Reading view

Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong. 

While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device. 

The issue also affects those downloading apps from the Google Play Store.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.

One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.

Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.

The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.

The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.

We reached out to Apple for a comment but did not hear back before our deadline. 

Apple has removed the 11 iOS apps mentioned in Kaspersky's report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple's policies, resulting in the termination of their developer accounts.

Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library. 

The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.

In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A Google spokesperson tells CyberGuy: 

"All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services."

However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Here’s why:

HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android

4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.

5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities. 

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.

Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

$750,000 apocalypse SUV comes with its own gas mask

Rezvani Motors, an innovative American automotive manufacturer, has redefined the luxury SUV market with its extraordinary Vengeance. 

This vehicle represents a groundbreaking fusion of military-inspired design and high-end luxury transportation. 

Designed by digital artist Milen Ivanov, known for his work in video game vehicle design, the Vengeance breaks conventional automotive boundaries with its aggressive styling and comprehensive security features.

GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS, AND THE LATEST DIGITAL TRENDS — STRAIGHT TO YOUR INBOX. SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

The Vengeance represents a unique fusion of a luxury SUV and military-grade transportation. This remarkable machine is built on GM's T1 platform, sharing fundamental architecture with the Cadillac Escalade. It measures an imposing 18 feet long and weighs approximately 6,200 pounds. Potential owners can choose between two powerful engine configurations. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The gasoline variant delivers 420 horsepower from a 6.2L V8 engine. The diesel option provides a robust 277 horsepower through a Duramax 3.0L Turbo-Diesel engine. Standard amenities include a sophisticated 19-speaker audio system. The vehicle offers tri-zone climate control for maximum passenger comfort. NFC phone pairing comes standard in the base model. Magnetic ride control ensures a smooth driving experience across various terrains.

TESLA'S CYBERTRUCK GETS A MILITARY MAKEOVER WITH A TACTICAL TWIST

The Vengeance offers an unprecedented level of personal security through its comprehensive Military Package. Bulletproof glass and B6-rated armor provide significant protection against potential threats. Two military-grade gas masks are included to protect against chemical warfare, tear gas and other potential airborne threats. 

The package also provides two bulletproof vests designed to meet professional security standards. A matching bulletproof helmet accompanies the protective gear, ensuring complete personal safety. Rezvani further enhances the package with a professional-grade first aid kit and a specialized hypothermia prevention kit. Optional features include smoke screens, thermal night-vision and electromagnetic pulse protection. Buyers can even add pepper spray dispensers and electrified door handles.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

360° THROWABLE TACTICAL CAMERAS ARE CHANGING THE GAME FOR THE MILITARY AND LAW ENFORCEMENT

The Vengeance targets ultra-high-net-worth individuals and those requiring exceptional personal security. Diplomats in volatile regions might find particular value in its defensive capabilities. Celebrities seeking maximum protection will appreciate its comprehensive security features.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

EXPLORING HYDROGEN-POWERED VEHICLES FOR THE FUTURE OF TRANSPORTATION

The base model starts at $285,000, with fully equipped versions approaching $750,000. This pricing positions the Vengeance as an exclusive statement of luxury and preparedness. The vehicle represents more than transportation; it's a comprehensive personal security solution.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The Rezvani Vengeance transcends traditional automotive boundaries. It combines luxury, performance and unparalleled security in a single extraordinary package. While most buyers may never utilize its full defensive capabilities, the Vengeance remains an impressive technological vehicle that will definitely have you ready for just about anything.

If money were no object, would you spend $750,000 on a vehicle like this to be prepared for the worst? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Tech security 101: How to spot a hidden tracker on your car

The latest stats say 80% of stalking victims are tracked using tech. One of the most popular ways to do it? GPS trackers, like an AirTag. They’re small enough to slip into a bag, pocket or your car undetected.

"Kim, this doesn’t impact me." I wish that was true. Maybe you have an ex or friend who won’t buzz off, or maybe you met a stranger at a bar or store who was acting creepy. You’re at risk. Did you drive across the U.S. border? Yep, crooks are targeting tourists, too.

Win an iPhone 16 Pro with Apple Intelligence ($999 value). 

No purchase necessary. Enter to win now!

The good news is your phone can alert you when an unknown tracker is with you. If all else fails, good old-fashioned sleuthing works, too. I’ll show you how.

THE BIGGEST WI-FI MISTAKE YOU DIDN’T KNOW YOU WERE MAKING

The clock is ticking

An AirTag starts beeping only after 24 hours away from its owner. That gives the stalker plenty of time to reach you, especially if they’re local. If a carjacker tags your ride, they could learn your routine and follow you home before you even know what’s going on.

The rumor mill says Apple’s AirTags 2, coming later this year, will have antistalking tech. With the most current AirTags, tech-savvy stalkers can rip out the built-in speaker so you won’t get alert, but the new ones should make it harder.

For now, you need to do everything you can to stay safe.

RELATED: AirTags aren’t just for creeps. I always toss one in my luggage.

On your iPhone, make sure a few settings are enabled:

5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

On Android, the process is similar as long as your phone is running Android 6.0 or newer. If it’s not, you really need a new phone!

The alerts aren’t foolproof

It’s not just ripping out the speakers. Older tracking devices might not set off an alert, and savvy creeps can reconfigure new trackers to follow you undetected for months. 

That’s why it’s important to check your car now and then, even if you don’t hear that telltale beep. First, grab a flashlight and a mirror.

If you don’t find anything but still feel uneasy, try a bug detector. This well-rated option ($37) works for cars, homes, bags or whatever.

Small hidden cameras are popular with creeps now, too. Here’s my guide on spotting cameras in a rental, dressing room, private space at the gym or anywhere else you expect privacy.

I’M A TECH EXPERT: 10 AI PROMPTS YOU’LL USE ALL THE TIME

‘I found a tracker. What now?’

Don’t smash it or disable it. You want to give the police all the info they need to catch whoever planted it. 

First, hold your iPhone or NFC device to the white side of the AirTag. Tap that notification that pops up to see info about its owner. Jot down the serial number and phone number so you can share them with the cops.

Now, make an aluminum foil envelope. Wrap the tracker inside, making sure there are no gaps or holes. This will block any signals, so the person who installed it will just think it’s out of range. Take the foil-wrapped tracker to a police station. They’ll know how to pin down who put it there.

Are you being stalked or just paranoid? It’s a fine line. Read this if you can’t shake that "someone’s watching" feeling.

I’ve heard too many stories from stalking victims. I don’t want you or a loved one to be another. Share this with folks in your life.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

How to delete multiple text messages on a Mac and iPad

Are you overwhelmed by the sheer volume of text messages cluttering your Mac or iPad? You're not alone. 

Many users find themselves endlessly scrolling through conversations, searching for important information or simply trying to declutter their digital space. 

Fortunately, Apple has provided ways to manage your messages more efficiently. Let's dive into how you can delete multiple messages on both your Mac and iPad, helping you regain control of your messaging app. Here are steps to bulk delete text messages on an iPhone or an Android.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

If you're using a Mac, follow these steps to delete multiple messages at once:

BEST ANTIVIRUS SOFTWARE FOR YOUR MAC & IPAD

If you're using a Mac, follow these steps to delete multiple messages within a conversation at once:

This method is particularly useful when you need to remove several messages from a lengthy conversation without deleting the entire thread.

HOW TO KNOW WHEN IT'S TIME TO REPLACE YOUR MAC

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

HOW TO FILTER AND SORT EMAILS ON YOUR IPHONE AND IPAD

To prevent future clutter, consider setting up automatic message deletion:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

This setting will automatically remove older messages, keeping your conversations manageable.

