Normal view

Before yesterdayMain stream

Who's really behind that random strange text from nowhere?

19 January 2025 at 05:00

These days, our phones are constantly buzzing with notifications, and it's becoming increasingly difficult to distinguish between legitimate messages and potential scams. Bill from Mesa, Arizona, recently shared an experience that highlights this growing concern:

"Twice in the last week I've received texts supposedly sent elsewhere. The last one asked if I was 'available tomorrow evening.' I did not recognize the number but am active in an old people park so receive many calls and texts from unfamiliar numbers. I texted back that my wife thought we were available. A few minutes later, a text came asking if I was Mrs. Amy. I texted that I wasn't Mrs. Amy and had never been, but it was a problem. 

"A return text came thanking me for being so polite and the texter's appreciation for polite people and if I were ever in LA, I would be welcome to a backyard BBQ. Looking back, there were a couple more texts ending with ‘I like to make friends with polite people.’ The first text which I deleted was in a very similar vein and format. Is this a scam and why, for what?"

Bill's experience is not unique. Many people receive similar messages that seem harmless at first glance but could potentially be part of a more sinister scheme. Let's dive into the world of text message scams and learn how to protect ourselves.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Text message scams, also known as "smishing," a combination of SMS and phishing, have become increasingly sophisticated. Scammers use various tactics to engage potential victims and gain their trust. Here are some common elements:

Unfamiliar numbers: The message comes from a number you don't recognize. For instance, you receive a text from +1-555-123-4567, a number not in your contacts.

Unsolicited contact: The text arrives unexpectedly, often with a friendly or urgent tone. Example: "Hey! Long time no see. How have you been?"

Personal touch: The scammer might use your name or reference a common activity to seem legitimate. Example: "Hi Sarah, it's Mike from the book club. Are you coming to the meeting next week?"

Too good to be true: Offers of prizes, invitations, or other enticing propositions are common. Example: "Congratulations! You've won a $500 gift card. Click here to claim your prize!"

Requests for information: The scammer may ask for personal details, either directly or indirectly. Example: "This is your bank. We need to verify your account. Please reply with your account number and PIN."

Remember, these are all examples of potential scams. Always be cautious when receiving unexpected messages, especially those asking for personal information or containing suspicious links.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

In Bill's case, the scammer employed a "long-play" strategy. By engaging in friendly conversation and offering invitations, the scammer aims to build trust over time. The end goal could be:

Phishing for information: Gradually collecting personal details that can be used for identity theft.

Malware distribution: Eventually sending a link that, when clicked, installs malicious software on your device.

Financial scams: Building trust to eventually request money or financial information.

HOW TO EASILY ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON IPHONE AND ANDROID

To protect yourself from text message scams, follow these steps:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

If you believe you've received a scam text, here are six steps to follow:

1. Don't respond: Avoid engaging with the scammer to prevent further attempts.

2. Block the number: Use your phone's built-in blocking features to prevent further contact.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Report the message: Forward the suspicious text to 7726 (SPAM). Also, report it directly to the FTC at ReportFraud.ftc.gov.

4. Keep your information safe: Never click on links or provide personal information in response to unsolicited texts.

5. Have strong antivirus software: Install and run strong antivirus apps on your phone to scan for malware and ensure your device is secure. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Invest in personal data removal services: Consider using a data removal service to eliminate your personal information from data broker sites. These services can help reduce spam, decrease the risk of identity theft and clean up your online presence by automating the removal of your data from hundreds of data broker sites.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

While it's natural to want to be polite, as Bill was, remember that your safety and personal information are paramount. Trust your instincts, verify unfamiliar contacts and never hesitate to ignore or block suspicious messages. Remember, a true friend won't mind if you take extra steps to verify their identity, and a legitimate organization will have official channels for communication.

How have you or someone you know been affected by text message scams, and what steps did you take to protect yourself? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

It is easier than ever to disable Location Sharing on your Android phone

6 January 2025 at 05:00

Privacy is a growing concern, especially regarding location tracking. Google has taken steps to enhance your control over location sharing on your Android, making it simpler for you to manage who can see your whereabouts. Let's dive into this new feature that Google is rolling out and how you can utilize it effectively. (iPhone users, follow these tips)

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Google has introduced a new "Google Location Sharing" toggle that is now integrated directly into the Android settings. This update eliminates the need to navigate through Google Maps to manage your Location Sharing preferences. The new feature is part of the latest updates to Google Play Services and is designed to simplify and enhance your control over location sharing.

Before you toggle this off, let’s take a moment to understand why you might want it on and what happens when you turn it off.

Imagine this: You’re meeting a friend in a busy city, and instead of sending a dozen texts back and forth, they can simply see your real-time location on Google Maps. That’s the power of location sharing. It allows you to share your exact position with specific contacts, along with useful details like your device’s battery level or your estimated arrival time if you’re navigating.

But when location sharing is off, your movements stay private. No one can track where you are, and your personal information is better protected from potential misuse. Apps and services lose access to your location data, which not only boosts your privacy but can also save battery life by cutting down on background tracking.

So, before deciding, think about what fits your needs best: staying connected or staying private.

BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2025

The feature is primarily available on Android smartphones, including popular models from brands such as the Google Pixel series (e.g., Pixel 6, Pixel 7), Samsung Galaxy series (e.g., Galaxy S21, Galaxy S23) and other manufacturers that run stock or near-stock Android versions. Certain Android tablets that support the latest versions of the operating system may also have access to this feature. The Location Sharing toggle is part of recent updates to the Android OS, specifically through Google Play Services. You should ensure your devices are running at least Android 12 or later to access this functionality effectively.

BEST VPNs FOR ANDROIDS

Ready to upgrade? Here's how to do it, but first back up your device data (just in case):

Settings may vary depending on your Android phone’s manufacturer.

ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA

Settings may vary depending on your Android phone’s manufacturer. 

This new feature not only simplifies turning off location sharing but also enhances privacy management by providing transparency about who can track you. You can now feel more secure knowing you have control over your shared information, which is particularly beneficial in situations where privacy is paramount.

Location sharing can be very useful for coordinating meetups, ensuring safety during travel or simply letting loved ones know you've arrived safely. Now, we have shown you how to disable location sharing, but here’s how you can share your real-time location with trusted contacts using Google Maps when Use Location is toggled on.

Remember that people you share your location with can always see:

They may also see other info depending on how you're sharing. Learn more about Location Sharing.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Google's new "Google Location Sharing" toggle, now integrated into Android settings, simplifies and enhances your control over location sharing. With this feature, Google is striking a balance between convenience and robust privacy management, making it a welcome improvement for Android users.

Have you ever had a situation where turning your location sharing on or off was crucial? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Android 15's new Private Space feature puts an end to app snooping

28 December 2024 at 05:00

Get ready to level up your privacy game with Android 15's latest feature, Private Space. 

This nifty addition is about to change the way you keep your sensitive apps and data under wraps. 

Let's dive into what Private Space is all about and how you can make the most of it. (iPhone users, learn how to hide apps on your device here.)

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Private Space is Android 15's answer to keeping your personal or sensitive apps away from prying eyes. Think of it as a secret vault within your phone where you can stash away apps you'd rather keep private, whether they're work-related, financial, or just your guilty pleasure games.

Unlike hiding apps — typically done by moving them to a folder or using a third-party launcher, which still leaves them accessible from the app drawer — Private Space creates a separate, secure area within your phone that is completely isolated. Only you can access it using a unique passcode or biometric authentication, ensuring your private content remains truly private.

BEST ANTIVIRUS FOR ANDROIDS — CYBERGUY PICKS 2024

You can use Private Space when:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

You can’t use Private Space when:

Note: You can only use Private Space as the main user of the device, not as a guest or secondary user. Consider creating a dedicated Google account for your Private Space. This helps prevent private data like notifications and files from appearing outside Private Space.

Which devices can use Private Space?

Private Space is available on devices running Android 15. As of now, this includes:

ANDROID BANKING TROJAN EVOLVES TO EVADE DETECTION AND STRIKE GLOBALLY

Ready to upgrade? Here's how to get Android 15:

Settings may vary depending on your Android phone’s manufacturer.

Disclaimer: The availability of the Android 15 update may vary by device and region. If the update is not yet available for your Android device, please check with your manufacturer or carrier for more information on the release schedule.

ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA

Now that you've got Android 15, let's set up your Private Space:

Settings may vary depending on your Android phone’s manufacturer.

Now, your Private Space is ready to use.

Here's how to move apps from your home screen into Private Space or install apps directly into Private Space from Google Play.

Settings may vary depending on your Android phone’s manufacturer.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Space is a game-changer for anyone looking to enhance their digital privacy. This feature provides a secure, dedicated area for your sensitive apps and data, ensuring that only you have access. With just a few simple steps, you can create your own digital vault and enjoy peace of mind knowing your private information is well-protected.

What role should the government play in protecting your privacy and data, and how should it react to growing public concerns? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to factory reset your Android

16 December 2024 at 05:00

Want to know how to factory reset your Android phone? Before handing over your old device, it's important to remove all traces of your personal information. This not only protects your privacy but also ensures the new owner receives a device in its original state, free from any of your custom settings or data. I've got you covered with a step-by-step guide to help you through the process, ensuring you don't miss a thing. Let's walk through it together. If you want to factory reset your iPhone, we'll take you through the steps here

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Before we dive in, remember this golden rule: back up your data. A factory reset wipes everything clean, so let's make sure your precious memories and important files are safe and sound.

Settings may vary depending on your Android phone’s manufacturer. 

Pro tip: You should charge your device to at least 70% before starting; you don't want your phone dying mid-reset.

BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2024

All right, let's get down to business. Here's how to factory reset your Android:

 Settings may vary depending on your Android phone’s manufacturer. 

Your phone will restart and begin the reset, which might take a few minutes. Once it's done, you'll see the initial setup screen, just like when your phone was brand new. Also, after a factory reset, you may need to sign in with the Google account previously linked to the device for security purposes.

TOP PHONE CHARGING CABLES THAT WILL SUPERCHARGE YOUR ANDROID DEVICES

OK, let’s say you want to factory reset your Android, but your phone is unresponsive, or you cannot access the settings. You can use "Recovery Mode."

