Reading view
Reset what you see on social media
You went down a rabbit hole and now gardening (or hot rod or political) posts are all you see online. Algorithms are smart, but they don’t know when you’re ready to get back to your regularly scheduled programming.
It’s time to reset your feed and take control of what you see.
Win an iPhone 16 Pro with Apple Intelligence ($999 value).
No purchase necessary. Enter to win now!
5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER
Start with Facebook
Goodbye, annoying ads. It only takes a minute to kick out the things you no longer want to see.
The fix: Filter your advertising topics by going to Settings & Privacy > Settings > Account Center > Ad Preferences > Customize ads.
Random Facebook requests can end badly. This one lost a widow $40K.
Now, on to YouTube
Say your family is staying with you for the holidays and your niece is watching cartoons on your YouTube account all day long. Now that’s all YouTube recommends. Delete your search history to get things back to normal.
The fix: On the YouTube app, tap You to bring up your History. Tap the cog icon > Settings > Manage All History. At the bottom, you’ll see DELETE with a blue down arrow. Tap from the dropdown menu to delete videos from today, a custom range or all time. Click X to remove items individually, if you prefer.
10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEAR
Going forward, turn off your viewing history any time you don’t want those vids in your algorithm. You can set your video and search histories to autodelete, too. Now your YouTube is back to how you like it, with my video podcast at the very top. You’ll love it!
TikTok tracks your habits
TikTok’s algorithm is built to keep you on the app. Every time you like, follow or comment on something, it tells the algorithm you’re interested in a video, and more videos like it will pop up on your For You page. Disliking a video or writing a nasty comment doesn’t matter, by the way; you still kept watching.
The fix: Reset your feed. Open your Profile in the bottom right corner then press the three lines at the top right > Settings and Privacy > Content Preferences > Refresh Your For You Feed > Continue.
Fine-tune Instagram
Watch Instagram Reels instead? There’s no way to reset them, but you can nudge the algorithm in the right direction.
The fix: Tap the three dots in the upper right corner. From here, you can adjust:
I’M A TECH EXPERT: 10 AI PROMPTS YOU’LL USE ALL THE TIME
Here’s the giveaway that an email from Instagram about your security is fake.
Most apps have this option
On just about every social platform, you can hide or see less of certain things. The more you take this action, the more you steer the algorithm.
The fix: Next to a post, video or anything else, look for the three-dot or three-line menu that opens more options. On YouTube, for example, tap the three dots next to a video and choose Don’t recommend channel or Not interested.
Feeling inspired to clean more of your digital traces? Wipe your browser history while you’re at it. Here’s how.
Final piece of advice
Your social media feed is carefully curated based on who you follow, who follows you and, most importantly, what you do online. Sure, you can reset your algorithm, but don’t be fooled. Every post you linger on, like, comment on or share gets tracked and used to shape what you see next. Even just scrolling tells the platform what grabs your attention.
Before your next deep dive, remember: Big Tech is always watching, and your every move fine-tunes what pops up next.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
Luddite Teens Still Don’t Want Your Likes
The NSA says do these 5 things with your phone right now
Can’t remember the last time you turned your phone off? Is Bluetooth always on? Do you plug into any charger you can find?
Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!
If you answered yes to any of these questions, the NSA says you’re playing a crapshoot with your privacy. The National Security Agency’s purpose is to listen and collect communications from satellites, cellphones and anywhere else, really.
THESE MISTAKES COULD TANK YOUR CREDIT SCORE
Let’s take a deeper look at five smartphone rules they use that you can, too.
1. Restart your phone once a week
It’s dead simple and absolutely worth doing. Turn off your phone, wait 10 seconds, then turn it back on. This works to combat zero-click exploits where a hacker can get in simply by sending you the right code.
Heads up: A restart won’t work for other types of malware. If your phone becomes infected, you’ll need to do a full factory reset.
2. Disable Bluetooth when you don’t need it
Bluetooth works similarly to Wi-Fi and cellular networks but performs simpler tasks at shorter ranges. You don’t need a cellular signal or network connection to use Bluetooth, and it doesn’t use data. And like any other connection, it’s not 100% safe.
Hackers and scammers must be close to you to use Bluetooth to hijack your phone. But in just about any public space, you’re arm’s length from strangers.
The NSA’s advice: Turn off Bluetooth when you’re not using it. It’ll help battery life, too.
Airplane mode also disables Bluetooth and Wi-Fi, among other things, so it works in a pinch — but you won’t receive calls or texts.
THE STEP I TAKE TO CLEAR MY INBOX EVERY JANUARY
3. Skip public USB ports
In spaces like the airport or coffee shop, hackers can use them to install malware or steal your data. Now, actual cases of juice jacking are rare in the U.S. but it’s still a real threat. They happen through USB connections, so if a kiosk has actual power outlets to charge your phone using your own adapter, you’re good to go.
Stay away from USB ports of any size, especially when traveling overseas. USB standards are international, and foreign hackers can target USB ports in hotels or rentals to steal your data, even if you’re not using a kiosk.
More and more public kiosks have wireless charging pads instead of USBs. This method doesn’t exchange data directly with your phone, so it’s virus-free by default.
If you’re desperate for juice, you can use a USB connection safely … with the right cable. Pack a charge-only cable for your trip. They’re cheap and compact, and they don’t allow for data transfers.
4. Don’t use public Wi-Fi
It's a playground for snoopers. Public Wi-Fi is open to everyone, and every device is susceptible, whether it’s your smartphone, laptop or tablet.
Just because a public Wi-Fi network pops up and asks if you want to join doesn’t mean it’s legitimate. If you’re at a coffee shop or hotel, ask an employee for the specific name of their Wi-Fi network. Scammers will sometimes create networks called "Coffee Shop" or "Hotel Guest" to make you believe you’re connecting to the real thing when, actually, you’re not.
