Normal view

There are new articles available, click to refresh the page.
Yesterday — 3 December 2024Main stream

Data broker blunder: More than 600,000 sensitive files exposed in data services leak

2 December 2024 at 10:00

There are companies whose entire business model is built around collecting personal data, including criminal records, employment details, addresses and more. They use this data to offer background check services to other businesses and individuals. However, while they profit from this information, they often fail to adequately protect it. Earlier this year, the National Public Data made headlines for failing to secure 2.7 billion records of people whose data it collected. Now, on a smaller scale, another data aggregator has exposed the personal information of 600,000 Americans.

ENDS TOMORROW: I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

As reported by Website Planet, the exposed database contained 644,869 PDF files, totaling 713.1 GB of sensitive data. These documents mainly consisted of background checks but also included court records, vehicle ownership details such as license plates and VINs, and property ownership reports. The background checks alone revealed highly sensitive personal data, including full names, home addresses, phone numbers, email addresses, employment details, information about family members, social media accounts and criminal histories.

The worst part is that the database was left publicly accessible without password protection or encryption, allowing anyone to grab it. Anyone with the link could view and download the files. Plus, the files were named in a way that exposed personal details, using formats like "First_Middle_Last_State.PDF." This made sensitive information visible even without opening the files.

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

The database that exposed over 600,000 records belongs to SL Data Services LLC, an information research provider that appears to prioritize convenience over basic data security. The company operates a sprawling network of around 16 websites, including Propertyrec, which advertises real estate ownership data and property records. However, SL Data Services’ business goes far beyond property records, offering services like criminal background checks, DMV records and even birth and death records.

While Propertyrec promotes its affordability, claiming users can search for documents for as little as $1, customer reviews paint a different picture. Many users report being unknowingly enrolled in subscription services, resulting in recurring charges instead of the promised one-time fees. This predatory business practice raises further questions about the company’s ethics and transparency.

BEWARE OF ENCRYPTED PDFs AS LATEST TRICK TO DELIVER MALWARE TO YOU

The exposure of sensitive personal info in this breach is a big deal for the people involved. The database has detailed data about them, and that’s basically a jackpot for cybercriminals. This kind of leak can lead to various dangerous outcomes. 

For one, attackers could use this info to run phishing scams or social engineering tricks. If they know details like your job, family or even criminal history, they can send super convincing messages to trick you into sharing even more sensitive details, like your financial info. That’s not all. Criminals could also use this leaked data to impersonate someone and apply for loans, credit cards or other services in their name.

What really gets me, though, is that most people whose info got leaked probably won’t even find out about it unless they’re using a service to remove their data. A lot of them might not have even known they were being background-checked in the first place. For those with criminal records, this kind of leak could cause major reputational damage or lead to discrimination, even if the info is outdated or flat-out wrong.

We reached out to SL Data Services/Propertyrec for a comment but did not hear back before our deadline.

1) Remove your personal information from the internet: While no service can promise to completely erase your data from the internet, using a data removal service is one of the best steps you can take. They do the heavy lifting by actively scanning and removing your personal information from hundreds of websites. This helps protect you from scammers who may cross-reference data from breaches with other information they find on the dark web. Check out my top picks for data removal services here.

2) Be wary of mailbox communications: With your address exposed, bad actors could try to scam you through physical mail. They may impersonate companies or people you trust and send fake urgent letters about things like missed deliveries, account suspensions or security alerts. Be skeptical of unexpected communications and verify any claims before taking action.

3) Be cautious of phishing attempts and use strong antivirus software: The leaked data could lead to phishing attacks via email, phone calls or messages from unknown sources. Be on high alert for any requests for personal information, especially if they seem urgent or ask you to click on suspicious links. Always verify the legitimacy of any request before responding.

To protect your devices from malicious links, make sure you have strong antivirus protection. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4) Monitor your accounts: Given the scope of this breach, it’s crucial to start regularly reviewing your bank accounts, credit card statements and other financial accounts. Keep an eye out for any unauthorized transactions and report them immediately to your bank or credit card company to prevent further damage.

5) Use strong, unique passwords: Create complex passwords for each of your online accounts and consider using a password manager to keep track of them securely.

6) Enable two-factor authentication (2FA): Implement this extra layer of security on all accounts that offer it to prevent unauthorized access.

7) Regularly update your software: Keep your operating system, apps and security tools up to date to protect against known vulnerabilities.

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

It’s alarming how many companies profit from collecting personal data, yet fail to protect it adequately. Recent breaches, including one exposing the sensitive information of 600,000 Americans, highlight this negligence. With unprotected databases containing everything from criminal records to addresses, cybercriminals have a treasure trove of information to exploit. This situation underscores the urgent need for you to take proactive steps to safeguard your privacy and demand better security practices from these data aggregators.

Should companies face stronger penalties for failing to protect personal data? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter CyberGuy's $500 Holiday Gift Card Sweepstakes

Kurt’s Best New Cyber Monday Deals

Copyright 2024 CyberGuy.com. All rights reserved.

9 ways scammers can use your phone number to try to trick you

1 December 2024 at 10:00

Scammers have various methods when it comes to getting their hands on your phone number. You might think, "Well, what's the big deal? Isn't it easy to find someone's number these days, no matter what?" Yes. And if you've already had your fair share of telemarketers call you, maybe you feel like you've got it under control.

The problem is that scammers with the right knowledge and the wrong intentions can wreak havoc just by having your phone number in their possession. 

Once they do, they can use it to trick you in all sorts of ways. 

The good news is that by familiarizing yourself with their tactics, you can be one step closer to preventing yourself from falling victim to them. Here's what you need to know.

2 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24, 12 pm PT)

In today’s digital age, your phone number is more than just a way for friends and family to reach you. It can be a gateway for scammers to access your personal information and wreak havoc on your life. From phishing attempts to extortion, the risks are numerous and varied. Here are nine ways scammers can exploit your phone number if it falls into the wrong hands:

Scammers can also use your phone number to launch rather easy phishing attacks. They might send text messages or make calls posing as your bank or a popular online service that you subscribe to. The goal is to call you and trick you into providing login credentials, credit card details or other personal information, which they can then use for fraudulent activities. And once they have all your other information, they can do a lot more damage just by having your phone number as that initial segue.

