memoment editorial

1 how to stop impostor bank scams before they drain your wallet

How to stop impostor bank scams before they drain your wallet

NEWYou can now listen to Fox News articles!
Losing your life savings to fraud is not a distant fear; it is a real and growing risk. Scams involving criminals pretending to be bank representatives have surged, with the Federal Trade Commission (FTC) reporting record-breaking losses exceeding $2.9 billion in recent data. These criminals no longer rely on basic phone tricks. Instead, they use caller ID spoofing and artificial-voice software to sound like trusted professionals, often imitating real bank employees down to the smallest detail.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMSWhat impostor bank scams look likeScammers pretending to be from your bank follow a predictable yet terrifying pattern. They begin with an urgent phone call warning that your account has been compromised. The caller ID displays your bank’s real number, which builds instant trust. Impostor scams have become one of the fastest-growing crimes in America, costing victims billions each year. (Kurt “CyberGuy” Knutsson)Next, they instruct you to move your money into a so-called “safe” or “decoy” account while they “investigate” the issue. Their goal is to create fear and push you into action before you have time to think.One journalist reportedly learned this lesson the hard way when he answered what appeared to be a legitimate call from Chase Bank. After a series of convincing conversations with multiple “representatives,” he transferred nearly $30,000 to scammers. In another case, a 65-year-old caterer reportedly lost $162,000 when a friendly woman pretending to be a bank employee claimed her ATM card had been compromised. These stories are not rare; they reflect how sophisticated and believable modern scams have become.Why you and others are targetsBanks are trusted institutions, and scammers know it. That trust makes impersonation one of the easiest and most effective fraud tactics today. With spoofing tools, criminals can mimic real bank phone numbers and even use AI to reproduce familiar voices. Their approach is psychological: they create panic and urgency to make victims act quickly and irrationally.Older adults are particularly vulnerable. The FTC found that losses of over $100,000 to impostor scams among people aged 60 and older have skyrocketed, from $55 million in 2020 to $445 million in 2024. These numbers highlight how no one is immune to manipulation when fear and urgency collide. Criminals exploit fear, trust and technology to pressure victims into acting before they can think clearly. (Kurt “CyberGuy” Knutsson)9 smart tips to protect yourself from impostor scams Impostor scams move fast, but with the right precautions, you can stop them before they strike.1) Never trust caller ID aloneSpoofed numbers make a call appear as if it’s coming from your bank, even when it’s not.2) Hang up and call your bank using a verified numberDo not return calls using numbers given to you by the person who contacted you. Always call the number printed on your debit or credit card.3) Use a data removal service to protect your identityScammers often collect phone numbers, email addresses and other personal details from public records and data broker sites. Using a trusted data removal service helps wipe that information from the web, reducing the chances that criminals can use your data to impersonate you.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Scammers often pose as bank employees, using fake caller IDs and urgent stories to trick people into sending money. (Kurt “CyberGuy” Knutsson)Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com4) Your bank will never ask you to transfer moneyAny request to move funds “for protection” is a red flag for fraud.NATIONAL PROGRAM HELPS SENIORS SPOT SCAMS AS LOSSES SURGE5) Use strong antivirus softwareScammers often send fake links or pop-ups that install malicious programs on your device. A strong antivirus program can detect these threats, block phishing attempts and stop remote-access tools that give criminals control of your computer. Keeping your software updated adds another layer of protection against evolving scams.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.6) Never share verification codes or PINsBanks do not ask for your codes over the phone, text or email.7) Use call-blocking or scam-identifier appsAdding these tools to your phone can filter many spoofed calls before they reach you. Both iPhone and Android devices have built-in settings and apps that help you stop scam calls before you even pick up.If you use an iPhone:Go to SettingsTap AppsClick PhoneUnder Unknown Callers, click Silence to automatically block unsaved numbers that aren’t in your contacts.Android phones offer similar protection:Settings may vary depending on your Android phone’s manufacturer. Go to the Phone appClick SettingsTap Caller ID & SpamClick Filter Spam Calls, or you might be asked to toggle on Caller ID and spam protection, to automatically identify and block numbers flagged as potential scams.8) Pause if something feels urgent and frighteningScammers depend on panic. Taking a moment to breathe could save your savings.9) Report suspicious activity immediatelyIf you suspect a scam, contact your bank, file a complaint with the FTC at ReportFraud.ftc.gov and alert local law enforcement.What to do if you’ve been targetedIf you believe you have fallen victim, act quickly.1) Contact your bank and request a freeze or close monitoring of your accounts.2) File a report with the FTC and your local police department, even if you believe recovery is unlikely.3) Keep every piece of evidence, including phone records, text messages and transfer confirmations.4) Change all passwords and enable transaction alerts on every sensitive account to prevent further damage. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.5) Sign up with an Identity Theft Protection service that can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysFraud can strike anyone, anywhere, at any time. Scammers have become smarter, faster and more convincing than ever before. They use fear, urgency and technology to make their lies sound real. But you can fight back with knowledge and caution. Stay alert every time your phone rings or your inbox pings. Slow down before you react. Verify before you trust. The few seconds you take to double-check could be what saves your life savings. Remember, even the most tech-savvy people fall for scams when emotions take over. The real key to protection isn’t fear, it’s awareness and action. Share what you know with friends, family and coworkers. The more people who understand how these scams work, the harder it becomes for criminals to win.Are banks really doing enough to protect you from impostor scams? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

How to stop impostor bank scams before they drain your wallet Read More »

