Normal view

Before yesterdayMain stream

Bipartisan letter warns Gabbard new UK order for backdoor Apple data could jeopardize Americans

13 February 2025 at 13:18

Sen. Ron Wyden, D-Ore., and Rep. Andy Biggs, R-Ariz., penned a letter to newly sworn-in Director of National Intelligence Tulsi Gabbard, warning that the United Kingdom's reported new order demanding backdoor Apple data jeopardizes Americans.

The letter, obtained by Fox News Digital, referenced recent press reports that the U.K.’s home secretary "served Apple with a secret order last month, directing the company to weaken the security of its iCloud backup service to facilitate government spying." The directive reportedly requires the company to weaken the encryption of its iCloud backup service, giving the U.K. government the "blanket capability" to access customers’ encrypted files. 

Reports further state that the order was issued under the U.K.’s Investigatory Powers Act 2016, commonly known as the "Snoopers’ Charter," which does not require a judge’s approval. 

"Apple is reportedly gagged from acknowledging that it received such an order, and the company faces criminal penalties that prevent it from even confirming to the U.S. Congress the accuracy of these press reports," Wyden and Biggs note. 

TULSI GABBARD SWORN IN AT WHITE HOUSE HOURS AFTER SENATE CONFIRMATION

The United Kingdom has been increasingly cracking down on British citizens for opposition commentary, especially online posts and memes opposing mass migration. As riots broke out in the U.K. last August after a mass stabbing at a Taylor Swift-themed dance event left three girls dead and others wounded, London's Metropolitan Police chief warned that officials could also extradite and jail U.S. citizens for online posts about the unrest. 

The letter, however, described the threat of China, Russia and other adversaries spying on Americans.

Wyden, who sits on the Senate Intelligence Committee, and Biggs, who chairs a House Judiciary subcommittee on Crime and Federal Government Surveillance, asked Gabbard to "act decisively to protect the security of Americans’ communications from dangerous, shortsighted efforts by the United Kingdom (U.K.) that will undermine Americans’ privacy rights and expose them to espionage by China, Russia and other adversaries." 

The Washington Post was among the outlets to report about the U.K. order. 

"These reported actions seriously threaten the privacy and security of both the American people and the U.S. government," Wyden and Biggs wrote. "Apple does not make different versions of its encryption software for each market; Apple customers in the U.K. use the same software as Americans. If Apple is forced to build a backdoor in its products, that backdoor will end up in Americans’ phones, tablets, and computers, undermining the security of Americans’ data, as well as of the countless federal, state and local government agencies that entrust sensitive data to Apple products." 

The letter also references a Chinese hacking operation known as "Salt Typhoon." Last year, the Biden White House admitted the Chinese hacked at least nine U.S. telecommunications companies

"The Salt Typhoon hack of U.S. telephone carriers’ wiretapping systems last year – in which President Trump and Vice President Vance’s calls were tapped by China – provides a perfect example of the dangers of surveillance backdoors," the letter says. "They will inevitably be compromised by sophisticated foreign adversaries and exploited in ways harmful to U.S. national security. As the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI confirmed last November, People’s Republic of China (PRC)-affiliated actors were involved in ‘copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders.’" 

TRUMP LANDS KEY TULSI GABBARD CONFIRMATION FOLLOWING UPHILL SENATE BATTLE

"While the U.K has been a trusted ally, the U.S. government must not permit what is effectively a foreign cyberattack waged through political means. If the U.K. does not immediately reverse this dangerous effort, we urge you to reevaluate U.S.-U.K. cybersecurity arrangements and programs as well as U.S. intelligence sharing with the U.K.," the letter says.

Citing a December 2023 report by the U.K. Parliament’s intelligence oversight committee, the letter states that the U.K. benefits greatly from a "mutual presumption towards unrestricted sharing of [Signals Intelligence]" between the U.S. and U.K. and that "[t]he weight of advantage in the partnership with the [National Security Agency] is overwhelmingly in [the U.K.’s] favour." 

"The bilateral U.S.-U.K. relationship must be built on trust. If the U.K. is secretly undermining one of the foundations of U.S. cybersecurity, that trust has been profoundly breached," Wyden and Biggs wrote. 

At her confirmation hearing, Gabbard stated that "backdoors lead down a dangerous path that can undermine Americans' Fourth Amendment rights and civil liberties." In written responses to senators' questions, she also said, "mandating mechanisms to bypass encryption or privacy technologies undermines user security, privacy, and trust and poses significant risks of exploitation by malicious actors."

"We urge you to put those words into action by giving the U.K. an ultimatum: back down from this dangerous attack on U.S. cybersecurity, or face serious consequences," Wyden and Biggs wrote.

The letter asks Gabbard specifically whether the Trump administration was made aware of the reported order, either by the U.K. or Apple, prior to the press reports and, if so, when and by whom. They also ask what the Trump administration's understanding is of U.K. law "and the bilateral CLOUD Act agreement with regard to an exception to gag orders for notice to the U.S. government." Wyden and Biggs asked what the Trump administration's understanding is "of its obligation to inform Congress and the American public about foreign government demands for U.S. companies to weaken the security of their products, pursuant to the CLOUD Act?" The letter asked that unclassified answers be provided by March 3. 

Fox News Digital reached out to Apple and the White House regarding the letter, but neither immediately responded.

Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

13 February 2025 at 09:00

Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong. 

While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device. 

The issue also affects those downloading apps from the Google Play Store.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.

One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.

Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.

The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.

The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.

We reached out to Apple for a comment but did not hear back before our deadline. 

Apple has removed the 11 iOS apps mentioned in Kaspersky's report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple's policies, resulting in the termination of their developer accounts.

Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library. 

The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.

In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A Google spokesperson tells CyberGuy: 

"All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services."

However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Here’s why:

HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android

4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.

5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities. 

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.

Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to delete multiple text messages on a Mac and iPad

12 February 2025 at 05:00

Are you overwhelmed by the sheer volume of text messages cluttering your Mac or iPad? You're not alone. 

Many users find themselves endlessly scrolling through conversations, searching for important information or simply trying to declutter their digital space. 

Fortunately, Apple has provided ways to manage your messages more efficiently. Let's dive into how you can delete multiple messages on both your Mac and iPad, helping you regain control of your messaging app. Here are steps to bulk delete text messages on an iPhone or an Android.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

If you're using a Mac, follow these steps to delete multiple messages at once:

BEST ANTIVIRUS SOFTWARE FOR YOUR MAC & IPAD

If you're using a Mac, follow these steps to delete multiple messages within a conversation at once:

This method is particularly useful when you need to remove several messages from a lengthy conversation without deleting the entire thread.

HOW TO KNOW WHEN IT'S TIME TO REPLACE YOUR MAC

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

HOW TO FILTER AND SORT EMAILS ON YOUR IPHONE AND IPAD

To prevent future clutter, consider setting up automatic message deletion:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

This setting will automatically remove older messages, keeping your conversations manageable.

Note: Deleting messages from your Mac does not delete them from other Apple devices unless you have Messages in iCloud enabled. To check if Messages in iCloud is enabled on your Mac:

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Managing message clutter can feel like a never-ending battle. While these tips won't magically solve all your digital chaos, they'll definitely help you take back control of your Messages app. A little effort now means less scrolling and more breathing room later. And hey, who doesn't love a clean, organized digital space that doesn't make you want to pull your hair out? Just remember, your messages are meant to connect you, not stress you out.

Tell us the most frustrating digital communication challenge you have and how we might be able to help. Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Don't fall for that sneaky iCloud storage alert in your inbox

11 February 2025 at 09:00

iCloud scams are becoming increasingly sophisticated, targeting unsuspecting users with urgent messages about their accounts. Our team recently received two suspicious iCloud emails. We want to share our experience and provide comprehensive steps on how to identify and protect yourself from these scams.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

iCloud scams typically follow a pattern designed to create a sense of urgency and fear. Let's break down the two emails our team received below. Here is the urgent wording that the scammers used, "Payment Failure for iCloud Storage Renewal" and "iCloud Suspended. Fix it before Mon, 13 January 2025." Both emails share common characteristics of phishing attempts, including urgent language, threats of account suspension or data loss, requests to update payment information, links to external websites and vague or incorrect account details. These emails are crafted to look legitimate, often mimicking Apple's branding and tone. However, they contain several red flags that indicate they are scams.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

To protect yourself from falling victim to these scams, look out for these telltale signs:

If you receive a suspicious email claiming to be from Apple or iCloud, follow these steps:

THAT APPLE ID DISABLED MESSAGE? IT'S A DANGEROUS SCAM

Follow these steps if you think you may have fallen for an iCloud scam.

1) Change your Apple ID password immediately: Ensure you create a strong, unique password that you haven't used on other accounts.

2) Check for any unauthorized changes to your account settings or payment information: Go to account.apple.com and review any devices, personal information or security settings that look unfamiliar.

3) Contact Apple Support directly through official channels for assistance: Forward the suspicious email to reportphishing@apple.com or abuse@icloud.com to help Apple track and block these scams.

4) Monitor your financial accounts for any suspicious activity: If you provided payment information, cancel and replace your credit card immediately and pay close attention to even small unauthorized charges.

5) Consider placing a fraud alert on your credit reports: Report the scam to the Federal Trade Commission and Internet Crime Complaint Center to help combat these fraudulent activities.

6) Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

FBI’S NEW WARNING ABOUT AI-DRIVEN SCAMS THAT ARE AFTER YOUR CASH

Remember, Apple will never ask you to provide personal information, passwords or security codes via email, text message or phone call. If you're ever in doubt about the legitimacy of a communication from Apple, always err on the side of caution and contact Apple directly through their official website or support channels. By staying vigilant and following these guidelines, you can better protect yourself from iCloud scams and keep your personal information secure. Don't let the urgency of these messages cloud your judgment. Take a moment to verify before you act, and you'll be much safer in the long run.