In some cases, scammers use your phone number for extortion or blackmail. They may claim to have compromising information about you and demand payment to keep it private. By contacting you directly, they can apply continuous pressure, making their threats seem more real and immediate.

One unique way they do this to target elderly people is by pretending to be your grandchild or another relative in distress. The scammer often claims that your grandchild is in an emergency situation — such as needing bail money or medical assistance — and urgently requests financial help. With AI voice cloning technology, they may even be able to use your grandchild's voice. This emotional manipulation usually gets the victim to pay up.

This one may not be as dramatic, but your phone number can be sold to robocall and spam message services. These automated systems bombard you with unwanted calls and texts, often promoting scams or fraudulent products. While these may seem like minor annoyances, they can lead to bigger scams if you engage with the messages or follow their instructions. Hang up on them.

HOW TO STOP ANNOYING ROBOCALLS

Phone number spoofing is a common tactic where scammers disguise their caller ID to appear as a trusted contact by calling from what appears to be a familiar number as it may have the same area code where you live, an area code where your friends or family live or even the actual phone number of someone close which you can recognize.

This makes it more likely that you'll answer the call, giving them the opportunity to deceive you into revealing personal information or transferring money. This is, of course, the case when phone spoofing is used against you. But in situations where they use YOUR phone number, they can be scamming those close to you without you even knowing!

With these phone spoofing tactics, scammers can use your phone number to impersonate government officials, such as IRS agents or Social Security administrators. They may call you claiming there’s an urgent issue, like unpaid taxes or suspicious activity involving your Social Security number. This ploy often involves threats of legal action or arrest to pressure you into providing sensitive information or making immediate payments.

Instead of pretending to be from a government agency, another trick is for scammers to try their luck by posing as a representative from a utility company, like an electric or water company. Scammers will claim that you have an overdue invoice and threaten to cut off your service unless you pay immediately. Using your phone number, they can contact you repeatedly, making the scam seem more legitimate (and pressing).

SIM swapping or a port-out scam is when scammers transfer your phone number to a new SIM card in their possession. By convincing your mobile carrier to reroute your number, they can receive all your calls and messages, including those containing two-factor authentication codes. This allows them to bypass security measures and take over your online accounts.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

With SIM swapping techniques/port-out, scammers can also use your phone number as a key to access sensitive data stored in your online accounts. By initiating password resets and intercepting verification codes sent via SMS, they can gain unauthorized access to your email, social media and banking accounts, leading to significant personal and financial damage.

Finally, scammers can use all the tactics above to not only access the accounts you already have but also create fake online accounts in your name. These accounts can be used for a variety of malicious purposes, such as spreading malware, launching further scams or conducting identity theft. The presence of your phone number makes these accounts appear more legitimate, increasing the chances of deceiving others.

10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE'S SECURITY AND PRIVACY

To protect your phone number from falling into the hands of scammers, here’s what you can do:

1. Be cautious about sharing your phone number publicly: Avoid posting your phone number on public forums, websites or social media platforms where it can be easily accessed by scammers.

2. Limit exposure of your phone number on social media and other online platforms: Use privacy settings to restrict who can see your contact information. Most social media platforms and online services offer privacy settings that allow you to control who can view your personal information. Make sure to review and adjust these settings regularly. Only share your phone number with trusted contacts.

3. Consider using a secondary number for online registrations and transactions: Services like Google Voice can provide you with a secondary number that you can use for online activities, keeping your primary number private.

4. Monitor your accounts regularly for unusual activity: Check your bank accounts, email and other online accounts for any signs of unauthorized access or suspicious activity.

5. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Use two-factor authentication apps instead of SMS-based verification where possible: Two-factor authentication (2FA) provides an extra layer of security that is more difficult for scammers to bypass compared to SMS-based verification.

7. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

8. Remove your personal information from the internet: While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 

GET FOX BUSINESS ON THE GO BY CLICKING HERE

If you suspect that scammers already have your phone number, take the following steps:

Contact your mobile carrier to alert them of the scam calls, especially if they come from the same number. Your carrier may be able to block the number or provide additional security measures.

Consider changing your phone number if the issue persists: If scam calls continue despite your efforts, changing your phone number may be the best solution.

Report any suspicious activity to the appropriate authorities: Contact your local law enforcement or consumer protection agency to report scams and seek advice on further actions.

Consider placing fraud alerts on your accounts: Fraud alerts can help protect your credit and financial accounts from unauthorized access.

Monitor your phone for unusual calls or messages: Keep an eye out for any unexpected calls or messages, and do not respond to them.

Check your phone bill for unauthorized charges: Regularly review your phone bill to ensure there are no unexpected charges, which could indicate that your number has been used fraudulently.

By following these steps, you can significantly reduce the risk of falling victim to phone number scams and protect your personal information.

RECLAIM YOUR PRIVACY BY DISABLING YOUR CELL PHONE CARRIER'S DATA TRACKING

Scams have become much more sophisticated these days, especially with artificial intelligence, making it easier for scammers to target more people and get away with it. Always be wary of a scam. If you think something seems strange, it's probably best to go with your gut.

Have you ever experienced a scam involving your phone number? If so, how did you handle it? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

Artificial intelligence changes across the US

29 November 2024 at 19:21

An increasing number of companies are using artificial intelligence (AI) for everyday tasks. Much of the technology is helping with productivity and keeping the public safer. However, some industries are pushing back against certain aspects of AI. And some industry leaders are working to balance the good and the bad.

"We are looking at critical infrastructure owners and operators, businesses from water and health care and transportation and communication, some of which are starting to integrate some of these AI capabilities," said U.S. Cybersecurity and Infrastructure Security Agency Director Jen Easterly. "We want to make sure that they're integrating them in a way where they are not introducing a lot of new risk."

US AGRICULTURE INDUSTRY TESTS ARTIFICIAL INTELLIGENCE: 'A LOT OF POTENTIAL'

Consulting firm Deloitte recently surveyed leaders of business organizations from around the world. The findings showed uncertainty over government regulations was a bigger issue than actually implementing AI technology. When asked about the top barrier to deploying AI tools, 36% ranked regulatory compliance first, 30% said difficulty managing risks, and 29% said lack of a governance model.