1 stop foreign owned apps from harvesting your personal data

Stop foreign-owned apps from harvesting your personal data

NEWYou can now listen to Fox News articles!
You might not think twice about that flashlight app you downloaded or the cute game your grandkids recommended. Yet with a single tap, your private data could travel halfway across the world into the hands of people who profit from selling it. A growing threat is emerging as foreign-owned apps quietly collect massive amounts of personal data about you, and older Americans are among the most vulnerable.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.The hidden cost of ‘free’ appsWe all love free apps. Whether it’s a shopping deal finder, a weather tracker or a photo editor, they make life easier. But many of these “free” tools aren’t really free; they just don’t charge you money. Instead, they collect your personal information and sell it to make their profit.A recent study revealed that over half of the most popular foreign-owned apps available in U.S. app stores collect sensitive user data, including your location, contacts, photos and even keystrokes. Many “free” apps secretly collect personal data from users, sending private information to foreign servers without consent. (Kurt “CyberGuy” Knutsson)Some of the worst offenders are apps that seem completely harmless:Flashlight and weather apps that track your GPS location 24/7.Shopping apps that collect purchase history, payment preferences and home addresses.Casual games that request access to your camera and contacts for no logical reason.These apps often share data with data brokers and ad networks overseas, where privacy laws are weaker and accountability is nearly impossible.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIAWhy retirees are prime targetsIf you’re retired, you may already be on dozens of public databases like voter rolls, real estate listings and charity donor lists. Combine that with information harvested from apps, and scammers can build a frighteningly detailed profile of your life. Flashlight, weather and shopping apps often request unnecessary access to your camera, contacts and location to track you around the clock. (Portra/Getty Images)They can see:Where you live and who lives with you.What medications you search for.What causes you support or charities you donate to.What devices you own and which banks you use.From there, they can craft highly convincing scams like fake donation requests, Medicare scams or phishing texts that look eerily personal. Some even use your social media photos to mimic family members in “grandparent scams.” And it all starts with what you allowed that “harmless” app to access.Signs your data might already be exposedYou don’t need to be a tech expert to spot the warning signs. Here’s what to look for:Unfamiliar charges or new accounts in your name.An increase in scam calls or texts, especially with personal details like your city or bank.Emails from foreign domains claiming to offer rewards or urgent account updates.Ads that seem to “read your mind,” which show up right after you talk about something offline.If you’ve noticed any of these, your information is likely circulating through data brokers who purchased it from app networks. Older Americans are prime targets, but simple steps like deleting risky apps and reviewing permissions can help protect your privacy. (Kurt “CyberGuy” Knutsson)How to stop the data drainYou can take back control of your data starting right now.1) Audit your appsGo through your phone and delete any apps you don’t use regularly, especially free ones from unfamiliar developers.2) Stop data brokers from trading your infoEven after deleting risky apps, your personal information may already be circulating online. This is where a data removal service can make a massive difference. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.comGet a free scan to find out if your personal information is already out on the web: CyberGuy.com3) Check permissionsOpen your settings and review which apps have access to your location, contacts or camera. Revoke any unnecessary permissions immediately.TEA APP HACKED AS WOMEN’S PHOTOS, IDS & EVEN DMS LEAKED ONLINE4) Avoid “foreign-owned” apps that request extensive access without a clear reason.Always read the privacy policy (yes, it’s tedious but eye-opening). If an app asks for permissions that do not match its purpose, like a calculator wanting your location or a flashlight needing camera access, that is a major red flag. Many foreign-owned apps hide behind vague privacy terms that allow data to be transferred to overseas servers where U.S. privacy laws do not apply.5) Use official stores onlyStick to the Apple App Store or Google Play Store for downloads. Avoid third-party sites that host cloned or tampered versions of popular apps. Look for verified developers and check privacy ratings in reviews before installing anything new.6) Keep your device and apps updatedUpdates close security holes that hackers exploit through malicious apps. Turn on automatic updates so your phone and apps stay protected without you having to remember.7) Turn off ad trackingLimit how much of your activity is shared with advertisers. On iPhone:Go to Settings → Privacy & Security→ Tracking and toggle off “Allow Apps to Request to Track.” On Android: (Settings may vary depending on your Android phone’s manufacturer) Go to Settings → Google → Ads (or Settings → Privacy → Ads) and choose “Delete advertising ID” or “Reset advertising ID.” This action removes or replaces your unique ID so apps and advertisers can no longer use it for personalized ad tracking.This step stops apps from following you across other platforms and building data profiles about your habits.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawayForeign-owned apps are the new front line in data harvesting, and retirees are the easiest targets. But you don’t have to accept that your private life is public property. It’s time to take back control. Delete the apps you don’t need. Lock down your permissions. And let a data removal service erase your data trail before scammers can use it against you.Have you checked which of your apps might be secretly sending your personal data overseas? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com. All rights reserved.  

Stop foreign-owned apps from harvesting your personal data Read More »

