Reading view

Identify any mystery caller for free with this phone number lookup tool

Got an unknown number that's been driving you nuts? 

We totally get it. 

Those random calls on your cellphone can be seriously frustrating. And now you can fight back with a simple, free solution. In just a few easy clicks, you'll go from feeling annoyed to being in total control, uncovering exactly who's behind that mysterious phone number.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

The TruePeopleSearch.com website works with both landline and cellphone numbers. It allows you to do a reverse phone lookup for any type of phone number, whether it's a cellphone or a landline. It's important to note that the availability and completeness of information can vary depending on the specific number and its associated public records. 

However, in most cases, with just a few simple steps, you'll go from "Who the heck is calling me?" to "Aha! Now I know exactly who this is." Note that you can also search by name, address and email, as well, but for our example, we'll use a phone number. 

AN ALARMING SPIKE IN SCAM CALLS ORIGINATING FROM ROBOCALLS

Grab your preferred device — be it a computer, smartphone or tablet. Any browser will do, so launch Chrome, Safari or whatever you're comfortable with. Type in truepeoplesearch.com in your browser's address bar. The layout might vary slightly depending on your device, but don't worry — the functionality remains the same.

TOP 10 ROBOCALL HOTSPOTS IN AMERICA

Now, type in that perplexing phone number that's been nagging at you. Hit the search button and watch the magic unfold.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Prepare to be amazed by the wealth of information at your fingertips. Click the "View Details" button next to or under the actual search results, depending on your device. You might discover the person's name, age, date of birth, current address or previous addresses, as well as email addresses, relatives, friends, associates and more. It's astounding how much data a simple phone number can unlock.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Now, beware of Sponsored Links that might try to lure you into signing up for other services.

While TruePeopleSearch.com can be a helpful tool, not every phone number search will yield comprehensive results. The information available varies depending on several factors:

Always use this service responsibly, respect individual privacy and understand that results may be incomplete or vary significantly between different phone numbers.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Try searching for your own phone number. You might be surprised at the amount of information that pops up. If you're uncomfortable with the information available about you, consider investing in a personal data removal service to have that information taken down. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

This free tool empowers you to take control of solving the mystery of who is calling you. No more wondering about unknown callers or potential spam. With just a few clicks, you can unmask the mystery and decide whether to answer, ignore or block that call.

How do you usually handle unknown callers? Have you ever used a reverse phone lookup tool before? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels for the latest tech tips and tricks:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to organize, protect and streamline your inbox with an email alias

Almost everything you do online asks for your email. If you have been using the same one for a while, chances are hundreds or even thousands of services have it. They send promotional messages, social media alerts, newsletters and more, turning your inbox into complete chaos. You can tame this madness using an email alias.

An email alias helps declutter your inbox by organizing emails based on their purpose. For example, you can create specific aliases for shopping, newsletters or work and set up filters to sort these messages into separate folders automatically. 

Aliases also help manage spam. If an alias starts receiving too many unwanted messages, you can disable it without affecting your main email.

Let’s dive into how to create an email alias on different platforms, including Gmail, Outlook and iCloud. 

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Gmail doesn’t allow you to create a completely separate alias, but it offers workarounds using "+ addressing" or by adding dots to your existing email address. However, these methods don’t prevent an unscrupulous sender from seeing your primary address, so exercise caution when using them with untrusted correspondents. Follow the steps below to get started.

Use your existing Gmail address and add a "+" followed by any keyword before "@gmail.com."

Example: If your email is yourname@gmail.com, you can use:

No additional setup is needed, just start using this alias when signing up for services or sharing your email.

Gmail ignores dots (.) in email addresses, so you can create variations of your email:

Example: If your email is yourname@gmail.com, you can use:

All variations will deliver emails to your main inbox automatically.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Outlook.com allows you to create additional email addresses (aliases) that are linked to your primary account. Emails sent to an alias will arrive in your primary inbox, and you can send messages using the alias as well.

If your primary email is johnsmith@outlook.com, you can create an alias like john.smith123@outlook.com. Emails sent to john.smith123@outlook.com will still go to johnsmith@outlook.com, but you can choose to send emails using either address.

Steps to create an alias:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once added, you can send emails using your alias by selecting it in the From field when composing a new message.

Important limitations to note:

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Apple allows you to create up to three email aliases through iCloud. These aliases can be used for specific purposes, helping you manage your inbox effectively. Here’s how to create one:

It's important to note that you can still create up to three email aliases through iCloud. Remember that while these aliases provide some flexibility, they do not create separate Apple IDs or completely hide your primary iCloud email address.

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

While many email providers offer basic alias functionality, most have significant limitations. Gmail's "+" addressing and dot tricks, Outlook's linked aliases and Apple's iCloud aliases all provide some flexibility, but they often fall short of true privacy protection.

For those of you seeking comprehensive email privacy and robust alias management, my No. 1 pick for private and secure email platforms contains no ads, no tracking and powerful privacy features like password-protected email and unlimited disposable email addresses. See my review of the best secure and private email services here.

Protecting your inbox from scammers requires a combination of smart practices and proactive tools. Using email aliases is an effective first step. By creating specific aliases for different activities, such as shopping, subscriptions or work, you can track where spam is coming from and deactivate problematic aliases as needed. Below are some other steps to take.

1. Avoid sharing your primary email address publicly on forums, social media or other platforms to minimize exposure. Most email providers offer robust spam filters, so ensure they are enabled and customize them as needed

GET FOX BUSINESS ON THE GO BY CLICKING HERE

2. Invest in personal data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3. Enable two-factor authentication on all your email accounts to add an extra layer of security.

4. Be cautious of suspicious links and attachments. Never click on links or download attachments from unknown senders, as these could be phishing attempts.

5. Use strong antivirus software to protect against potential malware that might come through spam emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Regularly update your email password and make it strong and unique, avoiding common words or easily guessable combinations. Consider using a password manager to generate and store complex passwords.

These steps will provide a more comprehensive approach to protecting your inbox from scammers and reducing unwanted emails.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Taking charge of your inbox doesn’t have to be overwhelming. By implementing the tips and tools mentioned above, you’ll create a more secure, efficient and manageable email experience. Whether you’re battling spam or organizing your digital life, email aliases and secure services are great things to put into place.

Which email platform do you use most often, and how do you organize your messages there? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to share a YouTube video starting at a specific time

Ever watched a YouTube video and thought, "I need to share this exact moment with my friends?" Well, you're in luck. Sharing specific moments from YouTube videos is actually pretty easy. Whether you're on a computer, iPhone or Android device, I'm here to show you how easy it is to do just that.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

YOUTUBE’S 5 MOST OVERLOOKED USEFUL FEATURES

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

YouTube has recently introduced a new, simplified method for sharing video timestamps on Android.

Settings may vary depending on your Android phone’s manufacturer. 

These updated steps make sharing timestamps much simpler, as you no longer need to use Chrome or request the desktop site. For those using older versions of the YouTube app or Android OS or if the update isn't yet available on your device, here are the previous steps:

Settings may vary depending on your Android phone’s manufacturer. 

Both methods allow you to share specific moments in YouTube videos on your Android, but the new process is more streamlined and user-friendly.

