Normal view

Yesterday — 22 February 2025Main stream

Homeland Security Information Network

10 January 2023 at 17:49
homeland Security LogoThe DHS Intel app, available to all Homeland Security Information Network – Intelligence (HSIN-Intel) members, enables users to view and search for intelligence information, receive alerts when new products are available, and bookmark products for future reference
Before yesterdayMain stream

Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

13 February 2025 at 09:00

Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong. 

While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device. 

The issue also affects those downloading apps from the Google Play Store.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.

One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.

Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.

The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.

The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.

We reached out to Apple for a comment but did not hear back before our deadline. 

Apple has removed the 11 iOS apps mentioned in Kaspersky's report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple's policies, resulting in the termination of their developer accounts.

Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library. 

The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.

In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A Google spokesperson tells CyberGuy: 

"All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services."

However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Here’s why:

HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android

4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.

5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities. 

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.

Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Top translation apps for travelers

11 February 2025 at 05:00

Traveling abroad can be an incredible adventure, but the language barrier can make even the most intrepid explorer nervous. The fear of being unable to communicate or understand signs and menus keeps many would-be travelers from ever leaving their home country. But fear not. With the rise of powerful translation apps, you can harness the latest technology right on your smartphone to bridge the language gap wherever your journey takes you.

I've tested out the top contenders to bring you my picks for the best translation apps for global travelers. Whether you have an iPhone or an Android, these apps have got you covered with features like live speech translation, text input and even AI-powered sign and menu translation.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Google Translate is the best translation app for most people. It supports the most languages, with 133 languages supported. It also features an incredibly user-friendly interface and design, and best of all, it's completely free. There are multiple ways to translate languages with Google Translate, be it by typing text into the translation box or utilizing text-to-speech translation, and you can even take advantage of Google's AI translator, which can translate text from photos that you take.

If you are using an iOS device, you can download Google Translate here. If you are using an Android-based device, you can download Google Translate from the Google Play Store here. Additionally, you can access Google Translate in your web browser from any device by going to translate.Google.com.

THE BEST TRAVEL GEAR FOR 2025

If you're an iOS devotee, you may have already encountered Apple Translate, which comes pre-installed on all iOS devices. This powerful translation app is one of the best available exclusively to iOS users, capable of translating written text and images of text and facilitating direct speech translation to help you converse with speakers of other languages. Apple Translate currently supports 19 languages, including popular options like Spanish, French, German, Chinese and Arabic, making it a valuable tool for planning international vacations or communicating while traveling.

Additionally, the Translate app is available on the Apple Watch, allowing you to access your favorite translations on the go. With its seamless integration across Apple devices, you can easily switch between your iPhone and Apple Watch for quick and convenient translations. Whether you're navigating a foreign city or engaging in conversation with locals, Apple Translate is designed to enhance your travel experience.

HOW TO STAY CONNECTED NO MATTER WHERE YOU TRAVEL IN THE WORLD

Microsoft Translator is a totally free-to-use translation app that is popular with business professionals. Featuring over translation for more than 120 languages, this is one of the most robust free-to-use translation apps. You can translate via text, spoken word or images with Microsoft Translate, and where the app really stands out is its ability to be used with multiple devices. You can create translation groups with Microsoft Translator and everyone can talk and translate together. The Microsoft Translator is available for both iOS and Android devices.

HOW TO SET UP FREE MESSAGING ON YOUR PHONE WHILE TRAVELING INTERNATIONALLY

With over 500,000 reviews on the Apple App Store, iTranslate is one of the most popular translation apps for travelers. It offers translation options for more than 100 languages, and its premium features make it well worth the cost of the app. You can use iTranslate for free, but you will be limited to just text translations. With the paid option, you can access both voice translations and text-via-camera translations. For those willing to pay $6 per month, users can save their translations and dictionaries offline, so you can use them from anywhere, even without service. iTranslate is available for both the iOS platform and the Android platform.

BEST GEAR FOR THE DARK OUTDOORS

There are a lot of different translation apps out there on the market aimed at travelers, and we highlighted our favorites today. While the majority of the apps in this list are free-to-use, and all the apps in this list have a free-to-use mode, you will need to pay for additional features from apps such as iTranslate.

What challenges have you faced while communicating in a foreign language during your travels? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Top 20 apps tracking you every day

9 February 2025 at 09:00

If something is free, you’re the product being sold. This is especially true for most online services we use. For example, Google’s primary source of revenue is ads. They make money by collecting data about you and me and selling targeted advertising to companies, which then show us products relevant to our interests.

You might have noticed that the moment you search for a product on Google, you start seeing ads for it on Facebook. The same applies to apps like Instagram, Threads and LinkedIn. In fact, research shows that the apps collecting the most data about you are also among the most widely used. 

Let’s look at the top 20 of them and explore how you can take control of your personal information.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Apps collect all sorts of data about you, but let’s get one thing straight. Not all data collection is bad. Some apps genuinely need access to certain information to function properly. For example, Uber stores your location data to help you find a ride faster, while WhatsApp requires access to your contacts so you can send messages.

The real issue is data collection that serves no purpose other than showing you ads or selling your information to third parties. According to Marin Marinčić, head of IT Infrastructure at Nsoft, the top 20 most invasive apps collect data that is not necessary for their core functions.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Leading the list is Meta with all four of its major apps. Facebook, Messenger, Instagram and Threads share 68% of collected data with third parties while also using it for targeted ads. LinkedIn follows, sharing around 37% of user data, with Amazon in third place, followed by YouTube.

What makes this concerning is how deeply embedded these apps are in our daily lives, making it nearly impossible to find alternatives or avoid data collection altogether.

The list also includes Elon Musk’s X at No. 5, followed by Uber Eats, PayPal, Uber, Google and Amazon Prime Video. TikTok, despite ongoing scrutiny over its data policies, ranks 14th. While many of these names were expected, one surprising entry is the mobile game Candy Crush, which uses 28% of collected data for ads. You can find the full list in the image below.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

Avoiding data collection is nearly impossible if you use the apps above. The only way to dodge these invasive apps is to switch to apps that respect your privacy. While it may seem impossible to replace some of the biggest platforms, there are alternatives that collect little to no unnecessary data.

