Reading view

Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong. 

While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device. 

The issue also affects those downloading apps from the Google Play Store.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.

One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.

Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.

The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.

The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.

We reached out to Apple for a comment but did not hear back before our deadline. 

Apple has removed the 11 iOS apps mentioned in Kaspersky's report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple's policies, resulting in the termination of their developer accounts.

Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library. 

The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.

In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A Google spokesperson tells CyberGuy: 

"All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services."

However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Here’s why:

HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android

4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.

5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities. 

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.

Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to organize, protect and streamline your inbox with an email alias

Almost everything you do online asks for your email. If you have been using the same one for a while, chances are hundreds or even thousands of services have it. They send promotional messages, social media alerts, newsletters and more, turning your inbox into complete chaos. You can tame this madness using an email alias.

An email alias helps declutter your inbox by organizing emails based on their purpose. For example, you can create specific aliases for shopping, newsletters or work and set up filters to sort these messages into separate folders automatically. 

Aliases also help manage spam. If an alias starts receiving too many unwanted messages, you can disable it without affecting your main email.

Let’s dive into how to create an email alias on different platforms, including Gmail, Outlook and iCloud. 

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Gmail doesn’t allow you to create a completely separate alias, but it offers workarounds using "+ addressing" or by adding dots to your existing email address. However, these methods don’t prevent an unscrupulous sender from seeing your primary address, so exercise caution when using them with untrusted correspondents. Follow the steps below to get started.

Use your existing Gmail address and add a "+" followed by any keyword before "@gmail.com."

Example: If your email is yourname@gmail.com, you can use:

No additional setup is needed, just start using this alias when signing up for services or sharing your email.

Gmail ignores dots (.) in email addresses, so you can create variations of your email:

Example: If your email is yourname@gmail.com, you can use:

All variations will deliver emails to your main inbox automatically.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Outlook.com allows you to create additional email addresses (aliases) that are linked to your primary account. Emails sent to an alias will arrive in your primary inbox, and you can send messages using the alias as well.

If your primary email is johnsmith@outlook.com, you can create an alias like john.smith123@outlook.com. Emails sent to john.smith123@outlook.com will still go to johnsmith@outlook.com, but you can choose to send emails using either address.

Steps to create an alias:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once added, you can send emails using your alias by selecting it in the From field when composing a new message.

Important limitations to note:

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Apple allows you to create up to three email aliases through iCloud. These aliases can be used for specific purposes, helping you manage your inbox effectively. Here’s how to create one:

It's important to note that you can still create up to three email aliases through iCloud. Remember that while these aliases provide some flexibility, they do not create separate Apple IDs or completely hide your primary iCloud email address.

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

While many email providers offer basic alias functionality, most have significant limitations. Gmail's "+" addressing and dot tricks, Outlook's linked aliases and Apple's iCloud aliases all provide some flexibility, but they often fall short of true privacy protection.

For those of you seeking comprehensive email privacy and robust alias management, my No. 1 pick for private and secure email platforms contains no ads, no tracking and powerful privacy features like password-protected email and unlimited disposable email addresses. See my review of the best secure and private email services here.

Protecting your inbox from scammers requires a combination of smart practices and proactive tools. Using email aliases is an effective first step. By creating specific aliases for different activities, such as shopping, subscriptions or work, you can track where spam is coming from and deactivate problematic aliases as needed. Below are some other steps to take.

1. Avoid sharing your primary email address publicly on forums, social media or other platforms to minimize exposure. Most email providers offer robust spam filters, so ensure they are enabled and customize them as needed

GET FOX BUSINESS ON THE GO BY CLICKING HERE

2. Invest in personal data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3. Enable two-factor authentication on all your email accounts to add an extra layer of security.

4. Be cautious of suspicious links and attachments. Never click on links or download attachments from unknown senders, as these could be phishing attempts.

5. Use strong antivirus software to protect against potential malware that might come through spam emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Regularly update your email password and make it strong and unique, avoiding common words or easily guessable combinations. Consider using a password manager to generate and store complex passwords.

These steps will provide a more comprehensive approach to protecting your inbox from scammers and reducing unwanted emails.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Taking charge of your inbox doesn’t have to be overwhelming. By implementing the tips and tools mentioned above, you’ll create a more secure, efficient and manageable email experience. Whether you’re battling spam or organizing your digital life, email aliases and secure services are great things to put into place.

Which email platform do you use most often, and how do you organize your messages there? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap

A sophisticated phishing campaign exploiting Google Calendar has been uncovered by Check Point Software Technologies, raising alarms among cybersecurity experts. 

Cybercriminals are sending fake meeting invitations that appear legitimate, redirecting victims to phishing sites and mimicking Google's platforms to steal sensitive information. 

This emerging threat is particularly concerning given the widespread use of Google Calendar, which serves more than 500 million users globally in 41 languages. Researchers have identified nearly 4,000 phishing attempts in a matter of weeks, impersonating more than 300 reputable brands.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Hackers leverage the trust in Google's services to carry out their attacks. Victims receive seemingly authentic meeting invites via Google Calendar. Upon clicking links within these invites, they are taken to fake web pages that prompt them to input personal data. Once compromised, this information can be used for identity theft, financial fraud and unauthorized access to other accounts. Security experts warn that attackers are now using AI to craft highly convincing fake invitations, making it even harder to spot the fraud. Reacting to the findings from Check Point, a spokesperson for Google said:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

"We recommend users enable the 'Only If The Sender Is Known' setting in Google Calendar. This setting helps defend against this type of phishing by alerting the user when they receive an invitation from someone not in their contact list and/or they have not interacted with from their email address in the past."

ASK KURT: HOW TO NAVIGATE GOOGLE’S PRIVACY SETTINGS

Google has introduced the "known senders" feature in Google Calendar to combat sophisticated phishing attempts. This setting helps you filter out potentially malicious calendar invites. Here's how to enable it:

This ensures that only events from contacts, your organization or previous interactions are automatically added to your calendar.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW ONE MAN GOT SCAMMED IN SECONDS USING GOOGLE

To further protect yourself from phishing scams, follow these steps.

Scrutinize unexpected invites carefully: Examine the sender's details, including their name, domain and email address, for any inconsistencies or signs of spoofing.

Avoid clicking suspicious links or downloading attachments from unknown sources: Threat actors often embed malicious links in calendar invites that can lead to phishing websites designed to steal your personal information.

Use strong antivirus software: This provides an additional defense mechanism against malware and can help detect potential phishing attempts before they cause damage. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Enable two-factor authentication (2FA) for your Gmail account: 2FA adds an extra layer of security that can prevent unauthorized access, even if your credentials are compromised.

Keep your security settings up to date: Regularly review and adjust your calendar and email settings to protect against evolving phishing tactics.

HOW A WRONG GOOGLE SEARCH CAN COMPROMISE YOUR DATA AND BRING LAW ENFORCEMENT CALLING

As phishing tactics evolve, cybercriminals are exploiting trusted platforms like Google Calendar to bypass traditional security measures. This underscores the importance of user vigilance and proactive security practices. By enabling the "known senders" setting and implementing additional security measures, you can significantly reduce the risk of falling victim to calendar-based phishing scams.

What digital security challenges have you encountered recently? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to manage photos, videos on new laptop with limited space

We recently received an email from Sylvia, who just got a new laptop that has significantly less space than her old laptop. She emailed us wondering how to store photos and videos on a computer with only 82GB of storage space:

"The newer laptop does not have as much storage space (indicates 82.1 GB free of 225GB) as the old one (indicates 322 GB free of 446 GB). What is the best way to store my photos and videos to free up space on the new laptop?"

