<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Latest Security News | Fox News</title>
        <link>https://www.foxnews.com/category/tech/topics/security</link>
        <description>Discover the latest breaking news feed with FOX News. Find out what the latest news is and read about the latest news happening today.</description>
        <copyright>Copyright 2026 FOX News Network</copyright>
        <language>en-us</language>
        <pubDate>Fri, 24 Apr 2026 19:54:32 -0400</pubDate>
        <image>
            <url>https://global.fncstatic.com/static/orion/styles/img/fox-news/logos/fox-news-desktop.png</url>
            <title>Latest Security News | Fox News</title>
            <link>https://www.foxnews.com/category/tech/topics/security</link>
        </image>
        <atom:link href="https://www.foxnews.com/rss.xml?tag=security" rel="self" type="application/rss+xml"/>
        <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns:atom="http://www.w3.org/2005/Atom"/>
        <item>
            <link>https://www.foxnews.com/tech/fcc-router-rule-raises-questions-future-updates</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/fcc-router-rule-raises-questions-future-updates</guid>
            <title>FCC router rule raises questions about future updates</title>
            <description>What the policy means for your home network and security</description>
            <content:encoded>&lt;p&gt;A new move from the &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/topics/fcc"&gt;Federal Communications Commission&lt;/a&gt; is being framed as a national security step. But if you already have a router at home, the bigger question is simple: how long will it keep getting security updates?&lt;/p&gt;&lt;p&gt;The FCC recently updated its "Covered List" to include &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/politics/your-internet-router-could-china-linked-fcc-cracks-down-unacceptable-security-risks"&gt;routers produced in foreign countries&lt;/a&gt;, which blocks new models of that covered equipment from being approved for sale in the U.S.&lt;/p&gt;&lt;p&gt;At the same time, the FCC made something else clear. This change does not affect routers you already own, and it does not stop retailers from continuing to sell models that were previously approved.&lt;/p&gt;&lt;p&gt;So nothing shuts off overnight. However, the policy introduces a new layer of uncertainty around how long some devices will continue receiving updates.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/your-home-wi-fi-really-safe-think-again"&gt;&lt;strong&gt;IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://CyberGuy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my &lt;em&gt;Ultimate Scam Survival Guide&lt;/em&gt; free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;What the FCC router rule actually changed&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The policy focuses on future device approvals, not the devices already in your home.&lt;/p&gt;&lt;p&gt;Here is what the FCC says in plain terms:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Existing routers can still be used&lt;/li&gt;&lt;li&gt;Previously approved models can still be sold and imported&lt;/li&gt;&lt;li&gt;New covered models cannot receive FCC authorization&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This action is tied to &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/politics/executive/national-security"&gt;national security concerns&lt;/a&gt; about supply chain risks, not a product-by-product security test of individual routers. The key takeaway is this: your current router is not banned, recalled or disabled.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why the FCC router rule raises update concerns&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The real issue is not about using your router today. It is about future &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/topics/software"&gt;software&lt;/a&gt; and firmware updates. Alongside the policy change, the FCC issued a temporary waiver. That waiver allows existing routers to continue receiving updates that patch vulnerabilities, maintain functionality and ensure compatibility with operating systems. Right now, that waiver runs through at least March 1, 2027.&lt;/p&gt;&lt;p&gt;That date is not a guaranteed cutoff. The FCC has said it will re-evaluate the policy before then and may extend or modify the waiver. So the situation is still evolving.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How the FCC router rule could affect your router security&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Your router is the gateway to &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/smart-home-hacking-fears-whats-real-whats-hype"&gt;everything connected in your home&lt;/a&gt;. Phones, laptops, smart TVs and cameras all depend on it. When a vulnerability is discovered, a software update is usually what fixes it.&lt;/p&gt;&lt;p&gt;If updates slow down or stop, the risk builds over time. That does not mean your router suddenly becomes unsafe. But it can become easier for attackers to exploit known flaws.&lt;/p&gt;&lt;p&gt;Even the FCC acknowledged this in its waiver, noting that continued updates help mitigate harm to consumers and support essential security functions. So the concern is not immediate. It is about what happens over time if support policies change.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/browser-extensions-put-millions-google-chrome-users-risk"&gt;&lt;strong&gt;BROWSER EXTENSIONS PUT MILLIONS OF GOOGLE CHROME USERS AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why the FCC is making exceptions for some routers&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;One important wrinkle is that the FCC has already begun granting conditional approvals for some devices. In April 2026, the agency approved certain products from NETGEAR and Adtran to continue operating under specific conditions through October 1, 2027.&lt;/p&gt;&lt;p&gt;That shows this is not a one-size-fits-all rule. Instead, it is an evolving policy where some devices may continue receiving support while others may face tighter restrictions.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What the FCC says about router risks and next steps&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The FCC says the decision is based on national security concerns, including supply chain vulnerabilities and &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/chinese-hackers-target-us-telecoms-what-you-need-know-protect-your-data"&gt;potential cybersecurity risks&lt;/a&gt; tied to certain foreign-produced equipment.&lt;/p&gt;&lt;p&gt;At the same time, the policy includes a path for exceptions. Companies can seek conditional approvals through federal agencies, and regulators can revisit the rules as more information becomes available.&lt;/p&gt;&lt;p&gt;That means the final impact will likely depend on how those decisions play out over time.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;8 ways to protect your network after the FCC router rule&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Until there is more clarity, a few simple steps can help keep your home network secure.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Check how long your router is supported&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;First, find your &lt;strong&gt;router's exact model number&lt;/strong&gt;. You can usually see it on a label on the bottom or back of the device. Next, go to the manufacturer's website, such as NETGEAR, Linksys or TP-Link, and search for &lt;strong&gt;that model.&lt;/strong&gt; Open its &lt;strong&gt;support page&lt;/strong&gt; and look for sections like &lt;strong&gt;Support, Downloads, Firmware or End of Life&lt;/strong&gt;. Then, check for &lt;strong&gt;a support timeline,&lt;/strong&gt; the date of the most recent firmware update or any notes saying the product is no longer supported. If you cannot find clear information, that is a warning sign that your router may not receive regular security updates. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Keep your router updated&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Next, log into your &lt;strong&gt;router settings.&lt;/strong&gt; To do this, open a &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/category/tech/technologies/browsers"&gt;web browser&lt;/a&gt; and type your router's &lt;strong&gt;IP address&lt;/strong&gt; into the address bar. Common ones include 192.168.1.1 or 192.168.0.1. Then sign in using your &lt;strong&gt;admin username and password&lt;/strong&gt;. Once you are in, look for sections labeled &lt;strong&gt;Firmware, Software Update &lt;/strong&gt;or &lt;strong&gt;Administration.&lt;/strong&gt; Check for available &lt;strong&gt;updates&lt;/strong&gt; and&lt;strong&gt; install them&lt;/strong&gt; if needed. If your router supports automatic updates, turn that on. This helps close security gaps quickly without you having to check manually. If you are not sure where to find these settings, you can also use your router's mobile app if it has one, which often makes updates easier.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/get-faster-wi-fi-simple-home-fixes"&gt;&lt;strong&gt;GET FASTER WI-FI WITH THESE SIMPLE HOME FIXES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Plan ahead for replacement&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If your router is already a few years old, start planning for a replacement. Do not wait until updates stop. Instead, look for models with clearly stated support timelines. &lt;strong&gt;Check out our picks for the Top Routers for best security at &lt;/strong&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt; &lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Secure your devices as a backup layer&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Your router is the first line of defense. However, your devices matter too. Keep your phone, computer and tablet updated. Also, use strong antivirus software to help catch threats that slip through. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;/strong&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://Cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Review connected devices&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;From time to time, check what is connected to your network. You can do this in your router settings under "Connected Devices" or in your router's app. If you see anything unfamiliar, remove it right away.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Use strong passwords&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Create a &lt;a target="_blank" rel="noopener" href="https://www.foxnews.com/tech/dont-use-your-home-wi-fi-before-fixing-security-risks"&gt;strong Wi-Fi password&lt;/a&gt; and a separate admin password for your router. Avoid using default credentials. A password manager can help you generate and store secure logins. &lt;strong&gt;Check out the best expert-reviewed password managers of 2026 at &lt;/strong&gt;&lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://Cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Turn off remote access&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;First, log into your router settings using a web browser. Type your router's IP address, such as &lt;strong&gt;192.168.1.1&lt;/strong&gt; or &lt;strong&gt;192.168.0.1&lt;/strong&gt;, into the address bar and sign in with your admin credentials. Next, look for settings labeled &lt;strong&gt;Remote Access, Remote Management, Web Access from WAN, or Cloud Access&lt;/strong&gt;. These are often found under sections like &lt;strong&gt;Advanced, Administration or Security&lt;/strong&gt;. Then, turn that setting off and save your changes. This prevents your router from being accessed from outside your home network. If you cannot find the option, check your router's mobile app or the manufacturer's support page. Some routers hide this setting or disable it by default.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Restart your router regularly&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;First, unplug your router from the power outlet. Wait about &lt;strong&gt;30 seconds&lt;/strong&gt; to let it fully shut down. Next, plug it back in and wait a few minutes for it to reconnect to the internet. You can also restart your router through its settings. Log in, then look for options like &lt;strong&gt;Reboot or Restart&lt;/strong&gt; under sections such as &lt;strong&gt;Administration or System&lt;/strong&gt;. Doing this every few weeks can help apply updates and clear temporary issues that may affect performance or security. If your router supports scheduled reboots, you can turn that on to automate the process.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaway&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is not a situation where your internet suddenly becomes unsafe. There is no recall. There is no shutdown. Your router will not stop working on a specific date. However, there is a new question mark that did not exist before. The Federal Communications Commission has created a system where future updates for some devices could depend on how the rules evolve. That puts more importance on something most people rarely think about: how long their router will stay supported. For now, you still have time. The current waiver runs into 2027, and regulators have signaled they may revisit the policy before then. The smart move is simple. Know what you own, keep it updated and stay aware as this situation develops.&lt;/p&gt;&lt;p&gt;&lt;a target="_blank" rel="noopener" href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;As policies around your home tech change, how much responsibility should fall on regulators versus the companies that keep your devices updated? Let us know by writing to us at &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://Cyberguy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://CyberGuy.com"&gt;&lt;strong&gt;&lt;em&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/a&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my &lt;em&gt;Ultimate Scam Survival Guide&lt;/em&gt; free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 &lt;a target="_blank" rel="noopener noreferrer nofollow" href="http://CyberGuy.com"&gt;CyberGuy.com&lt;/a&gt;.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/fcc-router-rule-1.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">02f9d928-e5ab-5fd9-a151-6e04b281abc6</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/newsedge/consumer</category>
            <category domain="foxnews.com/taxonomy">fox-news/us</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/wifi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fcc</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 24 Apr 2026 09:17:31 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/booking-com-data-breach-exposes-traveler-data-scams</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/booking-com-data-breach-exposes-traveler-data-scams</guid>
            <title>Booking.com data breach exposes traveler data to scams</title>
            <description>Stolen Booking.com data may be used in scams. Here's how to protect your data</description>
            <content:encoded>&lt;p&gt;You probably didn't expect a &lt;a href="https://www.foxnews.com/category/travel" target="_blank" rel="noopener"&gt;travel booking platform&lt;/a&gt; to send you into a security spiral. Yet here we are.&lt;/p&gt;&lt;p&gt;Booking.com confirmed that &lt;a href="https://www.foxnews.com/category/tech/topics/hackers" target="_blank" rel="noopener"&gt;hackers may have accessed customer data,&lt;/a&gt; including names, email addresses, phone numbers and booking details. That is enough information to make scam messages look real.&lt;/p&gt;&lt;p&gt;If you've booked a hotel or rental through the platform, this is worth your attention.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/smart-travel-safety-tips-before-your-next-trip" target="_blank" rel="noopener"&gt;&lt;strong&gt;SMART TRAVEL SAFETY TIPS BEFORE YOUR NEXT TRIP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What happened in the Booking.com data breach&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The company sent &lt;a href="https://www.foxnews.com/category/tech/technologies/email" target="_blank" rel="noopener"&gt;email notifications&lt;/a&gt; to affected customers after detecting "suspicious activity involving unauthorized third parties" accessing guest booking information. That's the corporate way of saying someone got in who shouldn't have been there.&lt;/p&gt;&lt;p&gt;One user shared the full notification on Reddit, where dozens of others said they received the same message. That suggests this was not an isolated case. The notice warned that anything customers "may have shared with the accommodation" could also have been exposed, meaning the breach went beyond basic account data.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What data was exposed in the Booking.com breach&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Booking.com confirmed that &lt;a href="https://www.foxnews.com/tech/banking-tech-data-breach-exposes-672k-ransomware-attack" target="_blank" rel="noopener"&gt;financial information was not accessed&lt;/a&gt;. Physical home addresses were also not part of the breach, according to the company. So no, someone doesn't have your credit card number or home address from this incident.&lt;/p&gt;&lt;p&gt;What they do potentially have: your name, email address, phone number and the details of your reservation. That's enough to craft a &lt;a href="https://www.foxnews.com/tech/new-fbi-warning-reveals-phishing-attacks-hitting-private-chats" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;convincing phishing message&lt;/u&gt;&lt;/a&gt;, which some hackers may already be doing.&lt;/p&gt;&lt;p&gt;"At Booking.com, we are dedicated to the security and data protection of our guests," a Booking.com spokesperson said in a statement to CyberGuy. "We recently noticed some suspicious activity involving unauthorized third parties being able to access some of our guests' booking information, which may include booking details, names, email addresses and phone numbers and anything that travelers may have shared with the accommodation."&lt;/p&gt;&lt;p&gt;"Financial information was not accessed from Booking.com's systems, nor were guests' physical addresses," the spokesperson continued. "Upon discovering the activity, we took action to contain the issue. We have updated the PIN number for these reservations and informed our guests."&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/apple-now-lets-you-add-your-passport-your-phones-wallet" target="_blank" rel="noopener"&gt;&lt;strong&gt;APPLE NOW LETS YOU ADD YOUR PASSPORT TO YOUR PHONE'S WALLET&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How scammers are using stolen booking data&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;A user who posted the notification on Reddit said that two weeks before receiving it, they got a phishing message on WhatsApp that included their real booking details and personal information. That timing matters. It suggests hackers may have already been using the data before many customers were notified.&lt;/p&gt;&lt;p&gt;It is not clear whether that earlier phishing attempt is directly tied to this specific breach, but it shows how detailed booking information can be used in targeted scams.&lt;/p&gt;&lt;p&gt;That is what makes this breach more dangerous than it first appears. When scammers know where you are staying and when, they can create messages that feel legitimate. A fake alert about a problem with your reservation or a request to confirm payment details suddenly looks real.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How past incidents highlight potential risks&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This breach did not happen in a vacuum. In 2024, hackers infected computers at &lt;a href="https://www.foxnews.com/category/travel/general/hotels" target="_blank" rel="noopener"&gt;multiple hotels&lt;/a&gt; with a type of consumer-grade spyware known as stalkerware. In one documented case, a hotel employee was logged into their Booking.com admin portal when the software captured a screenshot of the screen, exposing visible customer data.&lt;/p&gt;&lt;p&gt;That detail points to a broader issue. In some cases, vulnerabilities may exist not just within a platform, but across the hotels and systems connected to it. The current breach may follow a similar pattern, though the company has not confirmed how the unauthorized access occurred.&lt;/p&gt;&lt;p&gt;To put the scale in context, Booking.com says 6.8 billion bookings have been made through the platform since 2010. Even a small percentage of affected users represents a large number of people.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/new-fbi-warning-reveals-phishing-attacks-hitting-private-chats" target="_blank" rel="noopener"&gt;&lt;strong&gt;NEW FBI WARNING REVEALS PHISHING ATTACKS HITTING PRIVATE CHATS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Ways to stay safe after the Booking.com breach&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You don't have to &lt;a href="https://www.foxnews.com/tech/how-minimize-your-digital-footprint-when-you-travel" target="_blank" rel="noopener"&gt;swear off travel apps&lt;/a&gt; to protect yourself. A few targeted steps go a long way.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Check for an official notification&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Check your email for a message from Booking.com. If you received one, take it seriously rather than filing it away. The company says it has updated PINs for affected reservations, but your account itself may still need attention.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Update your password now&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Change your Booking.com password, especially if you reuse it anywhere else. &lt;a href="https://www.foxnews.com/tech/200-million-social-media-records-leaked-major-x-data-breach" target="_blank" rel="noopener"&gt;Credential stuffing attacks are&lt;/a&gt; common after breaches, and reused passwords make it easy for hackers to break into other accounts. A password manager can help you create and store strong, unique passwords so you are not relying on the same one across multiple sites.&lt;strong&gt; Check out the best expert-reviewed password managers of 2026 at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Turn on two-factor authentication&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Enable two-factor authentication (&lt;a href="https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) if you haven't already. It adds a step, but it also blocks access even if someone has your password.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Consider identity theft protection&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Even though financial data was not accessed, exposed personal details can still be used in scams or identity theft attempts. An identity protection service can monitor your information, alert you to suspicious activity and provide support if your identity is compromised. &lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Watch for highly targeted phishing messages&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Be skeptical of any message that references your booking details, whether it arrives by email, text or WhatsApp. Legitimate companies rarely ask you to click a link and re-enter payment information. Hackers with your booking data can write convincing fakes that look urgent.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Verify bookings through official channels&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you get a message about your reservation, do not click the link. Open the Booking.com app or type the website address manually. You can also contact the hotel directly using the number listed on its official website.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Add a safety net in case you click something malicious&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you accidentally click a suspicious link, strong antivirus software can help detect malicious websites or downloads before they cause damage. Look for tools that offer real-time protection and phishing detection, not just basic virus scans. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Limit how your personal data is exposed online&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Data brokers collect and sell personal details like your phone number and email address. That makes it easier for scammers to &lt;a href="https://www.foxnews.com/tech/1-billion-identity-records-exposed-id-verification-data-leak" target="_blank" rel="noopener"&gt;connect stolen booking data&lt;/a&gt; to a real person. Removing your information from these sites with a data removal service can reduce how often you are targeted. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;9) Report anything suspicious quickly&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you receive a phishing attempt that includes your real reservation details, contact Booking.com directly and report the message to your phone carrier or email provider. Reporting helps shut down scams faster.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Data breaches at major travel platforms are uncomfortable precisely because travel feels personal. Your itinerary, your accommodation and your plans are wrapped up in those booking details, and now someone else may have a copy. The good news is that financial information and home addresses were not part of this breach. The bad news is that the stolen data is detailed enough to be weaponized in targeted phishing attacks, and there's evidence that it already has been. Booking.com updated its customers, reset PINs for affected reservations and publicly confirmed the incident. That's more transparency than many companies offer. But the fact that users were receiving phishing messages on WhatsApp two weeks before the formal notification went out is worth sitting with. You can't control whether the platform you use gets breached. You can control whether you're an easy target once your data is out there.&lt;/p&gt;&lt;p&gt;How much responsibility should companies like Booking.com take when your personal data fuels scams? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 &lt;a href="http://CyberGuy.com" target="_blank" rel="noopener noreferrer nofollow"&gt;CyberGuy.com&lt;/a&gt;. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/booking-com-data-breach-1.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">9351d18d-4c41-5b13-a7d3-bfeb9938072a</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/travel/general/hotels</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Wed, 22 Apr 2026 18:30:52 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/6-crypto-scam-scripts-criminals-use-steal-your-money</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/6-crypto-scam-scripts-criminals-use-steal-your-money</guid>
