Normal view

Before yesterdayMain stream

Identify any mystery caller for free with this phone number lookup tool

8 February 2025 at 05:00

Got an unknown number that's been driving you nuts? 

We totally get it. 

Those random calls on your cellphone can be seriously frustrating. And now you can fight back with a simple, free solution. In just a few easy clicks, you'll go from feeling annoyed to being in total control, uncovering exactly who's behind that mysterious phone number.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

The TruePeopleSearch.com website works with both landline and cellphone numbers. It allows you to do a reverse phone lookup for any type of phone number, whether it's a cellphone or a landline. It's important to note that the availability and completeness of information can vary depending on the specific number and its associated public records. 

However, in most cases, with just a few simple steps, you'll go from "Who the heck is calling me?" to "Aha! Now I know exactly who this is." Note that you can also search by name, address and email, as well, but for our example, we'll use a phone number. 

AN ALARMING SPIKE IN SCAM CALLS ORIGINATING FROM ROBOCALLS

Grab your preferred device — be it a computer, smartphone or tablet. Any browser will do, so launch Chrome, Safari or whatever you're comfortable with. Type in truepeoplesearch.com in your browser's address bar. The layout might vary slightly depending on your device, but don't worry — the functionality remains the same.

TOP 10 ROBOCALL HOTSPOTS IN AMERICA

Now, type in that perplexing phone number that's been nagging at you. Hit the search button and watch the magic unfold.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Prepare to be amazed by the wealth of information at your fingertips. Click the "View Details" button next to or under the actual search results, depending on your device. You might discover the person's name, age, date of birth, current address or previous addresses, as well as email addresses, relatives, friends, associates and more. It's astounding how much data a simple phone number can unlock.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Now, beware of Sponsored Links that might try to lure you into signing up for other services.

While TruePeopleSearch.com can be a helpful tool, not every phone number search will yield comprehensive results. The information available varies depending on several factors:

Always use this service responsibly, respect individual privacy and understand that results may be incomplete or vary significantly between different phone numbers.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Try searching for your own phone number. You might be surprised at the amount of information that pops up. If you're uncomfortable with the information available about you, consider investing in a personal data removal service to have that information taken down. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

This free tool empowers you to take control of solving the mystery of who is calling you. No more wondering about unknown callers or potential spam. With just a few clicks, you can unmask the mystery and decide whether to answer, ignore or block that call.

How do you usually handle unknown callers? Have you ever used a reverse phone lookup tool before? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels for the latest tech tips and tricks:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Energy-saving scam uses Elon Musk’s name – Here’s the truth

2 February 2025 at 09:00

Elon Musk, known for leading companies like Tesla, SpaceX, Neuralink and xAI and buying and rebranding Twitter as X, often finds his name linked to innovation and futuristic ideas. But his reputation also makes him a prime target for scammers.

In the past, fraudsters have used Musk’s name in cryptocurrency schemes. Now, a new scam is making the rounds. This time, scammers are promoting bogus "energy-saving" devices, falsely associating Musk with these products to gain credibility. These devices, which don’t work as advertised, are being marketed as revolutionary solutions, duping people into spending money on what is essentially a scam.

We received this email from Rick in Wilkesboro, North Carolina: "I’ve been receiving emails offering an energy-saving device developed by Elon Musk. It claims the device can reduce energy bills by 50%. I never attempted to contact anyone associated with Elon Musk, nor have I done any internet searches for such a device. Are these emails legit or another attempt by scammers hoping I click on their links?"

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Rick, it sounds like those emails are likely scams. There have been numerous reports of scammers using Elon Musk's name to promote fake energy-saving devices. These scams often claim that the device can drastically reduce energy bills, but there is no evidence that Elon Musk or any of his companies are involved in such products.

Let's dive into how this scam works and share some ways you can stay safe.

The Elon Musk energy-saving scam works by using flashy online ads, unsolicited emails and other deceptive tactics to lure victims. Scammers promote so-called "revolutionary" devices through social media, pop-ups, emails and even search engine ads, claiming the products are backed by Musk.

These ads often include fake customer reviews, exaggerated claims of slashing electricity bills by 50% or more and time-limited discounts to create urgency. Names of devices advertised in these scams include the Power Pro Save, Heunwa Power Save, Stop Watt, Miracle Watt, True Watt, Real Watt, Watt Rescue, Esaver Watt, Pro Power Save, Voltmod and more. 

Clicking on these ads leads you to sales websites designed to look legitimate. They feature fake logos, doctored before-and-after photos and bogus celebrity endorsements to build trust. The sites throw around pseudo-scientific jargon like "stabilizing electrical currents" or "rebalancing loads" to sound convincing. They also use tactics like showing inflated "regular" prices crossed out to make the current offer seem like a huge bargain.

If you look closely, though, the red flags are clear. These sites lack basic details like a company address, contact number or business registration information. Instead, they push you to place an order through an online form, demanding full payment upfront via credit card or PayPal.

After paying, customers might receive a cheap, non-functional plastic device, or sometimes nothing at all. These devices don’t reduce electricity usage. They might even waste more power. But by the time you realize it, the scammers have already pocketed your money.

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Over the years, plenty of power-saving scams have promised to cut down or even eliminate your electricity bill by simply plugging in their devices. The reality is that there’s no device you can plug in that will actually reduce your electricity usage or lower your household bill.

These products often claim to "stabilize voltage" or "reduce power waste." While voltage stabilization can be useful in industrial settings, it doesn’t make much difference for typical home appliances. Most household appliances are already designed to run efficiently without the issues these devices claim to fix.

If you’re serious about saving on electricity, focus on practical solutions like upgrading to energy-efficient appliances, using smart home devices or adjusting your energy usage schedule.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME

Too good to be true: Claims of reducing energy bills by 50% or more are often exaggerated and unrealistic.

Unsolicited emails: Receiving emails out of the blue, especially when you haven't shown interest in such products, is a common tactic used by scammers.

Use of celebrity names: Scammers frequently use well-known names like Elon Musk to lend credibility to their schemes.

Suspicious links: Be cautious of clicking on links in unsolicited emails. They can lead to phishing sites designed to steal your personal information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

1. Verify the email: Phishing emails are a common tool scammers use to trick people into buying fake products or giving away personal information. These emails often look like they’re from legitimate sources, but they contain links that lead to fraudulent websites or prompt you to download malicious attachments. Always check the sender's email address and look for signs of a fake message, like poor grammar or urgent calls to action. 

2. Verify claims: If you're curious about a product, do some research from reputable sources before taking any action.

3. Do not click links: Avoid clicking on any links or downloading attachments from these emails. Instead, hover over the link to see its true destination. This can help you identify if it leads to a legitimate site or a malicious one.

4. Have strong antivirus software actively running on your devices: Ensure you have reliable antivirus software installed on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5. Examine the website carefully: Scammers often create websites that look professional, but they’re easy to spot with a few simple checks. Look for missing or suspicious information, like the absence of a business address, phone number or business registration details. If there are fake testimonials or celebrity endorsements, that’s a red flag.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Don’t fall for "too good to be true" deals: Scammers rely on offering deals that seem too good to pass up, like massive discounts or a "limited time offer." If an ad claims you can save 50% or more on a product, be skeptical. Real, quality products usually don’t come with such extreme savings, and high-tech devices like those promoted by scammers rarely live up to the hype. If it feels like too good a deal, it probably is.

7. Watch out for unusual payment methods: One of the easiest ways to spot a scam is by how the scammers ask you to pay. If a website asks for payment upfront via credit card or PayPal with no option to verify or ship the product first, it's a major red flag. Scammers take your money upfront and have no intention of sending you anything of value. Stick to reputable payment methods that offer buyer protection and avoid sites that ask for payment without proper verification.

8. Mark spam email as junk or spam: Most email providers have a feature that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.

9. Do not share your email address publicly or with unknown sources: This can reduce the chances of your email address being collected by spammers. You can also use a disposable email or email alias for signing up for online services that you do not trust or need.

10. Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

YOUR EMAIL DIDN'T EXPIRE, IT'S JUST ANOTHER SNEAKY SCAM

Impersonation scams are a common way scammers steal your money. They often use well-known names like Elon Musk or big companies like Microsoft and Walmart to make you trust them, then trick you into giving away your financial details. To stay safe, avoid unsolicited emails or texts that promote products or offers. If you need to buy something, stick to trusted sellers like Amazon, Best Buy or other reputable platforms. Always double-check the legitimacy of any offer before making a purchase, especially if it comes from an unfamiliar source.

