nature never ceases to amaze us with its ingenious solutions, and the Solar Gate window system is a brilliant example of how we can harness these natural wonders. By mimicking the pinecone, scientists have created a game-changing technology that could revolutionize how we approach energy efficiency in our buildings. It's exciting to think about a future where our homes and offices adapt to the environment just like living organisms do. Who knew that the key to smarter buildings was hiding in our forests all along?Would you feel comfortable having windows that automatically open and close based on moisture and temperature - without any electrical controls? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Fox News AI Newsletter: AI takes big step forward with 3D-printed shoe
IN TODAY'S NEWSLETTER:- World's first AI-designed, 3D-printed shoe wants to be the next Crocs- Trump's AI czar flags report questioning DeepSeek's cost of developing AI models- Wheeled wonder robot dog shows off crazy dance moves in all kinds of tough terrain
INNOVATIVE STEP FORWARD:
Syntilay, a startup with a sparkle in its eye and
artificial intelligence
on its mind, has just unveiled what it claims to be the world's first entirely AI-designed and 3D-printed shoe.
SETTING THE RECORD STRAIGHT:
President Donald Trump's
artificial intelligence
czar, David Sacks, is pointing to evidence that China's DeepSeek AI startup spent a lot more money developing its models than has been reported.
ROBOT'S GOT MOVES:
Deep Robotics,
a Chinese robotics firm
, recently unveiled its latest innovation in quadruped robotics, the Lynx.
SPUTNIK MOMENT:
If you care about national security, artificial intelligence (AI) or the index funds in your retirement account, you have likely heard of DeepSeek.
Chinese AI model DeepSeek's release
late January caused a $969 billion stock market selloff and prompted responses from AI leaders like President Donald Trump, NVIDIA, venture capitalist Marc Andreessen and OpenAI CEO Sam Altman.
AUTONOMOUS BIG RIGS:
Are you ready to share the road with massive semi-trucks cruising down the highways next to you without a human driver? Well, that is one step closer, thanks to the groundbreaking partnership between Kodiak Robotics and Atlas Energy Solutions. These innovative companies have just pulled off something incredible. They successfully launched the first-ever commercial
driverless trucking operation.
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
Twitter
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News
here
. |
How to minimize your digital footprint when you travel
Those of us old enough to remember
traveling before the age of smartphones
and mobile internet know we have it pretty good these days. You can find the best flights using comparison sites, choose among hundreds of hotels on a single booking site, get tickets sent to your phone rather than picking them up in person, check in online, order a ride and you're off. All this, of course, comes with downsides and trade-offs. Most people's biggest concerns are "getting hacked," which, when you get down to it, really means "being robbed in ways I don't quite understand." But that's one of those risks that, although very real, is unlikely to happen if you take the usual precautions.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
In a time when personal information is said to be worth more than oil, bad actors are often interested in getting their hands on
your personal data
as much as your money. And a "bad actor" need not be some guy with his hood up, hunched over a laptop in the back of a coffee shop. In 2024, for example, ClassAction.org
reported on suspicions
of major cruise lines illegally sharing consumers' data with Facebook. Cruise lines RoyalCaribbean.com, CelebrityCruises.com, Princess.com and HollandAmerica.com are suspected of collecting personal information through the sneaky "Meta tracking pixel" and sending it to Facebook without users' consent. Booking.com, a site most of us have used at one time or another, has also had its fair share of problems. The website has been battling waves of hacking attacks aimed at defrauding its customers; it's faced accusations of not doing enough to protect its customers and has even been fined for
failing to disclose
a data breach on time. Data gathered from these kinds of incidents often ends up circulating online, being added to what was already out there before, just waiting for someone or some company to make use of it.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
THE BEST TRAVEL GEAR FOR 2025
Avoiding cruise lines and booking sites altogether is hardly a practical solution when you need to book a cruise or accommodation. Here are some things you can do to dramatically reduce the risk when booking flights, cruises, vehicles and accommodation.
1. Invest in personal data removal services:
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services here.
2. Use personal security caution:
Don't sign in to anything using your social media accounts. Sign in with your email instead and be sure to use an email address you've set aside just for these kinds of situations.
3. Do your homework online:
Do an online search for the booking website, cruise line or travel agency in question, keeping an eye out for any recent reports of scams or other issues.
4. Check company reputation carefully:
Check
ClassAction.org
, the
Better Business Bureau
and
Trustpilot
specifically. This will help you gain comprehensive insights into a company's track record, customer experiences and potential issues.
5. Verify communication legitimacy:
Whenever you receive a call, email or text message from a booking service, confirm that it's really them by first checking your account directly and then contacting the company through official, publicly listed channels (not social media).
BEST TRAVEL ADAPTERS OF 2025
Here are some of the "usual precautions" that can protect you from "getting hacked" while traveling.
1. Update all your apps and operating systems before heading off:
All those security patches are that much more important while you're traveling. You'll want to
download and install all pending updates
at least 24-48 hours before your departure, ensuring you have the latest security protections and giving yourself time to troubleshoot any potential update-related issues that might arise.
2. Lock everything down
: Use strong, unique passwords and a reliable
password manager
to keep track of them.
3. Turn on
two-factor authentication
where available:
Prioritize using authenticator apps over SMS-based codes. This provides a more secure second layer of verification, as authenticator apps are less vulnerable to SIM swapping attacks and interception compared to text message-based authentication. Choose
reputable authenticator apps
, which generate time-based one-time passwords that change frequently and are tied directly to your device.
4. Keep location services turned off
: NFC, Bluetooth and Wi-Fi should also be turned off while you're not using them. That'll make your battery last longer as a side benefit.