Switching to these alternatives may require some effort, but it is the best way to limit how much of your personal data is being collected. Taking control of your privacy starts with making conscious choices about the apps you use.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES

If you’re not able to delete the apps listed above, follow the simple steps below to minimize how much information is being collected and shared.

1. Review app permissions: Most apps request access to data they do not actually need. Go to your phone settings and check app permissions on your iPhone and Android. Disable access to location, microphone, contacts and other sensitive data unless absolutely necessary.

2. Turn off ad personalization: Many companies track your online activity to show targeted ads. You can limit this by disabling ad personalization in GoogleFacebook, and other accounts. This reduces the amount of data collected about your interests and behavior.

3. Limit social media tracking: Social media platforms track your activity even when you are not using them. Adjust privacy settings to restrict data collection.

4. Avoid signing in with Google or Facebook: Many websites offer login options using Google or Facebook. While convenient, this shares even more data with these platforms. Instead, create separate accounts using email whenever possible.

5. Use a Virtual Private Network (VPN) and private browsing mode: VPN hides your IP address, helping to obscure your location and online activity, making it harder for websites to track you. Combined with private browsing or incognito mode, this reduces the amount of data companies can collect about your online activity. Using a VPN service can also enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. 

While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices

6. Regular app cleanup: Uninstall apps you no longer use to reduce passive data collection.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Protect your personal information across the popular platforms mentioned above with these essential privacy adjustments.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The best way to reduce companies from collecting your data is to remove invasive apps from your phone. Many apps request unnecessary permissions that can track your activity, so deleting them limits exposure. Instead of downloading standalone apps, try using the browser versions of popular social media platforms, as they typically have fewer permissions. 

However, web tracking still exists through cookies and fingerprinting, so using a privacy-focused browser like Brave, Firefox with enhanced tracking protection, or Safari with Intelligent Tracking Prevention (ITP) can further reduce data collection. However, some apps are so deeply integrated that replacing them is difficult. For example, if you use an Android phone, avoiding Google’s ecosystem is nearly impossible. Apple, on the other hand, offers more privacy controls, giving users better options to limit data collection.

Do you check app permissions before installing? How do you decide which permissions are acceptable? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Energy-saving scam uses Elon Musk’s name – Here’s the truth

2 February 2025 at 09:00

Elon Musk, known for leading companies like Tesla, SpaceX, Neuralink and xAI and buying and rebranding Twitter as X, often finds his name linked to innovation and futuristic ideas. But his reputation also makes him a prime target for scammers.

In the past, fraudsters have used Musk’s name in cryptocurrency schemes. Now, a new scam is making the rounds. This time, scammers are promoting bogus "energy-saving" devices, falsely associating Musk with these products to gain credibility. These devices, which don’t work as advertised, are being marketed as revolutionary solutions, duping people into spending money on what is essentially a scam.

We received this email from Rick in Wilkesboro, North Carolina: "I’ve been receiving emails offering an energy-saving device developed by Elon Musk. It claims the device can reduce energy bills by 50%. I never attempted to contact anyone associated with Elon Musk, nor have I done any internet searches for such a device. Are these emails legit or another attempt by scammers hoping I click on their links?"

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Rick, it sounds like those emails are likely scams. There have been numerous reports of scammers using Elon Musk's name to promote fake energy-saving devices. These scams often claim that the device can drastically reduce energy bills, but there is no evidence that Elon Musk or any of his companies are involved in such products.

Let's dive into how this scam works and share some ways you can stay safe.

The Elon Musk energy-saving scam works by using flashy online ads, unsolicited emails and other deceptive tactics to lure victims. Scammers promote so-called "revolutionary" devices through social media, pop-ups, emails and even search engine ads, claiming the products are backed by Musk.

These ads often include fake customer reviews, exaggerated claims of slashing electricity bills by 50% or more and time-limited discounts to create urgency. Names of devices advertised in these scams include the Power Pro Save, Heunwa Power Save, Stop Watt, Miracle Watt, True Watt, Real Watt, Watt Rescue, Esaver Watt, Pro Power Save, Voltmod and more. 

Clicking on these ads leads you to sales websites designed to look legitimate. They feature fake logos, doctored before-and-after photos and bogus celebrity endorsements to build trust. The sites throw around pseudo-scientific jargon like "stabilizing electrical currents" or "rebalancing loads" to sound convincing. They also use tactics like showing inflated "regular" prices crossed out to make the current offer seem like a huge bargain.

If you look closely, though, the red flags are clear. These sites lack basic details like a company address, contact number or business registration information. Instead, they push you to place an order through an online form, demanding full payment upfront via credit card or PayPal.

After paying, customers might receive a cheap, non-functional plastic device, or sometimes nothing at all. These devices don’t reduce electricity usage. They might even waste more power. But by the time you realize it, the scammers have already pocketed your money.

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Over the years, plenty of power-saving scams have promised to cut down or even eliminate your electricity bill by simply plugging in their devices. The reality is that there’s no device you can plug in that will actually reduce your electricity usage or lower your household bill.

These products often claim to "stabilize voltage" or "reduce power waste." While voltage stabilization can be useful in industrial settings, it doesn’t make much difference for typical home appliances. Most household appliances are already designed to run efficiently without the issues these devices claim to fix.

If you’re serious about saving on electricity, focus on practical solutions like upgrading to energy-efficient appliances, using smart home devices or adjusting your energy usage schedule.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME

Too good to be true: Claims of reducing energy bills by 50% or more are often exaggerated and unrealistic.

Unsolicited emails: Receiving emails out of the blue, especially when you haven't shown interest in such products, is a common tactic used by scammers.

Use of celebrity names: Scammers frequently use well-known names like Elon Musk to lend credibility to their schemes.

Suspicious links: Be cautious of clicking on links in unsolicited emails. They can lead to phishing sites designed to steal your personal information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

1. Verify the email: Phishing emails are a common tool scammers use to trick people into buying fake products or giving away personal information. These emails often look like they’re from legitimate sources, but they contain links that lead to fraudulent websites or prompt you to download malicious attachments. Always check the sender's email address and look for signs of a fake message, like poor grammar or urgent calls to action. 

2. Verify claims: If you're curious about a product, do some research from reputable sources before taking any action.

3. Do not click links: Avoid clicking on any links or downloading attachments from these emails. Instead, hover over the link to see its true destination. This can help you identify if it leads to a legitimate site or a malicious one.

