Normal view

Today — 22 February 2025Main stream

How Phished Data Turns into Apple & Google Wallets

18 February 2025 at 12:37

Carding — the underground business of stealing, selling and swiping stolen payment card data — has long been the dominion of Russia-based hackers. Happily, the broad deployment of more secure chip-based payment cards in the United States has weakened the carding market. But a flurry of innovation from cybercrime groups in China is breathing new life into the carding industry, by turning phished card data into mobile wallets that can be used online and at main street stores.

An image from one Chinese phishing group’s Telegram channel shows various toll road phish kits available.

If you own a mobile phone, the chances are excellent that at some point in the past two years it has received at least one phishing message that spoofs the U.S. Postal Service to supposedly collect some outstanding delivery fee, or an SMS that pretends to be a local toll road operator warning of a delinquent toll fee.

These messages are being sent through sophisticated phishing kits sold by several cybercriminals based in mainland China. And they are not traditional SMS phishing or “smishing” messages, as they bypass the mobile networks entirely. Rather, the missives are sent through the Apple iMessage service and through RCS, the functionally equivalent technology on Google phones.

People who enter their payment card data at one of these sites will be told their financial institution needs to verify the small transaction by sending a one-time passcode to the customer’s mobile device. In reality, that code will be sent by the victim’s financial institution to verify that the user indeed wishes to link their card information to a mobile wallet.

If the victim then provides that one-time code, the phishers will link the card data to a new mobile wallet from Apple or Google, loading the wallet onto a mobile phone that the scammers control.

CARDING REINVENTED

Ford Merrill works in security research at SecAlliance, a CSIS Security Group company. Merrill has been studying the evolution of several China-based smishing gangs, and found that most of them feature helpful and informative video tutorials in their sales accounts on Telegram. Those videos show the thieves are loading multiple stolen digital wallets on a single mobile device, and then selling those phones in bulk for hundreds of dollars apiece.

“Who says carding is dead?,” said Merrill, who presented about his findings at the M3AAWG security conference in Lisbon earlier today. “This is the best mag stripe cloning device ever. This threat actor is saying you need to buy at least 10 phones, and they’ll air ship them to you.”

One promotional video shows stacks of milk crates stuffed full of phones for sale. A closer inspection reveals that each phone is affixed with a handwritten notation that typically references the date its mobile wallets were added, the number of wallets on the device, and the initials of the seller.

An image from the Telegram channel for a popular Chinese smishing kit vendor shows 10 mobile phones for sale, each loaded with 4-6 digital wallets from different UK financial institutions.

Merrill said one common way criminal groups in China are cashing out with these stolen mobile wallets involves setting up fake e-commerce businesses on Stripe or Zelle and running transactions through those entities — often for amounts totaling between $100 and $500.

Merrill said that when these phishing groups first began operating in earnest two years ago, they would wait between 60 to 90 days before selling the phones or using them for fraud. But these days that waiting period is more like just seven to ten days, he said.

“When they first installed this, the actors were very patient,” he said. “Nowadays, they only wait like 10 days before [the wallets] are hit hard and fast.”

GHOST TAP

Criminals also can cash out mobile wallets by obtaining real point-of-sale terminals and using tap-to-pay on phone after phone. But they also offer a more cutting-edge mobile fraud technology: Merrill found that at least one of the Chinese phishing groups sells an Android app called “ZNFC” that can relay a valid NFC transaction to anywhere in the world. The user simply waves their phone at a local payment terminal that accepts Apple or Google pay, and the app relays an NFC transaction over the Internet from a phone in China.

“The software can work from anywhere in the world,” Merrill said. “These guys provide the software for $500 a month, and it can relay both NFC enabled tap-to-pay as well as any digital wallet. The even have 24-hour support.”

The rise of so-called “ghost tap” mobile software was first documented in November 2024 by security experts at ThreatFabric. Andy Chandler, the company’s chief commercial officer, said their researchers have since identified a number of criminal groups from different regions of the world latching on to this scheme.

Chandler said those include organized crime gangs in Europe that are using similar mobile wallet and NFC attacks to take money out of ATMs made to work with smartphones.

“No one is talking about it, but we’re now seeing ten different methodologies using the same modus operandi, and none of them are doing it the same,” Chandler said. “This is much bigger than the banks are prepared to say.”

A November 2024 story in the Singapore daily The Straits Times reported authorities there arrested three foreign men who were recruited in their home countries via social messaging platforms, and given ghost tap apps with which to purchase expensive items from retailers, including mobile phones, jewelry, and gold bars.

“Since Nov 4, at least 10 victims who had fallen for e-commerce scams have reported unauthorised transactions totaling more than $100,000 on their credit cards for purchases such as electronic products, like iPhones and chargers, and jewelry in Singapore,” The Straits Times wrote, noting that in another case with a similar modus operandi, the police arrested a Malaysian man and woman on Nov 8.

Three individuals charged with using ghost tap software at an electronics store in Singapore. Image: The Straits Times.

ADVANCED PHISHING TECHNIQUES

According to Merrill, the phishing pages that spoof the USPS and various toll road operators are powered by several innovations designed to maximize the extraction of victim data.

For example, a would-be smishing victim might enter their personal and financial information, but then decide the whole thing is scam before actually submitting the data. In this case, anything typed into the data fields of the phishing page will be captured in real time, regardless of whether the visitor actually clicks the “submit” button.

Merrill said people who submit payment card data to these phishing sites often are then told their card can’t be processed, and urged to use a different card. This technique, he said, sometimes allows the phishers to steal more than one mobile wallet per victim.

Many phishing websites expose victim data by storing the stolen information directly on the phishing domain. But Merrill said these Chinese phishing kits will forward all victim data to a back-end database operated by the phishing kit vendors. That way, even when the smishing sites get taken down for fraud, the stolen data is still safe and secure.

Another important innovation is the use of mass-created Apple and Google user accounts through which these phishers send their spam messages. One of the Chinese phishing groups posted images on their Telegram sales channels showing how these robot Apple and Google accounts are loaded onto Apple and Google phones, and arranged snugly next to each other in an expansive, multi-tiered rack that sits directly in front of the phishing service operator.

The ashtray says: You’ve been phishing all night.

In other words, the smishing websites are powered by real human operators as long as new messages are being sent. Merrill said the criminals appear to send only a few dozen messages at a time, likely because completing the scam takes manual work by the human operators in China. After all, most one-time codes used for mobile wallet provisioning are generally only good for a few minutes before they expire.

Notably, none of the phishing sites spoofing the toll operators or postal services will load in a regular Web browser; they will only render if they detect that a visitor is coming from a mobile device.

“One of the reasons they want you to be on a mobile device is they want you to be on the same device that is going to receive the one-time code,” Merrill said. “They also want to minimize the chances you will leave. And if they want to get that mobile tokenization and grab your one-time code, they need a live operator.”