            <title>6 crypto scam scripts criminals use to steal your money</title>
            <description>Real examples of the messages scammers use to convince people to send cryptocurrency</description>
            <content:encoded>&lt;p&gt;Just about every day, we receive emails from readers who have encountered new scams. Many involve cryptocurrency. The pattern keeps repeating. Someone receives a message that feels urgent, emotional or exciting. The person on the other end sounds confident and persuasive. Before long, the victim is being asked to &lt;a href="https://www.foxbusiness.com/category/cryptocurrency" target="_blank" rel="noopener"&gt;send money through cryptocurrency.&lt;/a&gt; Once the money is sent, it often disappears forever.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;Cryptocurrency appeals to scammers&lt;/a&gt; for a simple reason. Transactions move quickly, often cross international borders and usually cannot be reversed once completed. That combination makes crypto payments especially attractive to criminals.&lt;/p&gt;&lt;p&gt;Kate recently wrote to us with a great question.&lt;/p&gt;&lt;p&gt;Kate is absolutely right. These scripts are convincing because scammers practice them constantly. They use psychology, urgency and emotion to push people toward quick decisions.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fake-google-gemini-ai-pushes-google-coin-crypto-scam" target="_blank" rel="noopener"&gt;&lt;strong&gt;FAKE GOOGLE GEMINI AI PUSHES ‘GOOGLE COIN’ CRYPTO SCAM&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Let's break down some of the most common crypto scam scripts, so you know what they sound like before they reach your inbox or phone.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;The investment opportunity script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This script often begins with a friendly introduction through social media, email or even a text message.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"Hi, I work with a &lt;/i&gt;&lt;a href="https://www.foxnews.com/category/us/economy/investment" target="_blank" rel="noopener"&gt;&lt;i&gt;private investment group&lt;/i&gt;&lt;/a&gt;&lt;i&gt; that trades cryptocurrency. We've helped many people earn steady returns. If you invest $500 today, you could earn $5,000 within weeks. I can show you proof of other investors' success."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The scammer may send fake screenshots of profits. Some will even allow a small withdrawal early on to build trust. Eventually, they push the victim to send larger deposits. Once the larger transfer is sent, the account suddenly stops responding.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The romance crypto script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam often starts with a simple message on a dating app, &lt;a href="https://www.foxnews.com/category/tech/companies/facebook" target="_blank" rel="noopener"&gt;Facebook or Instagram.&lt;/a&gt; The first contact is friendly and low-pressure.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example initial script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"Hi, insert name here, I hope you don't mind me saying hello. Your profile caught my attention, and you seem like a very kind person. How has your day been?"&lt;/i&gt;&lt;/p&gt;&lt;p&gt;After a few days of conversation, the scammer begins sharing details about their life. They often claim to work overseas as an engineer, doctor or business owner. Eventually, they mention cryptocurrency trading as something they do on the side.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Later message in the script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"I have been doing some short-term crypto trading after work. It has helped me save a lot faster. If you are interested, I can show you the platform I use. It is very easy to start with a small amount."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;From there, the scammer guides the victim to a fake trading site or asks them to transfer cryptocurrency to a wallet they control. At first, the account may show fake profits. The victim believes the investment is working and sends more money. Eventually, the victim cannot withdraw any money. &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/malicious-mac-extensions-steal-crypto-wallets-passwords" target="_blank" rel="noopener"&gt;&lt;strong&gt;MALICIOUS MAC EXTENSIONS STEAL CRYPTO WALLETS AND PASSWORDS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The government impersonation script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers often pretend to represent government agencies or law enforcement.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"This is an urgent notice &lt;/i&gt;&lt;a href="https://www.foxnews.com/category/us/economy/taxes" target="_blank" rel="noopener"&gt;&lt;i&gt;regarding your tax account.&lt;/i&gt;&lt;/a&gt;&lt;i&gt; Your Social Security number has been linked to suspicious activity. To prevent legal action, you must verify your identity and pay the outstanding balance today using cryptocurrency."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Government agencies do not demand payment through cryptocurrency. The goal is to scare you into acting quickly without checking the facts. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The tech support emergency script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam often begins with a pop-up warning or an unexpected phone call.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"Your computer has been compromised by hackers. Your bank information may be at risk. To secure your system, we need you to transfer funds temporarily into a &lt;/i&gt;&lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;&lt;i&gt;protected cryptocurrency wallet.&lt;/i&gt;&lt;/a&gt;&lt;i&gt;"&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The scammer claims the funds will be returned once the system is secure. In reality, the transfer moves the money directly to the criminal.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The crypto giveaway script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam frequently appears on social media or video platforms.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;"&lt;i&gt;We are celebrating a new crypto launch. Send 0.1 Bitcoin to this wallet, and we will immediately send back double the amount."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The message may appear to come from a well-known company or public figure. The wallet address belongs to the scammer. Anyone who sends funds receives nothing in return.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The fake recovery service script&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam targets people who have already lost money.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Example script:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;"We specialize in recovering stolen cryptocurrency. Our investigators located the wallet that received your funds. To begin the recovery process, we require a small crypto payment to unlock the legal tracing tools."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;The victim believes they are hiring professionals to recover their money. Instead, they are being scammed again.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why these scripts work so well&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;These scams succeed because they exploit human behavior. First, they create urgency. Victims feel pressured to act quickly.&lt;/p&gt;&lt;p&gt;Second, they create trust. The scammer may sound friendly or sympathetic.&lt;/p&gt;&lt;p&gt;Third, they promise rewards. Investment scams offer profits that feel life-changing.&lt;/p&gt;&lt;p&gt;Finally, cryptocurrency adds confusion. Many people are still learning how it works. Criminals take advantage of that uncertainty.&lt;/p&gt;&lt;p&gt;Understanding these scripts is the first step to protecting yourself. Once you recognize the patterns scammers use, it becomes much easier to stop the conversation before money is involved. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to protect yourself from crypto scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Crypto scammers rely on urgency, trust and confusion to pressure victims into sending money. These practical steps can help you recognize warning signs and avoid costly mistakes. &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/one-click-cost-father-4-million-bitcoin-vishing-scammers" target="_blank" rel="noopener"&gt;&lt;strong&gt;1 CLICK COST A FATHER $4 MILLION IN BITCOIN TO VISHING SCAMMERS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Slow down when money is involved&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers depend on urgency to push victims into fast decisions. If someone pressures you to send money immediately, treat it as a warning sign. Pause the conversation and verify the situation independently. Contact the company, agency or person through a known phone number or official website. Taking even a few minutes to step back can stop a scam before money leaves your account.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Never send cryptocurrency to someone you do not know&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Cryptocurrency transactions work very differently from credit cards or bank transfers. Once funds are sent, they usually cannot be reversed. Scammers prefer crypto because it moves quickly and often crosses international borders. If someone asks for payment through Bitcoin, Ethereum or another digital currency, assume the request is suspicious until proven otherwise.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Verify investment opportunities independently&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many crypto scams promise fast profits or guaranteed returns. Legitimate investments never guarantee profits. Before investing, search the company name, website and contact information online. Look for warnings from regulators or consumer protection agencies. If you cannot find reliable information about the company, that is a major red flag.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Use strong antivirus software on your devices&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers frequently use phishing links, fake websites and malicious downloads to trick victims. Strong antivirus software can help detect these threats before they cause damage. Strong antivirus software can warn you about suspicious websites, block malicious downloads and help stop phishing attempts that try to steal your financial information. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Reduce the personal information scammers can find online&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers often research their targets before sending messages. They may gather &lt;a href="https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online" target="_blank" rel="noopener"&gt;details from public records,&lt;/a&gt; social media or data broker websites. Limiting the amount of personal information available online can make it harder for criminals to craft convincing messages. Removing your data from people search sites with a data removal service can reduce the chances of becoming a target. &lt;strong&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Be cautious with online relationships&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Romance scams often begin with friendly messages on dating apps or social media. Over time, the scammer builds trust and eventually introduces a crypto investment opportunity. If someone you have never met begins discussing cryptocurrency investments or asks you to move money, take a step back. Real relationships do not require financial transfers to strangers.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Never trust screenshots or profit dashboards&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Crypto scammers often show screenshots of trading accounts that appear to generate large profits. These images are easy to fake or are displayed on fraudulent websites controlled by the scammer. Even if a platform shows profits, it does not mean the money exists. If you cannot withdraw funds easily through a verified exchange, the investment may be fake.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Watch for requests to move conversations off the platform&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many scams begin on social media, &lt;a href="https://www.foxnews.com/category/tech/technologies/apps" target="_blank" rel="noopener"&gt;dating apps or messaging platforms.&lt;/a&gt; After the first contact, scammers often ask victims to continue the conversation on WhatsApp, Telegram or another private messaging app. Moving the conversation helps them avoid detection by the original platform. If someone quickly asks you to switch apps, treat it as a warning sign. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;9) Talk to someone you trust before sending money&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers often isolate their victims and discourage them from discussing the situation with friends or family. Before sending cryptocurrency or making a large investment, pause and talk to someone you trust. A second opinion can often spot warning signs that are easy to miss when emotions are involved. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What to do if you already sent cryptocurrency to a scammer&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If you believe you sent cryptocurrency to a scammer, act quickly. Contact the exchange or platform you used to send the funds and report the transaction immediately. Some exchanges may be able to flag the receiving wallet and help investigators track suspicious activity.&lt;/p&gt;&lt;p&gt;You should also report the scam to the FTC at &lt;i&gt;&lt;strong&gt;reportfraud.ftc.gov&lt;/strong&gt; &lt;/i&gt;and notify your local law enforcement agency. If the scam began on a social media site, dating app or messaging platform, report the account there as well so it can be investigated and removed. &lt;/p&gt;&lt;p&gt;While recovering funds can be difficult, reporting the incident can help authorities identify larger fraud networks and potentially prevent others from becoming victims. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Cryptocurrency scams continue to grow because the scripts are polished and carefully tested. The criminals behind them understand human psychology. They know when to apply pressure, when to build trust and when to promise rewards. Recognizing these patterns is one of the most powerful ways to stop them. When you know the script, the scam becomes much easier to spot.&lt;/p&gt;&lt;p&gt;Have you ever received a message that tried to convince you to send cryptocurrency, and did the script almost sound believable? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/cryptocurrency-scam-scripts-1.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">e0db021b-5a16-594c-a4e3-81ec4f27d59a</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Mon, 20 Apr 2026 12:30:34 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/one-thing-scammers-check-targeting-online</guid>
            <title>The one thing scammers check before targeting you online</title>
            <description>Scammers don’t hack you first; they look you up using public records and data broker sites</description>
            <content:encoded>&lt;p&gt;Most people assume scammers need to &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;hack something&lt;/a&gt;. A database. A password. A bank system. They don't.&lt;/p&gt;&lt;p&gt;In most cases, everything a scammer needs to target you is already sitting online, publicly available, completely legal to access and surprisingly easy to find.&lt;/p&gt;&lt;p&gt;Here's what they're actually looking at before they ever pick up the phone.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com,&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;Your personal profile is already out there, and it's more complete than you think&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;There's an entire industry built around collecting and selling your personal information. It's called &lt;a href="https://www.foxnews.com/category/us/personal-freedoms/privacy" target="_blank" rel="noopener"&gt;data brokering&lt;/a&gt;, and most people have never heard of it.&lt;/p&gt;&lt;p&gt;Right now, without your knowledge or consent, your details are being published by dozens of websites, including:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;People search sites&lt;/strong&gt; (like Whitepages, Spokeo and BeenVerified): your full name, current address, phone numbers and age.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Address lookup tools&lt;/strong&gt;: your current and past home addresses, sometimes going back decades.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Relatives databases&lt;/strong&gt;: the names and contact information of your family members, automatically linked to your profile.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Property records&lt;/strong&gt;: whether you own your home, what it's worth and when you bought it.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;None of this requires a hack. It's all pulled from public records, voter registrations, court filings, real estate transactions, marriage and divorce records and assembled into a profile that anyone can search for a few dollars or sometimes for free.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;They're not guessing; they're researching&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;In 2024, federal prosecutors indicted a network of scam call centers operating out of Montreal that had defrauded hundreds of elderly Americans out of more than $21 million. What made the scheme so effective wasn't sophisticated technology. It was a spreadsheet.&lt;/p&gt;&lt;p&gt;The scammers were working from lists of potential victims that included names, ages and household income information pulled from commercial databases. They used those lists to identify targets, then called them pretending to be grandchildren in trouble. The calls were convincing enough that victims handed over thousands of dollars, sometimes in cash picked up at the door.&lt;/p&gt;&lt;p&gt;They didn't hack anyone. They just did their research first.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/why-widows-divorced-women-targets-retirement-scams" target="_blank" rel="noopener"&gt;&lt;strong&gt;WHY WIDOWS AND DIVORCED WOMEN ARE TARGETS FOR RETIREMENT SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Three ways scammers turn your public data into a weapon&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers use your publicly available data to make their attacks more personal, believable and harder to detect. Here are three ways they do it.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Impersonating your bank&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A scammer calls and says, "Hi, this is fraud prevention at [your bank]. We're seeing suspicious activity on your account ending in 4721."&lt;/p&gt;&lt;p&gt;They already know your bank, your name and possibly your address. That's enough to sound legitimate. From there, they walk you through "confirming your identity," which is really just you handing over the information they need to access your account.&lt;/p&gt;&lt;p&gt;This kind of scam starts with a simple people search lookup. Your name and address lead to property records. Property records suggest your income range.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) The family emergency call&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Imagine getting a call:&lt;i&gt; &lt;/i&gt;"Meemaw, it's me. I'm in trouble. Please don't tell Mom."&lt;i&gt; &lt;/i&gt;Scammers don't guess. Instead, they research your family first. They use relatives' databases to find your children's names, ages and connections.&lt;/p&gt;&lt;p&gt;With that information, they build a story that sounds real. For example, they know to call you "Meemaw." They also know which grandchild to impersonate. In some cases, they even mention a sibling's name to make the story more convincing.&lt;/p&gt;&lt;p&gt;As a result, the call feels personal and urgent. However, none of it is random. It's all based on information that was publicly available the entire time.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Targeted phishing with your own details&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A &lt;a href="https://www.foxnews.com/category/tech/technologies/email" target="_blank" rel="noopener"&gt;phishing email&lt;/a&gt; that says &lt;i&gt;"&lt;/i&gt;Dear Customer" is easy to ignore. One that says "Dear [your full name], we noticed unusual activity on your account registered to [your home address]" is a lot harder to dismiss.&lt;/p&gt;&lt;p&gt;Scammers use publicly available data to personalize attacks, adding your real name, city or even a reference to your neighborhood to make a fake email or text look authentic. The more specific the details, the more likely you are to believe it.&lt;/p&gt;&lt;p&gt;"But I'm not on social media."&lt;i&gt; &lt;/i&gt;This is the most common objection, and it misses the point entirely.&lt;/p&gt;&lt;p&gt;You don't have to be on social media for your information to be online. Data brokers pull from public records, not your Facebook profile. Your information is likely already listed on dozens of sites because of:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Your home purchase&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.foxnews.com/category/us/economy/public-sector" target="_blank" rel="noopener"&gt;Voter registration records&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Court or property tax filings.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;The less they think they've shared, the more surprised people usually are when they search for themselves on a people search site for the first time.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/data-brokers-accused-hiding-opt-out-pages-from-google" target="_blank" rel="noopener"&gt;&lt;strong&gt;DATA BROKERS ACCUSED OF HIDING OPT-OUT PAGES FROM GOOGLE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to reduce your exposure&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You don't have to accept this as permanent. A few practical steps can help:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Search your full name&lt;/strong&gt; on Whitepages, Spokeo, FastPeopleSearch and other &lt;a href="https://www.foxnews.com/tech/how-remove-your-personal-info-from-people-search-sites" target="_blank" rel="noopener"&gt;people search sites&lt;/a&gt; and submit opt-out requests.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Look up your address directly, &lt;/strong&gt;not just your name, since many listings are organized by location.&lt;/li&gt;&lt;li&gt;Ask elderly family members to &lt;strong&gt;search for themselves,&lt;/strong&gt; too, since older adults are disproportionately targeted.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Be skeptical&lt;/strong&gt; of any call that opens with personal details, as it can be a sign that someone researched you first.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;How to remove your personal data and stop scammers from finding you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The challenge is that there are hundreds of data broker sites, each with its own removal process. Manually opting out of all of them can take hours, and your information often reappears weeks later when brokers refresh their databases.&lt;/p&gt;&lt;p&gt;That's why ongoing automated removal is the only approach that actually works. That's why I recommend using a trusted data removal service.&lt;/p&gt;&lt;p&gt;These services automatically contact data brokers on your behalf and request the removal of your personal information. They also continue monitoring those sites and submit new removal requests if your data reappears.&lt;/p&gt;&lt;p&gt;Many services remove personal data from hundreds of data broker and people search websites, and some plans allow you to request removals from additional sites as needed.&lt;/p&gt;&lt;p&gt;Some have also received third-party assurance from independent firms, helping validate their claims.&lt;/p&gt;&lt;p&gt;The goal is simple: make it much harder for strangers, scammers and cybercriminals to find your personal information online.&lt;/p&gt;&lt;p&gt;These services often include a money-back guarantee, so you can try them risk-free and see how much of your information is exposed online.&lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Most scams don't start with a breach. They start with a search. Your name, address, relatives and even income clues are already out there, quietly fueling more convincing and more dangerous attacks. That's what makes this so unsettling. You can do everything "right" online and still be exposed because the system itself is built to share your information. &lt;/p&gt;&lt;p&gt;The good news is you're not powerless. Once you understand how scammers build their playbook, you can start disrupting it. Removing your data, limiting exposure and staying skeptical of anyone who knows a little too much about you can dramatically reduce your risk. The goal isn't to disappear completely. It's to make yourself a much harder target.&lt;/p&gt;&lt;p&gt;What should be done to stop scammers from using your publicly available data against you in the first place? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/person-typing-on-computer-001.jpeg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpeg"/>