4. Have strong antivirus software actively running on your devices: Ensure you have reliable antivirus software installed on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5. Examine the website carefully: Scammers often create websites that look professional, but they’re easy to spot with a few simple checks. Look for missing or suspicious information, like the absence of a business address, phone number or business registration details. If there are fake testimonials or celebrity endorsements, that’s a red flag.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Don’t fall for "too good to be true" deals: Scammers rely on offering deals that seem too good to pass up, like massive discounts or a "limited time offer." If an ad claims you can save 50% or more on a product, be skeptical. Real, quality products usually don’t come with such extreme savings, and high-tech devices like those promoted by scammers rarely live up to the hype. If it feels like too good a deal, it probably is.

7. Watch out for unusual payment methods: One of the easiest ways to spot a scam is by how the scammers ask you to pay. If a website asks for payment upfront via credit card or PayPal with no option to verify or ship the product first, it's a major red flag. Scammers take your money upfront and have no intention of sending you anything of value. Stick to reputable payment methods that offer buyer protection and avoid sites that ask for payment without proper verification.

8. Mark spam email as junk or spam: Most email providers have a feature that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.

9. Do not share your email address publicly or with unknown sources: This can reduce the chances of your email address being collected by spammers. You can also use a disposable email or email alias for signing up for online services that you do not trust or need.

10. Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

YOUR EMAIL DIDN'T EXPIRE, IT'S JUST ANOTHER SNEAKY SCAM

Impersonation scams are a common way scammers steal your money. They often use well-known names like Elon Musk or big companies like Microsoft and Walmart to make you trust them, then trick you into giving away your financial details. To stay safe, avoid unsolicited emails or texts that promote products or offers. If you need to buy something, stick to trusted sellers like Amazon, Best Buy or other reputable platforms. Always double-check the legitimacy of any offer before making a purchase, especially if it comes from an unfamiliar source.

Have you ever encountered a scam using a well-known name or brand? What happened? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Scammers find sneaky way to bypass your iPhone's safety features

27 January 2025 at 05:00

In an alarming development, cybercriminals have devised a new method to circumvent Apple's built-in phishing protection for iMessage, potentially exposing you to malicious links and scams. This sophisticated tactic exploits a security feature designed to protect you, turning it into a vulnerability that could lead to significant personal and financial risks.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Apple's iMessage automatically disables links in messages from unknown senders as a security measure. However, cybercriminals have found a way to exploit this protection. By instructing you to reply to the message, often with a simple "Y," the attackers can re-enable previously disabled links. This seemingly innocuous action not only activates the links but also signals to the scammers that they've found an engaged target for future attacks.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Apple defines social engineering as a targeted attack that employs impersonation, deception, and manipulation to gain access to personal data. Scammers often pose as representatives of trusted companies, using sophisticated tactics to persuade individuals to disclose sensitive information, such as passwords and financial details. Here are some of those sneaky tactics:

The messages typically end with instructions like: "(Please reply Y, then exit the SMS, re-open the SMS activation link, or copy the link to open in Safari)."

THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE

This new tactic is part of a broader trend of smishing (SMS phishing) attacks targeting mobile users. With the increasing reliance on smartphones for various activities, including financial transactions and personal communications, these attacks pose a significant threat to users' security and privacy.

DOES MY IPHONE NEED ANTIVIRUS PROTECTION?

To safeguard against these sophisticated phishing attempts, consider the following steps.

1) Never reply to suspicious messages: Avoid responding to texts from unknown senders, especially those asking you to reply to activate links. Additionally, make sure to delete suspicious text messages and block the sender to prevent further attempts. Since the sender is not in your contact list, you can click Report Junk at the bottom of the text. Then click Delete and Report Junk. This will report the conversation as junk by sending it to your wireless carrier and Apple using your phone number.

2) Verify sender identity: Contact organizations directly through official channels if you're unsure about a message's legitimacy.

3) Be skeptical of urgency: Scammers often use urgent language to prompt quick, thoughtless actions.

4) Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. Here are the steps:

This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently.

5) Use two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

6) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

7) Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you these deceptive iMessage phishing texts in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

If you suspect you've fallen victim to a smishing attack:

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

This latest trick targeting iMessage users serves as a reminder that even seemingly secure systems can be vulnerable to social engineering. By remaining cautious and following best practices for digital security, you can significantly reduce your risk of falling victim to these sophisticated phishing attempts.

What other cybersecurity challenges have you encountered with your mobile devices, and what questions do you have for us? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Don’t let this credit card fraud nightmare happen to you

26 January 2025 at 09:00

Credit card fraud has been on the rise in recent years.

The Federal Trade Commission’s most recent database indicates that 416,582 cases of credit card fraud were reported in 2024, making it one of the most common forms of identity theft. You know you've been a victim of this fraud when you notice unauthorized transactions on your credit card bill. 

These transactions are usually below $100 to avoid detection. However, sometimes they can exceed $1,000. One such incident happened with Martin from Martinsville, Virginia, when he was randomly charged $1,095 in Hong Kong.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

"Hello, I recently received a fraud alert from my credit card company that said that there was a $1,095 charge on my credit card in Hong Kong. I use my iPad and Safari browser to buy online. Can you please explain how this could happen? By the way, my credit card company canceled my credit card and will send me a new Mastercard in the mail, and I’m not responsible for the charges on my credit card. What can I do in the future to prevent this from happening again?"

I'm sorry to hear about the fraudulent charge on your credit card, Martin. It’s good that your credit card company is handling it and that you’re not responsible for the charges. For future reference, I'll be discussing how this could have happened and how to stay safe.

Credit card fraud can happen in several ways, often without you even realizing it. One common method is when fraudsters get hold of your card information through data breaches at online stores or banks, which means your details get leaked without your knowledge. 

Another sneaky tactic is phishing, where scammers trick you into giving away your card info by posing as legitimate companies via emails or fake websites. 

There’s also the risk of "card skimming," where devices at ATMs or gas stations secretly capture your card details when you swipe it. In some cases, fraudsters might also exploit weak security on public Wi-Fi networks or compromised apps to access your information while you’re shopping online.