Great question, Sylvia. This is a common issue for anyone who has purchased a lightweight laptop such as a Chromebook or Windows-based ultrabook. Fortunately, there are a few easy ways to store files off your hard drive.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

82 GB should be more than enough for basic tasks like web browsing, using office applications or streaming video. However, if you plan to store large files such as high-resolution photos, videos or games, or if you’re using software that requires a lot of space, 82GB might fill up quickly. Here’s a rough breakdown of how much space different types of files typically take:

It's also important to leave enough space on your computer for the operating system to run smoothly. As a rule, keep at least 10%-15% of your hard drive free to prevent application slowdowns. An external hard drive is an excellent option for storing photos and videos to free up space on your new laptop. Another great way to save space is by storing your photos in cloud storage. Whether it’s a hard drive or cloud space, having a backup is a good idea.

As you can see from the breakdown above, photos and videos can take up a significant amount of storage space on your laptop. If you are a photographer who deals with RAW images, this amount could be even higher, as with video professionals who work with 4K content.

Even if you're not a video professional or photographer, having a lot of home videos and photographs can take up a lot of space. You will need a secondary storage solution with less than 100GB of space left. Here are a few options you might consider.

BEST LAPTOPS FOR 2025

An external hard drive is one of the most practical and reliable solutions for expanding your laptop's storage capacity, especially if you have many media files like photos, videos or other data-intensive content. These portable storage devices connect to your computer via USB (and increasingly via USB-C for faster transfer speeds), offering the flexibility of storing and backing up massive amounts of data without consuming your laptop's internal space.

There are two main types of external hard drives: HDD (hard disk drive) and SSD (solid state drive). HDDs are typically more affordable and come in larger capacities (up to several terabytes), making them an excellent option for those needing vast storage space on a budget. However, their mechanical components make them slightly slower in data transfer speeds and more prone to physical damage.

SSDs, on the other hand, are faster, more durable and lighter, though they tend to be more expensive per gigabyte of storage than HDDs. SSDs are ideal if you frequently transfer large files, work with high-resolution media like 4K videos or require speedy access to your data. They are also less prone to damage from drops or movement, which makes them perfect for on-the-go use.

External hard drives come in various sizes, from modest capacities like 256GB to massive options exceeding 10TB. The amount of storage you need will depend on the types of files you’re dealing with. For example, a 1TB drive can store over 200,000 high-resolution images if you need space for photos. A larger capacity drive might be necessary for video files, especially HD or 4K, as these files can easily consume tens or even hundreds of gigabytes.

BEST DESKTOPS COMPUTERS FOR 2025

One key advantage of external hard drives is their portability. Compact and easy to carry, they provide an excellent solution for photographers, videographers or anyone needing access to large files while moving. Some models are designed to be ultra-durable, with rugged, shockproof and waterproof features, ideal for outdoor and travel use.

Many professionals label and organize their drives by project or period, allowing for easy archiving and retrieval. As mentioned earlier, a simple organizational system, such as labeling your drives with the dates or types of content they contain, can help keep your data structured and easily accessible. This is especially important when you accumulate multiple drives over time. See Kurt's picks for the best external hard drives here.

Cloud storage services like Google DriveDropbox and Microsoft OneDrive offer convenient, flexible options for storing large files without consuming your laptop's limited space. These services allow you to securely store your photos, videos and documents in the cloud, freeing up valuable storage on your device. One significant advantage of cloud storage is accessing files from any device with an internet connection, whether on your phone, tablet or another computer.

Most cloud services provide a certain amount of free storage (typically between 2GB and 15GB) before upgrading to a paid plan. For instance, Google Drive offers 15GB of free storage shared across Google services, while Dropbox provides 2GB for free with options to upgrade for more space. OneDrive provides 5GB for free, but Microsoft users can get additional storage through Office 365 subscriptions, granting access to the Microsoft Office suite.

Additionally, cloud storage services come with features like automatic syncing and backup, making it easier to organize and safeguard your files. This can be particularly helpful for large photo and video libraries, which can be set to upload automatically from your phone or computer. With features like file versioning and collaboration tools, cloud platforms offer more than just storage. They enhance productivity and allow seamless file sharing with friends, family or colleagues.

Finally, many cloud storage providers offer encryption and other security measures to protect your files for added peace of mind. However, it would always be best to take extra precautions, such as enabling two-factor authentication and using strong, unique passwords, to ensure your data is safe. Kurt's favorite cloud services can be seen here.

iCloud offers 5GB of free storage to all users, which is sufficient for basic services like iCloud Keychain, testing other features and storing some files. However, for users who need more storage, iCloud+ subscriptions are available. These plans include:

iCloud is tightly integrated with Apple devices, making it highly convenient for Apple users. Files stored on the desktop and in documents folders on Macs are automatically synced to iCloud Drive, which is especially useful for devices with limited storage space like the MacBook Air. iCloud Drive can also be accessed from Windows machines through a dedicated file folder and files can be managed via icloud.com.

iCloud provides robust automatic syncing and backup features. iCloud Backup automatically backs up important data on iPhones and iPads when connected to power and Wi-Fi, ensuring that your device's data is always up to date. This backup can be used to restore your device or set up a new one seamlessly.

iCloud uses 128-bit AES encryption to secure all files. Additionally, iCloud+ subscriptions include advanced privacy features such as iCloud Private Relay, which protects your browsing history and identity, Hide My Email, which generates random email addresses, and Custom Email Domains for personalized email addresses.

While iCloud is highly user-friendly for Apple users, it can be less reliable and glitchy for non-Apple users. Collaboration is limited to Apple users, but files can be shared and accessed across different Apple devices using the Files app on iOS and iPadOS, the Finder on Mac or File Explorer on Windows PCs.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

When storing your photos, videos and other important files, it's crucial to prioritize data security. Here are some essential steps to protect yourself and your valuable information.

1) Use strong passwords: Create unique, complex passwords for all your accounts and devices. Consider using a password manager to generate and store secure passwords.

2) Enable encryption: Encrypt your external hard drives and cloud storage accounts to add an extra layer of protection to your data.

3) Implement two-factor authentication (2FA): Enable 2FA on all accounts that offer this feature, especially for cloud storage services.

4) Install and maintain strong antivirus software: Use a strong antivirus program and keep it updated to protect against malware and other security threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5) Regularly update your operating system and applications: Keep your devices and software up to date to ensure you have the latest security patches.

6) Be cautious with public Wi-Fi: Avoid accessing sensitive information when connected to public networks or use a VPN for added security. Using a VPN (virtual private network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

7) Back up your data regularly: Create multiple backups of your important files, including at least one offline copy.

8) Use secure file transfer methods: When sharing files, use encrypted transfer methods or password-protected links.

By following these steps, you can significantly enhance the security of your data and protect yourself from potential cyber threats.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Managing storage on a laptop with limited space requires thoughtful planning, especially when dealing with large files like photos and videos. While 82GB may be sufficient for basic tasks, media files can quickly add up. By leveraging external hard drives or cloud storage services, you can keep your laptop running efficiently while ensuring that your important files are safely stored and accessible. Whether you opt for physical or cloud-based solutions, remember to prioritize data security using strong passwords and encryption where necessary. With the right strategy, you can make the most of your laptop's storage without sacrificing performance or losing precious memories.

Do you have a way of storing photos and videos that we didn't mention? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Who's really behind that random strange text from nowhere?

These days, our phones are constantly buzzing with notifications, and it's becoming increasingly difficult to distinguish between legitimate messages and potential scams. Bill from Mesa, Arizona, recently shared an experience that highlights this growing concern:

"Twice in the last week I've received texts supposedly sent elsewhere. The last one asked if I was 'available tomorrow evening.' I did not recognize the number but am active in an old people park so receive many calls and texts from unfamiliar numbers. I texted back that my wife thought we were available. A few minutes later, a text came asking if I was Mrs. Amy. I texted that I wasn't Mrs. Amy and had never been, but it was a problem. 