5. Go dark
: Don't publicly share news of your trip until you're back. Avoid posting about your vacation on social media or keeping a blog about your adventures, as this information can be used by criminals to piece together a snapshot of your life.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
6. Limit social media use:
Scammers and hackers often exploit social media to gather personal information and target travelers. To stay secure, avoid sharing trip details publicly and use a privacy-focused messaging app like
Signal
to stay in touch with family and friends.
7. Use privacy-focused browsers:
You should consider using browsers like
Brave or Firefox
with privacy extensions. Enabling "do not track" settings and utilizing private/incognito mode can provide an extra layer of digital protection.
8. Disable automatic Wi-Fi and Bluetooth connections:
Disable settings that automatically connect to networks and manually select and verify networks before connecting. This prevents your device from inadvertently joining potentially unsecured networks.
9. Use encrypted messaging and email:
Protect your private communications by using services that offer end-to-end encryption for both
messaging
and
email
. These platforms ensure your data remains secure from unauthorized access, with features like encryption for non-users, multifactor authentication and tracking protection.
See my review of the best secure and private email services here
.
10. Travel with minimal digital gear
: Consider bringing a "travel-only" phone or laptop with minimal personal data.
11. Be cautious of public charging stations:
Avoid using
public USB charging ports
that could potentially
compromise your device
. Instead, carry a
portable phone charger
with you.
12. Monitor your accounts:
Set up transaction alerts on financial accounts and use credit cards with strong fraud protection. Regularly check your accounts while traveling to quickly detect any suspicious activity.
13. Bring your own internet access with you:
Find a
local or international SIM
, a
mobile hot spot
and a trusted
VPN (virtual private network) service
for those times you can't help but use public Wi-Fi. Using a VPN can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don't directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your
Windows, Mac, Android and iOS devices
.
5 WAYS TO SECURELY ACCESS WI-FI ON YOUR PHONE WHILE TRAVELING
There's plenty of good advice out there when it comes to avoiding
public Wi-Fi
and protecting your documents while traveling. To really stay safe, though, it's important to start thinking about your data privacy and data security before even booking your trip. It doesn't take much when all is said and done, but it could make a huge difference to how you remember your trip for years to come.When was the last time technology made your travel more stressful instead of easier? What happened? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Are these autonomous transport pods the future of sky-high commuting?
Imagine gliding above city traffic in a sleek, autonomous pod, bypassing congested streets and reaching your destination in record time. This is the promise of Whoosh, an
innovative urban transit system
set to debut in 2026. Whoosh represents a paradigm shift in urban transportation, offering a solution that's as efficient as it is futuristic.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Whoosh isn't your typical gondola or
cable car system.
While it may look similar at first glance, this clever Kiwi invention offers a unique blend of on-demand service, direct routing and privacy that sets it apart from traditional public transportation. Unlike fixed-route gondolas, Whoosh pods are equipped with their own motors and autonomous navigation systems. This allows them to freely traverse a complex network of cables and rails, choosing the most efficient path from one point to another without intermediate stops.
HYDROGEN POWERED RESCUE TRUCK JUST SMASHED A WORLD RECORD AND IT ONLY SPITS OUT WATER
The Whoosh system combines the best aspects of
ride-sharing and public transport
. Users can book a pod through an app, much like calling an Uber. The pod will be waiting at a nearby station, ready to whisk you away to your destination. These stations are designed with minimal footprint, fitting into a standard car park space and featuring a spiral ramp up to the network height of about 40 feet above the ground. Larger stations can be built at ground level, offering easy access for passengers. The network itself consists of tensioned cables spanning 500-985 feet, interspersed with shorter sections of steel rail for smooth turns and junctions. This design allows Whoosh to overcome geographical obstacles with ease, crossing rivers, highways or even connecting rooftops.
THE BEST TRAVEL GEAR FOR 2025
Whoosh pods are expected to achieve an average speed of 25 mph across the network. While this may not sound impressive at first, the non-stop nature of the journey means it could be significantly faster than driving through congested urban areas. The system features remarkable efficiency, using less energy for a standard ride than a 10-minute shower. This is achieved through constant motion and low rolling resistance, making Whoosh about twice as efficient as a small electric car. Comfort hasn't been overlooked either. The pods can lean into corners, much like a motorcycle, providing a smooth ride even at higher speeds. The cable sections of the journey offer an especially pleasant "floating" sensation.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
GET READY TO EXPERIENCE THE THRILL OF EVTOL RACING
Interestingly, Whoosh's journey began in the world of amusement parks. The team behind Whoosh, led by Chris Allington, initially developed the core technology for a zip line ride called the Switchback. This allowed them to prototype and test crucial elements of the system, such as the seamless transition between cables and rails and the eddy current braking system for controlling swing-out around corners.
EXPLORING HYDROGEN-POWERED VEHICLES FOR THE FUTURE OF TRANSPORTATION
The world's first Whoosh transit system is slated to open in Queenstown, New Zealand, in 2026. This picturesque tourist destination, with its challenging geography and traffic issues, provides an ideal testing ground for the technology. Nestled between mountains and a lake, Queenstown suffers from limited road networks and significant traffic congestion, making it a perfect proving ground for Whoosh's innovative transportation solution. The pilot project will demonstrate the system's ability to navigate difficult terrain and provide efficient transit in a compact urban environment, with Chris Allington noting that the location is "small enough that it's actually solvable" while presenting unique geographical challenges.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
Whoosh combines the convenience of ride-sharing with the efficiency of public transit. Its modular design and relatively low infrastructure costs make it an attractive option for growing cities grappling with congestion and sustainability concerns. As we look towards a future of smarter, more connected cities, Whoosh offers a glimpse of what's possible when innovative thinking is applied to age-old urban challenges. The success of the Queenstown pilot could pave the way for similar systems worldwide, potentially revolutionizing how we move through urban spaces.Would you be willing to trade your car commute for a ride in a Whoosh pod? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Hacked on social? Here's what to do next
The chances of your Instagram, X, Facebook, Amazon, Threads, Rumble, Twitch or other accounts getting taken over by spammy bots and
data-stealing thieves
have never been higher. So, don't sit there all smug, thinking, "Oh, Kim, that could never happen to
me
!"