Have you ever been targeted by an iCloud or Apple-related scam? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to easily transfer files and photos off a computer to your hard drive

4 February 2025 at 05:00

Is your computer gasping for breath, drowning in a sea of photos, documents and random downloads? We've all been there: that moment when your computer feels like it's about to burst at the seams, threatening to crash your system and lose those precious memories. Today, I'll walk you through steps to transfer files and free up space so you can breathe easily and keep your Mac or PC running smoothly.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

First things first, you'll want to use an external hard drive you already have or purchase a new one. External hard drives offer massive storage for all your digital memories. My favorites are small, portable drives with no moving parts called SSDs, or solid-state drives. When selecting an external hard drive, consider these key factors.

HOW TO MANAGE PHOTOS AND VIDEOS ON A NEW LAPTOP WITH LIMITED SPACE

Once you have your external drive, plug it right into your computer using a USB cable to make sure it's securely connected.

If you're using a Mac, here's how to transfer your files:

HOW TO TRANSFER PHOTOS AND VIDEOS FROM YOUR EXTERNAL HARD DRIVE AND APPLE DEVICES

For Windows users, follow these steps:

Your files are now safely stored on your external drive.

After transferring your files to an external drive or cloud storage, it's important to note that the original files still remain on your computer. To effectively free up space, follow these steps:

Delete Original Files

On Mac:

On Windows:

Empty the Trash/Recycle Bin

On Mac:

On Windows:

Remember, simply moving files to a new drive doesn't automatically delete them from the source. You need to manually remove them and empty the trash/recycle bin to fully reclaim space on your original drive. Always double-check that you have a secure backup of your files before permanently deleting them.

FIRST 10 THINGS TO DO IF YOU GOT A NEW PC

If you're not into the manual method and prefer a more automated approach, there are other transfer solutions available:

Cloud storage services like iCloud, Google Drive and Dropbox let you upload files and access them from anywhere. These services offer automatic syncing and backup, making file transfer and storage more convenient. Popular options include Microsoft OneDrive, Proton Drive and IDrive. Get Kurt’s favorite cloud services here.

Windows users can utilize the built-in File History feature to automatically back up files to an external drive. This is suitable for a small number of folders but may be time-consuming for large quantities of data.

For faster and more efficient transfers, especially when dealing with large quantities of files, consider using professional backup software. These tools often provide features like automatic backups, file compression and encryption for added security.

For those looking to move data between cloud services, solutions like MultCloud offer seamless file transfer and synchronization between different cloud storage providers. If you have maxed out your iCloud storage, click here to discover what solutions are available.

ASK KURT: DO YOU NEED TO ENCRYPT YOUR SENSITIVE CLOUD DATA?

No more digital clutter, no more stress. You've got this file transfer thing down pat. Whether you choose the manual method for more control or opt for cloud storage for convenience, the key is to regularly back up your important files. Remember, it's not just about freeing up space on your computer. It's about protecting your digital memories and important documents. As we move into 2025, the landscape of digital storage continues to evolve. With advancements in SSD technology, cloud services and data transfer speeds, managing your digital life has never been easier. So go ahead, start that transfer and enjoy the peace of mind that comes with a well-organized digital life.

Have you ever lost important files or photos? Tell us your worst digital storage nightmare in the comments below. Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Energy-saving scam uses Elon Musk’s name – Here’s the truth

2 February 2025 at 09:00

Elon Musk, known for leading companies like Tesla, SpaceX, Neuralink and xAI and buying and rebranding Twitter as X, often finds his name linked to innovation and futuristic ideas. But his reputation also makes him a prime target for scammers.

In the past, fraudsters have used Musk’s name in cryptocurrency schemes. Now, a new scam is making the rounds. This time, scammers are promoting bogus "energy-saving" devices, falsely associating Musk with these products to gain credibility. These devices, which don’t work as advertised, are being marketed as revolutionary solutions, duping people into spending money on what is essentially a scam.

We received this email from Rick in Wilkesboro, North Carolina: "I’ve been receiving emails offering an energy-saving device developed by Elon Musk. It claims the device can reduce energy bills by 50%. I never attempted to contact anyone associated with Elon Musk, nor have I done any internet searches for such a device. Are these emails legit or another attempt by scammers hoping I click on their links?"

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Rick, it sounds like those emails are likely scams. There have been numerous reports of scammers using Elon Musk's name to promote fake energy-saving devices. These scams often claim that the device can drastically reduce energy bills, but there is no evidence that Elon Musk or any of his companies are involved in such products.

Let's dive into how this scam works and share some ways you can stay safe.

The Elon Musk energy-saving scam works by using flashy online ads, unsolicited emails and other deceptive tactics to lure victims. Scammers promote so-called "revolutionary" devices through social media, pop-ups, emails and even search engine ads, claiming the products are backed by Musk.

These ads often include fake customer reviews, exaggerated claims of slashing electricity bills by 50% or more and time-limited discounts to create urgency. Names of devices advertised in these scams include the Power Pro Save, Heunwa Power Save, Stop Watt, Miracle Watt, True Watt, Real Watt, Watt Rescue, Esaver Watt, Pro Power Save, Voltmod and more. 

Clicking on these ads leads you to sales websites designed to look legitimate. They feature fake logos, doctored before-and-after photos and bogus celebrity endorsements to build trust. The sites throw around pseudo-scientific jargon like "stabilizing electrical currents" or "rebalancing loads" to sound convincing. They also use tactics like showing inflated "regular" prices crossed out to make the current offer seem like a huge bargain.

If you look closely, though, the red flags are clear. These sites lack basic details like a company address, contact number or business registration information. Instead, they push you to place an order through an online form, demanding full payment upfront via credit card or PayPal.

After paying, customers might receive a cheap, non-functional plastic device, or sometimes nothing at all. These devices don’t reduce electricity usage. They might even waste more power. But by the time you realize it, the scammers have already pocketed your money.

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Over the years, plenty of power-saving scams have promised to cut down or even eliminate your electricity bill by simply plugging in their devices. The reality is that there’s no device you can plug in that will actually reduce your electricity usage or lower your household bill.

These products often claim to "stabilize voltage" or "reduce power waste." While voltage stabilization can be useful in industrial settings, it doesn’t make much difference for typical home appliances. Most household appliances are already designed to run efficiently without the issues these devices claim to fix.

If you’re serious about saving on electricity, focus on practical solutions like upgrading to energy-efficient appliances, using smart home devices or adjusting your energy usage schedule.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME

Too good to be true: Claims of reducing energy bills by 50% or more are often exaggerated and unrealistic.

Unsolicited emails: Receiving emails out of the blue, especially when you haven't shown interest in such products, is a common tactic used by scammers.

Use of celebrity names: Scammers frequently use well-known names like Elon Musk to lend credibility to their schemes.

Suspicious links: Be cautious of clicking on links in unsolicited emails. They can lead to phishing sites designed to steal your personal information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

1. Verify the email: Phishing emails are a common tool scammers use to trick people into buying fake products or giving away personal information. These emails often look like they’re from legitimate sources, but they contain links that lead to fraudulent websites or prompt you to download malicious attachments. Always check the sender's email address and look for signs of a fake message, like poor grammar or urgent calls to action. 

2. Verify claims: If you're curious about a product, do some research from reputable sources before taking any action.

3. Do not click links: Avoid clicking on any links or downloading attachments from these emails. Instead, hover over the link to see its true destination. This can help you identify if it leads to a legitimate site or a malicious one.

4. Have strong antivirus software actively running on your devices: Ensure you have reliable antivirus software installed on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5. Examine the website carefully: Scammers often create websites that look professional, but they’re easy to spot with a few simple checks. Look for missing or suspicious information, like the absence of a business address, phone number or business registration details. If there are fake testimonials or celebrity endorsements, that’s a red flag.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Don’t fall for "too good to be true" deals: Scammers rely on offering deals that seem too good to pass up, like massive discounts or a "limited time offer." If an ad claims you can save 50% or more on a product, be skeptical. Real, quality products usually don’t come with such extreme savings, and high-tech devices like those promoted by scammers rarely live up to the hype. If it feels like too good a deal, it probably is.

7. Watch out for unusual payment methods: One of the easiest ways to spot a scam is by how the scammers ask you to pay. If a website asks for payment upfront via credit card or PayPal with no option to verify or ship the product first, it's a major red flag. Scammers take your money upfront and have no intention of sending you anything of value. Stick to reputable payment methods that offer buyer protection and avoid sites that ask for payment without proper verification.

8. Mark spam email as junk or spam: Most email providers have a feature that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.

9. Do not share your email address publicly or with unknown sources: This can reduce the chances of your email address being collected by spammers. You can also use a disposable email or email alias for signing up for online services that you do not trust or need.

10. Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

YOUR EMAIL DIDN'T EXPIRE, IT'S JUST ANOTHER SNEAKY SCAM

Impersonation scams are a common way scammers steal your money. They often use well-known names like Elon Musk or big companies like Microsoft and Walmart to make you trust them, then trick you into giving away your financial details. To stay safe, avoid unsolicited emails or texts that promote products or offers. If you need to buy something, stick to trusted sellers like Amazon, Best Buy or other reputable platforms. Always double-check the legitimacy of any offer before making a purchase, especially if it comes from an unfamiliar source.

Have you ever encountered a scam using a well-known name or brand? What happened? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Apple's iOS vulnerability exposes iPhones to stealthy hacker attacks

1 February 2025 at 09:00

Generally, iPhones are considered more secure than Android devices. 

