Normal view

Before yesterdayMain stream

How to delete multiple text messages on a Mac and iPad

12 February 2025 at 05:00

Are you overwhelmed by the sheer volume of text messages cluttering your Mac or iPad? You're not alone. 

Many users find themselves endlessly scrolling through conversations, searching for important information or simply trying to declutter their digital space. 

Fortunately, Apple has provided ways to manage your messages more efficiently. Let's dive into how you can delete multiple messages on both your Mac and iPad, helping you regain control of your messaging app. Here are steps to bulk delete text messages on an iPhone or an Android.

GET SECURITY ALERTS + EXPERT TECH TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

If you're using a Mac, follow these steps to delete multiple messages at once:

BEST ANTIVIRUS SOFTWARE FOR YOUR MAC & IPAD

If you're using a Mac, follow these steps to delete multiple messages within a conversation at once:

This method is particularly useful when you need to remove several messages from a lengthy conversation without deleting the entire thread.

HOW TO KNOW WHEN IT'S TIME TO REPLACE YOUR MAC

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

HOW TO FILTER AND SORT EMAILS ON YOUR IPHONE AND IPAD

To prevent future clutter, consider setting up automatic message deletion:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

This setting will automatically remove older messages, keeping your conversations manageable.

Note: Deleting messages from your Mac does not delete them from other Apple devices unless you have Messages in iCloud enabled. To check if Messages in iCloud is enabled on your Mac:

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Managing message clutter can feel like a never-ending battle. While these tips won't magically solve all your digital chaos, they'll definitely help you take back control of your Messages app. A little effort now means less scrolling and more breathing room later. And hey, who doesn't love a clean, organized digital space that doesn't make you want to pull your hair out? Just remember, your messages are meant to connect you, not stress you out.

Tell us the most frustrating digital communication challenge you have and how we might be able to help. Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Identify any mystery caller for free with this phone number lookup tool

8 February 2025 at 05:00

Got an unknown number that's been driving you nuts? 

We totally get it. 

Those random calls on your cellphone can be seriously frustrating. And now you can fight back with a simple, free solution. In just a few easy clicks, you'll go from feeling annoyed to being in total control, uncovering exactly who's behind that mysterious phone number.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

The TruePeopleSearch.com website works with both landline and cellphone numbers. It allows you to do a reverse phone lookup for any type of phone number, whether it's a cellphone or a landline. It's important to note that the availability and completeness of information can vary depending on the specific number and its associated public records. 

However, in most cases, with just a few simple steps, you'll go from "Who the heck is calling me?" to "Aha! Now I know exactly who this is." Note that you can also search by name, address and email, as well, but for our example, we'll use a phone number. 

AN ALARMING SPIKE IN SCAM CALLS ORIGINATING FROM ROBOCALLS

Grab your preferred device — be it a computer, smartphone or tablet. Any browser will do, so launch Chrome, Safari or whatever you're comfortable with. Type in truepeoplesearch.com in your browser's address bar. The layout might vary slightly depending on your device, but don't worry — the functionality remains the same.

TOP 10 ROBOCALL HOTSPOTS IN AMERICA

Now, type in that perplexing phone number that's been nagging at you. Hit the search button and watch the magic unfold.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Prepare to be amazed by the wealth of information at your fingertips. Click the "View Details" button next to or under the actual search results, depending on your device. You might discover the person's name, age, date of birth, current address or previous addresses, as well as email addresses, relatives, friends, associates and more. It's astounding how much data a simple phone number can unlock.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Now, beware of Sponsored Links that might try to lure you into signing up for other services.

While TruePeopleSearch.com can be a helpful tool, not every phone number search will yield comprehensive results. The information available varies depending on several factors:

Always use this service responsibly, respect individual privacy and understand that results may be incomplete or vary significantly between different phone numbers.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Try searching for your own phone number. You might be surprised at the amount of information that pops up. If you're uncomfortable with the information available about you, consider investing in a personal data removal service to have that information taken down. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

This free tool empowers you to take control of solving the mystery of who is calling you. No more wondering about unknown callers or potential spam. With just a few clicks, you can unmask the mystery and decide whether to answer, ignore or block that call.