Note: Deleting messages from your Mac does not delete them from other Apple devices unless you have Messages in iCloud enabled. To check if Messages in iCloud is enabled on your Mac:

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Managing message clutter can feel like a never-ending battle. While these tips won't magically solve all your digital chaos, they'll definitely help you take back control of your Messages app. A little effort now means less scrolling and more breathing room later. And hey, who doesn't love a clean, organized digital space that doesn't make you want to pull your hair out? Just remember, your messages are meant to connect you, not stress you out.

Tell us the most frustrating digital communication challenge you have and how we might be able to help. Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to not fall in love with AI-powered romance scammers

"Love is blind" takes on a more sinister meaning when so-called artificial intelligence (AI) becomes a tool for exploiting our deepest human emotions. 

Convincing AI technologies are increasingly targeting mature online daters, turning fantasies into lucrative and dangerous criminal enterprises.

Romance scams have become the most common type of fraud in 2025 and have swindled would-be lovers out of over $1.3 billion in the United States alone. Just last year, the world heard the cautionary tale of a 53-year-old French woman who lost $850,000 to a convincing AI deepfake of Brad Pitt.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

The scammers had wooed her for over 8 months with realistic (yet fake) images, voice calls, videos and even multiple social media accounts. Similarly, a 67-year-old from San Diego was tricked out of her life savings when an AI impostor gang posed as Keanu Reeves, also raising awareness about romance scams impacting the elderly. The worst side of both stories is that the fraudsters haven’t been caught, and the victims’ financial institutions did little to help them recover their funds.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

AI-powered romance scams have become far more sophisticated than "traditional" scams. Criminals use a variety of AI tools together with advanced tactics to create deeply personalized and remarkably realistic digital identities. Unlike traditional scams relying on generic scripts, these AI-powered approaches can generate nuanced, contextually appropriate conversations that adapt in real time to victims' emotional state and personal background. In short, romance scams have become so dangerous because they use multiple advanced methods.

AI-driven romance conversations are increasingly challenging for both victims and traditional anti-fraud mechanisms to detect. Spotting and preventing these scams can be tricky, but privacy experts recommend some tried-and-true ways.

BEST VALENTINE’S DAY GIFTS 2025

Spotting and preventing these sophisticated AI-driven scams can be tricky, but staying informed can help you avoid becoming a victim. By being vigilant, verifying identities and recognizing red flags, you can navigate online dating safely while protecting your finances and personal information. Here are some things to look out for:

STOP THESE V-DAY SCAMS BEFORE THEY BREAK YOUR HEART AND YOUR BANK ACCOUNT

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Your personal information is a scammer’s best tool. This includes your phone number, email and other contact details that allow them to reach you, as well as information like the celebrities you follow, your family members and even the type of content you engage with online to tailor the perfect attack. As scams become more sophisticated and reliant on loads of data, it’s more important than ever to take proactive measures to safeguard your personal information.

1. Vigilance in online dating: In the digital world, not everyone is who they claim to be. Be wary of potential romantic interests who ask for money or gifts or those who want to move the relationship along too quickly. Keep your personal and financial information private and never share it with someone you haven't met in person.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

2. Verify the identity: Request additional information or proof to verify their identity, such as video chatting or meeting in person if possible. Exercise caution before getting emotionally invested in someone you haven't met in real life.

3. Research and verify: Conduct an online search using the person's name, email address or phone number to see if any suspicious or fraudulent activities are associated with them. Reverse image search their profile pictures to check if they are stolen from elsewhere on the internet. You can also reverse-search their phone number for free by following the instructions found here.

4. Privacy settings: Keep your social media profiles private so only those you trust can see what’s going on in your life.

5. Limit sharing: Adjust the privacy settings on all of your online accounts and apps to limit data collection and sharing.

6. Use reputable dating platforms: Stick to well-known and reputable dating websites or apps with security measures to help protect their users from scams. These platforms often have guidelines for safe online dating and report suspicious users.

7. Invest in personal information removal services: I highly recommend you remove your personal information that can be found on various people search sites across the web. If you give someone your email address or phone number, they could potentially reverse-search your information and get your home address. Check out my top picks for data removal services here.

AI-powered romance scams have become a serious threat, exploiting our deepest emotions for financial gain. As you navigate the digital dating landscape, it's crucial to stay vigilant and protect yourself from these sophisticated schemes. Remember, if something seems too good to be true, it probably is. Trust your instincts, take things slow and always prioritize your safety and financial well-being.

How has the rise of AI-powered romance scams changed your approach to online dating or your views on digital relationships? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Reset what you see on social media

You went down a rabbit hole and now gardening (or hot rod or political) posts are all you see online. Algorithms are smart, but they don’t know when you’re ready to get back to your regularly scheduled programming. 

It’s time to reset your feed and take control of what you see.

Win an iPhone 16 Pro with Apple Intelligence ($999 value). 

No purchase necessary. Enter to win now!

5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

Start with Facebook

Goodbye, annoying ads. It only takes a minute to kick out the things you no longer want to see.

The fix: Filter your advertising topics by going to Settings & Privacy > Settings > Account Center > Ad Preferences > Customize ads.

Random Facebook requests can end badly. This one lost a widow $40K.

Now, on to YouTube

Say your family is staying with you for the holidays and your niece is watching cartoons on your YouTube account all day long. Now that’s all YouTube recommends. Delete your search history to get things back to normal. 

The fix: On the YouTube app, tap You to bring up your History. Tap the cog icon > Settings > Manage All History. At the bottom, you’ll see DELETE with a blue down arrow. Tap from the dropdown menu to delete videos from today, a custom range or all time. Click X to remove items individually, if you prefer.

10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEAR

Going forward, turn off your viewing history any time you don’t want those vids in your algorithm. You can set your video and search histories to autodelete, too. Now your YouTube is back to how you like it, with my video podcast at the very top. You’ll love it!

TikTok tracks your habits 

TikTok’s algorithm is built to keep you on the app. Every time you like, follow or comment on something, it tells the algorithm you’re interested in a video, and more videos like it will pop up on your For You page. Disliking a video or writing a nasty comment doesn’t matter, by the way; you still kept watching.

The fix: Reset your feed. Open your Profile in the bottom right corner then press the three lines at the top right > Settings and Privacy > Content Preferences > Refresh Your For You Feed > Continue. 

Fine-tune Instagram 

Watch Instagram Reels instead? There’s no way to reset them, but you can nudge the algorithm in the right direction.

The fix: Tap the three dots in the upper right corner. From here, you can adjust:

I’M A TECH EXPERT: 10 AI PROMPTS YOU’LL USE ALL THE TIME

Here’s the giveaway that an email from Instagram about your security is fake.

Most apps have this option

On just about every social platform, you can hide or see less of certain things. The more you take this action, the more you steer the algorithm.

The fix: Next to a post, video or anything else, look for the three-dot or three-line menu that opens more options. On YouTube, for example, tap the three dots next to a video and choose Don’t recommend channel or Not interested.

Feeling inspired to clean more of your digital traces? Wipe your browser history while you’re at it. Here’s how.

Final piece of advice

Your social media feed is carefully curated based on who you follow, who follows you and, most importantly, what you do online. Sure, you can reset your algorithm, but don’t be fooled. Every post you linger on, like, comment on or share gets tracked and used to shape what you see next. Even just scrolling tells the platform what grabs your attention. 