Merrill found the Chinese phishing kits feature another innovation that makes it simple for customers to turn stolen card details into a mobile wallet: They programmatically take the card data supplied by the phishing victim and convert it into a digital image of a real payment card that matches that victim’s financial institution. That way, attempting to enroll a stolen card into Apple Pay, for example, becomes as easy as scanning the fabricated card image with an iPhone.

An ad from a Chinese SMS phishing group’s Telegram channel showing how the service converts stolen card data into an image of the stolen card.

“The phone isn’t smart enough to know whether it’s a real card or just an image,” Merrill said. “So it scans the card into Apple Pay, which says okay we need to verify that you’re the owner of the card by sending a one-time code.”

PROFITS

How profitable are these mobile phishing kits? The best guess so far comes from data gathered by other security researchers who’ve been tracking these advanced Chinese phishing vendors.

In August 2023, the security firm Resecurity discovered a vulnerability in one popular Chinese phish kit vendor’s platform that exposed the personal and financial data of phishing victims. Resecurity dubbed the group the Smishing Triad, and found the gang had harvested 108,044 payment cards across 31 phishing domains (3,485 cards per domain).

In August 2024, security researcher Grant Smith gave a presentation at the DEFCON security conference about tracking down the Smishing Triad after scammers spoofing the U.S. Postal Service duped his wife. By identifying a different vulnerability in the gang’s phishing kit, Smith said he was able to see that people entered 438,669 unique credit cards in 1,133 phishing domains (387 cards per domain).

Based on his research, Merrill said it’s reasonable to expect between $100 and $500 in losses on each card that is turned into a mobile wallet. Merrill said they observed nearly 33,000 unique domains tied to these Chinese smishing groups during the year between the publication of Resecurity’s research and Smith’s DEFCON talk.

Using a median number of 1,935 cards per domain and a conservative loss of $250 per card, that comes out to about $15 billion in fraudulent charges over a year.

Merrill was reluctant to say whether he’d identified additional security vulnerabilities in any of the phishing kits sold by the Chinese groups, noting that the phishers quickly fixed the vulnerabilities that were detailed publicly by Resecurity and Smith.

FIGHTING BACK

Adoption of touchless payments took off in the United States after the Coronavirus pandemic emerged, and many financial institutions in the United States were eager to make it simple for customers to link payment cards to mobile wallets. Thus, the authentication requirement for doing so defaulted to sending the customer a one-time code via SMS.

Experts say the continued reliance on one-time codes for onboarding mobile wallets has fostered this new wave of carding. KrebsOnSecurity interviewed a security executive from a large European financial institution who spoke on condition of anonymity because they were not authorized to speak to the press.

That expert said the lag between the phishing of victim card data and its eventual use for fraud has left many financial institutions struggling to correlate the causes of their losses.

“That’s part of why the industry as a whole has been caught by surprise,” the expert said. “A lot of people are asking, how this is possible now that we’ve tokenized a plaintext process. We’ve never seen the volume of sending and people responding that we’re seeing with these phishers.”

To improve the security of digital wallet provisioning, some banks in Europe and Asia require customers to log in to the bank’s mobile app before they can link a digital wallet to their device.

Addressing the ghost tap threat may require updates to contactless payment terminals, to better identify NFC transactions that are being relayed from another device. But experts say it’s unrealistic to expect retailers will be eager to replace existing payment terminals before their expected lifespans expire.

And of course Apple and Google have an increased role to play as well, given that their accounts are being created en masse and used to blast out these smishing messages. Both companies could easily tell which of their devices suddenly have 7-10 different mobile wallets added from 7-10 different people around the world. They could also recommend that financial institutions use more secure authentication methods for mobile wallet provisioning.

Neither Apple nor Google responded to requests for comment on this story.

Before yesterdayMain stream

Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

13 February 2025 at 09:00

Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong. 

While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device. 

The issue also affects those downloading apps from the Google Play Store.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.

One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.

Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.

The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.

The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.

We reached out to Apple for a comment but did not hear back before our deadline. 

Apple has removed the 11 iOS apps mentioned in Kaspersky's report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple's policies, resulting in the termination of their developer accounts.

Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library. 

The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.

In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A Google spokesperson tells CyberGuy: 

"All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services."

However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Here’s why:

HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android

4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.

5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities. 

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.

Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Nolte: Most YouTube Viewing Now Occurs on TV

11 February 2025 at 13:45

More people now watch YouTube on their television than their phones, tablets, laptops, or desktop computers.

The post Nolte: Most YouTube Viewing Now Occurs on TV appeared first on Breitbart.

Super Bowl Fumble: Google Rushes to Edit Out Bogus Info from Big Game AI Ad

8 February 2025 at 15:09

Google has egg on its face as it rushes to edit an advertisement for the Gemini AI tool before its broadcast during the Super Bowl. The ad was found to contain false information about cheese consumption likely "hallucinated" by the bumbling tech giant's woke AI.

The post Super Bowl Fumble: Google Rushes to Edit Out Bogus Info from Big Game AI Ad appeared first on Breitbart.

MasterCard DNS Error Went Unnoticed for Years

22 January 2025 at 09:24

The payment card giant MasterCard just fixed a glaring error in its domain name server settings that could have allowed anyone to intercept or divert Internet traffic for the company by registering an unused domain name. The misconfiguration persisted for nearly five years until a security researcher spent $300 to register the domain and prevent it from being grabbed by cybercriminals.

A DNS lookup on the domain az.mastercard.com on Jan. 14, 2025 shows the mistyped domain name a22-65.akam.ne.

From June 30, 2020 until January 14, 2025, one of the core Internet servers that MasterCard uses to direct traffic for portions of the mastercard.com network was misnamed. MasterCard.com relies on five shared Domain Name System (DNS) servers at the Internet infrastructure provider Akamai [DNS acts as a kind of Internet phone book, by translating website names to numeric Internet addresses that are easier for computers to manage].

All of the Akamai DNS server names that MasterCard uses are supposed to end in “akam.net” but one of them was misconfigured to rely on the domain “akam.ne.”

This tiny but potentially critical typo was discovered recently by Philippe Caturegli, founder of the security consultancy Seralys. Caturegli said he guessed that nobody had yet registered the domain akam.ne, which is under the purview of the top-level domain authority for the West Africa nation of Niger.

Caturegli said it took $300 and nearly three months of waiting to secure the domain with the registry in Niger. After enabling a DNS server on akam.ne, he noticed hundreds of thousands of DNS requests hitting his server each day from locations around the globe. Apparently, MasterCard wasn’t the only organization that had fat-fingered a DNS entry to include “akam.ne,” but they were by far the largest.

Had he enabled an email server on his new domain akam.ne, Caturegli likely would have received wayward emails directed toward mastercard.com or other affected domains. If he’d abused his access, he probably could have obtained website encryption certificates (SSL/TLS certs) that were authorized to accept and relay web traffic for affected websites. He may even have been able to passively receive Microsoft Windows authentication credentials from employee computers at affected companies.

But the researcher said he didn’t attempt to do any of that. Instead, he alerted MasterCard that the domain was theirs if they wanted it, copying this author on his notifications. A few hours later, MasterCard acknowledged the mistake, but said there was never any real threat to the security of its operations.