            <category domain="foxnews.com/metadata/dc.identifier">fcc0b9d5-b5a0-52c1-bc76-1b7932f5e48e</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/websites</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/taxonomy">fox-news/lifestyle/real-estate</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sat, 18 Apr 2026 14:45:23 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/5-worrisome-privacy-clauses-hidden-smart-home-devices</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/5-worrisome-privacy-clauses-hidden-smart-home-devices</guid>
            <title>5 worrisome privacy clauses hidden in smart home devices</title>
            <description>Your TV, car and voice assistants may be collecting more data than you think</description>
            <content:encoded>&lt;p&gt;Many of the apps and devices we use every day contain privacy terms most people never read. Yet those clauses often allow extensive data harvesting, behavioral tracking and long-term storage of personal information. Some even allow companies to access recordings or share data with partners.&lt;/p&gt;&lt;p&gt;The reality is simple. Smart devices inside your home and car can build detailed profiles about your daily life. Your schedule. Your habits. Even your conversations. One way I explain this to people is simple. Your phone knows where you go. Your smart home knows what you do when you get there. I unpack how this works in everyday life on my Beyond Connected podcast at &lt;i&gt;&lt;strong&gt;getbeyondconnected.com&lt;/strong&gt;&lt;/i&gt;. In many cases, these devices are not just reacting to you. They are actively logging, analyzing, and storing your behavior by default, often without you realizing it.&lt;/p&gt;&lt;p&gt;Let's walk through five &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;privacy clauses&lt;/a&gt; that surprise most people. We will start with number five and count down to the most unsettling one.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/your-phone-shares-data-night-heres-how-stop" target="_blank" rel="noopener"&gt;&lt;strong&gt;YOUR PHONE SHARES DATA AT NIGHT: HERE'S HOW TO STOP IT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 5: 'We log and share your driving data'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Today's vehicles are no longer just transportation. Many now operate as connected computers on wheels. Connected vehicle platforms and systems, such as Android Automotive OS, collect large amounts of telemetry data.&lt;/p&gt;&lt;p&gt;That can include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Vehicle speed&lt;/li&gt;&lt;li&gt;Seat usage&lt;/li&gt;&lt;li&gt;Climate controls&lt;/li&gt;&lt;li&gt;Location and trip data&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Researchers have found that vehicles may gather dozens or even hundreds of data points during normal driving. In some cases, researchers found that vehicle speed can be logged as frequently as 25 times per second, creating a highly detailed record of how you drive.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;What this means for drivers&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Your car may know:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Where you drive&lt;/li&gt;&lt;li&gt;When you drive&lt;/li&gt;&lt;li&gt;How aggressively you accelerate or brake&lt;/li&gt;&lt;li&gt;Which seats are occupied&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;That data can be used to infer stops, turns, and even risky driving behavior. In some cases, it may also be shared with third parties for advertising, insurance, or financing purposes. In other words, your vehicle can create a detailed picture of your driving behavior and routines. Many drivers never realize how much information their car collects.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 4: 'We track what you watch'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/entertainment/tv" target="_blank" rel="noopener"&gt;Your television&lt;/a&gt; may be one of the most active data collectors in your home. Many smart TVs from brands like Samsung, LG, and Roku use a technology called Automatic Content Recognition, often shortened to ACR.&lt;/p&gt;&lt;p&gt;ACR can analyze what appears on your screen across:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Streaming apps&lt;/li&gt;&lt;li&gt;Cable television&lt;/li&gt;&lt;li&gt;Gaming consoles&lt;/li&gt;&lt;li&gt;HDMI devices&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This technology works in real time, identifying what you are watching and reporting that information back to the company. Some policies even state that snippets of audio or video may be shared with third parties to match ads to your viewing. Some lawsuits have alleged that certain TVs capture screenshots extremely frequently to identify content.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Why this matters&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Your TV can learn:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What shows you watch&lt;/li&gt;&lt;li&gt;When you watch them&lt;/li&gt;&lt;li&gt;How long you stay on each program&lt;/li&gt;&lt;li&gt;Which devices you connect to the TV&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;That means the show you binge, the time you watch it, and even how long you stay engaged can be packaged and sold to advertisers almost instantly. That viewing data may then be shared with advertising partners to build detailed marketing profiles.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 3: 'We track your behavior and location'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Video doorbells are designed to increase home security. Yet they can also gather large amounts of behavioral data. Devices like the Ring Video Doorbell may automatically collect information such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Device identifiers&lt;/li&gt;&lt;li&gt;Browsing activity&lt;/li&gt;&lt;li&gt;Usage patterns&lt;/li&gt;&lt;li&gt;Timestamps&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Privacy disclosures also show that these devices can collect geolocation data, IP addresses, and details about the devices connected to your network.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;What that data can reveal&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Over time, a doorbell camera can build a timeline that shows:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;When you leave home&lt;/li&gt;&lt;li&gt;When deliveries arrive&lt;/li&gt;&lt;li&gt;How often visitors come&lt;/li&gt;&lt;li&gt;Which devices connect to your network&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Put together, this creates a detailed map of your daily routine, including when you are home, when you are away, and how your household operates. Individually, these signals seem harmless. Together, they can reveal detailed patterns about your household. If an account is ever compromised, that data can act as a blueprint of your life, not just a camera feed.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 2: 'Humans may review your recordings'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Some smart devices store recordings that help improve voice recognition and AI systems. Devices that may store recordings include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="https://www.foxnews.com/category/tech/companies/amazon" target="_blank" rel="noopener"&gt;Amazon Echo&lt;/a&gt; smart speakers&lt;/li&gt;&lt;li&gt;Ring video doorbells&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Past regulatory findings have raised concerns about how companies manage that stored data. In some cases, recordings may be accessed by:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Human reviewers&lt;/li&gt;&lt;li&gt;Contractors&lt;/li&gt;&lt;li&gt;Internal teams that are training AI systems&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Some company disclosures state that a small number of recordings may be reviewed by research and development teams to improve products and services.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Why this clause raises eyebrows&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;The goal of human review is often to improve voice assistants or detect errors. Still, many users never realize that recordings captured inside their homes may be reviewed by people. That means a conversation in your living room or a clip from your front door could be seen or heard by someone you have never met. Transparency about how this process works remains an ongoing discussion across the tech industry.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Clause No. 1: 'We store your voice indefinitely'&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Voice assistants sit quietly in kitchens, bedrooms, and living rooms waiting for their wake word. Devices like the Amazon Echo process voice commands in the cloud.&lt;/p&gt;&lt;p&gt;According to company disclosures, voice interactions can include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Audio recordings sent to cloud servers&lt;/li&gt;&lt;li&gt;Transcripts stored in your account&lt;/li&gt;&lt;li&gt;Voice data used to improve services&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;In many cases, these recordings are saved by default and can remain stored indefinitely unless you manually delete them or change your settings.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Why this is the most surprising clause&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Over time, your voice assistant may accumulate years of audio interactions. That can include everything from grocery lists and song requests to conversations you did not even realize were captured. That history can reveal daily routines, requests, shopping habits, and personal questions. Most people never review or delete those recordings.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Why smart devices are a privacy multiplier&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Each individual device collects only part of the picture. Together, they can reveal an astonishing amount of detail about your life. Smart devices inside your home and vehicle may capture:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Conversations&lt;/li&gt;&lt;li&gt;Daily schedules&lt;/li&gt;&lt;li&gt;Viewing habits&lt;/li&gt;&lt;li&gt;Location history&lt;/li&gt;&lt;li&gt;Visitor patterns&lt;/li&gt;&lt;li&gt;Voice biometrics&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Combined, this data allows companies to build extremely detailed behavioral profiles. That is why privacy experts call connected homes a data multiplier. In many cases, the value of that data is part of the business model, helping offset the cost of the devices themselves.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;5 privacy moves to take back control of your tech&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The good news is you still have ways to reduce how much information your devices collect. Here are a few practical steps that can make a big difference. &lt;/p&gt;&lt;h2&gt; &lt;/h2&gt;&lt;h2&gt;&lt;strong&gt;No. 5: Audit your app permissions&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Start by reviewing what access your apps have to your devices. If you use smart home apps like Ring, also check in-app privacy settings such as Control Center and turn off sharing with third parties where available.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Location Services&lt;/strong&gt;, &lt;strong&gt;Microphone&lt;/strong&gt; or &lt;strong&gt;Camera&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Review &lt;strong&gt;which apps&lt;/strong&gt; have access&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Whenever possible, set location access to &lt;strong&gt;While Using the App&lt;/strong&gt; rather than &lt;strong&gt;Always&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Android&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your &lt;/i&gt;&lt;a href="https://www.foxnews.com/category/tech/technologies/android" target="_blank" rel="noopener"&gt;Android phone’s manufacturer&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/data-brokers-accused-hiding-opt-out-pages-from-google" target="_blank" rel="noopener"&gt;&lt;strong&gt;DATA BROKERS ACCUSED OF HIDING OPT-OUT PAGES FROM GOOGLE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Security and Privacy&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;More privacy settings &lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Permission Manager&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Review &lt;strong&gt;Location&lt;/strong&gt;, &lt;strong&gt;Microphone&lt;/strong&gt;, and&lt;strong&gt; Camera&lt;/strong&gt; permissions&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Whenever possible, set location access to &lt;strong&gt;Allow only while using the app&lt;/strong&gt; rather than &lt;strong&gt;Allow all the time&lt;/strong&gt;.&lt;/p&gt;&lt;p&gt;Removing unnecessary permissions helps limit background tracking.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;No. 4: Turn off smart TV tracking&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Most TVs include a setting that controls content tracking.&lt;/p&gt;&lt;p&gt;Look for options such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;ACR&lt;/li&gt;&lt;li&gt;Viewing Data&lt;/li&gt;&lt;li&gt;Interest-Based Ads&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;On Roku, &lt;/strong&gt;go to &lt;strong&gt;Settings → Privacy → Smart TV Experience&lt;/strong&gt; and &lt;strong&gt;disable it. On Samsung, &lt;/strong&gt;look for&lt;strong&gt; Viewing Information Services &lt;/strong&gt;and turn it &lt;strong&gt;off.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Turn these features off in the privacy or advertising section of your TV settings. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;No. 3: Use stronger passwords&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Smart home devices often connect to important accounts. If attackers access those accounts, they may control cameras, speakers, or home automation systems. Use strong, unique passwords and enable two-factor authentication (2FA)  whenever available. A password manager can help generate and store secure passwords.&lt;/p&gt;&lt;p&gt;Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see &lt;strong&gt;Cyberguy.com&lt;/strong&gt;) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.&lt;/p&gt;&lt;p&gt;Check out the best expert-reviewed password managers of 2026 at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/5-tech-terms-shape-your-online-privacy" target="_blank" rel="noopener"&gt;&lt;strong&gt;5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;No. 2: Delete old apps and accounts&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Dormant apps and forgotten services often keep your personal information for years.&lt;/p&gt;&lt;p&gt;Take time to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Remove apps you no longer use&lt;/li&gt;&lt;li&gt;Close accounts tied to old services&lt;/li&gt;&lt;li&gt;Revoke unused permissions&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Cleaning up digital clutter reduces your data footprint.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Remove apps you no longer use&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;strong&gt;On iPhone (iOS 18 and newer)&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Find the app on your &lt;strong&gt;Home Screen&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Press and hold&lt;/strong&gt; the app icon&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Remove App&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Delete App&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Delete&lt;/strong&gt; to confirm&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You can also remove apps through storage settings:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;General&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;iPhone Storage&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://www.foxnews.com/category/tech/technologies/apps" target="_blank" rel="noopener"&gt;&lt;strong&gt;Select the app&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Delete App&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Delete&lt;/strong&gt; to confirm&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Deleting the app removes it from your device and frees up storage space.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Android (Android 14 and newer)&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer.&lt;/i&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Find the app on your &lt;strong&gt;Home Screen or App Drawer&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Press and hold&lt;/strong&gt; the app icon&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Uninstall&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;OK&lt;/strong&gt; or &lt;strong&gt;Uninstall&lt;/strong&gt; to confirm&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You can also remove apps through settings:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Apps&lt;/strong&gt; or &lt;strong&gt;Apps &amp; notifications&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select the &lt;strong&gt;app you want to remove&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Uninstall&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;OK&lt;/strong&gt; or &lt;strong&gt;Uninstall&lt;/strong&gt; to confirm&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Removing unused apps helps reduce the amount of data stored on your device.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Revoke unused permissions&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Some apps continue accessing your camera, microphone or location even when you rarely use them.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select a category such as &lt;strong&gt;Location Services&lt;/strong&gt;, &lt;strong&gt;Microphone&lt;/strong&gt; or &lt;strong&gt;Camera&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Review the apps listed&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Turn off access&lt;/strong&gt; for apps that do not need it&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You can also control tracking:&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk" target="_blank" rel="noopener"&gt;&lt;strong&gt;5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Tracking&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Turn off tracking&lt;/strong&gt; for apps you do not trust.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;On Android&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer&lt;/i&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Security &amp; Privacy&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &lt;/strong&gt;or&lt;strong&gt; More privacy settings &lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Permission Manager&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select &lt;strong&gt;Location&lt;/strong&gt;, &lt;strong&gt;Camera&lt;/strong&gt; or &lt;strong&gt;Microphone&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Review the apps listed and &lt;strong&gt;remove access&lt;/strong&gt; if needed&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Android groups permissions by type so you can quickly see which apps access sensitive features.&lt;/p&gt;&lt;p&gt;Today's phones may automatically remove permissions from apps you have not used for a long time, but many apps still retain data tied to your account. Reviewing them manually helps reduce tracking and background data collection.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;No. 1: Limit always-listening devices&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Smart speakers constantly wait for wake words like "Alexa" or "Hey Google." That means the microphone stays active so the device can detect commands. If you rarely use these features, limiting them can reduce how much audio data leaves your home. Here are some simple ways to reduce always-listening devices.&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Mute the microphone on smart speakers&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Most smart speakers include a physical microphone mute button.&lt;/p&gt;&lt;p&gt;Press the &lt;strong&gt;mic mute button&lt;/strong&gt; on devices like:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Amazon Echo&lt;/li&gt;&lt;li&gt;Google Nest speakers&lt;/li&gt;&lt;li&gt;Apple HomePod&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;When muted, the device stops listening for wake words. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Unplug devices in private spaces&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Bedrooms and home offices are common places where people prefer extra privacy. If a speaker or smart display is rarely used in those rooms, unplugging it removes the microphone entirely.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Review voice recordings in your account&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many voice assistants store past interactions. You can review and delete recordings inside the companion apps, such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Alexa app&lt;/li&gt;&lt;li&gt;Google Home app&lt;/li&gt;&lt;li&gt;Apple Home app&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Set recordings to auto-delete or choose not to save them at all, where that option exists. Removing stored recordings prevents them from accumulating over time.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Disable voice activation on some devices&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Some smart TVs, phones and tablets include voice assistants. Look in device settings for options such as:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Voice assistant&lt;/li&gt;&lt;li&gt;Voice wake word&lt;/li&gt;&lt;li&gt;Hands-free voice control&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Turning those features off stops devices from constantly listening. Even though devices listen only for wake words, the microphones remain active. Limiting where these devices operate helps reduce the amount of audio data collected inside your home. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Smart devices make daily life easier. They play music, answer questions, show visitors at the door and control lights with a voice command. But convenience often comes with hidden trade-offs. Many privacy clauses are buried deep in policies that most people never read. Over time, those permissions allow companies to gather enormous amounts of behavioral data. That does not mean you need to abandon smart technology. It simply means understanding what your devices collect and deciding what level of access you are comfortable with. Many of these settings are enabled by default, not because you chose them, but because you never knew they were there. A quick privacy audit today can prevent years of unnecessary data collection tomorrow. Oh, and if you want a deeper dive into how these hidden data practices affect your daily life, check out the latest episode of my &lt;i&gt;&lt;strong&gt;Beyond Connected&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; &lt;/strong&gt;podcast at &lt;i&gt;&lt;strong&gt;&lt;u&gt;getbeyondconnected.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;, where we break it down.&lt;/p&gt;&lt;p&gt;Here is a question worth asking yourself: If every smart device in your home combined its data into one timeline of your life, how comfortable would you feel with someone seeing it? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.  &lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/woman-on-phone-with-smart-speaker-device.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">27002746-9b77-5c6f-9dcf-14268b9b101c</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/gps</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/cameras</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Wed, 15 Apr 2026 12:30:41 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/new-fbi-warning-reveals-phishing-attacks-hitting-private-chats</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/new-fbi-warning-reveals-phishing-attacks-hitting-private-chats</guid>
            <title>New FBI warning reveals phishing attacks hitting private chats</title>
            <description>​​Russian hackers target messaging apps</description>