Settings may vary depending on your Android phone’s manufacturer.

There you have it. By following these steps, you can successfully perform a factory reset on any Android device, ensuring a fresh start or preparing it for a new user. Once your device is clean, check out "Best ways to get rid of your old phone or tablet" for various options like trading it in for credit, donating to charity or recycling through certified e-waste programs.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Factory resetting your Android prepares your device for a new user or just starting fresh. Remember, it's a drastic measure that erases everything, so always back up your data first. Whether you're troubleshooting, starting fresh or passing your device on, now you've got the knowledge to do it right.

Have you faced any challenges with data security, and how did you overcome them? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to thief-proof your Christmas decorations

14 December 2024 at 09:00

Holiday decoration theft has become an increasingly frustrating issue for many homeowners. Karen from Los Angeles shared her experience with us in an email, stating,

"We have criminals who visit our neighborhood to not only steal mail and packages but also holiday decorations. I made a Christmas decoration for our mailbox, which was promptly stolen."

We’re sorry to hear about the theft in your neighborhood. This highlights a problem that goes beyond mere property loss. It's a theft of holiday cheer and personal effort. Let’s see how we can use technology to help secure your decorations.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Karen also inquired about the effectiveness of Samsung SmartTags, asking if these tags would work on her decorations and how far they could reach. The good news is that Samsung SmartTags can indeed be used on your holiday decorations. You can attach the SmartTag to any item you want to track. These devices are compatible with most recent Samsung Galaxy phones, including the Galaxy S9, making them accessible to many Android users.

As for the distance, the range of the Samsung SmartTag uses Bluetooth to connect to your phone. If the item is within Bluetooth range, you can ring it to find it or use the "Search Nearby" feature to get directions to it. If the item is out of range, other Samsung devices near the tag will anonymously locate it for you and then let you know where it is. This is done in the background and is encrypted to ensure privacy. The SmartTag does not beep when it’s out of range.

The Samsung SmartTag is compatible with almost all Samsung Galaxy phones released recently. They must have 2GB of RAM and run Android 8.0 (Oreo) or higher. So, your Samsung Galaxy S9 phones should be compatible with the Samsung SmartTag.

TOP PICKS TO AMP UP YOUR HOME SECURITY

For those considering a switch to Apple, AirTags present another viable option. Karen asked if she would have problems tracking her decorations with an Apple AirTag. While primarily designed for iOS devices, you can use it with your Android phone as mentioned in our article here, with some limitations. It uses the Find My network, and if another Apple device passes by the AirTag, the Find My network will be notified of the lost item’s location.

The AirTag does not beep when it’s out of range. However, the AirTag’s Precision Finding feature, which provides highly accurate tracking, is only compatible with iPhone 11 series and onwards. If you’re considering purchasing an iPhone, the iPhone 11 would be a relatively inexpensive option that is compatible with the AirTag’s Precision Finding feature.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

BEST HOME SECURITY SYSTEMS

Both Samsung SmartTags and Apple AirTags offer extensive tracking capabilities. The SmartTag uses Bluetooth for nearby tracking and relies on other Samsung devices for long-range location. Similarly, AirTags leverage the Find My network, utilizing nearby Apple devices to relay location information.

For Samsung users like Karen, the SmartTag is the natural choice, working seamlessly with Galaxy devices. Those considering Apple might look at the AirTag as an option.

Please note that while these tags can help you track your items, they might not prevent theft as they are not hidden devices and can be removed by someone who recognizes what they are. 

10 THINGS YOU MUST CONSIDER WHEN CHOOSING ANY SECURITY CAMERA

1. Use motion-activated cameras: Install motion-activated security cameras to monitor your decorations. Many security cameras send real-time notifications to your phone, allowing you to act quickly if someone tampers with your property.

2. Secure decorations: Consider physically securing your decorations with zip ties, chains or locks. While this won't deter all thieves, it can make stealing more difficult and time-consuming.

3. Light it up: Well-lit areas are less appealing to thieves. Ensure your yard and decorations are adequately lit with outdoor lights, especially in dark corners or near entry points.

4. Engage your neighbors: Create a sense of community by alerting neighbors to thefts and keeping an eye out for suspicious activity. A connected neighborhood can act as a strong deterrent.

5. Mark your property: Use invisible ink or engrave your decorations with a unique identifier. If stolen items are recovered, this will help law enforcement return them to you.

6. Report thefts to local law enforcement: Always report thefts, no matter how small. Law enforcement can track patterns and increase patrols in areas with frequent incidents. Providing details may also help them recover stolen items.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

In her email, Karen expressed her frustration: "I know this seems minor... but it’s disheartening to see the things you spend time, money and a little love get stolen." The desire to protect holiday decorations goes beyond material value — it's about safeguarding the joy and effort put into creating a festive atmosphere. As we embrace these technologies, let's also remember the importance of community vigilance and mutual respect.

Have you ever used tracking devices, security cameras, or other gadgets to safeguard your decorations? What worked well, and what would you recommend to others? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

❌
❌