“We have looked into the matter and there was not a risk to our systems,” a MasterCard spokesperson wrote. “This typo has now been corrected.”

Meanwhile, Caturegli received a request submitted through Bugcrowd, a program that offers financial rewards and recognition to security researchers who find flaws and work privately with the affected vendor to fix them. The message suggested his public disclosure of the MasterCard DNS error via a post on LinkedIn (after he’d secured the akam.ne domain) was not aligned with ethical security practices, and passed on a request from MasterCard to have the post removed.

MasterCard’s request to Caturegli, a.k.a. “Titon” on infosec.exchange.

Caturegli said while he does have an account on Bugcrowd, he has never submitted anything through the Bugcrowd program, and that he reported this issue directly to MasterCard.

“I did not disclose this issue through Bugcrowd,” Caturegli wrote in reply. “Before making any public disclosure, I ensured that the affected domain was registered to prevent exploitation, mitigating any risk to MasterCard or its customers. This action, which we took at our own expense, demonstrates our commitment to ethical security practices and responsible disclosure.”

Most organizations have at least two authoritative domain name servers, but some handle so many DNS requests that they need to spread the load over additional DNS server domains. In MasterCard’s case, that number is five, so it stands to reason that if an attacker managed to seize control over just one of those domains they would only be able to see about one-fifth of the overall DNS requests coming in.

But Caturegli said the reality is that many Internet users are relying at least to some degree on public traffic forwarders or DNS resolvers like Cloudflare and Google.

“So all we need is for one of these resolvers to query our name server and cache the result,” Caturegli said. By setting their DNS server records with a long TTL or “Time To Live” — a setting that can adjust the lifespan of data packets on a network — an attacker’s poisoned instructions for the target domain can be propagated by large cloud providers.

“With a long TTL, we may reroute a LOT more than just 1/5 of the traffic,” he said.

The researcher said he’d hoped that the credit card giant might thank him, or at least offer to cover the cost of buying the domain.

“We obviously disagree with this assessment,” Caturegli wrote in a follow-up post on LinkedIn regarding MasterCard’s public statement. “But we’ll let you judge— here are some of the DNS lookups we recorded before reporting the issue.”

Caturegli posted this screenshot of MasterCard domains that were potentially at risk from the misconfigured domain.

As the screenshot above shows, the misconfigured DNS server Caturegli found involved the MasterCard subdomain az.mastercard.com. It is not clear exactly how this subdomain is used by MasterCard, however their naming conventions suggest the domains correspond to production servers at Microsoft’s Azure cloud service. Caturegli said the domains all resolve to Internet addresses at Microsoft.

“Don’t be like Mastercard,” Caturegli concluded in his LinkedIn post. “Don’t dismiss risk, and don’t let your marketing team handle security disclosures.”

One final note: The domain akam.ne has been registered previously — in December 2016 by someone using the email address um-i-delo@yandex.ru. The Russian search giant Yandex reports this user account belongs to an “Ivan I.” from Moscow. Passive DNS records from DomainTools.com show that between 2016 and 2018 the domain was connected to an Internet server in Germany, and that the domain was left to expire in 2018.

This is interesting given a comment on Caturegli’s LinkedIn post from an ex-Cloudflare employee who linked to a report he co-authored on a similar typo domain apparently registered in 2017 for organizations that may have mistyped their AWS DNS server as “awsdns-06.ne” instead of “awsdns-06.net.” DomainTools reports that this typo domain also was registered to a Yandex user (playlotto@yandex.ru), and was hosted at the same German ISP — Team Internet (AS61969).

How to organize, protect and streamline your inbox with an email alias

30 January 2025 at 09:00

Almost everything you do online asks for your email. If you have been using the same one for a while, chances are hundreds or even thousands of services have it. They send promotional messages, social media alerts, newsletters and more, turning your inbox into complete chaos. You can tame this madness using an email alias.

An email alias helps declutter your inbox by organizing emails based on their purpose. For example, you can create specific aliases for shopping, newsletters or work and set up filters to sort these messages into separate folders automatically. 

Aliases also help manage spam. If an alias starts receiving too many unwanted messages, you can disable it without affecting your main email.

Let’s dive into how to create an email alias on different platforms, including Gmail, Outlook and iCloud. 

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Gmail doesn’t allow you to create a completely separate alias, but it offers workarounds using "+ addressing" or by adding dots to your existing email address. However, these methods don’t prevent an unscrupulous sender from seeing your primary address, so exercise caution when using them with untrusted correspondents. Follow the steps below to get started.

Use your existing Gmail address and add a "+" followed by any keyword before "@gmail.com."

Example: If your email is yourname@gmail.com, you can use:

No additional setup is needed, just start using this alias when signing up for services or sharing your email.

Gmail ignores dots (.) in email addresses, so you can create variations of your email:

Example: If your email is yourname@gmail.com, you can use:

All variations will deliver emails to your main inbox automatically.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

Outlook.com allows you to create additional email addresses (aliases) that are linked to your primary account. Emails sent to an alias will arrive in your primary inbox, and you can send messages using the alias as well.

If your primary email is johnsmith@outlook.com, you can create an alias like john.smith123@outlook.com. Emails sent to john.smith123@outlook.com will still go to johnsmith@outlook.com, but you can choose to send emails using either address.

Steps to create an alias:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once added, you can send emails using your alias by selecting it in the From field when composing a new message.

Important limitations to note:

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

Apple allows you to create up to three email aliases through iCloud. These aliases can be used for specific purposes, helping you manage your inbox effectively. Here’s how to create one:

It's important to note that you can still create up to three email aliases through iCloud. Remember that while these aliases provide some flexibility, they do not create separate Apple IDs or completely hide your primary iCloud email address.

BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

While many email providers offer basic alias functionality, most have significant limitations. Gmail's "+" addressing and dot tricks, Outlook's linked aliases and Apple's iCloud aliases all provide some flexibility, but they often fall short of true privacy protection.

For those of you seeking comprehensive email privacy and robust alias management, my No. 1 pick for private and secure email platforms contains no ads, no tracking and powerful privacy features like password-protected email and unlimited disposable email addresses. See my review of the best secure and private email services here.

Protecting your inbox from scammers requires a combination of smart practices and proactive tools. Using email aliases is an effective first step. By creating specific aliases for different activities, such as shopping, subscriptions or work, you can track where spam is coming from and deactivate problematic aliases as needed. Below are some other steps to take.

1. Avoid sharing your primary email address publicly on forums, social media or other platforms to minimize exposure. Most email providers offer robust spam filters, so ensure they are enabled and customize them as needed

GET FOX BUSINESS ON THE GO BY CLICKING HERE

2. Invest in personal data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

3. Enable two-factor authentication on all your email accounts to add an extra layer of security.

4. Be cautious of suspicious links and attachments. Never click on links or download attachments from unknown senders, as these could be phishing attempts.

5. Use strong antivirus software to protect against potential malware that might come through spam emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Regularly update your email password and make it strong and unique, avoiding common words or easily guessable combinations. Consider using a password manager to generate and store complex passwords.