Before your next deep dive, remember: Big Tech is always watching, and your every move fine-tunes what pops up next.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Don't fall for that sneaky iCloud storage alert in your inbox

iCloud scams are becoming increasingly sophisticated, targeting unsuspecting users with urgent messages about their accounts. Our team recently received two suspicious iCloud emails. We want to share our experience and provide comprehensive steps on how to identify and protect yourself from these scams.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

iCloud scams typically follow a pattern designed to create a sense of urgency and fear. Let's break down the two emails our team received below. Here is the urgent wording that the scammers used, "Payment Failure for iCloud Storage Renewal" and "iCloud Suspended. Fix it before Mon, 13 January 2025." Both emails share common characteristics of phishing attempts, including urgent language, threats of account suspension or data loss, requests to update payment information, links to external websites and vague or incorrect account details. These emails are crafted to look legitimate, often mimicking Apple's branding and tone. However, they contain several red flags that indicate they are scams.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

To protect yourself from falling victim to these scams, look out for these telltale signs:

If you receive a suspicious email claiming to be from Apple or iCloud, follow these steps:

THAT APPLE ID DISABLED MESSAGE? IT'S A DANGEROUS SCAM

Follow these steps if you think you may have fallen for an iCloud scam.

1) Change your Apple ID password immediately: Ensure you create a strong, unique password that you haven't used on other accounts.

2) Check for any unauthorized changes to your account settings or payment information: Go to account.apple.com and review any devices, personal information or security settings that look unfamiliar.

3) Contact Apple Support directly through official channels for assistance: Forward the suspicious email to reportphishing@apple.com or abuse@icloud.com to help Apple track and block these scams.

4) Monitor your financial accounts for any suspicious activity: If you provided payment information, cancel and replace your credit card immediately and pay close attention to even small unauthorized charges.

5) Consider placing a fraud alert on your credit reports: Report the scam to the Federal Trade Commission and Internet Crime Complaint Center to help combat these fraudulent activities.

6) Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

FBI’S NEW WARNING ABOUT AI-DRIVEN SCAMS THAT ARE AFTER YOUR CASH

Remember, Apple will never ask you to provide personal information, passwords or security codes via email, text message or phone call. If you're ever in doubt about the legitimacy of a communication from Apple, always err on the side of caution and contact Apple directly through their official website or support channels. By staying vigilant and following these guidelines, you can better protect yourself from iCloud scams and keep your personal information secure. Don't let the urgency of these messages cloud your judgment. Take a moment to verify before you act, and you'll be much safer in the long run.

Have you ever been targeted by an iCloud or Apple-related scam? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

ESA’s space telescope Euclid discovers ‘astonishing' Einstein ring

The European Space Agency (ESA) said Monday that its Euclid space telescope has detected a rare bright halo of light around a nearby galaxy.

Known as an Einstein ring, the halo was captured in photos encircling a galaxy nearly 590 million light-years away, which is considered close by cosmic standards. A single light-year is measured at 5.8 trillion miles.

While astronomers have known about the galaxy where the phenomenon was captured for over a century, they were surprised when Euclid revealed the bright glowing ring, 

Euclid blasted off from Cape Canaveral, Florida on July 1, 2023, to begin a six-year mission to explore the dark universe.

GIANT STELLAR NURSERY REVEALED IN NEW IMAGES FROM ESA'S SPACE TELESCOPE

But before the space telescope could begin its survey of the universe, scientists had to ensure everything onboard was working properly. During the early phase of testing, which took place in September 2023, Euclid sent images back to Earth.

The ESA said the images were deliberately out of focus, but in one of the images, Euclid Archive Scientist Bruno Altieri saw what he believed was a very special phenomenon and decided to look at it a bit closer.

"I look at the data from Euclid as it comes in," Bruno said in a press release from the ESA. "Even from that first observation, I could see it, but after Euclid made more observations of the area, we could see a perfect Einstein ring. For me, with a lifelong interest in gravitational lensing, that was amazing."

For most of the population out there, an Einstein Ring is an "extremely rare phenomenon," the ESA said.

POWERFUL WEBB TELESCOPE SPIES SPECTACULAR STAR BIRTH CLUSTER BEYOND THE MILKY WAY

When a distant galaxy is observed through a telescope, the light from that galaxy may encounter another galaxy on its way to the telescope. When that happens, the foreground galaxy acts like a magnifying glass, and gravity causes the traveling light rays to bend. When light rays bend, scientists call that gravitational lensing, according to the ESA.

When the background galaxy, lensing galaxy and telescope are in perfect alignment, the image appears as a ring, also known as an Einstein Ring.

The galaxy, called NGC 6506, is about 590 million light-years away, and this is the first time the ring of light around its center has ever been detected.

"All strong lenses are special, because they're so rare, and they're incredibly useful scientifically," Conor O’Riordan of the Max Planck Institute for Astrophysics said. "This one is particularly special, because it’s so close to Earth and the alignment makes it very beautiful."

POWERFUL WEBB TELESCOPE CAPTURES PHOTOS OF ONE OF THE EARLIEST SUPERNOVA EVER SEEN

Einstein rings are based on physicist Albert Einstein’s general theory of relativity, which predicts that light will bend around objects in space, so they focus the light like giant lenses, ESA said. The phenomenon allows scientists to sometimes see the light from distant galaxies that would otherwise be hidden.

"I find it very intriguing that this ring was observed within a well-known galaxy, which was first discovered in 1884," Valeria Pettorino, ESA Euclid project scientist, said. "The galaxy has been known to astronomers for a very long time. And yet this ring was never observed before. This demonstrates how powerful Euclid is, finding new things even in places we thought we knew well. This discovery is very encouraging for the future of the Euclid mission and demonstrates its fantastic capabilities."

Over the course of the mission, scientists expect Euclid will reveal more about the role of gravity in the Universe, as well as the nature of dark energy and dark matter.

Euclid will map over a third of the sky and observe billions of galaxies as far as 10 billion light-years away, ESA said. In doing so, scientists expect Euclid to find around 100,000 more strong lenses, though finding one so cosmically close to home and so spectacular, ESA added, "is astonishing."

"Euclid is going to revolutionize the field, with all this data we've never had before," O’Riordan said.

The Associated Press contributed to this report.

Microsoft Teams is becoming a prime target for sophisticated scammers

If there is one corporation that is targeted by scammers more than anyone else, it is Microsoft. From customer support scams to impersonation and phishing attacks, the company’s services are constantly under threat. Recently, even Russia-sponsored hackers managed to breach Microsoft and steal sensitive information.

While Microsoft services as a whole are prime targets, one that stands out is Teams. The collaboration tool is used by more than 300 million people worldwide, making it a goldmine for attackers. Hackers are using it to spread phishingvishing and quishing campaigns, relying on social engineering tactics to trick victims into sharing private and sensitive data.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Cybercriminals are increasingly targeting Microsoft Teams users with sophisticated attack methods. One such technique involves malicious GIF images that exploit worm-like vulnerabilities, allowing attackers to take over accounts and infiltrate chat sessions when the image is opened. 

Hackers also insert malware-laden files into chat threads, tricking users into downloading DLL files that enable system takeover. Phishing campaigns leverage compromised accounts or domains to send deceptive invitations, luring victims into downloading harmful files. 

Some attackers use email bombing and vishing, posing as tech support to overwhelm users with spam emails before tricking them into granting remote access. Compromised email addresses and stolen Microsoft 365 credentials provide another entry point for unauthorized access. 

Plus, external access settings in Microsoft Teams, which often allow outside users to initiate chats or meetings, can be exploited if not properly restricted. Another common tactic is sending phishing links through Teams chats, often disguised as invoices or payment notifications, leading to ransomware infections.

9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU

Scammers have been running fake job schemes for a while, but their tactics keep evolving. Lately, I reported how fake job emails are being used to install crypto mining software that slows down computers. Now, they are using Microsoft Teams chat to trick people. 

It usually starts with an email about a job followed by a suggestion to do the interview over Teams. The first red flag is that the entire interview happens over chat with no video and no call. After that, you are "hired" and asked to submit your details, often through a Google Doc requesting personal info like your social security or tax number. Some victims are even asked to buy equipment for the job, pay a hiring fee or purchase gift cards, which are classic signs that the whole thing is a scam.