Easterly says despite some of the risks AI can pose, she said she is not surprised that the government has not taken more steps to regulate the technology.

"These are going to be the most powerful technologies of our century, probably more," Easterly said. "Most of these technologies are being built by private companies that are incentivized to provide returns for their shareholders. So we do need to ensure that government has a role in establishing safeguards to ensure that these technologies are being built in a way that prioritizes security. And that's where I think that Congress can have a role in ensuring that these technologies are as safe and secure to be used and implemented by the American people."

Congress has considered overarching protections for AI, but it has mostly been state governments enacting the rules.

"There are certainly many things that are positive about what AI does. It also, when fallen into the hands of bad actors, it can destroy [the music] industry," said Gov. Bill Lee, R-Tenn., while signing state legislation in March to protect musicians from AI. 

The Ensuring Likeness Voice and Image Security Act, or ELVIS Act, classifies vocal likeness as a property right. Lee signed the legislation this year, making Tennessee the first state to enact protections for singers. Illinois and California have since passed similar laws. Other states, including Tennessee, have laws that determine names, photographs and likenesses are also considered a property right.

"Our voices and likenesses are indelible parts of us that have enabled us to showcase our talents and grow our audiences, not mere digital kibble for a machine to duplicate without consent," country recording artist Lainey Wilson said during a congressional hearing on AI and intellectual property.

AI HORROR FLICK STAR KATHERINE WATERSTON ADMITS NEW TECH IS ‘TERRIFYING’

Wilson argued her image and likeness were used through AI to sell products that she had not previously endorsed.

"For decades, we have taken advantage of technology that, frankly, was not created to be secure. It was created for speed to market or cool features. And frankly, that's why we have cybersecurity," Easterly said.

The Federal Trade Commission (FTC) has cracked down on some deceptive AI marketing techniques. It launched "Operation AI Comply" in September, which tackles unfair and deceptive business practices using AI, such as fake reviews written by chatbots.

"I am a technologist at heart, and I am an optimist at heart. And so I am incredibly excited about some of these capabilities. And I am not concerned about some of the Skynet things. I do want to make sure that this technology is designed and developed and tested and delivered in a way to ensure that security is prioritized," Easterly said.

Chatbots have had some good reviews. Hawaii approved a law this year to invest more in research utilizing AI tools in the health care field. It comes as one study finds, OpenAI’s chatbot outperformed doctors in diagnosing medical conditions. The experiment compared doctors using ChatGPT with those using conventional resources. Both groups scored around 75% accuracy, while the chatbot alone scored above 90%.

AI isn’t just being used for disease detection, it’s also helping emergency crews detect catastrophic events. After deadly wildfires devastated Maui, Hawaii state lawmakers also allocated funds to the University of Hawaii to map statewide wildfire risks and improve forecasting technologies. It also includes $1 million for an AI-driven platform. Hawaiian Electric is also deploying high-resolution cameras across the state.

AI DETECTS WOMAN’S BREAST CANCER AFTER ROUTINE SCREENING MISSED IT: 'DEEPLY GRATEFUL'

"It will learn over months over years to be more sensitive to what is a fire and what is not," said Energy Department Under Secretary for AI and Technology Dimitri Kusnezov.

California and Colorado have similar technology. Within minutes, the AI can detect when a fire begins and where it may spread.

AI is also being used to keep students safe. Several school districts around the country now have firearm detection systems. One in Utah notifies officials within seconds of when a gun might be on campus.

"We want to create an inviting, educational environment that's secure. But we don't want the security to impact the education," said Park City, Utah, School District CEO Michael Tanner.

Maryland and Massachusetts are also considering state funds to implement similar technology. Both states voted to establish commissions to study emerging firearm technologies. Maryland’s commission will determine whether to use school construction funding to build the systems. Massachusetts members will look at risks associated with the new technology.

"We want to use these capabilities to ensure that we can better defend the critical infrastructure that Americans rely on every hour of every day," Easterly said.

The European Union passed regulations for AI this year. It ranks risks from minimal, which have no regulations, to unacceptable, which are banned. Chatbots are classified as specific transparency and are required to inform users they are interacting with a machine. Software for critical infrastructure is considered high risk and must comply with strict requirements. Most technology that profiles individuals or uses public images to build-up databases is considered unacceptable.

The U.S. has some guidelines for AI use and implementation, but experts say they believe it will not go as far as the EU classifying risks.

"We need to stay ahead in America to ensure that we win this race for artificial intelligence. And so it takes the investment, it takes the innovation," Easterly said. "We have to be an engine of innovation that makes America the greatest economy on the face of the earth."

US agriculture industry tests artificial intelligence: 'A lot of potential'

28 November 2024 at 19:25

In the 1930s, there were around 6.8 million farms in the United States. The size averaged at around 155 acres. Over the next several decades, the number of farms rapidly declined to around 1.9 million in 2023. Those farms grew larger, averaging around 464 acres.

As farming has changed over time, experts believe artificial intelligence (AI) can help farmers and producers make food faster and more efficiently.

FARMERS 'BRUTALIZED' AS COSTS 'GO THROUGH THE ROOF' IN LAST DAYS OF BIDEN'S AMERICA

"I think there's a lot of potential for both increasing productivity on the crop side, but also for reducing the amount of resources that we use on the productivity side. There's the data that we can actually collect to increase yields and improve the nutritional quality. But then there's also the facilitate facilitating of reductions in labor availability," said Mason Earles, an assistant professor at UC Davis in the departments of Viticulture & Enology and Biological & Agricultural Engineering and researcher at the AI Institute for Next Generation Food Systems or AIFS.

The most recent data shows 41% of farmers reported labor shortages in 2018. That’s a 27% increase from those reporting shortages in 2014. The trend is expected to continue. The Bureau of Labor Statistics projects a 2% decline in workers through 2033 despite the number of job openings remaining the same.

"We do more with less. It's not that it has no set way and has totally changed the traditional work, it is empowering, and it is increasing the productivity of existing workers," said Ilias Tagkopoulos, a computer science professor at UC Davis and the director of AIFS.