TOP ANDROID PHONES OF 2025

Sharing specific parts of a YouTube video has never been easier. Whether you’re on a computer, iPhone or Android device, these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.

Now that you know the steps to share an exact moment, follow our guide and share a specific part of our video with your friends right away. Don't forget to let us know their reactions by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Who's really behind that random strange text from nowhere?

These days, our phones are constantly buzzing with notifications, and it's becoming increasingly difficult to distinguish between legitimate messages and potential scams. Bill from Mesa, Arizona, recently shared an experience that highlights this growing concern:

"Twice in the last week I've received texts supposedly sent elsewhere. The last one asked if I was 'available tomorrow evening.' I did not recognize the number but am active in an old people park so receive many calls and texts from unfamiliar numbers. I texted back that my wife thought we were available. A few minutes later, a text came asking if I was Mrs. Amy. I texted that I wasn't Mrs. Amy and had never been, but it was a problem. 

"A return text came thanking me for being so polite and the texter's appreciation for polite people and if I were ever in LA, I would be welcome to a backyard BBQ. Looking back, there were a couple more texts ending with ‘I like to make friends with polite people.’ The first text which I deleted was in a very similar vein and format. Is this a scam and why, for what?"

Bill's experience is not unique. Many people receive similar messages that seem harmless at first glance but could potentially be part of a more sinister scheme. Let's dive into the world of text message scams and learn how to protect ourselves.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Text message scams, also known as "smishing," a combination of SMS and phishing, have become increasingly sophisticated. Scammers use various tactics to engage potential victims and gain their trust. Here are some common elements:

Unfamiliar numbers: The message comes from a number you don't recognize. For instance, you receive a text from +1-555-123-4567, a number not in your contacts.

Unsolicited contact: The text arrives unexpectedly, often with a friendly or urgent tone. Example: "Hey! Long time no see. How have you been?"

Personal touch: The scammer might use your name or reference a common activity to seem legitimate. Example: "Hi Sarah, it's Mike from the book club. Are you coming to the meeting next week?"

Too good to be true: Offers of prizes, invitations, or other enticing propositions are common. Example: "Congratulations! You've won a $500 gift card. Click here to claim your prize!"

Requests for information: The scammer may ask for personal details, either directly or indirectly. Example: "This is your bank. We need to verify your account. Please reply with your account number and PIN."

Remember, these are all examples of potential scams. Always be cautious when receiving unexpected messages, especially those asking for personal information or containing suspicious links.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

In Bill's case, the scammer employed a "long-play" strategy. By engaging in friendly conversation and offering invitations, the scammer aims to build trust over time. The end goal could be:

Phishing for information: Gradually collecting personal details that can be used for identity theft.

Malware distribution: Eventually sending a link that, when clicked, installs malicious software on your device.

Financial scams: Building trust to eventually request money or financial information.

HOW TO EASILY ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON IPHONE AND ANDROID

To protect yourself from text message scams, follow these steps:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

If you believe you've received a scam text, here are six steps to follow:

1. Don't respond: Avoid engaging with the scammer to prevent further attempts.

2. Block the number: Use your phone's built-in blocking features to prevent further contact.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Report the message: Forward the suspicious text to 7726 (SPAM). Also, report it directly to the FTC at ReportFraud.ftc.gov.

4. Keep your information safe: Never click on links or provide personal information in response to unsolicited texts.

5. Have strong antivirus software: Install and run strong antivirus apps on your phone to scan for malware and ensure your device is secure. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Invest in personal data removal services: Consider using a data removal service to eliminate your personal information from data broker sites. These services can help reduce spam, decrease the risk of identity theft and clean up your online presence by automating the removal of your data from hundreds of data broker sites.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

While it's natural to want to be polite, as Bill was, remember that your safety and personal information are paramount. Trust your instincts, verify unfamiliar contacts and never hesitate to ignore or block suspicious messages. Remember, a true friend won't mind if you take extra steps to verify their identity, and a legitimate organization will have official channels for communication.

How have you or someone you know been affected by text message scams, and what steps did you take to protect yourself? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

5-minute cleanup for your phone and computer

Digital junk piles up faster than clutter in real life. There are files you don’t need, all those random screenshots, apps you downloaded and used once, and blurry photos clogging up your camera roll.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

It all adds up, slowing your devices down and making everything feel messy. The good news? Cleaning it up is easier than you think. Let’s do a quick declutter that will make you say, "Ahhh, that feels better."

Step 1: Update your devices

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA

There are too many dangerous bugs out there to skip security patches.

Start with your phone

Scroll through your app list and delete any you’re not using anymore. If it’s been months, you’re not going to use it. Trust me. And even if you do want it later, great, download it again. 

YOUR SSN IS ON THE DARK WEB — HERE’S WHAT TO DO ABOUT IT

While you’re at it, move the apps you want to spend less time using (Instagram for me) off your phone’s home screen. You can hide the app or just move it to another page or folder.

On iPhone: 

On Android: 

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

On iPhone or iPad, the Photos app makes this a breeze. 

On an Android, open the Files by Google app, select Clean, then:

Onto your computer

Here’s the quick and dirty way. Create a new folder, then drag all the random files, screenshots and whatever else into it. 

Pro tip: Sensitive documents have no place on your desktop. If you do insist on saving private docs locally, at least give a snoop a more challenging time by naming the folder something off-base like "Vacation Photos." Be sure your computer automatically locks when you’re away and requires a password on startup, too.

Quick lock: For Windows, hit the Windows key + L. On a Mac, use Ctrl + Cmd + Q.

They take up a decent amount of space, so regularly clear out anything you’re not using. Beyond that, outdated apps could put you at risk. By keeping old programs on your computer, you’re potentially leaving a door wide open for cybercriminals to slip in.

On a Windows PC:

On a Mac:

Don’t forget the outside

We’re aiming for quick, so let’s tackle those fingerprint-covered screens.

On your phone, remove the case and accessories. You want to reach every nook and cranny. For a computer monitor, dust the back top, sides and any ledges that collect dirt before you start cleaning.

A microfiber cloth works, but I prefer screen-cleaning wipes. They’re just so easy. Skip paper towels. They’re too rough for delicate jobs like this.

I always come back to this 210-pack of screen cleaning wipes. Use them on smartphones, tablets, monitors, TVs, remote controls and even glasses. They’re scratch-free and made with anti-static tissue that cleans without leaving behind streaks or lint.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

How to easily print photos from your phone

Are you an aspiring Android or iPhone photographer? Both Android OS 15 and iOS 18 bring professional photography features to their new smartphones with advancements made in artificial intelligence-assisted photo processing and top-of-the-line digital camera sensors in the top-line smartphones.

Even if you don't enjoy taking photos directly from your smartphone, most cameras now allow you to instantly transfer pictures from a camera to a smartphone via Bluetooth

You can also print high-quality pictures from your phone, and it's surprisingly easy. Here are a few different ways to print a photograph from your smartphone.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Using a Wi-Fi-enabled printer

Many of the most popular printers available today feature Wi-Fi functionality, and if you have a Wi-Fi-enabled printer, you can print photographs directly from your phone. Most modern photo printers are fully wireless, allowing you to easily print photos directly from their Android or iOS smartphones. Check out my top printer picks here. Here's how to print from a wireless printer on both Android and iOS:

For iPhone:

For Android:

Settings may vary depending on your Android phone’s manufacturer.