Have you ever encountered a scam using a well-known name or brand? What happened? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Apple's iOS vulnerability exposes iPhones to stealthy hacker attacks

1 February 2025 at 09:00

Generally, iPhones are considered more secure than Android devices. 

Apple’s closed ecosystem and strict App Store policies limit the risk of malware, and its centralized software updates ensure better security. In contrast, Android’s openness allows users to install apps from various sources, and updates are often rolled out at different times, making it more vulnerable to attacks. 

However, iPhones aren’t immune to security flaws. Hackers occasionally find ways to exploit them, as seen in Apple’s latest advisory. The company recently discovered that a vulnerability in iOS had been exploited for over a year. While a fix has now been released, reports suggest that hackers may have already targeted high-value individuals.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Apple has uncovered hackers exploiting a vulnerability in iOS that appears to have been lingering for more than a year. The vulnerability is a "zero-day" flaw, meaning criminals may have already exploited it, according to the latest security advisory from the company. Zero-day flaws like this are especially dangerous because they are exploited before developers can issue fixes. Apple confirmed this marks its first zero-day patch of 2025. The vulnerability affects iPhones dating back to 2018’s XS model, as well as newer iPads, Macs, and even the Vision Pro headset.

The vulnerability, tracked as CVE-2025-24085, resides in Apple’s Core Media framework, a software layer responsible for processing multimedia files. A "use after free" memory corruption error enabled hackers to manipulate the system into executing unstable code, granting them elevated privileges to bypass security protocols. Apple’s advisory suggests hackers weaponized the flaw through malicious apps disguised as legitimate media players. These apps likely abused the Core Media framework by triggering corrupted files, enabling attackers to infiltrate devices.

The attacks reportedly targeted iOS versions predating 17.2, released in December 2023, meaning the vulnerability may have been active since late 2022. Security experts speculate that hackers focused on high-value individuals — such as activists, executives or journalists — to avoid detection. The prolonged stealth of the campaign underscores the challenges of identifying sophisticated, narrowly tailored exploits.

This underscores the critical need for you to update your devices to iOS 17.2 or later, as these versions include essential fixes to safeguard against this actively exploited vulnerability.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

In response, Apple has released fixes across its ecosystem, including iOS 18.3, macOS Sequoia, watchOS, tvOS and VisionOS. You should update your devices as soon as possible to stay protected. To install the update on your iPhone or iPad:

Pro Tip: I recommend you click Update Now and also turn on Automatic Updates to stay covered in the future.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

While Apple has patched this issue, it’s a reminder that staying on top of updates is key. Hackers are always looking for security gaps, so keeping your software up to date is one of the best ways to stay safe.

SCAMMERS FOUND A SNEAKY WAY TO BYPASS YOUR IPHONE'S SAFETY FEATURES

Protecting your iPhone requires proactive security measures. By following these seven essential steps, you can significantly reduce the risk of cyber threats and keep your personal information secure.

1. Keep your iPhone updated: I can’t say this enough. Updating your iPhone regularly is one of the most effective ways to protect it from security threats. Apple frequently releases updates that fix vulnerabilities, including critical zero-day flaws. 

2. Download apps only from the App Store: To minimize the risk of installing malware, only download apps from the official App Store. Apple’s strict app review process helps prevent malicious apps from being published, but some threats can still slip through. Always verify app details, check reviews and be cautious about app permissions before installation.

3. Enable lockdown mode for extra protection: For those of you who may be at higher risk, such as journalists or executives, Lockdown Mode provides an additional layer of security. This feature limits certain device functionalities to prevent sophisticated cyberattacks. It can be turned on via SettingsPrivacy & SecurityLockdown Mode and is especially useful for those concerned about targeted threats.

4. Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently. Here are steps:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

5. Stay cautious of phishing attacks and install strong antivirus software: Phishing remains one of the most common tactics used by hackers. Be cautious when receiving unsolicited messages or emails on your iPhone, especially those with suspicious links or attachments. Always verify the sender before opening anything. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Review your security and privacy settings: Regularly reviewing your iPhone’s security settings can help you maintain strong protection. You should also review app permissions in Settings > Privacy & Security to restrict access to sensitive data, such as location or contacts. Enable Face ID or Touch ID for secure access and turn on two-factor authentication (2FA) for Apple ID and other accounts. 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

7. Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you deceptive phishing texts and emails in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

This iOS vulnerability is a serious reminder of the importance of staying up to date with software updates. If you’re using an iPhone from 2018 or later, make sure you’ve updated to iOS 17.2 or later as soon as possible. Hackers exploited a hidden flaw for over a year, using fake media apps to gain access to devices. While Apple has now patched the issue, the fact that it remained undetected for so long is concerning. 

Do you think companies like Apple are doing enough to protect you from cyber threats?  Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to organize, protect and streamline your inbox with an email alias

30 January 2025 at 09:00

Almost everything you do online asks for your email. If you have been using the same one for a while, chances are hundreds or even thousands of services have it. They send promotional messages, social media alerts, newsletters and more, turning your inbox into complete chaos. You can tame this madness using an email alias.

An email alias helps declutter your inbox by organizing emails based on their purpose. For example, you can create specific aliases for shopping, newsletters or work and set up filters to sort these messages into separate folders automatically. 

Aliases also help manage spam. If an alias starts receiving too many unwanted messages, you can disable it without affecting your main email.

Let’s dive into how to create an email alias on different platforms, including Gmail, Outlook and iCloud. 

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Gmail doesn’t allow you to create a completely separate alias, but it offers workarounds using "+ addressing" or by adding dots to your existing email address. However, these methods don’t prevent an unscrupulous sender from seeing your primary address, so exercise caution when using them with untrusted correspondents. Follow the steps below to get started.

Use your existing Gmail address and add a "+" followed by any keyword before "@gmail.com."

Example: If your email is yourname@gmail.com, you can use:

No additional setup is needed, just start using this alias when signing up for services or sharing your email.

Gmail ignores dots (.) in email addresses, so you can create variations of your email:

Example: If your email is yourname@gmail.com, you can use:

All variations will deliver emails to your main inbox automatically.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Outlook.com allows you to create additional email addresses (aliases) that are linked to your primary account. Emails sent to an alias will arrive in your primary inbox, and you can send messages using the alias as well.

If your primary email is johnsmith@outlook.com, you can create an alias like john.smith123@outlook.com. Emails sent to john.smith123@outlook.com will still go to johnsmith@outlook.com, but you can choose to send emails using either address.

Steps to create an alias:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once added, you can send emails using your alias by selecting it in the From field when composing a new message.

Important limitations to note:

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Apple allows you to create up to three email aliases through iCloud. These aliases can be used for specific purposes, helping you manage your inbox effectively. Here’s how to create one:

It's important to note that you can still create up to three email aliases through iCloud. Remember that while these aliases provide some flexibility, they do not create separate Apple IDs or completely hide your primary iCloud email address.

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

While many email providers offer basic alias functionality, most have significant limitations. Gmail's "+" addressing and dot tricks, Outlook's linked aliases and Apple's iCloud aliases all provide some flexibility, but they often fall short of true privacy protection.

For those of you seeking comprehensive email privacy and robust alias management, my No. 1 pick for private and secure email platforms contains no ads, no tracking and powerful privacy features like password-protected email and unlimited disposable email addresses. See my review of the best secure and private email services here.

Protecting your inbox from scammers requires a combination of smart practices and proactive tools. Using email aliases is an effective first step. By creating specific aliases for different activities, such as shopping, subscriptions or work, you can track where spam is coming from and deactivate problematic aliases as needed. Below are some other steps to take.

1. Avoid sharing your primary email address publicly on forums, social media or other platforms to minimize exposure. Most email providers offer robust spam filters, so ensure they are enabled and customize them as needed

GET FOX BUSINESS ON THE GO BY CLICKING HERE

2. Invest in personal data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3. Enable two-factor authentication on all your email accounts to add an extra layer of security.

4. Be cautious of suspicious links and attachments. Never click on links or download attachments from unknown senders, as these could be phishing attempts.

5. Use strong antivirus software to protect against potential malware that might come through spam emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Regularly update your email password and make it strong and unique, avoiding common words or easily guessable combinations. Consider using a password manager to generate and store complex passwords.

These steps will provide a more comprehensive approach to protecting your inbox from scammers and reducing unwanted emails.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Taking charge of your inbox doesn’t have to be overwhelming. By implementing the tips and tools mentioned above, you’ll create a more secure, efficient and manageable email experience. Whether you’re battling spam or organizing your digital life, email aliases and secure services are great things to put into place.