How do you usually handle unknown callers? Have you ever used a reverse phone lookup tool before? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels for the latest tech tips and tricks:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

How to easily transfer files and photos off a computer to your hard drive

4 February 2025 at 05:00

Is your computer gasping for breath, drowning in a sea of photos, documents and random downloads? We've all been there: that moment when your computer feels like it's about to burst at the seams, threatening to crash your system and lose those precious memories. Today, I'll walk you through steps to transfer files and free up space so you can breathe easily and keep your Mac or PC running smoothly.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

First things first, you'll want to use an external hard drive you already have or purchase a new one. External hard drives offer massive storage for all your digital memories. My favorites are small, portable drives with no moving parts called SSDs, or solid-state drives. When selecting an external hard drive, consider these key factors.

HOW TO MANAGE PHOTOS AND VIDEOS ON A NEW LAPTOP WITH LIMITED SPACE

Once you have your external drive, plug it right into your computer using a USB cable to make sure it's securely connected.

If you're using a Mac, here's how to transfer your files:

HOW TO TRANSFER PHOTOS AND VIDEOS FROM YOUR EXTERNAL HARD DRIVE AND APPLE DEVICES

For Windows users, follow these steps:

Your files are now safely stored on your external drive.

After transferring your files to an external drive or cloud storage, it's important to note that the original files still remain on your computer. To effectively free up space, follow these steps:

Delete Original Files

On Mac:

On Windows:

Empty the Trash/Recycle Bin

On Mac:

On Windows:

Remember, simply moving files to a new drive doesn't automatically delete them from the source. You need to manually remove them and empty the trash/recycle bin to fully reclaim space on your original drive. Always double-check that you have a secure backup of your files before permanently deleting them.

FIRST 10 THINGS TO DO IF YOU GOT A NEW PC

If you're not into the manual method and prefer a more automated approach, there are other transfer solutions available:

Cloud storage services like iCloud, Google Drive and Dropbox let you upload files and access them from anywhere. These services offer automatic syncing and backup, making file transfer and storage more convenient. Popular options include Microsoft OneDrive, Proton Drive and IDrive. Get Kurt’s favorite cloud services here.

Windows users can utilize the built-in File History feature to automatically back up files to an external drive. This is suitable for a small number of folders but may be time-consuming for large quantities of data.

For faster and more efficient transfers, especially when dealing with large quantities of files, consider using professional backup software. These tools often provide features like automatic backups, file compression and encryption for added security.

For those looking to move data between cloud services, solutions like MultCloud offer seamless file transfer and synchronization between different cloud storage providers. If you have maxed out your iCloud storage, click here to discover what solutions are available.

ASK KURT: DO YOU NEED TO ENCRYPT YOUR SENSITIVE CLOUD DATA?

No more digital clutter, no more stress. You've got this file transfer thing down pat. Whether you choose the manual method for more control or opt for cloud storage for convenience, the key is to regularly back up your important files. Remember, it's not just about freeing up space on your computer. It's about protecting your digital memories and important documents. As we move into 2025, the landscape of digital storage continues to evolve. With advancements in SSD technology, cloud services and data transfer speeds, managing your digital life has never been easier. So go ahead, start that transfer and enjoy the peace of mind that comes with a well-organized digital life.

Have you ever lost important files or photos? Tell us your worst digital storage nightmare in the comments below. Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

15 January 2025 at 09:00

Apple’s Macs are generally considered more secure than Windows PCs, but they are not immune to hackers. Numerous incidents demonstrate that Macs are not impenetrable, and a new one has recently been added to the list. Security researchers have discovered a new variant of stealer malware that targets browser credentials, cryptocurrency wallets and other personal data. I reported on this malware in 2024 as well. Previously, it relied on macOS browser extensions to steal data. Now, it uses phishing websites and fake GitHub repositories to target Macs, which have a user base of 100 million people.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Cybersecurity company Check Point has discovered a new variant of info-stealer malware, BanShee. Elastic Security Labs first highlighted this malware in mid-2024, noting that it operates as malware-as-a-service, a business model in which cybercriminals provide access to malicious software and related infrastructure for a fee. At that time, it was available for as much as $3,000 per month.

Check Point says this malware evolved in September after being exposed. This time, its developers had "stolen" a string encryption algorithm from Apple’s own XProtect antivirus engine, which replaced the plain text strings used in the original version. Since antivirus programs expect to see this kind of encryption from Apple’s legitimate security tools, they weren’t flagged as suspicious, allowing the BanShee to remain undetected and quietly steal data from targeted devices.