Freebie alert:
I'm giving away my latest ebook, "50 Smart Ways to Use AI"
(a $9.95 value). Hope it helps you!
A lot of the advice you find online about hacked
social media
sites and profiles is just plain wrong or, worse, leads to a scammer who promises to get your account back but really just steals your money. Keep reading for advice you can trust.
DON'T SCAM YOURSELF WITH THE TRICKS HACKERS DON'T WANT ME TO SHARE
Step 1: Sign out on every device
It's alarming to think about someone else's hands all over your social media account, posting crap on your page. Fully sign out of your account on every device you're logged in.
Pro tip:
Under the
Settings
section in every social app, you'll see a list of all (or the most recent) devices signed in. On Facebook, for instance, just click your
profile picture
>
Settings & privacy
>
Activity log
>
Where you're logged in
.This step will often boot more casual hackers piggybacking on automatic sign-ins. They'll get asked for passwords they don't have and won't be able to log in again, so they can't spam your peeps. But don't stop here!
Step 2: Change your password
Log into your account on one device and change your password. The account or settings page will have that option, like
here on Instagram
. If hackers
did
get your password (
maybe from a massive data breach
), this will lock them out.You know the drill: Replace your old password with a strong one. Make it at least 12 characters with a mix of uppercase and lowercase letters, numbers, and symbols. Better yet, have a password manager come up with a great one for you.
THIS CRIME SHOT UP 400% - HOW TO PROTECT YOURSELF
Step 3: Report the hack
Now, hackers should be mostly locked out of your socials. Before you take a deep breath, though, report the hack. This way, your social media platform can help you roll back your hacked messages and freeze your account until you're sure everything is safe.Account hacking is so bad, some social media sites have dedicated pages to report the problem. Here's
Facebook's hacked page
, and, no surprise, there's also an
Instagram hacked page
and
X's questionnaire
.
Step 4: Check for surprise changes
No one likes cleaning the house, but it has to be done. Jump over to your account settings and check for any funny business, like:
I'M A TECH EXPERT: 10 AI PROMPTS YOU'LL USE ALL THE TIME
Step 5: One last thing
Phew, you're almost done. Be sure to enable two-factor authentication (2FA) for your account. You can get a code via text, but it's more secure to use an authenticator app.
Steps here if you're new to the 2FA game
.FYI, you can only get 2FA on X if you pay for its $8 monthly Premium service. Annoying.
If you run into any trouble with these steps
...... Or if a hacker got your account suspended, call the social media platform. Keep in mind these companies don't care about you, so they really don't
want
to help you. You'll have to be persistent.
Here's a list of popular tech numbers.
Do
not
search
on Google
for these phone numbers.
Reminder, get my newest ebook
"50 Smart Ways to Use AI"
free right now.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. |
Cybercriminals' sneaky game plan to take advantage of Super Bowl fans
Super Bowl LIX is set to take place this Sunday at the Caesars Superdome in New Orleans and is expected to draw a record-breaking audience of 116.8 million viewers, according to
PredictHQ
.
While this massive event generates excitement, it also attracts cybercriminals looking to exploit unsuspecting fans. Here are four common ways hackers target football fans leading up to the big game.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Cybercriminals will try to exploit the Super Bowl's reliance on digital ticketing and mobile apps. Fans may receive text messages or social media alerts that appear to be from official payment apps, urging them to "confirm" their information for last-minute ticket upgrades or exclusive merchandise deals. These phishing attempts could lead to fake websites designed to steal banking details.
HOW TO SCORE A GREAT DEAL ON A TV BEFORE THE SUPER BOWL
Scammers create fake "exclusive raffles" or contests, claiming fans have a chance to win VIP tickets or unique experiences if they pay a small entry fee. These scams often rely on urgency and the fear of missing out. The Better Business Bureau has warned about fraudulent sports betting apps encouraging users to place "guaranteed bets on upcoming games."
TECH THAT'S SURE TO MAKE YOUR SUPER BOWL PARTY A HUGE SUCCESS
Scoring last-minute Super Bowl tickets can feel like a victory until you find out they are fake. Sketchy ticket resellers flood search results and social media with deals that seem too good to be true. Online ticket fraud is becoming increasingly common. While some tickets may be legitimate, many are not, with fans spending hundreds or even thousands of dollars for nothing.Scammers often utilize automation and artificial intelligence to identify and target potential victims based on the language used in their posts. For instance, scammers search for popular buzzwords and hashtags that people use when looking to buy tickets, such as #SuperBowl, #SuperBowlTickets or #LookingForTickets. They then respond to these posts with messages that contain links to other platforms like WhatsApp, Telegram or Cash App, where they attempt to finalize fraudulent deals.
HOW TO GET YOUR TV GAME-READY FOR THE SUPER BOWL
If a social media ad is offering free NFL tickets or merchandise, there is a catch. These scams appear everywhere, promising fans exclusive giveaways if they cover a small shipping fee or provide personal details. The posts look official, sometimes even using fake endorsements from players or teams, making them easy to fall for. Scammers also use cross-platform operations to evade detection and bans by social media platforms. They will identify and initiate communications with you on one social media platform before requesting you switch to another. This is likely an attempt to prevent one social media platform from gaining full insight into fraudulent activity and banning accounts.The moment you enter your information or payment details, you have handed cybercriminals access to your bank account. And those free tickets or jerseys never arrive. Scammers rely on the excitement of game day to push people into acting without thinking. The truth is simple. If it sounds too good to be true, it probably is.Finally, scammers may offer massive discounts for Super Bowl tickets to entice you to buy quickly. They may state they just want to sell the tickets "last minute" to justify large, attractive discounts, such as 50% off or more. They may also claim to have a personal or professional reason for not being able to attend the event, such as a family emergency or a work conflict. Scammers often use these excuses to pressure victims into making hasty decisions and transferring money without verifying the tickets.