These steps will provide a more comprehensive approach to protecting your inbox from scammers and reducing unwanted emails.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Taking charge of your inbox doesn’t have to be overwhelming. By implementing the tips and tools mentioned above, you’ll create a more secure, efficient and manageable email experience. Whether you’re battling spam or organizing your digital life, email aliases and secure services are great things to put into place.

Which email platform do you use most often, and how do you organize your messages there? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap

29 January 2025 at 05:00

A sophisticated phishing campaign exploiting Google Calendar has been uncovered by Check Point Software Technologies, raising alarms among cybersecurity experts. 

Cybercriminals are sending fake meeting invitations that appear legitimate, redirecting victims to phishing sites and mimicking Google's platforms to steal sensitive information. 

This emerging threat is particularly concerning given the widespread use of Google Calendar, which serves more than 500 million users globally in 41 languages. Researchers have identified nearly 4,000 phishing attempts in a matter of weeks, impersonating more than 300 reputable brands.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Hackers leverage the trust in Google's services to carry out their attacks. Victims receive seemingly authentic meeting invites via Google Calendar. Upon clicking links within these invites, they are taken to fake web pages that prompt them to input personal data. Once compromised, this information can be used for identity theft, financial fraud and unauthorized access to other accounts. Security experts warn that attackers are now using AI to craft highly convincing fake invitations, making it even harder to spot the fraud. Reacting to the findings from Check Point, a spokesperson for Google said:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

"We recommend users enable the 'Only If The Sender Is Known' setting in Google Calendar. This setting helps defend against this type of phishing by alerting the user when they receive an invitation from someone not in their contact list and/or they have not interacted with from their email address in the past."

ASK KURT: HOW TO NAVIGATE GOOGLE’S PRIVACY SETTINGS

Google has introduced the "known senders" feature in Google Calendar to combat sophisticated phishing attempts. This setting helps you filter out potentially malicious calendar invites. Here's how to enable it:

This ensures that only events from contacts, your organization or previous interactions are automatically added to your calendar.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

HOW ONE MAN GOT SCAMMED IN SECONDS USING GOOGLE

To further protect yourself from phishing scams, follow these steps.

Scrutinize unexpected invites carefully: Examine the sender's details, including their name, domain and email address, for any inconsistencies or signs of spoofing.

Avoid clicking suspicious links or downloading attachments from unknown sources: Threat actors often embed malicious links in calendar invites that can lead to phishing websites designed to steal your personal information.

Use strong antivirus software: This provides an additional defense mechanism against malware and can help detect potential phishing attempts before they cause damage. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Enable two-factor authentication (2FA) for your Gmail account: 2FA adds an extra layer of security that can prevent unauthorized access, even if your credentials are compromised.

Keep your security settings up to date: Regularly review and adjust your calendar and email settings to protect against evolving phishing tactics.

HOW A WRONG GOOGLE SEARCH CAN COMPROMISE YOUR DATA AND BRING LAW ENFORCEMENT CALLING

As phishing tactics evolve, cybercriminals are exploiting trusted platforms like Google Calendar to bypass traditional security measures. This underscores the importance of user vigilance and proactive security practices. By enabling the "known senders" setting and implementing additional security measures, you can significantly reduce the risk of falling victim to calendar-based phishing scams.

What digital security challenges have you encountered recently? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

President Trump Signs Executive Order to Promote AI Innovation Free from Leftist Bias

24 January 2025 at 11:56

President Donald Trump signed an executive order on Thursday aimed at developing AI systems that are free from ideological bias and engineered social agendas. Scientific studies have demonstrated that essentially all popular AI chatbots show a leftist bias.

The post President Trump Signs Executive Order to Promote AI Innovation Free from Leftist Bias appeared first on Breitbart.

Google Says Joe Biden Left Off List of Presidents Due to 'Data Error'

24 January 2025 at 10:27

Google has blamed a "data error" for the temporary omission of former President Joe Biden from search results for U.S. presidents.

The post Google Says Joe Biden Left Off List of Presidents Due to ‘Data Error’ appeared first on Breitbart.

How to manage photos, videos on new laptop with limited space

20 January 2025 at 09:00

We recently received an email from Sylvia, who just got a new laptop that has significantly less space than her old laptop. She emailed us wondering how to store photos and videos on a computer with only 82GB of storage space:

"The newer laptop does not have as much storage space (indicates 82.1 GB free of 225GB) as the old one (indicates 322 GB free of 446 GB). What is the best way to store my photos and videos to free up space on the new laptop?"

Great question, Sylvia. This is a common issue for anyone who has purchased a lightweight laptop such as a Chromebook or Windows-based ultrabook. Fortunately, there are a few easy ways to store files off your hard drive.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

82 GB should be more than enough for basic tasks like web browsing, using office applications or streaming video. However, if you plan to store large files such as high-resolution photos, videos or games, or if you’re using software that requires a lot of space, 82GB might fill up quickly. Here’s a rough breakdown of how much space different types of files typically take:

It's also important to leave enough space on your computer for the operating system to run smoothly. As a rule, keep at least 10%-15% of your hard drive free to prevent application slowdowns. An external hard drive is an excellent option for storing photos and videos to free up space on your new laptop. Another great way to save space is by storing your photos in cloud storage. Whether it’s a hard drive or cloud space, having a backup is a good idea.

As you can see from the breakdown above, photos and videos can take up a significant amount of storage space on your laptop. If you are a photographer who deals with RAW images, this amount could be even higher, as with video professionals who work with 4K content.

Even if you're not a video professional or photographer, having a lot of home videos and photographs can take up a lot of space. You will need a secondary storage solution with less than 100GB of space left. Here are a few options you might consider.

BEST LAPTOPS FOR 2025

An external hard drive is one of the most practical and reliable solutions for expanding your laptop's storage capacity, especially if you have many media files like photos, videos or other data-intensive content. These portable storage devices connect to your computer via USB (and increasingly via USB-C for faster transfer speeds), offering the flexibility of storing and backing up massive amounts of data without consuming your laptop's internal space.

There are two main types of external hard drives: HDD (hard disk drive) and SSD (solid state drive). HDDs are typically more affordable and come in larger capacities (up to several terabytes), making them an excellent option for those needing vast storage space on a budget. However, their mechanical components make them slightly slower in data transfer speeds and more prone to physical damage.

SSDs, on the other hand, are faster, more durable and lighter, though they tend to be more expensive per gigabyte of storage than HDDs. SSDs are ideal if you frequently transfer large files, work with high-resolution media like 4K videos or require speedy access to your data. They are also less prone to damage from drops or movement, which makes them perfect for on-the-go use.

External hard drives come in various sizes, from modest capacities like 256GB to massive options exceeding 10TB. The amount of storage you need will depend on the types of files you’re dealing with. For example, a 1TB drive can store over 200,000 high-resolution images if you need space for photos. A larger capacity drive might be necessary for video files, especially HD or 4K, as these files can easily consume tens or even hundreds of gigabytes.