AIFS is funded through a grant from the USDA Institute of Food and Agriculture. It is part of USDA’s effort to conduct more research on utilizing Artificial Intelligence in agriculture.

RURAL AMERICANS ARE MAD – AND THEY GAVE DEMOCRATS A RECKONING

"One of the big things that I specifically focus on, and we work at the Institute for Food Systems is trying to say, how can I make an impact in agriculture and food systems across the board? Whether that has to do with production of different types of vegetables, fruits, nuts, other types of meats or other types of foods," Earles said. "There’s a lot of potential, we think, all the way from going from the research and lab side through startups, through corporate innovation. And we're here to kind of find a way to facilitate and integrate that along the way."

A USDA study shows just 27% of farmers are using emerging technologies like Artificial Intelligence. Investment is expected to grow across the industry from more than $2 billion this year to more than $5 in 2028.

"What our vision is, is how can we have a healthier society and a more sustainable planet? Our mission is to leverage AI to build that, to help towards that goal," Tagkopoulos said. "AI is doing two things. One is making businesses more productive. And the second is to accelerate innovation. It accelerates innovation by actually focusing on what matters versus what's out there."

Researchers are looking into how AI hardware like sensors or robotics can better gather data in the field.

"One of the powers of AI is that it can process a massive amount of data in a very short amount of time and achieve really high performance in pattern recognition," Earles said.

The technology can help farmers decide where to apply fertilizer and when the best opportunities for harvest might be.

AI BEING USED TO RUN WORLD’S FIRST INDOOR VERTICAL BERRY FARM

"There's great examples out there of being able to process millions of images within the course of every hour to identify where there might be damage due to weeds, presence of weeds or disease or pest, and be able to use various types of either implements to precisely remove those weeds or pests so that the farmer see higher yields. And the consumer sees better fruit, veggies and other products that are coming out of those fields," Earles said.

One USDA project at the University of Arkansas is looking at using virtual reality to process poultry. Researchers will study whether robots can be used in the field while workers control the devices virtually. While fewer workers are expected to be needed, the cost of the equipment is high.

"The question there is how can you make this technology even more cost-effective and the even more practical, which is always a challenge," Tagkopoulos said.

Controlled environments or indoor farming also see high upfront costs. But some studies have shown that higher crop yields are possible because of fewer weather-related challenges and the ability to grow year-round.

"We see in the future more data being generated, more tools becoming available, easier, much less expensive in terms of AI tools to be able to give recommendations on when to irrigate, when to farm, where to sell. A lot of more collaboration among farmers because now they understand more that they need to share their data. And it's not about competition. It's about everybody winning out of it," Tagkopoulos said.

Controlled environments have received a lot of funding in the past few years. The USDA recently broke ground on a project at Cornell University to research grapes. The National Grape Improvement Center will help scientists study climate adaptable grape varieties and management strategies for growers.

"The opportunity to grow fruits and veggies and other types of crops where they may not otherwise be able to grow has huge potential for delivering all sorts of foods, fresh foods and nutritious foods to urban and or other areas," Earles said. "AI has the real potential to help us understand how to regulate those types of indoor climates so that it can optimize the output."

Amazon’s VP explains how to protect yourself from holiday impersonation scams

28 November 2024 at 06:00

Black Friday is around the corner, and by the time you finish your Thanksgiving leftovers, Christmas will already be knocking. That might be an exaggeration, but what’s not is the rise in impersonation scams as the holiday season approaches. 

With shopping in full swing, Amazon becomes an especially big target. Expect to see bad actors pretending to be trusted contacts, trying to access sensitive information like Social Security numbers, bank details or Amazon account credentials.

To help you enjoy a scam-free shopping experience this holiday season, we spoke with Scott Knapp, VP of Worldwide Buyer Risk Prevention at Amazon, to learn how scammers impersonate the platform, what Amazon is doing to fight holiday scams and how you can stay safe.

5 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS(ends 12/2/24 12 pm PT)

Amazon is the world’s largest e-commerce platform, and it becomes even more relevant during the holiday season. With so many of us hunting for deals, scammers are well aware and ready to take advantage. They often use impersonation scams to trick shoppers into handing over card details or other sensitive information.

"During the 2023 holiday shopping season (Black Friday through Christmas Day), the most commonly reported impersonation scam by Amazon customers involved fake order or shipping confirmations claiming that payment was required in the U.S. There was nearly a 1.5x increase in reports of this scam from three weeks prior," Knapp said. 

Another common impersonation scam around this time involves fake purchase alerts for popular tech products. Knapp said that Amazon saw about a 13x spike in customer reports compared to three weeks earlier.

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

It’s clear that many scammers are trying to target Amazon customers, so I wanted to understand what the company is doing to keep them safe. I asked Knapp a bunch of questions about how the e-tail giant is staying ahead of the latest online holiday scams, and you can read his responses below.

How is Amazon working to take down phishing websites and phone numbers used in impersonation schemes?

"Our goal is to ensure that customers are protected when they shop on Amazon. That is why we are initiating the takedown of scammers with public-private partnerships to hold bad actors accountable. We have a team – including machine learning scientists and expert investigators – who protect our store and consumers from fraud and other forms of abuse.

"In 2023 alone, we initiated takedowns of more than 40,000 phishing websites and 10,000 phone numbers being used as part of impersonation schemes. We can take down reported scam phone numbers the same day and phishing websites in just a couple of hours. We also partner with law enforcement across the globe to ensure scammers are held accountable, including having referred hundreds of bad actors to authorities."

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Can you explain how Amazon's email verification technology helps identify phishing attempts?

"We’ve made it harder for bad actors to impersonate Amazon communications through implementing industry-leading tools, including the adoption of a secure email capability to make it easier for customers to identify authentic emails from Amazon and avoid phishing attempts. Customers using Gmail, Yahoo, and other common email providers can be confident that when they receive an @amazon.com email with the smile logo in their inbox, that email is really from us."

Can you explain Amazon's A-to-z Guarantee and how it protects holiday shoppers?

"More than 60% of sales in Amazon’s store are from independent sellers—most of which are small and medium-sized businesses—providing a vast selection of amazing products, competitive prices, and convenience for consumers. When customers shop in the Amazon store, they can do so with peace of mind knowing that we stand behind the products sold in our store with the A-to-Z Guarantee.