1 protecting kids from ai chatbots what the guard act means

Protecting kids from AI chatbots: What the GUARD Act means

NEWYou can now listen to Fox News articles!
A new bipartisan bill introduced by Sens. Josh Hawley, R-Mo., and Richard Blumenthal, D-Conn., would bar minors (under 18) from interacting with certain AI chatbots. It taps into growing alarm about children using “AI companions” and the risks these systems may pose.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. What’s the deal with the proposed GUARD Act?Here are some of the key features of the proposed Guard Act:AI companies would be required to verify user age with “reasonable age-verification measures” (for example, a government ID) rather than simply asking for a birthdate.If a user is found to be under 18, a company must prohibit them from accessing an “AI companion.”The bill also mandates that chatbots clearly disclose they are not human and do not hold professional credentials (therapy, medical, legal) in every conversation.It creates new criminal and civil penalties for companies that knowingly provide chatbots to minors that solicit or facilitate sexual content, self-harm or violence. Bipartisan lawmakers, including Senators Josh Hawley and Richard Blumenthal, introduced the GUARD Act to protect minors from unregulated AI chatbots. (Kurt “CyberGuy” Knutsson)The motivation: lawmakers cite testimony of parents, child welfare experts and growing lawsuits alleging that some chatbots manipulated minors, encouraged self-harm or worse. The basic framework of the GUARD Act is clear, but the details reveal how extensive its reach could be for tech companies and families alike.META AI DOCS EXPOSED, ALLOWING CHATBOTS TO FLIRT WITH KIDSWhy is this such a big deal?This bill is more than another piece of tech regulation. It sits at the center of a growing debate over how far artificial intelligence should reach into children’s lives.Rapid AI growth + child safety concernsAI chatbots are no longer toys. Many kids are using them. Hawley cited more than 70 percent of American children engaging with these products. These chatbots can provide human-like responses, emotional mimicry and sometimes invite ongoing conversations. For minors, these interactions can blur boundaries between machine and human, and they may seek guidance or emotional connection from an algorithm rather than a real person.Legal, ethical and technological stakesIf this bill passes, it could reshape how the AI industry manages minors, age verification, disclosures and liability. It shows that Congress is ready to move away from voluntary self-regulation and toward firm guardrails when children are involved. The proposal may also open the door for similar laws in other high-risk areas, such as mental health bots and educational assistants. Overall, it marks a shift from waiting to see how AI develops to acting now to protect young users. Parents across the country are calling for stronger safeguards as more than 70 percent of children use AI chatbots that can mimic empathy and emotional support. (Kurt “CyberGuy” Knutsson)Industry pushback and innovation concernsSome tech companies argue that such regulation could stifle innovation, limit beneficial uses of conversational AI (education, mental-health support for older teens) or impose heavy compliance burdens. This tension between safety and innovation is at the heart of the debate.What the GUARD Act requires from AI companiesIf passed, the GUARD Act would impose strict federal standards on how AI companies design, verify and manage their chatbots, especially when minors are involved. The bill outlines several key obligations aimed at protecting children and holding companies accountable for harmful interactions.The first major requirement centers on age verification. Companies must use reliable methods such as government-issued identification or other proven tools to confirm that a user is at least 18 years old. Simply asking for a birthdate is no longer enough.The second rule involves clear disclosures. Every chatbot must tell users at the start of each conversation, and at regular intervals, that it is an artificial intelligence system, not a human being. The chatbot must also clarify that it does not hold professional credentials such as medical, legal or therapeutic licenses.Another provision establishes an access ban for minors. If a user is verified as under 18, the company must block access to any “AI companion” feature that simulates friendship, therapy or emotional communication.The bill also introduces civil and criminal penalties for companies that violate these rules. Any chatbot that encourages or engages in sexually explicit conversations with minors, promotes self-harm or incites violence could trigger significant fines or legal consequences.Finally, the GUARD Act defines an AI companion as a system designed to foster interpersonal or emotional interaction with users, such as friendship or therapeutic dialogue. This definition makes it clear that the law targets chatbots capable of forming human-like connections, not limited-purpose assistants. The proposed GUARD Act would require chatbots to verify users’ ages, disclose they are not human and block under-18 users from AI companion features.  (Kurt “CyberGuy” Knutsson)OHIO LAWMAKER PROPOSES COMPREHENSIVE BAN ON MARRYING AI SYSTEMS AND GRANTING LEGAL PERSONHOODHow to stay safe in the meantimeTechnology often moves faster than laws, which means families, schools and caregivers must take the lead in protecting young users right now. These steps can help create safer online habits while lawmakers debate how to regulate AI chatbots.1) Know which bots your kids useStart by finding out which chatbots your kids talk to and what those bots are designed for. Some are made for entertainment or education, while others focus on emotional support or companionship. Understanding each bot’s purpose helps you spot when a tool crosses from harmless fun into something more personal or manipulative.2) Set clear rules about interactionEven if a chatbot is labeled safe, decide together when and how it can be used. Encourage open communication by asking your child to show you their chats and explain what they like about them. Framing this as curiosity, not control, builds trust and keeps the conversation ongoing.3) Use parental controls and age filtersTake advantage of built-in safety features whenever possible. Turn on parental controls, activate kid-friendly modes and block apps that allow private or unmonitored chats. Small settings changes can make a big difference in reducing exposure to harmful or suggestive content.4) Teach children that bots are not humansRemind kids that even the most advanced chatbot is still software. It can mimic empathy, but does not understand or care in a human sense. Help them recognize that advice about mental health, relationships or safety should always come from trusted adults, not from an algorithm.5) Watch for warning signsStay alert for changes in behavior that could signal a problem. If a child becomes withdrawn, spends long hours chatting privately with a bot or repeats harmful ideas, step in early. Talk openly about what is happening, and if necessary, seek professional help.6) Stay informed as the laws evolveRegulations such as the GUARD Act and new state measures, including California’s SB 243, are still taking shape. Keep up with updates so you know what protections exist and which questions to ask app developers or schools. Awareness is the first line of defense in a fast-moving digital world.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawaysThe GUARD Act represents a bold step toward regulating the intersection of minors and AI chatbots. It reflects growing concern that unmoderated AI companionship might harm vulnerable users, especially children. Of course, regulation alone won’t solve all problems, industry practices, platform design, parental involvement and education all matter. But this bill signals that the era of “build it and see what happens” for conversational AI may be ending when children are involved. As technology continues to evolve, our laws and our personal practices must evolve too. For now, staying informed, setting boundaries and treating chatbot interactions with the same scrutiny we treat human ones can make a real difference.If a law like the GUARD Act becomes reality, should we expect similar regulation for all emotional AI tools aimed at kids (tutors, virtual friends, games) or are chatbots fundamentally different? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved. 

Protecting kids from AI chatbots: What the GUARD Act means Read More »

2025 11 04 11 17 37

Las Vegas Police Release Full Report on Cybertruck Explosion — and the Federal Intervention That Followed

The Las Vegas Metropolitan Police Department has released its official after-action report on the January 1, 2025, Tesla Cybertruck explosion outside the Trump International Hotel Las Vegas. The 78-page document, published November 3, 2025, details the incident, the extensive local and federal response, and an unusual federal intervention that resulted in the suspect’s manifesto being classified by the Department of Defense.
According to the report, Army Special Forces soldier Matthew Livelsberger deliberately drove a rented Tesla Cybertruck into the hotel’s porte cochere at approximately 8:40 a.m. and detonated it seconds later. The explosion killed Livelsberger and injured six others. The blast was determined to be a premeditated attack involving a vehicle-borne improvised explosive device capable of mass casualties and structural damage.
Investigators recovered firearms, ammunition, fuel containers, fireworks, and multiple electronic devices from the destroyed vehicle.Continue scrolling for more…

The LVMPD’s Digital Forensics Lab later extracted digital evidence including Livelsberger’s chat history, internet searches, encrypted notes, and a manifesto from one of two recovered iPhones. The report states that this material helped confirm the suspect acted alone but contained information that led the Department of Defense to classify the manifesto on January 9, 2025. The classification order ended LVMPD’s local investigation, transferring full control to federal authorities citing national security concerns.
The alleged manifesto, as first published by podcaster Shawn Ryan
Authorities and media outlets have reported the existence of an alleged manifesto linked to Livelsberger that may shed light on his motivations and state of mind in the days leading up to the explosion. According to information first published by the Shawn Ryan show, Livelsberger sent a lengthy email to a retired U.S. Army intelligence officer claiming to possess knowledge of secret government programs, classified drone technology, and alleged wartime misconduct. In the message, he described what he believed were “gravitic propulsion” aircraft, technology he attributed to both the United States and China, and referenced a “checkmate” scenario in which such craft could hover undetected over strategic targets. The email also included statements about covert military operations in Afghanistan, which Livelsberger claimed had resulted in civilian casualties that were later covered up. He wrote that he had been “followed for over a week” by intelligence agencies and suggested he was being digitally tracked.
The manifesto’s authenticity has not been verified by investigators, and its contents remain a subject of speculation. The Department of Defense has not publicly commented on whether the material it classified on January 9, 2025, matches the document published by Ryan. However, the overlap between the descriptions has fueled widespread discussion about whether the writings seized from Livelsberger’s devices and the email now circulating online are the same. If confirmed, the classification of the manifesto could suggest that elements of Livelsberger’s claims intersected with restricted or sensitive defense information, raising further questions about why the federal government moved swiftly to block public release of the document.
The sequence of events outlined in the report shows that Livelsberger rented the Cybertruck through the peer-to-peer car service Turo on December 28, 2024, after advancing the reservation from December 30. Surveillance footage later confirmed that, just before the explosion, Livelsberger was seen pouring an accelerant into the bed of the vehicle before driving it to the Trump hotel. Investigators verified that the Cybertruck’s internal cameras had been disabled manually prior to detonation.
Army Special Forces soldier Matthew Livelsberger
Army Criminal Investigation Division agents assisted in executing search warrants at Livelsberger’s residences in Colorado and Germany, uncovering personal and service-related records. Interviews with his wife indicated marital and behavioral problems in the days before the incident, including erratic communication and financial isolation. Federal agents determined Livelsberger had purchased firearms, fireworks, and other materials in the days leading up to the attack.
The report documents a highly coordinated response between local, federal, and private-sector partners. Within minutes of the explosion, officers and firefighters evacuated the hotel, contained the fire, and established command posts. Specialized bomb technicians from the Las Vegas Fire Rescue Bomb Squad and the FBI confirmed the presence of fuel containers, fuses, and fireworks remnants. Drone footage and air-monitoring technology were used to assess the scene and ensure safety for investigators. The report cites this integration of drone technology as critical to “ensuring that personnel could advance only when it was deemed safe to do so.”
The LVMPD’s analysis also includes internal recommendations following the event. These include additional training on electric-vehicle battery hazards after several officers reported exposure symptoms from lithium-ion fumes, improved interagency communication protocols, and expanded protective equipment for crime-scene analysts. The report further calls for continued joint training between police and fire personnel to address differences in incident-command expectations during complex emergencies.
The Cybertruck was ultimately wrapped in a tarp and transported under escort to a secure LVMPD facility for examination. Once the Department of Defense intervened, LVMPD was directed to halt further public disclosure. Sheriff Kevin McMahill said that, despite significant media pressure to classify the attack as terrorism, investigators “prioritized a methodical and unbiased investigative approach” and refrained from public speculation until evidence could be verified.
The incident occurred just hours after a separate New Year’s Day terrorist attack in New Orleans that killed fourteen and injured fifty-seven. Though investigators found no connection between the two events, the timing amplified national security concerns. The LVMPD report concludes that Livelsberger acted alone but offers no explanation for the Department of Defense’s decision to classify his writings or what specific content warranted federal secrecy.
The release of the after-action report closes LVMPD’s portion of the case but leaves lingering questions about why the military assumed control, what was contained in Livelsberger’s manifesto, and whether any broader implications remain hidden behind classification.
###
Document Archive