Here’s a good rule of thumb: If it requires a username and password to log in, you should only access that site from your own private network. If you do need to access sensitive sites or info on a public network, don’t do it without a VPN enabled.
AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER
5. Cover your mic and camera
The NSA says it’s best to use a protective case that drowns out your microphone and covers your camera when you’re not using it.
In "hot-miking" attacks, hackers activate your microphone without you knowing it so they can listen into your conversations. It happens when your device has been compromised in some way, usually through malware or an app that’s exploiting permissions you granted. Most folks aren’t targets for attacks like this, but I’d rather be safe than sorry.
Start with app permissions to check what access you’ve handed out:
It’s not just hackers to worry about. Most of what you type, say, search and buy is being tracked in one way or another.
The only unhackable layer of security is physically blocking the sound or camera feed. There are expensive cases out there that do the job, or you can buy a mic blocker for around $10.
It slides into your headphone port to stop recording. You’ll need an adapter unless your phone still has an audio jack. For a cheaper DIY option, grab your oldest corded headphones, snip them off and plug that into an adapter.
Pro tip: When your phone’s microphone is on or was recently accessed, you’ll see a small orange dot at the top of the screen. You’ll see a green dot if your camera is in use or was recently recording.
While this is on your mind, go a step further. Here’s a quick 5-minute phone cleanup I like to do a few times a year.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
These mistakes could tank your credit score
Do you know the difference between 550 and 780? Yes, they’re 230 digits apart, but they’re also examples of bad and good credit scores, respectively.
Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!
If you don’t check yours regularly, now’s the time to start. Small mistakes are a lot more common than you think, and they can do some serious damage to your credit score. I’ll let you in on some of the most common credit report mistakes and what you can do to fix them.
5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER
Step 1: Get your free credit report
The three credit reporting agencies (TransUnion, Experian and Equifax) are required by law to provide you with one free credit report a year. Sweet. There are a few ways you can request a copy from each agency.
Online is the fastest route. If you submit a request via phone or mail, expect to wait two weeks after the paperwork is received.
Pro tip: Grab your report from the fourth credit bureau, Innovis, too.
Step 2: Look for the most common mistakes
Typos or wrong info: Anything from your name spelled incorrectly to your address or your birthdate off by one number. Tiny mistakes can mix up your credit with someone else’s.
Accounts you don’t recognize: If you see something you don’t recognize, don’t ignore it! This includes credit cards you never applied for, loans in your name or purchases you didn’t make.
Duplicates: It’s not normal to see a debt twice on a credit report. This includes things like the same collection account, transferred debts showing as separate accounts or paid-off debts still sitting there.
Incorrect account info: Sometimes, payments can mistakenly show up as late, or closed accounts may still show as active. Other times, reports may show the wrong credit limit or mess up your payment history.
AI ISN’T GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIER
Outdated info: Bankruptcies older than 10 years, late payments older than seven years and outdated collections accounts should not be showing on your credit report.
Make sure websites are following your rules: How to check permissions
Step 3: Report anything strange
Don’t panic! Write down and make copies of anything that looks off, then file a dispute with the credit reporting company by mail, phone or online.
If you’re filing online or by mail, explain in writing exactly what’s wrong and why, and include copies of documents with proof. Make sure to include your contact info, credit report confirmation numbers and a copy of your version of your credit report.
And always follow up! Bureaus are required to look into your disputes within 30 days. Track its progress until you have a resolution in writing. If your dispute is valid, the bureau has to fix it and tell the other bureaus as well.
A lot of these issues boil down to good old-fashioned human error. It happens, but don’t let that stop you from taking charge.
Related: How to run a 5-minute privacy check on your phone
While you’re at it, find your job number
Equifax also runs a database of 716 million income and employment records, including, potentially, yours. It’s called The Work Number, and employers use it to make sure you are who you say you are.
Your Employment Data Report (EDR) includes things like where you’ve worked, when you worked there and your exact past salary numbers.
TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE
Trying to get a new job? An employer could use your EDR to find your past salary range and lowball you in negotiations. And, of course, Equifax will sell your EDR to anyone who’s buying, including debt collectors.
Money smarts: It’s not just bogus calls and emails putting your bank info at risk
How to stop it
You can freeze your EDR just like a credit report. You can also see who’s tried to access it within the past two years. You’ll need to make an account with The Work Number to do it.
Once you register, look over your report and make sure it’s accurate. Fill out this data dispute form if you find anything fishy.
Then, head back to the dashboard and click Freeze Your Data. Fill out the Data Freeze Placement Form and submit it. The Work Number will send you a freeze confirmation letter, along with a PIN. Save your PIN in your password manager. You’ll need it if you ever want to unfreeze your report.
You can always log into The Work Number or call them to unfreeze your report.
If you can’t find your employer: They may not be registered with The Work Number. Call the freeze helpline at 1-800-367-2884 to double-check.
Unless you’re actively applying for a loan or government benefits, or unless an employer actively requests your EDR, it’s a no-brainer to freeze it. And if a potential employer insists on checking your EDR to hire you, maybe it’s not the right fit after all.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
How to Download Your Videos From TikTok
Write Down Your Thoughts in a Digital Journal on Your Phone
5-minute cleanup for your phone and computer
Digital junk piles up faster than clutter in real life. There are files you don’t need, all those random screenshots, apps you downloaded and used once, and blurry photos clogging up your camera roll.
Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!
It all adds up, slowing your devices down and making everything feel messy. The good news? Cleaning it up is easier than you think. Let’s do a quick declutter that will make you say, "Ahhh, that feels better."
Step 1: Update your devices
HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA
There are too many dangerous bugs out there to skip security patches.
Start with your phone
Scroll through your app list and delete any you’re not using anymore. If it’s been months, you’re not going to use it. Trust me. And even if you do want it later, great, download it again.