            <content:encoded>&lt;p&gt;You probably think your messages are safe. After all, apps like WhatsApp, Signal and Telegram promote &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;strong encryption.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;But a new warning from the Cybersecurity and Infrastructure Security Agency and the &lt;a href="https://www.foxnews.com/category/tech/topics/fbi" target="_blank" rel="noopener"&gt;Federal Bureau of Investigation&lt;/a&gt; shows that attackers do not need to break encryption at all.&lt;/p&gt;&lt;p&gt;Instead, they are going after you.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fbi-warns-about-foreign-apps-your-data" target="_blank" rel="noopener"&gt;&lt;strong&gt;FBI WARNS ABOUT FOREIGN APPS AND YOUR DATA&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What the FBI and CISA just revealed&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;According to the joint advisory, cyber actors tied to Russian intelligence are running large-scale &lt;a href="https://www.foxnews.com/tech/dont-click-that-link-how-to-spot-prevent-phishing-attacks-in-your-inbox"&gt;&lt;u&gt;phishing campaigns&lt;/u&gt;&lt;/a&gt; targeting messaging apps.&lt;/p&gt;&lt;p&gt;These attacks are not random. They have focused on high-value targets like government officials, military personnel and journalists. However, the tactics can easily spread to everyday users.&lt;/p&gt;&lt;p&gt;Here is the key takeaway: Hackers are not cracking the apps themselves. They are tricking people into giving up access. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How these messaging app attacks actually work&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is where it gets interesting and a bit unsettling. Instead of breaking encryption, attackers use phishing to gain control of individual accounts. Once inside, they can:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Read private conversations&lt;/li&gt;&lt;li&gt;Access contact lists&lt;/li&gt;&lt;li&gt;Send messages as if they were you&lt;/li&gt;&lt;li&gt;Launch new scams targeting your contacts&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;It becomes a chain reaction. One compromised account can quickly lead to many more. In some cases, &lt;a href="https://www.foxnews.com/category/tech/topics/hackers" target="_blank" rel="noopener"&gt;attackers impersonate trusted contacts.&lt;/a&gt; That makes the scam feel real and urgent.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why encryption is not enough anymore&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Encryption still matters. It protects messages as they travel between devices. But here is the problem. If someone logs into your account, they see everything just like you do.&lt;/p&gt;&lt;p&gt;That means even the most secure app cannot protect you if your login gets compromised. This is a shift in how cyberattacks work. The weakest link is no longer the technology. It is human behavior.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/ai-now-powering-cyberattacks-microsoft-warns" target="_blank" rel="noopener"&gt;&lt;strong&gt;AI IS NOW POWERING CYBERATTACKS, MICROSOFT WARNS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Who is at risk from messaging app phishing attacks&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;While the advisory highlights high-profile targets, the tactics are not limited to them.&lt;/p&gt;&lt;p&gt;If you use messaging apps for:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Personal conversations&lt;/li&gt;&lt;li&gt;Work communication&lt;/li&gt;&lt;li&gt;Sharing sensitive information&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You are a potential target. Phishing works because it relies on simple mistakes. A quick tap on the wrong link is often all it takes. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means for you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This warning highlights a bigger trend. Cyberattacks are becoming more personal. Instead of attacking systems, hackers are &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;targeting people directly.&lt;/a&gt; That makes awareness your strongest defense. The more you understand how these scams work, the harder it becomes for attackers to succeed.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Ways to stay safe from messaging app phishing attacks&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You do not need to be a cybersecurity expert to protect yourself. You just need to slow things down and follow a few smart habits.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Be skeptical of unexpected messages&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If a message feels urgent or out of place, pause. Even if it looks like it came from someone you know.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Never click suspicious links&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Avoid links sent through messages unless you can verify them independently. Strong antivirus software can help detect suspicious behavior after a compromise. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Turn on two-factor authentication&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Two-factor authentication (&lt;a href="https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it"&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) adds a second layer of protection even if your password gets exposed.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/tech-giants-unite-fight-online-scams" target="_blank" rel="noopener"&gt;&lt;strong&gt;TECH GIANTS UNITE TO FIGHT ONLINE SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Watch for login alerts&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many apps notify you when a new device signs in. Do not ignore these warnings.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Verify requests in another way&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If a contact asks for something unusual, call them or confirm through another channel.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Use a data removal service&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Limit how much of your &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;personal information&lt;/a&gt; is available online. Data removal services work to delete your data from broker sites, making it harder for scammers to target you with convincing phishing messages. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Keep your device and apps updated&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Install updates regularly. Security patches fix vulnerabilities that attackers can exploit after gaining access.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Messaging apps feel private. They feel secure. That sense of comfort is exactly what attackers are counting on. The technology is still strong. The real question is whether your habits are keeping up. So the next time a message pops up that feels slightly off, trust that instinct and take a second look.&lt;/p&gt;&lt;p&gt;Have you ever received a suspicious message that made you stop and question if it was real? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/man-worried-using-smartphone.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">23327e75-f6ab-50ec-bd10-2083ee3fd6ab</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Thu, 16 Apr 2026 11:23:38 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/why-your-home-wi-fi-needs-more-than-just-strong-password</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/why-your-home-wi-fi-needs-more-than-just-strong-password</guid>
            <title>Why your home Wi-Fi needs more than just a strong password</title>
            <description>A strong Wi-Fi password protects access, but not your privacy. Here’s what still gets tracked and how a VPN helps</description>
            <content:encoded>&lt;p&gt;If you've locked down your &lt;a href="https://www.foxnews.com/category/tech/technologies/wifi" target="_blank" rel="noopener"&gt;home Wi-Fi&lt;/a&gt; with a strong password, you're already ahead of the game. But here's the reality: a password alone isn't enough to keep your online activity private.&lt;/p&gt;&lt;p&gt;Most people think of Wi-Fi security as simply keeping strangers off their network. And while that matters, it's only part of the picture. Even with a secure password, your internet activity can still be visible to others in ways you might not expect.&lt;/p&gt;&lt;p&gt;A Wi-Fi password keeps people out, but it does not &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;hide what happens inside your connection.&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/do-you-need-vpn-home-here-10-reasons-you-do" target="_blank" rel="noopener"&gt;&lt;strong&gt;DO YOU NEED A VPN AT HOME? HERE ARE 10 REASONS YOU DO&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Who can still see your data?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;When you connect to the internet at home, your internet service provider (ISP) can see a surprising amount of what you do online. That can include the websites you visit, how long you spend on them and sometimes even more detailed activity.&lt;/p&gt;&lt;p&gt;In some cases, that data can be:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Logged and stored&lt;/li&gt;&lt;li&gt;Shared with third parties&lt;/li&gt;&lt;li&gt;Used to build advertising profiles&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;And it's not just your ISP. Websites, apps, big tech companies, governments and data brokers are constantly collecting information about your behavior, often without you realizing it. Think of it this way: your password locks the front door, but once your data leaves your house, it can still be exposed along the way. That's where a VPN comes in.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How a VPN adds real privacy&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;A &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;virtual private network (VPN)&lt;/a&gt; creates a secure, encrypted tunnel between your device and the internet. That means your data is scrambled before it leaves your home network, making it much harder for anyone to see what you're doing online. &lt;/p&gt;&lt;p&gt;In addition, connecting to a VPN server gives you a new IP address, so your online activity can't be easily traced back to you. This makes it harder for advertisers, social networks and scammers to construct behavioral profiles, which can be used to target you with things like phishing attacks.&lt;/p&gt;&lt;p&gt;With a VPN:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Your browsing activity is hidden from your ISP&lt;/li&gt;&lt;li&gt;Your IP address is masked, making tracking more difficult&lt;/li&gt;&lt;li&gt;Your connection is encrypted, even on everyday home Wi-Fi&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/spring-clean-your-digital-footprint-why-retirees-scam-targets" target="_blank" rel="noopener"&gt;&lt;strong&gt;SPRING CLEAN YOUR DIGITAL FOOTPRINT: WHY RETIREES ARE SCAM TARGETS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Many VPN services are popular for their speed, simplicity and overall feature sets. This becomes even more important if you ever use public Wi-Fi, where your data is far more exposed.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;What does this mean in practice?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;For starters, most VPN services are easy to use. They offer apps for nearly every device imaginable, including options that work directly with routers. These apps are straightforward to set up and configure.&lt;/p&gt;&lt;p&gt;Once running, a single click or tap is all it takes to change your virtual location, mask your IP address and &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;encrypt your connection&lt;/a&gt;. High-speed servers mean they don't fall into the trap of slowing you down. In many cases, using a VPN can even provide more consistent, reliable speeds.&lt;/p&gt;&lt;p&gt;With a more anonymous IP address, your ISP is also less able to throttle (cap) your connection speeds, as some providers do.&lt;/p&gt;&lt;p&gt;Setting up a VPN on your router protects every device in your home automatically, including smart TVs, gaming consoles and other connected devices.&lt;/p&gt;&lt;p&gt;Many VPN providers now go beyond basic protection and offer additional privacy tools. These can include password managers, email protection, identity monitoring and even private AI tools designed to keep your data more secure.&lt;/p&gt;&lt;p&gt;In short, it's no longer just about securing your connection. It's about protecting your entire digital footprint.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;A smarter way to protect your home network&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Your home Wi-Fi is the gateway to everything you do: online banking, shopping, working and staying connected. Relying on just a password is like locking your door but leaving the curtains wide open.&lt;/p&gt;&lt;p&gt;Adding a VPN gives you an extra layer of privacy that works quietly in the background while enhancing every corner of your digital life.&lt;/p&gt;&lt;p&gt;It's about being prepared, sure. But it's also about peace of mind.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/5-simple-tech-tips-improve-digital-privacy" target="_blank" rel="noopener"&gt;&lt;strong&gt;5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Ways to protect your privacy beyond a password&lt;/strong&gt;&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Use a &lt;strong&gt;VPN&lt;/strong&gt; on your home network and public Wi-Fi&lt;/li&gt;&lt;li&gt;Enable &lt;strong&gt;automatic updates&lt;/strong&gt; on all your devices&lt;/li&gt;&lt;li&gt;Use &lt;strong&gt;strong, unique passwords&lt;/strong&gt; and consider a &lt;strong&gt;password manager&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Turn on &lt;strong&gt;two-factor authentication (&lt;/strong&gt;&lt;a href="https://cyberguy.com/protect-your-devices/what-is-two-factor-authentication-and-why-should-i-enable-it/" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;strong&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/strong&gt;&lt;u&gt;)&lt;/u&gt;&lt;/a&gt; whenever possible&lt;/li&gt;&lt;li&gt;Limit &lt;strong&gt;app permissions &lt;/strong&gt;and &lt;strong&gt;review privacy settings &lt;/strong&gt;regularly&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;For the best &lt;strong&gt;VPN software&lt;/strong&gt;, see my expert review of the best VPNs for browsing the web privately on your &lt;strong&gt;Windows, Mac, Android and iOS devices&lt;/strong&gt; at &lt;i&gt;&lt;strong&gt;&lt;u&gt;CyberGuy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;A strong password is a smart first step, but it only protects who gets onto your network, not what happens to your data after it leaves. Your internet activity still passes through systems designed to track, analyze and sometimes profit from it. Adding a VPN shifts the balance back in your favor by encrypting your connection and limiting how much others can see. It is a simple upgrade that turns basic security into real privacy, without changing how you use the internet day to day.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Where should we draw the line between staying connected and staying private? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 &lt;a href="http://CyberGuy.com" target="_blank" rel="noopener noreferrer nofollow"&gt;CyberGuy.com&lt;/a&gt;. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/wifi-data-privacy-1.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">bcb4f670-e0db-5e73-8bac-e09c1ce396c2</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/wifi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Tue, 14 Apr 2026 12:30:21 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/ai-now-powering-cyberattacks-microsoft-warns</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/ai-now-powering-cyberattacks-microsoft-warns</guid>
            <title>AI is now powering cyberattacks, Microsoft warns</title>
            <description>Hackers are using generative AI to write phishing emails, build malware and scale cyberattacks faster than ever</description>
            <content:encoded>&lt;p&gt;&lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener"&gt;Artificial intelligence&lt;/a&gt; promised to make life easier. Write emails faster. Build software quicker. Analyze huge datasets in seconds. Unfortunately, cybercriminals noticed those benefits too.&lt;/p&gt;&lt;p&gt;A new report from &lt;a href="https://www.foxnews.com/category/tech/companies/microsoft" target="_blank" rel="noopener"&gt;Microsoft Threat Intelligence&lt;/a&gt; reveals that attackers are now using AI across nearly every stage of a cyberattack. The technology helps them move faster, scale operations and lower the technical skill required to launch attacks. In simple terms, AI has become a powerful assistant for hackers.&lt;/p&gt;&lt;p&gt;Instead of replacing cybercriminals, it gives them tools that make their work easier.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;CyberGuy.com&lt;/strong&gt; – trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk" target="_blank" rel="noopener"&gt;&lt;strong&gt;5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How hackers are using AI today&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Cyberattacks usually involve many steps. Attackers scout victims, craft phishing messages, build infrastructure and write malicious code. According to Microsoft researchers, generative AI tools now help speed up many of those tasks.&lt;/p&gt;&lt;p&gt;Attackers are using AI to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Write convincing &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;phishing emails&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Translate scam messages into different languages&lt;/li&gt;&lt;li&gt;Summarize stolen data&lt;/li&gt;&lt;li&gt;Generate or debug malware code&lt;/li&gt;&lt;li&gt;Build scripts and infrastructure for attacks&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;AI also helps threat actors move more quickly between stages of an attack. Tasks that once took hours or days may now take minutes. Microsoft describes AI as a "force multiplier" that reduces friction for attackers while humans remain in control of targets and strategy.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Nation-state hackers are already experimenting with AI&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Some of the most advanced cyber groups are already experimenting with artificial intelligence. Microsoft says North Korean hacking groups known as Jasper Sleet and Coral Sleet have incorporated AI into their operations.&lt;/p&gt;&lt;p&gt;One tactic involves fake remote workers. &lt;a href="https://www.foxnews.com/category/tech/topics/hackers" target="_blank" rel="noopener"&gt;Attackers generate realistic identities,&lt;/a&gt; resumes and communications using AI. They apply for jobs at Western companies and gain legitimate access to internal systems once hired.&lt;/p&gt;&lt;p&gt;In some cases, AI even helps generate culturally appropriate names or email formats that match specific identities. For example, attackers may prompt AI tools to produce lists of names or create realistic email address formats for a fake employee profile. Once inside a company, that access can become extremely valuable.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/how-to-opt-out-ai-data-collection-popular-apps" target="_blank" rel="noopener"&gt;&lt;strong&gt;HOW TO OPT OUT OF AI DATA COLLECTION IN POPULAR APPS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;AI can help build malware and attack infrastructure&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Researchers also observed threat actors using AI coding tools to assist with malware development.&lt;/p&gt;&lt;p&gt;Generative AI can help attackers:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Write malicious scripts&lt;/li&gt;&lt;li&gt;Fix coding errors&lt;/li&gt;&lt;li&gt;Convert malware into different programming languages&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;In some experiments, malware appeared capable of dynamically generating scripts or changing behavior while running. Meanwhile, attackers can use AI to build phishing websites or attack infrastructure more quickly. Microsoft also observed groups using AI to generate fake company websites that support social engineering campaigns.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Hackers are trying to bypass AI safety rules&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;AI companies have placed guardrails on their systems to prevent misuse. However, attackers are already experimenting with ways to bypass those safeguards. One tactic is called &lt;a href="https://www.foxnews.com/tech/spyware-can-hijack-your-phone-seconds" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;jailbreaking&lt;/u&gt;&lt;/a&gt;. It involves manipulating prompts so that an AI system generates content it would normally refuse to produce. Researchers are also watching early experiments with agentic AI, which can perform tasks autonomously and adapt to results.&lt;/p&gt;&lt;p&gt;For now, Microsoft says AI mainly assists human operators rather than running attacks on its own. Still, the technology is evolving quickly.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why AI is lowering the barrier for cybercrime&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;One of the biggest concerns in the Microsoft report is accessibility. Years ago, launching sophisticated cyberattacks required advanced technical skills. AI tools now help automate parts of that process. Someone with limited programming knowledge can ask AI to generate scripts, troubleshoot code or translate scams into multiple languages.&lt;/p&gt;&lt;p&gt;That shift could expand the number of people capable of launching cyberattacks. At the same time, AI also gives defenders new tools for detecting threats. Security teams are now using AI to analyze behavior, detect anomalies and respond to attacks more quickly. The technology is fueling both sides of the cybersecurity arms race.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/inside-microsofts-ai-content-verification-plan" target="_blank" rel="noopener"&gt;&lt;strong&gt;INSIDE MICROSOFT'S AI CONTENT VERIFICATION PLAN&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How Microsoft is responding to AI-powered cyber threats&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Microsoft says its &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;security teams&lt;/a&gt; are working to detect and disrupt AI-enabled cybercrime as it emerges. The company uses threat intelligence systems to monitor attacker activity, identify new tactics and share findings with organizations around the world.&lt;/p&gt;&lt;p&gt;Microsoft also integrates AI into its own security tools to help detect suspicious behavior, phishing campaigns and unusual account activity faster. These systems analyze patterns across billions of signals each day to identify threats before they spread widely.&lt;/p&gt;&lt;p&gt;The company says organizations should strengthen identity protections, monitor unusual credential use and treat suspicious remote worker activity as a potential insider risk.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to protect yourself from AI-powered cyberattacks&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The rise of AI-powered cyberattacks can sound alarming. The good news is that many proven security habits still work. A few simple steps can dramatically reduce your risk.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Be cautious with unexpected messages&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/media/scammers-using-ai-meet-match-openai-tech-industry-fight-back" target="_blank" rel="noopener"&gt;AI-generated phishing emails&lt;/a&gt; are becoming more convincing. Always verify requests for passwords, payments or sensitive information before clicking links or downloading files. Also, use strong antivirus protection on all your devices. Strong antivirus software can detect malware, block suspicious downloads and warn you about dangerous websites before they load. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Use strong, unique passwords&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A password manager can generate and store complex passwords for every account. This prevents attackers from accessing multiple accounts if one password is exposed. Check out the best expert-reviewed password managers of 2026 at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Turn on multi-factor authentication&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Even if someone steals your password, &lt;a href="https://www.foxnews.com/tech/top-multi-factor-authentication-apps-protect-your-accounts" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;multi-factor authentication&lt;/u&gt;&lt;/a&gt; adds a second layer of protection and can stop many account takeovers.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Keep devices and software updated&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Security updates patch vulnerabilities that attackers often exploit. Turn on automatic updates whenever possible.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Remove personal data from public websites&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Cybercriminals often gather &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;personal information&lt;/a&gt; from data broker sites before launching scams. Using a data removal service can help reduce the amount of personal information attackers can find about you online.&lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.&lt;/strong&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Watch for unusual account activity&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Unexpected login alerts, password reset messages, or unfamiliar devices connected to your accounts may signal a breach. Act quickly if something looks suspicious. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Artificial intelligence is transforming almost every industry. Cybercrime is no exception. Hackers now use AI to craft phishing messages, build malware and scale attacks faster than ever before. The technology lowers technical barriers and speeds up operations while human attackers remain in control. Security experts expect the use of AI in cyberattacks to grow as tools become more powerful and widely available. That makes awareness and strong digital habits more important than ever. Because the next phishing email you receive may not have been written by a person at all.&lt;/p&gt;&lt;p&gt;If AI can now help hackers launch attacks faster and at a larger scale, are tech companies moving quickly enough to protect you? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;CyberGuy.com&lt;/strong&gt; &lt;strong&gt;– &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/ai-powered-cybercrime-3.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">e0e474c9-e120-55fc-9222-e1fc90065b09</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Mon, 13 Apr 2026 11:07:45 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/smart-travel-safety-tips-before-your-next-trip</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/smart-travel-safety-tips-before-your-next-trip</guid>
            <title>Smart travel safety tips before your next trip</title>
            <description>Simple ways to protect your phone data and money while traveling</description>