Follow The Black Vault on Social Media:

Las Vegas Police Release Full Report on Cybertruck Explosion — and the Federal Intervention That Followed Read More »

credit card tap photo 1

Ghost-tapping scam targets tap-to-pay users

NEWYou can now listen to Fox News articles!
A new scam called ghost tapping is spreading across the country. The Better Business Bureau (BBB) warns that scammers are using this tactic to steal money from people who use tap-to-pay credit cards and mobile wallets.This scam exploits wireless technology to withdraw money without your awareness. Many victims only realize something is wrong after small, unnoticed transactions slowly drain their accounts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. The Better Business Bureau warns of a new “ghost-tapping” scam draining money from tap-to-pay cards and mobile wallets. (Clara Margais/picture alliance via Getty Images)How the ghost-tapping scam worksScammers use near-field communication (NFC) devices that mimic legitimate tap-to-pay systems. In busy places such as festivals, markets, or public transportation, they move close enough to your wallet or phone to trigger a transaction.The BBB reports that some scammers pose as charity vendors or market sellers who only accept tap payments. Once you tap your card or phone, they charge far more than the agreed amount.Because the first few withdrawals are usually small, they often go undetected by fraud systems. Victims may not notice until much later, when more money has been taken.Real-life cases and warningsA Missouri resident reportedly lost $100 after being approached by a person carrying a handheld card reader. The BBB Scam Tracker has recorded many similar cases across the nation, with losses sometimes exceeding $1,000.Officials warn that scammers may pressure you to complete payments quickly, preventing you from verifying the amount or merchant name. Some even carry portable readers that can pick up signals through thin wallets or purses.How to protect yourself from ghost tappingWhile the threat of ghost tapping may sound alarming, protecting yourself is easier than you think. A few smart habits and security tools can greatly reduce your risk of falling victim.1) Use RFID-blocking technologyInvest in an RFID-blocking wallet or card sleeve to create a physical barrier between your card and potential scanners. These inexpensive tools prevent scammers from reading your card information through clothing, bags, or wallets. Look for sleeves or wallets specifically designed to block wireless communication.2) Verify before you tapAlways check the merchant name and transaction amount displayed on the payment terminal before tapping. Scammers often rush you to avoid scrutiny. Take an extra second to confirm what you see matches what you agreed to pay. If something looks off, cancel the transaction immediately.3) Set up instant alertsEnable instant transaction alerts from your bank or credit card provider. This lets you know the moment a payment is made, giving you a chance to spot unauthorized activity right away. Quick detection can prevent further charges and make it easier to dispute fraudulent transactions.Bonus protection: Even if you stop a scam early, your personal data can end up for sale online. Our No. 1 identity theft company monitors your credit and financial information, alerting you if your details appear on the dark web or in a data breach.  See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.You can also use a data removal service to automatically delete your personal information from data broker sites that sell it, keeping you off scam lists before the next attack.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com. The BBB says reports of “ghost tapping” are rising, with some victims losing more than $1,000 to contactless theft. (M. Scott Brauer/Bloomberg via Getty Images)4) Be cautious in crowded areasCrowded environments such as festivals, public transportation, or street fairs create perfect conditions for scammers to blend in. Limit tap-to-pay use in these situations. Instead, use chip or swipe methods, which require physical contact and are harder to exploit.5) Monitor your accounts regularlyMake it a habit to check your financial accounts at least once a week. Review each transaction carefully and report anything suspicious to your bank immediately. Even small unexplained charges could signal a larger problem.6) Use payment app security featuresMost mobile wallet apps allow you to set PINs, facial recognition, or fingerprint verification before authorizing a transaction. Make sure these protections are enabled. This adds another barrier that prevents criminals from initiating payments without your consent.7) Keep your payment apps and devices updatedRegularly update your smartphone’s software and mobile wallet apps. Updates often include security patches that protect against newly discovered vulnerabilities scammers might exploit. Outdated software can leave your data exposed.Stay protected from payment-stealing malware:In addition to keeping your apps updated, protect your device from hidden threats with strong antivirus software. It scans for malicious apps and spyware that can hijack your tap-to-pay data or record sensitive information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.8) Avoid saving multiple cards on mobile walletsWhile convenient, storing several cards in one app can increase your exposure if your phone is compromised. Keep only the cards you use most often connected to your mobile wallet. This reduces the impact of potential fraudulent activity.9) Report suspicious activity promptlyIf you ever suspect ghost tapping or notice a strange charge, contact your bank immediately and report the scam to the BBB Scam Tracker. Quick action can help prevent additional losses and assist authorities in identifying scam trends. Victims of “ghost tapping” often lose money through small, unnoticed transactions before realizing they’ve been scammed. (Leonie Asendorpf/picture alliance via Getty Images)Kurt’s key takeawaysAs contactless payments become more common, scammers are getting more creative. Staying informed and cautious can help protect your money. Small steps like checking your transaction history and using protective gear can make a big difference. If you notice unauthorized charges, contact your bank immediately, freeze your card and report the scam to the BBB Scam Tracker. Technology offers convenience but can also create new risks. The ghost-tapping scam shows how quickly and easily payments can invite hidden dangers. Awareness and prevention remain the best ways to keep your finances safe.Will you keep using tap-to-pay after learning about ghost tapping, or switch back to more traditional payment methods? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com. All rights reserved.