BEST DESKTOPS COMPUTERS FOR 2025

One key advantage of external hard drives is their portability. Compact and easy to carry, they provide an excellent solution for photographers, videographers or anyone needing access to large files while moving. Some models are designed to be ultra-durable, with rugged, shockproof and waterproof features, ideal for outdoor and travel use.

Many professionals label and organize their drives by project or period, allowing for easy archiving and retrieval. As mentioned earlier, a simple organizational system, such as labeling your drives with the dates or types of content they contain, can help keep your data structured and easily accessible. This is especially important when you accumulate multiple drives over time. See Kurt's picks for the best external hard drives here.

Cloud storage services like Google DriveDropbox and Microsoft OneDrive offer convenient, flexible options for storing large files without consuming your laptop's limited space. These services allow you to securely store your photos, videos and documents in the cloud, freeing up valuable storage on your device. One significant advantage of cloud storage is accessing files from any device with an internet connection, whether on your phone, tablet or another computer.

Most cloud services provide a certain amount of free storage (typically between 2GB and 15GB) before upgrading to a paid plan. For instance, Google Drive offers 15GB of free storage shared across Google services, while Dropbox provides 2GB for free with options to upgrade for more space. OneDrive provides 5GB for free, but Microsoft users can get additional storage through Office 365 subscriptions, granting access to the Microsoft Office suite.

Additionally, cloud storage services come with features like automatic syncing and backup, making it easier to organize and safeguard your files. This can be particularly helpful for large photo and video libraries, which can be set to upload automatically from your phone or computer. With features like file versioning and collaboration tools, cloud platforms offer more than just storage. They enhance productivity and allow seamless file sharing with friends, family or colleagues.

Finally, many cloud storage providers offer encryption and other security measures to protect your files for added peace of mind. However, it would always be best to take extra precautions, such as enabling two-factor authentication and using strong, unique passwords, to ensure your data is safe. Kurt's favorite cloud services can be seen here.

iCloud offers 5GB of free storage to all users, which is sufficient for basic services like iCloud Keychain, testing other features and storing some files. However, for users who need more storage, iCloud+ subscriptions are available. These plans include:

iCloud is tightly integrated with Apple devices, making it highly convenient for Apple users. Files stored on the desktop and in documents folders on Macs are automatically synced to iCloud Drive, which is especially useful for devices with limited storage space like the MacBook Air. iCloud Drive can also be accessed from Windows machines through a dedicated file folder and files can be managed via icloud.com.

iCloud provides robust automatic syncing and backup features. iCloud Backup automatically backs up important data on iPhones and iPads when connected to power and Wi-Fi, ensuring that your device's data is always up to date. This backup can be used to restore your device or set up a new one seamlessly.

iCloud uses 128-bit AES encryption to secure all files. Additionally, iCloud+ subscriptions include advanced privacy features such as iCloud Private Relay, which protects your browsing history and identity, Hide My Email, which generates random email addresses, and Custom Email Domains for personalized email addresses.

While iCloud is highly user-friendly for Apple users, it can be less reliable and glitchy for non-Apple users. Collaboration is limited to Apple users, but files can be shared and accessed across different Apple devices using the Files app on iOS and iPadOS, the Finder on Mac or File Explorer on Windows PCs.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

When storing your photos, videos and other important files, it's crucial to prioritize data security. Here are some essential steps to protect yourself and your valuable information.

1) Use strong passwords: Create unique, complex passwords for all your accounts and devices. Consider using a password manager to generate and store secure passwords.

2) Enable encryption: Encrypt your external hard drives and cloud storage accounts to add an extra layer of protection to your data.

3) Implement two-factor authentication (2FA): Enable 2FA on all accounts that offer this feature, especially for cloud storage services.

4) Install and maintain strong antivirus software: Use a strong antivirus program and keep it updated to protect against malware and other security threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5) Regularly update your operating system and applications: Keep your devices and software up to date to ensure you have the latest security patches.

6) Be cautious with public Wi-Fi: Avoid accessing sensitive information when connected to public networks or use a VPN for added security. Using a VPN (virtual private network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

7) Back up your data regularly: Create multiple backups of your important files, including at least one offline copy.

8) Use secure file transfer methods: When sharing files, use encrypted transfer methods or password-protected links.

By following these steps, you can significantly enhance the security of your data and protect yourself from potential cyber threats.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Managing storage on a laptop with limited space requires thoughtful planning, especially when dealing with large files like photos and videos. While 82GB may be sufficient for basic tasks, media files can quickly add up. By leveraging external hard drives or cloud storage services, you can keep your laptop running efficiently while ensuring that your important files are safely stored and accessible. Whether you opt for physical or cloud-based solutions, remember to prioritize data security using strong passwords and encryption where necessary. With the right strategy, you can make the most of your laptop's storage without sacrificing performance or losing precious memories.

Do you have a way of storing photos and videos that we didn't mention? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Who's really behind that random strange text from nowhere?

19 January 2025 at 05:00

These days, our phones are constantly buzzing with notifications, and it's becoming increasingly difficult to distinguish between legitimate messages and potential scams. Bill from Mesa, Arizona, recently shared an experience that highlights this growing concern:

"Twice in the last week I've received texts supposedly sent elsewhere. The last one asked if I was 'available tomorrow evening.' I did not recognize the number but am active in an old people park so receive many calls and texts from unfamiliar numbers. I texted back that my wife thought we were available. A few minutes later, a text came asking if I was Mrs. Amy. I texted that I wasn't Mrs. Amy and had never been, but it was a problem. 

"A return text came thanking me for being so polite and the texter's appreciation for polite people and if I were ever in LA, I would be welcome to a backyard BBQ. Looking back, there were a couple more texts ending with ‘I like to make friends with polite people.’ The first text which I deleted was in a very similar vein and format. Is this a scam and why, for what?"

Bill's experience is not unique. Many people receive similar messages that seem harmless at first glance but could potentially be part of a more sinister scheme. Let's dive into the world of text message scams and learn how to protect ourselves.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Text message scams, also known as "smishing," a combination of SMS and phishing, have become increasingly sophisticated. Scammers use various tactics to engage potential victims and gain their trust. Here are some common elements:

Unfamiliar numbers: The message comes from a number you don't recognize. For instance, you receive a text from +1-555-123-4567, a number not in your contacts.

Unsolicited contact: The text arrives unexpectedly, often with a friendly or urgent tone. Example: "Hey! Long time no see. How have you been?"

Personal touch: The scammer might use your name or reference a common activity to seem legitimate. Example: "Hi Sarah, it's Mike from the book club. Are you coming to the meeting next week?"

Too good to be true: Offers of prizes, invitations, or other enticing propositions are common. Example: "Congratulations! You've won a $500 gift card. Click here to claim your prize!"

Requests for information: The scammer may ask for personal details, either directly or indirectly. Example: "This is your bank. We need to verify your account. Please reply with your account number and PIN."