YOUR SSN IS ON THE DARK WEB — HERE’S WHAT TO DO ABOUT IT
While you’re at it, move the apps you want to spend less time using (Instagram for me) off your phone’s home screen. You can hide the app or just move it to another page or folder.
On iPhone:
On Android:
TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE
On iPhone or iPad, the Photos app makes this a breeze.
On an Android, open the Files by Google app, select Clean, then:
Onto your computer
Here’s the quick and dirty way. Create a new folder, then drag all the random files, screenshots and whatever else into it.
Pro tip: Sensitive documents have no place on your desktop. If you do insist on saving private docs locally, at least give a snoop a more challenging time by naming the folder something off-base like "Vacation Photos." Be sure your computer automatically locks when you’re away and requires a password on startup, too.
Quick lock: For Windows, hit the Windows key + L. On a Mac, use Ctrl + Cmd + Q.
They take up a decent amount of space, so regularly clear out anything you’re not using. Beyond that, outdated apps could put you at risk. By keeping old programs on your computer, you’re potentially leaving a door wide open for cybercriminals to slip in.
On a Windows PC:
On a Mac:
Don’t forget the outside
We’re aiming for quick, so let’s tackle those fingerprint-covered screens.
On your phone, remove the case and accessories. You want to reach every nook and cranny. For a computer monitor, dust the back top, sides and any ledges that collect dirt before you start cleaning.
A microfiber cloth works, but I prefer screen-cleaning wipes. They’re just so easy. Skip paper towels. They’re too rough for delicate jobs like this.
I always come back to this 210-pack of screen cleaning wipes. Use them on smartphones, tablets, monitors, TVs, remote controls and even glasses. They’re scratch-free and made with anti-static tissue that cleans without leaving behind streaks or lint.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
AI isn’t going anywhere: Prompts to make life easier
I was having dinner with my husband in Paris. We got the wine menu and all the names, of course, were in French. Barry wanted something equivalent to a Napa cabernet, so I took a picture of the menu and asked ChatGPT. In seconds, it recommended a wine. I double-checked with the waiter, and he gave it a thumbs-up.
Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!
You might think AI is just for businesses, programmers, or the ultra tech-savvy, but it’s not. It’s for anyone willing to give it a try.
AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER
Instead of ignoring this powerful tool, make this the year you embrace AI. It’s easier and more helpful than you think.
Let’s start with the basics
"So, uh, where do I find ChatGPT?" I get that in my email every day. Use it on the web or download it for iPhone or Android.
The free tier works for most people. I pay $20 a month for ChatGPT Plus. It’s worth it to me for access to the better features and faster response times. Start with free. If you find yourself relying on your favorite AI tool regularly, consider upgrading. It is worth considering.
ChatGPT isn’t the only option, but it is my preference (at least for now) and the most popular. You can also try Google Gemini, Perplexity and Claude.
With all these, the workflow is the same. Think of it like Google, but instead of punching in one search term and scrolling through results, you have a "conversation" with the bot to get exactly the output you want.
Like any tool, you need to use AI wisely and triple-check its results. Trust me, you don’t want to end up like those lawyers who used AI to draft court documents, only to have the judge catch the glaring mistakes.
BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?
You’ve heard of prompts, right?
This is what we call the text, question or command you provide an AI system to guide its response or action. It’s your instruction on what you want, so the better your prompt, the more useful and accurate the response will be.
"Priming" is the insider term for telling a chatbot exactly what you want from it. With ChatGPT or any other, the more constraints you give, the better your answer. Examples: "Limit your response to 250 words," "Give me the list in bullet points," "Format the results as a table," "Use this data to create a bar chart."
Remember, AI can’t read your mind. It only knows what you tell it. Use "do" and "don’t" in your prompts to get the results you want. Say you’re cooking for friends, and some have allergies. Say, "Create a recipe for six people. Do include protein, fruits, vegetables and carbs. Don’t include dairy products, shellfish or nuts."
7 prompts to make life easier
Make your goals actionable: "I have a goal for 2025 to [fill in the blank]. Can you help me make it SMART?" (SMART is an acronym for Specific, Measurable, Assignable, Realistic and Time-related.) Maybe you’re not there yet. Try this: "I want to [fill in the blank], but it feels overwhelming, and I don’t know where to start. Can you help me by breaking it down into more manageable tasks?"
"Give me 10 more examples": That’s a prompt I use with ChatGPT all the time to make the chatbot a better brainstorming buddy. Some of its "ideas" are downright bad, but it might spark something creative in your brain, too.
"How can I make this better?" Add in anything you’ve written — a blog post, a travel plan, a resume or even a heartfelt email. This prompt works wonders for polishing your work and pointing out improvements, like a personal editor at your fingertips.
DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT’S TOO LATE
Your very own free assistant: Say you have messy notes from a meeting. By hand, you’d spend 15 minutes turning those into an email fit for your boss or team. Instead, open a chatbot and say, "Turn these notes into a professional, friendly email to my team." Paste your notes at the end and voila. Pro tip: Ask your bot of choice, "Is there anything that needs more details?" to fill in any missing info.
Shortcut your inbox: When you get a really long email, open your AI chatbot of choice, and type in the prompt, "Summarize this email for me. Tell me what I need to do, then write a thoughtful reply. Here is the email." Paste in the email and let AI do its magic.
Wanna get in shape? Ask your AI to create a custom fitness plan. Try this: "Create a 30-day fitness plan for fat loss and muscle gain tailored to a [male/female] beginner at [your age]." Or get specific: "Create a four-week fitness plan to help me run a mile for the first time." Don’t sweat it.
Spouse forgot to load the dishes again? Instead of firing off a rage-filled text, let AI step in. Ask your fave chatbot to reframe your frustration into something a bit more … constructive. I like this prompt: "Make this message sound more friendly."
Don’t forget about privacy
It's easy to think your bot is a trusted ally, especially when it’s pumping out helpful answers all day long. But it’s definitely not. It’s a data-collecting tool like any other.