SPOTIFY PLAYLISTS ARE BEING HIJACKED TO PROMOTE PIRATED SOFTWARE AND SCAMS

1) Avoid opening suspicious links and attachments: Be cautious of unsolicited links or attachments, especially in chat messages or emails. Cybercriminals often use these to deliver malware or phishing links. Never click on links that seem unusual or come from unknown sources.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2) Check for red flags in job offers: If you receive a job offer that seems too good to be true or involves an interview conducted entirely via chat with no phone call or video meeting, it's likely a scam. Legitimate companies typically conduct interviews using multiple forms of communication. 

A job offer that insists on only text-based conversations is a major red flag. Other warning signs include being asked to provide personal information through Google Docs, being asked to pay for equipment, paying fees to secure the job or purchasing gift cards as part of the hiring process.

3) Use strong, unique passwords: Ensure your Microsoft 365 and other accounts are protected with strong passwords. Consider using two-factor authentication to add an extra layer of protection against unauthorized access. Also, you might want to use a password manager to generate and store complex passwords.

4) Be cautious with personal information: Never share sensitive personal details, like social security numbers or tax information, through unsecured or unsolicited channels, such as Google Docs or messages on Teams. Always verify the legitimacy of such requests.

5) Report suspicious activity: If you notice any suspicious activity on your Microsoft Teams account or receive unusual job offers, report it immediately. Prompt action can prevent a potential breach or further compromise. Notify your IT department or relevant authorities so they can investigate and take appropriate measures.

6) Verify IT support requests: Be cautious of unsolicited messages or calls claiming to be from IT support, especially those asking you to install software or grant remote access. Cybercriminals often impersonate IT staff to deploy ransomware or steal sensitive data. Always verify such requests with your actual IT department before taking any action. If in doubt, contact your IT team directly using official channels, not through the message or call you received.

ENERGY-SAVING SCAM USES ELON MUSK’S NAME – HERE’S THE TRUTH

Scammers and hackers are not slowing down, so staying sharp is the only way to stay ahead. If something feels off, like a job that sounds too good to be true, a random Teams message with a sketchy link or an interview that is just a chat, trust your instincts. You should always be careful with external messages and invites that you to receive on Microsoft Teams. Even if it seems like it is from someone you know, it is best to double-check, especially if it involves a file, a link or an invitation to a chat you were not expecting to receive.

Should Microsoft be doing more to prevent phishing and impersonation scams on Teams? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Let DOGE sink its teeth into our bloated tech infrastructure

The bureaucrats who run government agencies – especially those in charge of tech infrastructure – are up in arms over Elon Musk and his Department of Government Efficiency ("DOGE") colleagues barging in and making sweeping changes. And I couldn’t be happier to see it. 

My experiences as White House chief information officer and working with government as a cybersecurity consultant in the private sector taught me two things: the U.S. government has some of the most talented technologists and cyber warriors on the planet; but even the best operatives are hamstrung by bureaucratic bungling, infighting, waste, outdated infrastructure and other unnecessary complications. 

Musk and DOGE offer the best chance in a generation to untangle the mass of complex cables that are supposed to keep our government, our economy and our people safe. 

I and every other federal department and agency CIO had to fight the same battles against the entrenched bureaucracy that Musk is fighting now. Much has been made, too, of the cadre of young "tech bros" working at DOGE – the U.K.’s Daily Telegraph called them "college-aged, fresh-faced Muskovites." But make no mistake: they would not have gotten within Musk’s orbit were it not for preternatural talent that had also been recognized elsewhere. 

THE REAL REASON BIG TECH IS COZYING UP TO TRUMP 2.0

One of these whiz kids won a $250,000 prize for using AI to reveal hidden contents of ancient Roman papyrus. Another was given $100,000 in seed money by OpenAI to found his own startup. It may be that these fresh minds are just what we need to rebuild our woefully outdated systems.

You don’t need to be a technology or cybersecurity expert to understand that the status quo is inefficient at best and dangerous at worst. Last December, the U.S. was hit with two of the worst cyberattacks in our history, courtesy of the Chinese government’s elite corps of hackers. 

In one assault, they breached multiple U.S. telecom companies, and even gained access to networks used for vital law enforcement and intelligence gathering. In the aftermath, there was confusion as to whose job it was to secure the important telecom networks: a government agency like the Cybersecurity and Infrastructure Security Agency (CISA) or the telecom companies themselves? What about data collected by law enforcement agencies but stored in the private companies’ systems? 

TRUMP DERANGEMENT SYNDROME WAS REAL. SO IS 'LONG TDS'

Another Chinese attack targeted the Treasury Department, where hackers accessed documents and workstations by compromising a third-party vendor’s security key. Once again, sorting out the responsibility for security between Treasury, Homeland Security and the White House became overly complicated, not to mention the obvious failure to properly vet the third-party vendor’s security protocols. 

A few years ago, a major ransomware attack shut down a national fuel pipeline, leading to shortages and exposing serious security flaws in our critical infrastructure. 

In all of these cases, confusing, fragmented oversight made recovery (and the process of learning lessons) slow and inefficient. They showed that these inefficiencies, plus outdated security models and unclear paths of oversight, threatened our national security, economic stability and public safety. 

PRESIDENT TRUMP HAS MADE AN APPOINTMENT THAT HAS BIG TECH PANICKED

All of this remains true today. Our government’s inefficiencies have led to complexity – in systems, processes and oversight – creating blind spots that leave us vulnerable to cyber incidents.

DOGE has the chance to cut through the complexity, drive accountability and ensure cybersecurity measures actually work – before the next major breach. The government technology apparatus should welcome their fine-toothed forensic review (and probably would, if the territorial mindset wasn’t so fully ingrained). 

By identifying inefficiencies in operational procedures, Musk and his team can find ways to streamline government functions, reduce waste and improve services. 

LOOK TO OUTER SPACE FOR TRUMP'S GREENLAND PLAYBOOK AMBITIONS AMID RUSSIA, CHINA ARCTIC ADVANCES

They can save taxpayer money by, for instance, implementing zero-based budgeting, where every dollar spent must constantly justify its existence. That would force agencies to rethink spending, ensuring resources fuel efficiency, not bureaucracy. 

They would also have to prioritize the most worthy investments, such as upgrading outdated systems to generate better service for citizens, faster processing times and more robust data management. Encouraging the adoption of new technologies and methodologies could set a precedent for more agile and responsive government operations.

CLICK HERE FOR MORE FOX NEWS OPINION

I know this reorganization is creating a lot of uncertainty for our nation’s hardworking technology teams, and that’s incredibly tough. My thoughts and prayers are with you. Our technology is broken; as painful as this is, it must be done. Trust that your talent, resilience and work ethic will open doors. 

DOGE’s deep dive into people, processes and technology can reduce complexity, increase transparency and shrink our attack surface, making catastrophic cyber incidents far less likely.

Top translation apps for travelers

Traveling abroad can be an incredible adventure, but the language barrier can make even the most intrepid explorer nervous. The fear of being unable to communicate or understand signs and menus keeps many would-be travelers from ever leaving their home country. But fear not. With the rise of powerful translation apps, you can harness the latest technology right on your smartphone to bridge the language gap wherever your journey takes you.

I've tested out the top contenders to bring you my picks for the best translation apps for global travelers. Whether you have an iPhone or an Android, these apps have got you covered with features like live speech translation, text input and even AI-powered sign and menu translation.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Google Translate is the best translation app for most people. It supports the most languages, with 133 languages supported. It also features an incredibly user-friendly interface and design, and best of all, it's completely free. There are multiple ways to translate languages with Google Translate, be it by typing text into the translation box or utilizing text-to-speech translation, and you can even take advantage of Google's AI translator, which can translate text from photos that you take.

If you are using an iOS device, you can download Google Translate here. If you are using an Android-based device, you can download Google Translate from the Google Play Store here. Additionally, you can access Google Translate in your web browser from any device by going to translate.Google.com.