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME  

A report from Security.org reveals that 52 million Americans experienced credit card fraud in 2023, a figure even higher than the one reported by the FTC. With four out of five American adults owning at least one credit card, the report found that three in five cardholders have faced unauthorized charges — an estimated 128 million victims. Even more concerning, 75% of these victims reported having their credit card information stolen more than once. 

The typical unauthorized transaction is around $100, which adds up to approximately $5 billion in criminal purchases each year. Interestingly, most unauthorized transactions involve credit cards that weren’t physically lost or stolen, highlighting the growing risks of online fraud and data breaches.

THE BEST BALANCE TRANSFER CREDIT CARDS 2025

Data breaches are one of the main ways credit card fraud happens. Hackers often get unauthorized access to sensitive information stored by businesses or institutions. When a retailer, financial institution or online store experiences a data breach, the hackers usually go after the payment systems where customer credit card details are kept.

If these systems aren’t properly secured, hackers can grab things like credit card numbers, expiration dates and sometimes even security codes. Once they have that info, they can either use it themselves or sell it to others.

But it’s not just credit card information at risk. Data breaches can also expose personal details like names, email addresses and phone numbers. Scammers can then use this stolen info to launch phishing attacks, pretending to be trusted companies and tricking you into giving away more sensitive information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

This is why identity theft monitoring is so important. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

1. Notify your credit card issuer immediately: If you notice fraudulent charges on your credit card, start by calling the number on the back of your credit card. From there, you should get more detailed information on what to do next.

2. Monitor your statements regularly: One of the best ways to catch credit card fraud early is to keep an eye on your statements. Review your transactions regularly to spot any unfamiliar charges. The sooner you notice something suspicious, the quicker you can report it to your credit card company and prevent further damage.

3. Regularly check your credit report: In addition to monitoring your credit card statements, periodically review your credit report to catch any unauthorized accounts opened in your name.

4. Use strong, unique passwords: Always use strong, unique passwords for your online accounts, especially those that store payment details. Avoid using easily guessable information, and consider using a password manager to store and generate secure passwords. This reduces the chances of fraudsters accessing your accounts.

5. Use credit card alerts: Set up transaction alerts with your credit card company. This way, you’ll receive a notification via email or text for every transaction made with your card. If you receive an alert for a purchase you didn’t make, you can take immediate action to report it and prevent further charges.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Be Cautious with public Wi-Fi: Avoid making purchases or entering sensitive information when connected to public Wi-Fi networks because they’re often not secure. If you need to make an online purchase while on the go, consider using a VPN (Virtual Private Network) to encrypt your connection and keep your credit card details safe from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices 

7. Don't store credit card info on browsers and websites: Storing your credit card information on browsers or websites can make it convenient, but it also exposes you to a higher risk of fraud. If your browser or the website’s security gets compromised, hackers could gain access to your saved card details. To stay safe, avoid saving your credit card information and manually enter it each time you make a purchase. If a site offers to save your details for future use, think twice before accepting. It's better to take the extra step to enter your information each time, ensuring your data stays secure.

8. Use EMV chip technology: When making in-person purchases, always use the chip reader instead of swiping your card. Chip technology provides an extra layer of security against fraud.

9. Be wary of phishing attempts and have strong antivirus software: Be cautious of unsolicited emails, texts or phone calls asking for your credit card information. Legitimate companies typically don't request sensitive information through these channels. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10. Keep your card in sight: When using your card in restaurants or stores, try to keep it within view. This reduces the risk of someone copying your card details.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

It's clear that credit card fraud is more prevalent than ever, affecting millions of Americans each year. The good news is that there are effective steps to protect yourself from becoming a victim. By staying vigilant and employing best practices — like monitoring your statements and using strong passwords — you can significantly reduce your risk. Remember, awareness and proactive measures are your best defenses against credit card fraud.

Have you or someone you know ever experienced credit card fraud, and how did it impact you? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Best home inventory apps to protect your property in case of emergency

22 January 2025 at 09:00

The recent disasters sweeping the nation, from the torrential floods in North Carolina to the fires still raging in Southern California, showed how vital it is to have an evacuation plan because you might only have mere seconds to determine which items to take with you as you evacuate. 

While caring for your loved ones during this extremely stressful time should be a top priority, it is unavoidable that you must rebuild your home and life, which can mean having to provide detailed accounts of what you lost to your insurance provider. 

Trying to figure out what to take when you are given seconds or minutes to evacuate or having to file detailed insurance claims afterward can be a painful and confusing process.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Home inventory and restoration apps can provide you with a tool to itemize and track every item in your home. Not only can these apps help you stay organized and fiscally responsible for everyday home projects, but they can also help you easily determine what you need to grab and where it would be when you have limited time to grab items to take with you when you evacuate. It is important to determine where and what to prioritize, especially if your home is at risk. 

These apps can centralize all your home information so that you can stay within budget for home projects and maintenance work, and they can help you should you ever have to submit a claim after any disaster. It can also help you keep your home safer with routine maintenance. Additionally, creating a home inventory can help you determine if you have the appropriate amount of insurance coverage. Some apps allow you to upload important documentation for your home in general or specific items. This means if you ever deal with the worst-case scenario and cannot grab all the important home documents, your apps will have them stored for you and accessible by phone or computer.

Here are the top picks for apps that are best at keeping track of your home before or after a disaster.

TOP FIREPROOF BAGS, ORGANIZERS AND SAFES TO PROTECT YOUR VITAL DOCUMENTS

A comprehensive home management platform, HomeZada, helps homeowners manage all aspects of their home, including but not limited to: maintenance, finances, inventory and improvement projects. Because it acts as a central hub to organize and track important home-related information, it will help you track, locate, rescue important items and make filing insurance claims easier.

Key features of HomeZada

Pricing

HomeZada offers both free and premium plans. Premium plans features include providing additional tools for inventory management, financial tracking and project planning.

Website

For more information or to sign up, click here.

TOP PICKS TO AMP UP YOUR HOME SECURITY

While not as comprehensive as Homezada, Centriq has a strong focus on home management, which centralizes everything you need to organize, troubleshoot, operate and maintain your home.

Key features of Centriq

Pricing

Centriq offers both free and premium plans. Some of the extra features of the Premium plan include interactions between multiple properties and shared access for multi-users.

Website

For more information or to sign up, click here.