MOST TALKED ABOUT SUPER BOWL ADS
While scammers will try to prey on Super Bowl fans, you are not completely helpless. Dave Lewis, Global Advisory CISO at
1Password
, shared some tips on staying safe leading up to the games. These are not complicated strategies, just simple cybersecurity practices that are easy to follow.
1) Buy tickets from trusted sources:
Only purchase from official sites/apps and other reputable channels. Double-check URLs to avoid lookalike sites (which are designed to mimic legitimate event pages). Platforms like Facebook Marketplace, Eventbrite and Nextdoor are also hot spots for scams, so be cautious of sellers "requiring a deposit" through peer-to-peer financial apps like Cash App, Venmo or Zelle.
2) Watch out for event-related phishing attacks
: If a deal seems too good to be true, it probably is. Cybercriminals often time their phishing attacks around large events like the Super Bowl, offering fake discount tickets, VIP experiences, free food vouchers, etc. Always verify offers through the event's official website or app and never agree to anything over the phone. Double-check the sender's email address and hover over links before clicking to ensure they lead to legitimate event sites. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
3) Keep your phone software and apps updated:
Regularly update your device's operating system (i.e., iOS, macOS, Windows, Android, others). "While constant notifications can be an annoyance at the moment, these updates are essential for keeping your devices secure," Lewis said. If you're not sure how to get started,
check out this extensive guide on how to update all your devices
.
4) Use strong, unique passwords and enable two-factor authentication (2FA):
Create complex passwords for all your accounts, especially those related to ticket purchases or event information. Use a
password
manager
to generate and store these securely. Enable
2FA
wherever possible, particularly for email and payment accounts. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password. For the Super Bowl, this is especially crucial for any official NFL or ticketing apps you might be using.
5) Be wary of QR codes:
While convenient, QR codes can be exploited by hackers for malicious purposes. Only scan QR codes from trusted sources, such as the official event organizer. If unsure, check for signs of tampering, like stickers placed over legitimate codes or poor print quality. When in doubt, don't scan it. As a precaution, always keep your antivirus software running to prevent malware infections from scanning a scam QR code.
If you don't have antivirus software, check out my top recommendations here
.
6) Beware of scammers using social engineering techniques:
For example, they may encourage you to transfer money immediately as they allegedly have other prospective buyers. They may also use emotional appeals, such as sympathy, guilt or urgency, to manipulate you into making a decision. Scammers often use these tactics to pressure victims into paying before verifying the tickets.
7) Be wary of individuals showing receipts or proof of purchase:
This is not a guarantee that an individual is in possession of a ticket, and it can be easily faked. Scammers can use fake receipts to convince victims that they bought the tickets from legitimate sources, such as Ticketmaster, StubHub or SeatGeek.
8) Exercise caution when interacting with individuals asking for you to "name your price" or are selling below ticket value:
This may be a sign that they are trying to lure you into a scam with a too-good-to-be-true offer. Scammers often use this strategy to attract victims who are looking for cheap or affordable tickets.
9)
Be cautious when interacting with people claiming to sell tickets on behalf of a friend or family member:
This may provide an excuse for scammers using compromised bank accounts with the account holder's name different from the social media account being used. Scammers often use this pretext to explain the discrepancy between the names on the accounts.
10)
Review the account's recent history:
Some scammers may claim to be selling tickets to multiple high-profile events, such as sports games, music concerts and conferences at one time. This may indicate that they are running a large-scale scam operation and are not genuine sellers. Scammers often post multiple ads for different events on the same or different platforms, using the same or similar images and descriptions.
11) Exercise caution and validate ownership:
Do this even when purchasing items from friends or friends of friends on social media. A family member or friend's account can be compromised and used by a scammer. Friends of the victim can vouch for the account user as a legitimate seller, not realizing the account had been hacked.
MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC
Scammers are always looking for new ways to take advantage of football fans, especially during major events like the Super Bowl. Whether it is fake ticket sales, phishing scams or bogus giveaways, the risks are real. You can easily avoid becoming a victim of these types of attacks by staying vigilant and being cautious of emails and links that ask for personal information.Do you think the NFL or other major sports leagues are doing enough to protect fans from these scams? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
How to easily transfer files and photos off a computer to your hard drive
Is your computer gasping for breath, drowning in a sea of photos, documents and random downloads? We've all been there: that moment when your computer feels like it's about to burst at the seams, threatening to crash your system and lose those precious memories. Today, I'll walk you through steps to transfer files and free up space so you can breathe easily and keep your Mac or PC running smoothly.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
First things first, you'll want to use an external hard drive you already have or purchase a new one.
External hard drives
offer massive storage for all your digital memories. My favorites are small, portable drives with no moving parts called SSDs, or solid-state drives. When selecting an external hard drive, consider these key factors.
HOW TO MANAGE PHOTOS AND VIDEOS ON A NEW LAPTOP WITH LIMITED SPACE
Once you have your
external drive
, plug it right into your computer using a USB cable to make sure it's securely connected.If you're using a Mac, here's how to transfer your files:
HOW TO TRANSFER PHOTOS AND VIDEOS FROM YOUR EXTERNAL HARD DRIVE AND APPLE DEVICES
For Windows users, follow these steps:Your files are now safely stored on your external drive.After transferring your files to an external drive or cloud storage, it's important to note that the original files still remain on your computer. To effectively free up space, follow these steps:
Delete Original Files
On Mac:
On Windows:
Empty the Trash/Recycle Bin
On Mac:
On Windows:
Remember, simply moving files to a new drive doesn't automatically delete them from the source. You need to manually remove them and empty the trash/recycle bin to fully reclaim space on your original drive. Always double-check that you have a secure backup of your files before permanently deleting them.