Which email platform do you use most often, and how do you organize your messages there? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to share a YouTube video starting at a specific time

28 January 2025 at 05:00

Ever watched a YouTube video and thought, "I need to share this exact moment with my friends?" Well, you're in luck. Sharing specific moments from YouTube videos is actually pretty easy. Whether you're on a computer, iPhone or Android device, I'm here to show you how easy it is to do just that.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

YOUTUBE’S 5 MOST OVERLOOKED USEFUL FEATURES

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

YouTube has recently introduced a new, simplified method for sharing video timestamps on Android.

Settings may vary depending on your Android phone’s manufacturer. 

These updated steps make sharing timestamps much simpler, as you no longer need to use Chrome or request the desktop site. For those using older versions of the YouTube app or Android OS or if the update isn't yet available on your device, here are the previous steps:

Settings may vary depending on your Android phone’s manufacturer. 

Both methods allow you to share specific moments in YouTube videos on your Android, but the new process is more streamlined and user-friendly.

TOP ANDROID PHONES OF 2025

Sharing specific parts of a YouTube video has never been easier. Whether you’re on a computer, iPhone or Android device, these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.

Now that you know the steps to share an exact moment, follow our guide and share a specific part of our video with your friends right away. Don't forget to let us know their reactions by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Scammers find sneaky way to bypass your iPhone's safety features

27 January 2025 at 05:00

In an alarming development, cybercriminals have devised a new method to circumvent Apple's built-in phishing protection for iMessage, potentially exposing you to malicious links and scams. This sophisticated tactic exploits a security feature designed to protect you, turning it into a vulnerability that could lead to significant personal and financial risks.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Apple's iMessage automatically disables links in messages from unknown senders as a security measure. However, cybercriminals have found a way to exploit this protection. By instructing you to reply to the message, often with a simple "Y," the attackers can re-enable previously disabled links. This seemingly innocuous action not only activates the links but also signals to the scammers that they've found an engaged target for future attacks.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Apple defines social engineering as a targeted attack that employs impersonation, deception, and manipulation to gain access to personal data. Scammers often pose as representatives of trusted companies, using sophisticated tactics to persuade individuals to disclose sensitive information, such as passwords and financial details. Here are some of those sneaky tactics:

The messages typically end with instructions like: "(Please reply Y, then exit the SMS, re-open the SMS activation link, or copy the link to open in Safari)."

THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE

This new tactic is part of a broader trend of smishing (SMS phishing) attacks targeting mobile users. With the increasing reliance on smartphones for various activities, including financial transactions and personal communications, these attacks pose a significant threat to users' security and privacy.

DOES MY IPHONE NEED ANTIVIRUS PROTECTION?

To safeguard against these sophisticated phishing attempts, consider the following steps.

1) Never reply to suspicious messages: Avoid responding to texts from unknown senders, especially those asking you to reply to activate links. Additionally, make sure to delete suspicious text messages and block the sender to prevent further attempts. Since the sender is not in your contact list, you can click Report Junk at the bottom of the text. Then click Delete and Report Junk. This will report the conversation as junk by sending it to your wireless carrier and Apple using your phone number.

2) Verify sender identity: Contact organizations directly through official channels if you're unsure about a message's legitimacy.

3) Be skeptical of urgency: Scammers often use urgent language to prompt quick, thoughtless actions.

4) Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. Here are the steps:

This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently.

5) Use two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

6) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

7) Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you these deceptive iMessage phishing texts in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

If you suspect you've fallen victim to a smishing attack:

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

This latest trick targeting iMessage users serves as a reminder that even seemingly secure systems can be vulnerable to social engineering. By remaining cautious and following best practices for digital security, you can significantly reduce your risk of falling victim to these sophisticated phishing attempts.

What other cybersecurity challenges have you encountered with your mobile devices, and what questions do you have for us? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Don’t let this credit card fraud nightmare happen to you

26 January 2025 at 09:00

Credit card fraud has been on the rise in recent years.

The Federal Trade Commission’s most recent database indicates that 416,582 cases of credit card fraud were reported in 2024, making it one of the most common forms of identity theft. You know you've been a victim of this fraud when you notice unauthorized transactions on your credit card bill. 

These transactions are usually below $100 to avoid detection. However, sometimes they can exceed $1,000. One such incident happened with Martin from Martinsville, Virginia, when he was randomly charged $1,095 in Hong Kong.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

"Hello, I recently received a fraud alert from my credit card company that said that there was a $1,095 charge on my credit card in Hong Kong. I use my iPad and Safari browser to buy online. Can you please explain how this could happen? By the way, my credit card company canceled my credit card and will send me a new Mastercard in the mail, and I’m not responsible for the charges on my credit card. What can I do in the future to prevent this from happening again?"

I'm sorry to hear about the fraudulent charge on your credit card, Martin. It’s good that your credit card company is handling it and that you’re not responsible for the charges. For future reference, I'll be discussing how this could have happened and how to stay safe.

Credit card fraud can happen in several ways, often without you even realizing it. One common method is when fraudsters get hold of your card information through data breaches at online stores or banks, which means your details get leaked without your knowledge. 

Another sneaky tactic is phishing, where scammers trick you into giving away your card info by posing as legitimate companies via emails or fake websites. 

There’s also the risk of "card skimming," where devices at ATMs or gas stations secretly capture your card details when you swipe it. In some cases, fraudsters might also exploit weak security on public Wi-Fi networks or compromised apps to access your information while you’re shopping online.

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME  

A report from Security.org reveals that 52 million Americans experienced credit card fraud in 2023, a figure even higher than the one reported by the FTC. With four out of five American adults owning at least one credit card, the report found that three in five cardholders have faced unauthorized charges — an estimated 128 million victims. Even more concerning, 75% of these victims reported having their credit card information stolen more than once. 

The typical unauthorized transaction is around $100, which adds up to approximately $5 billion in criminal purchases each year. Interestingly, most unauthorized transactions involve credit cards that weren’t physically lost or stolen, highlighting the growing risks of online fraud and data breaches.

THE BEST BALANCE TRANSFER CREDIT CARDS 2025

Data breaches are one of the main ways credit card fraud happens. Hackers often get unauthorized access to sensitive information stored by businesses or institutions. When a retailer, financial institution or online store experiences a data breach, the hackers usually go after the payment systems where customer credit card details are kept.

If these systems aren’t properly secured, hackers can grab things like credit card numbers, expiration dates and sometimes even security codes. Once they have that info, they can either use it themselves or sell it to others.

But it’s not just credit card information at risk. Data breaches can also expose personal details like names, email addresses and phone numbers. Scammers can then use this stolen info to launch phishing attacks, pretending to be trusted companies and tricking you into giving away more sensitive information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

This is why identity theft monitoring is so important. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

1. Notify your credit card issuer immediately: If you notice fraudulent charges on your credit card, start by calling the number on the back of your credit card. From there, you should get more detailed information on what to do next.

2. Monitor your statements regularly: One of the best ways to catch credit card fraud early is to keep an eye on your statements. Review your transactions regularly to spot any unfamiliar charges. The sooner you notice something suspicious, the quicker you can report it to your credit card company and prevent further damage.

3. Regularly check your credit report: In addition to monitoring your credit card statements, periodically review your credit report to catch any unauthorized accounts opened in your name.

4. Use strong, unique passwords: Always use strong, unique passwords for your online accounts, especially those that store payment details. Avoid using easily guessable information, and consider using a password manager to store and generate secure passwords. This reduces the chances of fraudsters accessing your accounts.

5. Use credit card alerts: Set up transaction alerts with your credit card company. This way, you’ll receive a notification via email or text for every transaction made with your card. If you receive an alert for a purchase you didn’t make, you can take immediate action to report it and prevent further charges.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Be Cautious with public Wi-Fi: Avoid making purchases or entering sensitive information when connected to public Wi-Fi networks because they’re often not secure. If you need to make an online purchase while on the go, consider using a VPN (Virtual Private Network) to encrypt your connection and keep your credit card details safe from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices 

7. Don't store credit card info on browsers and websites: Storing your credit card information on browsers or websites can make it convenient, but it also exposes you to a higher risk of fraud. If your browser or the website’s security gets compromised, hackers could gain access to your saved card details. To stay safe, avoid saving your credit card information and manually enter it each time you make a purchase. If a site offers to save your details for future use, think twice before accepting. It's better to take the extra step to enter your information each time, ensuring your data stays secure.