Be smart about what you say. Never type in passwords, sensitive financial data, or confidential work or business information. My rule of thumb: Don’t tell a chatbot anything you wouldn’t want made public.
With a free ChatGPT or Perplexity account, you can turn off memory features in the app settings that remember everything you type in. For Google Gemini, you need a paid account to do this.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
Easy internet sleuth tricks you’ll wish you knew sooner
The internet is a treasure chest of information … if you know where to look. Whether you’re trying to verify a website, learn more about your neighborhood or dig up what’s floating around online about you, a little tech know-how goes a long way.
Here are some simple, powerful tricks to level up your sleuthing skills.
THE BIGGEST WI-FI MISTAKE YOU DIDN’T KNOW YOU WERE MAKING
Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!
See the details of any website
You’ve come across a website that offers an incredible promise of a free trip to Hawaii. Aloha! All the site needs is your personal info and a credit card. Before you take the plunge, make sure you’re not getting screwed over.
A WHOIS lookup search checks a database that contains information about domain names and their registrants — so you can find out who owns the website and see if they have a real business address and contact information.
How do you get this done?
Next time you think a friend is getting scammed, pull out this awesome tech party trick. You could save them some cash and embarrassment!
RELATED: Your IP address: What it is and why you need to protect yours if you care about privacy
Run a free background check
SCAMMERS ARE TARGETING TEENS WITH THESE NASTY TRICKS
Your online business is everyone’s business, like it or not. How can you check what the internet’s got on you? Here’s a quick and easy way:
Find out who your neighbor is
Go introduce yourself. If that’s not possible, you can find out online in most cases through a county’s assessor site. These government-run sites use data from assessors to estimate the value of real property within a county, city, town or village.
Once you get there, you can see where your person of interest lives, get details on their home or any other properties they own, and much more. You can even view signed documents, like the deed to their home. Yes, really.
The easiest way to find your county assessor’s site is a quick Google search. Just type in the county you’re looking for, along with "assessor." You can also go to Publicrecords.netronline.com. This directory includes official state and county websites you can search for by ZIP code.
Every county assessor’s site works a little differently, but here’s an overview of how to search on the Maricopa County site here in Arizona.
20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIER
Click on the Go to Data Online button next to the County Assessor option, then search by name or address. Click the magnifying glass icon to search and you’ll see the address, owner, parcel number and other information. Then click on the parcel number and to get even more detailed information and access any related documents.
PRIVACY 101:How to get photos of your home off Zillow, Redfin and Realtor.com
A picture is worth a thousand words
Words and profiles are one thing, but what about pictures of you? All these sites are
worth checking to see what pops up.
RELATED: Think of Google Lens as the smarter version of Google Images.
Go down memory lane
Not all online sleuthing is of the sneaky variety. This one is fun to try with all the places you’ve lived or a home you’re considering buying.
Pop into old Street View photos on Google Maps. You’re able to see what a place looked like going back as long as Google has captured photos there. I’ve spotted pictures going back over a decade. Talk about a hit of virtual nostalgia.
Now, share this article and impress your friends with your tech savvy — or save them from falling for a scam. Either way, you’ll look like the smartest person in the room.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
Stuck behind a VPN wall? Let’s find a way around it
A virtual private network (VPN) is a useful tool that allows you to mask your IP and create a secure, encrypted connection between your device and the internet. This means you can browse the web more privately, especially when connected to a public Wi-Fi network. Another use case for VPNs is accessing sites that are blocked in your region. For example, you could be sitting in New York and accessing content on Chinese social media platforms (though I wouldn’t recommend doing that). However, a VPN can sometimes have the opposite effect, blocking you from accessing content that you were otherwise able to view.
I recently received an email from Carol in Douglasville, Georgia, who asked:
"Why am I blocked from seeing a site when I use a VPN? I am being blocked from answering emails I receive from the VA, Social Security and government sites that I need to connect to concerning my benefits."
She says she attempted changing servers and even switched to different cities within the U.S., but she still couldn’t access the sites. Carol, that sounds like a serious issue. Understandably, you would want to use a VPN when visiting websites, and not being able to access them can be quite frustrating. This situation may even force you to disable your VPN, which could put you at risk. Below, I’ll discuss why this happens and how you can work around the issue.
GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE
A virtual private network (VPN) is a secure connection method used to add privacy and security to private and public networks, like the internet and Wi-Fi hotspots. VPNs are often used to protect sensitive data and to ensure that online activities are safe from cyber threats. By encrypting your internet traffic and masking your online identity, a VPN provides anonymity and protects against hackers, snoopers and data breaches. It also allows you to access content that may be restricted based on your geographic location, making it a great tool for boosting your online privacy and freedom. Here are 10 reasons you need a VPN at home.
Website owners can decide who gets to access their sites and who doesn’t. Many sites block IPs from known VPNs or data centers, especially if their content is restricted to certain countries or regions.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Big platforms like Netflix or banking sites often use VPN detection tools to prevent people from accessing their services anonymously. Government websites do this, too, mostly to prevent people from bypassing regional or national restrictions. For instance, in countries with strict content rules, blocking VPNs helps prevent people from accessing content the government doesn't want them to see.
But even setting your VPN to a different location in the same country doesn’t always work. Why? Because some sites are trying to keep cybercriminals out. VPNs can hide your identity and location, which is great for privacy but can also be misused for fraud. Government websites dealing with things like taxes, voting or benefits need to verify who you are and where you’re logging in from to prevent misuse. Allowing VPNs could make it easier for fraudsters to slip through.
Another reason for blocking VPNs is to keep bots at bay. Bots can use VPNs to scrape government websites or overload their systems. Blocking VPN traffic helps protect sensitive information and makes it easier to trace and authenticate real users.