Remember, these are all examples of potential scams. Always be cautious when receiving unexpected messages, especially those asking for personal information or containing suspicious links.

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

In Bill's case, the scammer employed a "long-play" strategy. By engaging in friendly conversation and offering invitations, the scammer aims to build trust over time. The end goal could be:

Phishing for information: Gradually collecting personal details that can be used for identity theft.

Malware distribution: Eventually sending a link that, when clicked, installs malicious software on your device.

Financial scams: Building trust to eventually request money or financial information.

HOW TO EASILY ACTIVATE AUTO-REPLY FOR TEXT MESSAGES ON IPHONE AND ANDROID

To protect yourself from text message scams, follow these steps:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

If you believe you've received a scam text, here are six steps to follow:

1. Don't respond: Avoid engaging with the scammer to prevent further attempts.

2. Block the number: Use your phone's built-in blocking features to prevent further contact.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Report the message: Forward the suspicious text to 7726 (SPAM). Also, report it directly to the FTC at ReportFraud.ftc.gov.

4. Keep your information safe: Never click on links or provide personal information in response to unsolicited texts.

5. Have strong antivirus software: Install and run strong antivirus apps on your phone to scan for malware and ensure your device is secure. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6. Invest in personal data removal services: Consider using a data removal service to eliminate your personal information from data broker sites. These services can help reduce spam, decrease the risk of identity theft and clean up your online presence by automating the removal of your data from hundreds of data broker sites.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

While it's natural to want to be polite, as Bill was, remember that your safety and personal information are paramount. Trust your instincts, verify unfamiliar contacts and never hesitate to ignore or block suspicious messages. Remember, a true friend won't mind if you take extra steps to verify their identity, and a legitimate organization will have official channels for communication.

How have you or someone you know been affected by text message scams, and what steps did you take to protect yourself? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter 

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

5-minute cleanup for your phone and computer

13 January 2025 at 15:25

Digital junk piles up faster than clutter in real life. There are files you don’t need, all those random screenshots, apps you downloaded and used once, and blurry photos clogging up your camera roll.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

It all adds up, slowing your devices down and making everything feel messy. The good news? Cleaning it up is easier than you think. Let’s do a quick declutter that will make you say, "Ahhh, that feels better."

Step 1: Update your devices

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA

There are too many dangerous bugs out there to skip security patches.

Start with your phone

Scroll through your app list and delete any you’re not using anymore. If it’s been months, you’re not going to use it. Trust me. And even if you do want it later, great, download it again. 

YOUR SSN IS ON THE DARK WEB — HERE’S WHAT TO DO ABOUT IT

While you’re at it, move the apps you want to spend less time using (Instagram for me) off your phone’s home screen. You can hide the app or just move it to another page or folder.

On iPhone: 

On Android: 

TECH TIP: SAVE YOUR MEMORIES BEFORE IT’S TOO LATE

On iPhone or iPad, the Photos app makes this a breeze. 

On an Android, open the Files by Google app, select Clean, then:

Onto your computer

Here’s the quick and dirty way. Create a new folder, then drag all the random files, screenshots and whatever else into it. 

Pro tip: Sensitive documents have no place on your desktop. If you do insist on saving private docs locally, at least give a snoop a more challenging time by naming the folder something off-base like "Vacation Photos." Be sure your computer automatically locks when you’re away and requires a password on startup, too.

Quick lock: For Windows, hit the Windows key + L. On a Mac, use Ctrl + Cmd + Q.

They take up a decent amount of space, so regularly clear out anything you’re not using. Beyond that, outdated apps could put you at risk. By keeping old programs on your computer, you’re potentially leaving a door wide open for cybercriminals to slip in.

On a Windows PC:

On a Mac:

Don’t forget the outside

We’re aiming for quick, so let’s tackle those fingerprint-covered screens.

On your phone, remove the case and accessories. You want to reach every nook and cranny. For a computer monitor, dust the back top, sides and any ledges that collect dirt before you start cleaning.

A microfiber cloth works, but I prefer screen-cleaning wipes. They’re just so easy. Skip paper towels. They’re too rough for delicate jobs like this.

I always come back to this 210-pack of screen cleaning wipes. Use them on smartphones, tablets, monitors, TVs, remote controls and even glasses. They’re scratch-free and made with anti-static tissue that cleans without leaving behind streaks or lint.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

AI isn’t going anywhere: Prompts to make life easier

10 January 2025 at 19:20

I was having dinner with my husband in Paris. We got the wine menu and all the names, of course, were in French. Barry wanted something equivalent to a Napa cabernet, so I took a picture of the menu and asked ChatGPT. In seconds, it recommended a wine. I double-checked with the waiter, and he gave it a thumbs-up.

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

You might think AI is just for businesses, programmers, or the ultra tech-savvy, but it’s not. It’s for anyone willing to give it a try.

AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER

Instead of ignoring this powerful tool, make this the year you embrace AI. It’s easier and more helpful than you think.

Let’s start with the basics

"So, uh, where do I find ChatGPT?" I get that in my email every day. Use it on the web or download it for iPhone or Android

The free tier works for most people. I pay $20 a month for ChatGPT Plus. It’s worth it to me for access to the better features and faster response times. Start with free. If you find yourself relying on your favorite AI tool regularly, consider upgrading. It is worth considering.

ChatGPT isn’t the only option, but it is my preference (at least for now) and the most popular. You can also try Google GeminiPerplexity and Claude.

With all these, the workflow is the same. Think of it like Google, but instead of punching in one search term and scrolling through results, you have a "conversation" with the bot to get exactly the output you want. 

Like any tool, you need to use AI wisely and triple-check its results. Trust me, you don’t want to end up like those lawyers who used AI to draft court documents, only to have the judge catch the glaring mistakes. 

BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?

You’ve heard of prompts, right?

This is what we call the text, question or command you provide an AI system to guide its response or action. It’s your instruction on what you want, so the better your prompt, the more useful and accurate the response will be.

"Priming" is the insider term for telling a chatbot exactly what you want from it. With ChatGPT or any other, the more constraints you give, the better your answer. Examples: "Limit your response to 250 words," "Give me the list in bullet points," "Format the results as a table," "Use this data to create a bar chart."

Remember, AI can’t read your mind. It only knows what you tell it. Use "do" and "don’t" in your prompts to get the results you want. Say you’re cooking for friends, and some have allergies. Say, "Create a recipe for six people. Do include protein, fruits, vegetables and carbs. Don’t include dairy products, shellfish or nuts."

7 prompts to make life easier

Make your goals actionable: "I have a goal for 2025 to [fill in the blank]. Can you help me make it SMART?" (SMART is an acronym for Specific, Measurable, Assignable, Realistic and Time-related.) Maybe you’re not there yet. Try this: "I want to [fill in the blank], but it feels overwhelming, and I don’t know where to start. Can you help me by breaking it down into more manageable tasks?"

"Give me 10 more examples": That’s a prompt I use with ChatGPT all the time to make the chatbot a better brainstorming buddy. Some of its "ideas" are downright bad, but it might spark something creative in your brain, too.