8. Use EMV chip technology: When making in-person purchases, always use the chip reader instead of swiping your card. Chip technology provides an extra layer of security against fraud.

9. Be wary of phishing attempts and have strong antivirus software: Be cautious of unsolicited emails, texts or phone calls asking for your credit card information. Legitimate companies typically don't request sensitive information through these channels. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10. Keep your card in sight: When using your card in restaurants or stores, try to keep it within view. This reduces the risk of someone copying your card details.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

It's clear that credit card fraud is more prevalent than ever, affecting millions of Americans each year. The good news is that there are effective steps to protect yourself from becoming a victim. By staying vigilant and employing best practices — like monitoring your statements and using strong passwords — you can significantly reduce your risk. Remember, awareness and proactive measures are your best defenses against credit card fraud.

Have you or someone you know ever experienced credit card fraud, and how did it impact you? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Who's really behind that random strange text from nowhere?

19 January 2025 at 05:00

These days, our phones are constantly buzzing with notifications, and it's becoming increasingly difficult to distinguish between legitimate messages and potential scams. Bill from Mesa, Arizona, recently shared an experience that highlights this growing concern:

"Twice in the last week I've received texts supposedly sent elsewhere. The last one asked if I was 'available tomorrow evening.' I did not recognize the number but am active in an old people park so receive many calls and texts from unfamiliar numbers. I texted back that my wife thought we were available. A few minutes later, a text came asking if I was Mrs. Amy. I texted that I wasn't Mrs. Amy and had never been, but it was a problem. 

"A return text came thanking me for being so polite and the texter's appreciation for polite people and if I were ever in LA, I would be welcome to a backyard BBQ. Looking back, there were a couple more texts ending with ‘I like to make friends with polite people.’ The first text which I deleted was in a very similar vein and format. Is this a scam and why, for what?"

Bill's experience is not unique. Many people receive similar messages that seem harmless at first glance but could potentially be part of a more sinister scheme. Let's dive into the world of text message scams and learn how to protect ourselves.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Text message scams, also known as "smishing," a combination of SMS and phishing, have become increasingly sophisticated. Scammers use various tactics to engage potential victims and gain their trust. Here are some common elements:

Unfamiliar numbers: The message comes from a number you don't recognize. For instance, you receive a text from +1-555-123-4567, a number not in your contacts.

Unsolicited contact: The text arrives unexpectedly, often with a friendly or urgent tone. Example: "Hey! Long time no see. How have you been?"

Personal touch: The scammer might use your name or reference a common activity to seem legitimate. Example: "Hi Sarah, it's Mike from the book club. Are you coming to the meeting next week?"

Too good to be true: Offers of prizes, invitations, or other enticing propositions are common. Example: "Congratulations! You've won a $500 gift card. Click here to claim your prize!"

Requests for information: The scammer may ask for personal details, either directly or indirectly. Example: "This is your bank. We need to verify your account. Please reply with your account number and PIN."

Remember, these are all examples of potential scams. Always be cautious when receiving unexpected messages, especially those asking for personal information or containing suspicious links.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

In Bill's case, the scammer employed a "long-play" strategy. By engaging in friendly conversation and offering invitations, the scammer aims to build trust over time. The end goal could be:

Phishing for information: Gradually collecting personal details that can be used for identity theft.

Malware distribution: Eventually sending a link that, when clicked, installs malicious software on your device.

Financial scams: Building trust to eventually request money or financial information.

HOW TO EASILY ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON IPHONE AND ANDROID

To protect yourself from text message scams, follow these steps:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

If you believe you've received a scam text, here are six steps to follow:

1. Don't respond: Avoid engaging with the scammer to prevent further attempts.

2. Block the number: Use your phone's built-in blocking features to prevent further contact.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Report the message: Forward the suspicious text to 7726 (SPAM). Also, report it directly to the FTC at ReportFraud.ftc.gov.

4. Keep your information safe: Never click on links or provide personal information in response to unsolicited texts.

5. Have strong antivirus software: Install and run strong antivirus apps on your phone to scan for malware and ensure your device is secure. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Invest in personal data removal services: Consider using a data removal service to eliminate your personal information from data broker sites. These services can help reduce spam, decrease the risk of identity theft and clean up your online presence by automating the removal of your data from hundreds of data broker sites.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

While it's natural to want to be polite, as Bill was, remember that your safety and personal information are paramount. Trust your instincts, verify unfamiliar contacts and never hesitate to ignore or block suspicious messages. Remember, a true friend won't mind if you take extra steps to verify their identity, and a legitimate organization will have official channels for communication.

How have you or someone you know been affected by text message scams, and what steps did you take to protect yourself? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

That Apple ID disabled message? It's a dangerous scam

18 January 2025 at 05:00

Let's talk about something that's been popping up in inboxes lately — those sneaky "Your Apple ID has been disabled" emails. 

Like many people who've reached out to us, you might have gotten one that looks pretty legit, saying something like, "Your Apple ID has been temporarily disabled. Verify your Apple ID Information." 

Spoiler alert: It's most likely a scam, and we're going to break down why.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

So, here's how these tricksters operate. You get an email that looks totally legit with an Apple logo and creates a sense of urgency, claiming your Apple ID is in trouble. They'll say something like, "If you do not verify your account within 48 hours, it will be permanently locked." Yikes, right? That's exactly what they want you to think. So, you'll "Click the button below to verify as soon as possible." They want you to click where it says, "Go to Apple ID."

Once you do that, you're directed to a fake Apple website designed to look almost identical to the real one. This fraudulent site prompts you to enter your username, password and other sensitive information, which the scammers can then use to access your Apple account and potentially steal your personal data or make unauthorized purchases.

NEW CYBERATTACK TARGETS IPHONE AND APPLE IDS: HERE’S HOW TO STAY SAFE

Urgent language: They're trying to scare you into acting without thinking. Classic scammer move.

Vague claims: "Missing or invalid information"? That's purposely unclear to make you doubt yourself.

Threats of lockout: Nothing like a good threat to get your heart racing, huh?

Terms of service talk: They throw this in to sound official, but it's just smoke and mirrors.

Grammar goofs: Real Apple emails are polished. Scammers? Not so much.

Fishy sender address: Always check if it's actually from @apple.com (spoiler: it's probably not). Any legitimate email from Apple will come from a domain ending in "@email.apple.com. As you can see from the scam email below, it's from a fake email: mfrasier@wavecable.com, not Apple.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

HOW TO SECURELY LOCK YOUR IPHONE AND IPAD FROM PRYING EYES

You might wonder, "Why are these scammers so obsessed with Apple IDs?" Well, there are a few reasons:

 5 THINGS TO DO FIRST IF YOU GOT A NEW MAC

To keep scammers at bay and secure your Apple ID, follow these comprehensive steps:

1. Enable Two-Factor Authentication (2FA): This crucial security feature adds an extra layer of protection to your Apple ID. Set it up by going to Settings[your name] > Sign-In & Security on your iPhone or iPad, or Apple menuSystem Settings > [your name]Sign-In & Security on your Mac.

2. Use strong passcodes: Opt for alphanumeric passcodes instead of simple PINs. When in public, use biometrics (Face ID or Touch ID) and be cautious when entering your passcode.

3. Enable Stolen Device Protection: If you're using iOS 17.3 or later, turn on this feature for additional security against theft.

4. Keep software updated: Regularly update your operating system and apps to ensure you have the latest security patches.

5. Don’t click on suspicious links, use strong antivirus software: If the email asks you to click a link, don’t do it right away. Hover over the link to see the actual URL. If it doesn’t look like an official Apple website (or any site you trust), don’t click it.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Use a password manager: Generate and store strong, unique passwords for all your accounts by using a password manager.

7. Enable Find My: Turn on Find My iPhone to help locate your device if it's lost or stolen.

8. Use a personal data removal service: Consider using a service that finds and removes your personal information from data broker sites. These services can help reduce your digital footprint, making it harder for scammers to obtain your data to target you in the first place. Look for a service that offers automated removals from hundreds of data aggregators and provides detailed verification of removals.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

9. Don’t click on suspicious links: If the email asks you to click a link, don’t do it right away. Hover over the link to see the actual URL. If it doesn’t look like an official Apple website (or any site you trust), don’t click it.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

TOP PHONE CHARGING CABLES THAT WILL SUPERCHARGE YOUR APPLE DEVICES

Apple will never email you asking for your password or threaten to lock your account. If there's a real issue, you'll usually get a notification on your trusted device or be asked to sign in to your Apple ID account page directly. Remember, Apple will never ask for your password via email, phone or text message. Always access your account through official Apple websites or apps.