TECH TIPS TO AVOID CONTRACTOR SCAMS AFTER A STORM OR DISASTER

The National Association of Insurance Commissioners created the NAIC Home Inventory app to help you if you need to file a claim, as well as provide expert tips. The app showcases a simple, clean design of the inventory section with built-in room suggestions. Though a bit more generic than some of its competitors, this app helps you create an itemized list of your home should you need to file an insurance claim in the future.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Key features of NAIC home inventory app

Pricing

NAIC Home Inventory app is free.

Website

For more information or to sign up, click here.

BEST APPS TO TRACK AND MONITOR AIR QUALITY TO STAY SAFE

Unlike its namesake, Itemtopia actually goes beyond itemizing your belongings. Available in over 170 countries worldwide, the app allows you to manage services, warranties as well as medical records. A rich and interactive app helps you start with ease by incorporating AI intelligence.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Key features of Itemtopia

Pricing

Itemtopia offers both free and premium plans. Some of the extra features of the Premium plan include larger storage (up to 2 GB or approximately 3,000 items), the option to add more users and the ability to showcase items for sale with a shareable link.

Website

For more information or to sign up, click here.

THE ALARMING SURGE OF HOME TITLE THEFT AND HOW TO PROTECT YOUR PROPERTY

It’s easy to feel chaotic and overwhelmed when disaster strikes or when friends or family members are grappling with huge losses in home and security. There are, however, home apps that can help you create a plan before and after disaster strikes so you can have one less problem to manage while grieving your losses. While the hope is that disasters will not happen to you, these apps I mentioned will help you know, organize and restore your home should disaster strike. With some of the easiest and best ways to create a home inventory, it will give you peace of mind and a proactive way to respond during an emergency.

Are you prepared for possible evacuation in an emergency? Have you survived a disaster? What did you learn, and what would you do differently? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Best ways to give your old iPhone a second life

17 January 2025 at 09:00

Before tossing out your old iPhone, consider it a treasure trove of potential waiting to be unlocked. 

Your seemingly outdated device isn't just electronic waste. It's a versatile gadget ready for an exciting second life. From transforming into a smart home hub to becoming a dedicated digital companion, an old iPhone can be repurposed in countless creative ways that breathe new life into technology you may not have considered. 

Here are some of the best ways to use your old iPhone.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Smartphones are incredibly powerful, but they can also be overwhelming. The constant notifications and social media updates can make it hard to focus or enjoy the present moment. If you’re finding that your iPhone is more of a time-waster than a tool for productivity, why not transform it into a "dumb phone"? A "dumb phone" is a basic mobile device that focuses on essential communication functions like calling and texting, while minimizing digital distractions through limited internet access and app capabilities, helping you reduce screen time and stay more present.

Disable notifications:

Delete unwanted apps:

Factory reset (Optional):

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Eventually, you may want to give your child their own smartphone. While a new phone can be expensive, handing down your old iPhone is a great way to introduce them to technology while also being mindful of your budget. 

By using Family Sharing and parental controls, you can carefully monitor what apps and content your child accesses. Plus, it’s an excellent way to bring them into the Apple ecosystem. 

Set up Family Sharing:

Enable Parental Controls:

This process will help you manage your child's device usage effectively while ensuring they have access to appropriate content.

24 MOST AMAZING GIFTS FOR KIDS

In recent years, Apple’s Continuity Camera feature has made it easy to use an iPhone as a webcam for your Mac or Apple TV. While newer models work well for this purpose, older iPhones can still serve as excellent webcams, especially for online meetings and video calls. 

Instead of purchasing an external webcam, your old iPhone can deliver superior video quality. iOS 18 even allows older iPhones to work as dedicated continuity cameras for Apple TV, which is ideal for FaceTime or Zoom calls with family and friends.

Instead of purchasing an external webcam, your old iPhone can deliver superior video quality.

Why use your main iPhone for music when you can repurpose your old one as a dedicated MP3 player? With your old iPhone set up as a music player, you can enjoy your favorite tunes or podcasts without the distractions of text messages or social media notifications. It’s a perfect solution for workouts, long drives or when you just want to zone out with music.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

If you own an Apple TV, you already know that your iPhone can function as a remote control. However, keeping your main phone tied up with the remote can be inconvenient. By making your old iPhone a dedicated Apple TV remote, you can still enjoy controlling your TV without using your primary phone. 

Set up Apple TV remote feature:

Manage smart home devices:

Your old iPhone can even be a hub for all your smart home devices, from adjusting lights and thermostats to checking security cameras.

10 SMART HOME DEVICES WE LOVE

Smartphones have transformed mobile gaming, and your old iPhone could be an ideal portable gaming console. Many classic and modern games run smoothly on older iPhone models, and with subscription services like Apple Arcade, you can access a huge library of high-quality games. This is a fun, low-cost way to enjoy mobile gaming without draining your main iPhone’s battery life.

For book lovers, using an old iPhone as a dedicated e-reader is a great option. You can install apps like Kindle or Apple Books from the App Store. The iPhone's display is perfect for reading books and graphic novels, and since you’re not using your main iPhone, there are no distractions like notifications to interrupt your reading. 

You can disable all apps and notifications on the old device, making it a peaceful reading experience. Plus, you can still connect your AirPods to listen to audiobooks while on the go.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Just because you’ve upgraded to a new iPhone doesn’t mean your old one has to be discarded. There are countless ways to repurpose it, from boosting your productivity to controlling your smart home. This way, you can extend its lifespan and maximize the value of your purchase. 

What other devices would you like tips on breathing new life into? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Malicious apps posing as VPNs can turn your device into a tool for cyberattacks

5 January 2025 at 07:00

Virtual private networks (VPNs) are important if you care about your data and privacy. They create a secure, encrypted connection between your device and the internet, hiding your IP address and protecting your online activity. 

There are tons of apps out there that claim to offer VPN services, but not all of them are legit. Some are fakes trying to steal your data. 

In the third quarter of 2024, security researchers found that the number of users encountering fake VPN apps jumped 2½ times compared to the second quarter globally. These apps were either malware or programs that could be used by malicious actors.