"How can I make this better?" Add in anything you’ve written — a blog post, a travel plan, a resume or even a heartfelt email. This prompt works wonders for polishing your work and pointing out improvements, like a personal editor at your fingertips.

DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT’S TOO LATE

Your very own free assistant: Say you have messy notes from a meeting. By hand, you’d spend 15 minutes turning those into an email fit for your boss or team. Instead, open a chatbot and say, "Turn these notes into a professional, friendly email to my team." Paste your notes at the end and voila. Pro tip: Ask your bot of choice, "Is there anything that needs more details?" to fill in any missing info.

Shortcut your inbox: When you get a really long email, open your AI chatbot of choice, and type in the prompt, "Summarize this email for me. Tell me what I need to do, then write a thoughtful reply. Here is the email." Paste in the email and let AI do its magic.

Wanna get in shape? Ask your AI to create a custom fitness plan. Try this: "Create a 30-day fitness plan for fat loss and muscle gain tailored to a [male/female] beginner at [your age]." Or get specific: "Create a four-week fitness plan to help me run a mile for the first time." Don’t sweat it.

Spouse forgot to load the dishes again? Instead of firing off a rage-filled text, let AI step in. Ask your fave chatbot to reframe your frustration into something a bit more … constructive. I like this prompt: "Make this message sound more friendly." 

Don’t forget about privacy

It's easy to think your bot is a trusted ally, especially when it’s pumping out helpful answers all day long. But it’s definitely not. It’s a data-collecting tool like any other.

Be smart about what you say. Never type in passwords, sensitive financial data, or confidential work or business information. My rule of thumb: Don’t tell a chatbot anything you wouldn’t want made public. 

With a free ChatGPT or Perplexity account, you can turn off memory features in the app settings that remember everything you type in. For Google Gemini, you need a paid account to do this. 

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 

Lost your contacts on your phone? Here's how to get them back

7 January 2025 at 08:00

As high-tech and advanced as all our modern mobile devices are, there's no way of getting around basic user errors. Luckily, the makers of your mobile devices kept such errors in mind. That is why we were eager to respond to Lynne's question about how to restore a deleted contact on your mobile device.

"I must have ‘FAT’ fingers, as I accidentally deleted information in my contacts. I had typed in a couple of other contact phone numbers. But guess I accidentally deleted these. I would [like] to get this information back. I am guessing I am asking for a miracle." — Lynne P. of Lakewood Ranch, Florida

There are several options or methods to restore your contact information on an iPhone or Android, so it is easy to find a solution that should work for you.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Luckily, the makers of iPhones and Android phones understood that mistakes happen and contacts can be erased by accident. Below are ways to restore your contacts on an iPhone or Android phone:

There are two resources for iPhone owners in order to restore contacts: via iCloud or iTunes Backup. Before attempting to restore your contacts, back up your iPhone so you have recourse if you lose data.

Restore contacts with iCloud:

WHICH IPHONE 16 IS RIGHT FOR YOU? DISCOVER YOUR PERFECT MATCH

Restore contacts with iTunes:

If you have not enabled iCloud to back up your contacts, you may be able to restore contacts with iTunes.

4 WAYS TO FIND YOUR LOST IPHONE, WITH AND WITHOUT OTHER DEVICES

There are two resources Android users can use to restore contacts: Google Contacts or Device settings. Before attempting to restore your contacts, back up your Android so you have recourse if you lose data.

Restore contacts with Google Contacts:

Settings may vary depending on your Android phone’s manufacturer.

Restore contacts with Device Settings:

 Settings may vary depending on your Android phone’s manufacturer. 

Please note: Only contacts that aren't already on your phone will be restored.

FIRST THINGS TO DO IF YOU GOT A NEW ANDROID

While it is ideal if you never make a mistake while using your mobile devices, accidents do happen and contacts do get deleted accidentally. That’s why the makers of iPhones and Android devices have multiple ways you can restore contacts on your phone. Following these easy steps outlined above gives you the ability to rectify that situation quickly. It is best to make sure that your mobile devices are being backed up either to the cloud or physically to a computer or hard drive backup so that there is a source from which to restore your contacts. Additionally, should anything go awry when you're doing the restoration process, you have the ability to recover lost data. Accidents happen, but practicing safe data hygiene prevents them from becoming a lost cause or needing a miracle.

Have you ever accidentally deleted a contact on your mobile device? How did you recover that contact information? Are your contacts backed up anywhere? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Hacked Chrome extensions put 2.6 million users at risk of data leak

6 January 2025 at 08:00

Your web browser is an ecosystem of its own. It stores your passwords, search history, financial details like credit card numbers, addresses and more. Just like how malicious apps and services can compromise data on your phone or PC, malicious extensions can expose the data stored in your browser. 

There are a ton of extensions out there that do more harm than good. In fact, security researchers have just found a dangerous new campaign that is going after browser extensions. So far, around 36 extensions have been compromised, putting over 2.6 million Chrome users at risk of having their browsing data and account credentials exposed.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Hackers are exploiting browser extensions as a gateway to steal sensitive user data through a variety of methods. These compromised extensions are exposing over 2.6 million users to data exposure and credential theft, as reported by The Hacker News

One common attack involves phishing campaigns targeting the publishers of legitimate extensions on platforms like the Chrome Web Store. In these campaigns, attackers trick developers into granting permissions to malicious applications, which then insert harmful code into popular extensions. This code can steal cookies, access tokens and other user data.

The first company to shed light on the campaign was cybersecurity firm Cyberhaven, one of whose employees were targeted by a phishing attack on December 24, allowing the threat actors to publish a malicious version of the extension.

Once these malicious extensions are published and pass the Chrome Web Store's security review, they are made available to millions of users, putting them at risk of data theft. Attackers can use these extensions to exfiltrate browsing data, monitor user activity and even bypass security measures such as two-factor authentication.

In some cases, developers themselves may unknowingly include data-gathering code as part of a monetization software development kit, which stealthily exfiltrates detailed browsing data. This makes it difficult to determine whether a compromise is the result of a hacking campaign or an intentional inclusion by the developer.

MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

The browser extension security platform Secure Annex has launched its own investigation into this hacking campaign. So far, it has uncovered over twenty additional compromised extensions, which are listed below. If you have any of the compromised extensions listed in Secure Annex's investigation installed on your browser, it’s essential to remove them immediately to protect your data.

Keeping these extensions installed is a serious risk since hackers can still access your data even if the malicious version has been taken down from the Chrome Web Store. Secure Annex is still investigating and has shared a public Google Sheet with details about the malicious extensions it has found so far, like whether they’ve been updated or removed. They’re also adding new extensions to the list as they discover them.

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

If you have installed one of the above-mentioned extensions on your browser, remove it as soon as possible. To remove an extension from Google Chrome, follow these steps:

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

1) Verify emails and links before clicking: Many attacks begin with phishing emails that impersonate trusted entities like Google Chrome Web Store Developer Support. These emails often create a false sense of urgency, urging you to click on malicious links. Always verify the sender’s email address and avoid clicking on links without double-checking their authenticity. When in doubt, go directly to the official website rather than using a provided link.