FIRST 10 THINGS TO DO IF YOU GOT A NEW PC
If you're not into the manual method and prefer a more automated approach, there are other transfer solutions available:Cloud storage services like iCloud, Google Drive and Dropbox let you upload files and access them from anywhere. These services offer automatic syncing and backup, making file transfer and storage more convenient. Popular options include Microsoft OneDrive, Proton Drive and IDrive.
Get Kurt's favorite cloud services here
.Windows users can utilize the built-in File History feature to automatically back up files to an external drive. This is suitable for a small number of folders but may be time-consuming for large quantities of data.For faster and more efficient transfers, especially when dealing with large quantities of files, consider using professional backup software. These tools often provide features like automatic backups, file compression and encryption for added security.For those looking to move data between cloud services, solutions like MultCloud offer seamless file transfer and synchronization between different cloud storage providers. If you have maxed out your iCloud storage,
click here to discover what solutions are available
.
ASK KURT: DO YOU NEED TO ENCRYPT YOUR SENSITIVE CLOUD DATA?
No more digital clutter, no more stress. You've got this file transfer thing down pat. Whether you choose the manual method for more control or opt for cloud storage for convenience, the key is to
regularly back up your important files
. Remember, it's not just about freeing up space on your computer. It's about protecting your digital memories and important documents. As we move into 2025, the landscape of digital storage continues to evolve. With advancements in SSD technology, cloud services and data transfer speeds, managing your digital life has never been easier. So go ahead, start that transfer and enjoy the peace of mind that comes with a well-organized digital life.Have you ever lost important files or photos? Tell us your worst digital storage nightmare in the comments below. Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
I'm a tech expert: 10 AI prompts you'll use all the time
It's
AI this and AI that
everywhere you turn. ChatGPT and DeepSeek are dominating headlines, Google slaps AI results at the top of every search, and there are smarter options in the
apps and services
you use every day.
Freebie alert:
I'm giving away my latest ebook, "50 Smart Ways to Use AI"
(a $9.95 value). Hope it helps you!
I hear from folks all the time on my national radio show who have no idea where to start. That's why you have me. AI isn't going away, so let's dive into a few things you need to know and prompts to get you started.
5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER
First, get to know the tools of the trade
There are so many options. I recommend you start with one of the big names. They're easy to use, intuitive and have free options. I've been most impressed with:Another AI tool worth checking out is
Google NotebookLM
. Upload audio, notes, documents or any other files, then you can search them, find citations (from your own docs) or even produce a snazzy podcast based on your files. A listener, Bob, told me after he heard about it on my radio show, he used NotebookLM to create training modules for his employees.
How to get the best results out of AI chatbots
In reality, using AI is as simple as using Google. Still, it doesn't hurt to know a few things about how it works. You'll spend less time feeling like you're fighting the algorithms and get results you want more reliably."Priming" is the insider term for telling a chatbot exactly what you want from it.
With ChatGPT
or any other, the more constraints you give, the better your answer. You might say, "Limit your response to 250 words," "Give me the list in bullet points" or "Format the results as a table." Remember, AI can't read your mind. Chatbots feed us the answers they think we want based on our prompts, how they're trained and what they know about us. Here's an easy way to give direction: Use "
do
" and "
don't
" in your prompts. Say you're cooking for friends, and some have allergies. Say, "Create a recipe for six people.
Do
include protein, fruits, vegetables and carbs.
Don't
include dairy products, shellfish or nuts."
AI ISN'T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER
10 AI prompts to try
Want more? Get
"50 Smart Ways to Use AI"
free right now.
Think of AI as your first step, not your last
AI is a fantastic tool to help you brainstorm, speed up your work and even teach you new things - but it's not perfect. It doesn't think for itself; it just predicts the next best response based on the data it's been trained on.AI tools can make mistakes, provide outdated information or totally miss the mark. Always double-check anything important, especially when it comes to work, finances or
legal matters
.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. |
Most talked-about Super Bowl ads
Super Bowl 2025 is fast approaching, and while the Kansas City Chiefs and Philadelphia Eagles prepare to clash on Feb. 9 at the Caesars Superdome in New Orleans, another competition is heating up: the battle for the best Super Bowl commercial. With one in three Americans tuning in, brands are pulling out all the stops to create memorable ads that will resonate long after the game ends. Here's a roundup of what we can expect from this year's star-studded lineup.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Hellmann's reunites Meg Ryan and Billy Crystal for a rom-com-inspired deli scene at Katz's Deli. This nostalgic nod to "When Harry Met Sally" adds humor while showcasing Hellmann's as the perfect sandwich companion.
TECH THAT'S SURE TO MAKE YOUR SUPER BOWL PARTY A HUGE SUCCESS
David Beckham discovers he has a long-lost twin brother in Stella Artois' hilarious new ad. Set in a cozy bar with his fictional parents, Beckham learns about "Other David," leaving viewers eager for the full reveal on game day.
HOW TO GET YOUR TV GAME-READY FOR THE SUPER BOWL
Pringles enlists Adam Brody, Nick Offerman and James Harden for its celebrity-packed ad. Teasers suggest humor centered around mustaches and mysterious activities involving Pringles cans, keeping fans guessing until game day.
STREAM MORE AND PAY LESS BY LOWERING YOUR MONTHLY STREAMING COSTS
Uber Eats brings together Martha Stewart, Charli XCX and Matthew McConaughey for a TikTok-inspired campaign. From football explained in club terms to McConaughey channeling Mike Ditka, this ad promises eclectic humor with broad appeal.