Apple’s closed ecosystem and strict App Store policies limit the risk of malware, and its centralized software updates ensure better security. In contrast, Android’s openness allows users to install apps from various sources, and updates are often rolled out at different times, making it more vulnerable to attacks. 

However, iPhones aren’t immune to security flaws. Hackers occasionally find ways to exploit them, as seen in Apple’s latest advisory. The company recently discovered that a vulnerability in iOS had been exploited for over a year. While a fix has now been released, reports suggest that hackers may have already targeted high-value individuals.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Apple has uncovered hackers exploiting a vulnerability in iOS that appears to have been lingering for more than a year. The vulnerability is a "zero-day" flaw, meaning criminals may have already exploited it, according to the latest security advisory from the company. Zero-day flaws like this are especially dangerous because they are exploited before developers can issue fixes. Apple confirmed this marks its first zero-day patch of 2025. The vulnerability affects iPhones dating back to 2018’s XS model, as well as newer iPads, Macs, and even the Vision Pro headset.

The vulnerability, tracked as CVE-2025-24085, resides in Apple’s Core Media framework, a software layer responsible for processing multimedia files. A "use after free" memory corruption error enabled hackers to manipulate the system into executing unstable code, granting them elevated privileges to bypass security protocols. Apple’s advisory suggests hackers weaponized the flaw through malicious apps disguised as legitimate media players. These apps likely abused the Core Media framework by triggering corrupted files, enabling attackers to infiltrate devices.

The attacks reportedly targeted iOS versions predating 17.2, released in December 2023, meaning the vulnerability may have been active since late 2022. Security experts speculate that hackers focused on high-value individuals — such as activists, executives or journalists — to avoid detection. The prolonged stealth of the campaign underscores the challenges of identifying sophisticated, narrowly tailored exploits.

This underscores the critical need for you to update your devices to iOS 17.2 or later, as these versions include essential fixes to safeguard against this actively exploited vulnerability.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

In response, Apple has released fixes across its ecosystem, including iOS 18.3, macOS Sequoia, watchOS, tvOS and VisionOS. You should update your devices as soon as possible to stay protected. To install the update on your iPhone or iPad:

Pro Tip: I recommend you click Update Now and also turn on Automatic Updates to stay covered in the future.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

While Apple has patched this issue, it’s a reminder that staying on top of updates is key. Hackers are always looking for security gaps, so keeping your software up to date is one of the best ways to stay safe.

SCAMMERS FOUND A SNEAKY WAY TO BYPASS YOUR IPHONE'S SAFETY FEATURES

Protecting your iPhone requires proactive security measures. By following these seven essential steps, you can significantly reduce the risk of cyber threats and keep your personal information secure.

1. Keep your iPhone updated: I can’t say this enough. Updating your iPhone regularly is one of the most effective ways to protect it from security threats. Apple frequently releases updates that fix vulnerabilities, including critical zero-day flaws. 

2. Download apps only from the App Store: To minimize the risk of installing malware, only download apps from the official App Store. Apple’s strict app review process helps prevent malicious apps from being published, but some threats can still slip through. Always verify app details, check reviews and be cautious about app permissions before installation.

3. Enable lockdown mode for extra protection: For those of you who may be at higher risk, such as journalists or executives, Lockdown Mode provides an additional layer of security. This feature limits certain device functionalities to prevent sophisticated cyberattacks. It can be turned on via SettingsPrivacy & SecurityLockdown Mode and is especially useful for those concerned about targeted threats.

4. Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently. Here are steps:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

5. Stay cautious of phishing attacks and install strong antivirus software: Phishing remains one of the most common tactics used by hackers. Be cautious when receiving unsolicited messages or emails on your iPhone, especially those with suspicious links or attachments. Always verify the sender before opening anything. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Review your security and privacy settings: Regularly reviewing your iPhone’s security settings can help you maintain strong protection. You should also review app permissions in Settings > Privacy & Security to restrict access to sensitive data, such as location or contacts. Enable Face ID or Touch ID for secure access and turn on two-factor authentication (2FA) for Apple ID and other accounts. 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

7. Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you deceptive phishing texts and emails in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

This iOS vulnerability is a serious reminder of the importance of staying up to date with software updates. If you’re using an iPhone from 2018 or later, make sure you’ve updated to iOS 17.2 or later as soon as possible. Hackers exploited a hidden flaw for over a year, using fake media apps to gain access to devices. While Apple has now patched the issue, the fact that it remained undetected for so long is concerning. 

Do you think companies like Apple are doing enough to protect you from cyber threats?  Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Scammers find sneaky way to bypass your iPhone's safety features

27 January 2025 at 05:00

In an alarming development, cybercriminals have devised a new method to circumvent Apple's built-in phishing protection for iMessage, potentially exposing you to malicious links and scams. This sophisticated tactic exploits a security feature designed to protect you, turning it into a vulnerability that could lead to significant personal and financial risks.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Apple's iMessage automatically disables links in messages from unknown senders as a security measure. However, cybercriminals have found a way to exploit this protection. By instructing you to reply to the message, often with a simple "Y," the attackers can re-enable previously disabled links. This seemingly innocuous action not only activates the links but also signals to the scammers that they've found an engaged target for future attacks.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Apple defines social engineering as a targeted attack that employs impersonation, deception, and manipulation to gain access to personal data. Scammers often pose as representatives of trusted companies, using sophisticated tactics to persuade individuals to disclose sensitive information, such as passwords and financial details. Here are some of those sneaky tactics:

The messages typically end with instructions like: "(Please reply Y, then exit the SMS, re-open the SMS activation link, or copy the link to open in Safari)."

THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE

This new tactic is part of a broader trend of smishing (SMS phishing) attacks targeting mobile users. With the increasing reliance on smartphones for various activities, including financial transactions and personal communications, these attacks pose a significant threat to users' security and privacy.

DOES MY IPHONE NEED ANTIVIRUS PROTECTION?

To safeguard against these sophisticated phishing attempts, consider the following steps.

1) Never reply to suspicious messages: Avoid responding to texts from unknown senders, especially those asking you to reply to activate links. Additionally, make sure to delete suspicious text messages and block the sender to prevent further attempts. Since the sender is not in your contact list, you can click Report Junk at the bottom of the text. Then click Delete and Report Junk. This will report the conversation as junk by sending it to your wireless carrier and Apple using your phone number.

2) Verify sender identity: Contact organizations directly through official channels if you're unsure about a message's legitimacy.

3) Be skeptical of urgency: Scammers often use urgent language to prompt quick, thoughtless actions.

4) Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. Here are the steps:

This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently.

5) Use two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

6) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

7) Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you these deceptive iMessage phishing texts in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

If you suspect you've fallen victim to a smishing attack:

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

This latest trick targeting iMessage users serves as a reminder that even seemingly secure systems can be vulnerable to social engineering. By remaining cautious and following best practices for digital security, you can significantly reduce your risk of falling victim to these sophisticated phishing attempts.

What other cybersecurity challenges have you encountered with your mobile devices, and what questions do you have for us? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Don’t let this credit card fraud nightmare happen to you

26 January 2025 at 09:00

Credit card fraud has been on the rise in recent years.

The Federal Trade Commission’s most recent database indicates that 416,582 cases of credit card fraud were reported in 2024, making it one of the most common forms of identity theft. You know you've been a victim of this fraud when you notice unauthorized transactions on your credit card bill. 

These transactions are usually below $100 to avoid detection. However, sometimes they can exceed $1,000. One such incident happened with Martin from Martinsville, Virginia, when he was randomly charged $1,095 in Hong Kong.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

"Hello, I recently received a fraud alert from my credit card company that said that there was a $1,095 charge on my credit card in Hong Kong. I use my iPad and Safari browser to buy online. Can you please explain how this could happen? By the way, my credit card company canceled my credit card and will send me a new Mastercard in the mail, and I’m not responsible for the charges on my credit card. What can I do in the future to prevent this from happening again?"

I'm sorry to hear about the fraudulent charge on your credit card, Martin. It’s good that your credit card company is handling it and that you’re not responsible for the charges. For future reference, I'll be discussing how this could have happened and how to stay safe.

Credit card fraud can happen in several ways, often without you even realizing it. One common method is when fraudsters get hold of your card information through data breaches at online stores or banks, which means your details get leaked without your knowledge. 

Another sneaky tactic is phishing, where scammers trick you into giving away your card info by posing as legitimate companies via emails or fake websites. 

There’s also the risk of "card skimming," where devices at ATMs or gas stations secretly capture your card details when you swipe it. In some cases, fraudsters might also exploit weak security on public Wi-Fi networks or compromised apps to access your information while you’re shopping online.

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME  

A report from Security.org reveals that 52 million Americans experienced credit card fraud in 2023, a figure even higher than the one reported by the FTC. With four out of five American adults owning at least one credit card, the report found that three in five cardholders have faced unauthorized charges — an estimated 128 million victims. Even more concerning, 75% of these victims reported having their credit card information stolen more than once. 

The typical unauthorized transaction is around $100, which adds up to approximately $5 billion in criminal purchases each year. Interestingly, most unauthorized transactions involve credit cards that weren’t physically lost or stolen, highlighting the growing risks of online fraud and data breaches.

THE BEST BALANCE TRANSFER CREDIT CARDS 2025

Data breaches are one of the main ways credit card fraud happens. Hackers often get unauthorized access to sensitive information stored by businesses or institutions. When a retailer, financial institution or online store experiences a data breach, the hackers usually go after the payment systems where customer credit card details are kept.

If these systems aren’t properly secured, hackers can grab things like credit card numbers, expiration dates and sometimes even security codes. Once they have that info, they can either use it themselves or sell it to others.