"When a claim is filed, Amazon combines our advanced fraud and abuse detection systems with external, independent insurance specialists to analyze filings, take on the investigative work for our selling partners, present valid claims, and deny unsubstantiated, frivolous, or abusive claims. By doing this work on behalf of sellers, we save them from having to investigate these claims on their own. Innovating this process enables customers to shop confidently, which in turn drives selling partner success.

"Amazon’s protection applies to physical products purchased in our store worldwide, and in the unlikely event that customers experience issues with timely delivery or the condition of their purchase, whether purchased from Amazon or one of our approximately two million selling partners, Amazon will make it right by refunding or replacing it. Whether during the holiday shopping season, or anytime throughout the year, customers can confidently shop Amazon’s vast selection of amazing products with the A-to-z Guarantee."

BEWARE OF ENCRYPTED PDFs AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

1. Watch out for red flags: Some telltale signs of an impersonation scam include requests for account or payment information and creating a false sense of urgency. Amazon will never ask for your password, payment or bank transfer through phone, email or any external website. Scammers might reference a purchase (real or fake), a giveaway, a prize or claim that "your account is locked," urging you to click a link, make a payment or buy a gift card.

2. Verify the email: For any questions related to an order, always check your order history on Amazon.com or via the "Amazon Shopping" app. Only legitimate purchases will appear in your order history. If you are ever unsure about the legitimacy of an email, go to Amazon’s website or app to access the Message Center and review authentic communications.

In addition, you should always check the sender’s email address by hovering over the "From" name and verify it’s a genuine Amazon email, which will come from "@amazon.com."

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Beware of phishing links: Avoid clicking on random links, especially in messages about shopping deals, order confirmations or account issues. Scammers often use fake links to mimic legitimate retailers and steal your information. 

The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Don’t fall for "too good to be true" offers: Scammers often lure victims with irresistible deals, such as huge discounts on popular products or "exclusive" offers. If an offer seems too good to be true, it probably is. These offers might be tied to fake websites or phishing attempts designed to steal your personal and financial details. Always double-check the legitimacy of any deal before making a purchase. If you’re unsure, visit the official Amazon site or app to search for the product and compare prices.

5. Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams during the busy holiday season.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

6. Report suspicious activity: If you encounter an impersonation scam, your best course of action is to report it to Amazon. Knapp says, "The more consumers report scams to us, the better our tools get at identifying bad actors so that we can take action against them and protect consumers. If consumers suspect that they have encountered a scam, they can report suspicious communications to us at amazon.com/ReportAScam, so that we can protect their accounts and refer bad actors to law enforcement to help keep consumers safe."

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

Scammers will do their best to ruin your holiday season, but most of their tactics can be easily avoided with the right tools and a little common sense. Be cautious of unsolicited texts, emails or phone calls offering deals, discounts or asking for your personal information. If you're shopping on Amazon, track everything through the Amazon app and reach out to their customer support for any concerns or questions.

What features or tools do you wish online retailers would implement to enhance customer security during peak shopping times? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter CyberGuy's $500 Holiday Gift Card Sweepstakes

KURT’S HOLIDAY GIFT GUIDES 

Deals: Unbeatable Best Black Friday deals | Laptops | Desktops | Printers 

Best gifts for Men | Women | Kids | Teens | Pet lovers 

Copyright 2024 CyberGuy.com. All rights reserved.

6 sneaky gift card scams to watch out for this holiday season

27 November 2024 at 10:00

With the holiday season just around the corner, many of us are gearing up to spread some cheer with gift cards. 

However, it’s important to remember that these convenient gifts are also a favorite target for scammers. We're going to break down six sneaky gift card tricks that could leave you out of pocket during this time of year. 

Don’t worry, though. We’ve got your back with solid tips on how to outsmart these scammers and keep your hard-earned cash safe.

6 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS

One of the latest gift card tricks involves tampering with the gift cards on the display racks at retail stores. Scammers will record the activation code on the card or place a custom barcode sticker over the real barcode, which allows them to secretly load the cash onto their own card immediately after you purchase the gift card. This means that when you or your recipient try to use the gift card, it will be empty or invalid.

Check the packaging of the gift card before buying it. Look for signs of tampering, such as the wrapping being torn or resealed or stickers placed over the barcode or card number. Also, choose a card from the back of the rack, as scammers often place their fraudulent cards at the front of the display.

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME

Another common gift card trick scammers use involves impersonating someone you know or trust, such as a family member, a romantic interest, a company or the government. Scammers will contact you by phone, text, email or social media and create a fake story or emergency that requires you to send them money urgently.

They will ask you to buy a gift card or multiple gift cards and then send them a photo of the card or the numbers on the back of the card. Once they have the gift card information, they will disappear with your money and cut off contact.

Never send money or gift cards to anyone you don’t know personally or haven’t met in person. If someone claims to be someone you know or trust, verify their identity by contacting them directly through a different channel.

Don’t trust caller ID, as scammers can spoof phone numbers. Don’t be pressured by threats or promises, as scammers use emotional manipulation to get you to act quickly and without thinking. And remember, no legitimate company or government agency will ever ask you to pay them with a gift card.

HARDEST LESSON I LEARNED ABOUT GIFT CARDS LAST HOLIDAY SEASON

Another gift card trick involves buying or selling gift cards on online platforms, such as websites, apps or social media groups. Scammers will offer to sell you gift cards at a discounted price or buy your unwanted gift cards for cash.

However, they will either send you a fake or empty gift card or take your gift card information and money without sending you anything in return. They may also use stolen credit cards or hacked accounts to buy or sell gift cards, which can put you at risk of fraud or identity theft.

Only buy or sell gift cards from reputable sources, such as official retailers, authorized resellers or trusted friends and family. Avoid buying or selling gift cards from strangers online, especially if they offer a deal that sounds too good to be true.

Don’t share your gift card information or personal details with anyone you don’t know or trust. And use a secure payment method that offers protection, such as a credit card or PayPal, instead of a gift card, wire transfer or cash.