TOP 10 SOUNDBARS TO ENHANCE YOUR TV AUDIO EXPERIENCE
Bosch's first-ever Super Bowl ad stars Antonio Banderas helping a Macho Man Randy Savage look-alike open a stubborn pickle jar. This quirky teaser promises humor while showcasing Bosch's innovative products in a way that's bound to grab attention.Nestlé's Coffee Mate makes its Super Bowl debut with a collaboration featuring Shania Twain. The teaser hints at a lively campaign that blends humor and charm, marking a bold first step into the Super Bowl spotlight for this beloved creamer brand.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Doritos is letting fans take charge this year by inviting them to create their very own commercials. The winning ad, judged by Kansas City Chiefs players in an "NFL Focus Group," will earn its creator $1 million, an exciting twist that engages fans directly.Shane Gillis and Post Malone team up for Bud Light's 2025 ad. In one teaser, they arrive at your door with Bud Light in hand, while another shows them waiting to enjoy a beer after wrapping up their shoot. Expect laughs and laid-back vibes from this dynamic duo.The iconic Budweiser Clydesdales return in "First Delivery," which tells the heartwarming story of a young foal determined to deliver a wayward keg. Set to Bread's "Let Your Love Go," this ad promises classic storytelling with a touch of nostalgia.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Reese's is teasing an eruption of chocolate lava in its Super Bowl spot. Two clips show fans rushing toward an erupting volcano, leaving viewers curious about what sweet surprise Reese's has in store.Orlando Bloom and Drew Barrymore star in MSC Cruises' dreamy vacation-themed ad. From mispronouncing "banana" to tackling shark slides, their antics promise lighthearted fun while promoting luxury travel experiences.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
NerdWallet delivers quirky humor by featuring Kieran Culkin as the voice of a genius-level Beluga whale answering questions about personal finance. This odd yet intriguing concept aims to make financial advice more approachable.GoDaddy teams up with "Fallout" star Walton Goggins for an ad promoting his real-life eyewear brand, "Walton Goggins Goggle Glasses." The spot highlights GoDaddy Airo while blending humor with entrepreneurial spirit."Veep" star Timothy Simons struggles through a rough day on set in Coors Light's new ad. After failing to deliver his line, he finds solace in a cold Coors Light, until he's promptly replaced on set.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Willem Dafoe and Catherine O'Hara hit the pickleball court for Michelob Ultra's playful campaign. Joined by sports legends like Ryan Crouser and Randy Moss, they bring competitive energy with light beer on the line.Tim Robinson leads Totino's Pizza Rolls' outer-space-themed ad featuring Sam Richardson and even an alien visitor. With absurd humor at its core, this commercial promises to be delightfully bizarre.Peyton and Eli Manning face off in FanDuel's "Kick of Destiny 3," a live pre-game field goal showdown. With sibling rivalry at its core, this interactive campaign invites fans to pick sides and adds an extra layer of excitement before kickoff.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Häagen-Dazs delivers high-octane action with an ice cream truck chase scene. Teasers show revving engines and suspenseful moments as viewers wonder if the delivery will make it safely.Titled "A Tale As Old As Websites," Squarespace's teaser hints at an epic journey through cyberspace. While details remain scarce, expect creativity from this website-building platform's big game debut.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Telehealth company Hims & Hers is using its 60-second spot to address obesity and the weight-loss industry. The ad will highlight the company's weight-loss medications and treatment plans, aiming to spark a conversation about health and wellness during one of the year's biggest events.Taco Bell celebrates its fans by featuring customers who snapped photos at Live Más drive-thru cams. Despite Doja Cat's involvement, the focus remains on everyday people, making this ad both relatable and engaging.Super Bowl 2025 commercials promise an exciting mix of humor, nostalgia, innovation and star power. From heartfelt stories like Budweiser's foal journey to laugh-out-loud moments from Taco Bell and Pringles, brands are vying for attention in creative ways. With millions watching worldwide, these ads are poised to leave lasting impressions and perhaps even outshine the game itself.Which Super Bowl 2025 ad are you most excited to see and why? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Big rigs deliver cargo with no humans at the wheel
Are you ready to share the road with massive semi-trucks cruising down the highways next to you without a human driver? Well, that is one step closer, thanks to the groundbreaking partnership between Kodiak Robotics and Atlas Energy Solutions. These innovative companies have just pulled off something incredible. They successfully launched the first-ever commercial driverless trucking operation.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Kodiak Robotics has become the first company globally to deliver a driverless semi-truck to a customer while also being the first to generate ongoing revenue from driverless trucks. Atlas Energy Solutions, in turn, has made history as the first customer to launch a commercial delivery operation using driverless semi-trucks.Don Burnette, founder and CEO of Kodiak Robotics, tells CyberGuy, "Through this partnership, we are providing a critical service to Atlas, helping them to provide freight service in one of America's most difficult trucking environments."
YOU WON'T BELIEVE HOW FAR VOLVO'S NEW ELECTRIC SEMI-TRUCK GOES ON A SINGLE CHARGE
Atlas has successfully completed 100 loads of proppant sand deliveries using Kodiak RoboTrucks, establishing itself as the pioneer in making driverless deliveries with its own autonomous fleet. The operations span the 75,000 square mile Permian Basin in West Texas and Eastern New Mexico, showcasing the scalability and efficiency of the technology.Burnette emphasized that "before launching driverless service, we completed our safety case - Kodiak's comprehensive study that demonstrates the safety of our self-driving system - for work in the Permian Basin."