Portable photo printers are handy for printing on the go. They usually connect via Bluetooth or Wi-Fi and come with apps for easy printing. Portable photo printers are a great idea if you want a compact photograph printer that's great for taking with you on trips. Many portable printers are small enough to fit in a travel bag and are battery-powered, so there's no wired setup necessary. Check on my picks for the best portable printers here.

TOP PRINTERS 2025

Using an online photo printing service

You can also use apps or websites like Shutterfly or Snapfish that offer photo printing services. Upload your photos, choose your print options, and have them delivered to your home or picked up at a local store. Similar services are also available at your local print shops or even at big-box stores such as Staples, which also provide high-quality poster and image printing. Using a print service and shop to process your photographs can be a great idea, as you can rest assured that your photographs are being printed on high-quality prints with great printers.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

4 WAYS TO PRINT OUT, SAVE, AND SEND YOUR IPHONE'S TEXT MESSAGES

Transferring photos to your computer

You can transfer your photos to your computer and print them from there using your home printer. This is a great option if you have an older printer or an older photo printer that doesn't support Wi-Fi. Here's a list of our printer recommendations. I recommend looking at the options for color printers that we've highlighted. We made the list for everyone, so we made sure to include printers that can print beautiful photographs with ease. Here's how to do it from an iPhone to your computer:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW TO PRINT, SAVE, AND SEND ANDROID TEXT MESSAGES

It's exciting to see how both Android and iPhone have stepped up their game in mobile photography. With all the cool AI features and top-notch camera tech, taking amazing photos is a breeze. Plus, printing those memories is super easy now, whether you're using a Wi-Fi printer, a portable one, or an online service.

What challenges have you faced while trying to capture or print your photos, and how did you overcome them? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

This fake app clone will steal everything you type on your Android

Fake apps are a big problem, and their clever social engineering tricks make them hard to catch. 

There are tons of these apps out there mimicking popular apps like PayPal and Spotify. Security researchers have found another fake app pretending to be the premium version of Telegram, a messaging app with over a billion downloads. Hackers are using this app to spread malware called FireScam. It can steal everything you type on your Android phone and other personal info. 

Since it tracks your keyboard, it also gets all your passwords, which could give hackers access to sensitive data.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

As reported by threat management company Cyfirma, FireScam is a type of malware that targets Android devices to steal personal information. It works like spyware, keeping an eye on what you do on your Android phone, such as reading your notifications, messages, clipboard content and more. 

Hackers are spreading FireScam by pretending it’s a premium version of Telegram. They’ve created a fake website on GitHub that looks like RuStore (a real app store in Russia). When people visit this fake site, they’re tricked into downloading an app that looks like "Telegram Premium." However, this app is actually a trap. Once installed, it downloads the FireScam malware onto your device and starts stealing your personal data.

To avoid detection, the app is heavily disguised using a tool called DexGuard. It asks for permissions to access your storage, check installed apps and install more software. When you open the app, it shows a fake login page that looks like Telegram’s. If you enter your details, it steals your credentials.

The stolen data is first stored in a Firebase Realtime Database, but hackers later move it to private servers. The malware also registers each compromised device with a unique ID so hackers can keep track of their victims.

ANDROID BANKING TROJAN EVOLVES TO EVADE DETECTION AND STRIKE GLOBALLY

According to Cyfirma’s analysis, the FireScam malware is highly effective at stealing nearly all types of data from an infected Android device. It categorizes and sends anything you type, drag and drop, copy to the clipboard or even data automatically filled by password managers or exchanged between apps directly to the hackers.

The malware also monitors device state changes, such as when the screen turns on or off, and tracks e-commerce transactions to capture financial details. Plus, it spies on messaging apps to steal conversations and monitors screen activity, uploading key events to its server for further exploitation.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA

1. Download apps only from official stores: Always use trusted app stores like Google Play or the Apple App Store to download apps. These platforms have security measures to detect and remove fake or harmful apps. Avoid downloading apps from random websites, pop-up ads or unofficial third-party stores as these are common sources of fake apps.

2. Verify the app’s developer: Before installing an app, check who created it. Look at the developer's name and ensure it matches the official company behind the app. Fake apps often copy the names of popular apps but use slightly altered spellings or extra characters. For example, a fake might be called "PayPaal" instead of "PayPal."

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Pay attention to reviews and ratings: Reviews and ratings can give you insight into an app's authenticity. If an app has mostly negative reviews, very few downloads or generic comments like "Great app," it could be fake. Genuine apps typically have a large number of detailed reviews over time. Be cautious of apps with five-star ratings but no specific feedback.

4. Be cautious of app permissions: Check the permissions the app requests before installing. A flashlight app, for example, shouldn’t need access to your contacts or messages. If an app is asking for permissions that don’t align with its purpose, it could be a red flag. Always deny permissions that seem excessive or unnecessary.

5. Keep your phone and apps updated: Regular updates for your operating system and apps often include important security fixes that protect your device from malware. Turning on automatic updates can ensure you always have the latest protections.

6. Use strong antivirus software: Install strong antivirus software on your Android. These tools can scan apps for malware, detect suspicious activity and block harmful downloads. Strong antivirus software provides an extra layer of defense, especially when browsing or downloading apps. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The FireScam malware is a powerful tool that can steal everything on your phone, and it’s tough to detect if you're not careful. Such apps can’t be distributed through legitimate app stores like the Play Store or the App Store, so they rely on third-party stores and fake websites to spread. To stay safe, the best approach is to stick to verified app stores and avoid downloading from untrustworthy sources.

When was the last time you read through the permissions an app asked for? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Lost your contacts on your phone? Here's how to get them back

As high-tech and advanced as all our modern mobile devices are, there's no way of getting around basic user errors. Luckily, the makers of your mobile devices kept such errors in mind. That is why we were eager to respond to Lynne's question about how to restore a deleted contact on your mobile device.

"I must have ‘FAT’ fingers, as I accidentally deleted information in my contacts. I had typed in a couple of other contact phone numbers. But guess I accidentally deleted these. I would [like] to get this information back. I am guessing I am asking for a miracle." — Lynne P. of Lakewood Ranch, Florida

There are several options or methods to restore your contact information on an iPhone or Android, so it is easy to find a solution that should work for you.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Luckily, the makers of iPhones and Android phones understood that mistakes happen and contacts can be erased by accident. Below are ways to restore your contacts on an iPhone or Android phone:

There are two resources for iPhone owners in order to restore contacts: via iCloud or iTunes Backup. Before attempting to restore your contacts, back up your iPhone so you have recourse if you lose data.

Restore contacts with iCloud:

WHICH IPHONE 16 IS RIGHT FOR YOU? DISCOVER YOUR PERFECT MATCH

Restore contacts with iTunes:

If you have not enabled iCloud to back up your contacts, you may be able to restore contacts with iTunes.