These scammers are getting craftier, but with a bit of know-how and caution, you can keep your Apple ID (and all the good stuff connected to it) safe and sound. Remember, if something feels fishy, trust your gut. When in doubt, go straight to Apple's official website or give their support team a call. Keep your digital life secure, and don't let those scammers take a bite out of your Apple.

Have you ever fallen victim to a digital scam, and what steps did you take to protect yourself afterward? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Best ways to give your old iPhone a second life

17 January 2025 at 09:00

Before tossing out your old iPhone, consider it a treasure trove of potential waiting to be unlocked. 

Your seemingly outdated device isn't just electronic waste. It's a versatile gadget ready for an exciting second life. From transforming into a smart home hub to becoming a dedicated digital companion, an old iPhone can be repurposed in countless creative ways that breathe new life into technology you may not have considered. 

Here are some of the best ways to use your old iPhone.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Smartphones are incredibly powerful, but they can also be overwhelming. The constant notifications and social media updates can make it hard to focus or enjoy the present moment. If you’re finding that your iPhone is more of a time-waster than a tool for productivity, why not transform it into a "dumb phone"? A "dumb phone" is a basic mobile device that focuses on essential communication functions like calling and texting, while minimizing digital distractions through limited internet access and app capabilities, helping you reduce screen time and stay more present.

Disable notifications:

Delete unwanted apps:

Factory reset (Optional):

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Eventually, you may want to give your child their own smartphone. While a new phone can be expensive, handing down your old iPhone is a great way to introduce them to technology while also being mindful of your budget. 

By using Family Sharing and parental controls, you can carefully monitor what apps and content your child accesses. Plus, it’s an excellent way to bring them into the Apple ecosystem. 

Set up Family Sharing:

Enable Parental Controls:

This process will help you manage your child's device usage effectively while ensuring they have access to appropriate content.

24 MOST AMAZING GIFTS FOR KIDS

In recent years, Apple’s Continuity Camera feature has made it easy to use an iPhone as a webcam for your Mac or Apple TV. While newer models work well for this purpose, older iPhones can still serve as excellent webcams, especially for online meetings and video calls. 

Instead of purchasing an external webcam, your old iPhone can deliver superior video quality. iOS 18 even allows older iPhones to work as dedicated continuity cameras for Apple TV, which is ideal for FaceTime or Zoom calls with family and friends.

Instead of purchasing an external webcam, your old iPhone can deliver superior video quality.

Why use your main iPhone for music when you can repurpose your old one as a dedicated MP3 player? With your old iPhone set up as a music player, you can enjoy your favorite tunes or podcasts without the distractions of text messages or social media notifications. It’s a perfect solution for workouts, long drives or when you just want to zone out with music.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

If you own an Apple TV, you already know that your iPhone can function as a remote control. However, keeping your main phone tied up with the remote can be inconvenient. By making your old iPhone a dedicated Apple TV remote, you can still enjoy controlling your TV without using your primary phone. 

Set up Apple TV remote feature:

Manage smart home devices:

Your old iPhone can even be a hub for all your smart home devices, from adjusting lights and thermostats to checking security cameras.

10 SMART HOME DEVICES WE LOVE

Smartphones have transformed mobile gaming, and your old iPhone could be an ideal portable gaming console. Many classic and modern games run smoothly on older iPhone models, and with subscription services like Apple Arcade, you can access a huge library of high-quality games. This is a fun, low-cost way to enjoy mobile gaming without draining your main iPhone’s battery life.

For book lovers, using an old iPhone as a dedicated e-reader is a great option. You can install apps like Kindle or Apple Books from the App Store. The iPhone's display is perfect for reading books and graphic novels, and since you’re not using your main iPhone, there are no distractions like notifications to interrupt your reading. 

You can disable all apps and notifications on the old device, making it a peaceful reading experience. Plus, you can still connect your AirPods to listen to audiobooks while on the go.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Just because you’ve upgraded to a new iPhone doesn’t mean your old one has to be discarded. There are countless ways to repurpose it, from boosting your productivity to controlling your smart home. This way, you can extend its lifespan and maximize the value of your purchase. 

What other devices would you like tips on breathing new life into? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

First 15 things to do or try first when you get a new iPhone

14 January 2025 at 09:00

Apple announces new iPhones every year, and I often wonder if that's truly necessary. A launch every two years seems more reasonable, especially since the new iPhones are often only marginally better than the ones released the year before. This has been the case since the iPhone 12. 

However, in 2024, Apple introduced a range of interesting features with the iPhone 16. While these features don’t necessarily justify an upgrade if you already own the iPhone 15 or even the iPhone 14, they make the iPhone 16 a worthy purchase if you’re using an older model or an Android phone.

If you've already made the purchase, or if you've bought another iPhone, here are the first things you should do and try when you fire up your new phone. (First things to do if you got a new Android)

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

First things first, let's update your software to iOS 18.2 or later:

HOW TO PROTECT YOUR IPHONE, IPAD FROM MALWARE

To add a passcode or biometric authentication to your new iPhone after updating to iOS 18.2 or later, follow these steps:

For Face ID:

IS IT TIME FOR ME TO UPGRADE TO NEW IPHONE?

Create or sign in to Apple ID:

Enable iCloud:

MUST TURN-OFF PRIVACY SETTINGS ON YOUR IPHONE

Customize Display:

Customize sound preferences:

Manage Privacy Settings:

By default in iOS 18, you get flashlight and camera shortcuts on the lock screen, but now you can finally customize them. 

Here's how to enable Family Sharing on your iPhone:

There are millions of apps available, such as Apple MapsGoogle Maps and even apps to plan a party in the App Store. To download useful apps on your new iPhone, follow these straightforward steps:

Having a strong spam filter on your iPhone is beneficial to protect yourself from unwanted text messages and scams. But beware that this may also filter out some legitimate messages from people who are not in your contacts list.

On all iPhone 16 models, you can use Camera Control with visual intelligence to quickly learn more about the stuff around you. Just press and hold the Camera Control, which is a new button on the right side of the device, and you can do things like look up info about a restaurant or business, translate text, get a summary, have it read out loud and more.

You can even use it to find details about a business, like its hours, services and contact info. Depending on the place, you might also be able to check reviews, make a reservation or order for delivery.

To use this feature, point your iPhone camera at the business in front of you, then press and hold the Camera Control. Next, either tap the Camera Control again or select the business name at the top of the screen. Depending on the business, you can:

HOW TO SCHEDULE FREE SESSION WITH APPLE SUPPORT

Apple made several changes to the iPhones with its iOS 18 update, including updates to the Journal app. You don’t need the latest iPhone 16 to try the app’s mindfulness option for journal entries; any iPhone with iOS 18 will do. When you open the Journal app, tap the icon that looks like a tiny tree, and you’ll be able to log your mood for each day and see how it changes over time.

The Action Button is part of the iOS 17 operating system for the iPhone 15 series and continues into iOS 18 for the iPhone 16 series. This customizable side button lets you choose a specific function to perform when pressed, such as turning on silent mode, focus, camera, flashlight, voice memo, recognize music, translate, magnifier, controls, shortcut and accessibility, depending on your settings. Essentially, it acts as a quick access key for a chosen action. Here are the steps to customize the Action button on supported iPhone models:

I always stress the importance of using a password manager to store your passwords. Let’s be honest, we all have a ton of apps and services that require an account and password. If you use the same password everywhere, you risk having your important info stolen by cybercriminals. But it’s also impossible to come up with a unique password for every app and remember them all. 

Password managers make life easier by storing your passwords and filling them in when you log into apps. But they usually charge a monthly or yearly fee. That’s where Apple’s Passwords app comes in. It works just like a password manager but without the extra cost. Open the app from the App Library, and it’ll keep your login details encrypted and synced across all your devices.

While Apple's new Passwords app in iOS 18 offers a convenient and cost-free solution for password management, it's important to consider its limitations. These include its exclusivity to the Apple ecosystem, lack of compatibility with Android or Linux devices and limited functionality outside of Safari and Apple apps. For those seeking a more comprehensive password management solution that works across various browsers and apps, check out my best expert-reviewed password managers of 2025 here.