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

BanShee Stealer is a prime example of how advanced malware has become. Once it’s on a system, it gets straight to work stealing all kinds of sensitive information. It goes after data from browsers like Chrome, Brave, Edge and Vivaldi, as well as cryptocurrency wallet extensions. It even takes advantage of two-factor authentication (2FA) extensions to grab credentials. On top of that, it collects details about the device’s software and hardware, as well as the external IP address.

The Mac malware also tricks users with fake pop-ups that look like real system prompts, tricking victims into entering their macOS passwords. Once it has gathered the stolen information, BanShee exfiltrates it to command-and-control servers, using encrypted and encoded files to ensure the data remains secure.

The malware’s creators used GitHub repositories to spread BanShee. They set up fake repositories that looked like they hosted popular software, complete with stars and reviews, to seem trustworthy. These campaigns didn’t just target macOS users with BanShee. They also hit Windows users with a different malware called Lumma Stealer. Over three waves, the attackers used these fake repositories to trick people into downloading their malicious files.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Follow these essential tips to safeguard your Mac from the latest malware threats, including the notorious BanShee Stealer.

1) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2) Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

3) Keep your software updated: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

4) Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here; it generates and stores complex passwords for you, making them difficult for hackers to crack.

It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed password managers of 2025 here.

5) Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

No device is immune to cyberattacks when a human operator is involved. Take the BanShee Stealer, for example. It managed to target Macs not due to weak cybersecurity measures by Apple but because it successfully tricked users into installing it and granting the required permissions. Most breaches, hacks and other cyberattacks stem from human error. This highlights the importance of maintaining basic cybersecurity hygiene. It's crucial to know what you’re downloading, ensure it’s from a trusted source and carefully review the permissions you grant to any online service or application.

When downloading new software, how do you determine if it’s safe to install? Do you rely on app store ratings, reviews or something else? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to easily print photos from your phone

10 January 2025 at 00:00

Are you an aspiring Android or iPhone photographer? Both Android OS 15 and iOS 18 bring professional photography features to their new smartphones with advancements made in artificial intelligence-assisted photo processing and top-of-the-line digital camera sensors in the top-line smartphones.

Even if you don't enjoy taking photos directly from your smartphone, most cameras now allow you to instantly transfer pictures from a camera to a smartphone via Bluetooth

You can also print high-quality pictures from your phone, and it's surprisingly easy. Here are a few different ways to print a photograph from your smartphone.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Using a Wi-Fi-enabled printer

Many of the most popular printers available today feature Wi-Fi functionality, and if you have a Wi-Fi-enabled printer, you can print photographs directly from your phone. Most modern photo printers are fully wireless, allowing you to easily print photos directly from their Android or iOS smartphones. Check out my top printer picks here. Here's how to print from a wireless printer on both Android and iOS:

For iPhone:

For Android:

Settings may vary depending on your Android phone’s manufacturer.

Portable photo printers are handy for printing on the go. They usually connect via Bluetooth or Wi-Fi and come with apps for easy printing. Portable photo printers are a great idea if you want a compact photograph printer that's great for taking with you on trips. Many portable printers are small enough to fit in a travel bag and are battery-powered, so there's no wired setup necessary. Check on my picks for the best portable printers here.

TOP PRINTERS 2025

Using an online photo printing service

You can also use apps or websites like Shutterfly or Snapfish that offer photo printing services. Upload your photos, choose your print options, and have them delivered to your home or picked up at a local store. Similar services are also available at your local print shops or even at big-box stores such as Staples, which also provide high-quality poster and image printing. Using a print service and shop to process your photographs can be a great idea, as you can rest assured that your photographs are being printed on high-quality prints with great printers.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

4 WAYS TO PRINT OUT, SAVE, AND SEND YOUR IPHONE'S TEXT MESSAGES

Transferring photos to your computer

You can transfer your photos to your computer and print them from there using your home printer. This is a great option if you have an older printer or an older photo printer that doesn't support Wi-Fi. Here's a list of our printer recommendations. I recommend looking at the options for color printers that we've highlighted. We made the list for everyone, so we made sure to include printers that can print beautiful photographs with ease. Here's how to do it from an iPhone to your computer:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW TO PRINT, SAVE, AND SEND ANDROID TEXT MESSAGES

It's exciting to see how both Android and iPhone have stepped up their game in mobile photography. With all the cool AI features and top-notch camera tech, taking amazing photos is a breeze. Plus, printing those memories is super easy now, whether you're using a Wi-Fi printer, a portable one, or an online service.