4 WAYS TO FIND YOUR LOST IPHONE, WITH AND WITHOUT OTHER DEVICES

There are two resources Android users can use to restore contacts: Google Contacts or Device settings. Before attempting to restore your contacts, back up your Android so you have recourse if you lose data.

Restore contacts with Google Contacts:

Settings may vary depending on your Android phone’s manufacturer.

Restore contacts with Device Settings:

 Settings may vary depending on your Android phone’s manufacturer. 

Please note: Only contacts that aren't already on your phone will be restored.

FIRST THINGS TO DO IF YOU GOT A NEW ANDROID

While it is ideal if you never make a mistake while using your mobile devices, accidents do happen and contacts do get deleted accidentally. That’s why the makers of iPhones and Android devices have multiple ways you can restore contacts on your phone. Following these easy steps outlined above gives you the ability to rectify that situation quickly. It is best to make sure that your mobile devices are being backed up either to the cloud or physically to a computer or hard drive backup so that there is a source from which to restore your contacts. Additionally, should anything go awry when you're doing the restoration process, you have the ability to recover lost data. Accidents happen, but practicing safe data hygiene prevents them from becoming a lost cause or needing a miracle.

Have you ever accidentally deleted a contact on your mobile device? How did you recover that contact information? Are your contacts backed up anywhere? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

It is easier than ever to disable Location Sharing on your Android phone

Privacy is a growing concern, especially regarding location tracking. Google has taken steps to enhance your control over location sharing on your Android, making it simpler for you to manage who can see your whereabouts. Let's dive into this new feature that Google is rolling out and how you can utilize it effectively. (iPhone users, follow these tips)

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Google has introduced a new "Google Location Sharing" toggle that is now integrated directly into the Android settings. This update eliminates the need to navigate through Google Maps to manage your Location Sharing preferences. The new feature is part of the latest updates to Google Play Services and is designed to simplify and enhance your control over location sharing.

Before you toggle this off, let’s take a moment to understand why you might want it on and what happens when you turn it off.

Imagine this: You’re meeting a friend in a busy city, and instead of sending a dozen texts back and forth, they can simply see your real-time location on Google Maps. That’s the power of location sharing. It allows you to share your exact position with specific contacts, along with useful details like your device’s battery level or your estimated arrival time if you’re navigating.

But when location sharing is off, your movements stay private. No one can track where you are, and your personal information is better protected from potential misuse. Apps and services lose access to your location data, which not only boosts your privacy but can also save battery life by cutting down on background tracking.

So, before deciding, think about what fits your needs best: staying connected or staying private.

BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2025

The feature is primarily available on Android smartphones, including popular models from brands such as the Google Pixel series (e.g., Pixel 6, Pixel 7), Samsung Galaxy series (e.g., Galaxy S21, Galaxy S23) and other manufacturers that run stock or near-stock Android versions. Certain Android tablets that support the latest versions of the operating system may also have access to this feature. The Location Sharing toggle is part of recent updates to the Android OS, specifically through Google Play Services. You should ensure your devices are running at least Android 12 or later to access this functionality effectively.

BEST VPNs FOR ANDROIDS

Ready to upgrade? Here's how to do it, but first back up your device data (just in case):

Settings may vary depending on your Android phone’s manufacturer.

ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA

Settings may vary depending on your Android phone’s manufacturer. 

This new feature not only simplifies turning off location sharing but also enhances privacy management by providing transparency about who can track you. You can now feel more secure knowing you have control over your shared information, which is particularly beneficial in situations where privacy is paramount.

Location sharing can be very useful for coordinating meetups, ensuring safety during travel or simply letting loved ones know you've arrived safely. Now, we have shown you how to disable location sharing, but here’s how you can share your real-time location with trusted contacts using Google Maps when Use Location is toggled on.

Remember that people you share your location with can always see:

They may also see other info depending on how you're sharing. Learn more about Location Sharing.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Google's new "Google Location Sharing" toggle, now integrated into Android settings, simplifies and enhances your control over location sharing. With this feature, Google is striking a balance between convenience and robust privacy management, making it a welcome improvement for Android users.

Have you ever had a situation where turning your location sharing on or off was crucial? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Receiving unexpected international calls? What you need to know

Receiving unexpected international calls can be a source of anxiety for many individuals. Whether it’s a single ring from an unknown number or multiple missed calls from abroad, the uncertainty can leave you wondering about the implications for your privacy and security.

Kathy S. recently reached out with a concern many of us can relate to: "I have received calls from Beijing and Russia on my cellphone. I did not answer them. Can you tell me why this is happening? Is my phone at risk?"

If you've experienced similar calls, you're not alone. Let's examine this issue and discover what's really going on.

GET SECURITY ALERTS, EXPERT TIPS, SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT

International call scams have become increasingly common in recent years. One particularly prevalent scam is known as "Wangiri," which originates from Japan and means "one-ring-and-cut." These scammers typically let your phone ring once or twice before hanging up, hoping to pique your curiosity and prompt a callback.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

There are several reasons why you might be receiving calls from unfamiliar international numbers.

Wangiri scam: Scammers use automated systems to call thousands of numbers, disconnecting after one ring. If you call back, you may be connected to a premium rate number, incurring significant charges.

Telemarketing and robocalls: Some companies use international numbers to bypass local regulations and reach a wider audience.

Number spoofing: Scammers can make their calls appear to come from different countries, tricking you into answering.

HOW TO STOP ANNOYING ROBOCALLS

While receiving unexpected international calls doesn't necessarily put your phone at immediate risk, there are several potential dangers to be aware of. The primary risk lies in potential financial losses if you engage with these scammers. If you call back, you may be connected to a premium rate service number owned by the fraudster. You could also be charged heavily for these calls, with the scammer aiming to keep you on the line to increase the billed amount.

While less common with Wangiri scams, there's always a risk of personal information theft if you engage with unknown callers. Sharing sensitive data like bank account numbers or Social Security numbers could lead to identity theft.

Answering or returning these calls may signal to scammers that your number is active, potentially leading to more scam calls in the future. Although not typically associated with Wangiri scams, some sophisticated phone scams can potentially install malware on your device if you click on certain links, prompts or follow instructions given by the scammer.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

While these international calls can be concerning, there are several steps you can take to safeguard yourself and your personal information. Here are six effective strategies to help protect against potential scams and unwanted calls.

1) Don't answer or call back: If you receive a call from an unknown international number, resist the urge to answer or return the call.

2) Block suspicious numbers: Use your phone's built-in features to block these numbers and prevent future calls.

3) Report the calls: Inform your phone carrier and the Federal Communications Commission (FCC) about these suspicious calls.

4) Use call-blocking apps: Consider installing call-blocking apps to identify and block spam calls.

5) Be cautious with personal information: Never share sensitive data over the phone, especially with unfamiliar callers.

6) Invest in personal data removal services: Consider using services that remove your personal data from the internet, reducing the chances of scammers obtaining your information. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES

While unexpected international calls can be alarming, understanding the nature of these scams empowers you to protect yourself. By staying informed and following the preventive measures outlined above, you can significantly reduce your risk of falling victim to these schemes. Remember, your best defense is a combination of caution, awareness and proactive steps to safeguard your personal information.