Ghost-tapping scam targets tap-to-pay users Read More »

electreon inductiveroad france 2x

Power on the move: Is pilot program the future of EV charging?

NEWYou can now listen to Fox News articles!
Driving an electric vehicle could soon mean charging as you go. A new wireless charging pilot in France is showing how coils built into the road can transfer more than 300 kilowatts of power to moving EVs. This breakthrough could make long trips possible without stopping at a charging station.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. RESEARCHERS CREATE REVOLUTIONARY AI FABRIC THAT PREDICTS ROAD DAMAGE BEFORE IT HAPPENSThe road that powers your vehicleThe technology comes from Electreon Wireless, working with Vinci Construction, Gustave Eiffel University and Hutchinson. Together, they’ve installed about a one-mile stretch of road near Paris that can transfer energy to EVs in motion.So far, the system has powered a truck, van, car and bus — all equipped with special pickup coils. Early tests show the system can deliver peak power over 300 kW and more than 200 kW under steady conditions. That’s strong enough to keep large cargo trucks rolling for miles without a pit stop. New wireless road tech in France powers EVs while they drive, offering more than 300 kilowatts of charging. (Kurt “CyberGuy” Knutsson)Charging ahead: Why it mattersIf widely adopted, dynamic wireless charging could change how America powers transportation. Heavy-duty trucks could use smaller, cheaper batteries. Delivery vehicles and buses could stay on the road longer with less downtime.For drivers, it could mean never having to worry about range anxiety again. Instead of hunting for the nearest charger, the highway itself could be your power source.WOULD YOU BUY THE WORLD’S FIRST PERSONAL ROBOCAR? Electreon’s one-mile test track near Paris charges moving EVs through coils built into the road. (Kurt “CyberGuy” Knutsson)The roadblocks aheadThe big questions now are about cost and control. Who pays to install these power roads? How much will it cost to use them? Public-private partnerships may hold the key, but until those details are ironed out, large-scale rollout remains a challenge.Still, with global momentum building, it’s only a matter of time before dynamic wireless charging becomes part of everyday driving.What this means for youThis innovation is not limited to Europe. In Detroit, Michigan, a public road on 14th Street already uses embedded charging coils that can send power to EVs as they move. In Indiana, Purdue University and the Indiana Department of Transportation are building a quarter-mile highway section designed to charge electric vehicles, including heavy trucks, while they travel.For drivers, this technology could make owning an EV easier and more practical. Your vehicle could recharge during normal trips without the need to stop, plug in or wait. That level of convenience could help expand EV adoption across the United States, lowering emissions and fuel costs for millions.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comTHE ROAD TO PROSPERITY WILL BE PAVED BY AUTONOMOUS TRUCKING The innovation could transform U.S. roads, cutting downtime for electric trucks and buses. (Kurt “CyberGuy” Knutsson)Kurt’s key takeawaysWireless charging roads are moving from concept to construction and showing real promise for a new era of electric travel. The idea that vehicles could charge while driving has the potential to transform how we move goods, commute and use energy. There are still big questions about who will fund widespread installation and how well the system will perform under real traffic and weather conditions. The technology is advancing fast, but scaling it will take time, collaboration and investment. If these challenges can be overcome, dynamic wireless charging could redefine the way we think about mobility and sustainability.CLICK HERE TO DOWNLOAD THE FOX NEWS APPDo you think this is really a viable way to power the future of transportation? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Power on the move: Is pilot program the future of EV charging? Read More »