"A return text came thanking me for being so polite and the texter's appreciation for polite people and if I were ever in LA, I would be welcome to a backyard BBQ. Looking back, there were a couple more texts ending with ‘I like to make friends with polite people.’ The first text which I deleted was in a very similar vein and format. Is this a scam and why, for what?"

Bill's experience is not unique. Many people receive similar messages that seem harmless at first glance but could potentially be part of a more sinister scheme. Let's dive into the world of text message scams and learn how to protect ourselves.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Text message scams, also known as "smishing," a combination of SMS and phishing, have become increasingly sophisticated. Scammers use various tactics to engage potential victims and gain their trust. Here are some common elements:

Unfamiliar numbers: The message comes from a number you don't recognize. For instance, you receive a text from +1-555-123-4567, a number not in your contacts.

Unsolicited contact: The text arrives unexpectedly, often with a friendly or urgent tone. Example: "Hey! Long time no see. How have you been?"

Personal touch: The scammer might use your name or reference a common activity to seem legitimate. Example: "Hi Sarah, it's Mike from the book club. Are you coming to the meeting next week?"

Too good to be true: Offers of prizes, invitations, or other enticing propositions are common. Example: "Congratulations! You've won a $500 gift card. Click here to claim your prize!"

Requests for information: The scammer may ask for personal details, either directly or indirectly. Example: "This is your bank. We need to verify your account. Please reply with your account number and PIN."

Remember, these are all examples of potential scams. Always be cautious when receiving unexpected messages, especially those asking for personal information or containing suspicious links.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

In Bill's case, the scammer employed a "long-play" strategy. By engaging in friendly conversation and offering invitations, the scammer aims to build trust over time. The end goal could be:

Phishing for information: Gradually collecting personal details that can be used for identity theft.

Malware distribution: Eventually sending a link that, when clicked, installs malicious software on your device.

Financial scams: Building trust to eventually request money or financial information.

HOW TO EASILY ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON IPHONE AND ANDROID

To protect yourself from text message scams, follow these steps:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

If you believe you've received a scam text, here are six steps to follow:

1. Don't respond: Avoid engaging with the scammer to prevent further attempts.

2. Block the number: Use your phone's built-in blocking features to prevent further contact.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Report the message: Forward the suspicious text to 7726 (SPAM). Also, report it directly to the FTC at ReportFraud.ftc.gov.

4. Keep your information safe: Never click on links or provide personal information in response to unsolicited texts.

5. Have strong antivirus software: Install and run strong antivirus apps on your phone to scan for malware and ensure your device is secure. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Invest in personal data removal services: Consider using a data removal service to eliminate your personal information from data broker sites. These services can help reduce spam, decrease the risk of identity theft and clean up your online presence by automating the removal of your data from hundreds of data broker sites.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

While it's natural to want to be polite, as Bill was, remember that your safety and personal information are paramount. Trust your instincts, verify unfamiliar contacts and never hesitate to ignore or block suspicious messages. Remember, a true friend won't mind if you take extra steps to verify their identity, and a legitimate organization will have official channels for communication.

How have you or someone you know been affected by text message scams, and what steps did you take to protect yourself? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

5-minute cleanup for your phone and computer

Digital junk piles up faster than clutter in real life. There are files you don’t need, all those random screenshots, apps you downloaded and used once, and blurry photos clogging up your camera roll.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

It all adds up, slowing your devices down and making everything feel messy. The good news? Cleaning it up is easier than you think. Let’s do a quick declutter that will make you say, "Ahhh, that feels better."

Step 1: Update your devices

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA

There are too many dangerous bugs out there to skip security patches.

Start with your phone

Scroll through your app list and delete any you’re not using anymore. If it’s been months, you’re not going to use it. Trust me. And even if you do want it later, great, download it again. 

YOUR SSN IS ON THE DARK WEB — HERE’S WHAT TO DO ABOUT IT

While you’re at it, move the apps you want to spend less time using (Instagram for me) off your phone’s home screen. You can hide the app or just move it to another page or folder.

On iPhone: 

On Android: 

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

On iPhone or iPad, the Photos app makes this a breeze. 

On an Android, open the Files by Google app, select Clean, then:

Onto your computer

Here’s the quick and dirty way. Create a new folder, then drag all the random files, screenshots and whatever else into it. 

Pro tip: Sensitive documents have no place on your desktop. If you do insist on saving private docs locally, at least give a snoop a more challenging time by naming the folder something off-base like "Vacation Photos." Be sure your computer automatically locks when you’re away and requires a password on startup, too.

Quick lock: For Windows, hit the Windows key + L. On a Mac, use Ctrl + Cmd + Q.

They take up a decent amount of space, so regularly clear out anything you’re not using. Beyond that, outdated apps could put you at risk. By keeping old programs on your computer, you’re potentially leaving a door wide open for cybercriminals to slip in.

On a Windows PC:

On a Mac:

Don’t forget the outside

We’re aiming for quick, so let’s tackle those fingerprint-covered screens.

On your phone, remove the case and accessories. You want to reach every nook and cranny. For a computer monitor, dust the back top, sides and any ledges that collect dirt before you start cleaning.

A microfiber cloth works, but I prefer screen-cleaning wipes. They’re just so easy. Skip paper towels. They’re too rough for delicate jobs like this.

I always come back to this 210-pack of screen cleaning wipes. Use them on smartphones, tablets, monitors, TVs, remote controls and even glasses. They’re scratch-free and made with anti-static tissue that cleans without leaving behind streaks or lint.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

AI isn’t going anywhere: Prompts to make life easier

I was having dinner with my husband in Paris. We got the wine menu and all the names, of course, were in French. Barry wanted something equivalent to a Napa cabernet, so I took a picture of the menu and asked ChatGPT. In seconds, it recommended a wine. I double-checked with the waiter, and he gave it a thumbs-up.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

You might think AI is just for businesses, programmers, or the ultra tech-savvy, but it’s not. It’s for anyone willing to give it a try.

AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER

Instead of ignoring this powerful tool, make this the year you embrace AI. It’s easier and more helpful than you think.

Let’s start with the basics

"So, uh, where do I find ChatGPT?" I get that in my email every day. Use it on the web or download it for iPhone or Android

The free tier works for most people. I pay $20 a month for ChatGPT Plus. It’s worth it to me for access to the better features and faster response times. Start with free. If you find yourself relying on your favorite AI tool regularly, consider upgrading. It is worth considering.

ChatGPT isn’t the only option, but it is my preference (at least for now) and the most popular. You can also try Google GeminiPerplexity and Claude.

With all these, the workflow is the same. Think of it like Google, but instead of punching in one search term and scrolling through results, you have a "conversation" with the bot to get exactly the output you want. 

Like any tool, you need to use AI wisely and triple-check its results. Trust me, you don’t want to end up like those lawyers who used AI to draft court documents, only to have the judge catch the glaring mistakes. 

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

You’ve heard of prompts, right?

This is what we call the text, question or command you provide an AI system to guide its response or action. It’s your instruction on what you want, so the better your prompt, the more useful and accurate the response will be.

"Priming" is the insider term for telling a chatbot exactly what you want from it. With ChatGPT or any other, the more constraints you give, the better your answer. Examples: "Limit your response to 250 words," "Give me the list in bullet points," "Format the results as a table," "Use this data to create a bar chart."

Remember, AI can’t read your mind. It only knows what you tell it. Use "do" and "don’t" in your prompts to get the results you want. Say you’re cooking for friends, and some have allergies. Say, "Create a recipe for six people. Do include protein, fruits, vegetables and carbs. Don’t include dairy products, shellfish or nuts."