Are phone companies doing enough to help protect consumers from international scam calls? Let us know what you think by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

The biggest Wi-Fi mistake you didn’t know you were making

You’ve got dinner in the oven, you’re looking for extra glasses, and your cousin’s kid screams (again), "What’s the Wi-Fi password?" You’re juggling a hundred things at once, and the last thing you want to do is to spell out your password.

Here’s the good news: You can slap a printout on the fridge, and everyone can scan it with their phones to connect. But first, I’ll show you how to create a separate network so you don’t need to worry about little Billy getting into your personal stuff on your devices and computers.

SCAMMERS ARE TARGETING TEENS WITH THESE NASTY TRICKS

I share smart tech news and tips you can use every single day. Join 600K readers who get The Current.

Be my guest

When guests connect to your main Wi-Fi, they can potentially access devices like smart TVs, printers, and even your laptop or phone if file sharing is enabled. Worse, if their device is compromised, your whole network could be at risk. A guest network keeps everyone happy while keeping your private life private.

Most modern routers let you set up a guest network without having to be a tech guru. Warning: This will take you a few minutes, but it’s totally doable.

RELATED: Is your internet slo-o-o-w? Let’s fix that.

Step 1: Log into your router’s admin console. You’ll need your IP address. You can usually find this on a sticker on the bottom or side of your router. Seeing 192.168.1.1 or 192.168.0.1 is common.

If you don’t see yours …

Step 2: Open your browser, type http:// and paste in your IP address. Hit Enter to open a login page. For the credentials, try the username admin and the word password for the password. If the defaults are different, they’re likely printed on your router. You can also check this site that lists default passwords for almost every router in use.

Step 3: Look for a setting called Guest Network or Guest Wi-Fi. Give it a different name (aka SSID) than your main network, along with a strong, unique password.

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

If you have snoops in the family … When family and friends connect to your Wi-Fi guest network, you can block them from accessing your files or devices on your primary network. Turn off the local access setting.

Sorry, but dedicated snoops won’t stop at one closed door. Here’s a sign someone is poking around.

While you’re at it, a quick security check

Before you finish, take these extra steps to lock things down:

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

Your network is a bigger target than you realize.

Now for the fun part

Create a QR code that automatically connects guests to your new guest network — no hassle, no drama. With the free site QIFI.org, all you need is three pieces of info:

Hit Generate and your QR code is ready. Print some copies of it to hang around the house, or do what I did: Order this custom sign that looks classy. Now, when someone asks for the Wi-Fi password, you can just point.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Is your VPN enough without antivirus protection?

As cyber threats continue to evolve and become more sophisticated, many people like yourself are seeking effective ways to safeguard their online presence. That includes Keith from Lisbon, Iowa, who asked, "If I have a VPN, do I still need an antivirus app?"

The answer is a resounding yes. While a VPN (virtual private network) provides crucial privacy and security benefits, it doesn't protect your device from malware, viruses or other cyber threats. Let's get into why you need both and how they complement each other to provide comprehensive digital security.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

To achieve comprehensive online security, it’s crucial to understand the distinct yet complementary roles that VPNs and antivirus software play in protecting your digital life.

A VPN is your first line of defense for online privacy and security. It works by:

1) Encrypting your internet connection: This makes it extremely difficult for hackers, ISPs or other third parties to intercept and read your data.

2) Masking your IP address: By hiding your real IP address, a VPN allows you to browse the internet anonymously, making it harder for websites and advertisers to track your online activities.

3) Bypassing geo-restrictions: VPNs can help you access content that might be blocked in your region, giving you more freedom online.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

While a VPN protects your online activities, antivirus software focuses on defending your device itself. Here's what antivirus does:

1) Malware detection and removal: Antivirus software scans your device for viruses, trojans, spyware and other malicious software, then removes or quarantines these threats.

2) Real-time protection: Modern antivirus programs continuously monitor your system, preventing malware from infecting your device in the first place.

3) Phishing protection: Many antivirus solutions include features that block malicious websites and warn you about potential phishing attempts.

WINDOWS FLAW LETS HACKERS SNEAK INTO YOUR PC OVER WI-FI

VPNs and antivirus software serve different but complementary purposes in your digital security arsenal.

VPNs secure your internet connection: They focus on protecting your data as it travels across the internet, ensuring your online activities remain private. Using a VPN service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

Antivirus protects your device: It guards against threats that could compromise your device's security, regardless of how they reach your system. Therefore, it's important to have strong antivirus software actively running on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

By using both a VPN and strong antivirus software, you create a robust defense system that protects both your online activities and your device itself.

CYBER SCAMMERS USE AI TO MANIPULATE GOOGLE SEARCH RESULTS

Remember, Keith and the rest of you: Cybersecurity is not about choosing between a VPN and antivirus; it's about leveraging both to create a multi-layered defense against the ever-evolving landscape of online threats. Combining these two powerful tools allows you to enjoy a safer, more secure and more private online experience.

What are your biggest cybersecurity concerns, and what specific help would you like from us to address them? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Android 15's new Private Space feature puts an end to app snooping

Get ready to level up your privacy game with Android 15's latest feature, Private Space. 

This nifty addition is about to change the way you keep your sensitive apps and data under wraps. 

Let's dive into what Private Space is all about and how you can make the most of it. (iPhone users, learn how to hide apps on your device here.)

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Private Space is Android 15's answer to keeping your personal or sensitive apps away from prying eyes. Think of it as a secret vault within your phone where you can stash away apps you'd rather keep private, whether they're work-related, financial, or just your guilty pleasure games.

Unlike hiding apps — typically done by moving them to a folder or using a third-party launcher, which still leaves them accessible from the app drawer — Private Space creates a separate, secure area within your phone that is completely isolated. Only you can access it using a unique passcode or biometric authentication, ensuring your private content remains truly private.

BEST ANTIVIRUS FOR ANDROIDS — CYBERGUY PICKS 2024

You can use Private Space when:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

You can’t use Private Space when:

Note: You can only use Private Space as the main user of the device, not as a guest or secondary user. Consider creating a dedicated Google account for your Private Space. This helps prevent private data like notifications and files from appearing outside Private Space.

Which devices can use Private Space?

Private Space is available on devices running Android 15. As of now, this includes:

ANDROID BANKING TROJAN EVOLVES TO EVADE DETECTION AND STRIKE GLOBALLY

Ready to upgrade? Here's how to get Android 15:

Settings may vary depending on your Android phone’s manufacturer.

Disclaimer: The availability of the Android 15 update may vary by device and region. If the update is not yet available for your Android device, please check with your manufacturer or carrier for more information on the release schedule.

ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA

Now that you've got Android 15, let's set up your Private Space:

Settings may vary depending on your Android phone’s manufacturer.

Now, your Private Space is ready to use.

Here's how to move apps from your home screen into Private Space or install apps directly into Private Space from Google Play.

Settings may vary depending on your Android phone’s manufacturer.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Space is a game-changer for anyone looking to enhance their digital privacy. This feature provides a secure, dedicated area for your sensitive apps and data, ensuring that only you have access. With just a few simple steps, you can create your own digital vault and enjoy peace of mind knowing your private information is well-protected.