HOW TO USE VPNS WITHOUT COMPROMISING YOUR BANKING APPS
If you're having trouble accessing certain sites with your VPN on, try the steps below. Start from the first step and keep going until the issue is resolved.
Using a reliable VPN service is one of the best ways to work around VPN blocks. Not all VPNs are created equal, and choosing a high-quality provider can make a significant difference. Look for a VPN that offers obfuscated or "stealth" servers, which disguise VPN traffic to appear as regular internet usage, making it harder for detection systems to block you.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
A good VPN should also have a large server network with plenty of options across different locations so you can easily switch if one server is blocked. Some services even offer dedicated IP addresses, which are less likely to be flagged compared to shared ones. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.
HOW TO SECURE YOUR HOTSPOT PRIVACY AND SECURITY WITH A VPN
If one server isn’t working, try connecting to another in the same country or region. VPN providers usually have multiple servers, and switching might help you bypass the block. If this doesn’t work, use obfuscated servers. These servers are designed to hide the fact that you’re using a VPN. They can bypass strict VPN detection systems, especially on government or streaming websites.
To bypass VPN blocks, you can change the connection protocol your device uses. VPN protocols determine how devices link to servers, and some protocols are more adept at evading detection than others.
If you're facing issues accessing specific websites, switching to a different protocol may help. For instance, some protocols offer a good balance of speed and security, while others prioritize faster performance or efficiency, potentially improving your ability to bypass restrictions.
For more detailed information, it's important to research which protocols are best suited for specific use cases, as the effectiveness of different protocols can vary.
WILL A VPN PREVENT APPS FROM TRACKING ME?
If you only need the VPN for certain apps or websites, enable split tunneling in your VPN settings. This lets you access blocked sites using your regular connection while keeping the VPN active for other purposes. For example, you can enable split tunneling to watch a movie on Netflix using your regular internet connection while keeping your banking app secure with the VPN.
Not all VPNs are created equal. Some are better at bypassing blocks than others. If your current VPN isn’t working, consider switching to one that specializes in evading detection.
If all else fails, switch to a mobile data connection or a different network. Sometimes, the issue is with your current ISP (internet service provider) rather than the VPN.
30% OF AMERICANS OVER 65 WANT TO BE REMOVED FROM THE WEB. HERE’S WHY
VPNs are great for getting around restrictions, but some websites have blockers to stop VPN traffic. There are a few ways to get around these blockers, and sometimes, it's just as easy as switching servers. You’ll have the best chance of getting your VPN unblocked if you're using a reliable service. They keep an eye on their servers to make sure everything’s running smoothly and offer extra features like dedicated IP addresses.
Have you ever faced any issues accessing websites while using a VPN? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Scammers are targeting teens with these nasty tricks
A 14-year-old committed suicide after following the advice of an AI chatbot. Another family is suing the same one — Character AI — after it told an autistic 14-year-old to kill his parents. It also exposed an 11-year-old to sexual content.
These stories are heavy reminders that young people are especially vulnerable on the internet, but AI isn’t the only thing targeting them.
HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA
The fine folks at the FBI’s crime division say teens lost 2,500% more money to scams over a recent five-year stretch. Compare that to an 805% increase for seniors, which is still not great, but at least it’s not 2,500%.
So, why teens? Because thieves have more ways than ever to target them. Talk to anyone in your circle born between 1996 and 2010 about this. It’s a big deal.
I share smart tech news and tips you can use every single day. Join 600K readers who get The Current.
The most prevalent scams and tricks
Under the influence: Say a kiddo in your family idolizes an online influencer. That person is so easy to impersonate. All a fraudster has to do is set up a phony account that looks real, run a contest and trick "winners" into handing over their personal details (or more) to claim their (nonexistent) prizes. Done and done.
Pro tip: Stick to "official" influencer accounts with substantial follower counts. A smaller account is almost always a scammer, not some secret one. And never give financial info or money to someone via DM.
‘Hey there, handsome’: This is a classic for a reason. Scammers grab pictures of an attractive teen or 20-something and play digital Casanovas. All too soon, they profess their love — then comes the request for money, gifts or info.
Pro tip: Try a reverse image search to see if those pics pop up elsewhere online. If the person refuses to video call or meet you in person, it’s a bad sign.
RELATED: Deepfakes are so easy to make. Talk to your kids.
‘Send me a photo’: This is the dangerous intersection of smartphones, sexting and scammers. Someone shares sexy pictures and asks for some in return. As soon as the victim sends a pic or video, everything changes.
AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER
The person on the other end is now blackmailing them. Pay up or they’ll share the content with everyone the victim knows. Think about how horrifying that would be at any age, but especially as a teenager. I spoke to a family that lost their son to suicide after this happened to him. Such a heartbreaking story, and they’re not alone; this is way too common.
Pro tip: Talk to your kids about sending pictures to others online. Urge them to never share anything explicit, even with someone they know in person and trust. It’s just not worth it.
‘You won!’ … Not": This one targets younger teens. A thief tricks them into revealing credit card details or downloading malware under the guise of rewards in their favorite game.
Pro tip: This one’s easy. Only ever buy apps or make in-app purchases through an official app store — no trades and nothing "private."
So, what can you do?
The internet is an incredible resource for learning, creativity and fun, but let’s not sugarcoat it: there are dangers out there. Scammers and predators have become experts at manipulation, and kids can easily fall victim. The most important thing you can do as a parent? Foster open, honest communication.
When my son was younger, I shared age-appropriate stories about what he might encounter online. We talked about the risks in a way he could understand. He knew that if anything or anyone made him feel uncomfortable, he should come to me immediately, no questions asked.
DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT’S TOO LATE
That’s the foundation: trust. Kids need to know that they won’t get in trouble for being fooled. Today’s online predators are sneaky, and scammers know exactly how to win a child’s trust. If your child is targeted, it’s never their fault.
Here’s my free tech safety contract you both can sign if you’re not sure where to start the conversation around tech limits.