            <content:encoded>&lt;p&gt;You booked the flights. You're picturing great food, new sights and a break from your routine. Travel should feel easy. But here's what most people don't think about until it's too late. The biggest problems today often come from your &lt;a href="https://www.foxnews.com/category/tech/topics/smart-and-safe-tech" target="_blank" rel="noopener"&gt;phone, your data and your accounts.&lt;/a&gt; Before we get into the essentials, here's the question from Chuck V, from Georgia, that sparked this article:&lt;/p&gt;&lt;p&gt;&lt;i&gt;"My wife and I will be flying to Florence, Italy, next week and are wondering if there are any special tips we should be aware of before we leave."&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Chuck, you're asking the right question at the right time. A few &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;smart moves&lt;/a&gt; before you leave can save you from frozen credit cards, locked accounts or a phone nightmare overseas. Let's walk through what actually matters.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/how-minimize-your-digital-footprint-when-you-travel" target="_blank" rel="noopener"&gt;&lt;strong&gt;HOW TO MINIMIZE YOUR DIGITAL FOOTPRINT WHEN YOU TRAVEL&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Lock down your phone before you leave&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Your phone holds your banking apps, email, travel confirmations and personal photos. That makes it more valuable than your passport to the wrong person. Start with updates. Install the latest version of your operating system and update your apps. Security patches close known gaps that attackers look for, especially on public networks.&lt;/p&gt;&lt;p&gt;Next, turn on built-in protections:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Enable a strong passcode or biometric lock on your iPhone and Android&lt;/li&gt;&lt;li&gt;Turn on tracking tools like Find My on iPhone or Find My Device on Android&lt;/li&gt;&lt;li&gt;Make sure remote wipe is enabled so you can erase your phone if it's lost or stolen. If you're not sure how it works, here's how to &lt;a href="https://www.foxnews.com/tech/how-safely-wipe-your-iphone-android-clean-when-repair-isnt-option"&gt;&lt;u&gt;wipe your device &lt;/u&gt;&lt;/a&gt;if something goes wrong.&lt;/li&gt;&lt;li&gt;Also, take a minute to &lt;a href="https://www.foxnews.com/tech/5-phone-settings-change-right-now-safer-smartphone"&gt;&lt;u&gt;review app permissions&lt;/u&gt;&lt;/a&gt;. Many travel apps request access to location, contacts or storage. Limit that access before your trip so you are not oversharing without realizing it.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;Have a real plan for staying connected&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;A lot of travelers assume their phone plan will work automatically overseas. Sometimes it does. Sometimes it leads to a shocking bill. Here are your main options:&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;International plan through your carrier&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Easy to activate but often expensive if you use a lot of data.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;eSIM&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;This is usually the best mix of price and convenience. You can install it before your trip and switch it on when you land.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Local SIM card&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Often cheap but requires swapping your physical SIM and dealing with local setup.&lt;/p&gt;&lt;p&gt;Before choosing, make sure your phone is unlocked. If it is tied to your carrier, some options will not work. Also, turn off automatic data roaming until you need it. That one setting alone can prevent surprise charges. &lt;/p&gt;&lt;p&gt;Want a deeper breakdown of which option is best for you? Read this guide on &lt;a href="https://www.foxnews.com/tech/how-stay-connected-your-phone-traveling-abroad"&gt;&lt;u&gt;how to stay connected while traveling.&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/travel/popular-travel-scams-safety-warnings-you-need-know-before-taking-vacation" target="_blank" rel="noopener"&gt;&lt;strong&gt;POPULAR TRAVEL SCAMS AND SAFETY WARNINGS YOU NEED TO KNOW BEFORE TAKING VACATION&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Public Wi-Fi is convenient but risky&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Airports, hotels and cafés offer&lt;a href="https://www.foxnews.com/tech/temptations-risks-free-wi-fi"&gt;&lt;u&gt; free public Wi-Fi &lt;/u&gt;&lt;/a&gt;everywhere. It feels harmless. It is not always safe. Public networks can expose your data if they are not secured. That includes logins, credit card details and emails. Using a &lt;a href="https://www.foxnews.com/tech/top-4-reasons-you-might-still-need-vpn-cellular-service"&gt;&lt;u&gt;virtual private network (VPN)&lt;/u&gt;&lt;/a&gt; adds a layer of encryption between your device and the internet. It helps protect your activity and reduces the risk of someone intercepting your data. Even with protection, avoid logging into sensitive accounts on public Wi-Fi when possible. Wait until you are on a trusted network or use your mobile data.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Credit card safety matters more than you think&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Tourist areas attract more than travelers. They attract scammers.&lt;/p&gt;&lt;p&gt;Keep your setup simple:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Bring one primary card and one backup&lt;/li&gt;&lt;li&gt;Store them in separate places&lt;/li&gt;&lt;li&gt;Use contactless payments when possible&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;When you need cash, use ATMs attached to banks. Standalone machines in busy areas are more likely to be tampered with. Pay attention to your surroundings when entering your PIN. Distraction tactics are common in crowded areas. Also, notify your bank before you leave. That reduces the chance of your card being flagged and declined mid-trip. If you want more ways to protect your cards while traveling, read &lt;a href="https://www.foxnews.com/tech/7-simple-ways-protect-your-credit-cards-while-traveling?msockid=086095bac80461a1261a82a0c9c56080"&gt;&lt;u&gt;this guide&lt;/u&gt;&lt;/a&gt;.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Turn your phone into a travel tool&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Your phone can make the entire experience smoother if you use it right. Translation apps help you understand menus, signs and conversations in real time. Camera features can translate text instantly, which is incredibly useful in unfamiliar places. Maps can be downloaded offline, so you are not stuck without directions when your signal drops. Location sharing adds peace of mind. Let a trusted contact see where you are during your trip. These &lt;a href="https://www.foxnews.com/tech/5-ways-your-iphone-can-make-international-travel-easier-safer"&gt;&lt;u&gt;small features &lt;/u&gt;&lt;/a&gt;make things easier and help you stay focused on the experience instead of logistics.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/us/state-department-reveals-worlds-most-dangerous-countries-americans" target="_blank" rel="noopener"&gt;&lt;strong&gt;STATE DEPARTMENT REVEALS WORLD'S MOST DANGEROUS COUNTRIES FOR AMERICANS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Watch what you share while you travel&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;It is tempting to post your location in real time. That can expose more than you intend. Sharing that you are away from home can signal an empty house. Posting your exact location while you are still there can also create unnecessary risk. Instead, share photos after you leave a location or after you return home. It is a simple shift that &lt;a href="https://www.foxnews.com/tech/how-minimize-your-digital-footprint-when-you-travel"&gt;&lt;u&gt;protects your privacy.&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;A quick pre-flight checklist&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Before you head to the airport, run through this:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Notify your &lt;strong&gt;bank and credit card companies&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Screenshot or download &lt;strong&gt;key documents&lt;/strong&gt; like your passport and tickets&lt;/li&gt;&lt;li&gt;Download &lt;a href="https://www.foxnews.com/tech/service-problem-ios-lets-you-download-maps-navigate-anywhere"&gt;&lt;strong&gt;&lt;u&gt;offline maps&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt; for your destination&lt;/li&gt;&lt;li&gt;Pack a &lt;strong&gt;universal power adapter&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Double-check your &lt;strong&gt;phone security settings&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;These take minutes but can save hours of frustration later.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means to you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Travel today is as much digital as it is physical. Your phone connects everything from your boarding pass to your hotel room. If you protect that one device, you reduce most of the common travel risks. You avoid surprise charges. You lower the chance of account lockouts. You keep &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;your personal data&lt;/a&gt; from being exposed. It also makes your trip smoother. You spend less time troubleshooting and more time enjoying where you are.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways &lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Travel should feel exciting, not stressful. Most problems people run into are preventable with a little preparation. Take a few minutes before you leave to lock things down. It is one of the easiest ways to protect your trip.&lt;/p&gt;&lt;p&gt;What other travel questions do you have when it comes to your tech?  Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; &lt;strong&gt;- &lt;/strong&gt;trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/travel-tech-safety-tips-2.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">433dbac3-7256-5153-a8e1-cacf55b9fecc</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/travel/general/travel-tips</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/smart-and-safe-tech</category>
            <category domain="foxnews.com/taxonomy">fox-news/travel/general/travel-safety</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Mon, 13 Apr 2026 06:49:11 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/google-search-led-costly-scam-call</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/google-search-led-costly-scam-call</guid>
            <title>Google search led to a costly scam call</title>
            <description>How a fake travel insurance number fooled a traveler and what to do if it happens to you</description>
            <content:encoded>&lt;p&gt;You book a flight. You reschedule. Then you try to handle &lt;a href="https://www.foxnews.com/category/travel" target="_blank" rel="noopener"&gt;travel insurance&lt;/a&gt; quickly so you can move on with your day. That's exactly what happened to Rosette. She was trying to reach Allianz, a large travel insurance company that many airlines direct customers to after booking.&lt;/p&gt;&lt;p&gt;Within seconds, she was &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;talking to a scammer&lt;/a&gt; who sounded completely legitimate. Here's how she described it:&lt;/p&gt;&lt;p&gt;That realization hits hard. Suddenly, you start replaying everything in your head. Maybe you thought you knew what to look for. Still, the frustration sets in fast. Here's the truth: This happens every day to smart, careful people. And the scams keep getting more convincing.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/tech-giants-unite-fight-online-scams" target="_blank" rel="noopener"&gt;&lt;strong&gt;TECH GIANTS UNITE TO FIGHT ONLINE SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; — trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;How this fake travel insurance phone scam works&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is known as a search result scam, and it is one of the fastest-growing fraud tactics right now.&lt;/p&gt;&lt;p&gt;Here's the typical playbook:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;You search for a company like a travel insurance provider, airline or your bank&lt;/li&gt;&lt;li&gt;A fake phone number appears at the top of the results or in an ad&lt;/li&gt;&lt;li&gt;You call and reach a professional-sounding call center&lt;/li&gt;&lt;li&gt;The scammer acts helpful, fast and confident&lt;/li&gt;&lt;li&gt;They ask for payment details or &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;personal information&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;In Rosette's case, there were several clear signs once you step back:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;The call was answered instantly&lt;/li&gt;&lt;li&gt;The pricing felt unusually high&lt;/li&gt;&lt;li&gt;The email came from a fake domain&lt;/li&gt;&lt;li&gt;The agent pushed for authorization&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Once she questioned it, the scammer disconnected. That's classic behavior.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why this phone scam is so easy to fall for&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is not sloppy fraud. It's polished, fast and designed to catch you when you are distracted. Here's why it works so well:&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) You trust search results&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Most people assume search results are safe. Scammers exploit that trust with fake listings and ads.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Timing creates pressure&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;You are often dealing with travel changes, delays or deadlines. That lowers your guard.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) They sound legitimate&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;These are not obvious scammers. Many operate scripted call centers with trained agents.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) They move fast&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Answering within seconds creates the illusion that you reached the right company.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/ssa-impersonation-scams-getting-more-personal" target="_blank" rel="noopener"&gt;&lt;strong&gt;SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What information did the scammer actually get?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;In Rosette's situation, the scammer obtained:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Credit card number&lt;/li&gt;&lt;li&gt;Date of birth&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;That combination matters. Even without an immediate charge, scammers often:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Test small transactions later&lt;/li&gt;&lt;li&gt;Attempt identity-based fraud&lt;/li&gt;&lt;li&gt;Sell your data to other criminals&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This is why you should treat it as a &lt;a href="https://www.foxbusiness.com/category/credit-debt" target="_blank" rel="noopener"&gt;compromised card situation,&lt;/a&gt; even if nothing has been charged yet.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means to you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This type of scam does not rely on hacking your device. It relies on tricking you into calling the wrong number. That means anyone can fall for it.&lt;/p&gt;&lt;p&gt;You could be booking travel, fixing a billing issue or calling tech support. One wrong click puts you in direct contact with a scammer who already sounds like the real company.&lt;/p&gt;&lt;p&gt;The danger is not just the initial call. It is what happens next if your information is reused or shared.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to protect yourself from fake phone scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Here's &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;how to protect yourself&lt;/a&gt; from this exact scenario moving forward:&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Never trust phone numbers from search results&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Always go directly to the company's official website and find the contact page there.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Use the number on your card or confirmation email&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;These are far more reliable than anything you find through a quick search.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Watch for instant answers and pressure&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Real companies rarely answer instantly and push for immediate payment details. &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/why-4-charge-your-statement-could-fraud" target="_blank" rel="noopener"&gt;&lt;strong&gt;WHY THAT $4 CHARGE ON YOUR STATEMENT COULD BE FRAUD&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Check the email domain carefully&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If it does not match the official company domain, it is a red flag.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Replace compromised cards immediately&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Do not wait for fraud to appear. Request a new card number right away.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Turn on real-time alerts&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Enable transaction alerts so you can catch suspicious activity early. &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Freeze your credit if personal data is exposed&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;This adds a strong layer of protection against identity theft.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;8) Consider identity theft protection&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If your personal information was exposed, identity theft protection can monitor your identity, alert you to suspicious activity and help you respond quickly if something goes wrong. See my tips and best picks on Best Identity Theft Protection at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;9) Remove your personal data from public databases&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Data broker sites collect and sell your personal details. Removing your information reduces the chances scammers can find and target you again. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What Rosette did right&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;It's important to call this, out because it matters.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;She questioned the pricing&lt;/li&gt;&lt;li&gt;She challenged the caller&lt;/li&gt;&lt;li&gt;She stopped before a charge went through&lt;/li&gt;&lt;li&gt;She contacted her bank quickly&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Those steps significantly reduced the damage. This could have gone much further.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scams like this are not about being careless. They are about being human. You were trying to solve a problem quickly. The scammer was ready for that exact moment. The biggest takeaway is simple: Slow down when money or personal information is involved. Even a few extra seconds to verify a phone number can make all the difference. And if something feels off, trust that instinct.&lt;/p&gt;&lt;p&gt;If you needed to call your bank or airline right now, would you trust the first number you see online? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.&lt;/li&gt;&lt;li&gt;For simple, real-world ways to spot scams early and stay protected, visit &lt;strong&gt;&lt;u&gt;CyberGuy.com&lt;/u&gt;&lt;/strong&gt; — trusted by millions who watch CyberGuy on TV daily.&lt;/li&gt;&lt;li&gt;Plus, you'll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/woman-looking-at-phone-worried.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">60427a7d-aa97-58b9-be86-926d59f56e2a</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 10 Apr 2026 12:00:18 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/opinion/im-drone-ceo-skies-dangerously-exposed-heres-solution</link>
            <guid isPermaLink="true">https://www.foxnews.com/opinion/im-drone-ceo-skies-dangerously-exposed-heres-solution</guid>
            <title>I'm a drone CEO. Our skies are dangerously exposed — here's the solution</title>
            <description>The US lacks a unified system to verify in seconds who is flying, what they're flying and why</description>
            <content:encoded>&lt;p&gt;Imagine building a solution to a problem you never fully defined.&lt;/p&gt;&lt;p&gt;That’s where we are with airspace sovereignty. Especially when it comes to drones.&lt;/p&gt;&lt;p&gt;We’ve spent billions of dollars on &lt;a href="https://www.foxnews.com/category/tech/technologies/drones" target="_blank" rel="noopener"&gt;counter-UAS systems&lt;/a&gt; (C-UAS), deploying sensors and expanding capabilities. For many officials, C-UAS has become the solution. The problem is, it was never the full problem to begin with.&lt;/p&gt;&lt;p&gt;Before we talk about stopping drones, we should answer a more basic question: which ones belong in the air?&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/opinion/border-brink-cartel-drones-force-us-act-after-years-paralysis" target="_blank" rel="noopener"&gt;&lt;strong&gt;BORDER ON THE BRINK AS CARTEL DRONES FORCE US TO ACT AFTER YEARS OF PARALYSIS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;We can’t answer that with confidence.&lt;/p&gt;&lt;p&gt;We’ve gotten better at seeing the sky. But seeing is not the same as knowing what is flying in it.&lt;/p&gt;&lt;p&gt;Today, when a drone appears in &lt;a href="https://www.foxnews.com/category/science/air-and-space" target="_blank" rel="noopener"&gt;controlled airspace&lt;/a&gt;, we can detect it and track it. With Remote ID, we can occasionally determine who’s operating it. What we cannot do, quickly and with certainty, is determine whether that &lt;a href="https://www.foxnews.com/category/us/environment/regulation" target="_blank" rel="noopener"&gt;drone is authorized&lt;/a&gt;, meaning the aircraft, the operator and the mission are approved and operating as intended.&lt;/p&gt;&lt;p&gt;And in airspace security, speed is everything. This isn’t a problem you solve in minutes or hours. Decisions have to be made in seconds. In that moment, operators need to answer three questions: Is it authorized? Is it compliant? Is it a threat?&lt;/p&gt;&lt;p&gt;If you can’t answer those questions immediately, you don’t control your airspace.&lt;/p&gt;&lt;p&gt;That’s the gap.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/politics/us-military-shot-down-party-balloon-near-el-paso-after-suspecting-drone-official-says" target="_blank" rel="noopener"&gt;&lt;strong&gt;US MILITARY SHOT DOWN PARTY BALLOON NEAR EL PASO AFTER SUSPECTING DRONE, OFFICIAL SAYS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;In traditional aviation, that gap is managed far more effectively. Operations in controlled airspace tie together a verified operator, a known aircraft and an approved flight plan, all continuously monitored.&lt;/p&gt;&lt;p&gt;The stakes are higher, but so is the structure and the time to respond. Aircraft operate from known locations, along defined routes, over longer periods of time.&lt;/p&gt;&lt;p&gt;Drones don’t operate that way.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/politics/trump-admin-cuts-red-tape-commercial-drones-compete-chinas-dominance-market" target="_blank" rel="noopener"&gt;&lt;strong&gt;TRUMP ADMIN CUTS RED TAPE ON COMMERCIAL DRONES TO COMPETE WITH CHINA'S DOMINANCE OF THE MARKET&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;They can be launched from less than a mile away and reach a target in minutes, often without any of those elements being reliably connected or visible in real time.&lt;/p&gt;&lt;p&gt;Today, who is flying, what they are flying and why they are flying are not reliably connected, consistently verified, or available in real time to the people responsible for making decisions.&lt;/p&gt;&lt;p&gt;In complex airspace like the National Capital Region, this problem becomes impossible to ignore. A single drone operation may require approvals from multiple jurisdictional authorities, each operating through separate systems and timelines. There is no unified view of what’s been approved, no shared system to see what’s happening in real time and no reliable way to ensure that an approved operation is doing what it was approved to do.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/opinion/brett-velicovich-mystery-drones-no-mystery-dangerous-threat-national-security" target="_blank" rel="noopener"&gt;&lt;strong&gt;BRETT VELICOVICH: ‘MYSTERY’ DRONES ARE NO MYSTERY, THEY ARE A DANGEROUS THREAT TO NATIONAL SECURITY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Authorization today isn’t a system. It’s a patchwork. An operator might go through LAANC, DroneZone, a COA, a waiver, or even a chain of emails and phone calls to get approval. Few of these systems talk to each other. Few provide a shared, real-time picture. None were built for the kind of airspace we’re trying to manage today.&lt;/p&gt;&lt;p&gt;Even when a drone is fully authorized, no one can immediately know that. The people responsible for securing the airspace are left piecing together fragments, seeing a drone, checking what they can and then making a judgment call.&lt;/p&gt;&lt;p&gt;That’s not sovereignty. That’s uncertainty.&lt;/p&gt;&lt;p&gt;This didn’t happen because people aren’t paying attention.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/politics/executive/homeland-security" target="_blank" rel="noopener"&gt;Federal, state and local law enforcement&lt;/a&gt;, among others, are all actively working this problem, and they’re doing it the way they were trained to, as a threat.&lt;/p&gt;&lt;p&gt;That’s not a criticism. It’s reality.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/us/pentagon-exploring-counter-drone-systems-prevent-incursions-over-national-security-facilities" target="_blank" rel="noopener"&gt;&lt;strong&gt;PENTAGON EXPLORING COUNTER-DRONE SYSTEMS TO PREVENT INCURSIONS OVER NATIONAL SECURITY FACILITIES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;This is a security issue.&lt;/p&gt;&lt;p&gt;But it’s also an &lt;a href="https://www.foxnews.com/category/us/environment/air" target="_blank" rel="noopener"&gt;airspace problem&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;And unless you’ve operated in both environments, it’s easy to focus on how to stop the threat before fully understanding how the airspace is supposed to work.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/politics/pentagon-watchdog-warns-drone-incursions-require-immediate-attention-us-military-bases" target="_blank" rel="noopener"&gt;&lt;strong&gt;PENTAGON WATCHDOG WARNS DRONE INCURSIONS REQUIRE 'IMMEDIATE ATTENTION' AT US MILITARY BASES&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;I’ve seen this from both sides, operationally and from a security perspective.&lt;/p&gt;&lt;p&gt;I was asked during a congressional hearing, "If you’re not sure, why not just shoot it down?" It’s a fair question, until you consider where these operations happen.&lt;/p&gt;&lt;p&gt;Over cities. Over crowds. Over critical infrastructure.&lt;/p&gt;&lt;p&gt;Because when you don’t know what’s flying, what it’s carrying, or what it’s doing, you don’t know what happens when it falls. That’s not policy. That’s physics.&lt;/p&gt;&lt;p&gt;We’ve spent years building the ability to respond. We never built the ability to define it.&lt;/p&gt;&lt;p&gt;Without that distinction, every drone becomes a question, and when every drone is a question, every decision becomes slower, harder and riskier.&lt;/p&gt;&lt;p&gt;More sensors, better detection and improved counter-drone systems are necessary. But they don’t solve the problem on their own.&lt;/p&gt;&lt;p&gt;What’s missing is a system that establishes trust before a drone takes off and maintains it throughout the operation.&lt;/p&gt;&lt;p&gt;The missing piece is a fully integrated Digital Flight Authorization System (DFAS).&lt;/p&gt;&lt;p&gt;It replaces today’s fragmented processes with a single system, scattered approvals with one authoritative source and uncertainty with a real-time picture of what is authorized, who is operating, and what they are doing. It binds the operator, the aircraft, and the mission into a single, verifiable identity and confirms conformance in real time.&lt;/p&gt;&lt;p&gt;Instead of guessing, decision-makers know. In seconds.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/opinion" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE FOR MORE FOX NEWS OPINION&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;That’s the difference between reacting to the sky and controlling it.&lt;/p&gt;&lt;p&gt;Airspace sovereignty isn’t about seeing more. It’s about knowing.&lt;/p&gt;&lt;p&gt;The President has set the standard: "It is the policy of the United States to ensure control of our national airspace."&lt;/p&gt;&lt;p&gt;That’s the right goal. But control isn’t achieved by seeing more. Control comes from knowing.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Until we can know, in seconds, who is flying, what they are flying and why, we haven’t finished the job. And until we implement the system required to deliver that mandate, we won’t.&lt;/p&gt;&lt;p&gt;We’re not securing our skies. We’re leaving them exposed. And that’s not control.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/ukraine-fpv-drones.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">ec305af1-b965-5f7a-bc56-36b0d791edb9</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/opinion</category>