What challenges have you faced while trying to capture or print your photos, and how did you overcome them? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Is your VPN enough without antivirus protection?

31 December 2024 at 07:00

As cyber threats continue to evolve and become more sophisticated, many people like yourself are seeking effective ways to safeguard their online presence. That includes Keith from Lisbon, Iowa, who asked, "If I have a VPN, do I still need an antivirus app?"

The answer is a resounding yes. While a VPN (virtual private network) provides crucial privacy and security benefits, it doesn't protect your device from malware, viruses or other cyber threats. Let's get into why you need both and how they complement each other to provide comprehensive digital security.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

To achieve comprehensive online security, it’s crucial to understand the distinct yet complementary roles that VPNs and antivirus software play in protecting your digital life.

A VPN is your first line of defense for online privacy and security. It works by:

1) Encrypting your internet connection: This makes it extremely difficult for hackers, ISPs or other third parties to intercept and read your data.

2) Masking your IP address: By hiding your real IP address, a VPN allows you to browse the internet anonymously, making it harder for websites and advertisers to track your online activities.

3) Bypassing geo-restrictions: VPNs can help you access content that might be blocked in your region, giving you more freedom online.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

While a VPN protects your online activities, antivirus software focuses on defending your device itself. Here's what antivirus does:

1) Malware detection and removal: Antivirus software scans your device for viruses, trojans, spyware and other malicious software, then removes or quarantines these threats.

2) Real-time protection: Modern antivirus programs continuously monitor your system, preventing malware from infecting your device in the first place.

3) Phishing protection: Many antivirus solutions include features that block malicious websites and warn you about potential phishing attempts.

WINDOWS FLAW LETS HACKERS SNEAK INTO YOUR PC OVER WI-FI

VPNs and antivirus software serve different but complementary purposes in your digital security arsenal.

VPNs secure your internet connection: They focus on protecting your data as it travels across the internet, ensuring your online activities remain private. Using a VPN service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

Antivirus protects your device: It guards against threats that could compromise your device's security, regardless of how they reach your system. Therefore, it's important to have strong antivirus software actively running on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

By using both a VPN and strong antivirus software, you create a robust defense system that protects both your online activities and your device itself.

CYBER SCAMMERS USE AI TO MANIPULATE GOOGLE SEARCH RESULTS

Remember, Keith and the rest of you: Cybersecurity is not about choosing between a VPN and antivirus; it's about leveraging both to create a multi-layered defense against the ever-evolving landscape of online threats. Combining these two powerful tools allows you to enjoy a safer, more secure and more private online experience.

What are your biggest cybersecurity concerns, and what specific help would you like from us to address them? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Sign PDFs easily in Preview on Apple devices

27 December 2024 at 05:00

Did you know that, in the U.S., electronic signatures are just as valid as your good old handwritten ones? Pretty cool, right? 

But if you’re scratching your head wondering how to get your digital John Hancock on those online documents, you’re not alone.

Don’t worry, I’ve got you covered. 

Below, you’ll find an easy step-by-step guide to help you add your digital signature to documents on your Apple devices without the hassle of printing, signing, and scanning. Let’s dive in. (Windows users, follow these steps.)

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

One of the many advantages of owning an iPhone is the ability to sign documents electronically, even when you're away from your laptop or desktop. Here’s a step-by-step guide on how to sign any PDF you receive.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

A program called Preview comes standard on every Mac computer. It is a great and free tool to view or edit photos and PDFs. In addition to being able to crop and rotate pictures using Preview, you can annotate your PDF and easily add a signature right on your Apple laptop or desktop computer.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

WHICH IPHONE IS RIGHT FOR YOU? DISCOVER YOUR PERFECT MATCH

To use your trackpad or mouse to digitally create your signature:

BEST TABLETS OF 2024

For this option, you will have to pull out a piece of paper and a pen and sign your name on the piece of paper, or if you have a hard copy of the document with your signature already on it.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

If you have both a Mac and an iPhone or iPad, this might be the easiest option:

Once you've created your signature on your iPhone, iPad or Mac, your new digital signature should be available across any of those devices that share the same Apple ID.