Action plan for parents
Remember when you had a fake driver’s license or told a little white lie to get what you wanted? Kids have ways around parental controls and are smart enough to spin the birth year wheel when signing up to get around age restrictions.
RELATED: Best apps and gadgets to monitor your kid (from preschool to teens)
Set clear ground rules for screen time and device use, and keep the conversation going as they grow. A few simple steps to take:
The best protection is being your child’s go-to resource for help and guidance. Let your kids know you’re there, ready to listen, no matter what. That’s the real safety net.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
Got new electronics for the holidays? Here's what to do first
Got new electronics for the holidays? Whether you've unwrapped a shiny new smartphone, tablet or laptop, the first steps you take can set the tone for your entire experience.
We'll walk you through essential steps to ensure your devices are secure, functional and ready for your enjoyment.
From setting strong passwords to enabling tracking features, these tips will help you make the most of your new gadgets.
GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE
Change default passwords and PINs immediately. Use a combination of letters, numbers and special characters. Avoid using easily guessable information like birthdays or names. Consider using a password manager to generate and store complex passwords.
Wherever possible, activate 2FA for added security. This provides an extra layer of protection by requiring a second verification step, such as a text message or authentication app.
Privacy screen protectors can prevent others from viewing your screen from the side, enhancing your privacy when using your device in public spaces.
If your device stores important data (e.g., photos, documents), immediately set up a backup system. This can be done through cloud services or external storage devices to ensure your data is safe.
The best way to ensure that your devices are protected and that no one is snooping around on your data or browsing history is by purchasing antivirus software. To protect yourself from having your data breached, have antivirus protection installed on all your new devices. Having good antivirus software actively running on your new devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
Ignoring updates: Don’t skip software updates when setting up your new device. These updates often include critical security patches and new features. Enable automatic updates wherever possible to ensure your device remains up-to-date.
Overloading with apps: It’s tempting to download every app or tool that catches your eye. However, too many apps can slow your device and increase the risk of downloading malicious software. Stick to trusted sources like the Apple App Store or Google Play.
Forgetting about privacy settings: Take time to review and configure privacy settings on your devices. Disable features like location tracking or data tracking if they’re not necessary for your usage.
Neglecting physical protection: A single drop can ruin your brand-new device. In order to protect and enhance them, it's important that you have some quality accessories, like a laptop bag or backpack, messenger bag, laptop sleeve, portable hard drive, headphones, webcam cover, attachable portable display, portable laptop stand, Bluetooth mouse, a good power strip and surge protector for your devices. You’ll also want a good phone charger. Check out our picks for these five best portable phone chargers. The last thing you'll want is a device that dies on you all because you didn't have a decent charging accessory.
5 BEST PORTABLE PHONE CHARGERS FOR ANY OCCASION
The best step to take if you have received a new laptop, tablet or smartphone, whether it's an Apple or Android product, is to turn on any 'Find My' settings in case your device ever gets lost or stolen. Here are the steps you can take for the following options:
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Note: If you don’t see Find My, go to System Services in the list of apps, click Details, then turn on Find My Mac.
Settings may vary depending on your Android phone’s manufacturer.
LOST OR STOLEN PHONE? THERE'S POTENTIAL TROUBLE ASIDE FROM THE COST OF REPLACING A PHONE
Smart TVs are a great device to receive for the holidays. Not only do they give you access to tons of streaming apps, but they also allow you to browse the internet, stream music and videos, and even look at photos. With all these features comes a certain amount of risk regarding targeted ads and malware. While any Smart device can be infected with malware, Smart TVs are usually not the devices that experience this kind of attack. Although it has happened in the past with both Samsung and Apple TVs, those cases are extremely rare. However, before you begin enjoying your favorite movies and TV shows, take these steps to protect your Smart TV:
Disabling ads and tracking on your Smart TV will mostly limit your TV from collecting data on you and the content you're watching. Here's how to disable that feature on Samsung, LG and Vizio TVs:
LG
Some models may have different settings or options, so you should always check the user manual or the official website of LG for the most updated information.
Samsung
Some models may have different settings or options, so you should always check the user manual or the official website of Samsung for the most updated information. For example, some models may have Smart Features instead of Support in the Settings menu.
Vizio
Some models may have different settings or options, so you should always check the user manual or the official website of Vizio for the most updated information.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
Most Smart TVs do not come with built-in microphones and cameras, but there is a way to turn off those features for the brands that do.
Samsung
Some models may have different settings or options, so you should always check the user manual or the official website of Samsung for the most updated information. For example, Some models may have Smart Features instead of Support in the Settings menu. Some models may have Voice Recognition instead of Voice Recognition Services in the Terms & Policies menu.
LG
Other Smart TV brands may come with external cameras. Make sure they are unplugged whenever you are not using them.
TOP 10 SOUNDBARS TO ENHANCE YOUR TV AUDIO EXPERIENCE
If you have old devices that you don’t need, you can sell them or recycle them. Some services will pay you even if your devices are not working. To get the best deal for your devices, you need to choose the right service. Here are some services that you can use:
Amazon Trade-In: If you're a big Amazon shopper, it might be worth it to try trading in your old device with their trade-in company. You can swap your device in exchange for an Amazon gift card, and they accept even non-functional items. This is a convenient way to get rid of your unwanted electronics and get some credit for your future purchases on Amazon. You can also check the trade-in value of your device before sending it in. Before you do get rid of your old device, be sure to follow these steps: How to securely get rid of your old PC or Mac.
More: How to securely get rid of your old cellphone.
As you dive into setting up your new electronics, remember that taking a few moments to secure and personalize them can save you a lot of headaches down the line. By following these initial steps, you're not just protecting your investment; you're also enhancing your overall experience.
Have you encountered any challenges while setting up your new devices? How did you overcome them? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Do you need a VPN at home? Here are 10 reasons you do
Have you ever felt a little uneasy while browsing the internet, wondering who might be watching your online activities?