HOW TO RECYCLE YOUR OLD ELECTRONICS INTO AMAZON GIFT CARDS 

A very popular gift card trick this holiday season involves phishing, which is a type of online fraud that tries to trick you into revealing your personal or financial information. Scammers will send you an email, text or pop-up message that looks like it comes from a legitimate company, such as a retailer, bank or tech support service.

They will claim that there is a problem with your account, your order, your device or your security and that you need to verify your identity, update your information or fix an issue. They will then ask you to click on a link, open an attachment or call a number and then request that you pay them with a gift card or provide them with your gift card information.

Never click on links, open attachments or call numbers from unsolicited messages, as they may lead to fake or malicious websites or software. Don’t provide any personal or financial information, such as your passwords, PINs, account numbers or gift card numbers, to anyone who contacts you unexpectedly.

Don’t trust messages that create a sense of urgency, pressure or fear, as they are designed to make you act without thinking. If you have any doubts about the legitimacy of a message, contact the company directly using a verified website, phone number or email address.

Using antivirus protection will help to protect you against scammers and hackers who try to steal your money and personal information using gift card tricks, especially through phishing. The best way to protect yourself from clicking on any malicious links, fake websites, phishing emails and text messages is to have strong antivirus protection installed and actively running on all your devices. It’s the best to help stop and alert you of any malware in your system and ultimately protect you from being hacked. 

Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

This gift card trick involves loyalty programs, which are rewards programs that offer you points, discounts or freebies for being a loyal customer. Scammers will pretend to be representatives of a loyalty program that you are a member of or that you are eligible to join.

They will tell you that you have won a prize, sweepstakes or a promotion and that you need to pay a fee, a tax or a shipping cost to claim it. They will then ask you to pay them with a gift card or provide them with your gift card information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Be wary of any unsolicited offers or notifications that claim that you have won something, especially if you don’t remember entering or signing up for anything. Don’t pay any money or fees to receive a prize, as legitimate loyalty programs will never ask you to do that. Don’t provide any personal or financial information, such as your passwords, account numbers or gift card numbers, to anyone who contacts you unexpectedly.

Don’t trust messages that create a sense of excitement, curiosity or greed, as they are designed to make you act impulsively. If you have any doubts about the legitimacy of a message, contact the loyalty program directly using a verified website, phone number or email address.

In this scam, fraudsters set up fake websites or phone services that claim to check the balance of your gift cards. Victims are lured into providing their gift card numbers and PINs under the guise of verifying their balance. Once the information is entered, scammers can drain the funds from the card almost immediately.

To avoid this scam, always use official websites or apps from reputable retailers to check your gift card balance. Be wary of unsolicited calls or messages asking for your gift card information, especially if they claim to be from a legitimate company. It is important never to enter your gift card details on unfamiliar websites.

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

Below are some next steps if you find you or your loved one is a victim of identity theft as a result of a gift card trick by scammers or hackers.

1. If you can regain control of your accountschange your passwords and inform the account provider.

2. Look through bank statements and checking account transactions to see where outlier activity started.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Some of the best parts of using an identity theft protection service include identity theft insurance to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

4. Report any breaches to official government agencies like the Federal Trade Commission and the gift card company.

5. Get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft and if being a victim of criminal identity theft leaves you unable to secure employment or housing.

6. Alert all three major credit bureaus and possibly place a fraud alert on your credit report.

7. Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.

If you are a victim of identity theft because of a gift card scam, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm. 

As we head into the holiday season, it’s important to keep an eye out for these six gift card scams we’ve talked about. If something feels off or sounds too good to be true, trust your gut and don’t be afraid to ask questions or walk away. Gift cards are meant to bring joy, not stress, so keep these tips in mind as you shop and share this season.

Have you ever fallen victim to a gift card scam? If so, how did it happen, and what did you do? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Don't chance it. Secure your retirement accounts with a VPN and protect your future

26 November 2024 at 06:00

Protecting your financial future goes beyond smart investing and saving. It's crucial to safeguard your retirement accounts from cyber threats. While many believe that using public Wi-Fi to check their 401(k) or IRA is harmless, the reality is that without proper protection, you could be putting your hard-earned savings at risk. Let's explore why using a VPN (virtual private network) is essential for securing your retirement accounts and how you can implement this extra layer of security.

1 WEEK LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

VPNs operate through two primary mechanisms: IP address masking and data encryption. When you connect to a VPN, it hides your real IP address by assigning you a new one from their server network, effectively preventing websites and cyber criminals from tracking your location or identifying you based on your IP address.

Simultaneously, VPNs encrypt all data transmitted between your device and the internet, rendering it unreadable to anyone who might attempt to intercept it. This encryption process ensures that sensitive information, such as credit card details, remains confidential throughout your online activities. By combining these two powerful features, VPNs create a secure tunnel for your internet traffic, significantly enhancing your online privacy and security.

When you access your retirement accounts online, especially through public Wi-Fi networks, you're potentially exposing sensitive financial information to cybercriminals. These hackers can intercept your data, steal your login credentials and potentially drain your accounts. What's more concerning is that retirement accounts are often less frequently monitored than regular bank accounts, making them an attractive target for cybercriminals.

BEST ANTIVIRUS FOR PCS, MACS, IPHONES AND ANDROIDS – CYBERGUY PICKS

By creating an encrypted tunnel for your internet traffic, a VPN makes it extremely difficult for hackers to intercept your sensitive data. Here's a deeper look at why VPNs are indispensable for safeguarding your retirement accounts:

VPNs employ military-grade encryption protocols, such as AES-256, to scramble your data. This means that even if a cybercriminal manages to intercept your information, it would appear as an indecipherable jumble of characters. For your retirement accounts, this translates to an extra layer of security for your login credentials, account numbers and financial transactions.

By masking your IP address and replacing it with one from their servers, VPNs make it significantly harder for malicious actors to track your online activities. This anonymity is crucial when accessing financial accounts, as it prevents cybercriminals from identifying you as a high-value target based on your browsing habits or the financial institutions you visit online.

The ability to check your accounts while traveling or using public Wi-Fi is convenient but risky. A VPN provides a secure connection, essentially creating a protected tunnel between your device and the financial institution's servers. This is particularly important for retirement accounts, which may not have the same level of fraud protection as checking or savings accounts. However, check if your retirement fund platform permits VPN usage, as some might flag it as unusual activity. 