7 prompts to make life easier

Make your goals actionable: "I have a goal for 2025 to [fill in the blank]. Can you help me make it SMART?" (SMART is an acronym for Specific, Measurable, Assignable, Realistic and Time-related.) Maybe you’re not there yet. Try this: "I want to [fill in the blank], but it feels overwhelming, and I don’t know where to start. Can you help me by breaking it down into more manageable tasks?"

"Give me 10 more examples": That’s a prompt I use with ChatGPT all the time to make the chatbot a better brainstorming buddy. Some of its "ideas" are downright bad, but it might spark something creative in your brain, too.

"How can I make this better?" Add in anything you’ve written — a blog post, a travel plan, a resume or even a heartfelt email. This prompt works wonders for polishing your work and pointing out improvements, like a personal editor at your fingertips.

DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT’S TOO LATE

Your very own free assistant: Say you have messy notes from a meeting. By hand, you’d spend 15 minutes turning those into an email fit for your boss or team. Instead, open a chatbot and say, "Turn these notes into a professional, friendly email to my team." Paste your notes at the end and voila. Pro tip: Ask your bot of choice, "Is there anything that needs more details?" to fill in any missing info.

Shortcut your inbox: When you get a really long email, open your AI chatbot of choice, and type in the prompt, "Summarize this email for me. Tell me what I need to do, then write a thoughtful reply. Here is the email." Paste in the email and let AI do its magic.

Wanna get in shape? Ask your AI to create a custom fitness plan. Try this: "Create a 30-day fitness plan for fat loss and muscle gain tailored to a [male/female] beginner at [your age]." Or get specific: "Create a four-week fitness plan to help me run a mile for the first time." Don’t sweat it.

Spouse forgot to load the dishes again? Instead of firing off a rage-filled text, let AI step in. Ask your fave chatbot to reframe your frustration into something a bit more … constructive. I like this prompt: "Make this message sound more friendly." 

Don’t forget about privacy

It's easy to think your bot is a trusted ally, especially when it’s pumping out helpful answers all day long. But it’s definitely not. It’s a data-collecting tool like any other.

Be smart about what you say. Never type in passwords, sensitive financial data, or confidential work or business information. My rule of thumb: Don’t tell a chatbot anything you wouldn’t want made public. 

With a free ChatGPT or Perplexity account, you can turn off memory features in the app settings that remember everything you type in. For Google Gemini, you need a paid account to do this. 

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Lost your contacts on your phone? Here's how to get them back

As high-tech and advanced as all our modern mobile devices are, there's no way of getting around basic user errors. Luckily, the makers of your mobile devices kept such errors in mind. That is why we were eager to respond to Lynne's question about how to restore a deleted contact on your mobile device.

"I must have ‘FAT’ fingers, as I accidentally deleted information in my contacts. I had typed in a couple of other contact phone numbers. But guess I accidentally deleted these. I would [like] to get this information back. I am guessing I am asking for a miracle." — Lynne P. of Lakewood Ranch, Florida

There are several options or methods to restore your contact information on an iPhone or Android, so it is easy to find a solution that should work for you.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Luckily, the makers of iPhones and Android phones understood that mistakes happen and contacts can be erased by accident. Below are ways to restore your contacts on an iPhone or Android phone:

There are two resources for iPhone owners in order to restore contacts: via iCloud or iTunes Backup. Before attempting to restore your contacts, back up your iPhone so you have recourse if you lose data.

Restore contacts with iCloud:

WHICH IPHONE 16 IS RIGHT FOR YOU? DISCOVER YOUR PERFECT MATCH

Restore contacts with iTunes:

If you have not enabled iCloud to back up your contacts, you may be able to restore contacts with iTunes.

4 WAYS TO FIND YOUR LOST IPHONE, WITH AND WITHOUT OTHER DEVICES

There are two resources Android users can use to restore contacts: Google Contacts or Device settings. Before attempting to restore your contacts, back up your Android so you have recourse if you lose data.

Restore contacts with Google Contacts:

Settings may vary depending on your Android phone’s manufacturer.

Restore contacts with Device Settings:

 Settings may vary depending on your Android phone’s manufacturer. 

Please note: Only contacts that aren't already on your phone will be restored.

FIRST THINGS TO DO IF YOU GOT A NEW ANDROID

While it is ideal if you never make a mistake while using your mobile devices, accidents do happen and contacts do get deleted accidentally. That’s why the makers of iPhones and Android devices have multiple ways you can restore contacts on your phone. Following these easy steps outlined above gives you the ability to rectify that situation quickly. It is best to make sure that your mobile devices are being backed up either to the cloud or physically to a computer or hard drive backup so that there is a source from which to restore your contacts. Additionally, should anything go awry when you're doing the restoration process, you have the ability to recover lost data. Accidents happen, but practicing safe data hygiene prevents them from becoming a lost cause or needing a miracle.

Have you ever accidentally deleted a contact on your mobile device? How did you recover that contact information? Are your contacts backed up anywhere? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Hacked Chrome extensions put 2.6 million users at risk of data leak

Your web browser is an ecosystem of its own. It stores your passwords, search history, financial details like credit card numbers, addresses and more. Just like how malicious apps and services can compromise data on your phone or PC, malicious extensions can expose the data stored in your browser. 

There are a ton of extensions out there that do more harm than good. In fact, security researchers have just found a dangerous new campaign that is going after browser extensions. So far, around 36 extensions have been compromised, putting over 2.6 million Chrome users at risk of having their browsing data and account credentials exposed.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Hackers are exploiting browser extensions as a gateway to steal sensitive user data through a variety of methods. These compromised extensions are exposing over 2.6 million users to data exposure and credential theft, as reported by The Hacker News

One common attack involves phishing campaigns targeting the publishers of legitimate extensions on platforms like the Chrome Web Store. In these campaigns, attackers trick developers into granting permissions to malicious applications, which then insert harmful code into popular extensions. This code can steal cookies, access tokens and other user data.

The first company to shed light on the campaign was cybersecurity firm Cyberhaven, one of whose employees were targeted by a phishing attack on December 24, allowing the threat actors to publish a malicious version of the extension.

Once these malicious extensions are published and pass the Chrome Web Store's security review, they are made available to millions of users, putting them at risk of data theft. Attackers can use these extensions to exfiltrate browsing data, monitor user activity and even bypass security measures such as two-factor authentication.

In some cases, developers themselves may unknowingly include data-gathering code as part of a monetization software development kit, which stealthily exfiltrates detailed browsing data. This makes it difficult to determine whether a compromise is the result of a hacking campaign or an intentional inclusion by the developer.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

The browser extension security platform Secure Annex has launched its own investigation into this hacking campaign. So far, it has uncovered over twenty additional compromised extensions, which are listed below. If you have any of the compromised extensions listed in Secure Annex's investigation installed on your browser, it’s essential to remove them immediately to protect your data.

Keeping these extensions installed is a serious risk since hackers can still access your data even if the malicious version has been taken down from the Chrome Web Store. Secure Annex is still investigating and has shared a public Google Sheet with details about the malicious extensions it has found so far, like whether they’ve been updated or removed. They’re also adding new extensions to the list as they discover them.

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

If you have installed one of the above-mentioned extensions on your browser, remove it as soon as possible. To remove an extension from Google Chrome, follow these steps:

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

1) Verify emails and links before clicking: Many attacks begin with phishing emails that impersonate trusted entities like Google Chrome Web Store Developer Support. These emails often create a false sense of urgency, urging you to click on malicious links. Always verify the sender’s email address and avoid clicking on links without double-checking their authenticity. When in doubt, go directly to the official website rather than using a provided link.