What role should the government play in protecting your privacy and data, and how should it react to growing public concerns? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Steps to protect yourself while shopping on your phone this holiday season

The holiday season is the best time of the year. Many of us spend quality time with our families, enjoy delicious food and even go on vacations. For many, it’s also a time to indulge in shopping. And why not? This is when you find the best deals on your favorite products, whether it’s a new electronic gadget or a household essential.

However, the holiday season also comes with an increased risk of mobile fraud while shopping online. Scammers often target online shoppers in more ways than you might imagine. Fortunately, with some awareness and precautions, you can protect yourself. Below, I’ll discuss the rise in mobile shopping scams and how you can stay safe.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

According to Appdome's latest U.S. Consumer Survey, 60.6% of Americans say fraud is their biggest concern. More than 40% of global consumers reported that they or someone close to them had been directly affected by mobile fraud, malware or a cyberattack. With mobile apps now being the main way people interact with brands, skepticism among users is growing. In fact, 24% of consumers believe developers don’t care about app security, a massive jump of 258% since 2021. 

Social engineering has become a major worry, as people are becoming more aware of the many ways mobile fraud can happen. This includes things like location spoofing, scams that manipulate users and account takeovers. Almost half of the survey respondents this year said they or someone they know personally had dealt with fraud, scams or similar issues.

Such scams also affect your online shopping experience. I spoke with Tom Tovar, CEO of Appdome, regarding what consumers need to know when they are shopping on their mobile devices this holiday season. 

"Consumers should be aware of phishing, smishing and vishing scams, which exploit fake emails, deceptive SMS messages and fraudulent phone calls to steal sensitive information. More sophisticated threats include FaceID bypass attacks, such as those carried out by the GoldPickaxe malware, which uses AI-enhanced techniques to bypass biometric authentication," Tovar said.

"Other significant risks include banking trojans, which infiltrate apps to steal login credentials or financial data, and accessibility malware, which exploits device accessibility features to take control of mobile interactions. The rise of these sophisticated threats highlights the need for robust in-app security."

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

Shopping scams are becoming harder to detect, but it’s easy to stay ahead of them. Here are some steps you can take to protect yourself while shopping on your phone.

This might seem obvious, but sticking to trusted apps can help keep you safe while shopping. By trusted apps, I mean platforms like Amazon, eBay and Walmart.

"With the growing sophistication of mobile threats, it’s becoming increasingly challenging for consumers to identify risks independently. Threats like phishing, accessibility malware and banking trojans are designed to mimic legitimate functions, making them nearly impossible to detect at a glance. Instead of relying solely on spotting issues, consumers should look for apps that clearly communicate their commitment to security through visible privacy policies, transparent security practices and updates addressing new threats. Choosing apps from trusted sources and reading user reviews can also provide reassurance," Tovar said.

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

When shopping on your phone, be cautious of phishing, smishing and vishing scams, as they are common tactics used to steal your personal and financial information. Phishing involves fake emails that look like they are from trusted retailers, tricking you into sharing sensitive details like passwords or payment information. Smishing is a similar tactic but delivered through text messages, often containing links to fake websites or malicious downloads. 

Vishing, on the other hand, involves scammers making phone calls pretending to be customer service representatives from well-known brands, attempting to gain access to your private information. Always verify the authenticity of emails, texts or calls before clicking links or sharing details to ensure a safe shopping experience.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

When shopping online on your phone, it's important to be careful about the permissions you give to apps. A lot of apps may ask for access to things like your camera, contacts or location, even if it's not necessary for the shopping experience. Always think twice before granting these permissions.

"These permissions are often abused by malware to collect sensitive data or perform unauthorized actions. Before granting permissions, consider whether they align with the app’s purpose. Developers can mitigate these risks by incorporating protections from Appdome’s anti-fraud offering, which protects against the many abuse methods used by malicious actors to abuse mobile app permissions," Tovar said.

BEWARE OF ENCRYPTED PDFs AS LATEST TRICK TO DELIVER MALWARE TO YOU

Protecting financial information is crucial, especially when shopping online. It's important to use secure websites, indicated by "https" in the URL, and avoid saving payment details in apps or on websites unless they are trustworthy.

While consumers should stay vigilant – by using trusted apps, downloading only from official app stores and monitoring for suspicious activity – there’s only so much they can do, Tovar said.

"The sophistication of modern threats often makes it impossible for users to identify or prevent all risks on their own," he said. "Consumers have a better chance of keeping their personal information secure by choosing brands that prioritize security and back it up with tangible actions, such as automating robust protections and delivering proactive, built-in security measures."

The holiday season is a prime time for shopping and, unfortunately, for scams. As mobile shopping continues to grow, threats like AI-driven scams and advanced malware are expected to increase. However, you can keep yourself safe by staying informed about potential threats, choosing apps with robust security measures and practicing good mobile hygiene. It's also the responsibility of app developers to ensure users don’t fall prey to scammers.

Do you think app developers are doing enough to keep people safe from scams? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

6 sneaky scams that could ruin your holiday season

The holiday season is a time filled with joy, festivities and cherished moments with family and friends. However, amidst the hustle and bustle of shopping, cooking and celebrating, it's easy to overlook a lurking danger: scams. Scammers thrive during this busy time, preying on our excitement and stress to trick us into revealing personal information or losing money. We're going to discuss six sneaky scams that could ruin your holiday spirit and provide you with essential tips on how to protect yourself from these deceptive tactics.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

With the holiday season in full swing, the end-of-year sales have begun, and you probably have already started your holiday shopping and are expecting packages coming via different types of delivery services like FedEx, UPS or USPS. So, if you receive a text that mentions a package delivery, you may be likely to easily fall for a scam. I was expecting a package recently and received this text out of the blue (see image).

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

Even though the text says the sender is not in my contact list and that it may be junk, I almost clicked the link because I was so focused on the fact that there may have been a typo in my delivery address. But once I looked a little closer, there were a few red flags in this text message that tipped me off to it being a scam.

If you are expecting a package, and you're wondering if you've received real information or not about it, the best way to check is to go to the original confirmation you received about shipping. You most likely received an email regarding your package, and if you go to that email to get your order number, you should be able to look up the status of your order directly on any website.

8 PHISHING EMAIL SCAMS TO WATCH OUT FOR THIS HOLIDAY SEASON

Sadly, charity scams aren't new, but they are way more prevalent during the holiday season since scammers are hoping you're feeling more generous during this time of year. Sometimes, scammers may create fake names of organizations to get you to donate money, or they may reach out to you via phone/email/text posing as someone working for a legitimate charity. Social media has also become a popular place for charities to market themselves and reach more eyes in hopes of donations, so scammers may try to pose as fake charities. These schemes will try to appeal to your emotions during this season, so be sure to check where you donate your money so you don't fall for a scam.

Never give your money to anyone immediately who approaches you or reaches out on behalf of any organization without doing your own independent research. Either do a little googling or check with a family member to see if it's real, and if it is, you should be able to donate to an official website or an official address. You can always mention this to anyone who asks you to donate somewhere. Don't fall into the pressure of donating right then and there. Also, always double-check the name of an organization. Sometimes (especially online), scammers will alter the name of a known organization slightly to trick you into donating.