2) Use strong antivirus software: Having strong antivirus software is an essential line of defense against malicious software. These tools can detect and block malicious code, even if it has been embedded in browser extensions. The best way to safeguard yourself from malicious links that install strong malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Limit extension permissions: Be cautious about the permissions you grant to browser extensions. Many require access to sensitive data like browsing history, cookies or account information, but not all requests are necessary. Review what each extension asks for and deny permissions that seem excessive. If possible, opt for extensions with limited access to ensure your data remains protected.

4) Limit the number of extensions: Only install extensions that are genuinely needed and regularly review and uninstall those no longer in use.

5) Keep your browser updated: Always update your browser to the latest version. Updates often include critical security patches that protect against vulnerabilities exploited by malicious software. Using an outdated browser increases the risk of being targeted by attacks that could have been prevented with a simple update. Enable automatic updates to ensure you’re always protected. If you are unsure how to update your browser, check out my detailed guide for Google Chrome.

6) Regularly audit your extensions: Conduct periodic reviews of installed extensions and remove any that are unnecessary or pose potential security risks.

7) Report suspicious extensions: If you encounter a suspicious extension, report it to the official browser extension marketplace.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Hackers are getting smarter, and browser extensions have become a new favorite target for stealing sensitive data. The discovery of over 35 compromised Chrome extensions, putting 2.6 million users at risk, is a wake-up call for everyone. Removing suspicious extensions is an essential step to protect your data. This also puts Google’s Chrome Web Store review process under scrutiny, proving that even trusted platforms can be exploited. 

How often do you review and remove unused or suspicious browser extensions? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

It is easier than ever to disable Location Sharing on your Android phone

6 January 2025 at 05:00

Privacy is a growing concern, especially regarding location tracking. Google has taken steps to enhance your control over location sharing on your Android, making it simpler for you to manage who can see your whereabouts. Let's dive into this new feature that Google is rolling out and how you can utilize it effectively. (iPhone users, follow these tips)

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Google has introduced a new "Google Location Sharing" toggle that is now integrated directly into the Android settings. This update eliminates the need to navigate through Google Maps to manage your Location Sharing preferences. The new feature is part of the latest updates to Google Play Services and is designed to simplify and enhance your control over location sharing.

Before you toggle this off, let’s take a moment to understand why you might want it on and what happens when you turn it off.

Imagine this: You’re meeting a friend in a busy city, and instead of sending a dozen texts back and forth, they can simply see your real-time location on Google Maps. That’s the power of location sharing. It allows you to share your exact position with specific contacts, along with useful details like your device’s battery level or your estimated arrival time if you’re navigating.

But when location sharing is off, your movements stay private. No one can track where you are, and your personal information is better protected from potential misuse. Apps and services lose access to your location data, which not only boosts your privacy but can also save battery life by cutting down on background tracking.

So, before deciding, think about what fits your needs best: staying connected or staying private.

BEST ANTIVIRUS FOR ANDROIDS - CYBERGUY PICKS 2025

The feature is primarily available on Android smartphones, including popular models from brands such as the Google Pixel series (e.g., Pixel 6, Pixel 7), Samsung Galaxy series (e.g., Galaxy S21, Galaxy S23) and other manufacturers that run stock or near-stock Android versions. Certain Android tablets that support the latest versions of the operating system may also have access to this feature. The Location Sharing toggle is part of recent updates to the Android OS, specifically through Google Play Services. You should ensure your devices are running at least Android 12 or later to access this functionality effectively.

BEST VPNs FOR ANDROIDS

Ready to upgrade? Here's how to do it, but first back up your device data (just in case):

Settings may vary depending on your Android phone’s manufacturer.

ANDROID BANKING TROJAN MASQUERADES AS GOOGLE PLAY TO STEAL YOUR DATA

Settings may vary depending on your Android phone’s manufacturer. 

This new feature not only simplifies turning off location sharing but also enhances privacy management by providing transparency about who can track you. You can now feel more secure knowing you have control over your shared information, which is particularly beneficial in situations where privacy is paramount.

Location sharing can be very useful for coordinating meetups, ensuring safety during travel or simply letting loved ones know you've arrived safely. Now, we have shown you how to disable location sharing, but here’s how you can share your real-time location with trusted contacts using Google Maps when Use Location is toggled on.

Remember that people you share your location with can always see:

They may also see other info depending on how you're sharing. Learn more about Location Sharing.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Google's new "Google Location Sharing" toggle, now integrated into Android settings, simplifies and enhances your control over location sharing. With this feature, Google is striking a balance between convenience and robust privacy management, making it a welcome improvement for Android users.

Have you ever had a situation where turning your location sharing on or off was crucial? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

The step I take to clear my inbox every January

3 January 2025 at 13:09

Right now, I’m sitting here beaming because my inbox is empty. Really! Did I read and reply to every single message? Well, no. I’m not an "Inbox Zero" person. Watch this quick video if you have no clue what that means.

Before I took back control, I had 409 unread emails. But I have a trick to starting each year with a clean slate. You can do it, too!

Win a pair of $329 Ray-Ban Meta smart glasses. Enter here, no purchase necessary!

THE BIGGEST WI-FI MISTAKE YOU DIDN’T KNOW YOU WERE MAKING

Clear out your inbox

You could try sorting your emails into a maze of folders, but who has the time for that? Here’s a surprisingly easy fix to start the new year right: Archive your inbox. It’s like a magic wand for your digital clutter!

What’s email archiving, you ask? Picture this: A digital vault where every email you’ve ever sent or received is safely stored, complete with attachments. No more scrolling endlessly through a jam-packed inbox!

So, are you ready to beat the email bloat? Here’s your quickstart guide to mastering your inbox with the power of archiving.

Steps to archive emails in Gmail

Gmail will take some time to process your request, so be patient. You may have to do this step a few times to get everything.

Once you’ve archived a message, you can hit All Mail to the left, under "Inbox" and your other email folders, to find it. Search by a term you know was in the email or by the sender.

Filters 101: How to sort your Gmail like a pro

Using Apple Mail? Here’s what to do

SCAMMERS ARE TARGETING TEENS WITH THESE NASTY TRICKS

How to archive emails in Microsoft Outlook

Outlook doesn’t put archived messages into a separate folder. Instead, they’ll go straight to a data file you can access whenever you want.

You’ll see emails disappear from your inbox and subfolders. Find them again under the "Archives" heading.

RELATED: How to make sure emails you want to see don’t end up lost in spam

Got a Yahoo email? Here’s what to do

Want to take a message out of the archive? Open the "Archive" folder, tap on the email you want and select Restore to Inbox.

Smart tech how-to: Save precious voicemails and text messages

Worried you missed something? 

Archiving isn’t the same as deleting. It’s like putting stuff in a storage box. Even if you archive emails, they can be subpoenaed for legal cases. I don’t give legal advice, so consult a lawyer if you have any questions.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

❌
❌