But it’s not just credit card information at risk. Data breaches can also expose personal details like names, email addresses and phone numbers. Scammers can then use this stolen info to launch phishing attacks, pretending to be trusted companies and tricking you into giving away more sensitive information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

This is why identity theft monitoring is so important. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

1. Notify your credit card issuer immediately: If you notice fraudulent charges on your credit card, start by calling the number on the back of your credit card. From there, you should get more detailed information on what to do next.

2. Monitor your statements regularly: One of the best ways to catch credit card fraud early is to keep an eye on your statements. Review your transactions regularly to spot any unfamiliar charges. The sooner you notice something suspicious, the quicker you can report it to your credit card company and prevent further damage.

3. Regularly check your credit report: In addition to monitoring your credit card statements, periodically review your credit report to catch any unauthorized accounts opened in your name.

4. Use strong, unique passwords: Always use strong, unique passwords for your online accounts, especially those that store payment details. Avoid using easily guessable information, and consider using a password manager to store and generate secure passwords. This reduces the chances of fraudsters accessing your accounts.

5. Use credit card alerts: Set up transaction alerts with your credit card company. This way, you’ll receive a notification via email or text for every transaction made with your card. If you receive an alert for a purchase you didn’t make, you can take immediate action to report it and prevent further charges.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Be Cautious with public Wi-Fi: Avoid making purchases or entering sensitive information when connected to public Wi-Fi networks because they’re often not secure. If you need to make an online purchase while on the go, consider using a VPN (Virtual Private Network) to encrypt your connection and keep your credit card details safe from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices 

7. Don't store credit card info on browsers and websites: Storing your credit card information on browsers or websites can make it convenient, but it also exposes you to a higher risk of fraud. If your browser or the website’s security gets compromised, hackers could gain access to your saved card details. To stay safe, avoid saving your credit card information and manually enter it each time you make a purchase. If a site offers to save your details for future use, think twice before accepting. It's better to take the extra step to enter your information each time, ensuring your data stays secure.

8. Use EMV chip technology: When making in-person purchases, always use the chip reader instead of swiping your card. Chip technology provides an extra layer of security against fraud.

9. Be wary of phishing attempts and have strong antivirus software: Be cautious of unsolicited emails, texts or phone calls asking for your credit card information. Legitimate companies typically don't request sensitive information through these channels. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10. Keep your card in sight: When using your card in restaurants or stores, try to keep it within view. This reduces the risk of someone copying your card details.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

It's clear that credit card fraud is more prevalent than ever, affecting millions of Americans each year. The good news is that there are effective steps to protect yourself from becoming a victim. By staying vigilant and employing best practices — like monitoring your statements and using strong passwords — you can significantly reduce your risk. Remember, awareness and proactive measures are your best defenses against credit card fraud.

Have you or someone you know ever experienced credit card fraud, and how did it impact you? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

How to manage photos, videos on new laptop with limited space

20 January 2025 at 09:00

We recently received an email from Sylvia, who just got a new laptop that has significantly less space than her old laptop. She emailed us wondering how to store photos and videos on a computer with only 82GB of storage space:

"The newer laptop does not have as much storage space (indicates 82.1 GB free of 225GB) as the old one (indicates 322 GB free of 446 GB). What is the best way to store my photos and videos to free up space on the new laptop?"

Great question, Sylvia. This is a common issue for anyone who has purchased a lightweight laptop such as a Chromebook or Windows-based ultrabook. Fortunately, there are a few easy ways to store files off your hard drive.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

82 GB should be more than enough for basic tasks like web browsing, using office applications or streaming video. However, if you plan to store large files such as high-resolution photos, videos or games, or if you’re using software that requires a lot of space, 82GB might fill up quickly. Here’s a rough breakdown of how much space different types of files typically take:

It's also important to leave enough space on your computer for the operating system to run smoothly. As a rule, keep at least 10%-15% of your hard drive free to prevent application slowdowns. An external hard drive is an excellent option for storing photos and videos to free up space on your new laptop. Another great way to save space is by storing your photos in cloud storage. Whether it’s a hard drive or cloud space, having a backup is a good idea.

As you can see from the breakdown above, photos and videos can take up a significant amount of storage space on your laptop. If you are a photographer who deals with RAW images, this amount could be even higher, as with video professionals who work with 4K content.

Even if you're not a video professional or photographer, having a lot of home videos and photographs can take up a lot of space. You will need a secondary storage solution with less than 100GB of space left. Here are a few options you might consider.

BEST LAPTOPS FOR 2025

An external hard drive is one of the most practical and reliable solutions for expanding your laptop's storage capacity, especially if you have many media files like photos, videos or other data-intensive content. These portable storage devices connect to your computer via USB (and increasingly via USB-C for faster transfer speeds), offering the flexibility of storing and backing up massive amounts of data without consuming your laptop's internal space.

There are two main types of external hard drives: HDD (hard disk drive) and SSD (solid state drive). HDDs are typically more affordable and come in larger capacities (up to several terabytes), making them an excellent option for those needing vast storage space on a budget. However, their mechanical components make them slightly slower in data transfer speeds and more prone to physical damage.

SSDs, on the other hand, are faster, more durable and lighter, though they tend to be more expensive per gigabyte of storage than HDDs. SSDs are ideal if you frequently transfer large files, work with high-resolution media like 4K videos or require speedy access to your data. They are also less prone to damage from drops or movement, which makes them perfect for on-the-go use.

External hard drives come in various sizes, from modest capacities like 256GB to massive options exceeding 10TB. The amount of storage you need will depend on the types of files you’re dealing with. For example, a 1TB drive can store over 200,000 high-resolution images if you need space for photos. A larger capacity drive might be necessary for video files, especially HD or 4K, as these files can easily consume tens or even hundreds of gigabytes.

BEST DESKTOPS COMPUTERS FOR 2025

One key advantage of external hard drives is their portability. Compact and easy to carry, they provide an excellent solution for photographers, videographers or anyone needing access to large files while moving. Some models are designed to be ultra-durable, with rugged, shockproof and waterproof features, ideal for outdoor and travel use.

Many professionals label and organize their drives by project or period, allowing for easy archiving and retrieval. As mentioned earlier, a simple organizational system, such as labeling your drives with the dates or types of content they contain, can help keep your data structured and easily accessible. This is especially important when you accumulate multiple drives over time. See Kurt's picks for the best external hard drives here.

Cloud storage services like Google DriveDropbox and Microsoft OneDrive offer convenient, flexible options for storing large files without consuming your laptop's limited space. These services allow you to securely store your photos, videos and documents in the cloud, freeing up valuable storage on your device. One significant advantage of cloud storage is accessing files from any device with an internet connection, whether on your phone, tablet or another computer.

Most cloud services provide a certain amount of free storage (typically between 2GB and 15GB) before upgrading to a paid plan. For instance, Google Drive offers 15GB of free storage shared across Google services, while Dropbox provides 2GB for free with options to upgrade for more space. OneDrive provides 5GB for free, but Microsoft users can get additional storage through Office 365 subscriptions, granting access to the Microsoft Office suite.

Additionally, cloud storage services come with features like automatic syncing and backup, making it easier to organize and safeguard your files. This can be particularly helpful for large photo and video libraries, which can be set to upload automatically from your phone or computer. With features like file versioning and collaboration tools, cloud platforms offer more than just storage. They enhance productivity and allow seamless file sharing with friends, family or colleagues.

Finally, many cloud storage providers offer encryption and other security measures to protect your files for added peace of mind. However, it would always be best to take extra precautions, such as enabling two-factor authentication and using strong, unique passwords, to ensure your data is safe. Kurt's favorite cloud services can be seen here.

iCloud offers 5GB of free storage to all users, which is sufficient for basic services like iCloud Keychain, testing other features and storing some files. However, for users who need more storage, iCloud+ subscriptions are available. These plans include:

iCloud is tightly integrated with Apple devices, making it highly convenient for Apple users. Files stored on the desktop and in documents folders on Macs are automatically synced to iCloud Drive, which is especially useful for devices with limited storage space like the MacBook Air. iCloud Drive can also be accessed from Windows machines through a dedicated file folder and files can be managed via icloud.com.

iCloud provides robust automatic syncing and backup features. iCloud Backup automatically backs up important data on iPhones and iPads when connected to power and Wi-Fi, ensuring that your device's data is always up to date. This backup can be used to restore your device or set up a new one seamlessly.

iCloud uses 128-bit AES encryption to secure all files. Additionally, iCloud+ subscriptions include advanced privacy features such as iCloud Private Relay, which protects your browsing history and identity, Hide My Email, which generates random email addresses, and Custom Email Domains for personalized email addresses.

While iCloud is highly user-friendly for Apple users, it can be less reliable and glitchy for non-Apple users. Collaboration is limited to Apple users, but files can be shared and accessed across different Apple devices using the Files app on iOS and iPadOS, the Finder on Mac or File Explorer on Windows PCs.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

When storing your photos, videos and other important files, it's crucial to prioritize data security. Here are some essential steps to protect yourself and your valuable information.

1) Use strong passwords: Create unique, complex passwords for all your accounts and devices. Consider using a password manager to generate and store secure passwords.

2) Enable encryption: Encrypt your external hard drives and cloud storage accounts to add an extra layer of protection to your data.

3) Implement two-factor authentication (2FA): Enable 2FA on all accounts that offer this feature, especially for cloud storage services.

4) Install and maintain strong antivirus software: Use a strong antivirus program and keep it updated to protect against malware and other security threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5) Regularly update your operating system and applications: Keep your devices and software up to date to ensure you have the latest security patches.

6) Be cautious with public Wi-Fi: Avoid accessing sensitive information when connected to public networks or use a VPN for added security. Using a VPN (virtual private network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

7) Back up your data regularly: Create multiple backups of your important files, including at least one offline copy.

8) Use secure file transfer methods: When sharing files, use encrypted transfer methods or password-protected links.