            <category domain="foxnews.com/taxonomy">fox-news/politics/executive/homeland-security</category>
            <category domain="foxnews.com/taxonomy">fox-news/us/environment/regulation</category>
            <category domain="foxnews.com/taxonomy">fox-news/politics/executive/national-security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/drones</category>
            <category domain="foxnews.com/section-path">opinion</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 10 Apr 2026 05:00:01 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/opinion/we-could-win-ai-war-still-lose-all-our-freedoms-we-arent-careful</link>
            <guid isPermaLink="true">https://www.foxnews.com/opinion/we-could-win-ai-war-still-lose-all-our-freedoms-we-arent-careful</guid>
            <title>We could win the AI war and still lose all of our freedoms if we aren’t careful</title>
            <description>America risks mirroring China's AI surveillance model in the name of defeating it</description>
            <content:encoded>&lt;p&gt;I have spent half a century tracking threats to American security — from Soviet armored columns to jihadist networks to the accelerating military machine of communist China. In all that time, I have never watched a danger develop quite like this one: a threat born not only from our adversaries, but one we are building ourselves, with our own capital and our own engineering genius, moving faster than we have decided what rules should govern it.&lt;/p&gt;&lt;p&gt;That is the unspoken risk inside this &lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener"&gt;technology race&lt;/a&gt;. Right now, America is moving too fast to see it clearly.&lt;/p&gt;&lt;p&gt;To understand where this road leads without discipline, look at what Beijing has already built. In a 2025 address to China’s Politburo, President &lt;a href="https://www.foxnews.com/category/person/xi-jinping" target="_blank" rel="noopener"&gt;Xi Jinping&lt;/a&gt; called machine intelligence a "strategic technology" reshaping the foundations of state power — not merely a tool, but the engine of governance and global dominance. China has deployed more than 200 million surveillance cameras, many equipped with facial recognition and integrated into national police networks.&lt;/p&gt;&lt;p&gt;Human Rights Watch documented that a digital surveillance network in Xinjiang flagged Uyghur Muslims for detention not because they committed crimes, but because an AI-powered predictive surveillance system said they might.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/culture/americas-undeclared-emergency-palantir-exec-talks-iran-deadly-new-us-weapons-how-avoid-world-war-3" target="_blank" rel="noopener"&gt;&lt;strong&gt;AMERICA’S ‘UNDECLARED EMERGENCY:’ PALANTIR EXEC TALKS IRAN, DEADLY NEW US WEAPONS AND HOW TO AVOID WORLD WAR 3&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;China now holds roughly 70% of global surveillance patents, and through the Belt and Road Initiative it is exporting that model of control across Asia, Africa and Latin America. Countries importing these systems are not buying hardware. They are importing a governing philosophy — one where automated control has displaced constitutional rights. That is the road we must not walk. And right now, we are not as far from it as Americans assume.&lt;/p&gt;&lt;p&gt;America is racing to answer. It should be. On his first full day in office, President &lt;a href="https://www.foxnews.com/category/person/donald-trump" target="_blank" rel="noopener"&gt;Donald Trump&lt;/a&gt; announced the Stargate Project — committing OpenAI, Oracle, SoftBank and MGX to up to $500 billion in U.S. computing infrastructure, with the flagship campus in Abilene, Texas, already operational.&lt;/p&gt;&lt;p&gt;The administration’s July 2025 AI Action Plan outlined more than 90 policy actions spanning innovation, infrastructure and international leadership. In September, Trump convened more than 30 technology executives at the White House — Apple, Google, Meta, Microsoft, Oracle, AMD and OpenAI — securing &lt;a href="https://www.foxnews.com/category/us/economy/investment" target="_blank" rel="noopener"&gt;investment pledges&lt;/a&gt; topping $1.5 trillion through the decade.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fox-news-ai-newsletter-palantir-cto-warns-us-has-only-eight-days-weapons-hypothetical-battle-against" target="_blank" rel="noopener"&gt;&lt;strong&gt;FOX NEWS AI NEWSLETTER: PALANTIR CTO WARNS US HAS ONLY 'EIGHT DAYS OF WEAPONS' IN HYPOTHETICAL CHINA BATTLE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;In November, the president signed the Genesis Mission executive order, establishing the most ambitious federal research initiative since the Manhattan Project: a national platform fusing Department of Energy supercomputers, secure cloud systems and scientific datasets to compress discovery cycles from years to months.&lt;/p&gt;&lt;p&gt;Microsoft just committed $10 billion to &lt;a href="https://www.foxnews.com/category/world/world-regions/japan" target="_blank" rel="noopener"&gt;technology infrastructure in Japan&lt;/a&gt;, anchoring a U.S.-aligned digital ecosystem in the Pacific as a direct counter to Beijing. The pace and scale of this investment is right. The urgency is warranted.&lt;/p&gt;&lt;p&gt;But urgency is precisely when guardrails disappear. And that is why the alarm must be sounded.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/opinion/ai-raises-stakes-national-security-how-right" target="_blank" rel="noopener"&gt;&lt;strong&gt;AI RAISES THE STAKES FOR NATIONAL SECURITY. HERE’S HOW TO GET IT RIGHT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The same systems built to outcompete Beijing can be turned inward — not by any single dramatic decree from the White House, but through thousands of small decisions made in the name of speed: efficiency replacing accountability, automation replacing human judgment, convenience replacing constitutional limits.&lt;/p&gt;&lt;p&gt;Cybersecurity experts now warn that autonomous systems resist reliable control through conventional software frameworks. That is a sobering reality when those systems are embedded in defense, &lt;a href="https://www.foxnews.com/category/us/crime/police-and-law-enforcement" target="_blank" rel="noopener"&gt;law enforcement&lt;/a&gt;, or the delivery of government services.&lt;/p&gt;&lt;p&gt;Freedom in America is rarely lost all at once. It erodes through systems that make decisions too fast to question, operate too opaquely to challenge, and reach too widely to escape. When automated systems begin to determine who receives benefits, shape what information citizens can access, or drive consequential decisions without human accountability, authority has quietly migrated — from elected officials and courts to systems no one fully understands and no one voted to empower.&lt;/p&gt;&lt;p&gt;Trump’s December 2025 executive order on AI rightly pushed back against the splintered maze of state regulations threatening to fragment American innovation. His March 2026 national AI legislative framework urged Congress toward a unified federal approach covering child safety, intellectual property, free speech and workforce development. Both were necessary steps. But a legislative recommendation is not law.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/opinion" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE FOR MORE FOX NEWS OPINION&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;There are still no binding federal standards specifying what human oversight is required before an automated system makes a binding decision about an American citizen, what transparency is owed when government systems evaluate the people they govern, or how privacy, due process, and free expression survive the age of machine rule. &lt;a href="https://www.foxnews.com/category/us/congress" target="_blank" rel="noopener"&gt;Congress must act&lt;/a&gt; — not to slow the race, but to make sure what we preserve is worth winning.&lt;/p&gt;&lt;p&gt;These questions are at the core of my new book, &lt;a href="https://www.amazon.com/New-AI-Cold-War-Machine/dp/0999189492" target="_blank" rel="noopener noreferrer nofollow"&gt;"The New AI Cold War: Liberty vs. Tyranny in the Age of Machine Empires,"&lt;/a&gt; available later in April. The contest with China is as real as any this nation has faced. So is the internal temptation every great power confronts in a long competition: adopting the logic of your adversary in the name of defeating him.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Make no mistake — our adversaries are already deploying these technologies against American interests. But that is not where the greatest danger lies. It lies closer to home: that in the name of defeating them, we quietly build the same &lt;a href="https://www.foxnews.com/category/us/personal-freedoms" target="_blank" rel="noopener"&gt;architecture of control&lt;/a&gt; ourselves — and by the time we recognize it, the infrastructure is already in place.&lt;/p&gt;&lt;p&gt;History will not judge us by whether we built AI first. It will judge whether we remained free while doing so.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/person/m/robert-maginnis" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO READ MORE FROM BOB MAGINNIS&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/china-flag-code.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">6bffbad1-544c-5a35-9c98-a7c9ee49ccac</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/opinion</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/artificial-intelligence</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/us/congress</category>
            <category domain="foxnews.com/taxonomy">fox-news/us/personal-freedoms/privacy</category>
            <category domain="foxnews.com/taxonomy">fox-news/person/xi-jinping</category>
            <category domain="foxnews.com/section-path">opinion</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Thu, 09 Apr 2026 05:00:35 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/apple-pay-text-scam-almost-cost-15000</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/apple-pay-text-scam-almost-cost-15000</guid>
            <title>Apple Pay text scam almost cost her $15,000</title>
            <description>How a simple text turned into a high-pressure scam call</description>
            <content:encoded>&lt;p&gt;You see a charge you don't recognize. It looks like it came from a trusted brand. Your instinct kicks in. You want to fix it quickly and move on. That's exactly what happened to Dorothy.&lt;/p&gt;&lt;p&gt;After a simple text, she found herself on the phone with someone who sounded official, confident and completely convincing. Here's how she described it:&lt;/p&gt;&lt;p&gt;"I received a text from &lt;a href="https://www.foxnews.com/category/tech/companies/apple" target="_blank" rel="noopener"&gt;APPLE Pay&lt;/a&gt;, which I don't even use... It said an Apple Store in CA wants to charge me $144... If I have questions, I should call. DUH! I called and was speaking with the scammer."&lt;/p&gt;&lt;p&gt;Within minutes, the situation escalated.&lt;/p&gt;&lt;p&gt;"He knew everything about me... He said I should take out $15,000... He said he was working with the FBI and the FDIC."&lt;/p&gt;&lt;p&gt;That's when the pressure really started. Dorothy told me this story when she joined me on my Beyond Connected podcast, and what happened next shows just how far these scams can go.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/10-ways-protect-seniors-from-email-scams" target="_blank" rel="noopener"&gt;&lt;strong&gt;10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How this Apple Pay text scam actually works&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam follows a pattern that is becoming more common. It combines a fake &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;alert with a live phone call&lt;/a&gt; designed to build trust fast.&lt;/p&gt;&lt;p&gt;Here's what is happening behind the scenes:&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 1: The fake charge alert&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;You get a text about a suspicious charge. It looks urgent. It often includes a number to call.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 2: You call the scammer&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;The number connects you directly to a criminal. They pose as Apple, your bank or even law enforcement.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 3: They build credibility&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;They may know your name, address or bank. That information often comes from past data breaches.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 4: They create fear and urgency&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;You are told your money is at risk. You need to act immediately.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Step 5: They control your next move&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;In Dorothy's case, the scammer told her to withdraw $15,000 and lie to &lt;a href="https://www.foxnews.com/category/banking" target="_blank" rel="noopener"&gt;her bank&lt;/a&gt; about why.&lt;/p&gt;&lt;p&gt;"He said he would stay on the phone with me while I drove to the bank... If anyone asked, I should say I was buying a car."&lt;/p&gt;&lt;p&gt;That is a major red flag.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/phishing-scam-exploits-apple-mail-trusted-sender-label" target="_blank" rel="noopener"&gt;&lt;strong&gt;PHISHING SCAM EXPLOITS APPLE MAIL 'TRUSTED SENDER' LABEL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The moment everything could have gone wrong&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Dorothy drove to the bank with the scammer still on the phone. This is exactly what criminals want. They try to isolate you and keep control of the situation.&lt;/p&gt;&lt;p&gt;But something didn't feel right.&lt;/p&gt;&lt;p&gt;"When I got to the bank, I recognized one of the employees and told her that I was uncomfortable... She said to hang up immediately."&lt;/p&gt;&lt;p&gt;That decision changed everything.&lt;/p&gt;&lt;p&gt;The bank confirmed it was a scam. The calls kept coming from different numbers. Dorothy blocked them all. Fortunately, no money was lost.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why the Apple Pay text scam feels so real&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers are getting better at one thing. They make you feel like you are solving a problem, not being scammed.&lt;/p&gt;&lt;p&gt;Here's why this one works so well:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;It uses a &lt;a href="https://www.foxnews.com/tech/apple-app-password-scam-email-warning" target="_blank" rel="noopener"&gt;trusted name like Apple Pay&lt;/a&gt;&lt;/li&gt;&lt;li&gt;It creates urgency with a fake charge&lt;/li&gt;&lt;li&gt;It moves quickly to a live conversation&lt;/li&gt;&lt;li&gt;It uses real personal details to build trust&lt;/li&gt;&lt;li&gt;It pressures you to act before you think&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;They also add authority. Claiming &lt;a href="https://www.foxnews.com/category/tech/topics/fbi" target="_blank" rel="noopener"&gt;ties to the FBI&lt;/a&gt; or FDIC makes people feel like they must comply. In reality, no legitimate agency will ever ask you to move money this way.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The biggest red flags to watch for&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If you remember nothing else, remember these:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;A text about a charge that tells you to call a number&lt;/li&gt;&lt;li&gt;Someone is asking you to withdraw large amounts of cash&lt;/li&gt;&lt;li&gt;Instructions to lie to your bank or keep a secret&lt;/li&gt;&lt;li&gt;Claims that your money needs to be "protected"&lt;/li&gt;&lt;li&gt;Pressure to act immediately&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Each one is a warning sign. Together, they confirm it is a scam.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to stay safe from Apple Pay text scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You do not need to outsmart scammers. You just need to slow the situation down.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Never trust the number in the message&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you get a suspicious text, do not call the number provided. Look up the official number yourself.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Pause before you act&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers rely on urgency. Take a moment. Real companies will not rush you like this.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Never move money on someone else's instructions&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;No bank, tech company or government agency will ask you to withdraw cash to "protect" it.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Use strong antivirus software&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Strong antivirus software can help detect malicious links, block scam websites and warn you before you engage with risky content. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Remove your personal data from the web&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers often use data from breaches to sound convincing. A &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;data removal service&lt;/a&gt; can help reduce your exposure and limit what criminals can find about you online. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Talk to someone you trust&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A quick conversation with a friend, family member or bank employee can stop a scam cold.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Add extra protection&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Consider identity monitoring services that alert you if your information is being misused. See my tips and best picks on Best Identity Theft Protection at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What to do if this happens to you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Even if you did not lose money, take a few steps right away:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Contact your bank using the number on your card&lt;/li&gt;&lt;li&gt;Place a fraud alert on your credit&lt;/li&gt;&lt;li&gt;Consider freezing your credit&lt;/li&gt;&lt;li&gt;Monitor your accounts closely&lt;/li&gt;&lt;li&gt;Block any follow-up calls or texts&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;These steps help protect you from future attempts.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means for you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This scam did not begin with a complex hack. Instead, it started with a simple text. That is what makes it so dangerous. At first, it looks routine. Then urgency takes over. As a result, anyone can feel pressured to act quickly and without thinking.&lt;/p&gt;&lt;p&gt;In many cases, the situation feels real. That is how people get pulled into a conversation that seems legitimate. In Dorothy's case, she trusted her instincts at the right moment. Because of that decision, fortunately, she did not lose $15,000.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers target more than technology. They focus on human behavior. They create pressure, build trust and keep you engaged long enough to make a mistake. However, you can break the cycle. A single pause can disrupt the scam. Asking one question can expose it. Even a quick conversation with someone you trust can stop it. If you'd like to hear more of Dorothy's story, you can catch our full conversation on my Beyond Connected podcast at &lt;i&gt;&lt;strong&gt;getbeyondconnected.com/&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;If you got a text like this right now, would you pause or would you call? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/woman-iphone-customer.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">c9ccd99a-942a-5d17-9398-825c57a0ea98</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/apple</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Wed, 08 Apr 2026 08:00:47 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/android-flaw-lets-hackers-unlock-phones-minute-</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/android-flaw-lets-hackers-unlock-phones-minute-</guid>
            <title>Android flaw lets hackers unlock phones in under a minute</title>
            <description>A serious vulnerability could expose your data, and here is how to check your phone</description>