2) Use strong antivirus software: Having strong antivirus software is an essential line of defense against malicious software. These tools can detect and block malicious code, even if it has been embedded in browser extensions. The best way to safeguard yourself from malicious links that install strong malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Limit extension permissions: Be cautious about the permissions you grant to browser extensions. Many require access to sensitive data like browsing history, cookies or account information, but not all requests are necessary. Review what each extension asks for and deny permissions that seem excessive. If possible, opt for extensions with limited access to ensure your data remains protected.

4) Limit the number of extensions: Only install extensions that are genuinely needed and regularly review and uninstall those no longer in use.

5) Keep your browser updated: Always update your browser to the latest version. Updates often include critical security patches that protect against vulnerabilities exploited by malicious software. Using an outdated browser increases the risk of being targeted by attacks that could have been prevented with a simple update. Enable automatic updates to ensure you’re always protected. If you are unsure how to update your browser, check out my detailed guide for Google Chrome.

6) Regularly audit your extensions: Conduct periodic reviews of installed extensions and remove any that are unnecessary or pose potential security risks.

7) Report suspicious extensions: If you encounter a suspicious extension, report it to the official browser extension marketplace.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Hackers are getting smarter, and browser extensions have become a new favorite target for stealing sensitive data. The discovery of over 35 compromised Chrome extensions, putting 2.6 million users at risk, is a wake-up call for everyone. Removing suspicious extensions is an essential step to protect your data. This also puts Google’s Chrome Web Store review process under scrutiny, proving that even trusted platforms can be exploited. 

How often do you review and remove unused or suspicious browser extensions? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

It is easier than ever to disable Location Sharing on your Android phone

Privacy is a growing concern, especially regarding location tracking. Google has taken steps to enhance your control over location sharing on your Android, making it simpler for you to manage who can see your whereabouts. Let's dive into this new feature that Google is rolling out and how you can utilize it effectively. (iPhone users, follow these tips)

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Google has introduced a new "Google Location Sharing" toggle that is now integrated directly into the Android settings. This update eliminates the need to navigate through Google Maps to manage your Location Sharing preferences. The new feature is part of the latest updates to Google Play Services and is designed to simplify and enhance your control over location sharing.

Before you toggle this off, let’s take a moment to understand why you might want it on and what happens when you turn it off.

Imagine this: You’re meeting a friend in a busy city, and instead of sending a dozen texts back and forth, they can simply see your real-time location on Google Maps. That’s the power of location sharing. It allows you to share your exact position with specific contacts, along with useful details like your device’s battery level or your estimated arrival time if you’re navigating.

But when location sharing is off, your movements stay private. No one can track where you are, and your personal information is better protected from potential misuse. Apps and services lose access to your location data, which not only boosts your privacy but can also save battery life by cutting down on background tracking.

So, before deciding, think about what fits your needs best: staying connected or staying private.

BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2025

The feature is primarily available on Android smartphones, including popular models from brands such as the Google Pixel series (e.g., Pixel 6, Pixel 7), Samsung Galaxy series (e.g., Galaxy S21, Galaxy S23) and other manufacturers that run stock or near-stock Android versions. Certain Android tablets that support the latest versions of the operating system may also have access to this feature. The Location Sharing toggle is part of recent updates to the Android OS, specifically through Google Play Services. You should ensure your devices are running at least Android 12 or later to access this functionality effectively.

BEST VPNs FOR ANDROIDS

Ready to upgrade? Here's how to do it, but first back up your device data (just in case):

Settings may vary depending on your Android phone’s manufacturer.

ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA

Settings may vary depending on your Android phone’s manufacturer. 

This new feature not only simplifies turning off location sharing but also enhances privacy management by providing transparency about who can track you. You can now feel more secure knowing you have control over your shared information, which is particularly beneficial in situations where privacy is paramount.

Location sharing can be very useful for coordinating meetups, ensuring safety during travel or simply letting loved ones know you've arrived safely. Now, we have shown you how to disable location sharing, but here’s how you can share your real-time location with trusted contacts using Google Maps when Use Location is toggled on.

Remember that people you share your location with can always see:

They may also see other info depending on how you're sharing. Learn more about Location Sharing.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Google's new "Google Location Sharing" toggle, now integrated into Android settings, simplifies and enhances your control over location sharing. With this feature, Google is striking a balance between convenience and robust privacy management, making it a welcome improvement for Android users.

Have you ever had a situation where turning your location sharing on or off was crucial? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

The step I take to clear my inbox every January

Right now, I’m sitting here beaming because my inbox is empty. Really! Did I read and reply to every single message? Well, no. I’m not an "Inbox Zero" person. Watch this quick video if you have no clue what that means.

Before I took back control, I had 409 unread emails. But I have a trick to starting each year with a clean slate. You can do it, too!

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

THE BIGGEST WI-FI MISTAKE YOU DIDN’T KNOW YOU WERE MAKING

Clear out your inbox

You could try sorting your emails into a maze of folders, but who has the time for that? Here’s a surprisingly easy fix to start the new year right: Archive your inbox. It’s like a magic wand for your digital clutter!

What’s email archiving, you ask? Picture this: A digital vault where every email you’ve ever sent or received is safely stored, complete with attachments. No more scrolling endlessly through a jam-packed inbox!

So, are you ready to beat the email bloat? Here’s your quickstart guide to mastering your inbox with the power of archiving.

Steps to archive emails in Gmail

Gmail will take some time to process your request, so be patient. You may have to do this step a few times to get everything.

Once you’ve archived a message, you can hit All Mail to the left, under "Inbox" and your other email folders, to find it. Search by a term you know was in the email or by the sender.

Filters 101: How to sort your Gmail like a pro

Using Apple Mail? Here’s what to do

SCAMMERS ARE TARGETING TEENS WITH THESE NASTY TRICKS

How to archive emails in Microsoft Outlook

Outlook doesn’t put archived messages into a separate folder. Instead, they’ll go straight to a data file you can access whenever you want.

You’ll see emails disappear from your inbox and subfolders. Find them again under the "Archives" heading.

RELATED: How to make sure emails you want to see don’t end up lost in spam

Got a Yahoo email? Here’s what to do

Want to take a message out of the archive? Open the "Archive" folder, tap on the email you want and select Restore to Inbox.

Smart tech how-to: Save precious voicemails and text messages

Worried you missed something? 

Archiving isn’t the same as deleting. It’s like putting stuff in a storage box. Even if you archive emails, they can be subpoenaed for legal cases. I don’t give legal advice, so consult a lawyer if you have any questions.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Easy internet sleuth tricks you’ll wish you knew sooner

The internet is a treasure chest of information … if you know where to look. Whether you’re trying to verify a website, learn more about your neighborhood or dig up what’s floating around online about you, a little tech know-how goes a long way.

Here are some simple, powerful tricks to level up your sleuthing skills.

THE BIGGEST WI-FI MISTAKE YOU DIDN’T KNOW YOU WERE MAKING

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

See the details of any website

You’ve come across a website that offers an incredible promise of a free trip to Hawaii. Aloha! All the site needs is your personal info and a credit card. Before you take the plunge, make sure you’re not getting screwed over.

A WHOIS lookup search checks a database that contains information about domain names and their registrants — so you can find out who owns the website and see if they have a real business address and contact information. 

How do you get this done?

Next time you think a friend is getting scammed, pull out this awesome tech party trick. You could save them some cash and embarrassment!