Apple introduced Apple Intelligence for iPhone 15 Pro and newer models running iOS 18.2, bringing a range of AI tools and ChatGPT support. ChatGPT is now built into various parts of iOS, and if you have an iPhone 15 Pro or above, you can take full advantage of this integration.

You can use Apple's enhanced Writing Tools to access ChatGPT directly in apps like Notes, Mail and any other text input field. Whether you need help spicing up your notes or generating complex programming scripts, ChatGPT is up for the task. Here's how to get started; you’ll need to enable ChatGPT integration. 

Antivirus software can help protect your new iPhone from malware, phishing and other threats. The best way to protect yourself from having your data breached is to install antivirus protection on all your devices. Having strong antivirus software on your devices will alert you of any known malware that is targeting you, warn you against clicking on any known malicious links in phishing emails and ultimately help protect you from being hacked. Get my picks for the best 2025 antivirus protection winners for your iPhone, Mac, Windows and Android devices.

Making data backups a regular part of your iPhone maintenance is crucial. This way, you can protect yourself against uncertainties. Whether it's a hardware malfunction or a security breach, having a recent backup will let you recover quickly.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

When you get your new iPhone, there are several essential steps to take to ensure you're getting the most out of your device. Start by updating to iOS 18.2 or later to access the latest features. Next, security measures like a passcode or biometric authentication should be set up for added protection. Personalize your settings by customizing your display and sound preferences, and don’t forget to enable Family Sharing if you want to connect with loved ones. Also, explore the App Store to download useful apps. Additionally, make sure to give the Action Button a test run for quick access to your favorite functions. With these tips, you'll be well on your way to maximizing your new iPhone's capabilities.

How do you feel about the annual iPhone releases? Do you think they provide enough value each year? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

5-minute cleanup for your phone and computer

13 January 2025 at 15:25

Digital junk piles up faster than clutter in real life. There are files you don’t need, all those random screenshots, apps you downloaded and used once, and blurry photos clogging up your camera roll.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

It all adds up, slowing your devices down and making everything feel messy. The good news? Cleaning it up is easier than you think. Let’s do a quick declutter that will make you say, "Ahhh, that feels better."

Step 1: Update your devices

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA

There are too many dangerous bugs out there to skip security patches.

Start with your phone

Scroll through your app list and delete any you’re not using anymore. If it’s been months, you’re not going to use it. Trust me. And even if you do want it later, great, download it again. 

YOUR SSN IS ON THE DARK WEB — HERE’S WHAT TO DO ABOUT IT

While you’re at it, move the apps you want to spend less time using (Instagram for me) off your phone’s home screen. You can hide the app or just move it to another page or folder.

On iPhone: 

On Android: 

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

On iPhone or iPad, the Photos app makes this a breeze. 

On an Android, open the Files by Google app, select Clean, then:

Onto your computer

Here’s the quick and dirty way. Create a new folder, then drag all the random files, screenshots and whatever else into it. 

Pro tip: Sensitive documents have no place on your desktop. If you do insist on saving private docs locally, at least give a snoop a more challenging time by naming the folder something off-base like "Vacation Photos." Be sure your computer automatically locks when you’re away and requires a password on startup, too.

Quick lock: For Windows, hit the Windows key + L. On a Mac, use Ctrl + Cmd + Q.

They take up a decent amount of space, so regularly clear out anything you’re not using. Beyond that, outdated apps could put you at risk. By keeping old programs on your computer, you’re potentially leaving a door wide open for cybercriminals to slip in.

On a Windows PC:

On a Mac:

Don’t forget the outside

We’re aiming for quick, so let’s tackle those fingerprint-covered screens.

On your phone, remove the case and accessories. You want to reach every nook and cranny. For a computer monitor, dust the back top, sides and any ledges that collect dirt before you start cleaning.

A microfiber cloth works, but I prefer screen-cleaning wipes. They’re just so easy. Skip paper towels. They’re too rough for delicate jobs like this.

I always come back to this 210-pack of screen cleaning wipes. Use them on smartphones, tablets, monitors, TVs, remote controls and even glasses. They’re scratch-free and made with anti-static tissue that cleans without leaving behind streaks or lint.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

AI isn’t going anywhere: Prompts to make life easier

10 January 2025 at 19:20

I was having dinner with my husband in Paris. We got the wine menu and all the names, of course, were in French. Barry wanted something equivalent to a Napa cabernet, so I took a picture of the menu and asked ChatGPT. In seconds, it recommended a wine. I double-checked with the waiter, and he gave it a thumbs-up.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

You might think AI is just for businesses, programmers, or the ultra tech-savvy, but it’s not. It’s for anyone willing to give it a try.

AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER

Instead of ignoring this powerful tool, make this the year you embrace AI. It’s easier and more helpful than you think.

Let’s start with the basics

"So, uh, where do I find ChatGPT?" I get that in my email every day. Use it on the web or download it for iPhone or Android

The free tier works for most people. I pay $20 a month for ChatGPT Plus. It’s worth it to me for access to the better features and faster response times. Start with free. If you find yourself relying on your favorite AI tool regularly, consider upgrading. It is worth considering.

ChatGPT isn’t the only option, but it is my preference (at least for now) and the most popular. You can also try Google GeminiPerplexity and Claude.

With all these, the workflow is the same. Think of it like Google, but instead of punching in one search term and scrolling through results, you have a "conversation" with the bot to get exactly the output you want. 

Like any tool, you need to use AI wisely and triple-check its results. Trust me, you don’t want to end up like those lawyers who used AI to draft court documents, only to have the judge catch the glaring mistakes. 

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

You’ve heard of prompts, right?

This is what we call the text, question or command you provide an AI system to guide its response or action. It’s your instruction on what you want, so the better your prompt, the more useful and accurate the response will be.

"Priming" is the insider term for telling a chatbot exactly what you want from it. With ChatGPT or any other, the more constraints you give, the better your answer. Examples: "Limit your response to 250 words," "Give me the list in bullet points," "Format the results as a table," "Use this data to create a bar chart."

Remember, AI can’t read your mind. It only knows what you tell it. Use "do" and "don’t" in your prompts to get the results you want. Say you’re cooking for friends, and some have allergies. Say, "Create a recipe for six people. Do include protein, fruits, vegetables and carbs. Don’t include dairy products, shellfish or nuts."

7 prompts to make life easier

Make your goals actionable: "I have a goal for 2025 to [fill in the blank]. Can you help me make it SMART?" (SMART is an acronym for Specific, Measurable, Assignable, Realistic and Time-related.) Maybe you’re not there yet. Try this: "I want to [fill in the blank], but it feels overwhelming, and I don’t know where to start. Can you help me by breaking it down into more manageable tasks?"

"Give me 10 more examples": That’s a prompt I use with ChatGPT all the time to make the chatbot a better brainstorming buddy. Some of its "ideas" are downright bad, but it might spark something creative in your brain, too.

"How can I make this better?" Add in anything you’ve written — a blog post, a travel plan, a resume or even a heartfelt email. This prompt works wonders for polishing your work and pointing out improvements, like a personal editor at your fingertips.

DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT’S TOO LATE

Your very own free assistant: Say you have messy notes from a meeting. By hand, you’d spend 15 minutes turning those into an email fit for your boss or team. Instead, open a chatbot and say, "Turn these notes into a professional, friendly email to my team." Paste your notes at the end and voila. Pro tip: Ask your bot of choice, "Is there anything that needs more details?" to fill in any missing info.

Shortcut your inbox: When you get a really long email, open your AI chatbot of choice, and type in the prompt, "Summarize this email for me. Tell me what I need to do, then write a thoughtful reply. Here is the email." Paste in the email and let AI do its magic.

Wanna get in shape? Ask your AI to create a custom fitness plan. Try this: "Create a 30-day fitness plan for fat loss and muscle gain tailored to a [male/female] beginner at [your age]." Or get specific: "Create a four-week fitness plan to help me run a mile for the first time." Don’t sweat it.

Spouse forgot to load the dishes again? Instead of firing off a rage-filled text, let AI step in. Ask your fave chatbot to reframe your frustration into something a bit more … constructive. I like this prompt: "Make this message sound more friendly." 

Don’t forget about privacy

It's easy to think your bot is a trusted ally, especially when it’s pumping out helpful answers all day long. But it’s definitely not. It’s a data-collecting tool like any other.

Be smart about what you say. Never type in passwords, sensitive financial data, or confidential work or business information. My rule of thumb: Don’t tell a chatbot anything you wouldn’t want made public. 