I’m diving into the rise of fake VPN apps and how you can stay safe.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

According to Kaspersky, cybercriminals are taking advantage of people who want to use free VPN services. In May 2024, law enforcement shut down a botnet, a network of hijacked devices, called 911 S5. Several free VPN services, including MaskVPN, DewVPN, PaladinVPN, ProxyGate, ShieldVPN and ShineVPN, were used to create this botnet.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

When users installed these VPN apps, their devices were turned into proxy servers, meaning they were used to redirect someone else’s internet traffic

This huge network spread across 19 million unique IP addresses in over 190 countries, making it possibly the largest botnet ever created. The people controlling the botnet sold access to these infected devices to other criminals, who used them for cyberattacks, money laundering and fraud.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

You can’t trust free VPN apps because they have no reason to keep you or your data safe. Here's why you should be cautious:

There's a growing demand for VPN apps across all platforms, including smartphones and computers. Users often believe that if they find a VPN app in an official store, like Google Play, it's safe to use. They're especially drawn to free services, thinking it's a great deal. However, this can often be a trap.

MASSIVE DATA BREACH EXPOSES 3 MILLION AMERICANS’ PERSONAL INFORMATION TO CYBERCRIMINALS

If you need a VPN, stick to a service that’s well-known, trusted and not free. Look for ones that are talked about on mainstream sites and backed by solid reviews. If you’re not sure where to start, I’ve put together a handy list of my favorite VPNs. I’ve tested them myself, and you can trust them to keep your data safe. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

UNDERSTANDING BRUSHING SCAMS AND HOW TO PROTECT YOURSELF 

Here are seven essential steps to help you choose a reliable VPN and safeguard your online privacy.

1. Stick to official app stores: Always download apps from trusted platforms like the App Store for iOS or the Google Play Store for Android. These stores have built-in security measures that help detect and remove fake or harmful apps. Avoid downloading apps from random websites or third-party stores, as they are more likely to host malicious software. Even on official stores, check the app’s reviews, ratings and download count to ensure it’s trustworthy.

2. Pay attention to app permissions: Be careful about the permissions you grant to apps during installation. A flashlight app, for example, doesn’t need access to your contacts or location. Question any permission that doesn’t align with the app’s functionality. Both iOS and Android allow you to review and manage app permissions in your settings, so take the time to double-check what you’ve already allowed.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Use two-factor authentication (2FA): Implement 2FA for your VPN accounts to add an extra layer of security beyond just a password.

4. Keep software updated: Regularly update all VPN-related software, including clients, servers and associated networking hardware, to benefit from the latest security patches and improvements.

5. Use strong encryption: Look for VPN services that use robust encryption protocols like AES-256 to protect your data.

6. Monitor VPN traffic: Continuously monitor VPN traffic and logs for unusual patterns that might indicate security issues.

7. Invest in strong antivirus software: A strong antivirus program can help detect and remove malware before it compromises your device. Many antivirus apps also come with features like web protection, anti-phishing tools and the ability to scan new apps for threats. While there are free options, premium versions often provide more comprehensive protection. Look for a trusted name in cybersecurity when choosing an antivirus solution. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Fake VPN apps are everywhere, and they’re bad news. They’re not just useless. They can turn your device into a tool for cybercriminals. The 911 S5 botnet showed us just how dangerous free VPNs can be, turning millions of devices into a giant network for fraud and attacks. The truth is free VPNs aren’t really free. They often come with weak security, leak your data or demand permissions that put your privacy at risk. If you’re serious about protecting your online activity, invest in a trusted, paid VPN service.

How often do you check the credibility of apps you download? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Apple Mail app redesign introduces new categorization feature in iOS 18.2

29 December 2024 at 05:00

Apple's new Mail Categories in iOS 18.2 and later are here to help you take control and make managing your email a lot easier. 

Let's dive into how you can make the most of these new inbox features on your iPhone.

First things first, let's update your software to iOS 18.2 or later:

GET SECURITY ALERTS, EXPERT TIPS, SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE

GET ORGANIZED: NEW IOS 18 CALENDAR FEATURE

In iOS 18.2 and later, the Mail app enhances email management by automatically sorting messages into distinct categories. This feature is designed to help you quickly find and manage your emails.

Note: If a message in the Transactions, Updates or Promotions categories contains time-sensitive information, it will also appear in the Primary category.

IOS 18'S NEW TEXT FORMATTING AND EFFECTS IN MESSAGES  

Now that you're all set with iOS 18.2 or later, let's explore how to use the new Mail Categorization feature:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

To make sure important emails, like the CyberGuy newsletter, land in the "Primary" category:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

This simple action helps signal its importance. Once you manually move an email to the Primary category, Apple's Mail app will learn from this action.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Apple's new Mail Categories feature aims to streamline your email management by automatically sorting your messages. While it can be incredibly helpful, it may take some time to adjust and fine-tune. Remember to periodically check other categories to ensure important emails aren't misclassified. With a bit of patience and customization, you can transform your inbox into a more organized and efficient space.

Have you found the new email categorization feature helpful, or do you wish you could go back to the way things were? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

New iPhone auto-restart feature locks encrypted data after extended inactivity

20 December 2024 at 09:00

Your iPhone data just got more secure, thanks to a new feature in iOS 18.1. This update includes an important security measure designed to protect your device and its encrypted data after long periods of inactivity.

Apple has introduced an Inactivity Reboot feature in iOS 18.1, which automatically reboots your iPhone if it has been idle and locked for more than three days. This feature uses the Secure Enclave Processor (SEP) to monitor when your iPhone was last unlocked. 

If the device stays locked for an extended period, the SEP notifies the kernel, which triggers a reboot and kills the Springboard (the core of iOS).

GET SECURITY ALERTS, EXPERT TIPS, SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

The main benefit of the inactivity reboot is better data protection. By forcing a reboot after prolonged idle time, the iPhone essentially wipes encryption keys from memory. Once rebooted, the phone enters an "at rest" state. This makes it nearly impossible for cybercriminals to decrypt the data. Even if the device is left powered on for an extended period, the feature ensures that outdated forensic tools used by cybercriminals won't be able to access sensitive information.

BEST POWER STRIPS AND SURGE PROTECTORS 2024

Although this new security measure is a big win for privacy, it has raised concerns with law enforcement. Specifically, they are facing more challenges when trying to unlock phones for forensic analysis. However, researcher Jiska Classen points out that three days is still enough time to coordinate steps with analysts to access the device.