VPNs are excellent safeguards against man-in-the-middle attacks, where hackers position themselves between you and the website you're trying to access. By encrypting your data from end to end, VPNs make it nearly impossible for attackers to insert themselves into your connection and steal your information.

If you're traveling abroad and need to access your U.S.-based retirement accounts, some financial institutions may block access from foreign IP addresses. A VPN allows you to connect through a U.S.-based server, ensuring you can manage your accounts securely from anywhere in the world.

THINK TWICE BEFORE USING A PUBLIC COMPUTER: HERE'S WHY

To ensure the security of your retirement accounts, follow these steps:

1) Choose a reliable VPN: Select a reputable VPN service with strong encryption protocols. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

2) Always use VPN on public Wi-Fi: Never access financial accounts on public networks without activating your VPN first.

3) Enable two-factor authentication (2FA): Add an extra layer of security to your accounts by enabling 2FA.

4) Use strong, unique passwords: Create complex passwords for each of your accounts and consider using a password manager. Consider using a password manager to generate and store complex passwords.

5) Regularly monitor your accounts: Check your retirement accounts frequently for any suspicious activity.

6) Keep software updated: Ensure your devices and apps are always up to date with the latest security patches.

7) Be wary of phishing attempts: Don't click on suspicious links or provide personal information in response to unsolicited emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Securing your retirement accounts is not just about protecting your current savings; it's about safeguarding your future. By implementing a VPN and following best security practices, you're taking proactive steps to ensure that the nest egg you've worked so hard to build remains safe and secure. Remember, the small investment in a quality VPN service is negligible compared to the potential losses from a compromised retirement account.

Have you ever experienced a security breach? If so, what happened, and how did you respond to it? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

KURT’S HOLIDAY GIFT GUIDES 

Deals: Unbeatable Best Black Friday deals | Laptops | Desktops | Printers

Best gifts for Men | Women | Kids | Teens | Pet lovers

Copyright 2024 CyberGuy.com. All rights reserved.

North Korean hackers use disguised apps to target Macs with hidden malware

25 November 2024 at 10:00

Macs are safer than Windows PCs, but they’re not foolproof. Hackers occasionally find ways to infect Apple devices, and in most cases, we’re the ones who allow it. Since infiltrating Apple’s App Store is difficult, hackers trick people into downloading apps from third-party stores or random websites.

These apps look legitimate but are actually tools for infecting devices with malicious software. A recent incident highlights this issue, with North Korean hackers targeting Macs by hiding malware in seemingly harmless macOS apps.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

Recent discoveries by Jamf Threat Labs have unveiled a sneaky form of malware targeting macOS computers. While it may sound technical, understanding the basics of how this malware operates can help you stay safe online.

This malware hides in seemingly harmless applications, such as a game called Minesweeper and a note-taking app referred to as a Notepad. These apps function as expected, but behind the scenes, they run malicious programs that could allow hackers to take control of your computer.

The apps use a technology called Flutter, a tool often used to create apps that work on multiple devices like phones and computers. Flutter makes it easier for app developers to design their software, but its unique structure also helps hackers hide their malicious code, making it harder for experts to detect.

Once installed, the malware connects to a remote server (think of it as a command center for hackers) to receive instructions. These instructions could include running commands on your computer without your knowledge. One trick this malware uses is running AppleScripts, a type of script built for macOS systems, which can quietly execute commands to steal your data or even control your device.

Even scarier, some versions of this malware had been signed and approved by Apple’s security system before experts caught on. This means the hackers were testing how far they could push their schemes without raising suspicion.

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

This malware isn’t just a random act of cybercrime, it has ties to tactics and techniques often associated with North Korean hackers. Experts have identified similarities between this malware and previous attacks linked to North Korea, including the use of certain coding methods and domains that the country’s cyber teams are known to exploit.

North Korea has a history of using cyberattacks to fund its operations or disrupt systems worldwide, often targeting financial systems or vulnerable individuals. In this case, the malware seems to be in the testing phase, potentially laying the groundwork for a larger attack in the future.

The apps containing the malware were designed to look harmless. These tactics suggest a focus on tricking people through social engineering, a method North Korean hackers have used in the past.

By embedding the malware within apps that appear useful or fun, the attackers can increase the chances of someone downloading and using the infected software. While this particular malware has not yet been linked to active attacks, its connection to North Korea’s cyber playbook is a strong indicator of potential risks ahead.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

1) Use reliable antivirus software: A strong antivirus program is your first line of defense against malicious links and malware that could steal your private information. Avoid clicking on random links, especially in emails or messages that claim to be urgent or demand updates. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. It can also warn you about phishing emails and ransomware scams, helping to keep your personal data and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2) Be careful with downloads and links: Only download apps from trusted sources like the Mac App Store or official websites of known developers. Hackers often disguise malware as legitimate updates or harmless apps.

3) Keep your software up to date: Regular updates for macOS and installed apps are essential because they patch security flaws. Apple frequently rolls out updates to address vulnerabilities, so enabling automatic updates ensures you stay protected without the hassle of manually checking for them.

4) Use strong, unique passwords: A strong password can help keep your Mac safe from unauthorized access. Avoid reusing passwords across different accounts. A password manager can be incredibly helpful here—it generates and stores complex passwords for you, making them difficult for hackers to crack.

It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2024 here.

5) Enable two-factor authentication (2FA): Activate 2FA for key accounts like your Apple ID, email, and financial services. This adds a second layer of security, making it much harder for attackers to access your accounts—even if they have your password.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

I've noticed a significant rise in malware hiding in seemingly harmless apps, whether it's related to Mac, Windows, Android, or even iPhones. It just shows that no device is completely safe, not even one made by Apple. Hackers, including those backed by North Korea, are constantly finding new ways to trick users into downloading malicious software. These attacks often fly under the radar because they look like regular, safe apps. With these threats becoming more sophisticated, it’s more important than ever to stay aware of the risks and be cautious about what you download and click on.