1 3000 youtube videos deliver malware disguised as free software intro

3,000+ YouTube videos deliver malware disguised as free software

NEWYou can now listen to Fox News articles!
YouTube is arguably the most popular and most visited platform for entertainment, education and tutorials. There’s a video for everything on YouTube, whether you want to learn how to cook, ride a bike or need help with work or school. But recent research by Check Point reveals a darker side: a sprawling malware distribution network quietly operating within the platform. Hackers are using compromised accounts, fake engagement and clever social engineering to spread information-stealing malware disguised in more than 3,000 software cracks and game hack videos.Most victims begin by searching for free or cracked software, cheat tools or game hacks, which is the root of the infection chain. This curiosity for “free” software opens the door to the Ghost Network’s traps.META ACCOUNT SUSPENSION SCAM HIDES FILEFIX MALWARESign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter. Cybercriminals are exploiting YouTube’s massive reach by disguising malware inside fake “how-to” and “free software” videos. (Kurt “CyberGuy” Knutsson)All about YouTube’s ghost networkAccording to Check Point Research, the YouTube Ghost Network has been active since 2021, with activity surging threefold in 2025. It’s built around a simple but effective formula, which blends social manipulation with technical stealth. The network’s primary targets are people searching for “Game Hacks/Cheats” and “Software Cracks/Piracy.”Researchers discovered that these videos often feature positive comments, likes and community posts from compromised or fake accounts. This coordinated engagement gives potential victims a false sense of safety.The fake social proof and fabricated likes, comments and subscriber activity play a key psychological role. They trick viewers into believing the content is legitimate and widely trusted, allowing the operation to persist even when YouTube removes individual videos or channels. The network’s modular structure and constant replacement of banned accounts make takedowns only temporarily effective.Once a user clicks the provided links, they’re usually taken to file-sharing services or phishing sites hosted on Google Sites, MediaFire, Dropbox or similar platforms. The linked files are often password-protected archives, making them harder for antivirus tools to scan. Victims are then asked to disable Windows Defender before installation, effectively disarming their own protection before running the malware.Check Point found that the majority of these attacks deliver information-stealing malware such as Lumma Stealer, Rhadamanthys, StealC and RedLine. These programs harvest passwords, browser data and other sensitive information, sending it back to the attacker’s command and control servers.What makes the network particularly resilient is its role-based structure. Each compromised YouTube account serves a function; some upload malicious videos, others post download links and a third group boosts credibility by commenting and liking content. When an account gets banned, it’s quickly replaced, allowing the operation to continue largely uninterrupted. A single click on a malicious link can disable your defenses and install information-stealing malware in seconds. (Kurt “CyberGuy” Knutsson)Inside the malicious campaignsTwo major campaigns stood out in Check Point’s investigation. The first involved the Rhadamanthys infostealer, spread through a compromised YouTube channel named @Sound_Writer, which had nearly 10,000 subscribers.The attackers uploaded fake cryptocurrency-related videos and used phishing pages on Google Sites to distribute malicious archives. These pages instructed viewers to “turn off Windows Defender temporarily,” assuring them it was a false alert. The archives contained executable files that quietly installed the Rhadamanthys malware, which connected to multiple control servers to exfiltrate stolen data.The second campaign, involving HijackLoader and Rhadamanthys, leveraged a much larger channel, @Afonesio1, with around 129,000 subscribers. Here, attackers uploaded videos offering cracked versions of Adobe Photoshop, Premiere Pro, and FL Studio.MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERSOne of these videos gained over 291,000 views and dozens of glowing comments claiming the software worked perfectly. The malware was hidden inside a password-protected archive linked through a community post. The installer used HijackLoader to drop the Rhadamanthys payload, which then connected to rotating control servers every few days to avoid detection.Even if you never complete the installation, you can still be at risk. Simply visiting the phishing or file-hosting sites may expose you to malicious scripts or credential theft prompts disguised as “verification” steps. Clicking the wrong link can compromise login data before any software is even installed. Strong passwords, two-factor authentication, and regular security scans are your best defense against YouTube’s Ghost Network. (Cyberguy.com)7 steps you can take to stay safe from YouTube’s ghost networkThe Ghost Network succeeds by exploiting curiosity and trust. It disguises malware as “free software” or “game hacks,” relying on users to click before thinking. Protecting yourself means adopting habits that make it harder for attackers to fool you. Here are seven steps to stay safe:1) Avoid cracked software and cheat downloadsMost infections start with people trying to download pirated or modified programs. These files are often hosted on unregulated file-sharing websites where anyone can upload malicious content. Even if a YouTube video looks polished or filled with positive comments, that doesn’t mean it’s safe. Official software developers and gaming studios never distribute downloads through YouTube links or third-party sites.Besides being dangerous, downloading cracked software also poses legal risks. Piracy violates copyright law and can lead to serious consequences, while giving cybercriminals a perfect delivery channel for malware.2) Use a strong antivirusMake sure you have a trusted antivirus solution installed and always running. Real-time protection can detect suspicious downloads and block harmful files before they do any damage. Schedule regular system scans and keep your antivirus updated so it can recognize the latest threats.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.comWHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE3) Never disable your antivirus or Windows DefenderIf a tutorial or installer tells you to disable your security software, that’s a red flag. Malware creators use this trick to bypass detection. There’s no legitimate reason to turn off protection, even temporarily. The moment a file asks you to do so, delete it immediately.4) Be cautious with YouTube links and download sourcesAlways inspect links before clicking. Hover over them to check the destination and avoid shortened or redirected URLs that hide their true target. Downloads hosted on unfamiliar domains or file-sharing sites should be treated as unsafe. If you need software, get it directly from the official website or trusted open-source communities.5) Use a password manager and enable two-factor authentication (2FA)Turning on 2FA for important accounts adds another layer of protection, ensuring that even if someone gets your password, they can’t access your account. Malware often aims to steal saved passwords and browser data. Storing credentials in a password manager keeps them encrypted and separate from your browser, making them harder to steal. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. Next, see if your email has been exposed in past breaches. Our #1 password manager (see CyberGuy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at CyberGuy.com6) Keep your operating system and apps updatedSoftware updates don’t just bring new features, but they also fix security flaws that malware can exploit. Enable automatic updates for your system, browser, and commonly used applications. Staying up to date is one of the simplest ways to prevent infections.7) Use a trusted data removal serviceEven after securing your system, your personal information might already be circulating online from past breaches. A reliable data removal service can continuously scan and request deletion of your data from people-search and broker sites, making it harder for cybercriminals to exploit your exposed information.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.comGet a free scan to find out if your personal information is already out on the web: CyberGuy.comCLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeawayCybercriminals have evolved beyond traditional phishing and email scams. By exploiting a platform built on trust and engagement, they have created a scalable, self-sustaining system for malware distribution. Frequent file updates, password-protected payloads, and shifting control servers make these campaigns difficult for both YouTube and security vendors to detect and shut down.Do you think YouTube is doing enough to stop malware distribution on its platform? Let us know by writing to us at CyberGuy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

3,000+ YouTube videos deliver malware disguised as free software Read More »

1 stop your smart tv from listening to you

Stop your smart TV from listening to you

NEWYou can now listen to Fox News articles!
Most people do not realize their smart TV includes microphones that can capture sound even when voice commands are off. These tiny mics power voice search and assistants, but they also pose privacy risks. If that makes you uneasy, you are not alone. The good news is that it takes only a few minutes to disable your smart TV microphone and protect your conversations.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOTStep one: Find the built-in mic switchBefore opening menus, check your TV’s frame. Many models feature a small hardware switch that turns the microphone off completely.Look closely along the bottom or sides of your screen. Some switches are labeled “Built-in MIC.” On Samsung TVs, it’s often near the bottom right edge when facing the screen. Take back control of your space and enjoy your smart TV safely without your microphone listening.  (Kurt “CyberGuy” Knutsson)Slide the switch to “off.” Your TV may confirm the change with an on-screen message. This is the most reliable way to stop the mic because it physically cuts power to it.Step two: Disable the smart TV microphone in settingsIf your TV lacks a physical switch, go through its settings menu. While the exact names differ by brand, most follow a similar pattern.Press Home or Settings on your remote. Look for main sections such as System, General or Privacy. Inside, you’ll find microphone or voice options labeled Voice Recognition, Voice Assistant or Microphone Access. Slide the built-in mic switch to stop your TV from listening. (Samsung)Examples:Samsung: General → VoiceSony: Privacy → Google AssistantLG: User Agreements → Voice SettingsToggle off every feature that uses the microphone. Some options may appear in more than one place, so check each section carefully. Use your TV’s settings to disable voice features and protect privacy. (Samsung)Step three: Balance convenience and privacyTurning off your TV’s microphone does not mean you lose smart features. Many remotes include a push-to-talk button that activates voice control only when pressed.If you rarely talk to your TV, keeping the microphone off makes sense. If you like using voice commands, enable it temporarily when you need it.Step four: Check connected devices and appsEven after you disable your smart TV microphone, voice-enabled apps and linked devices may still be listening.Check any connected smart assistants such as Alexa, Google Assistant or Bixby. These platforms can continue capturing audio through your phone, smart speaker or another device on the same network.STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE Keep your privacy and still enjoy voice control, just use it when you need it. (Kurt “CyberGuy” Knutsson)Take a moment to review privacy settings in those apps as well. Turning off voice activity tracking across all your devices ensures that nothing in your home listens when you do not want it to.Why smart TVs have microphones at allManufacturers include microphones to make TVs more interactive. You can ask for weather updates, control volume or find movies with your voice. It’s convenient, but it comes with trade-offs.Some companies state in their privacy policies that voice data may be shared with third parties for analysis. That means your living room chatter could leave your home.When you disable your smart TV microphone, you keep the benefits of a modern TV while limiting unwanted data collection.What this means for youBy taking a few minutes to change one setting or flip one switch, you gain control over what your TV hears. It’s an easy way to improve your digital privacy without losing the entertainment experience you love.You still get streaming apps, vivid displays and fast connectivity, just with added peace of mind.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com.CLICK HERE TO DOWNLOAD THE FOX NEWS APPKurt’s key takeaways Smart TVs offer great features, but convenience should never cost you privacy. Whether you flip a switch or use your settings menu, you have the power to decide when your TV listens.Will you take back your living room privacy today or leave it as it is? Let us know by writing to us at CyberGuy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. Copyright 2025 CyberGuy.com.  All rights reserved.  