Well, let me introduce you to a handy tool that can put your mind at ease: the virtual private network, or VPN.
Whether you're working from home, streaming your favorite shows or just exploring the web, a VPN can help ensure that your data stays secure and your privacy intact. So, let’s dive into why having a VPN at home is a smart move.
GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE
A virtual private network, or VPN, encrypts your internet traffic and reroutes it through a server in a different location than your own. VPNs make it appear that you are connecting to the internet from whichever location the server is hosted in rather than your actual location.
When you first connect to a network using a VPN, your device will establish a secure connection with the VPN server, and your device's IP address will appear as the VPN server, meaning that only your internet service provider will see that you're connecting to a VPN server. Normally, when you connect to a website, the website or any online services you visit can see your device's technical information, including location-sensitive data such as IP addresses.
THE BEST VPNS FOR BROWSING THE WEB IN 2024
While your home internet connection is more secure than a public Wi-Fi connection, VPNs still provide a greater sense of privacy and access to content that might be restricted due to location. Here are 10 reasons I have for getting a home VPN.
Online communication can be hit or miss when it comes to security. Some messaging services, such as Whatsapp, use end-to-end device encryption, which helps keep your messages secure, but other messaging services, such as Skype, don't use end-to-end encryption. If you use a VPN with any communication apps, then all your connection and messaging data between your device and the VPN server is fully encrypted.
Online content and services like Netflix are restricted to specific geographic regions. This content can range from news websites to video streaming platforms and social media apps. Using a VPN at home can appear to be using the internet from another location, allowing you to access restricted services.
Sometimes, an internet service provider (ISP) will slow down bandwidth or certain online activities. One of the most common reasons networks do this is to manage network congestion, especially during peak hours. You might notice that your home internet connection slows down at night, when everyone is home from work, or it might slow down when summer vacation starts. Using a VPN will prevent your service provider from identifying the type of web content you are accessing, making it impossible for your ISP to slow down your traffic.
A VPN also keeps your internet activity private from Wi-Fi network admins, who, if technically skilled enough, can figure out which websites you've visited. If you're worried about the Wi-Fi admin of your office, hotel, school or other public place having access to your browsing history, a VPN is the perfect solution for you. When it comes to your own home Wi-Fi network, a VPN will keep your browsing history private from other household members.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Hackers deploy large-scale cyberattacks to observe network activity and steal your information. These attacks are particularly prevalent on public Wi-Fi networks, which often have minimal security measures, but they can also target secured networks. Using a VPN can significantly enhance your security by providing encryption for your internet traffic, making it difficult for hackers to intercept and read your data. This encryption is especially crucial when using public Wi-Fi, as it secures your information from potential eavesdroppers.
Additionally, a VPN masks your real IP address with that of the VPN server, helping to protect your identity online and making it harder for attackers to target you directly. However, it is essential to understand that while a VPN adds a layer of security, it is not a comprehensive solution against all cyber threats.
A VPN does not prevent malware infections or phishing attacks, so you must still employ strong antivirus software and exercise caution when clicking on links or downloading files. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
Furthermore, not all VPNs are created equal; some may have vulnerabilities or questionable privacy practices. It is crucial to choose a reputable provider that uses strong encryption and has a clear no-logging policy.
There's a myriad of reasons, ranging from political to economic, that countries use to justify censoring certain apps and websites. It can be incredibly frustrating for citizens and anyone traveling to that country to lose access to email, social media, news websites and other tools that keep us connected to the world around us. I've used VPNs extensively while traveling to ensure that I can always view my most important websites, no matter where I actually am. As I've mentioned, a VPN can mask your IP address and make it appear as traffic from a different country, allowing you to bypass online geographic restrictions.
One of the best reasons to have a VPN at home is that it can help you save money and find better deals while online shopping. Some online retailers change their prices depending on users' locations. However, when using a VPN while shopping for plane tickets, hotels or gifts, it's possible to find cheaper prices just by changing your location.
It's no longer the work of sci-fi. We do know that governments, nearly all of them, surveil their citizens. A VPN will add a layer of privacy, making it significantly more difficult for governments to detect your web traffic. Even if you feel that you have nothing to hide, online privacy is something you should feel free to exercise.
Much like governments, your ISP can surveil your online activity with ease. While most ISPs claim that they don't sell your browsing data, they are often allowed through contracts with marketing agencies to give your data away for free to advertise to you. The simplest way to hide your online activity from your ISP is to use a VPN. When using a VPN, your ISP won't be able to see which websites you visit or which apps you use.
HOW VPNS SHIELD YOUR IDENTITY AND SECURE YOUR FINANCIAL TRANSACTIONS FROM THEFT
While it may seem counterintuitive, a VPN can offer faster connection speeds for online gaming. It can also help prevent your ISP from throttling bandwidth directly from gaming servers. By changing your VPN's location, you can connect to a server closer to your gaming server, which will give you better latency. This is also called ping, which determines how fast the server responds to your inputs.
CAN YOU BE TRACKED WHEN USING A VPN?
To fully leverage the benefits of your VPN and enhance your online security, consider these important tips that will help protect your personal information and ensure safe browsing.
1. Choose a reliable VPN: Select a reputable VPN service with strong encryption protocols. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.
2. Always use VPN on public Wi-Fi: Never access financial accounts on public networks without activating your VPN first.
3. Enable two-factor authentication (2FA): Add an extra layer of security to your accounts by enabling 2FA.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
4. Use strong, unique passwords: Create complex passwords for each of your accounts and consider using a password manager. Consider using a password manager to generate and store complex passwords.