RELATED: Your IP address: What it is and why you need to protect yours if you care about privacy

Run a free background check

SCAMMERS ARE TARGETING TEENS WITH THESE NASTY TRICKS

Your online business is everyone’s business, like it or not. How can you check what the internet’s got on you? Here’s a quick and easy way:

Find out who your neighbor is

Go introduce yourself. If that’s not possible, you can find out online in most cases through a county’s assessor site. These government-run sites use data from assessors to estimate the value of real property within a county, city, town or village.

Once you get there, you can see where your person of interest lives, get details on their home or any other properties they own, and much more. You can even view signed documents, like the deed to their home. Yes, really.

The easiest way to find your county assessor’s site is a quick Google search. Just type in the county you’re looking for, along with "assessor." You can also go to Publicrecords.netronline.com. This directory includes official state and county websites you can search for by ZIP code. 

Every county assessor’s site works a little differently, but here’s an overview of how to search on the Maricopa County site here in Arizona.

20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIER

Click on the Go to Data Online button next to the County Assessor option, then search by name or address. Click the magnifying glass icon to search and you’ll see the address, owner, parcel number and other information. Then click on the parcel number and to get even more detailed information and access any related documents.

PRIVACY 101:How to get photos of your home off Zillow, Redfin and Realtor.com

A picture is worth a thousand words

Words and profiles are one thing, but what about pictures of you? All these sites are

worth checking to see what pops up.

RELATED: Think of Google Lens as the smarter version of Google Images.

Go down memory lane

Not all online sleuthing is of the sneaky variety. This one is fun to try with all the places you’ve lived or a home you’re considering buying.

Pop into old Street View photos on Google Maps. You’re able to see what a place looked like going back as long as Google has captured photos there. I’ve spotted pictures going back over a decade. Talk about a hit of virtual nostalgia.

Now, share this article and impress your friends with your tech savvy — or save them from falling for a scam. Either way, you’ll look like the smartest person in the room. 

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Android 15's new Private Space feature puts an end to app snooping

Get ready to level up your privacy game with Android 15's latest feature, Private Space. 

This nifty addition is about to change the way you keep your sensitive apps and data under wraps. 

Let's dive into what Private Space is all about and how you can make the most of it. (iPhone users, learn how to hide apps on your device here.)

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Private Space is Android 15's answer to keeping your personal or sensitive apps away from prying eyes. Think of it as a secret vault within your phone where you can stash away apps you'd rather keep private, whether they're work-related, financial, or just your guilty pleasure games.

Unlike hiding apps — typically done by moving them to a folder or using a third-party launcher, which still leaves them accessible from the app drawer — Private Space creates a separate, secure area within your phone that is completely isolated. Only you can access it using a unique passcode or biometric authentication, ensuring your private content remains truly private.

BEST ANTIVIRUS FOR ANDROIDS — CYBERGUY PICKS 2024

You can use Private Space when:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

You can’t use Private Space when:

Note: You can only use Private Space as the main user of the device, not as a guest or secondary user. Consider creating a dedicated Google account for your Private Space. This helps prevent private data like notifications and files from appearing outside Private Space.

Which devices can use Private Space?

Private Space is available on devices running Android 15. As of now, this includes:

ANDROID BANKING TROJAN EVOLVES TO EVADE DETECTION AND STRIKE GLOBALLY

Ready to upgrade? Here's how to get Android 15:

Settings may vary depending on your Android phone’s manufacturer.

Disclaimer: The availability of the Android 15 update may vary by device and region. If the update is not yet available for your Android device, please check with your manufacturer or carrier for more information on the release schedule.

ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA

Now that you've got Android 15, let's set up your Private Space:

Settings may vary depending on your Android phone’s manufacturer.

Now, your Private Space is ready to use.

Here's how to move apps from your home screen into Private Space or install apps directly into Private Space from Google Play.

Settings may vary depending on your Android phone’s manufacturer.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Space is a game-changer for anyone looking to enhance their digital privacy. This feature provides a secure, dedicated area for your sensitive apps and data, ensuring that only you have access. With just a few simple steps, you can create your own digital vault and enjoy peace of mind knowing your private information is well-protected.

What role should the government play in protecting your privacy and data, and how should it react to growing public concerns? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Scammers are targeting teens with these nasty tricks

A 14-year-old committed suicide after following the advice of an AI chatbot. Another family is suing the same one — Character AI — after it told an autistic 14-year-old to kill his parents. It also exposed an 11-year-old to sexual content.

These stories are heavy reminders that young people are especially vulnerable on the internet, but AI isn’t the only thing targeting them.

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA

The fine folks at the FBI’s crime division say teens lost 2,500% more money to scams over a recent five-year stretch. Compare that to an 805% increase for seniors, which is still not great, but at least it’s not 2,500%.

So, why teens? Because thieves have more ways than ever to target them. Talk to anyone in your circle born between 1996 and 2010 about this. It’s a big deal.

I share smart tech news and tips you can use every single day. Join 600K readers who get The Current.

The most prevalent scams and tricks

Under the influence: Say a kiddo in your family idolizes an online influencer. That person is so easy to impersonate. All a fraudster has to do is set up a phony account that looks real, run a contest and trick "winners" into handing over their personal details (or more) to claim their (nonexistent) prizes. Done and done.

Pro tip: Stick to "official" influencer accounts with substantial follower counts. A smaller account is almost always a scammer, not some secret one. And never give financial info or money to someone via DM.

‘Hey there, handsome’: This is a classic for a reason. Scammers grab pictures of an attractive teen or 20-something and play digital Casanovas. All too soon, they profess their love — then comes the request for money, gifts or info.

Pro tip: Try a reverse image search to see if those pics pop up elsewhere online. If the person refuses to video call or meet you in person, it’s a bad sign.

RELATED: Deepfakes are so easy to make. Talk to your kids.

‘Send me a photo’: This is the dangerous intersection of smartphones, sexting and scammers. Someone shares sexy pictures and asks for some in return. As soon as the victim sends a pic or video, everything changes.

AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER

The person on the other end is now blackmailing them. Pay up or they’ll share the content with everyone the victim knows. Think about how horrifying that would be at any age, but especially as a teenager. I spoke to a family that lost their son to suicide after this happened to him. Such a heartbreaking story, and they’re not alone; this is way too common.

Pro tip: Talk to your kids about sending pictures to others online. Urge them to never share anything explicit, even with someone they know in person and trust. It’s just not worth it.

‘You won!’ … Not": This one targets younger teens. A thief tricks them into revealing credit card details or downloading malware under the guise of rewards in their favorite game.

Pro tip: This one’s easy. Only ever buy apps or make in-app purchases through an official app store — no trades and nothing "private."

So, what can you do?

The internet is an incredible resource for learning, creativity and fun, but let’s not sugarcoat it: there are dangers out there. Scammers and predators have become experts at manipulation, and kids can easily fall victim. The most important thing you can do as a parent? Foster open, honest communication.

When my son was younger, I shared age-appropriate stories about what he might encounter online. We talked about the risks in a way he could understand. He knew that if anything or anyone made him feel uncomfortable, he should come to me immediately, no questions asked.

DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT’S TOO LATE

That’s the foundation: trust. Kids need to know that they won’t get in trouble for being fooled. Today’s online predators are sneaky, and scammers know exactly how to win a child’s trust. If your child is targeted, it’s never their fault. 

Here’s my free tech safety contract you both can sign if you’re not sure where to start the conversation around tech limits.

Action plan for parents

Remember when you had a fake driver’s license or told a little white lie to get what you wanted? Kids have ways around parental controls and are smart enough to spin the birth year wheel when signing up to get around age restrictions. 