THE BEST TRAVEL GEAR FOR 2025

If you're an iOS devotee, you may have already encountered Apple Translate, which comes pre-installed on all iOS devices. This powerful translation app is one of the best available exclusively to iOS users, capable of translating written text and images of text and facilitating direct speech translation to help you converse with speakers of other languages. Apple Translate currently supports 19 languages, including popular options like Spanish, French, German, Chinese and Arabic, making it a valuable tool for planning international vacations or communicating while traveling.

Additionally, the Translate app is available on the Apple Watch, allowing you to access your favorite translations on the go. With its seamless integration across Apple devices, you can easily switch between your iPhone and Apple Watch for quick and convenient translations. Whether you're navigating a foreign city or engaging in conversation with locals, Apple Translate is designed to enhance your travel experience.

HOW TO STAY CONNECTED NO MATTER WHERE YOU TRAVEL IN THE WORLD

Microsoft Translator is a totally free-to-use translation app that is popular with business professionals. Featuring over translation for more than 120 languages, this is one of the most robust free-to-use translation apps. You can translate via text, spoken word or images with Microsoft Translate, and where the app really stands out is its ability to be used with multiple devices. You can create translation groups with Microsoft Translator and everyone can talk and translate together. The Microsoft Translator is available for both iOS and Android devices.

HOW TO SET UP FREE MESSAGING ON YOUR PHONE WHILE TRAVELING INTERNATIONALLY

With over 500,000 reviews on the Apple App Store, iTranslate is one of the most popular translation apps for travelers. It offers translation options for more than 100 languages, and its premium features make it well worth the cost of the app. You can use iTranslate for free, but you will be limited to just text translations. With the paid option, you can access both voice translations and text-via-camera translations. For those willing to pay $6 per month, users can save their translations and dictionaries offline, so you can use them from anywhere, even without service. iTranslate is available for both the iOS platform and the Android platform.

BEST GEAR FOR THE DARK OUTDOORS

There are a lot of different translation apps out there on the market aimed at travelers, and we highlighted our favorites today. While the majority of the apps in this list are free-to-use, and all the apps in this list have a free-to-use mode, you will need to pay for additional features from apps such as iTranslate.

What challenges have you faced while communicating in a foreign language during your travels? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Is your camera ticket a fake? Here’s how to tell

Suddenly, a red light camera ticket arrives in your mailbox bearing your name but you weren't even driving that day. This frustrating scenario is catching many drivers off guard. So, what's the deal here? Let's break down these tricky fake tickets and how to fight back when you're wrongly in the crosshairs.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

First things first, not all "tickets" are created equal. If you receive something that looks like a ticket but doesn't have the court's full address or phone number – or worse, it says "Do not contact the court" – you might be dealing with what's cheekily called a "snitch ticket." These aren't real tickets at all but rather attempts to get you to rat out whoever was actually driving. The dead giveaway is usually that they will say something like, "Courtesy Notice: This is not a ticket."

BEWARE OF FAKE PARKING TICKETS ON YOUR WINDSHIELD WITH FAKE FINES

Because cities often have to pay camera vendors for every ticket issued, whether or not they ever collect a dime. So, when the footage is too blurry to ID the driver, they toss out these "Whoops, was this you?" tickets, hoping you’ll do their homework for them. It’s basically a shady game of "Guess Who?" except you never agreed to play, the rules are rigged and the only prize is an unwanted fine.

THESE 5 FUZZ BUSTER APPS CAN HELP GET YOU OUT OF A SPEEDING TICKET

If you've received a "snitch ticket" (a fake ticket designed to get you to identify the driver), here's what you can do.

Ignore it: Since it's not a real ticket, you're not legally obligated to respond. Many people simply disregard these notices.

Don't identify the driver: Remember, you're under no legal obligation to name who was driving your car.

Check for red flags: Confirm it's a fake by looking for missing court information or the phrase "Do not contact the court regarding this notice."

Stay informed: Keep the notice for your records, but don't let it stress you out. It's not a legal document.

Remember, these fake tickets are just fishing expeditions. You're well within your rights to toss them in the recycling bin and go about your day.

BEWARE OF THE NEW SNEAKY PARKING QR CODE SCAM

If you receive a genuine ticket (one with all the court info) but you weren't the driver, you've got options.

1) Contact the police (optional): You can try calling the number on the ticket and explaining the situation. But beware, they might pressure you to identify the actual driver.

2) Stand your ground: Remember, you're not legally required to identify the driver. It's not your job to play detective for them.

3) Go to court: If push comes to shove, you can always contest the ticket in court. Just be prepared for some potential pushback.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Dealing with red light camera tickets can feel like navigating a legal minefield. The key is to know your rights, stand firm and don't let anyone pressure you into admitting guilt or identifying others if you're not comfortable doing so. Remember, the burden of proof is on them, not you. Stay informed, stay calm, and if all else fails, seek legal advice. After all, justice shouldn't be a game of "gotcha."

Has a "snitch ticket" ever landed in your mailbox? Tell us how you handled it by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

'Free speech and transparency': White House launches Rumble account as social media presence grows

FIRST ON FOX: The White House is launching a Rumble account as its presence on social media grows larger, Fox News Digital exclusively learned. 

A White House official told Fox Digital that it will launch a Rumble account on Monday morning similar to its YouTube account as part of President Donald Trump’s plan "to reach the American people where they are and provide unparalleled transparency and accountability in government." 

Rumble is a video platform founded in 2013 as an alternative to YouTube, which has a long track record of accusations surrounding censoring and limiting conservative content.

"We thank President Trump and his entire team for their commitment to free speech and transparency, and we are extremely proud that Rumble is now a small part of White House outreach to the people of America and the world. At Rumble, we fight every day for the innate human right of self-expression, and we connect people directly to the marketplace of ideas to avoid the screeners and censors of Big Tech, the corporate media and governments around the globe," Rumble CEO Chris Pavlovski told Fox News Digital. 

TRUMP WHITE HOUSE ROLLS OUT SOCIAL MEDIA ACCOUNT TO HOLD 'FAKE NEWS ACCOUNTABLE'

Rumble is a publicly traded company that most recently reported hosting 67 million monthly users in the third quarter of 2024, which is roughly a 26% increase from 53 million users in its previous quarter. On election night alone, the platform saw a peak of 1.8 million concurrent viewers, Fox Digital learned. 

The Rumble initiative comes as the White House’s social media engagement has increased under the Trump administration compared to President Biden’s tenure. 

TRUMP ADMIN TOUTS PURGING 'WORST' ILLEGAL IMMIGRANT CRIMINALS FROM US STREETS: 'WORKING TIRELESSLY'

The Trump administration’s White House accounts on X and Instagram racked up 4,685,265 total engagements in the first two weeks, compared to the Biden administration’s 4,134,845 during its first two weeks, according to data provided to Fox Digital. The figures reflect a 13% increase in social media engagement in Trump’s first two weeks or a difference of 550,420 engagements.

A White House official noted that when the Biden administration began in 2021, the White House account on X, which was at the time known as Twitter, began with a running start of 1.6 million followers. Under new X rules, however, the second Trump administration’s X account began with zero followers.

"Despite this 1.6M follower advantage, our engagement still surpassed theirs," the White House said of the difference.

TOP 5 MOMENTS FROM TRUMP'S 'HANNITY' INTERVIEW

Long before Trump jumped into politics ahead of the 2016 election, the real estate tycoon’s love of social media, specifically Twitter, had long been on display. Trump would frequently weigh in on pop culture, politics, the media and even Diet Coke on the social media platform ahead of taking office for his first administration. He remarked after his 2016 win that Twitter was crucial to speaking directly to voters.

"Twitter is a wonderful thing for me, because I get the word out. … I might not be here talking to you right now as president if I didn't have an honest way of getting the word out," he said in 2017.