With a free ChatGPT or Perplexity account, you can turn off memory features in the app settings that remember everything you type in. For Google Gemini, you need a paid account to do this. 

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

How to easily print photos from your phone

10 January 2025 at 00:00

Are you an aspiring Android or iPhone photographer? Both Android OS 15 and iOS 18 bring professional photography features to their new smartphones with advancements made in artificial intelligence-assisted photo processing and top-of-the-line digital camera sensors in the top-line smartphones.

Even if you don't enjoy taking photos directly from your smartphone, most cameras now allow you to instantly transfer pictures from a camera to a smartphone via Bluetooth

You can also print high-quality pictures from your phone, and it's surprisingly easy. Here are a few different ways to print a photograph from your smartphone.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Using a Wi-Fi-enabled printer

Many of the most popular printers available today feature Wi-Fi functionality, and if you have a Wi-Fi-enabled printer, you can print photographs directly from your phone. Most modern photo printers are fully wireless, allowing you to easily print photos directly from their Android or iOS smartphones. Check out my top printer picks here. Here's how to print from a wireless printer on both Android and iOS:

For iPhone:

For Android:

Settings may vary depending on your Android phone’s manufacturer.

Portable photo printers are handy for printing on the go. They usually connect via Bluetooth or Wi-Fi and come with apps for easy printing. Portable photo printers are a great idea if you want a compact photograph printer that's great for taking with you on trips. Many portable printers are small enough to fit in a travel bag and are battery-powered, so there's no wired setup necessary. Check on my picks for the best portable printers here.

TOP PRINTERS 2025

Using an online photo printing service

You can also use apps or websites like Shutterfly or Snapfish that offer photo printing services. Upload your photos, choose your print options, and have them delivered to your home or picked up at a local store. Similar services are also available at your local print shops or even at big-box stores such as Staples, which also provide high-quality poster and image printing. Using a print service and shop to process your photographs can be a great idea, as you can rest assured that your photographs are being printed on high-quality prints with great printers.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

4 WAYS TO PRINT OUT, SAVE, AND SEND YOUR IPHONE'S TEXT MESSAGES

Transferring photos to your computer

You can transfer your photos to your computer and print them from there using your home printer. This is a great option if you have an older printer or an older photo printer that doesn't support Wi-Fi. Here's a list of our printer recommendations. I recommend looking at the options for color printers that we've highlighted. We made the list for everyone, so we made sure to include printers that can print beautiful photographs with ease. Here's how to do it from an iPhone to your computer:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW TO PRINT, SAVE, AND SEND ANDROID TEXT MESSAGES

It's exciting to see how both Android and iPhone have stepped up their game in mobile photography. With all the cool AI features and top-notch camera tech, taking amazing photos is a breeze. Plus, printing those memories is super easy now, whether you're using a Wi-Fi printer, a portable one, or an online service.

What challenges have you faced while trying to capture or print your photos, and how did you overcome them? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Lost your contacts on your phone? Here's how to get them back

7 January 2025 at 08:00

As high-tech and advanced as all our modern mobile devices are, there's no way of getting around basic user errors. Luckily, the makers of your mobile devices kept such errors in mind. That is why we were eager to respond to Lynne's question about how to restore a deleted contact on your mobile device.

"I must have ‘FAT’ fingers, as I accidentally deleted information in my contacts. I had typed in a couple of other contact phone numbers. But guess I accidentally deleted these. I would [like] to get this information back. I am guessing I am asking for a miracle." — Lynne P. of Lakewood Ranch, Florida

There are several options or methods to restore your contact information on an iPhone or Android, so it is easy to find a solution that should work for you.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Luckily, the makers of iPhones and Android phones understood that mistakes happen and contacts can be erased by accident. Below are ways to restore your contacts on an iPhone or Android phone:

There are two resources for iPhone owners in order to restore contacts: via iCloud or iTunes Backup. Before attempting to restore your contacts, back up your iPhone so you have recourse if you lose data.

Restore contacts with iCloud:

WHICH IPHONE 16 IS RIGHT FOR YOU? DISCOVER YOUR PERFECT MATCH

Restore contacts with iTunes:

If you have not enabled iCloud to back up your contacts, you may be able to restore contacts with iTunes.

4 WAYS TO FIND YOUR LOST IPHONE, WITH AND WITHOUT OTHER DEVICES

There are two resources Android users can use to restore contacts: Google Contacts or Device settings. Before attempting to restore your contacts, back up your Android so you have recourse if you lose data.

Restore contacts with Google Contacts:

Settings may vary depending on your Android phone’s manufacturer.

Restore contacts with Device Settings:

 Settings may vary depending on your Android phone’s manufacturer. 

Please note: Only contacts that aren't already on your phone will be restored.

FIRST THINGS TO DO IF YOU GOT A NEW ANDROID

While it is ideal if you never make a mistake while using your mobile devices, accidents do happen and contacts do get deleted accidentally. That’s why the makers of iPhones and Android devices have multiple ways you can restore contacts on your phone. Following these easy steps outlined above gives you the ability to rectify that situation quickly. It is best to make sure that your mobile devices are being backed up either to the cloud or physically to a computer or hard drive backup so that there is a source from which to restore your contacts. Additionally, should anything go awry when you're doing the restoration process, you have the ability to recover lost data. Accidents happen, but practicing safe data hygiene prevents them from becoming a lost cause or needing a miracle.

Have you ever accidentally deleted a contact on your mobile device? How did you recover that contact information? Are your contacts backed up anywhere? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Create custom visuals on your iPhone with Image Playground in iOS 18.2

5 January 2025 at 05:00

Apple's new Image Playground feature is an excellent addition to the iPhone, allowing you to easily create custom visuals. 

This innovative tool transforms simple text prompts into images or animations in seconds, opening up a world of creativity right at your fingertips.

Before diving in, ensure your iPhone is compatible. Image Playground works on:

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

GET ORGANIZED: NEW IOS 18 CALENDAR FEATURE  

To access Image Playground, update to iOS 18.2 or later:

IOS 18'S NEW TEXT FORMATTING AND EFFECTS IN MESSAGES  

Once updated, locate the Image Playground app icon on your home screen. It looks like a cute animal in a soap bubble. The app uses Apple Intelligence to combine concepts, text descriptions and people from your photo library to create stylized images. Here's how to use it:

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

You can create images based on your contacts. Here’s how:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

GET FOX BUSINESS ON THE GO BY CLICKING HERE

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

Image Playground allows anyone with a compatible iPhone to produce unique, personalized images in seconds. While the results may not always perfectly capture reality, the technology is likely to improve over time. This feature opens up new possibilities for digital expression and storytelling right from your pocket.

What fun and creative things do you think you could make with Apple's new Image Playground feature? Let us know what you think by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Ditch boring emoji and create your own unique versions with Genmoji on iPhone

4 January 2025 at 05:00

Have you ever found yourself scrolling through the emoji keyboard, frustrated that you can't find the perfect little icon to express your exact sentiment? 

Well, Apple has a solution for you with its latest iOS 18.2 update: Genmoji. 

This innovative feature allows you to create custom emoji on the fly, bringing a whole new level of personalization to your conversations.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Genmoji, a clever blend of "generative AI" and "emoji," is Apple's latest addition to its Apple Intelligence suite. This feature harnesses the power of on-device artificial intelligence to generate custom emoji based on your text descriptions. 

Whether you're looking for an "elephant riding a roller coaster" or a "frog with tap-dancing shoes," Genmoji can bring your imagination to life in emoji form. You can even create emoji based on people in your Photos app, making your digital expressions more intimate and meaningful. This level of customization allows you to convey nuanced emotions and situations that standard emoji simply can't capture.

HOW TO PROTECT YOUR IPHONE AND IPAD FROM MALWARE

It's important to note that Genmoji is available only on iPhone 15 Pro and Pro Max models or devices from the iPhone 16 lineup. The feature is part of the iOS 18.2 update, which Apple recently released.

First things first, let's update your software to iOS 18.2 or later:

HOW TO FACTORY RESET YOUR IPHONE

HOW TO DELETE MULTIPLE EMAILS AT ONCE ON IPHONE

Using Genmoji is surprisingly simple:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

To create a Genmoji using a person's photo from your gallery, follow these steps:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

First, make sure the person you want to use is tagged in your Photos app. This is crucial for Genmoji creation. You can only use people who are already in your contacts. It works best with clear, front-facing photos where the person's face is easily visible.