Stop your smart TV from listening to you Read More »

1 MAN WITH PHONE AND CREDIT CARD

Hackers target online stores with new attack

NEWYou can now listen to Fox News articles!
A security researcher found a serious weakness in the software that powers thousands of e-commerce sites. The platform, called Magento, and its paid version Adobe Commerce, has a bug that lets attackers break into active shopping sessions. Some attackers can even take control of the entire store.The flaw is known as SessionReaper. It allows hackers to pretend they are real customers without needing a password. Once they are inside, they can steal data, make fake orders, or install tools that collect credit card details.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter Why is this attack so serious?The problem starts in the part of the system that handles how a store communicates with other online services. Because the software does not properly check the information it receives, it sometimes trusts data that it should not. Hackers take advantage of this by sending fake session files that the store accepts as real.Researchers at SecPod warn that successful attacks can lead to stolen customer data, fake purchases, and even full control of the store’s server.Once the attack method was shared publicly, cybercriminals began using it right away. Security experts at Sansec reported that more than 250 online stores were compromised within a single day. This shows how quickly attacks can spread once a vulnerability becomes public. Hackers are exploiting a new flaw called SessionReaper to hijack active shopping sessions on thousands of e-commerce sites running Adobe Commerce and Magento. (Kurt Knutsson)Why are many stores still unprotected?Adobe released a security update on September 9 to fix the issue. Weeks later, about 62 percent of affected stores still have not installed it. Some store owners are afraid an update might break features on their site. Others simply do not know how serious the risk is.Every unpatched store remains an open door for attackers who want to steal information or install malicious code.MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACHHow can you stay safe when shopping online?While store owners are responsible for fixing the problem, you can still take smart steps to protect yourself when shopping online. These actions can help you spot danger early and keep your personal information safe.1) Look for warning signsAlways pay attention to how a website behaves. If a page looks odd, loads slowly, or shows error messages, it could mean something is wrong behind the scenes. Check for the small padlock symbol in the address bar that shows the site uses HTTPS encryption. If it is missing or the site redirects you to an unfamiliar page, stop and close the browser tab immediately. Trust your instincts if something feels off.2) Be careful with email links and use a data removal service Cybercriminals often use fake promotional emails or ads that look like real store offers. Instead of clicking links in messages or banners, type the store’s web address directly into your browser to avoid phishing pages designed to steal your login details or card information. Since attacks like SessionReaper can expose your personal data to criminal marketplaces, consider using a reputable data removal service that continuously scans and deletes your private information, such as your address, phone number, and email, from data broker sites. This reduces your risk of identity theft if your information has been leaked through a compromised online store.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.com Cybersecurity teams at SecPod and Sansec tracked more than 250 stores breached within 24 hours of the exploit going public, showing how fast these attacks spread. (Kurt “CyberGuy” Knutsson)3) Use strong antivirus softwareStrong antivirus protection is your silent guard online. Choose reputable software that offers real-time protection, safe browsing alerts, and automatic updates. A strong antivirus program can detect malicious code that tries to run on your device, block unsafe sites, and alert you to potential threats. This adds another crucial layer of defense when visiting online stores that may not be fully secure.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com 4) Use safe payment optionsWhenever possible, choose payment services that add an extra layer of protection between your bank account and the online store. Platforms like PayPal, Apple Pay, or Google Pay do not share your card number with the retailer. This reduces the chance of your information being stolen if the store is compromised. These payment gateways also offer dispute protection if a purchase turns out to be fraudulent.5) Shop with trusted retailersStick to stores with a solid reputation. Well-known brands usually have better security and faster response times when issues arise. Before buying from a new website, check its reviews on trusted consumer sites. Look for signs of credibility such as clear contact information, a professional design, and verified payment options. A few minutes of research can save you from weeks of frustration.TRANSUNION BECOMES LATEST VICTIM IN MAJOR WAVE OF SALESFORCE-LINKED CYBERATTACKS, 4.4M AMERICANS AFFECTED6) Keep your devices updatedUpdates may seem annoying, but they are one of the most effective ways to protect your data. Make sure your computer, smartphone, and web browser all have the latest security patches installed. Updates often fix the exact kinds of flaws hackers use to spread attacks like SessionReaper. Enable automatic updates if you can, so your devices stay protected without extra effort.7) Use unique, strong passwordsIf you create accounts on shopping sites, make sure each one has its own strong password. Avoid using the same password across multiple platforms. Consider using a password manager to generate and store long, random passwords. That way, if one account is compromised, your other logins stay safe.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com8) Turn on two-factor authenticationIf a site or payment service offers two-factor authentication, enable it. This adds a second security step, such as a code sent to your phone or generated by an app. Even if hackers steal your password, they will not be able to access your account without that second verification. Even weeks after Adobe issued a critical patch for the SessionReaper vulnerability, nearly two-thirds of affected online stores remain unprotected, leaving customer data and payment information at high risk of theft. (CyberGuy.com)9) Avoid public Wi-Fi for purchasesFARMERS INSURANCE DATA BREACH EXPOSES 1.1M AMERICANSPublic Wi-Fi networks in places like cafés, airports, and hotels are often unsecured. Avoid entering payment information or logging in to accounts while connected to public networks. If you must make a purchase while away from home, use a mobile data connection or a reliable VPN to encrypt your activity. 10) Monitor your bank and credit statementsCheck your financial statements regularly for any unusual activity. Small, unauthorized charges can be early signs of fraud. Report any suspicious transactions to your bank or credit card company right away so they can freeze your account or issue a new card.11) Report suspicious activityIf you notice anything strange during or after an online purchase, act quickly. Contact the store’s customer service to report what you saw. You should also inform your payment provider or credit card company so they can block unauthorized transactions. Reporting early can help stop further damage and alert other shoppers to potential risks.Kurt’s key takeawaysThe SessionReaper attack shows how fast online threats can appear and how long they can linger when updates are ignored. Even well-known stores can become unsafe overnight. For retailers, installing patches quickly is critical. For shoppers, staying alert and choosing secure payment methods are the best ways to stay protected.CLICK HERE TO DOWNLOAD THE FOX NEWS APPWould you still shop online if you knew hackers could be hiding behind a store’s checkout page? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter Copyright 2025 CyberGuy.com.  All rights reserved.  