TRUMP'S ‘SHOCK AND AWE’: FORGET FIRST 100 DAYS, NEW PRESIDENT SHOWS OFF FRENETIC PACE IN FIRST 100 HOURS

In his second administration, the White House has further leaned into social media to reach voters, including launching a new social media account in January aimed to hold "fake news accountable."  

"Welcome to the official Rapid Response account of the Trump 47 White House. We will be supporting President Donald J. Trump's America First agenda and holding the Fake News accountable for their lies. Let's Make America Great Again!" the X account, Rapid Response 47, posted in its first message on Jan. 27. 

The account has since posted dozens of interview clips highlighting what the White House describes as false rhetoric about the administration from Democrat lawmakers, "misleading" articles promoted by mainstream outlets, and touting work the administration has accomplished.

Top 20 apps tracking you every day

If something is free, you’re the product being sold. This is especially true for most online services we use. For example, Google’s primary source of revenue is ads. They make money by collecting data about you and me and selling targeted advertising to companies, which then show us products relevant to our interests.

You might have noticed that the moment you search for a product on Google, you start seeing ads for it on Facebook. The same applies to apps like Instagram, Threads and LinkedIn. In fact, research shows that the apps collecting the most data about you are also among the most widely used. 

Let’s look at the top 20 of them and explore how you can take control of your personal information.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Apps collect all sorts of data about you, but let’s get one thing straight. Not all data collection is bad. Some apps genuinely need access to certain information to function properly. For example, Uber stores your location data to help you find a ride faster, while WhatsApp requires access to your contacts so you can send messages.

The real issue is data collection that serves no purpose other than showing you ads or selling your information to third parties. According to Marin Marinčić, head of IT Infrastructure at Nsoft, the top 20 most invasive apps collect data that is not necessary for their core functions.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Leading the list is Meta with all four of its major apps. Facebook, Messenger, Instagram and Threads share 68% of collected data with third parties while also using it for targeted ads. LinkedIn follows, sharing around 37% of user data, with Amazon in third place, followed by YouTube.

What makes this concerning is how deeply embedded these apps are in our daily lives, making it nearly impossible to find alternatives or avoid data collection altogether.

The list also includes Elon Musk’s X at No. 5, followed by Uber Eats, PayPal, Uber, Google and Amazon Prime Video. TikTok, despite ongoing scrutiny over its data policies, ranks 14th. While many of these names were expected, one surprising entry is the mobile game Candy Crush, which uses 28% of collected data for ads. You can find the full list in the image below.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

Avoiding data collection is nearly impossible if you use the apps above. The only way to dodge these invasive apps is to switch to apps that respect your privacy. While it may seem impossible to replace some of the biggest platforms, there are alternatives that collect little to no unnecessary data.

Switching to these alternatives may require some effort, but it is the best way to limit how much of your personal data is being collected. Taking control of your privacy starts with making conscious choices about the apps you use.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES

If you’re not able to delete the apps listed above, follow the simple steps below to minimize how much information is being collected and shared.

1. Review app permissions: Most apps request access to data they do not actually need. Go to your phone settings and check app permissions on your iPhone and Android. Disable access to location, microphone, contacts and other sensitive data unless absolutely necessary.

2. Turn off ad personalization: Many companies track your online activity to show targeted ads. You can limit this by disabling ad personalization in GoogleFacebook, and other accounts. This reduces the amount of data collected about your interests and behavior.

3. Limit social media tracking: Social media platforms track your activity even when you are not using them. Adjust privacy settings to restrict data collection.

4. Avoid signing in with Google or Facebook: Many websites offer login options using Google or Facebook. While convenient, this shares even more data with these platforms. Instead, create separate accounts using email whenever possible.

5. Use a Virtual Private Network (VPN) and private browsing mode: VPN hides your IP address, helping to obscure your location and online activity, making it harder for websites to track you. Combined with private browsing or incognito mode, this reduces the amount of data companies can collect about your online activity. Using a VPN service can also enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. 

While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices

6. Regular app cleanup: Uninstall apps you no longer use to reduce passive data collection.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Protect your personal information across the popular platforms mentioned above with these essential privacy adjustments.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The best way to reduce companies from collecting your data is to remove invasive apps from your phone. Many apps request unnecessary permissions that can track your activity, so deleting them limits exposure. Instead of downloading standalone apps, try using the browser versions of popular social media platforms, as they typically have fewer permissions. 

However, web tracking still exists through cookies and fingerprinting, so using a privacy-focused browser like Brave, Firefox with enhanced tracking protection, or Safari with Intelligent Tracking Prevention (ITP) can further reduce data collection. However, some apps are so deeply integrated that replacing them is difficult. For example, if you use an Android phone, avoiding Google’s ecosystem is nearly impossible. Apple, on the other hand, offers more privacy controls, giving users better options to limit data collection.

Do you check app permissions before installing? How do you decide which permissions are acceptable? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Never lose cell service again with this space-age satellite tech

Imagine never being without a cell signal again, anywhere, any time on the planet. 

That's exactly what AST SpaceMobile is working to achieve. Founded in the heart of Texas in 2017, this innovative company is developing the world's first global cellular broadband network that can connect directly to your everyday smartphone, no special equipment required. 

Its mission? To ensure that no matter where you are around the globe — from remote mountain ranges to isolated islands — you'll never be out of touch again.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

AST SpaceMobile made history in April 2023 by completing the first two-way phone call via space on an unmodified cell phone. This milestone was achieved using its low Earth orbit satellite, Blue Walker 3 (BW3), which was launched aboard a SpaceX Falcon 9 rocket in September 2022.

IPHONE'S SATELLITE MESSAGING: A CRUCIAL LIFELINE DURING A STORM

Since its inception, AST SpaceMobile has made remarkable technological advancements. In September 2023, it achieved a 14-Mbps data stream on the BW3 satellite. A year later, in September 2024, the company launched five additional satellites, BlueBird 1 through 5. The ultimate goal is to establish a constellation of 168 satellites, offering speeds up to 120 Mbps.

IS YOUR PHONE READY FOR AN EMERGENCY? TURN ON THESE LIFESAVING SETTINGS

AST SpaceMobile has forged strategic partnerships with major telecom players across the globe. In the United States, it has partnered with AT&T and Verizon. Internationally, it has teamed up with Bell Canada, Rakuten, Vodafone and other telecommunications providers. These partnerships potentially give about 2.8 billion people worldwide access to its satellite network.

 BAD WEATHER? HOW TO GET SURVIVAL-READY IN ANY STORM

AST SpaceMobile's approach to satellite connectivity is uniquely innovative. It focuses solely on direct-to-cell service, distinguishing itself from other competitors. Its current BlueBird satellites unfold to approximately 700 square feet in space, with future satellites planned to be three times larger and offer ten times the data capacity. Impressively, 95% of its manufacturing process is completed in house in the United States.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

CELL PHONE BOOSTERS VS. MOBILE HOTSPOTS: WHAT’S THE DIFFERENCE AND HOW DO YOU CHOOSE?

While both AST SpaceMobile and Elon Musk's Starlink aim to provide global connectivity, their approaches significantly differ. AST SpaceMobile is built for direct-to-cell service, requiring no special equipment for users.

Starlink, primarily a data-focused service, has only recently launched modified satellites for direct-to-cell capabilities. AST's focus on unmodified smartphones gives it a unique advantage in accessibility.