BEST ACCESSORIES FOR YOUR PHONE 

Gone are the days when signing your documents and getting them to the necessary parties was time-consuming and expensive. Because digital signatures are just as binding as handwritten signatures in most circumstances, using any of the methods to create an electronic signature helps get your important documents signed and emailed.

Do you have an electronic signature ready to go? If not, how will you create one? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

AI-powered deception: The sneaky macOS malware masquerading as your next video call

15 December 2024 at 09:00

Artificial intelligence (AI) is making life easier not just for us but also for cybercriminals. 

It is enabling them to create elaborate campaigns to deceive people, efforts that would otherwise take months. Security researchers have discovered a new info stealer malware that masquerades as video-calling software. Hackers have built a whole website and set up companies using AI to make the malware appear harmless. 

They have even created social media accounts to add an extra layer of legitimacy. People are tricked into installing malicious video-calling software, and once they do, it steals their personal data and cryptocurrency.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Cado Security Labs has uncovered a new, sophisticated scam targeting people. The scam involves a crypto stealer called Realst, which has versions for both macOS and Windows and has been active for about four months. 

The hackers behind this malware have gone all out, setting up fake company websites complete with AI-generated blogs, product content and social media accounts on platforms like Twitter and Medium. The company they're pretending to be is called "Meetio," though they've used different names in the past few months, including Clusee, Cuesee, Meeten and Meetone.

The scam works in a few different ways. Often, users are contacted on Telegram by someone pretending to be a friend or acquaintance. The scammers pitch a business opportunity and ask to schedule a call. In one case, the scammer even sent an investment presentation from the target's own company, making the scam feel more real and personal. Other victims report being on Web3-related calls, downloading the software and having their cryptocurrency stolen.

Once the scammer makes contact, the target is usually directed to the Meeten website to download the malicious software. But even before the malware is installed, the website has JavaScript that can steal cryptocurrency stored in web browsers. It’s a multi-step scam that’s designed to trick you.

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

Once victims are sent to the "Meeten" website, they’re given the option to download the software. The file they download contains a program called "fastquery," though other versions of the malware come as a different file type (DMG) with a multi-architecture setup.

When the victim opens the program, two error messages pop up. The first one says, "Cannot connect to the server. Please reinstall or use a VPN," and has a "continue" button. The malware also uses a macOS tool to ask the user for a password, a common trick in macOS malware.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

The malware then looks through various files on the victim's computer to find sensitive information, such as passwords and account details. It creates a folder to store this stolen data, then compresses it into a zip file. This zip file, along with some system data, is sent to a remote server. The server receives information like the system's build version, along with the stolen data.

Once the data is sent, the malware deletes any temporary files it created. The stealer is capable of grabbing sensitive information like Telegram credentials, banking card details and data from web browsers (like Google Chrome, Opera, Brave, Microsoft Edge, Arc, CocCoc and Vivaldi). It can steal things like saved passwords, cookies and browsing history.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

1. Verify sources before downloading software: Always ensure that you are downloading software from legitimate, trusted sources. Be cautious of downloading anything from links sent via unsolicited messages or emails, especially if they involve urgent requests or business opportunities.

The best way to safeguard yourself against malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my top picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Be cautious of unexpected contact: If you receive messages from unfamiliar contacts on platforms like Telegram or social media, especially those asking you to schedule calls or discuss business opportunities, verify the identity of the sender before taking any action. Cybercriminals often pose as friends or colleagues to gain trust.

3. Enable two-factor authentication (2FA): Use 2FA on your accounts, particularly for sensitive services like cryptocurrency wallets, banking and messaging apps. This adds an extra layer of protection in case your credentials are compromised.

4. Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords for different sites or services. A password manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed Password Managers of 2024 here.

5. Keep your software updated: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

6. Invest in personal data removal services: Consider services that scrub your personal information from public databases. This reduces the chances of your data being exploited in phishing or other cyberattacks after a breach and cuts down on the chances that potential attackers will find you or contact you in the first place. Check out my top picks for data removal services here. 