            <content:encoded>&lt;p&gt;Your phone lock screen is supposed to be your last line of defense. If your device gets lost or stolen, that PIN or passcode should keep strangers out of your photos, messages and financial apps. But researchers have found a serious flaw that can break through those protections on certain &lt;a href="https://www.foxnews.com/category/tech/technologies/android" target="_blank" rel="noopener"&gt;Android phones&lt;/a&gt; in less than a minute.&lt;/p&gt;&lt;p&gt;Once exploited, attackers can recover your phone's PIN, unlock encrypted storage and even extract sensitive data such as cryptocurrency wallet seed phrases. Security researchers estimate that roughly one in four Android phones could be affected, particularly budget phones.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report &lt;/strong&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.  &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/android-fixes-129-security-flaws-major-phone-update" target="_blank" rel="noopener"&gt;&lt;strong&gt;ANDROID FIXES 129 SECURITY FLAWS IN MAJOR PHONE UPDATE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;All about the Android hacking flaw&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;A newly disclosed vulnerability, tracked as CVE-2026-20435 in the National Vulnerability Database, affects some Android phones powered by MediaTek, a major smartphone chip maker based in Taiwan that competes with companies like Qualcomm. These phones use a security component called Trustonic's Trusted Execution Environment (TEE), which is designed to keep sensitive data, such as encryption keys, protected from the rest of the system.&lt;/p&gt;&lt;p&gt;It stores cryptographic keys that help keep your device encrypted and secure, even if someone tries to tamper with it. However, security analyses of the vulnerability indicate that these protections may be bypassed on affected devices.&lt;/p&gt;&lt;p&gt;By connecting a phone to a computer using a USB cable, an attacker with physical access may be able to exploit the flaw during the early boot process, potentially exposing sensitive data before full security protections are enforced. Think of it like accessing the master key before the safe door even closes. Once attackers gain access to these low-level components, they may be able to access encrypted storage without needing your PIN.&lt;/p&gt;&lt;p&gt;In a worst-case scenario, this type of access could allow attackers to extract highly sensitive information, including personal photos, stored passwords, private messages, financial data, and crypto wallet credentials. If seed phrases for crypto wallets are exposed, attackers could drain funds permanently.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What are Android makers doing about this&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;There's limited action manufacturers can take on their own since the issue originates at the processor level, which is manufactured by MediaTek. The company says it has released a firmware patch addressing the vulnerability. However, the update must still be distributed by individual phone manufacturers through security updates. Depending on the device and whether it is still supported, that update could arrive quickly or not at all.&lt;/p&gt;&lt;p&gt;The good thing is that this attack requires physical access to the phone and a USB connection to a computer. That means it cannot be done remotely over the internet. However, if your phone is stolen, briefly confiscated, or even taken during a repair, the attacker could potentially extract sensitive information.&lt;/p&gt;&lt;p&gt;If you're not sure whether this vulnerability affects your mobile device, you can look up your phone on a platform like GSMArena or your vendor's website to see which SoC it uses, then cross-check it with MediaTek's March security bulletin under CVE-2026-20435. You can log onto &lt;i&gt;&lt;strong&gt;&lt;u&gt;corp.mediatek.com/product-security-bulletin/March-2026 &lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;to review the list of affected chipsets and confirm whether your device may be at risk.&lt;/p&gt;&lt;p&gt;CyberGuy reached out to MediaTek for comment, but did not hear back before our deadline.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/new-android-attack-tricks-you-giving-dangerous-permissions" target="_blank" rel="noopener"&gt;&lt;strong&gt;NEW ANDROID ATTACK TRICKS YOU INTO GIVING DANGEROUS PERMISSIONS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to tell if your phone is affected&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;So how do you know if your phone is actually at risk? Not every Android phone is vulnerable. The issue primarily affects devices that use certain MediaTek processors. Here's how to check your phone:&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Find your phone model&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Go to&lt;strong&gt; Settings&lt;/strong&gt; &gt; &lt;strong&gt;About phone&lt;/strong&gt; and look for your exact model name.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Look up your processor (chip)&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Search your &lt;strong&gt;phone model&lt;/strong&gt; on a site like GSMArena or your manufacturer's website to find the processor (also called the SoC).&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Check if it uses MediaTek&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If your phone uses a &lt;strong&gt;MediaTek chip&lt;/strong&gt;, it may be affected. Devices with Qualcomm Snapdragon or Google Tensor chips are not part of this specific issue.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Install the latest security updates immediately&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Check your phone's system update settings and install any available updates from your manufacturer.  Go to &lt;strong&gt;Settings&lt;/strong&gt; &gt; &lt;strong&gt;Software update&lt;/strong&gt; and install any &lt;strong&gt;available updates. &lt;/strong&gt;MediaTek has already released a fix, but phone makers must distribute it. Installing updates quickly ensures you receive the firmware patch if your device manufacturer has released it.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;7 ways you can protect your phone from getting hacked&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If your phone uses one of the affected chips, a few simple precautions can help reduce the chances of someone accessing your data if the device ever falls into the wrong hands.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Install strong antivirus protection&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A security app cannot fix this processor-level flaw. However, it can still help protect your phone from other threats that often follow stolen or compromised devices. It will not stop this specific exploit, but it can detect malicious apps, spyware, and suspicious activity that attackers may install after gaining access. That extra layer of monitoring can help stop additional data theft if your device ever falls into the wrong hands. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Avoid keeping sensitive information on your phone&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you store things like cryptocurrency wallet seed phrases, recovery codes, or &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;sensitive documents&lt;/a&gt; in notes apps or screenshots, consider moving them to a secure offline location. If someone extracts your phone's data through this vulnerability, that information could be exposed.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Keep physical control of your phone&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;This exploit requires someone to physically connect your phone to a computer. Do not leave your device unattended in public places, and be cautious when handing it to repair shops or unknown technicians. Physical access dramatically increases the risk.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Use strong screen locks and auto-lock settings&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;While the vulnerability bypasses encryption on affected devices, &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;strong lock settings&lt;/a&gt; still protect against many other threats. Use a longer PIN or passcode instead of simple patterns, and enable automatic locking after short periods of inactivity.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Protect accounts with two-factor authentication&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Even if attackers gain access to data on your phone, two-factor authentication (2FA) can stop them from logging into your online accounts. Enable it for email, banking apps, cloud storage, and social media wherever possible.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Use a password manager&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A password manager stores your login credentials in a secure, encrypted vault instead of leaving them scattered across apps and notes. If someone compromises your device, the password manager still protects your accounts with strong encryption, forcing attackers to break through another security layer before they can access your logins. Check out the best expert-reviewed password managers of 2026 at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Enable USB restricted mode (if available)&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Some Android devices limit USB data access when locked. Turning on this setting can reduce the risk of unauthorized data extraction through a wired connection, especially in situations where someone briefly gains physical access to your phone. On &lt;a href="https://www.foxnews.com/category/tech/companies/samsung" target="_blank" rel="noopener"&gt;Samsung phones&lt;/a&gt; running the latest software:&lt;/p&gt;&lt;p&gt;&lt;i&gt;Settings may vary slightly depending on your Samsung model and software version.&lt;/i&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Tap&lt;strong&gt; Lock screen&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Then, tap &lt;strong&gt;Secure lock settings&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Enter&lt;strong&gt; your current PIN, &lt;/strong&gt;then tap &lt;strong&gt;Continue&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt; &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Enable &lt;strong&gt;"Lock network and security&lt;/strong&gt;" (or a similarly named option) to help block USB data access while your device is locked.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaway&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This vulnerability exposes a deeper issue with the Android ecosystem. Even when chipmakers release a fix, millions of phones depend on manufacturers to deliver updates that may never arrive, especially for cheaper devices that lose support quickly. We often assume our lock screen and encryption will protect our data if a phone is lost or stolen. However, incidents like this show that protection is only as strong as the update policies behind it. When devices stop receiving security patches, those protections quietly weaken over time.&lt;/p&gt;&lt;p&gt;Should phone manufacturers be required to guarantee security updates for several years if their devices contain critical encryption vulnerabilities? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report &lt;/strong&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, &lt;strong&gt;visit &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;CyberGuy.com&lt;/strong&gt;&lt;/i&gt;&lt;strong&gt; -  trusted by millions who watch CyberGuy on TV daily&lt;/strong&gt;. Plus, you’ll get instant access to my &lt;i&gt;Ultimate Scam Survival Guide&lt;/i&gt; free when you join.&lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/12/931/523/woman-texts-on-phone.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">42ede4fb-5d84-5d4b-b572-04ecaa3ec91e</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/smartphones</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/android</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sun, 05 Apr 2026 12:50:35 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/politics/fbi-warns-foreign-apps-could-collect-americans-data-even-from-people-who-never-downloaded-them</link>
            <guid isPermaLink="true">https://www.foxnews.com/politics/fbi-warns-foreign-apps-could-collect-americans-data-even-from-people-who-never-downloaded-them</guid>
            <title>FBI warns some foreign apps could collect Americans’ data — even if you never download them</title>
            <description>Apps like CapCut, Temu and SHEIN are among widely used Chinese-developed platforms that could be affected</description>
            <content:encoded>&lt;p&gt;Americans' personal data could be collected and stored overseas — even if they've never downloaded a foreign-developed app themselves — according to a new &lt;a href="https://www.foxnews.com/category/tech/topics/fbi" target="_blank" rel="noopener"&gt;FBI alert&lt;/a&gt; warning about the risks tied to popular mobile platforms.&lt;/p&gt;&lt;p&gt;That means information like a person's name, email address or phone number could be pulled from someone else’s contact list and potentially stored abroad if a friend or family member grants an app access to their device.&lt;/p&gt;&lt;p&gt;The warning comes after years of scrutiny over TikTok’s ties to China, but the FBI alert suggests the concerns extend beyond any single platform to a broader range of foreign-developed apps.&lt;/p&gt;&lt;p&gt;In a public service announcement, the FBI said many widely used apps developed overseas, particularly those tied to China, may access extensive data once permissions are granted, including address books containing information on both users and non-users.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/5-simple-tech-tips-improve-digital-privacy" target="_blank" rel="noopener"&gt;&lt;strong&gt;5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The bureau also warned that some apps may continue &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;collecting data in the background&lt;/a&gt; after access is granted and, in certain cases, store that information on servers in countries where local laws could allow government access.&lt;/p&gt;&lt;p&gt;"Developer companies can store collected data on users’ private information and address books, such as names, e-mail addresses, user IDs, physical addresses, and phone numbers of their stored contacts," the FBI said. "The app can persistently collect data and users’ private information throughout the device, not just within the app or while the app is active."&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/world/chinese-hackers-reportedly-breached-phones-heart-downing-street-global-spy-campaign" target="_blank" rel="noopener"&gt;&lt;strong&gt;CHINESE HACKERS REPORTEDLY BREACHED PHONES AT 'HEART OF DOWNING STREET' IN GLOBAL SPY CAMPAIGN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The FBI did not name specific companies, but the warning could apply to a range of widely used apps developed by Chinese firms — including video-editing platform CapCut, shopping apps like Temu and SHEIN, and social media platforms such as Lemon8 — several of which rank among the most downloaded apps in the United States.&lt;/p&gt;&lt;p&gt;U.S. officials have long warned that data collected by Chinese-linked platforms could be used to build detailed profiles of Americans, map personal and professional networks, and potentially support intelligence-gathering efforts, particularly if accessed under China’s national security laws.&lt;/p&gt;&lt;p&gt;The FBI added that apps operating in China are subject to the country’s national security laws, which could allow the government to access user data.&lt;/p&gt;&lt;p&gt;The FBI also pointed to possible warning signs that an app may be collecting more data than expected, including unusual battery drain, spikes in data usage, or unauthorized account activity after installation — indicators that could suggest background data collection or other suspicious behavior.&lt;/p&gt;&lt;p&gt;The bureau urged users to limit unnecessary data sharing, download &lt;a href="https://www.foxnews.com/category/tech/technologies/apps" target="_blank" rel="noopener"&gt;apps only from official app stores&lt;/a&gt;, and regularly review permissions granted to mobile platforms. The bureau also warned that apps obtained from third-party sites may carry malware designed to gain unauthorized access to personal data.&lt;/p&gt;&lt;p&gt;Years of scrutiny over &lt;a href="https://www.foxnews.com/tech/tiktok-after-us-sale-what-changed-how-use-safely" target="_blank" rel="noopener"&gt;TikTok culminated in a 2026 deal&lt;/a&gt; that forced its Chinese parent company to relinquish control of U.S. operations to an American-led group in order to address fears over data access and national security.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The FBI’s latest warning suggests those risks may extend beyond a single platform to a broader range of foreign-developed apps used by millions of Americans.&lt;/p&gt;&lt;p&gt;The Chinese embassy could not immediately be reached for comment. &lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/04/931/523/china-flag-code.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">2667d85d-bf6b-5499-a738-4ee963d975be</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/world/world-regions/china</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/section-path">politics</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Thu, 02 Apr 2026 11:49:05 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/tech-giants-unite-fight-online-scams</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/tech-giants-unite-fight-online-scams</guid>
            <title>Tech giants unite to fight online scams</title>
            <description>New industry pledge aims to stop scams before they spread across platforms</description>
            <content:encoded>&lt;p&gt;&lt;br&gt;If you've ever gotten a suspicious text, a fake delivery alert or a message that felt just a little too convincing, you've already seen how fast &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;scams are evolving.&lt;/a&gt; Now, some of the biggest names in tech and retail are scrambling to catch up.&lt;/p&gt;&lt;p&gt;Eleven major companies across those industries, including &lt;a href="https://www.foxnews.com/category/tech/companies/google" target="_blank" rel="noopener"&gt;Google,&lt;/a&gt; Amazon, OpenAI, Adobe, Pinterest, LinkedIn, Match Group, Meta, Microsoft, Target and Levi Strauss &amp; Co., have signed a new agreement to share information about scams and fraud.&lt;/p&gt;&lt;p&gt;At first glance, it sounds like a strong step forward. But this is more than a coordinated effort. It is a response to how modern scams actually work today.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter  &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/media/scammers-using-ai-meet-match-openai-tech-industry-fight-back" target="_blank" rel="noopener"&gt;&lt;strong&gt;SCAMMERS USING AI MEET THEIR MATCH AS OPENAI, TECH INDUSTRY FIGHT BACK&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why online scams are getting harder to stop&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers no longer operate in one place. They might find you on social media, move the conversation to a messaging app, then push you to send money through a fake website or payment service. It is all connected. That's exactly what this new agreement, called the Industry Accord Against Online Scams &amp; Fraud, is trying to address.&lt;/p&gt;&lt;p&gt;Instead of companies working in isolation, they are promising to share threat data in near real time. That includes things like scam accounts, fake domains and patterns tied to organized fraud. The idea is that if one company spots a scam early, others can block it before it spreads. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What the companies are actually promising&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is not just about talking. The companies outlined a few concrete steps they plan to take:&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Share intelligence faster&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;They will exchange information about scam networks, tactics and accounts across platforms and with law enforcement.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Use AI to detect scams earlier&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many companies already &lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener"&gt;rely on AI&lt;/a&gt; to flag suspicious behavior. Now they want to expand those systems to catch scams faster and more accurately.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Add stronger verification&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Expect tighter checks for financial transactions to confirm both sides are legitimate.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Improve reporting tools&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Users should see clearer ways to report scams and get help.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Push governments to act&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Companies are also calling for scam prevention to become a national priority in more countries.&lt;/p&gt;&lt;p&gt;That all sounds promising. But there is a catch.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;The biggest limitation you should know&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;This agreement is voluntary. There are no penalties if companies fail to follow through. That means success depends entirely on how seriously each company takes it.&lt;/p&gt;&lt;p&gt;Still, even a loose collaboration could make a difference. Scammers thrive in gaps between platforms. Closing those gaps, even partially, could slow them down.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/youtube-job-scam-text-how-spot-fast" target="_blank" rel="noopener"&gt;&lt;strong&gt;YOUTUBE JOB SCAM TEXT: HOW TO SPOT IT FAST&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How AI is making online scams more dangerous&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This push comes as scams are becoming more sophisticated and harder to detect. AI is a big reason why. Scammers can now:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Write highly convincing &lt;a href="https://www.foxnews.com/tech/dont-click-that-link-how-to-spot-prevent-phishing-attacks-in-your-inbox"&gt;&lt;u&gt;phishing emails&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Clone voices to&lt;a href="https://www.foxnews.com/tech/fbis-new-warning-about-ai-driven-scams-after-your-cash"&gt;&lt;u&gt; impersonate loved ones&lt;/u&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Create &lt;a href="https://www.foxnews.com/tech/ai-deepfake-romance-scam-steals-womans-home-life-savings"&gt;&lt;u&gt;deepfake videos &lt;/u&gt;&lt;/a&gt;of executives or celebrities&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;At the same time, companies are using AI to fight back. Google alone blocks hundreds of millions of scam-related results daily, while Meta has removed massive numbers of scam ads using automated systems. It's essentially an arms race.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means for your online safety&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;In theory, this agreement could lead to fewer scams slipping through the cracks.&lt;/p&gt;&lt;p&gt;You might start to notice:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Faster removal of scam accounts&lt;/li&gt;&lt;li&gt;More warnings when something looks suspicious&lt;/li&gt;&lt;li&gt;Fewer fake ads or impersonation attempts&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;But this won't eliminate scams entirely. &lt;a href="https://www.foxnews.com/category/tech/topics/hackers" target="_blank" rel="noopener"&gt;Criminal networks are global,&lt;/a&gt; coordinated and constantly adapting. So while companies are stepping up, your own awareness still matters.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Cybersecurity expert warns scams are evolving fast&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;To understand what this really means in practice, it helps to hear from people who track these threats every day. Trend Micro, a global cybersecurity company, says this kind of collaboration is long overdue.&lt;/p&gt;&lt;p&gt;Trend Micro's VP of Consumer Marketing and Education, Lynette Owens, believes cross-industry coordination is a critical step forward as scams increasingly unfold across multiple platforms. She tells CyberGuy:&lt;/p&gt;&lt;p&gt;"It's encouraging to see major platforms like Google, Meta and Amazon coming together to share intelligence and disrupt scam networks. Cross-industry collaboration has proven to be helpful in fighting other types of online harms and has been a fruitful counter-measure against scams and fraud in other countries. Anything that moves us more towards prevention is a win, as so much effort is currently directed at what happens after the harm is done. &lt;/p&gt;&lt;p&gt;"But while it's a useful step forward, it's not a complete solution. Scammers are constantly evolving, using AI and multi-channel tactics to create more convincing, personalized attacks that are harder for people to recognize in the moment. &lt;/p&gt;&lt;p&gt;"What consumers really need is intervention that alerts them where scams actually happen, with clear, timely signals that something isn't right. In today's environment, scams don't come as a single message. They unfold over time and adapt faster than ever to changing consumer habits or platform best practices. Collaboration is an important piece of the puzzle, but the more tools consumers have at their fingertips to fight back, the better their chances at stopping a scam before any real damage is done."&lt;/p&gt;&lt;p&gt;Her takeaway is clear. Collaboration helps, but it will not be enough on its own.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/spring-clean-your-digital-footprint-why-retirees-scam-targets" target="_blank" rel="noopener"&gt;&lt;strong&gt;SPRING CLEAN YOUR DIGITAL FOOTPRINT: WHY RETIREES ARE SCAM TARGETS&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to protect yourself from online scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Even as companies step up their defenses, there are still simple steps you can take right now to &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;reduce your risk&lt;/a&gt; and stay one step ahead of scammers.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Avoid unknown links&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Do not click links in unexpected texts, emails or messages. Instead, go directly to the official website by typing the address yourself.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Use strong security software&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Install strong antivirus software to help detect malicious links, phishing attempts and suspicious apps before they cause harm. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Turn on two-factor authentication&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Enable two-factor authentication (&lt;a href="https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it"&gt;&lt;u&gt;2FA&lt;/u&gt;&lt;/a&gt;) on your accounts whenever possible. This adds an extra layer of protection even if your password is exposed.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Limit where your personal data appears&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;The more your personal information is available online, the easier it is for scammers to target you. Consider using a data removal service to reduce your exposure on data broker and people-search sites. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt; &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Monitor your accounts regularly&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Check your bank, credit card and online accounts often so you can catch suspicious activity early and act quickly.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;     &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This new alliance signals a shift. Tech companies are starting to treat scams as a shared problem rather than isolated incidents. That's a big step in the right direction. But whether it actually slows down scammers will depend on execution, not promises. Coordination helps, but enforcement and accountability matter just as much.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;If scams keep getting smarter, should tech companies be required to do more than just cooperate voluntarily?  Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter &lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/tech-giants-anti-scam-accord-3.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">9fa96ec9-f5ac-5e0d-85df-9e6b939ec1cd</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Mon, 30 Mar 2026 06:55:49 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/media/jewish-summer-camps-ramping-up-security-measures-amid-rising-antisemitism-parents-footing-bill</link>