YOUR QUESTIONS ANSWERED - EXPLORING HYDROGEN-POWERED VEHICLES FOR THE FUTURE OF TRANSPORTATION
THE FUTURE OF TRUCKING ROLLS FORWARD IN SHELL'S EXPERIMENTAL BIG RIG
The high demand in the Permian Basin is driving rapid scaling of operations, enabling Kodiak to earn significant revenue from its RoboTrucks faster than any other autonomous truck company. This accelerated growth demonstrates the commercial viability of autonomous trucking technology."We are now working to extend the safety case to highways over the course of 2025," Burnette said. "This large-scale operation allows us to rapidly accumulate driverless experience, which will benefit our on-highway customers and contribute to the successful launch of our on-highway driverless operations. We believe we have a 12- to 18-month lead on launching driverless semi-trucks at scale."
TECH TURNING BIG RIGS, TRUCKS, EVEN TANKS INTO SELF-DRIVING VEHICLES
Concurrent with the RoboTruck operations, Atlas has launched the Dune Express, a 42-mile autonomous conveyor belt in the desert that delivers sand to the autonomous RoboTrucks. This integration of the RoboTrucks and the Dune Express is a key component of Atlas' strategy to automate its entire supply chain, promising increased efficiency and safety in industrial logistics.The autonomous trucking industry stands on the brink of a transformative era, with pioneering companies like Kodiak Robotics leading the charge toward a more efficient and technologically advanced transportation landscape."We are encouraged by Transportation Secretary Sean Duffy's strong commitment to creating a national regulatory framework for autonomous vehicles and are confident the new administration will ensure a clear path for innovators," Burnette said. "Ultimately, autonomous trucks will increase American competitiveness, reduce inflation, and help ensure U.S. technology leads in the 21st century. All indications suggest the industry expects the Trump administration to be favorable toward autonomous trucking. We are committed to maintaining American leadership in realizing this vision."
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
The partnership between Kodiak Robotics and Atlas Energy Solutions represents a pivotal moment in the transportation industry. By successfully deploying autonomous trucks in commercial operations, they have proven the technology's readiness, as well as its economic viability. This breakthrough is likely to accelerate the adoption of autonomous trucking across various sectors, potentially reshaping the future of logistics and supply chain management.Would you feel comfortable sharing the highway with a driverless semi-truck? Let us know by writing us at
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
Energy-saving scam uses Elon Musk's name - Here's the truth
Elon Musk
, known for leading companies like Tesla, SpaceX, Neuralink and xAI and buying and rebranding Twitter as X, often finds his name linked to innovation and futuristic ideas. But his reputation also makes him a prime target for scammers.In the past, fraudsters have used Musk's name in cryptocurrency schemes. Now, a new scam is making the rounds. This time, scammers are promoting bogus "energy-saving" devices, falsely associating Musk with these products to gain credibility. These devices, which don't work as advertised, are being marketed as revolutionary solutions, duping people into spending money on what is essentially a scam.We received this email from Rick in Wilkesboro, North Carolina: "I've been receiving emails offering an
energy-saving device
developed by Elon Musk. It claims the device can reduce energy bills by 50%. I never attempted to contact anyone associated with Elon Musk, nor have I done any internet searches for such a device. Are these emails legit or another attempt by scammers hoping I click on their links?"
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
Rick, it sounds like those emails are likely scams. There have been numerous reports of scammers using Elon Musk's name to promote fake energy-saving devices. These scams often claim that the device can drastically reduce energy bills, but there is no evidence that Elon Musk or any of his companies are involved in such products.Let's dive into how this scam works and share some ways you can stay safe.The Elon Musk energy-saving scam works by using flashy online ads,
unsolicited emails
and other deceptive tactics to lure victims. Scammers promote so-called "revolutionary" devices through social media, pop-ups, emails and even search engine ads, claiming the products are backed by Musk.These ads often include fake customer reviews, exaggerated claims of slashing electricity bills by 50% or more and time-limited discounts to create urgency. Names of devices advertised in these scams include the Power Pro Save, Heunwa Power Save, Stop Watt, Miracle Watt, True Watt, Real Watt, Watt Rescue, Esaver Watt, Pro Power Save, Voltmod and more. Clicking on these ads leads you to sales websites designed to look legitimate. They feature fake logos, doctored before-and-after photos and bogus celebrity endorsements to build trust. The sites throw around pseudo-scientific jargon like "stabilizing electrical currents" or "rebalancing loads" to sound convincing. They also use tactics like showing inflated "regular" prices crossed out to make the current offer seem like a huge bargain.If you look closely, though, the red flags are clear. These sites lack basic details like a company address, contact number or business registration information. Instead, they push you to place an order through an online form, demanding full payment upfront via credit card or PayPal.After paying, customers might receive a cheap, non-functional plastic device, or sometimes nothing at all. These devices don't reduce electricity usage. They might even waste more power. But by the time you realize it, the scammers have already pocketed your money.
DON'T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX
Over the years, plenty of power-saving scams have promised to cut down or even eliminate your electricity bill by simply plugging in their devices. The reality is that there's no device you can plug in that will actually reduce your electricity usage or lower your household bill.These products often claim to "stabilize voltage" or "reduce power waste." While voltage stabilization can be useful in industrial settings, it doesn't make much difference for typical home appliances. Most household appliances are already designed to run efficiently without the issues these devices claim to fix.If you're serious about saving on electricity, focus on
practical solutions
like upgrading to energy-efficient appliances, using smart home devices or adjusting your energy usage schedule.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
rget=_new href="https://cyberguy.com/scams/sneaky-scammers-drain-bank-account-in-clever-phone-phishing-scheme/" target="_blank" rel="nofollow noopener">
SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME
Too good to be true:
Claims of reducing energy bills by 50% or more are often exaggerated and unrealistic.
Unsolicited emails:
Receiving emails out of the blue, especially when you haven't shown interest in such products, is a common tactic used by scammers.
Use of celebrity names:
Scammers frequently use well-known names like Elon Musk to lend credibility to their schemes.