Hackers target online stores with new attack Read More »

2 best ways to give your old iphone a second life

5 phone safety tips every parent should know

NEWYou can now listen to Fox News articles!
Kids today are growing up in a world where screens, apps, and social platforms are part of everyday life. From homework to gaming to group chats, their digital lives can move faster than parents can keep up. But behind every app and device are settings and systems that can impact their privacy, safety, and focus.Whether you’re trying to set healthy limits, track screen time, or just understand what your child’s phone can do, knowing a few key tech terms can make parenting in the digital age a lot less stressful. Here’s a quick guide to help you stay informed, confident, and in control.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter  Setting healthy screen time limits helps kids learn balance and keeps tech use from taking over family time. (Kurt “CyberGuy” Knutsson)1) Screen time limitsThe boundary that helps restore balanceScreen time limits let you manage how long your child spends on apps, games, or devices each day. It’s not about punishment, it’s about setting healthy boundaries that help kids disconnect and recharge.Why it matters: Too much screen time has been linked to reduced focus, sleep disruption, and overstimulation. Setting limits helps your child create a better balance between online fun and real-world rest.How to set screen time limitsOn iPhone:Go to SettingsTap Screen TimeClick App LimitsSelect Add Limit, choose categories or specific apps, and set daily time limitOn Android:Settings may vary depending on your Android phone’s manufacturerGo to SettingsTap Digital Wellbeing & Parental Controls. If you don’t see it right away, try searching “Digital Wellbeing” in the Settings search barOpen the Dashboard or App Timers section. On some phones (like Samsung), it may appear as “App Timers”. On others (like Google Pixel), tap Dashboard to view your app usage listTap the hourglass icon next to the app you want to limitSet a daily time limit, then tap OK or DoneThe timer resets every night at midnightPro tip: Make it a family routine. Review screen time reports together so kids feel involved in the process rather than restricted. TEENS HACK SCHOOL CELL PHONE BANS WITH CREATIVE WORKAROUNDS2) Parental controlsYour built-in safety netParental controls are tools that let you manage what your child can see and do on their devices – from blocking explicit content to approving downloads and monitoring usage. Every major device, app, and streaming service has its own version.Why it matters: Parental controls can help prevent exposure to inappropriate content, manage purchases, and set up age-appropriate experiences. Built-in parental controls make it easier to guide what kids can see and do on their devices.  (Kurt “CyberGuy” Knutsson)How to turn parental controls onOn iPhone:Go to SettingsClick Screen Time Tap Content & Privacy RestrictionsTurn it on so the toggle turns green.Within Content & Privacy Restrictions you can go to sections like Allowed Apps, iTunes & App Store Purchases, etc, to set filters and restrict what apps the device can do.On Android:Settings may vary depending on your Android phone’s manufacturerGo to SettingsTap Digital Wellbeing & Parental ControlsSelect Parental Controls, then follow the steps to set up a supervised account through Google Family Link, which lets you manage screen time on a child’s device remotelyPro tip: Most streaming apps, like YouTube, Netflix, and Disney+, also have parental settings, so make sure you adjust those separately.3) GeolocationThe invisible map in your child’s pocket5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINEGeolocation allows apps and devices to track physical location in real time. It powers navigation and “Find My” features but can also share more than you intend if left unchecked.Why it matters: While location sharing helps families stay connected, it can pose privacy and safety concerns if apps broadcast your child’s whereabouts.How to manage location accessOn iPhone:Go to SettingsClick Privacy & SecurityThen, click Location ServicesTap each app and change “Always” to “While Using the App” or “Never”On Android:Settings may vary depending on your Android phone’s manufacturerGo to SettingsTap Location (or “Location & security” or “Privacy → Location” depending on device)Tap App location permissions (or “Permission manager → Location”)Select an app from the listChange the app permission from, “Allow all the time” to “Allow only while using the app” or “Don’t Allow”Pro tip: For younger kids, use “Share My Location” within Family Sharing (iPhone) or Google Family Link (Android) instead of third-party tracking apps to ensure safer monitoring.4) Private browsingThe mode that hides – but doesn’t erasePrivate browsing, also called Incognito Mode, lets users browse the internet without saving history, cookies, or logins. While it may sound harmless, it can make it harder for parents to see what kids are accessing online.Why it matters: Private browsing prevents history tracking on the device, but your internet provider, school, or router may still record activity. It’s a reminder that no browsing mode is completely private.TEENS FACE NEW PG-13 LIMITS ON INSTAGRAMHow to disable private browsingOn iPhone (Safari):Open SettingsTap Screen TimeTap Content & Privacy RestrictionsIf prompted, enter or set a Screen Time passcodeTurn on Content & Privacy Restrictions (toggle to green)Tap App Store, Media & Purchases (or similarly named) and optionally set limitsClick Web Content Choose one of the options such as, Limit Adult Websites (this will disable Private Browsing in Safari) or Only Approved Websites On Android (Chrome):Settings may vary depending on your Android phone’s manufacturerOpen the Family Link app on your Android phone (or download it if it isn’t installed)Select your child’s profileTap ControlsClick Google Chrome & WebChoose Try to block explicit sites (or select “Only allow approved sites” for stricter filtering)This setting automatically disables Incognito Mode in Chrome for your child’s supervised account(Optional) You can also review SafeSearch and YouTube restrictions under the same section for extra protection Conversations about online safety matter more than rules alone because openness builds digital trust. (iStock)SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOMEPro tip: Talk to your child about why transparency matters. Turning off private browsing is most effective when paired with open, ongoing conversations about online safety.5) Digital footprintThe trail your child leaves behindEvery post, comment, or photo shared online becomes part of your child’s digital footprint, a permanent record of their online presence. Even deleted posts can live on through screenshots, data archives, or algorithms.Why it matters: Colleges, employers, and even peers can access public digital traces. Teaching kids to think before posting helps them build a positive and professional online reputation.How to check what’s out thereSearch your child’s name on Google and image resultsReview old accounts or unused apps that may still contain personal infoHelp them make their social media profiles private and share selectivelyPro tip: You can also set up Google Alerts for your child’s name to get notified whenever new content appears online, a simple, free way to stay aware of their digital footprint as it evolves. Also, you may want to consider using a data removal service to help clean up your child’s personal information that may appear on people-search sites or data-broker platforms. These tools scan the web for outdated profiles, cached pages, and databases containing sensitive details like addresses, phone numbers, and photos. They can automatically submit takedown requests and continue monitoring for new exposures over time.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.comGet a free scan to find out if your personal information is already out on the web: Cyberguy.comTake my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.comKurt’s key takeawaysParenting in the digital age doesn’t mean knowing every app or trend. It means understanding the fundamentals that shape your child’s online experience. From screen time limits to digital footprints, these five terms give you the language to set boundaries, foster trust, and keep your family safer online.CLICK HERE TO DOWNLOAD THE FOX NEWS APPWant more help building healthy digital habits at home? Let us know by writing to us at Cyberguy.comSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletterCopyright 2025 CyberGuy.com.  All rights reserved.  

5 phone safety tips every parent should know Read More »