RELATED: Best apps and gadgets to monitor your kid (from preschool to teens)

Set clear ground rules for screen time and device use, and keep the conversation going as they grow. A few simple steps to take:

The best protection is being your child’s go-to resource for help and guidance. Let your kids know you’re there, ready to listen, no matter what. That’s the real safety net.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

Google Maps is deleting location history soon, so act now to save your data

Google is rolling out significant changes to its Maps Timeline feature, which tracks your location history. As part of this update, you will soon receive notifications that your Timeline data will be automatically deleted after a specific deadline unless you take action to back it up. This transition represents a shift towards enhanced privacy as Google plans to store Timeline data locally on your device instead of on its servers. While this change aims to protect your data from unauthorized access, it also means that any unbacked location history may be permanently lost.

GET SECURITY ALERTS, EXPERT TIPS, SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE

Google Maps' location-tracking feature, known as Timeline, is undergoing a major update. Previously, Google announced plans to shift this data to local storage. Now, the company is sending out emails alerting you to this upcoming change.

Google will start deleting the last three months of Timeline data unless you take action. While this shift to local storage offers more privacy for those concerned about sharing location data with Google, it also means that if you don’t act, your past location history may be permanently lost.

After receiving the notification, you will have about six months to save or transfer your Timeline data before it’s deleted. The email will be sent by "Google Location History," with the subject line: "Keep your Timeline? Decide by [date]."

Keep in mind that not everyone has received these notifications yet, so there’s no immediate rush. But once you get the email, you'll have a six-month window to decide.

HOW GOOGLE MAPS IS GIVING YOU MORE POWER OVER YOUR LOCATION DATA

There are several compelling reasons why users may want to save their Google Maps Timeline data.

Personal memories: The Timeline feature allows you to revisit past trips and experiences, serving as a digital diary of places visited and routes taken. For many, these memories are valuable and worth preserving.

Travel planning: Accessing historical location data can aid in future travel planning. You can analyze previous trips to make informed decisions about destinations, accommodations and activities based on past experiences.

Safety and security: Keeping a record of locations visited can be beneficial for personal safety. In case of emergencies or disputes, having a detailed history of movements can provide crucial information.

Data ownership: With the shift to local storage, you have greater control over your data. Saving this information ensures that it remains accessible and private without relying on cloud services that may be vulnerable to breaches.

Avoiding loss: Google has indicated that any unbacked location history will be deleted after the transition. Those of you who wish to retain your data must act promptly to prevent permanent loss.

BRUSSELS SPROUTS CHRISTMAS TREE LIGHTS UP SCIENCE

If you've received the above email or simply want to make sure your Timeline data is preserved, here’s what you can do:

1) Google’s Timeline export tool:

2) Google is rolling out a feature that allows you to export your Timeline data directly from your devices. To use it:

On your phone or tablet:

On your computer:

Keep in mind that this backup will be specific to that device, so you may need to repeat the process on other devices you use.

Note: Some users have reported their data being deleted even after they requested not to lose anything. To avoid this, we recommend regularly backing up your Timeline data.

THIS GOOGLE MAPS TRICK CAN SUPERCHARGE YOUR ABILITY TO NAVIGATE DIRECTIONS

While this update may help you avoid sharing location data with Google, it's important to remember that Google collects personal data in other ways as well. Here are some additional steps you can take to protect your privacy.

1) Turn off location data on Google: This prevents Google Photos from estimating where your photo was taken. Here’s how to do it.

On your phone or tablet:

2) Disable facial recognition: Sharing your facial data with Google puts you at risk of the company collecting information without your consent, potentially sharing it with third parties and using it in ways you may not be aware of. Here’s how to turn it off.

3) Delete your YouTube history: Google tracks your YouTube viewing history and suggests videos based on your past activity. While this can be convenient for discovering similar content, it can also feel like an intrusion on your privacy. Here’s how to end it.

On desktop:

On mobile:

4) Use a VPN: A virtual private network (VPN) can significantly enhance your privacy when using Google Maps and other online services. Here's how it helps:

To use a VPN with Google Maps:

Important caveat: While using a VPN can enhance your privacy, it may interfere with Google Maps’ ability to provide accurate directions. This is because a VPN may route your connection through a server in a different location, causing the app to misidentify your current position. If you need precise navigation or directions from your current location, consider temporarily disabling the VPN while using Google Maps to ensure accurate results.

Pro tip: For maximum privacy, combine the use of a VPN with Google Maps’ incognito mode. This ensures that your searches and location data aren’t tied to your Google account, providing an added layer of anonymity.

Recommended VPN Services: To find the best VPNs that work across devices like Windows, Mac, Android and iOS, check out my expert reviews of top VPN software. These reviews highlight options that prioritize privacy, speed and reliability.

6 WAYS TO TAKE BACK YOUR PRIVACY ON GOOGLE

Google’s decision to delete location history after three months is a big move toward giving you more control over your data and offering improved privacy by storing information locally. As privacy concerns grow, it's encouraging to see companies like Google take steps toward greater transparency and user choice.

What other Google privacy concerns do you have? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

10 things you should never tell an AI chatbot

This is a heartbreaking story out of Florida. Megan Garcia thought her 14-year-old son was spending all his time playing video games. She had no idea he was having abusive, in-depth and sexual conversations with a chatbot powered by the app Character AI.

Sewell Setzer III stopped sleeping and his grades tanked. He ultimately committed suicide. Just seconds before his death, Megan says in a lawsuit, the bot told him, "Please come home to me as soon as possible, my love." The boy asked, "What if I told you I could come home right now?" His Character AI bot answered, "Please do, my sweet king."

DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARE

🎁 I’m giving away a $500 Amazon gift card. Enter here, no purchase necessary.

You have to be smart

AI bots are owned by tech companies known for exploiting our trusting human nature, and they’re designed using algorithms that drive their profits. There are no guardrails or laws governing what they can and cannot do with the information they gather.

When you’re using a chatbot, it’s going to know a lot about you when you fire up the app or site. From your IP address, it gathers information about where you live, plus it tracks things you’ve searched for online and accesses any other permissions you’ve granted when you signed the chatbot’s terms and conditions.

The best way to protect yourself is to be careful about what info you offer up.

Be careful: ChatGPT likes it when you get personal

THIS CRIME SHOT UP 400% — HOW TO PROTECT YOURSELF

10 things not to say to AI

Still relying on Google? Never search for these terms

Reclaim a (tiny) bit of privacy

Most chatbots require you to create an account. If you make one, don’t use login options like "Login with Google" or "Connect with Facebook." Use your email address instead to create a truly unique login.

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

FYI, with a free ChatGPT or Perplexity account, you can turn off memory features in the app settings that remember everything you type in. For Google Gemini, you need a paid account to do this. 

Best AI tools for search, productivity, fun and work

No matter what, follow this rule

Don’t tell a chatbot anything you wouldn’t want made public. Trust me, I know it’s hard.

Even I find myself talking to ChatGPT like it’s a person. I say things like, "You can do better with that answer" or "Thanks for the help!" It’s easy to think your bot is a trusted ally, but it’s definitely not. It’s a data-collecting tool like any other.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

How 1 man got scammed in seconds using Google

Online financial scams have become increasingly sophisticated, targeting unsuspecting individuals through various deceptive techniques. Cybercriminals exploit trust and create convincing scenarios to steal personal and financial information, often using well-known platforms like PayPal as their hunting ground.

Take Paul from Massachusetts, for example. He recently wrote to us about his disturbing experience. It serves as a cautionary tale about the dangers of online financial transactions. Here's his account in his own words.

"I wanted to sign up for PayPal and used Google to get the website. After the 'website' popped up, it asked me for the usual name, address, etc. and my credit card number with the expiration and 3-digit code. Almost immediately, I received a flash message from my credit card company asking if I made a purchase at a company in OKLA. I live in MA and had the card in my lap. The information was stolen, and a purchase was made almost immediately.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

"The credit card company tried to contact where the purchase was made but the telephone number was a fake. The thieves tried a second purchase which was declined as the credit card company closed my account. This all happened in a 10-minute span."