Suspicious links:
Be cautious of clicking on links in unsolicited emails. They can lead to phishing sites designed to steal your personal information.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
1. Verify the email:
Phishing emails are a common tool scammers use to trick people into buying fake products or giving away personal information. These emails often look like they're from legitimate sources, but they contain links that lead to fraudulent websites or prompt you to download malicious attachments. Always check the sender's email address and look for signs of a fake message, like poor grammar or urgent calls to action.
2. Verify claims:
If you're curious about a product, do some research from reputable sources before taking any action.
3. Do not click links:
Avoid clicking on any links or downloading attachments from these emails. Instead, hover over the link to see its true destination. This can help you identify if it leads to a legitimate site or a malicious one.
4. Have strong antivirus software actively running on your devices
: Ensure you have reliable antivirus software installed on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices
.
5. Examine the website carefully:
Scammers often create websites that look professional, but they're easy to spot with a few simple checks. Look for missing or suspicious information, like the absence of a business address, phone number or business registration details. If there are fake testimonials or celebrity endorsements, that's a red flag.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
6. Don't fall for "too good to be true" deals:
Scammers rely on offering deals that seem too good to pass up, like massive discounts or a "limited time offer." If an ad claims you can save 50% or more on a product, be skeptical. Real, quality products usually don't come with such extreme savings, and high-tech devices like those promoted by scammers rarely live up to the hype. If it feels like too good a deal, it probably is.
7. Watch out for unusual payment methods:
One of the easiest ways to spot a scam is by how the scammers ask you to pay. If a website asks for payment upfront via credit card or PayPal with no option to verify or ship the product first, it's a major red flag. Scammers take your money upfront and have no intention of sending you anything of value. Stick to reputable payment methods that offer buyer protection and avoid sites that ask for payment without proper verification.
8. Mark spam email as junk or spam:
Most email providers have a
feature
that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.
9. Do not share your email address publicly or with unknown sources:
This can reduce the chances of your email address being collected by spammers. You can also use a disposable email or
email alias
for signing up for online services that you do not trust or need.
10. Use a personal data removal service:
Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.
Check out my top picks for data removal services here.
rget=_new href="https://cyberguy.com/scams/email-didnt-expire-sneaky-scam/" target="_blank" rel="nofollow noopener">
YOUR EMAIL DIDN'T EXPIRE, IT'S JUST ANOTHER SNEAKY SCAM
Impersonation scams are a common way scammers steal your money. They often use well-known names like Elon Musk or big companies like Microsoft and Walmart to make you trust them, then trick you into giving away your financial details. To stay safe, avoid unsolicited emails or texts that promote products or offers. If you need to buy something, stick to trusted sellers like Amazon, Best Buy or other reputable platforms. Always double-check the legitimacy of any offer before making a purchase, especially if it comes from an unfamiliar source.Have you ever encountered a scam using a well-known name or brand? What happened? Let us know by writing us at
rget=_new href="http://cyberguy.com/Contact" target="_blank" rel="nofollow noopener">
Cyberguy.com/Contact
.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
.
rget=_new href="https://cyberguy.com/contact/" target="_blank" rel="nofollow noopener">
Ask Kurt a question or let us know what stories you'd like us to cover
.
Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
|
China unveils the world's fastest high-speed train with a top speed of 280 mph
In a significant advancement for high-speed rail technology, China recently unveiled the CR450 bullet train prototype in Beijing. This state-of-the-art train is a testament to
China's commitment
to leading the world in railway innovation. With a test speed of 280 mph, the CR450 is poised to break records and set new standards in the area of high-speed travel.
GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE
The CR450 is designed to operate at an impressive 248 mph, surpassing its predecessor, the CR400, which operates at 217 mph. This significant increase in speed is accompanied by a remarkable reduction in operational resistance by 22% and a weight decrease of 10%, thanks to the use of advanced materials, such as carbon fiber composites and magnesium alloys.
CALIFORNIA'S FIRST ELECTRIC TRAIN COULD BE WHAT'S COMING TO YOUR CITY
Equipped with over 4,000 sensors, the CR450 features intelligent monitoring systems that allow for real-time data collection on various operational parameters, including axle temperature and pressure. This technology enhances safety and efficiency,
enabling the train
to adapt to changing conditions autonomously.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
CHINA SETS WORLD RECORD FOR FASTEST HYPERLOOP TRAIN
Passenger comfort has not been overlooked. The CR450 includes noise
reduction technologies
that lower interior noise levels by two decibels compared to earlier models. Additionally, it offers more passenger space, expanding service areas by 4%. The design incorporates aerodynamic features aimed at minimizing air resistance, ensuring a smoother ride even at high speeds.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
MONSTER PLANE COULD REPLACE TRUCKS AND TRAINS
Safety remains a top priority with the CR450. It features a braking response time of approximately 1.7 seconds, allowing it to come to a complete stop from its operational speed within 21,325 feet, the same distance required by the CR400. Furthermore, an over-the-horizon system enhances emergency situation recognition capabilities.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
The China State Railway Group has announced plans for extensive line testing of the CR450 prototypes to refine technical specifications before entering commercial service. The goal is to integrate this advanced technology into China's already extensive high-speed rail network, which spans over 24,855 miles.
SUBSCRIBE TO KURT'S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
The unveiling of the CR450 bullet train marks an exciting chapter in high-speed rail travel. With its impressive speed, innovative technology and focus on passenger comfort, it promises to transform how we think about train travel. As China continues to lead in railway advancements, we can look forward to a future where traveling at unprecedented speeds becomes a reality for millions.What are your thoughts on whether the U.S. should strive to keep pace with or surpass China's advancements in high-speed rail technology? Do you believe investing in high-speed rail is essential for the future of transportation in America? Let us know by writing us at
Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to
Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover
Follow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. |
|