By following these steps, you can significantly enhance the security of your data and protect yourself from potential cyber threats.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Managing storage on a laptop with limited space requires thoughtful planning, especially when dealing with large files like photos and videos. While 82GB may be sufficient for basic tasks, media files can quickly add up. By leveraging external hard drives or cloud storage services, you can keep your laptop running efficiently while ensuring that your important files are safely stored and accessible. Whether you opt for physical or cloud-based solutions, remember to prioritize data security using strong passwords and encryption where necessary. With the right strategy, you can make the most of your laptop's storage without sacrificing performance or losing precious memories.

Do you have a way of storing photos and videos that we didn't mention? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Who's really behind that random strange text from nowhere?

19 January 2025 at 05:00

These days, our phones are constantly buzzing with notifications, and it's becoming increasingly difficult to distinguish between legitimate messages and potential scams. Bill from Mesa, Arizona, recently shared an experience that highlights this growing concern:

"Twice in the last week I've received texts supposedly sent elsewhere. The last one asked if I was 'available tomorrow evening.' I did not recognize the number but am active in an old people park so receive many calls and texts from unfamiliar numbers. I texted back that my wife thought we were available. A few minutes later, a text came asking if I was Mrs. Amy. I texted that I wasn't Mrs. Amy and had never been, but it was a problem. 

"A return text came thanking me for being so polite and the texter's appreciation for polite people and if I were ever in LA, I would be welcome to a backyard BBQ. Looking back, there were a couple more texts ending with ‘I like to make friends with polite people.’ The first text which I deleted was in a very similar vein and format. Is this a scam and why, for what?"

Bill's experience is not unique. Many people receive similar messages that seem harmless at first glance but could potentially be part of a more sinister scheme. Let's dive into the world of text message scams and learn how to protect ourselves.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Text message scams, also known as "smishing," a combination of SMS and phishing, have become increasingly sophisticated. Scammers use various tactics to engage potential victims and gain their trust. Here are some common elements:

Unfamiliar numbers: The message comes from a number you don't recognize. For instance, you receive a text from +1-555-123-4567, a number not in your contacts.

Unsolicited contact: The text arrives unexpectedly, often with a friendly or urgent tone. Example: "Hey! Long time no see. How have you been?"

Personal touch: The scammer might use your name or reference a common activity to seem legitimate. Example: "Hi Sarah, it's Mike from the book club. Are you coming to the meeting next week?"

Too good to be true: Offers of prizes, invitations, or other enticing propositions are common. Example: "Congratulations! You've won a $500 gift card. Click here to claim your prize!"

Requests for information: The scammer may ask for personal details, either directly or indirectly. Example: "This is your bank. We need to verify your account. Please reply with your account number and PIN."

Remember, these are all examples of potential scams. Always be cautious when receiving unexpected messages, especially those asking for personal information or containing suspicious links.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

In Bill's case, the scammer employed a "long-play" strategy. By engaging in friendly conversation and offering invitations, the scammer aims to build trust over time. The end goal could be:

Phishing for information: Gradually collecting personal details that can be used for identity theft.

Malware distribution: Eventually sending a link that, when clicked, installs malicious software on your device.

Financial scams: Building trust to eventually request money or financial information.

HOW TO EASILY ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON IPHONE AND ANDROID

To protect yourself from text message scams, follow these steps:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

If you believe you've received a scam text, here are six steps to follow:

1. Don't respond: Avoid engaging with the scammer to prevent further attempts.

2. Block the number: Use your phone's built-in blocking features to prevent further contact.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Report the message: Forward the suspicious text to 7726 (SPAM). Also, report it directly to the FTC at ReportFraud.ftc.gov.

4. Keep your information safe: Never click on links or provide personal information in response to unsolicited texts.

5. Have strong antivirus software: Install and run strong antivirus apps on your phone to scan for malware and ensure your device is secure. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Invest in personal data removal services: Consider using a data removal service to eliminate your personal information from data broker sites. These services can help reduce spam, decrease the risk of identity theft and clean up your online presence by automating the removal of your data from hundreds of data broker sites.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

While it's natural to want to be polite, as Bill was, remember that your safety and personal information are paramount. Trust your instincts, verify unfamiliar contacts and never hesitate to ignore or block suspicious messages. Remember, a true friend won't mind if you take extra steps to verify their identity, and a legitimate organization will have official channels for communication.

How have you or someone you know been affected by text message scams, and what steps did you take to protect yourself? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

That Apple ID disabled message? It's a dangerous scam

18 January 2025 at 05:00

Let's talk about something that's been popping up in inboxes lately — those sneaky "Your Apple ID has been disabled" emails. 

Like many people who've reached out to us, you might have gotten one that looks pretty legit, saying something like, "Your Apple ID has been temporarily disabled. Verify your Apple ID Information." 

Spoiler alert: It's most likely a scam, and we're going to break down why.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

So, here's how these tricksters operate. You get an email that looks totally legit with an Apple logo and creates a sense of urgency, claiming your Apple ID is in trouble. They'll say something like, "If you do not verify your account within 48 hours, it will be permanently locked." Yikes, right? That's exactly what they want you to think. So, you'll "Click the button below to verify as soon as possible." They want you to click where it says, "Go to Apple ID."

Once you do that, you're directed to a fake Apple website designed to look almost identical to the real one. This fraudulent site prompts you to enter your username, password and other sensitive information, which the scammers can then use to access your Apple account and potentially steal your personal data or make unauthorized purchases.

NEW CYBERATTACK TARGETS IPHONE AND APPLE IDS: HERE’S HOW TO STAY SAFE

Urgent language: They're trying to scare you into acting without thinking. Classic scammer move.

Vague claims: "Missing or invalid information"? That's purposely unclear to make you doubt yourself.

Threats of lockout: Nothing like a good threat to get your heart racing, huh?

Terms of service talk: They throw this in to sound official, but it's just smoke and mirrors.

Grammar goofs: Real Apple emails are polished. Scammers? Not so much.

Fishy sender address: Always check if it's actually from @apple.com (spoiler: it's probably not). Any legitimate email from Apple will come from a domain ending in "@email.apple.com. As you can see from the scam email below, it's from a fake email: mfrasier@wavecable.com, not Apple.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

HOW TO SECURELY LOCK YOUR IPHONE AND IPAD FROM PRYING EYES

You might wonder, "Why are these scammers so obsessed with Apple IDs?" Well, there are a few reasons:

 5 THINGS TO DO FIRST IF YOU GOT A NEW MAC

To keep scammers at bay and secure your Apple ID, follow these comprehensive steps:

1. Enable Two-Factor Authentication (2FA): This crucial security feature adds an extra layer of protection to your Apple ID. Set it up by going to Settings[your name] > Sign-In & Security on your iPhone or iPad, or Apple menuSystem Settings > [your name]Sign-In & Security on your Mac.

2. Use strong passcodes: Opt for alphanumeric passcodes instead of simple PINs. When in public, use biometrics (Face ID or Touch ID) and be cautious when entering your passcode.

3. Enable Stolen Device Protection: If you're using iOS 17.3 or later, turn on this feature for additional security against theft.

4. Keep software updated: Regularly update your operating system and apps to ensure you have the latest security patches.

5. Don’t click on suspicious links, use strong antivirus software: If the email asks you to click a link, don’t do it right away. Hover over the link to see the actual URL. If it doesn’t look like an official Apple website (or any site you trust), don’t click it.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Use a password manager: Generate and store strong, unique passwords for all your accounts by using a password manager.

7. Enable Find My: Turn on Find My iPhone to help locate your device if it's lost or stolen.

8. Use a personal data removal service: Consider using a service that finds and removes your personal information from data broker sites. These services can help reduce your digital footprint, making it harder for scammers to obtain your data to target you in the first place. Look for a service that offers automated removals from hundreds of data aggregators and provides detailed verification of removals.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

9. Don’t click on suspicious links: If the email asks you to click a link, don’t do it right away. Hover over the link to see the actual URL. If it doesn’t look like an official Apple website (or any site you trust), don’t click it.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

TOP PHONE CHARGING CABLES THAT WILL SUPERCHARGE YOUR APPLE DEVICES

Apple will never email you asking for your password or threaten to lock your account. If there's a real issue, you'll usually get a notification on your trusted device or be asked to sign in to your Apple ID account page directly. Remember, Apple will never ask for your password via email, phone or text message. Always access your account through official Apple websites or apps.

These scammers are getting craftier, but with a bit of know-how and caution, you can keep your Apple ID (and all the good stuff connected to it) safe and sound. Remember, if something feels fishy, trust your gut. When in doubt, go straight to Apple's official website or give their support team a call. Keep your digital life secure, and don't let those scammers take a bite out of your Apple.

Have you ever fallen victim to a digital scam, and what steps did you take to protect yourself afterward? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Best ways to give your old iPhone a second life

17 January 2025 at 09:00

Before tossing out your old iPhone, consider it a treasure trove of potential waiting to be unlocked. 

Your seemingly outdated device isn't just electronic waste. It's a versatile gadget ready for an exciting second life. From transforming into a smart home hub to becoming a dedicated digital companion, an old iPhone can be repurposed in countless creative ways that breathe new life into technology you may not have considered. 

Here are some of the best ways to use your old iPhone.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Smartphones are incredibly powerful, but they can also be overwhelming. The constant notifications and social media updates can make it hard to focus or enjoy the present moment. If you’re finding that your iPhone is more of a time-waster than a tool for productivity, why not transform it into a "dumb phone"? A "dumb phone" is a basic mobile device that focuses on essential communication functions like calling and texting, while minimizing digital distractions through limited internet access and app capabilities, helping you reduce screen time and stay more present.