Despite the promising technology, the company faces several challenges. The brightness of satellites like BW3 could potentially interfere with astronomical observations. There are concerns about possible interference with radio-quiet zones used for scientific research. The increasing number of satellites also contributes to growing space debris concerns.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

As of January 2025, AST SpaceMobile has not yet announced specific pricing for its services. However, given its partnerships with major carriers like AT&T and Verizon, it's likely that the service will be offered as an add-on to existing cellular plans. The company aims to provide coverage to remote areas and eliminate dead zones, suggesting that pricing may be competitive to attract a wide user base.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

AST SpaceMobile's innovative approach to global connectivity has the potential to revolutionize how we stay connected, especially in remote areas. While challenges remain, the benefits of ubiquitous communication, particularly in emergency situations, are compelling. As the company continues to expand its satellite network and partnerships, we may soon see a world where being "out of range" is a thing of the past.

If universal satellite connectivity could solve one major communication challenge in your life, what would it be? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Big Tech whistleblower's parents sue, sounding alarm over son's unexpected death

This story discusses suicide. If you or someone you know is having thoughts of suicide, please contact the Suicide & Crisis Lifeline at 988 or 1-800-273-TALK (8255).

The parents of a young California tech whistleblower whose 2024 death was ruled a suicide are now suing the City and County of San Francisco, alleging they violated public records laws by refusing to fulfill their requests for information about their son's death.

Suchir Balaji, 26, was an employee at OpenAI, the artificial intelligence company behind ChatGPT, at the time of his Nov. 26, 2024, death. A San Francisco County medical examiner concluded the next day he died from a self-inflicted gunshot wound inside his apartment.

"In the two-plus months since their son’s passing, Petitioners and their counsel have been stymied at every turn as they have sought more information about the cause of and circumstances surrounding Suchir’s tragic death. This petition, they hope, is the beginning of the end of that obstruction," the lawsuit states.

San Francisco City Attorney's Office spokesperson Jen Kwart told Fox News Digital that once their office is served, they will review the complaint and respond accordingly.

"Mr. Balaji’s death is a tragedy, and our hearts go out to his family," Kwart said.

OPEN AI WHISTEBLOWER FOUND DEAD IN SAN FRANCISCO APARTMENT FROM APARENT SUICIDE

"It's really been a nightmare for the last three months for them," one of the family's attorneys, Kevin Rooney, told Fox News Digital. 

Just days before he died, Balaji was "upbeat and happy" during a trip to Catalina Island with his friends for his 26th birthday, the complaint filed Jan. 31 says.

The lawsuit describes Balaji as a "child prodigy with a particular interest in and talent for coding." He attended the University of California at Berkeley, and, upon graduating, was hired as an AI researcher at OpenAI.

OPENAI DEBUTS CHATGPT GOV, A NEW VERSION OF THE CHATBOT FOR US GOVERNMENT AGENCIES

"In that position, he was integral in OpenAI’s efforts to gather and organize data from the internet used to train GPT-4, a language model used by the company’s now-ubiquitous online chatbot, ChatGPT," the complaint says.

By August 2024, however, Balaji "had become disillusioned with OpenAI’s business practices and decided to leave to pursue his own projects." In October, he was featured in a New York Times article titled "Former Open AI Researcher Says the Company Broke Copyright Law," with his photo.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Balaji alleged that "OpenAI violates United States copyright law because ChatGPT trains on copyrighted products of business competitors and then can imitate and substitute those products, running the risk of reducing the commercial viability of OpenAI’s competitors to zero," according to the lawsuit.

In a Jan. 16 statement, OpenAI described Balaji as a "valued member" of the company's team, and its employees are "still heartbroken by his passing."

Balaji's parents, Poornima Ramarao and Bajami Ramamurthy, allege their requests for more information about their son's death were denied unfairly under the California Public Records Act. They further alleged in the lawsuit that investigators did not take their concerns about Balaji's whistleblower status seriously.

Rooney said there are good reasons for investigators not to disclose certain information about a criminal case to the public.

OPENAI REVEALS AI POLICY PROPOSALS TO BEST CHINA, PROTECT KIDS: ‘THIS IS A RACE AMERICA CAN AND MUST WIN’

"But you should at least communicate with them and let them know generally what's being done to investigate the case," Rooney said. "And if that hasn't been done here because they've made a conclusion that Suchir died by suicide and that the investigation is closed, well … then we do have a right under the law [to view police records].

"When Ms. Ramarao informed the representative that her son had been a whistleblower against OpenAI and had been featured in the New York Times regarding his whistleblower allegations, the representative declined to follow up or seek any additional information," the lawsuit alleged. 

"Instead, the [medical examiner's office] representative handed Ms. Ramarao Suchir’s apartment keys and told her she could retrieve her son’s body the following day. The representative also told Ms. Ramarao that she should not be allowed to see Suchir’s body and that his face had been destroyed when a bullet went through his eye."

Dr. Joseph Cohen, a forensic pathologist hired by Balaji's parents, conducted a private autopsy and noted that Balaji's gunshot wound was "atypical and uncommon in suicides." The 26-year-old also had a contusion on the back of his head, according to the complaint.

Cohen also "noted that the trajectory of the bullet was downward with a slight left to right angle" and "that the bullet completely missed the brain before perforating and lodging in the brain stem."

Fox News Digital reached out to OpenAI for comment.

Huge healthcare data breach exposes over 1 million Americans' sensitive information

The healthcare industry has recently been a major target for hackers. You might remember the 2024 Ascension attack, which led to significant disruptions. 

The Change Healthcare breach was also on a massive scale. UnitedHealth initially claimed that 100 million Americans were affected, but later raised that number to 190 million. 

There have been countless other incidents, and now you can add another to the list. Community Health Center, Inc. (CHC), a Connecticut-based federally qualified health center, has disclosed a data breach following a criminal cyberattack on its systems. 

The attack has affected over a million people in the U.S.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Community Health Center, Inc. (CHC) detected a data breach on Jan. 2 after identifying unusual activity within its computer systems. An investigation confirmed that a skilled hacker had accessed and extracted data but did not delete or lock any information. If CHC's claims are accurate, this is a positive outcome, as hackers often deploy ransomware, a type of attack in which they lock systems and demand payment before restoring access.

In a regulatory filing with the Maine Attorney General’s Office, CHC said that 1,060,936 people were affected by the data breach. The type of information compromised varies depending on an individual’s relationship with CHC. Patient data that may have been accessed includes names, dates of birth, addresses, phone numbers, email addresses, diagnoses, treatment details, test results, Social Security numbers and health insurance information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

For individuals who are not regular CHC patients but received COVID-19 services at a CHC clinic, the breached data may include names, dates of birth, phone numbers, email addresses, addresses, gender, race, ethnicity and insurance details if provided. Additional information, such as test dates, results and vaccine details, including type, dose and administration date, may also have been affected. In rare cases, Social Security numbers were also included in the breach.

The organization did not disclose how the hackers gained access to the data or whether proper cybersecurity measures were in place at the time of the breach. While CHC has assured that its systems are no longer at risk, the same cannot be said for its patients, who may now be targets of various cyberattacks.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

CHC said the hacker’s access was terminated within hours, and daily operations were not disrupted. To strengthen cybersecurity, CHC claims it has implemented advanced monitoring software and reinforced system protections. The organization said there is no evidence at this time that the compromised data has been misused.

The health center is offering free identity theft protection services for all patients and COVID-19 service recipients whose Social Security numbers were involved in the breach. The organization is also encouraging individuals whose Social Security numbers were not affected to take additional steps to protect their information.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

1. Remove your personal information from the internet: The breach has exposed sensitive personal data, making it essential to reduce your online footprint. While no service can guarantee complete data removal, a reputable data removal service can significantly limit your exposure. These services systematically monitor and erase your personal information from numerous websites and data brokers. Check out my top picks for data removal services here.

2. Be wary of mailbox communications: With addresses among the compromised data, scammers may exploit this breach to send fraudulent letters. Be aware of mail claiming missed deliveries, account suspensions or security alerts. Always verify the authenticity of such communications before responding or taking action.