AI is enabling scammers to launch malicious campaigns at a scale we've never seen before, and it's likely to get worse as AI models continue to improve. This makes it crucial to have tools that can detect AI-generated content, helping people better protect themselves against these scams. In the meantime, rely on your common sense, watch out for red flags and only install software from reputable platforms. For video calls, stick to well-known and trusted platforms like Zoom, FaceTime, Google Meet and Webex. If someone sends you a random video call link, politely ask them to schedule the call using one of these trusted platforms instead.

Should companies be doing more to help users detect and protect themselves from AI-powered scams? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

12 easy, techy ways to make the holiday smoother

12 December 2024 at 15:53

Did you know if you turn an Amazon shipping bag inside out, there’s a strip you can pull to reseal it for returns? Good to know when a holiday gift arrives and it’s nothing like the picture online.

Enter to win a $500 Amazon gift card. No purchase required.

There are all kinds of little tips and tricks that can make the busiest time of year a little easier to manage. I’ve got your back.

DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARE

Shopping

Ho-ho-hope your packages arrive on time: Gmail’s package tracking now includes real-time updates. On your phone, tap Menu > Settings. Look for General settings (Android) or Data privacy (Apple) and toggle on Package tracking at the bottom.

Hide-and-seek: You’re shopping online for your kiddo or spouse and they walk in. Quick! Hide your open browser windows. On a PC: Windows key + M. (Use Windows key + Shift + to reopen.) On a Mac: Cmd + Option + + M. Phew, no spoilers.

Amazon’s secret 20% discount: Send your old tech to Amazon through its Trade-in Program and get a gift card for the value. They’ll take just about anything — it doesn’t even need to work. But if you trade in Amazon gear like a Kindle, eero or Fire TV Stick, you’ll get 20% off a new, qualifying device.

Drop the drop shippers: On Etsy, the whole purpose is to buy something handmade. If you’re not sure what you’re getting is legit, check if it’s genuine or mass-produced junk by doing a reverse image search. Click on the item’s image, then drag and drop it into Google Images. Major red flag: You see the exact same thing on other sites.

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

At home

Focus! Blurry pics are a bummer. Sometimes your phone’s cam picks the wrong spot. For a quick reset, tap the area on your screen you want to be the clearest. Easy and effective. No ruined family photos this year.

Related: Trick to take the best family portrait without a photographer

I’m B-side myself: Make a playlist with your fam so you’re not bickering over the music on Christmas morning. For Spotify, open the app, then head to Your Library and select the playlist. Tap the three dots in the top right > Share to send it. In Apple Music, go to Library > Playlists > three dots (upper right) > Share Playlist. Jingle all the way!

Family visiting? Keep your steamy romance novels on lock by creating a passkey for your Kindle. Tap the three dots (upper right) and go to Settings > Device Options > Device Passcode. Your passcode can be up to 12 digits long. That’s hot!

Related: It’s smart to lock your computer down, too

On the road

Flying away? Uber’s got three new features to make your airport trips easier. The first, UberXXL, gets you a bigger car with extra trunk space for groups. The second, UberX Share, allows you to pay 25% by sharing a ride with someone heading your way. It’s available now at select airports. And finally, with Uber Reserve, you can have a car waiting for you when you land.

3 SECURITY AND DATA CHECKS YOU SHOULD DO ONCE A YEAR

Synced your phone to a rental car? Wipe your data so the next driver doesn't get your texts. On the car’s infotainment system, go to Settings and look for a factory reset option. Every car’s system is different, so check the manual or ask the rental company if you can’t find it.

Over the river and through the woods: See the best time to leave for Grandma’s house (or anywhere else) without arguing. In Apple Maps, press the Now button on the left to open a calendar. In Google Maps, tap the three dots at the top right. For both, select Leave/Depart at or Arrive by and hit Done.

Track your luggage with your airline’s app: Open the app’s Menu > Track my bags. The naming will vary depending on the airline. Enter your reservation or tag number, and you’ll get updates along its journey. 

Or use a tracker: For me, this is the most reliable option. Apple’s AirTags are ideal if you have an iPhone, Mac or iPad. The Tile 2-pack is Android compatible and has a tracker for your luggage and one to slide into your wallet.

Related: There’s one place during your travels an AirTag won’t work

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

❌
❌