Disable notifications:

Delete unwanted apps:

Factory reset (Optional):

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Eventually, you may want to give your child their own smartphone. While a new phone can be expensive, handing down your old iPhone is a great way to introduce them to technology while also being mindful of your budget. 

By using Family Sharing and parental controls, you can carefully monitor what apps and content your child accesses. Plus, it’s an excellent way to bring them into the Apple ecosystem. 

Set up Family Sharing:

Enable Parental Controls:

This process will help you manage your child's device usage effectively while ensuring they have access to appropriate content.

24 MOST AMAZING GIFTS FOR KIDS

In recent years, Apple’s Continuity Camera feature has made it easy to use an iPhone as a webcam for your Mac or Apple TV. While newer models work well for this purpose, older iPhones can still serve as excellent webcams, especially for online meetings and video calls. 

Instead of purchasing an external webcam, your old iPhone can deliver superior video quality. iOS 18 even allows older iPhones to work as dedicated continuity cameras for Apple TV, which is ideal for FaceTime or Zoom calls with family and friends.

Instead of purchasing an external webcam, your old iPhone can deliver superior video quality.

Why use your main iPhone for music when you can repurpose your old one as a dedicated MP3 player? With your old iPhone set up as a music player, you can enjoy your favorite tunes or podcasts without the distractions of text messages or social media notifications. It’s a perfect solution for workouts, long drives or when you just want to zone out with music.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

If you own an Apple TV, you already know that your iPhone can function as a remote control. However, keeping your main phone tied up with the remote can be inconvenient. By making your old iPhone a dedicated Apple TV remote, you can still enjoy controlling your TV without using your primary phone. 

Set up Apple TV remote feature:

Manage smart home devices:

Your old iPhone can even be a hub for all your smart home devices, from adjusting lights and thermostats to checking security cameras.

10 SMART HOME DEVICES WE LOVE

Smartphones have transformed mobile gaming, and your old iPhone could be an ideal portable gaming console. Many classic and modern games run smoothly on older iPhone models, and with subscription services like Apple Arcade, you can access a huge library of high-quality games. This is a fun, low-cost way to enjoy mobile gaming without draining your main iPhone’s battery life.

For book lovers, using an old iPhone as a dedicated e-reader is a great option. You can install apps like Kindle or Apple Books from the App Store. The iPhone's display is perfect for reading books and graphic novels, and since you’re not using your main iPhone, there are no distractions like notifications to interrupt your reading. 

You can disable all apps and notifications on the old device, making it a peaceful reading experience. Plus, you can still connect your AirPods to listen to audiobooks while on the go.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Just because you’ve upgraded to a new iPhone doesn’t mean your old one has to be discarded. There are countless ways to repurpose it, from boosting your productivity to controlling your smart home. This way, you can extend its lifespan and maximize the value of your purchase. 

What other devices would you like tips on breathing new life into? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

15 January 2025 at 09:00

Apple’s Macs are generally considered more secure than Windows PCs, but they are not immune to hackers. Numerous incidents demonstrate that Macs are not impenetrable, and a new one has recently been added to the list. Security researchers have discovered a new variant of stealer malware that targets browser credentials, cryptocurrency wallets and other personal data. I reported on this malware in 2024 as well. Previously, it relied on macOS browser extensions to steal data. Now, it uses phishing websites and fake GitHub repositories to target Macs, which have a user base of 100 million people.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Cybersecurity company Check Point has discovered a new variant of info-stealer malware, BanShee. Elastic Security Labs first highlighted this malware in mid-2024, noting that it operates as malware-as-a-service, a business model in which cybercriminals provide access to malicious software and related infrastructure for a fee. At that time, it was available for as much as $3,000 per month.

Check Point says this malware evolved in September after being exposed. This time, its developers had "stolen" a string encryption algorithm from Apple’s own XProtect antivirus engine, which replaced the plain text strings used in the original version. Since antivirus programs expect to see this kind of encryption from Apple’s legitimate security tools, they weren’t flagged as suspicious, allowing the BanShee to remain undetected and quietly steal data from targeted devices.

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

BanShee Stealer is a prime example of how advanced malware has become. Once it’s on a system, it gets straight to work stealing all kinds of sensitive information. It goes after data from browsers like Chrome, Brave, Edge and Vivaldi, as well as cryptocurrency wallet extensions. It even takes advantage of two-factor authentication (2FA) extensions to grab credentials. On top of that, it collects details about the device’s software and hardware, as well as the external IP address.

The Mac malware also tricks users with fake pop-ups that look like real system prompts, tricking victims into entering their macOS passwords. Once it has gathered the stolen information, BanShee exfiltrates it to command-and-control servers, using encrypted and encoded files to ensure the data remains secure.

The malware’s creators used GitHub repositories to spread BanShee. They set up fake repositories that looked like they hosted popular software, complete with stars and reviews, to seem trustworthy. These campaigns didn’t just target macOS users with BanShee. They also hit Windows users with a different malware called Lumma Stealer. Over three waves, the attackers used these fake repositories to trick people into downloading their malicious files.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Follow these essential tips to safeguard your Mac from the latest malware threats, including the notorious BanShee Stealer.

1) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2) Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

3) Keep your software updated: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

4) Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here; it generates and stores complex passwords for you, making them difficult for hackers to crack.

It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed password managers of 2025 here.

5) Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

No device is immune to cyberattacks when a human operator is involved. Take the BanShee Stealer, for example. It managed to target Macs not due to weak cybersecurity measures by Apple but because it successfully tricked users into installing it and granting the required permissions. Most breaches, hacks and other cyberattacks stem from human error. This highlights the importance of maintaining basic cybersecurity hygiene. It's crucial to know what you’re downloading, ensure it’s from a trusted source and carefully review the permissions you grant to any online service or application.

When downloading new software, how do you determine if it’s safe to install? Do you rely on app store ratings, reviews or something else? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

First 15 things to do or try first when you get a new iPhone

14 January 2025 at 09:00

Apple announces new iPhones every year, and I often wonder if that's truly necessary. A launch every two years seems more reasonable, especially since the new iPhones are often only marginally better than the ones released the year before. This has been the case since the iPhone 12. 

However, in 2024, Apple introduced a range of interesting features with the iPhone 16. While these features don’t necessarily justify an upgrade if you already own the iPhone 15 or even the iPhone 14, they make the iPhone 16 a worthy purchase if you’re using an older model or an Android phone.

If you've already made the purchase, or if you've bought another iPhone, here are the first things you should do and try when you fire up your new phone. (First things to do if you got a new Android)

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

First things first, let's update your software to iOS 18.2 or later:

HOW TO PROTECT YOUR IPHONE, IPAD FROM MALWARE

To add a passcode or biometric authentication to your new iPhone after updating to iOS 18.2 or later, follow these steps:

For Face ID:

IS IT TIME FOR ME TO UPGRADE TO NEW IPHONE?

Create or sign in to Apple ID:

Enable iCloud:

MUST TURN-OFF PRIVACY SETTINGS ON YOUR IPHONE

Customize Display:

Customize sound preferences:

Manage Privacy Settings:

By default in iOS 18, you get flashlight and camera shortcuts on the lock screen, but now you can finally customize them. 

Here's how to enable Family Sharing on your iPhone:

There are millions of apps available, such as Apple MapsGoogle Maps and even apps to plan a party in the App Store. To download useful apps on your new iPhone, follow these straightforward steps:

Having a strong spam filter on your iPhone is beneficial to protect yourself from unwanted text messages and scams. But beware that this may also filter out some legitimate messages from people who are not in your contacts list.

On all iPhone 16 models, you can use Camera Control with visual intelligence to quickly learn more about the stuff around you. Just press and hold the Camera Control, which is a new button on the right side of the device, and you can do things like look up info about a restaurant or business, translate text, get a summary, have it read out loud and more.

You can even use it to find details about a business, like its hours, services and contact info. Depending on the place, you might also be able to check reviews, make a reservation or order for delivery.

To use this feature, point your iPhone camera at the business in front of you, then press and hold the Camera Control. Next, either tap the Camera Control again or select the business name at the top of the screen. Depending on the business, you can:

HOW TO SCHEDULE FREE SESSION WITH APPLE SUPPORT

Apple made several changes to the iPhones with its iOS 18 update, including updates to the Journal app. You don’t need the latest iPhone 16 to try the app’s mindfulness option for journal entries; any iPhone with iOS 18 will do. When you open the Journal app, tap the icon that looks like a tiny tree, and you’ll be able to log your mood for each day and see how it changes over time.

The Action Button is part of the iOS 17 operating system for the iPhone 15 series and continues into iOS 18 for the iPhone 16 series. This customizable side button lets you choose a specific function to perform when pressed, such as turning on silent mode, focus, camera, flashlight, voice memo, recognize music, translate, magnifier, controls, shortcut and accessibility, depending on your settings. Essentially, it acts as a quick access key for a chosen action. Here are the steps to customize the Action button on supported iPhone models:

I always stress the importance of using a password manager to store your passwords. Let’s be honest, we all have a ton of apps and services that require an account and password. If you use the same password everywhere, you risk having your important info stolen by cybercriminals. But it’s also impossible to come up with a unique password for every app and remember them all. 

Password managers make life easier by storing your passwords and filling them in when you log into apps. But they usually charge a monthly or yearly fee. That’s where Apple’s Passwords app comes in. It works just like a password manager but without the extra cost. Open the app from the App Library, and it’ll keep your login details encrypted and synced across all your devices.

While Apple's new Passwords app in iOS 18 offers a convenient and cost-free solution for password management, it's important to consider its limitations. These include its exclusivity to the Apple ecosystem, lack of compatibility with Android or Linux devices and limited functionality outside of Safari and Apple apps. For those seeking a more comprehensive password management solution that works across various browsers and apps, check out my best expert-reviewed password managers of 2025 here.