Paul, we're sorry to hear that this happened to you. Unfortunately, your experience is not uncommon, but by sharing your story, you’re helping others learn how to avoid similar scams.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Paul's unfortunate encounter with online fraud offers several important lessons. First, scammers have become adept at creating highly convincing fake websites that can easily fool unsuspecting users. These sites often mimic legitimate platforms down to the smallest details, making it crucial to verify the authenticity of any site requesting personal information.

Second, fraudulent transactions can occur with alarming speed once scammers obtain sensitive data. In Paul's case, the thieves attempted to make purchases within minutes of acquiring his credit card information.

Third, credit card companies have developed sophisticated systems to detect suspicious activity rapidly, which can help mitigate potential losses. Paul's credit card company quickly alerted him to the unauthorized transaction and took swift action to prevent further fraud.

Lastly, this incident underscores the critical importance of digital vigilance and careful online navigation. Always take the time to verify the authenticity of websites before entering any personal or financial information, especially when dealing with financial services or online payments.

BEWARE OF THIS LATEST PHISHING ATTACK DISGUISED AS AN OFFICIAL EMAIL SENT BY GOOGLE

Protecting your financial information online is crucial. Here are some important steps you can take to safeguard yourself against cyber threats:

Verify the website's authenticity: Before entering any personal information online, always double-check the URL of the website you're visiting. Look for "https://" at the beginning of the address and a padlock icon in the address bar, which indicates a secure connection. To ensure you're on the correct site, type the web address directly into your browser instead of relying on search engine results or clicking on links from emails.

Be wary of unsolicited communications: Legitimate companies will never send unsolicited emails asking for sensitive information. Avoid clicking on links in emails claiming to be from financial institutions, as these could be phishing attempts. Hover over the links to see the actual URL before clicking, as this can help you identify suspicious or misleading addresses. If you're unsure about a communication, log in to your account directly through the official website or app to check for any notifications or requests.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Use strong authentication methods: Enable two-factor authentication on all your financial accounts to add an extra layer of security. Create unique, complex passwords for each of your accounts, avoiding the temptation to reuse passwords across multiple sites. Consider using a reputable password manager to help you generate and store strong passwords securely.

Monitor your accounts regularly: Make it a habit to check your financial accounts frequently for any unauthorized activities or suspicious transactions. Set up alerts for transactions on your credit cards and online payment accounts so you can be immediately notified of any activity on your accounts.

Be cautious with personal information: Never share your passwords or answers to security questions with anyone, no matter how trustworthy they may seem. Be skeptical of any requests for personal information, especially those that create a sense of urgency. Legitimate organizations will not pressure you to provide sensitive data immediately.

Use secure payment methods: When making purchases from unknown sellers, use protected payment options that offer buyer protection. Consider using credit cards for online purchases, as they often provide better fraud protection than debit cards. If a website offers multiple payment options, choose the most secure method available.

Use caution with public Wi-Fi: Avoid using public Wi-Fi networks for financial transactions, as these can be easily compromised. If you must access financial accounts while away from home, use a secure VPN connection to protect against being tracked and to identify your potential location on websites that you visit. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

SCAMMERS EXPLOIT GRIEF WITH FAKE FUNERAL STREAMING ON FACEBOOK

1. Act quickly: If you suspect your information has been compromised, change your passwords immediately.

2. Contact the company: Report any suspicious activity to the security team of the affected platform.

3. Alert your bank: Notify your bank or credit card company about potential fraudulent activities.

4. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of my No. 1 pick is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

5. Report the incident: Forward suspicious emails to the appropriate authorities and delete them from your inbox.

6. Monitor your credit: Keep a close eye on your credit reports for any unauthorized activities.

HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

Protecting your financial information online is more crucial than ever. Paul's experience serves as a stark reminder of how quickly things can go wrong when we let our guard down. By following the guidelines outlined above and remaining vigilant, you can significantly reduce the risk of falling victim to online financial scams. Remember, when it comes to your financial information, it's always better to err on the side of caution. Take the extra time to verify websites, and be skeptical of unsolicited requests for information. Your financial security is worth the effort.

How do you think the responsibility for online security should be shared between individuals, companies and governments? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to factory reset your Android

Want to know how to factory reset your Android phone? Before handing over your old device, it's important to remove all traces of your personal information. This not only protects your privacy but also ensures the new owner receives a device in its original state, free from any of your custom settings or data. I've got you covered with a step-by-step guide to help you through the process, ensuring you don't miss a thing. Let's walk through it together. If you want to factory reset your iPhone, we'll take you through the steps here

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Before we dive in, remember this golden rule: back up your data. A factory reset wipes everything clean, so let's make sure your precious memories and important files are safe and sound.

Settings may vary depending on your Android phone’s manufacturer. 

Pro tip: You should charge your device to at least 70% before starting; you don't want your phone dying mid-reset.

BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2024

All right, let's get down to business. Here's how to factory reset your Android:

 Settings may vary depending on your Android phone’s manufacturer. 

Your phone will restart and begin the reset, which might take a few minutes. Once it's done, you'll see the initial setup screen, just like when your phone was brand new. Also, after a factory reset, you may need to sign in with the Google account previously linked to the device for security purposes.

TOP PHONE CHARGING CABLES THAT WILL SUPERCHARGE YOUR ANDROID DEVICES

OK, let’s say you want to factory reset your Android, but your phone is unresponsive, or you cannot access the settings. You can use "Recovery Mode."

Settings may vary depending on your Android phone’s manufacturer.

There you have it. By following these steps, you can successfully perform a factory reset on any Android device, ensuring a fresh start or preparing it for a new user. Once your device is clean, check out "Best ways to get rid of your old phone or tablet" for various options like trading it in for credit, donating to charity or recycling through certified e-waste programs.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Factory resetting your Android prepares your device for a new user or just starting fresh. Remember, it's a drastic measure that erases everything, so always back up your data first. Whether you're troubleshooting, starting fresh or passing your device on, now you've got the knowledge to do it right.

Have you faced any challenges with data security, and how did you overcome them? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to delete multiple emails at once on Android

Are you drowning in a sea of unread emails? 

Let’s cut through the digital clutter and help you delete multiple emails on your Android device at once. Before we get to the steps, there are some important things to consider. First, always ensure you’re not deleting important emails. Second, you'll need to back up important emails. 

Also, be aware that some email apps require you to delete emails in each folder separately. Finally, remember that some apps have different methods for bulk deletion.

So, we’ll cover the most common techniques. OK, let's get started.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

To back up important emails on an Android device, follow these steps:

Settings may vary depending on your Android phone’s manufacturer 

This will ensure your important emails and other data are safely backed up to your Google account.

BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2024  

Want to clear out those pesky emails all at once? Here's how:

Settings may vary depending on your Android phone’s manufacturer 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Settings may vary depending on your Android phone’s manufacturer 

TOP PHONE-CHARGING CABLES THAT WILL SUPERCHARGE YOUR ANDROID DEVICES  

Do you want to target emails from a specific sender? Here's a smart hack:

Settings may vary depending on your Android phone’s manufacturer

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Settings may vary depending on your Android phone’s manufacturer 

Dealing with an overflowing inbox doesn't have to be daunting. By following these steps, you'll be able to efficiently manage your emails and keep your Android device clutter-free. Remember to always back up important emails before you start deleting them, and stay mindful of the different methods for bulk deletion across various email apps. Clearing out those unread emails can make a world of difference in staying organized and reducing digital stress.

What features do you wish your email app had to make your life easier? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

❌