9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU

The Better Business Bureau is warning about a gift exchange scam with a new twist, which has been occurring during recent holiday seasons. It's an online version of the popular "Secret Santa" gift exchange. However, the BBB says these social media-driven gift exchanges are actually pyramid schemes, and you will most likely be disappointed if you participate.

In the past few years, variations of the gift exchange have popped up, with someone asking you to select a random person and send them a gift to pay it forward. Another asks you to exchange bottles of wine with someone else, and while it seems fun and light-hearted, you don't know who is on the receiving end.

It may sound nice to send a holiday gift to a stranger in turn for receiving multiple gifts yourself, but you're never going to receive many (if any) gifts at all. Don't participate in gift exchanges with anyone you don't know, or you won't be able to guarantee you'll actually be gifting someone who isn't a scammer.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Gift card scams are another popular method that has been rising in popularity recently, but it's especially important to watch out for the possibilities, since you may be purchasing gift cards for friends or family for the holidays. Scammers often steal gift cards and use the information before they make it look like they didn't. They have a number of methods for tricking you using gift cards, so if you can send an online one (so that you can ensure you've purchased it on a legitimate, official website), that would be a much safer alternative.

If you're getting anyone a gift card and buying it in person, be sure to check that the package hasn't been tampered with. Double-check that nothing on the packaging looks suspicious since scammers will try to make it seem like the package was sealed, but they will already have used the gift card, so you're essentially buying a useless piece of plastic.

THE BEST WAY TO BUY GIFT CARDS EVER

Scammers are capitalizing on the festive spirit with a deceptive email campaign targeting people at this time of year. This scam involves a deceptive email that appears to be from Home Depot with such wording as "Confirmation needed: please confirm receipt." The email body typically contains enticing text like "Congratulations! The Home Depot - You are our winner!" along with a customer number and a blue circle that says, "Check if you won." Who couldn't use a little extra cheer or perhaps a holiday prize from Home Depot this season?

The problem is this is a scam, and the goal of this scam is to lure you into clicking on an embedded link, which can lead to various malicious outcomes. These include phishing for personal and financial information, installing malware on your device, redirecting to a fake website that resembles Home Depot's or prompting you to pay a "delivery fee" for a non-existent prize.

To protect yourself from this and similar scams, scrutinize the sender's email address for any discrepancies. Hover over links without clicking to reveal their true destination. Be wary of unexpected "winnings" or requests for confirmation. If you receive an email that raises suspicion, contact Home Depot directly through their official website or customer service number to verify its legitimacy. Finally, remember that legitimate companies will not ask you to confirm sensitive information via email or require you to click on links to claim prizes.

One of the most common scams during the holiday season is the fake online shopping site scam. Scammers create websites that look like legitimate online stores but are actually designed to steal your personal and financial information. They may offer products at very low prices or claim to have limited-time deals or exclusive items. They may also send you phishing emails or text messages with links to these fake sites.

By following a few simple precautions, you can significantly reduce your risk of falling prey to online scams and ensure a safer shopping experience.

1) Shop only from trusted and reputable online stores that you know and have used before.

2) Check the website address carefully and look for any red flags.

3) Do some research on the online store before making a purchase. Read customer reviews, look for ratings or search for complaints online.

4) Use a credit card or a secure payment service like PayPal when shopping online. Do not use debit cards, wire transfers or gift cards.

5) Keep track of your online purchases and monitor your bank statements for any unauthorized charges.

6) Use strong antivirus protection software. An effective antivirus software is a must-have. The best way to protect yourself from clicking on any malicious links on fake websites or in phishing emails and text messages is to have antivirus protection installed and actively running on all your devices. It’s the best to help stop and alert you of any malware in your system and ultimately protect you from being hacked. See my expert review of the best antivirus protection for your Windows, Mac, Android and iOS devices.

7) Use a personal data removal service. Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams during the busy holiday season.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

Below are some next steps if you find you or your loved one is a victim of identity theft.

1) If you can regain control of your accounts, change your passwords and inform the account provider

2) Look through bank statements and checking account transactions to see where outlier activity started

3) Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any lossesSee my tips and best picks on how to protect yourself from identity theft.

4) Report any breaches to official government agencies like the Federal Communications Commission.

5) Get the professional advice of a lawyer

6) Alert all three major credit bureaus and possibly place a fraud alert on your credit report.

7) Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.

If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

As we dive into the holiday season, let’s keep our guard up against those sneaky scams that could spoil our celebrations. Remember to stay vigilant while shopping online or responding to unexpected messages. A little caution can go a long way in ensuring that your holidays remain joyful and stress-free. So, enjoy the festivities, cherish the moments with loved ones, and keep these tips in mind to outsmart the scammers.

What are some of your personal experiences with holiday scams, and how did you protect yourself from them? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to factory reset your Android

Want to know how to factory reset your Android phone? Before handing over your old device, it's important to remove all traces of your personal information. This not only protects your privacy but also ensures the new owner receives a device in its original state, free from any of your custom settings or data. I've got you covered with a step-by-step guide to help you through the process, ensuring you don't miss a thing. Let's walk through it together. If you want to factory reset your iPhone, we'll take you through the steps here

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Before we dive in, remember this golden rule: back up your data. A factory reset wipes everything clean, so let's make sure your precious memories and important files are safe and sound.

Settings may vary depending on your Android phone’s manufacturer. 

Pro tip: You should charge your device to at least 70% before starting; you don't want your phone dying mid-reset.

BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2024

All right, let's get down to business. Here's how to factory reset your Android:

 Settings may vary depending on your Android phone’s manufacturer. 

Your phone will restart and begin the reset, which might take a few minutes. Once it's done, you'll see the initial setup screen, just like when your phone was brand new. Also, after a factory reset, you may need to sign in with the Google account previously linked to the device for security purposes.

TOP PHONE CHARGING CABLES THAT WILL SUPERCHARGE YOUR ANDROID DEVICES

OK, let’s say you want to factory reset your Android, but your phone is unresponsive, or you cannot access the settings. You can use "Recovery Mode."

Settings may vary depending on your Android phone’s manufacturer.

There you have it. By following these steps, you can successfully perform a factory reset on any Android device, ensuring a fresh start or preparing it for a new user. Once your device is clean, check out "Best ways to get rid of your old phone or tablet" for various options like trading it in for credit, donating to charity or recycling through certified e-waste programs.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Factory resetting your Android prepares your device for a new user or just starting fresh. Remember, it's a drastic measure that erases everything, so always back up your data first. Whether you're troubleshooting, starting fresh or passing your device on, now you've got the knowledge to do it right.

Have you faced any challenges with data security, and how did you overcome them? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to delete multiple emails at once on Android

Are you drowning in a sea of unread emails? 

Let’s cut through the digital clutter and help you delete multiple emails on your Android device at once. Before we get to the steps, there are some important things to consider. First, always ensure you’re not deleting important emails. Second, you'll need to back up important emails. 

Also, be aware that some email apps require you to delete emails in each folder separately. Finally, remember that some apps have different methods for bulk deletion.

So, we’ll cover the most common techniques. OK, let's get started.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

To back up important emails on an Android device, follow these steps:

Settings may vary depending on your Android phone’s manufacturer 

This will ensure your important emails and other data are safely backed up to your Google account.

BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2024  

Want to clear out those pesky emails all at once? Here's how:

Settings may vary depending on your Android phone’s manufacturer 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Settings may vary depending on your Android phone’s manufacturer 

TOP PHONE-CHARGING CABLES THAT WILL SUPERCHARGE YOUR ANDROID DEVICES  

Do you want to target emails from a specific sender? Here's a smart hack:

Settings may vary depending on your Android phone’s manufacturer

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Settings may vary depending on your Android phone’s manufacturer 

Dealing with an overflowing inbox doesn't have to be daunting. By following these steps, you'll be able to efficiently manage your emails and keep your Android device clutter-free. Remember to always back up important emails before you start deleting them, and stay mindful of the different methods for bulk deletion across various email apps. Clearing out those unread emails can make a world of difference in staying organized and reducing digital stress.

What features do you wish your email app had to make your life easier? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

Your phone got hacked and now someone's got control of it. What to do immediately

Data breaches are becoming alarmingly common, and it’s no longer just massive corporations or government agencies in the crosshairs. Hackers are setting their sights on personal devices like your smartphone. Think about it, your phone holds a staggering amount of your personal information. 

From emails and text messages to banking apps, social media and even your photos, it's a treasure trove for cybercriminals.

The numbers back up the growing threat. The FBI’s Internet Crime Complaint Center received nearly 56,000 reports of personal data breaches last year. California, the most populous state, topped the charts for the most complaints, according to the Identity Theft Resource Center (ITRC). These stats are more than just numbers — they’re a wake-up call.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

It’s a nightmare scenario. Your phone feels off — battery drains faster than usual, strange pop-ups appear, apps you didn’t download show up, or you’re suddenly locked out. Maybe it’s sluggish, overheating or making unexpected calls or texts. Your mind races: "What did they see? What can they do with my information? Can I even fix this?"

Take a deep breath. Yes, it’s unsettling, but you’re not powerless. Knowing what steps to take — and in what order — can make a huge difference in regaining control and stopping the damage. Let’s walk through exactly what to do if your phone gets hacked, so you can protect yourself and bounce back stronger.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS — CYBERGUY PICKS

Even if hackers had only brief access to your device, assume they’ve seen sensitive data. Your first task is to remove any malware or spyware.

1. Use strong antivirus software: The easiest and most effective way to start is by installing and running strong antivirus or antivirus software. Avoid unfamiliar apps, as some pose as antivirus tools but are actually malware in disguise. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

After installation, run a full device scan. This will search for hidden threats like spyware, ransomware, or keyloggers that could compromise your information further. Once the scan identifies malicious files, follow the app’s instructions to quarantine or remove them. Be sure to double-check the app’s log to confirm all suspicious activity has been addressed. Most antivirus tools offer real-time protection to monitor for threats as they occur. Turn this feature on to reduce the risk of reinfection. Antivirus programs are only as effective as their latest updates. Cybercriminals continuously develop new malware, so keeping your antivirus database current ensures it can detect the newest threats.

2. Factory reset if needed: If the antivirus software fails to fully restore your phone’s functionality — such as fixing issues like freezing, slowdowns or unexpected shutdowns — you may need to perform a factory reset on your iPhone or Android. A factory reset wipes all data from your phone, returning it to its original state when it left the manufacturer. Before resetting, create a backup of your important files. However, ensure the backup itself is free of malware. Use antivirus software to scan backups before restoring them. Most phones offer a simple reset option in their settings menu under "System" or "General Management." Consult your device manual or manufacturer’s website for detailed instructions.

3. Seek professional help: If you’re not confident in your ability to remove malware or reset your phone, reach out to a trusted professional. Visit the Apple Store, Microsoft Store or an authorized service provider for your phone brand. Explain your situation and ask for a thorough inspection and cleaning of your device. Many retailers offer comprehensive diagnostic and repair services.

4. Abandon hardware only as a last resort: In rare cases, malware can deeply embed itself into a device, making complete removal nearly impossible. If your phone continues to exhibit signs of infection despite using antivirus tools, factory resets and professional help, you may need to replace it. Ensure you completely wipe the device before disposing of it to prevent any residual data from falling into the wrong hands. When setting up a new device, take extra precautions to secure it, such as enabling two-factor authentication and keeping all software up to date.

 THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

Resist the urge to immediately change passwords on a compromised device. Hackers might still have access and could intercept your new credentials, potentially locking you out again. Instead, follow these steps:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

As we’ve seen, traditional passwords present numerous security challenges — including susceptibility to breaches and phishing attacks — along with the inconvenience of remembering complex combinations. Even with best practices in place, passwords can still be stolen or misused.

This is where passkeys come into play. As data breaches become increasingly common, adopting passkeys can significantly enhance your security. Unlike passwords that require you to remember a string of characters, passkeys utilize biometric authentication or a PIN to streamline the login process while providing protection against unauthorized access.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Enhanced security: Passkeys are resistant to phishing attacks and reduce the risk of credential theft since they cannot be easily guessed or stolen like traditional passwords.

Convenience: With biometric authentication, logging into apps and websites becomes faster and easier — eliminating the need to remember complex passwords.

Cross-device functionality: Passkeys work seamlessly across different devices linked to the same account — providing a unified login experience.

Here's how to set up passkeys on both iPhone and Android devices so that you can secure your personal information.

Setting up a passkey on iPhone 

How to create a Passkey on iPhone

Setting up a passkey on Android

Settings may vary depending on your Android phone’s manufacturer.

How to create a passkey on Android:

Settings may vary depending on your Android phone’s manufacturer.

HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

With your device clean, focus on protecting your financial and personal information.

Credit reports: Contact Equifax, Experian and TransUnion to place a fraud alert and security freeze on your credit reports. Regularly check your credit reports for unauthorized activity. Contacts: Equifax: 1-800-525-6285,Experian: 1-888-397-3742, TransUnion: 1-800-680-7289.

Financial institutions: Update passwords and enable two-factor authentication (2FA) on your bank accounts. This enhances the security of your financial information. Inform your financial institutions about the breach. Some banks allow you to set up verbal passwords for added security.

Driver’s license: Submit a Fraud Review of Driver License/Identification form to your local Department of Motor Vehicles (DMV).

Social Security account: Create a my Social Security account if you don’t already have one. Monitor it for any unusual activity. Regularly review your account statements to ensure no unauthorized changes have been made.

Taxes: Obtain an Identity Protection (IP) PIN from the IRS to prevent fraudulent tax filings. File your taxes early to outpace potential fraudsters. You can get an IP PIN by visiting the IRS official website.

Identity theft protection: Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

Getting your phone hacked is a sobering reminder of how vulnerable we are these days. Yet, the experience doesn’t have to be catastrophic if you act quickly and methodically. Start by addressing the immediate threat of malware, secure your accounts and assets, and implement proactive measures to prevent future breaches. Think of these steps as your digital emergency kit — essential tools to help you regain control when things go wrong. Remember, your digital security is only as strong as the precautions you take today.

Have you ever experienced a phone hack or dealt with a cybersecurity breach? Share your story, your questions or the steps you took by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

❌