Apple introduced Apple Intelligence for iPhone 15 Pro and newer models running iOS 18.2, bringing a range of AI tools and ChatGPT support. ChatGPT is now built into various parts of iOS, and if you have an iPhone 15 Pro or above, you can take full advantage of this integration.

You can use Apple's enhanced Writing Tools to access ChatGPT directly in apps like Notes, Mail and any other text input field. Whether you need help spicing up your notes or generating complex programming scripts, ChatGPT is up for the task. Here's how to get started; you’ll need to enable ChatGPT integration. 

Antivirus software can help protect your new iPhone from malware, phishing and other threats. The best way to protect yourself from having your data breached is to install antivirus protection on all your devices. Having strong antivirus software on your devices will alert you of any known malware that is targeting you, warn you against clicking on any known malicious links in phishing emails and ultimately help protect you from being hacked. Get my picks for the best 2025 antivirus protection winners for your iPhone, Mac, Windows and Android devices.

Making data backups a regular part of your iPhone maintenance is crucial. This way, you can protect yourself against uncertainties. Whether it's a hardware malfunction or a security breach, having a recent backup will let you recover quickly.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

When you get your new iPhone, there are several essential steps to take to ensure you're getting the most out of your device. Start by updating to iOS 18.2 or later to access the latest features. Next, security measures like a passcode or biometric authentication should be set up for added protection. Personalize your settings by customizing your display and sound preferences, and don’t forget to enable Family Sharing if you want to connect with loved ones. Also, explore the App Store to download useful apps. Additionally, make sure to give the Action Button a test run for quick access to your favorite functions. With these tips, you'll be well on your way to maximizing your new iPhone's capabilities.

How do you feel about the annual iPhone releases? Do you think they provide enough value each year? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

5-minute cleanup for your phone and computer

13 January 2025 at 15:25

Digital junk piles up faster than clutter in real life. There are files you don’t need, all those random screenshots, apps you downloaded and used once, and blurry photos clogging up your camera roll.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

It all adds up, slowing your devices down and making everything feel messy. The good news? Cleaning it up is easier than you think. Let’s do a quick declutter that will make you say, "Ahhh, that feels better."

Step 1: Update your devices

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA

There are too many dangerous bugs out there to skip security patches.

Start with your phone

Scroll through your app list and delete any you’re not using anymore. If it’s been months, you’re not going to use it. Trust me. And even if you do want it later, great, download it again. 

YOUR SSN IS ON THE DARK WEB — HERE’S WHAT TO DO ABOUT IT

While you’re at it, move the apps you want to spend less time using (Instagram for me) off your phone’s home screen. You can hide the app or just move it to another page or folder.

On iPhone: 

On Android: 

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

On iPhone or iPad, the Photos app makes this a breeze. 

On an Android, open the Files by Google app, select Clean, then:

Onto your computer

Here’s the quick and dirty way. Create a new folder, then drag all the random files, screenshots and whatever else into it. 

Pro tip: Sensitive documents have no place on your desktop. If you do insist on saving private docs locally, at least give a snoop a more challenging time by naming the folder something off-base like "Vacation Photos." Be sure your computer automatically locks when you’re away and requires a password on startup, too.

Quick lock: For Windows, hit the Windows key + L. On a Mac, use Ctrl + Cmd + Q.

They take up a decent amount of space, so regularly clear out anything you’re not using. Beyond that, outdated apps could put you at risk. By keeping old programs on your computer, you’re potentially leaving a door wide open for cybercriminals to slip in.

On a Windows PC:

On a Mac:

Don’t forget the outside

We’re aiming for quick, so let’s tackle those fingerprint-covered screens.

On your phone, remove the case and accessories. You want to reach every nook and cranny. For a computer monitor, dust the back top, sides and any ledges that collect dirt before you start cleaning.

A microfiber cloth works, but I prefer screen-cleaning wipes. They’re just so easy. Skip paper towels. They’re too rough for delicate jobs like this.

I always come back to this 210-pack of screen cleaning wipes. Use them on smartphones, tablets, monitors, TVs, remote controls and even glasses. They’re scratch-free and made with anti-static tissue that cleans without leaving behind streaks or lint.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Lost your contacts on your phone? Here's how to get them back

7 January 2025 at 08:00

As high-tech and advanced as all our modern mobile devices are, there's no way of getting around basic user errors. Luckily, the makers of your mobile devices kept such errors in mind. That is why we were eager to respond to Lynne's question about how to restore a deleted contact on your mobile device.

"I must have ‘FAT’ fingers, as I accidentally deleted information in my contacts. I had typed in a couple of other contact phone numbers. But guess I accidentally deleted these. I would [like] to get this information back. I am guessing I am asking for a miracle." — Lynne P. of Lakewood Ranch, Florida

There are several options or methods to restore your contact information on an iPhone or Android, so it is easy to find a solution that should work for you.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Luckily, the makers of iPhones and Android phones understood that mistakes happen and contacts can be erased by accident. Below are ways to restore your contacts on an iPhone or Android phone:

There are two resources for iPhone owners in order to restore contacts: via iCloud or iTunes Backup. Before attempting to restore your contacts, back up your iPhone so you have recourse if you lose data.

Restore contacts with iCloud:

WHICH IPHONE 16 IS RIGHT FOR YOU? DISCOVER YOUR PERFECT MATCH

Restore contacts with iTunes:

If you have not enabled iCloud to back up your contacts, you may be able to restore contacts with iTunes.

4 WAYS TO FIND YOUR LOST IPHONE, WITH AND WITHOUT OTHER DEVICES

There are two resources Android users can use to restore contacts: Google Contacts or Device settings. Before attempting to restore your contacts, back up your Android so you have recourse if you lose data.

Restore contacts with Google Contacts:

Settings may vary depending on your Android phone’s manufacturer.

Restore contacts with Device Settings:

 Settings may vary depending on your Android phone’s manufacturer. 

Please note: Only contacts that aren't already on your phone will be restored.

FIRST THINGS TO DO IF YOU GOT A NEW ANDROID

While it is ideal if you never make a mistake while using your mobile devices, accidents do happen and contacts do get deleted accidentally. That’s why the makers of iPhones and Android devices have multiple ways you can restore contacts on your phone. Following these easy steps outlined above gives you the ability to rectify that situation quickly. It is best to make sure that your mobile devices are being backed up either to the cloud or physically to a computer or hard drive backup so that there is a source from which to restore your contacts. Additionally, should anything go awry when you're doing the restoration process, you have the ability to recover lost data. Accidents happen, but practicing safe data hygiene prevents them from becoming a lost cause or needing a miracle.

Have you ever accidentally deleted a contact on your mobile device? How did you recover that contact information? Are your contacts backed up anywhere? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Create custom visuals on your iPhone with Image Playground in iOS 18.2

5 January 2025 at 05:00

Apple's new Image Playground feature is an excellent addition to the iPhone, allowing you to easily create custom visuals. 

This innovative tool transforms simple text prompts into images or animations in seconds, opening up a world of creativity right at your fingertips.

Before diving in, ensure your iPhone is compatible. Image Playground works on:

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

GET ORGANIZED: NEW IOS 18 CALENDAR FEATURE  

To access Image Playground, update to iOS 18.2 or later:

IOS 18'S NEW TEXT FORMATTING AND EFFECTS IN MESSAGES  

Once updated, locate the Image Playground app icon on your home screen. It looks like a cute animal in a soap bubble. The app uses Apple Intelligence to combine concepts, text descriptions and people from your photo library to create stylized images. Here's how to use it:

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

You can create images based on your contacts. Here’s how:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

GET FOX BUSINESS ON THE GO BY CLICKING HERE

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

Image Playground allows anyone with a compatible iPhone to produce unique, personalized images in seconds. While the results may not always perfectly capture reality, the technology is likely to improve over time. This feature opens up new possibilities for digital expression and storytelling right from your pocket.

What fun and creative things do you think you could make with Apple's new Image Playground feature? Let us know what you think by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Ditch boring emoji and create your own unique versions with Genmoji on iPhone

4 January 2025 at 05:00

Have you ever found yourself scrolling through the emoji keyboard, frustrated that you can't find the perfect little icon to express your exact sentiment? 

Well, Apple has a solution for you with its latest iOS 18.2 update: Genmoji. 

This innovative feature allows you to create custom emoji on the fly, bringing a whole new level of personalization to your conversations.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Genmoji, a clever blend of "generative AI" and "emoji," is Apple's latest addition to its Apple Intelligence suite. This feature harnesses the power of on-device artificial intelligence to generate custom emoji based on your text descriptions. 

Whether you're looking for an "elephant riding a roller coaster" or a "frog with tap-dancing shoes," Genmoji can bring your imagination to life in emoji form. You can even create emoji based on people in your Photos app, making your digital expressions more intimate and meaningful. This level of customization allows you to convey nuanced emotions and situations that standard emoji simply can't capture.

HOW TO PROTECT YOUR IPHONE AND IPAD FROM MALWARE

It's important to note that Genmoji is available only on iPhone 15 Pro and Pro Max models or devices from the iPhone 16 lineup. The feature is part of the iOS 18.2 update, which Apple recently released.

First things first, let's update your software to iOS 18.2 or later:

HOW TO FACTORY RESET YOUR IPHONE

HOW TO DELETE MULTIPLE EMAILS AT ONCE ON IPHONE

Using Genmoji is surprisingly simple:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

To create a Genmoji using a person's photo from your gallery, follow these steps:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

First, make sure the person you want to use is tagged in your Photos app. This is crucial for Genmoji creation. You can only use people who are already in your contacts. It works best with clear, front-facing photos where the person's face is easily visible.