HOW TO STOP ANNOYING ROBOCALLS

To enable this feature, all you have to do is make sure your iPhone is running iOS 18.1. Here’s how to check and update:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

While the inactivity reboot feature is a valuable security tool, it’s not a foolproof solution. To further protect your data, consider taking these additional steps:

1. Set a strong password: Create strong passwords for your accounts and devices and avoid using the same password for multiple online accounts. Using the same password across multiple platforms will always make you more vulnerable, because if one account gets hacked, they all get hacked. Consider using a password manager to generate and store complex passwords.

2. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Back up your iPhone regularly: Backups prevent data loss caused by malicious attacks. It's a crucial step to protect your personal information. Here's how to do it: 

4. Turn on two-factor authentication (2FA): 2FA is an extra shield that will prevent a hacker from getting into your accounts on your iPhone. Here's how to do it:

After adding a trusted phone number, for security, when you sign in to your account on a new device or on the web, you'll need both your password and a section factor, such as a six-digit code sent to your devices or your phone numbers. 

5. Enable Stolen Device Protection: This feature adds an extra layer of security if your iPhone is stolen by requiring biometric authentication for sensitive actions when you're not in a familiar location. To enable it, follow these steps:

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The new auto-restart feature is a major step forward in improving iPhone security, offering extra protection against cybercriminals. As security technology continues to evolve, it’s exciting to think about what future developments might look like.

What other security features would you like to see on your iPhone? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

KURT'S HOLIDAY DEALS:

Copyright 2024 CyberGuy.com. All rights reserved.

How to thief-proof your Christmas decorations

14 December 2024 at 09:00

Holiday decoration theft has become an increasingly frustrating issue for many homeowners. Karen from Los Angeles shared her experience with us in an email, stating,

"We have criminals who visit our neighborhood to not only steal mail and packages but also holiday decorations. I made a Christmas decoration for our mailbox, which was promptly stolen."

We’re sorry to hear about the theft in your neighborhood. This highlights a problem that goes beyond mere property loss. It's a theft of holiday cheer and personal effort. Let’s see how we can use technology to help secure your decorations.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Karen also inquired about the effectiveness of Samsung SmartTags, asking if these tags would work on her decorations and how far they could reach. The good news is that Samsung SmartTags can indeed be used on your holiday decorations. You can attach the SmartTag to any item you want to track. These devices are compatible with most recent Samsung Galaxy phones, including the Galaxy S9, making them accessible to many Android users.

As for the distance, the range of the Samsung SmartTag uses Bluetooth to connect to your phone. If the item is within Bluetooth range, you can ring it to find it or use the "Search Nearby" feature to get directions to it. If the item is out of range, other Samsung devices near the tag will anonymously locate it for you and then let you know where it is. This is done in the background and is encrypted to ensure privacy. The SmartTag does not beep when it’s out of range.

The Samsung SmartTag is compatible with almost all Samsung Galaxy phones released recently. They must have 2GB of RAM and run Android 8.0 (Oreo) or higher. So, your Samsung Galaxy S9 phones should be compatible with the Samsung SmartTag.

TOP PICKS TO AMP UP YOUR HOME SECURITY

For those considering a switch to Apple, AirTags present another viable option. Karen asked if she would have problems tracking her decorations with an Apple AirTag. While primarily designed for iOS devices, you can use it with your Android phone as mentioned in our article here, with some limitations. It uses the Find My network, and if another Apple device passes by the AirTag, the Find My network will be notified of the lost item’s location.

The AirTag does not beep when it’s out of range. However, the AirTag’s Precision Finding feature, which provides highly accurate tracking, is only compatible with iPhone 11 series and onwards. If you’re considering purchasing an iPhone, the iPhone 11 would be a relatively inexpensive option that is compatible with the AirTag’s Precision Finding feature.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

BEST HOME SECURITY SYSTEMS

Both Samsung SmartTags and Apple AirTags offer extensive tracking capabilities. The SmartTag uses Bluetooth for nearby tracking and relies on other Samsung devices for long-range location. Similarly, AirTags leverage the Find My network, utilizing nearby Apple devices to relay location information.

For Samsung users like Karen, the SmartTag is the natural choice, working seamlessly with Galaxy devices. Those considering Apple might look at the AirTag as an option.

Please note that while these tags can help you track your items, they might not prevent theft as they are not hidden devices and can be removed by someone who recognizes what they are. 

10 THINGS YOU MUST CONSIDER WHEN CHOOSING ANY SECURITY CAMERA

1. Use motion-activated cameras: Install motion-activated security cameras to monitor your decorations. Many security cameras send real-time notifications to your phone, allowing you to act quickly if someone tampers with your property.

2. Secure decorations: Consider physically securing your decorations with zip ties, chains or locks. While this won't deter all thieves, it can make stealing more difficult and time-consuming.

3. Light it up: Well-lit areas are less appealing to thieves. Ensure your yard and decorations are adequately lit with outdoor lights, especially in dark corners or near entry points.

4. Engage your neighbors: Create a sense of community by alerting neighbors to thefts and keeping an eye out for suspicious activity. A connected neighborhood can act as a strong deterrent.

5. Mark your property: Use invisible ink or engrave your decorations with a unique identifier. If stolen items are recovered, this will help law enforcement return them to you.

6. Report thefts to local law enforcement: Always report thefts, no matter how small. Law enforcement can track patterns and increase patrols in areas with frequent incidents. Providing details may also help them recover stolen items.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

In her email, Karen expressed her frustration: "I know this seems minor... but it’s disheartening to see the things you spend time, money and a little love get stolen." The desire to protect holiday decorations goes beyond material value — it's about safeguarding the joy and effort put into creating a festive atmosphere. As we embrace these technologies, let's also remember the importance of community vigilance and mutual respect.

Have you ever used tracking devices, security cameras, or other gadgets to safeguard your decorations? What worked well, and what would you recommend to others? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

7 must-have apps to save big this holiday season

11 December 2024 at 09:00

Imagine walking into a store or browsing online, confident that you’re getting the best deals without spending hours hunting for discounts. 

With the right tools at your fingertips, this can be your reality. We've researched and reviewed seven fantastic options that can help you save both time and money during your holiday shopping spree. 