3. Be cautious of phishing attempts and use strong antivirus software: Scammers may use your compromised email or phone number to target you with phishing attacks. Be wary of messages asking for personal information or containing suspicious links. To protect yourself, ensure strong antivirus software is installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Monitor your accounts: Given the scope of this breach, regular monitoring of your bank accounts, credit card statements and other financial accounts is critical. Look for unauthorized transactions or suspicious activity, and report any issues immediately to your bank or credit card provider.

5. Recognize and report a Social Security scam: If your Social Security number is exposed, you could become a target for related scams. Official communication regarding Social Security issues usually comes via mail, not phone calls or emails. Learn more about spotting and reporting scams by visiting the Social Security Administration’s scam information page.

6. Invest in identity theft protection: Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you’ll be notified if and when you are affected. An identity theft protection service can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of using an identity theft protection service is that it might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft. 

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

The CHC breach may not be as large as the UnitedHealth attack, but with over a million individuals affected, it’s still a serious incident. Cybercriminals can exploit stolen data in various ways, from identity theft to targeted phishing scams. While CHC has taken steps to secure its systems, those impacted should remain vigilant. Be wary of unexpected emails, calls or messages requesting personal information, and consider monitoring financial and medical accounts for any suspicious activity.

Do you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels for the latest tech tips and tricks:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Fox News AI Newsletter: Bill would ban DeepSeek

IN TODAY’S NEWSLETTER:

- House reps unveil bill banning DeepSeek from US government devices over alleged ties to Chinese government
- Perplexity AI bids on TikTok, CEO says it's a win-win for Trump
- Donny Osmond adds AI version of himself as a teen to Las Vegas residency

'DEEPLY DISTURBING EVIDENCE': House lawmakers are introducing legislation Thursday to ban the Chinese AI DeepSeek from U.S. government devices, arguing that the software is "directly linked to the Chinese Communist Party" and poses a "five-alarm national security fire." 

AN AMERICAN TIKTOK: The CEO of AI startup Perplexity, Aravind Srinivas, confirmed his company’s bid for TikTok U.S. and said the deal checks all the boxes for investors and President Donald Trump, including an ownership stake for the U.S.

SEEING DOUBLE: Donny Osmond is bringing on a new co-star for his Las Vegas residency: himself.

'AI POWERHOUSE' : The White House is opening its artificial intelligence plan up to Americans to contribute policy ideas to the Trump administration to ensure that the United States is "the undeniable leader" in AI technology. 

PEDAL TO THE METAL: For a commander on the battlefield, a split second of decision advantage can determine the difference between victory and defeat. In every battlespace, AI is critical to enabling action at the speed of kinetic and non-kinetic conflict. It is already being successfully applied to rapid data processing, target recognition, combat simulation, countering drones and strategic decision-making for defense missions. And looking across current conflict zones and hot spots, we need its benefits faster than ever before, in environments from urban terrain to cyber, sea and space.

TAKING CHARGE: Sylvester Stallone is the latest celebrity embracing artificial intelligence. The "Rocky" star invested, along with several others, in Largo.ai, an AI-driven analytics platform for film, TV and advertising, raising $7.5 million in financing for the company.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Identify any mystery caller for free with this phone number lookup tool

Got an unknown number that's been driving you nuts? 

We totally get it. 

Those random calls on your cellphone can be seriously frustrating. And now you can fight back with a simple, free solution. In just a few easy clicks, you'll go from feeling annoyed to being in total control, uncovering exactly who's behind that mysterious phone number.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

The TruePeopleSearch.com website works with both landline and cellphone numbers. It allows you to do a reverse phone lookup for any type of phone number, whether it's a cellphone or a landline. It's important to note that the availability and completeness of information can vary depending on the specific number and its associated public records. 

However, in most cases, with just a few simple steps, you'll go from "Who the heck is calling me?" to "Aha! Now I know exactly who this is." Note that you can also search by name, address and email, as well, but for our example, we'll use a phone number. 

AN ALARMING SPIKE IN SCAM CALLS ORIGINATING FROM ROBOCALLS

Grab your preferred device — be it a computer, smartphone or tablet. Any browser will do, so launch Chrome, Safari or whatever you're comfortable with. Type in truepeoplesearch.com in your browser's address bar. The layout might vary slightly depending on your device, but don't worry — the functionality remains the same.

TOP 10 ROBOCALL HOTSPOTS IN AMERICA

Now, type in that perplexing phone number that's been nagging at you. Hit the search button and watch the magic unfold.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Prepare to be amazed by the wealth of information at your fingertips. Click the "View Details" button next to or under the actual search results, depending on your device. You might discover the person's name, age, date of birth, current address or previous addresses, as well as email addresses, relatives, friends, associates and more. It's astounding how much data a simple phone number can unlock.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Now, beware of Sponsored Links that might try to lure you into signing up for other services.

While TruePeopleSearch.com can be a helpful tool, not every phone number search will yield comprehensive results. The information available varies depending on several factors:

Always use this service responsibly, respect individual privacy and understand that results may be incomplete or vary significantly between different phone numbers.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Try searching for your own phone number. You might be surprised at the amount of information that pops up. If you're uncomfortable with the information available about you, consider investing in a personal data removal service to have that information taken down. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

This free tool empowers you to take control of solving the mystery of who is calling you. No more wondering about unknown callers or potential spam. With just a few clicks, you can unmask the mystery and decide whether to answer, ignore or block that call.

How do you usually handle unknown callers? Have you ever used a reverse phone lookup tool before? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels for the latest tech tips and tricks:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Robot dog sprints into history books by breaking speed records

A Chinese team has unveiled a groundbreaking quadruped robot that is pushing the boundaries of robotics and speed. 

The Black Panther 2.0, developed by Zhejiang University's humanoid innovation institute in collaboration with the Hangzhou-based startup Mirror Me, has achieved a remarkable feat by running approximately 100 meters in under 10 seconds.

The design of the Black Panther 2.0 draws inspiration from various animals, resulting in a highly efficient biomechanical structure. Its carbon-fiber shins are modeled after jerboa desert rodents, increasing stiffness by an impressive 135% while only adding 16% to its weight. 

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

The robot features spring-loaded knee joints that act as shock absorbers, mimicking the powerful movements of black panthers. Additionally, its "running shoes," inspired by cheetah claws, enhance grip performance by an astonishing 200%. Standing at 2 feet and 0.8 inches tall and weighing 83.8 pounds, this robot achieves a peak stride frequency of five times per second.

CHINESE TECH FIRM SHARES ROBOT TRAINING SECRETS WITH THE WORLD

The impressive performance of the Black Panther 2.0 is not solely due to its hardware; it also incorporates artificial intelligence and machine learning to adapt its gait in real time for specific situations. This technology allows the robot to coordinate its limb movements using the concept of Huygens' coupled pendulum principle, enabling it to maintain fluid motion on various terrains and pushing it closer to the agility of living organisms.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

GET FOX BUSINESS ON THE GO BY CLICKING HERE

In addition to breaking records, the Black Panther 2.0 has joined the prestigious "10-second club" for the 100-meter sprint, surpassing the previous record holder, HOUND, which was developed at Korea's Advanced Institute of Science and Technology. This achievement positions the robotic dog ahead of most human sprinters, although it still trails behind some of nature's fastest runners, like cheetahs, ostriches and wildebeests.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

NO TENNIS PARTNER? NO WORRIES WITH THIS AI ROBOT

The development of the Black Panther 2.0 opens up exciting possibilities for the future of robotics. Its high-power-density motor drivers suggest potential industrial applications, while its design invites further exploration into the differences between robotic and biological mobility. This technology could also be utilized in search and rescue operations or for exploring hazardous environments.

Would you feel comfortable having a robot like the Black Panther 2.0 working alongside you, or would its advanced capabilities make you nervous about potential job displacement or safety concerns? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

❌