Do you trust third-party app stores or only use official app marketplaces? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Rise of the superbaby? US startup offers genetic IQ screening for wealthy elite: report

20 October 2024 at 21:41

A U.S. startup company is reportedly offering wealthy couples the chance to screen their embryos for IQ and other favorable genetic traits, which has raised ethical concerns.

Heliospect Genomics is charging up to $50,000 to test 100 embryos and claims their technology can help couples undergoing IVF pick children with IQ scores six points higher or more over babies conceived naturally, The Guardian reports

The company has already worked with more than a dozen couples, undercover video footage reviewed by the outlet reveals. 

"Everyone can have all the children they want, and they can have children that are basically disease-free, smart, healthy; it’s going to be great," CEO Michael Christensen said on a video call in November 2023, according to the report. The call was recorded by an undercover researcher for Hope Not Hate, an antifascist group that works to "expose and oppose far-right extremism." 

DESIGNER BABIES MAY BE ‘MORALLY’ ACCEPTABLE, UK ETHICS COUNCIL DECIDES

On the call, Heliospect employees reportedly walk prospective parents through the experimental genetic selection techniques advertised by the company. One employee explained how couples could use polygenic scoring to rank up to 100 embryos based on "IQ and the other naughty traits that everybody wants," including sex, height, risk of obesity and risk of mental illness, according to The Guardian.

Heliospect says its prediction tools use data from UK Biobank, a publicly funded genetic repository with half a million British volunteers. The database permits approved researchers and scientists around the world to access it for "health-related research that is in the public interest." 

United Kingdom law prohibits parents from selecting embryos on the basis of predicted high IQ, but the practice is currently legal in the U.S., even if the technology is not yet commercially available. 

Expert geneticists and bioethicists told The Guardian the prospect of selecting embryos for favorable genetic traits is ethically questionable since it could reinforce the idea of "superior" and "inferior" genetics. Hope Not Hate went further in its own reporting, tying a handful of Heliospect employees to people and publications that have purportedly promoted so-called scientific racism, or the contested belief that human races have innately different levels of physical, intellectual and moral development determined by their genetics.

TRUMP PLEDGES COVERAGE FOR IVF TREATMENT

Katie Hasson, associate director of the Center for Genetics and Society in California, warned in comments to The Guardian that embryo selection technology could mainstream "the belief that inequality comes from biology rather than social causes."

Heliospect Genomics did not immediately respond to Fox News Digital's request for comment.

Heliospect managers told The Guardian the U.S.-based company operates within the bounds of all applicable law and regulations. The company said it is currently in "stealth mode" and is still developing its services before a planned public launch. They added that couples who have screened fewer embryos were charged around $4,000 for the service. 

On the calls recorded by Hope Not Hate, Heliospect's team described how its "polygenic scoring" service uses algorithms to analyze the genetic data given by parents to predict the specific traits of their individual embryos. The company does not offer IVF services, according to The Guardian.

Christensen presented an ambitious vision for how the technology could develop, even suggesting that "lab-grown eggs would allow couples to create embryos on an industrial scale – a thousand, or even a million – from which an elite selection could be handpicked," the report said.

According to The Guardian, he suggested that future technology might be able to screen for personality types, including what he referred to as "dark triad" traits, namely machiavellianism, narcissism and psychopathy.

AI BABIES: NEW TECHNOLOGY IS HELPING FERTILITY DOCS CHOOSE THE BEST EMBRYOS FOR IVF

"Beauty is something lots of people actually ask about," he reportedly added.

Heliospect told The Guardian it does not condone industrial-scale egg or embryo production or elite selection and that it does not plan to offer personality screening services.

Among Heliospect's senior staff is Jonathan Anomaly, a controversial academic who has defended so-called "liberal eugenics," or the idea that parents should use genetic technology to enhance their children's prospects. 

Anomaly told The Guardian that as a professor of philosophy, he has published provocative articles intended to stimulate debate and that "liberal eugenics" was an accepted term by bioethicists.

Records show Heliospect gained access to UK Biobank's data in June 2023. In its application, the company said it planned to use advanced techniques to improve the prediction of "complex traits." But Heliospect did not disclose screening embryos as an intended commercial application or mention IQ, The Guardian reported.

UK Biobank told the outlet Heliospect's use of its data appeared to be "entirely consistent with our access conditions." 

Experts suggested to The Guardian that restrictions on access to databases like UK Biobank may need to be strengthened in light of the ethical concerns around embryo screening.

"UK Biobank, and the UK government, may want to think harder about whether it needs to impose some new restrictions," said professor Hank Greely, a bioethicist at Stanford University.

Heliospect emphasized that its use of UK Biobank data is lawful and complies with relevant regulations. The company told The Guardian it supports addressing concerns about preimplantation embryonic screening through public education, policy discussions and properly informed debates about the technology, which it strongly believed had the potential to help people.

Geomagnetic storm expected to hit Earth following autumnal equinox

24 September 2024 at 14:11

The Earth is expected to experience a geomagnetic storm this week following the autumnal equinox.

A sunspot erupted on Sunday, generating a coronal mass ejection (CME) on a trajectory toward Earth.

The solar plasma, propelled toward the planet at 650,000 mph, is expected to glance off the magnetosphere on Wednesday, according to Space.com.

GEOMAGNETIC STORM HITS EARTH CREATING NORTHERN LIGHTS, DISRUPTING RADIO COMMUNICATIONS

The CME could create a geomagnetic storm in part of the world due to its occurrence near the autumnal equinox, which passed on Sept. 22. 

During the spring and fall equinoxes, the Earth's magnetic poles are aligned with the sun's, making geomagnetic storms more likely.

NORTHERN LIGHTS MAY BE SEEN ACROSS SOME PORTIONS OF US THIS WEEK AFTER 'STRONG SOLAR ACTIVITY'

The geomagnetic storm can sometimes cause disruption in communications or electrical blackouts.

The phenomenon can also cause the "Northern Lights" effect at high altitudes, illuminating the night sky with brilliant colors.

Earlier this summer, the dancing lights of the aurora borealis were seen across the U.S. and even in some of the southern states, after the strongest geomagnetic storm in 20 years took place.

Fox News Digital's Sydney Borchers contributed to this report.

❌
❌