Select a person

Customize the Genmoji

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Genmoji isn’t just a fun new feature; it’s a total game-changer for how we chat with each other. You can create an emoji that perfectly captures your mood or a specific situation. How awesome is that? As we start to embrace more AI in our daily lives, Genmoji really takes our conversations up a notch, making them more personal and creative.

Do you think you'll enjoy using Genmoji, or do you find it more annoying than helpful, wishing we could just stick to plain texting? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

12 must-have apps to crush your New Year’s resolutions

1 January 2025 at 05:00

Happy New Year! As 2025 begins, it’s the perfect time to set intentions and start fresh. Whether you’re aiming to adopt healthier habits, master new skills or take control of your finances, there’s an app to help you make it happen. Technology can be a game-changer in turning resolutions into realities, and we’ve come up with a list of tools designed to support your goals and keep you motivated all year long.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

If your goal is to create and stick to healthy habits, Habitica offers a fun, gamified approach to habit tracking. By turning your tasks into a role-playing game, Habitica motivates you to complete daily tasks, habits and to-dos to level up your character, earn rewards and avoid penalties. You can join parties with friends, participate in quests and tackle challenges together. The app is perfect for anyone who loves games and wants to make self-improvement enjoyable. Habitica is free with optional in-app purchases for customization and premium content.

SKYROCKET TO A HEALTHIER LIFESTYLE WITH THIS GEAR IN 2025

MyFitnessPal is a powerful tool for tracking your nutrition, exercise and progress toward health goals. Whether you're aiming to lose weight, gain muscle or maintain a healthier lifestyle, the app offers a massive food database, a barcode scanner and customizable goals to suit your needs. It also integrates with fitness trackers and apps to provide a comprehensive overview of your wellness journey. MyFitnessPal offers free features, with a premium subscription unlocking more advanced insights and features, such as macronutrient goals and meal planning.

5 WAYS TECH CAN HELP YOU FEEL LESS ALONE

iPhone: 4.8 stars (at time of publishing)

Android: 4.4 stars (at time of publishing)

The Headspace app can help you achieve your New Year’s resolutions of practicing mindfulness and meditation. You can access hundreds of tailored sessions, courses and exercises for various topics, such as stress, sleep, focus and happiness. Headspace can help you improve your mental health and well-being in 2025. You can try Headspace for free for 10 days and cancel anytime. Headspace offers discounts for students, educators and health care professionals.

iPhone: 4.8 stars (at time of publishing)

Android: 4.7 stars (at time of publishing)

If your New Year's resolution is to learn a new language or improve your existing skills, the Duolingo app can help you accomplish your goals. With this app, you can set your own goals and track your progress as you learn from over 40 languages, including Spanish, French, Japanese and more. Duolingo makes learning enjoyable and effortless with bite-sized lessons, games and stories that fit your schedule and level. You can also use Duolingo for free with some limitations, such as ads, fewer lessons and no offline access.

BEST WIRELESS EARBUDS EXPERT REVIEWED

iPhone: 4.8 stars (at time of publishing)

Android: 5.0 stars (at time of publishing)

If one of your New Year’s resolution goals is to read more books, you might want to check out Serial Reader, a mobile app that delivers bite-sized portions of books to your phone every day. The app lets you choose from over 700 classic books, from "Pride and Prejudice" to "War and Peace," and sends you a 10-minute portion of the book every day. You can read at your own pace, adjust the font size and theme and sync your progress across devices. You can also earn achievements and badges as you complete books and challenge yourself to read more.

Serial Reader is a great way to discover new books, revisit old favorites or catch up on the classics you’ve always wanted to read. It’s also a fun and easy way to make reading a habit and a part of your daily routine. You can start reading for free or upgrade to Serial Reader Premium to unlock more features, such as offline reading, highlighting, notes and more.

SMART RINGS THAT CAN TRACK YOUR SLEEP, FITNESS, COULD SAVE YOUR LIFE

iPhone: 4.6 stars (at time of publishing)

Android: 4.6 stars (at time of publishing)

If your New Year's resolution is to learn and master musical instruments or vocals, the Yousician app can help you do just that. Whether you are a beginner or an expert, you can find the right lessons and songs for you. You can also practice with real-time feedback, track your progress and challenge yourself with new goals. The app supports guitar, piano, ukulele, bass and singing. You can choose from various genres, styles and levels of difficulty.

The app is free to download and use, but it has some limitations. You can only access a limited number of lessons and songs per day, and you can only use one instrument at a time. If you want to unlock unlimited access to all the features and content, you need to subscribe to the premium plan.

iPhone: 4.8 stars (at time of publishing)

Android: 4.4 stars (at time of publishing)

Nike Training Club is a versatile mobile app designed to help you achieve your fitness goals in 2025. Whether you're aiming to lose weight, build muscle or improve overall health, Nike Training Club offers a wide array of resources to keep you motivated. With access to hundreds of free workouts for all fitness levels, including body-weight exercises, yoga and cardio, this app is perfect for getting started without any cost. The app also features personalized training plans, expert tips and instructional videos from professional trainers.

For those who want more, Nike Training Club provides a premium upgrade that includes HD workout videos, advanced workout tracking and comprehensive training plans tailored to your fitness journey. Get ready to crush your fitness goals with one of the highest-rated fitness apps on the market.

GET MORE TIPS LIKE THIS BY SIGNING UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

iPhone: 4.7 stars (at time of publishing)

Android: 4.5 stars (at time of publishing)

If one of your New Year’s resolution goals is to quit smoking, you might want to try QUITNOW, a mobile app that helps you break free from nicotine addiction. QUITNOW is an app that tracks your progress, shows you how much money you save and rewards you with achievements and health benefits as you quit smoking. You can also join a community of over 10 million quitters, chat with other users and get support and advice from experts and coaches. QUITNOW is a free app, but you can upgrade to QUITNOW PRO to access more features, such as personalized plans, motivational quotes and advanced stats.

iPhone: 4.8 stars (at time of publishing)

Android: 4.5 stars (at time of publishing)

Todoist is a mobile app designed to help you organize your life and achieve your New Year’s resolutions in 2025. With Todoist, you can create tasks, projects and subtasks, assigning due dates, priorities and labels to each. The app allows for seamless syncing across devices, enabling collaboration with others and integration with various apps and services. Todoist provides feedback, reminders and productivity statistics to keep you motivated. It is free to download, but you can upgrade to Todoist Premium or Todoist Business for enhanced features. The Premium plan offers additional functionalities such as comments, attachments, filters and templates. As of now, Todoist boasts more than 30 million users, reflecting its popularity as a task management tool.

iPhone: 4.8 stars (at time of publishing)

Android4.7 stars (at time of publishing)

The YNAB app is a great mobile app for helping you create a budget, plan your spending and save more money in 2025. YNAB lets you connect your bank accounts, credit cards, loans and track your transactions and balances. You can also set goals, assign categories and prioritize your expenses. YNAB also provides you with reports, feedback and coaching to help you improve your financial skills and habits. YNAB is not free, but you can get a 34-day free trial to use the app.

iPhone: 4.8 stars (at time of publishing)

Android: 4.2 stars (at time of publishing)

Skillshare is a great app for helping you keep your New Year’s resolution of learning something new. You can discover new passions, hobbies and interests with the app. You can access thousands of online classes on various topics, such as photography, design, business and more. You can also watch videos, do projects and get feedback from experts and peers. The app also offers live sessions, workshops and challenges to keep you motivated and engaged. The app is perfect for anyone who wants to learn something new, explore their creativity or advance their career.

The app is free to download and use, but it has some limitations. You can only watch a limited number of classes and videos per month, and you can’t access the premium features and content. If you want to unlock unlimited access to all the classes, videos and features, you need to subscribe to the premium plan.

iPhone: 4.7 stars (at time of publishing)

Android: 4.5 stars (at time of publishing)

Is one of your New Year's resolutions to improve your cognitive skills and mental fitness? Well, then the Lumosity app might be worth downloading. Lumosity is a brain-training app that offers personalized and adaptive exercises that challenge your memory, attention, speed, flexibility and problem-solving abilities. You can track your progress and compare your results with others. Lumosity also provides insights and tips on how to optimize your brain health and performance. Whether you want to sharpen your mind, boost your productivity or have fun, Lumosity could be the app for you. Lumosity has different subscription plans to suit your needs and budget. You can try Lumosity for free for 7 days and cancel anytime.

Experience the peace of mind that comes with being closely involved in your family’s caregiving with Connected Care. This lovingly designed, intuitive mobile app transforms the complexities of managing health care into a seamless and heartwarming part of your daily routine.

Imagine easily organizing your loved one’s doctor visits, medication schedules and medical history all within the palm of your hand. With Connected Care, not only do you get a comprehensive medical summary at a glance, but you also become part of a nurturing network that ensures your family member’s needs are attended to with the utmost care and attention.

Enjoy how easy it is to share important updates about your loved one’s care with other family members and caregivers. With Connected Care, you can create a team of people who are all on the same page and ready to give the best support. Connected Care is more than just an app; it’s a caring friend who helps you manage long-term care.

While the majority of features are free, the option for a subscription to Connected Care Premium allows you to enhance this experience, ensuring that you have all the tools you need at your fingertips. Should you opt for premium, the process is made simple through your Apple account, with the flexibility to manage your subscription directly from the App Store settings.

Discover how Connected Care can help you keep the heart of your family beating strong, every single day.

Get on iPhone 
Get on Android

A new year is a blank slate filled with endless possibilities, and these apps are here to help you make the most of it. Whether your goal is personal growth, better health or learning something new, these tools can make your journey more manageable and enjoyable. Start 2025 with purpose and let these apps be your partners in creating lasting change. Here’s to a year of progress, achievement and success.

What’s your biggest goal for 2025, and which app do you think will help you achieve it and why? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

❌
❌