From cash-back apps to discount tools, these strategies will ensure you check off every item on your wish list without breaking the bank. Ready to save some money? Let's dive in.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Downloading big retailer apps can lead to more savings that cannot be found in stores or online. From Target and Walmart to your local drugstore, many offer secret app-only savings and offers. Retailers are trying to get us to shop more with their own app by combining an app purchase with an in-store pickup that can at times offer additional savings. Look for each app in the official Apple app store and Google Play Store, never from a link or other site.

KURT’S BEST HOLIDAY DEAL PICKS

Cashback shopping apps like Rakuten let you earn cash back when shopping online. According to Rakuten, thousands of retailers participate in the savings.

How it works is simple. Register for free online, then use their app or website while shopping at retailers that offer a commission for sending you to their shopping site.

Rakuten shares a portion of the commission it earns with you. Once you earn enough cash-back savings, you can choose to receive a check, have it paid to your PayPal account or use the American Express rewards program.

Click this link and get a $40 bonus when you spend $40.

I've mentioned this app before. Ibotta is an app that you use for couponing and gives you cash back on items you’re already purchasing at your favorite stores, including grocery stores, food delivery, movie and concert tickets, and more.

Some of the most popular retailers you can find deals with through Ibotta are CVS, Walgreens, Target, Lowe’s, Petco, Domino’s Pizza, REI and more than 1,500 brands and retailers.

If you scroll to the bottom of the app, you’ll see a section called "Special Deals." If you scroll, you’ll see a panel called "Free made easy: All free offers all in one place."

Click this link and use referral code mpiaurm to earn $5 when you submit your first receipt.

Copy the code to insert into the Referral code box on Ibotta "Create account" page: mpiaurm

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Discount apps like Flipp aggregate sales fliers and store circulars. All you do is put in your zip code and start browsing for savings from thousands of popular retailers. The Watch List lets you track items from your holiday shopping list. Make sure to create a tight shopping list of each item to track in case prices go down before or after your purchase.

KURT’S UNBEATABLE HOLIDAY DEALS

PayPal Honey leads the pack by automatically entering coupon codes into the promo code field when checking out at 5,500+ retail sites.

How it works: You can use the PayPal Honey app directly, but you are better off using it the way it was designed as a browser extension. Once added to your browser, it tracks where you are shopping and applies the best coupon codes without you needing to do anything. Just watch the total price drop as you are checking out when there is a match to a good discount.

The PayPal Honey browser add-on is available on Safari, Chrome, Edge, Firefox, Opera and Edge browsers. Again, for security, only download directly through your browser and not from a link or email offer.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

PayPal paid $4 billion dollars for the automated coupon code technology browser add-on. That's when Honey became PayPal Honey you will find here.

While it has come under fire by Amazon for privacy concerns, upon close examination it does not collect anything more than most other shopping technologies and says it does not resell customer shopping data. Maybe Amazon does not like that it works with Amazon, too, which can drive down prices.

Amazon Warehouse has millions of open boxes, refurbished, renewed and used goods. Few know that retail giant Amazon has a renewed outlet shopping area that can save you when buying items in good-to-like-new condition.

Make sure you get a very good understanding of an item's condition before buying. You are protected by Amazon's policies making it easier to return the rare dud.

BookFinder.com buys and sells used textbooks. Search with your teacher or professor’s textbook ISBN to make sure you are getting the exact match. Watch that you have thoroughly checked the condition of any used textbook before pulling the trigger at checkout. Avoid textbooks that say there are notations on the various pages, as these may not be the notes that earn you a good grade.

5 SECRETS TO SHOPPING SMARTER ON AMAZON

You can buy discounted gift cards or sell unwanted gift cards for cash. I also recommend that you check the balance and expiration date of your gift cards before using them and use them as soon as possible to avoid losing them or forgetting about them. Check out the best way to buy gift cards ever by clicking here.

Set Deal Alerts at Slickdeals.net. This community of millions of fellow shoppers is looking for and sharing the best deals. When the price reaches a desired level, you'll receive a notification so you don't miss the deal.

Pro tip: I like to track larger dollar items and then create a calendar entry in my phone reminding me of the last day to reprice a purchase so that I can potentially get money back when the price goes down after the sale.

Make sure it's a deal by using price tracking sites like Camelcamelcamel.com, which shows the history of sale prices.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

As we gear up for the holiday shopping season, remember that saving money doesn't have to be a chore. With the right tools and strategies at your disposal, you can enjoy a stress-free shopping experience while keeping your budget intact. Whether you choose cash-back apps, discount tools or retailer-specific offers, there's something out there for everyone. So, why not dive in and start exploring these options? 

What are some of the absolute best deals you have found using these tools or other methods? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to delete multiple emails at once on iPhone

10 December 2024 at 05:00

Managing your inbox can quickly become a daunting task. Many of us find ourselves drowning in a sea of unread emails, making it challenging to stay organized. Dale from Lowell, Arizona, recently reached out with a common frustration:

"My iPhone 13; How do I erase multiple emails from my inbox? Deleting each one individually is time consuming and tedious. Currently 1900 plus."

Don’t worry, Dale. You're not alone in this struggle. Let's dive into some easy steps to declutter your inbox. If you want to delete multiple emails at once on Android, here's how to do it. 

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

The built-in Mail app on your iPhone 13 offers a straightforward way to delete multiple emails at once:

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

When faced with an overwhelming number of emails, try this method:

MUST-TURN-OFF PRIVACY SETTINGS ON YOUR IPHONE IN IOS 18.1

For even more control over bulk deletions, consider using your iPhone's web browser:

This method is particularly effective for quickly clearing out large numbers of emails.

HOW TO USE IPHONE'S MIC MODE FOR CRYSTAL CLEAR, NOISE-FREE CALLS

To ensure that deleted emails are automatically sent to your preferred location, follow these simple steps to configure your iPhone settings. This setting helps you efficiently organize your emails by automatically directing deleted messages to the appropriate folder, saving time and reducing inbox clutter.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Managing a cluttered inbox can feel overwhelming, but with these techniques, you'll be on your way to a more organized inbox. Remember, it's not just about deleting emails. It's about creating habits that prevent inbox overload in the future. Consider setting up filters for recurring emails. By implementing these strategies, Dale and other iPhone users can transform their email management from a tedious chore into a quick and efficient task.

What's the most overwhelming digital clutter challenge you're currently facing, and how is it impacting your daily productivity? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

❌
❌