Select a person

Customize the Genmoji

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Genmoji isn’t just a fun new feature; it’s a total game-changer for how we chat with each other. You can create an emoji that perfectly captures your mood or a specific situation. How awesome is that? As we start to embrace more AI in our daily lives, Genmoji really takes our conversations up a notch, making them more personal and creative.

Do you think you'll enjoy using Genmoji, or do you find it more annoying than helpful, wishing we could just stick to plain texting? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Receiving unexpected international calls? What you need to know

1 January 2025 at 07:00

Receiving unexpected international calls can be a source of anxiety for many individuals. Whether it’s a single ring from an unknown number or multiple missed calls from abroad, the uncertainty can leave you wondering about the implications for your privacy and security.

Kathy S. recently reached out with a concern many of us can relate to: "I have received calls from Beijing and Russia on my cellphone. I did not answer them. Can you tell me why this is happening? Is my phone at risk?"

If you've experienced similar calls, you're not alone. Let's examine this issue and discover what's really going on.

GET SECURITY ALERTS, EXPERT TIPS, SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT

International call scams have become increasingly common in recent years. One particularly prevalent scam is known as "Wangiri," which originates from Japan and means "one-ring-and-cut." These scammers typically let your phone ring once or twice before hanging up, hoping to pique your curiosity and prompt a callback.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

There are several reasons why you might be receiving calls from unfamiliar international numbers.

Wangiri scam: Scammers use automated systems to call thousands of numbers, disconnecting after one ring. If you call back, you may be connected to a premium rate number, incurring significant charges.

Telemarketing and robocalls: Some companies use international numbers to bypass local regulations and reach a wider audience.

Number spoofing: Scammers can make their calls appear to come from different countries, tricking you into answering.

HOW TO STOP ANNOYING ROBOCALLS

While receiving unexpected international calls doesn't necessarily put your phone at immediate risk, there are several potential dangers to be aware of. The primary risk lies in potential financial losses if you engage with these scammers. If you call back, you may be connected to a premium rate service number owned by the fraudster. You could also be charged heavily for these calls, with the scammer aiming to keep you on the line to increase the billed amount.

While less common with Wangiri scams, there's always a risk of personal information theft if you engage with unknown callers. Sharing sensitive data like bank account numbers or Social Security numbers could lead to identity theft.

Answering or returning these calls may signal to scammers that your number is active, potentially leading to more scam calls in the future. Although not typically associated with Wangiri scams, some sophisticated phone scams can potentially install malware on your device if you click on certain links, prompts or follow instructions given by the scammer.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

While these international calls can be concerning, there are several steps you can take to safeguard yourself and your personal information. Here are six effective strategies to help protect against potential scams and unwanted calls.

1) Don't answer or call back: If you receive a call from an unknown international number, resist the urge to answer or return the call.

2) Block suspicious numbers: Use your phone's built-in features to block these numbers and prevent future calls.

3) Report the calls: Inform your phone carrier and the Federal Communications Commission (FCC) about these suspicious calls.

4) Use call-blocking apps: Consider installing call-blocking apps to identify and block spam calls.

5) Be cautious with personal information: Never share sensitive data over the phone, especially with unfamiliar callers.

6) Invest in personal data removal services: Consider using services that remove your personal data from the internet, reducing the chances of scammers obtaining your information. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES

While unexpected international calls can be alarming, understanding the nature of these scams empowers you to protect yourself. By staying informed and following the preventive measures outlined above, you can significantly reduce your risk of falling victim to these schemes. Remember, your best defense is a combination of caution, awareness and proactive steps to safeguard your personal information.

Are phone companies doing enough to help protect consumers from international scam calls? Let us know what you think by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

The biggest Wi-Fi mistake you didn’t know you were making

31 December 2024 at 16:14

You’ve got dinner in the oven, you’re looking for extra glasses, and your cousin’s kid screams (again), "What’s the Wi-Fi password?" You’re juggling a hundred things at once, and the last thing you want to do is to spell out your password.

Here’s the good news: You can slap a printout on the fridge, and everyone can scan it with their phones to connect. But first, I’ll show you how to create a separate network so you don’t need to worry about little Billy getting into your personal stuff on your devices and computers.

SCAMMERS ARE TARGETING TEENS WITH THESE NASTY TRICKS

I share smart tech news and tips you can use every single day. Join 600K readers who get The Current.

Be my guest

When guests connect to your main Wi-Fi, they can potentially access devices like smart TVs, printers, and even your laptop or phone if file sharing is enabled. Worse, if their device is compromised, your whole network could be at risk. A guest network keeps everyone happy while keeping your private life private.

Most modern routers let you set up a guest network without having to be a tech guru. Warning: This will take you a few minutes, but it’s totally doable.

RELATED: Is your internet slo-o-o-w? Let’s fix that.

Step 1: Log into your router’s admin console. You’ll need your IP address. You can usually find this on a sticker on the bottom or side of your router. Seeing 192.168.1.1 or 192.168.0.1 is common.

If you don’t see yours …

Step 2: Open your browser, type http:// and paste in your IP address. Hit Enter to open a login page. For the credentials, try the username admin and the word password for the password. If the defaults are different, they’re likely printed on your router. You can also check this site that lists default passwords for almost every router in use.

Step 3: Look for a setting called Guest Network or Guest Wi-Fi. Give it a different name (aka SSID) than your main network, along with a strong, unique password.

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

If you have snoops in the family … When family and friends connect to your Wi-Fi guest network, you can block them from accessing your files or devices on your primary network. Turn off the local access setting.

Sorry, but dedicated snoops won’t stop at one closed door. Here’s a sign someone is poking around.

While you’re at it, a quick security check

Before you finish, take these extra steps to lock things down:

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

Your network is a bigger target than you realize.

Now for the fun part

Create a QR code that automatically connects guests to your new guest network — no hassle, no drama. With the free site QIFI.org, all you need is three pieces of info:

Hit Generate and your QR code is ready. Print some copies of it to hang around the house, or do what I did: Order this custom sign that looks classy. Now, when someone asks for the Wi-Fi password, you can just point.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Is your VPN enough without antivirus protection?

31 December 2024 at 07:00

As cyber threats continue to evolve and become more sophisticated, many people like yourself are seeking effective ways to safeguard their online presence. That includes Keith from Lisbon, Iowa, who asked, "If I have a VPN, do I still need an antivirus app?"

The answer is a resounding yes. While a VPN (virtual private network) provides crucial privacy and security benefits, it doesn't protect your device from malware, viruses or other cyber threats. Let's get into why you need both and how they complement each other to provide comprehensive digital security.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

To achieve comprehensive online security, it’s crucial to understand the distinct yet complementary roles that VPNs and antivirus software play in protecting your digital life.

A VPN is your first line of defense for online privacy and security. It works by:

1) Encrypting your internet connection: This makes it extremely difficult for hackers, ISPs or other third parties to intercept and read your data.

2) Masking your IP address: By hiding your real IP address, a VPN allows you to browse the internet anonymously, making it harder for websites and advertisers to track your online activities.

3) Bypassing geo-restrictions: VPNs can help you access content that might be blocked in your region, giving you more freedom online.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

While a VPN protects your online activities, antivirus software focuses on defending your device itself. Here's what antivirus does:

1) Malware detection and removal: Antivirus software scans your device for viruses, trojans, spyware and other malicious software, then removes or quarantines these threats.

2) Real-time protection: Modern antivirus programs continuously monitor your system, preventing malware from infecting your device in the first place.

3) Phishing protection: Many antivirus solutions include features that block malicious websites and warn you about potential phishing attempts.

WINDOWS FLAW LETS HACKERS SNEAK INTO YOUR PC OVER WI-FI

VPNs and antivirus software serve different but complementary purposes in your digital security arsenal.

VPNs secure your internet connection: They focus on protecting your data as it travels across the internet, ensuring your online activities remain private. Using a VPN service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

Antivirus protects your device: It guards against threats that could compromise your device's security, regardless of how they reach your system. Therefore, it's important to have strong antivirus software actively running on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

By using both a VPN and strong antivirus software, you create a robust defense system that protects both your online activities and your device itself.

CYBER SCAMMERS USE AI TO MANIPULATE GOOGLE SEARCH RESULTS

Remember, Keith and the rest of you: Cybersecurity is not about choosing between a VPN and antivirus; it's about leveraging both to create a multi-layered defense against the ever-evolving landscape of online threats. Combining these two powerful tools allows you to enjoy a safer, more secure and more private online experience.

What are your biggest cybersecurity concerns, and what specific help would you like from us to address them? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

❌
❌