5. Regularly monitor your accounts: Check your retirement accounts frequently for any suspicious activity.
6. Keep software updated: Ensure your devices and apps are always up-to-date with the latest security patches.
7. Be cautious of phishing scams while using a VPN: Even with a VPN securing your connection, phishing scams remain a significant threat to your online safety. These scams often use deceptive emails or links to steal sensitive information like passwords or credit card numbers. To protect yourself, combine the use of a VPN with strong antivirus software that detects and blocks phishing attempts. Additionally, always scrutinize unsolicited emails, avoid clicking on suspicious links, and never provide personal information without verifying the source. For the best protection, check out my expert reviews of the top 2024 antivirus solutions for your Windows, Mac, Android and iOS devices. Together with a VPN, this approach helps keep your personal information and digital assets safe.
If you want to start taking your online privacy seriously, it's worth getting a VPN. There are a wide range of options available. You can pick up a router with a VPN or install a software VPN on your devices. I prefer to have a VPN on my laptop and smartphone, and I especially find it useful when traveling internationally.
Do you have a reason for using a VPN we didn't feature in the list? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you'd like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
10 things you should never tell an AI chatbot
This is a heartbreaking story out of Florida. Megan Garcia thought her 14-year-old son was spending all his time playing video games. She had no idea he was having abusive, in-depth and sexual conversations with a chatbot powered by the app Character AI.
Sewell Setzer III stopped sleeping and his grades tanked. He ultimately committed suicide. Just seconds before his death, Megan says in a lawsuit, the bot told him, "Please come home to me as soon as possible, my love." The boy asked, "What if I told you I could come home right now?" His Character AI bot answered, "Please do, my sweet king."
DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARE
🎁 I’m giving away a $500 Amazon gift card. Enter here, no purchase necessary.
You have to be smart
AI bots are owned by tech companies known for exploiting our trusting human nature, and they’re designed using algorithms that drive their profits. There are no guardrails or laws governing what they can and cannot do with the information they gather.
When you’re using a chatbot, it’s going to know a lot about you when you fire up the app or site. From your IP address, it gathers information about where you live, plus it tracks things you’ve searched for online and accesses any other permissions you’ve granted when you signed the chatbot’s terms and conditions.
The best way to protect yourself is to be careful about what info you offer up.
Be careful: ChatGPT likes it when you get personal
THIS CRIME SHOT UP 400% — HOW TO PROTECT YOURSELF
10 things not to say to AI
Still relying on Google? Never search for these terms
Reclaim a (tiny) bit of privacy
Most chatbots require you to create an account. If you make one, don’t use login options like "Login with Google" or "Connect with Facebook." Use your email address instead to create a truly unique login.
TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE
FYI, with a free ChatGPT or Perplexity account, you can turn off memory features in the app settings that remember everything you type in. For Google Gemini, you need a paid account to do this.
Best AI tools for search, productivity, fun and work
No matter what, follow this rule
Don’t tell a chatbot anything you wouldn’t want made public. Trust me, I know it’s hard.
Even I find myself talking to ChatGPT like it’s a person. I say things like, "You can do better with that answer" or "Thanks for the help!" It’s easy to think your bot is a trusted ally, but it’s definitely not. It’s a data-collecting tool like any other.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.
Warning: This fake PayPal email scam is everywhere right now
"Reminder: You've still got a money request!" That was the subject line of the messages flooding my husband Barry’s inbox for weeks. The first couple were concerning, then it was just downright annoying.
Enter to win a $500 Amazon gift card. No purchase required.
He’s not the only one getting them; there’s a sneaky scam going around that looks totally legit — because it actually comes from PayPal.
Let’s take a closer look at how it works so you don’t fall for it.
DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARE
Here’s how it goes down
Lucky for us, scammers use the same tricks. This one is getting common enough, it’s easy to spot if you’re careful.
First, you receive an invoice via PayPal. It might say something like, "Payment due for a purchase" or tell you a payment was processed due to a technical error.
It looks real because it was sent through PayPal's platform. They hope you’ll panic and act without thinking. PayPal is a trusted platform, so when you see their logo and familiar format, it’s easy to let your guard down.
Related: Don’t fall for it! Hackers are trying to get you to scam yourself
It’s a bogus invoice, of course
PayPal allows anyone with an account to send an invoice, which scammers exploit to make it seem legit.
In the invoice notice is a phone number you can call for support. It’s listed as PayPal’s number, but it’s someone ready to steal your money and info. All the scam emails I’ve reviewed had different numbers attached.
12 EASY, TECHY WAYS TO MAKE THE HOLIDAY SMOOTHER
Calling the fake support number is the worst thing you can do. The scammer might ask for your login details or payment card information to 'resolve the issue.' In some cases, they’ll install malware on your device, stealing passwords and financial details in the background."
Related:
How to spot and stop it
PayPal will never send invoices for random purchases you didn’t authorize. If something seems off, trust your instincts and double-check before taking action.
I looked this one up for you: PayPal’s real support number is 1-888-221-1161. They take calls from 6 a.m. to 6 p.m. PT every day.
THIS CRIME SHOT UP 400% — HOW TO PROTECT YOURSELF
When in doubt, your best bet is to contact customer service. They’re much more familiar with scam patterns then most regular folks since they see them day in and day out. Plus, they can look into your account to tell you what is a legitimate request and what’s not.
If you’re sure the invoice is fake, delete it. But first …
Report it to PayPal. Consider this your good deed of the day. Reporting scams doesn’t just help you — it helps everyone. When you flag fake invoices to PayPal, their team can track patterns, shut down scammers’ accounts and warn others about similar tactics.
Related: 3 immediate steps to take if you fell for a scam
Lock down your account for extra security
If you don’t have two-factor authentication set up, don’t wait. It only takes a minute. Now you’ll get a code when you log in. Annoying? A little. But it’s worth the extra step on any account tied to your finances.
Scams like this are sneaky, but they’re easy to spot if you know what to look for. Share this with your friends and family so they don’t fall for it.
Get tech-smarter on your schedule
Award-winning host Kim Komando is your secret weapon for navigating tech.
Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.