            <guid isPermaLink="true">https://www.foxnews.com/media/jewish-summer-camps-ramping-up-security-measures-amid-rising-antisemitism-parents-footing-bill</guid>
            <title>Jewish summer camps ramping up security measures amid rising antisemitism, and parents are footing the bill</title>
            <description>FBI data shows 1,395 of 2,421 religion-based hate crime incidents between March 2025 and March 2026 targeted Jews</description>
            <content:encoded>&lt;p&gt;As &lt;a href="https://www.foxnews.com/category/topic/anti-semitism" target="_blank" rel="noopener"&gt;antisemitism rises&lt;/a&gt; across the U.S., Jewish summer camps are ramping up security, with some introducing additional charges while working to combat threats before they arise.&lt;/p&gt;&lt;p&gt;&lt;a href="https://cde.ucr.cjis.gov/LATEST/webapp/#/pages/explorer/crime/hate-crime" target="_blank" rel="nofollow noopener"&gt;FBI crime data&lt;/a&gt; shows that, between March 2025 and March 2026, the U.S. recorded 2,421 religion-based hate crime incidents, 1,395 of which targeted Jews. There are hundreds of Jewish summer camps across North America serving tens of thousands of children each year.&lt;/p&gt;&lt;p&gt;A recent &lt;a href="https://www.foxnews.com/us/fbi-held-active-shooter-training-michigan-synagogue-weeks-before-attack" target="_blank" rel="noopener"&gt;attack on a Michigan synagogue&lt;/a&gt; highlighted the dangers facing Jewish institutions and the people who rely on them, including children.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/opinion/after-michigan-attack-jewish-teens-show-antisemitism-wont-define-them" target="_blank" rel="noopener"&gt;&lt;strong&gt;AFTER MICHIGAN ATTACK, JEWISH TEENS SHOW ANTISEMITISM WON’T DEFINE THEM&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;On March 12, Ayman Muhammad Ghazali, a 41-year-old Lebanon-born American, allegedly rammed his vehicle into Temple Israel, a large reform synagogue in West Bloomfield, at approximately 12:30 p.m. before exiting the vehicle with a rifle and exchanging gunfire with a security guard, who shot and killed him. &lt;/p&gt;&lt;p&gt;Preschool students and staff were forced to evacuate for their safety.&lt;/p&gt;&lt;p&gt;After the attack, police &lt;a href="https://www.foxnews.com/us/nyc-boosts-patrols-amid-heightened-threat-environment-gunman-rams-truck-michigan-synagogue" target="_blank" rel="noopener"&gt;departments across the country increased patrols&lt;/a&gt; at houses of worship, Jewish institutions and other vulnerable sites. With summer approaching, camps across the country are preparing so they can give children a fun and safe summer.&lt;/p&gt;&lt;p&gt;Secure Community Network (SCN) National Director and CEO Michael Masters told Fox News Digital the response to the attack in Michigan was the product of "years of preparedness" and &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;investments in security&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;"That investment paid off in lives saved," Masters said.&lt;/p&gt;&lt;p&gt;SCN, which works with Jewish institutions across North America, launched an initiative focused on summer camps in April 2024. The organization told Fox News Digital that, since the initiative's launch, it has trained over 5,000 camp-related individuals, conducted over 100 site assessments and walkthroughs and secured $2.2 million in federal funding.&lt;/p&gt;&lt;p&gt;Masters also spoke about SCN's recently released &lt;a href="https://www.securecommunitynetwork.org/resources/essential-safety-questions-to-ask-before-sending-your-child-to-summer-camp/" target="_blank" rel="nofollow noopener"&gt;list of 10 questions&lt;/a&gt; to ask camps before sending children off for the summer and encouraged parents to "be persistent" when asking about safety. The questions cover a variety of topics, such as missing camper procedures, availability of first aid kits and tourniquets and how the camp controls access to its facility, among others.&lt;/p&gt;&lt;p&gt;"Parents should ask, ‘Was your camp one of those that got an assessment? Was your camp one of the those that got trained? Do your counselors know what to do?’ And the camp should be able to answer that question," Masters said. He added that SCN provides its training to institutions for free.&lt;/p&gt;&lt;p&gt;"At the end of the day, a summer camp is still the most vulnerable space that we need to provide security for consultation and guidance," SCN Director of National Programs Jim Tarasca told Fox News Digital.&lt;/p&gt;&lt;p&gt;Tarasca, who &lt;a href="https://www.foxnews.com/category/tech/topics/fbi" target="_blank" rel="noopener"&gt;worked for the FBI&lt;/a&gt; for over 25 years and served as the special agent in charge of the bureau's Detroit Field Office, noted that many camps are located in rural areas, presenting challenges such as communications barriers, including bad cellphone service. He also underscored the importance of empowering staff to see safety as "everyone's responsibility," rather than the job of designated security workers.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/us/jewish-security-organization-working-keep-its-community-safe-amid-elevated-terror-threat" target="_blank" rel="noopener"&gt;&lt;strong&gt;JEWISH SECURITY ORGANIZATION WORKING TO KEEP ITS COMMUNITY SAFE AMID ELEVATED TERROR THREAT&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;While some camps have included security fees in their tuition, others make it a separate line in their lists of session dates and costs. Some camps that list the security fee separately note that the additional charge is meant to offset rising costs of protecting the campers and staff. While security fees vary widely based on several factors, such as session length and whether it is a day or overnight camp, the charges reviewed by Fox News Digital went as high as $250, highlighting the growing costs.&lt;/p&gt;&lt;p&gt;National Conference of Synagogue Youth (NCSY) Summer Director Elliot Tanzman told Fox News Digital that while the organization has always had security protocols, it has become "much more of a focus" in recent years, with the group adding new measures.&lt;/p&gt;&lt;p&gt;As part of its safety measures, NCSY has made changes to its apparel and giveaways because "we're trying not to scream that we are a Jewish group," according to Tanzman. While he acknowledged that the dress codes could be signals to some that the participants are Jewish, Tanzman also said there is an effort to "not be extra identifiable."&lt;/p&gt;&lt;p&gt;"It hurts to say something like that where instead of having the word 'Israel' on some of our T-shirts, which we've had in the past because it's part of the program name, we've shortened it just to say 'NCSY' or 'JSU' or one of our other brands in order to not bring up any forms of antisemitism that we wouldn't want to experience over the summer," Tanzman said.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Jamie Simon, CEO of Foundation for Jewish Camp, said in a statement provided to Fox News Digital that safety and security were a top priority for summer camps. The foundation, according to Simon, can provide guidance from security partners, crisis communications resources and more to help camps continue to operate while keeping kids and staff safe.&lt;/p&gt;&lt;p&gt;"As new challenges emerge, the field is not starting from scratch. Camps are experienced, prepared and deeply committed to the well-being of every young person in their care," Simon said. &lt;/p&gt;&lt;p&gt;"This is a pivotal moment for Jewish life, and Jewish camp offers a joyful, immersive and proven space where young people develop pride in their Jewish identity, deep friendships and a sense of belonging that lasts a lifetime."&lt;/p&gt;&lt;p&gt;Summer camp has played a large role in Jewish American life for more than 120 years. Surprise Lake Camp, which was founded in 1902, is one of the oldest in the country. &lt;/p&gt;&lt;p&gt;&lt;a href="https://mjhnyc.org/blog/an-american-jewish-tradition-sleepaway-camp/" target="_blank" rel="nofollow noopener"&gt;The Museum of Jewish Heritage&lt;/a&gt; in New York noted that Surprise Lake Camp was initially founded to give boys in urban areas a chance to experience nature and escape the city heat. Surprise Lake Camp alumni include several celebrities, such as Neil Diamond, Jerry Stiller and Gene Simmons.&lt;/p&gt;&lt;p&gt;&lt;i&gt;Fox News Digital's Eric Mack contributed to this report.&lt;/i&gt;&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/summer-camp-ropes-course-1.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">deae6269-985e-55c2-aa8b-c69acd92dca7</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/topic/anti-semitism</category>
            <category domain="foxnews.com/taxonomy">fox-news/us/crime/hate-crime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/section-path">media</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sat, 28 Mar 2026 17:00:11 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/why-4-charge-your-statement-could-fraud</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/why-4-charge-your-statement-could-fraud</guid>
            <title>Why that $4 charge on your statement could be fraud</title>
            <description>Small 'ghost tapping' charges can signal fraud; here’s how scammers test your card and what to do before bigger charges hit</description>
            <content:encoded>&lt;p&gt;A $4 charge is easy to ignore. It might appear as a parking fee, a small purchase or a vague merchant name that doesn't raise any red flags. Consumer protection groups and law enforcement say scammers are counting on that.&lt;/p&gt;&lt;p&gt;Recent warnings describe a pattern sometimes called "ghost tapping," where &lt;a href="https://www.foxnews.com/category/finance" target="_blank" rel="noopener"&gt;small, unfamiliar charges&lt;/a&gt; show up on contactless payment cards without a clear point of purchase. The amounts are easy to miss, but they can signal unauthorized access to your payment method rather than a simple billing error.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report.&lt;/strong&gt; Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;Ultimate Scam Survival Guide&lt;/a&gt; — free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter. &lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/ghost-tapping-scam-targets-tap-to-pay-users" target="_blank" rel="noopener"&gt;&lt;strong&gt;GHOST-TAPPING SCAM TARGETS TAP-TO-PAY USERS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How does ghost tapping work?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Better Business Bureau (BBB) warnings use the term "ghost tapping" to describe these incidents in consumer alerts. In simple terms, it means a payment can be triggered without you actively making a purchase.  &lt;/p&gt;&lt;p&gt;One reported method involves compromised payment terminals that quietly process low-value contactless charges. Another involves unauthorized NFC readers operating at close range, sometimes in crowded places. In these cases, a card or mobile wallet can be charged within inches.&lt;/p&gt;&lt;p&gt;Because these transactions run through standard contactless payment networks, they appear as normal card-present purchases. There is usually no clear sign on your statement that anything was wrong.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;The small charges aren't arbitrary&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Low-dollar transactions are used to confirm that a card can be charged without being declined. When a small charge goes through, it signals that the payment details are active and usable. Once that charge goes through, it establishes a working payment path. Scammers can then run additional transactions using the same card details, sometimes across different merchants or terminals. Many people only notice these charges after they post to an account. At that point, the transaction appears as a completed purchase, not a pending authorization.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why acting quickly matters&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This means a charge that looks harmless could actually be the first step in a larger fraud attempt. Over time, these fraudulent charges may extend beyond a single card. If your payment details have been exposed or are stored in a compromised system, they can be reused until you cancel the card. That can result in multiple charges over several days or even billing cycles.&lt;/p&gt;&lt;p&gt;Delays in reporting also affect how quickly you can stop fraud. The Federal Trade Commission (FTC) advises you to report unauthorized charges as soon as they are identified. In practice, that means contacting your card issuer as soon as you see a charge you don't recognize, either through the issuer's app or customer service line.&lt;/p&gt;&lt;p&gt;Credit cards typically offer stronger fraud protections than debit cards, where money may be withdrawn directly from your bank account. Under federal law, liability for unauthorized credit card charges is limited, but those protections depend on when you report it.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Scammed? What federal agencies say to do next&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If you spot a charge you don't recognize, acting quickly can limit damage and protect your rights under federal law.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Review transactions as they post&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;The FTC recommends checking account activity regularly and flagging any unfamiliar charges as soon as they appear.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Contact your card issuer immediately&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;The Consumer Financial Protection Bureau (CFPB) advises reporting the charge right away and opening a dispute through your issuer's app or customer service line.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Submit a formal dispute within 60 days&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;To preserve protections under the Fair Credit Billing Act, you must send a billing error notice within 60 days of the statement that includes the charge.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Understand the investigation timeline&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Card issuers must acknowledge your dispute within 30 days and resolve it within two billing cycles, typically no more than 90 days.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Confirm the charge details before disputing&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Check the merchant name, date and amount, since some transactions may appear under payment processors or parent companies.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Replace or block the card if needed&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If the charge is unauthorized, the issuer can cancel the card and issue a replacement to stop further transactions.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Simply keeping an eye on your accounts may not be enough&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Even if you check your statements regularly, small charges can still slip through and delay detection.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Timing can work against you&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A lot hinges on when you check your account. If you review transactions infrequently or rely on monthly statements, unauthorized charges may only surface after they've already posted. By then, multiple transactions can appear across different dates or merchant names, making them harder to spot.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;Alerts don't always catch small charges&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Notifications are not always consistent across accounts. Some banks alert you only after a transaction is completed, while others set thresholds that don't flag low-dollar amounts. That can allow small charges to slip through without notice. If the same payment details are used elsewhere, activity may not appear in one place.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Ways to protect yourself from ghost tapping&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;These simple steps can help reduce your risk and catch suspicious charges before they turn into bigger fraud.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Turn on transaction alerts&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Set up real-time alerts for all charges, even small ones, so you can spot suspicious activity immediately.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Use mobile wallets when possible&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Apple Pay and Google Pay use tokenization, which means your real card number is not shared with merchants.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Keep your card secure in crowded places&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Contactless cards can be read at close range, so avoid leaving them exposed in busy environments.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Check your accounts more frequently&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Do not rely on monthly statements. Review transactions every few days to catch issues early.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How broader monitoring can help&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Even with these steps, some suspicious activity may not show up in one place or right away. That's where broader monitoring comes in. &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;Identity and credit monitoring services&lt;/a&gt; are designed to track changes tied to your financial and personal information as they happen. This can include transaction monitoring along with three-bureau credit monitoring, so activity linked to your identity can be seen across accounts and credit files at the same time. That includes new inquiries, account openings and changes that would not appear in any one banking app.&lt;/p&gt;&lt;p&gt;Some services also scan known data breach records and dark web marketplaces for exposed personal information. If your data appears in those sources, you can receive an alert tied to the specific identifier that was found.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/debit-card-fraud-without-using-your-card" target="_blank" rel="noopener"&gt;&lt;strong&gt;HOW DEBIT CARD FRAUD CAN HAPPEN WITHOUT USING THE CARD&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;If suspicious activity is detected, many platforms offer tools to take action quickly. This may include locking your credit file and working with a U.S.-based fraud resolution team to contact card issuers, dispute charges and close affected accounts.&lt;/p&gt;&lt;p&gt;Some &lt;a href="https://www.foxnews.com/category/us/personal-freedoms/privacy" target="_blank" rel="noopener"&gt;identity protection services&lt;/a&gt; also include insurance coverage, often up to $1 million per adult, to help cover eligible losses and legal fees, along with 24/7 fraud resolution support to help restore your identity.&lt;/p&gt;&lt;p&gt;No service can prevent every kind of identity theft. If it happens, monitoring and guided support can make recovery easier to manage.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;How to check if your personal information was exposed&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you are unsure whether your personal information has already been exposed, take action now. Our No. 1 &lt;a href="https://www.foxnews.com/category/special/sponsored/experian" target="_blank" rel="noopener"&gt;identity theft protection&lt;/a&gt; pick includes a free identity breach scan, which allows you to see whether your data appears in known leaks. Early detection gives you more control and helps you respond before fraud spreads.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;See my tips and best picks on Best Identity Theft Protection at&lt;/strong&gt;&lt;i&gt;&lt;strong&gt; &lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;A small charge is easy to ignore, especially when it blends in with everyday purchases. But as these reports show, that's exactly what scammers are counting on. A few dollars can be the first sign that your payment details are active and vulnerable, giving attackers a way to test and expand access without raising alarms. &lt;/p&gt;&lt;p&gt;The sooner you catch it, the easier it is to stop. This is one of those situations where habits matter. Checking your transactions regularly, acting quickly on anything unfamiliar and adding an extra layer of monitoring can make a real difference. Fraud doesn't always start big, but it often starts small.&lt;/p&gt;&lt;p&gt;Have you ever spotted a small charge you almost ignored that turned out to be fraud, and how did you handle it? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report.&lt;/strong&gt; Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter. &lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.  &lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/11/931/523/credit-card-tap-photo-2.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">2a868cfb-1004-51ff-83c0-28d659ac1e3e</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sat, 28 Mar 2026 14:46:13 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/darksword-leak-puts-millions-iphone-users-risk</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/darksword-leak-puts-millions-iphone-users-risk</guid>
            <title>DarkSword leak puts millions of iPhone users at risk</title>
            <description>Leaked hacking tool makes it easier to target outdated iPhones</description>
            <content:encoded>&lt;p&gt;Last week, researchers warned about a sophisticated iPhone hacking tool called DarkSword. Now the situation has escalated. A newer version of that tool has been leaked online and posted to a public code-sharing site. That changes everything. What was once limited to advanced attackers is now far easier to access and use. Security experts say this could quickly turn into a widespread threat, especially for people using older&lt;a href="https://www.foxnews.com/category/tech/companies/apple"&gt; &lt;u&gt;Apple software.&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/dont-ignore-apples-urgent-security-update"&gt;&lt;strong&gt;&lt;u&gt;DON'T IGNORE APPLE'S URGENT SECURITY UPDATE&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why the DarkSword iPhone hack is more dangerous now&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Before the leak, tools like DarkSword required skill, resources and time. Now, much of that barrier is gone. The leaked version is surprisingly simple. It uses basic web technologies like HTML and JavaScript. That means someone with minimal experience could copy the code, host it and&lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime"&gt; &lt;u&gt;launch an attack&lt;/u&gt;&lt;/a&gt; in a short amount of time. Researchers say the exploits can work right away with little setup. No deep knowledge of iOS is required. That is the real shift here. The tool itself did not suddenly become more powerful. It became easier to use.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Which Apple devices are at risk&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is where the numbers get concerning.&lt;a href="https://www.foxnews.com/category/tech/technologies/iphone"&gt; &lt;u&gt;DarkSword targets iPhones&lt;/u&gt;&lt;/a&gt; and iPads running older operating systems, especially iOS 18 and earlier. According to Apple's own data, a large share of active devices still falls into that group. With billions of Apple devices in use worldwide, that could leave hundreds of millions of users exposed. Apple says these attacks specifically target outdated versions of iOS, often through malicious links or compromised websites. If your device is not updated, it could be vulnerable.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What the DarkSword iPhone hack can access&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is not a minor nuisance. The leaked code includes instructions for pulling sensitive data directly from a device. Once it gains access, it can:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Extract contacts and messages&lt;/li&gt;&lt;li&gt;Access call history&lt;/li&gt;&lt;li&gt;Pull data from the iOS keychain, including saved passwords&lt;/li&gt;&lt;li&gt;Send that information to a remote server&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;There are also references to activity that happens after the initial compromise, which suggests&lt;a href="https://www.foxnews.com/category/tech/topics/hackers"&gt; &lt;u&gt;attackers can dig deeper&lt;/u&gt;&lt;/a&gt; once they are inside. In simple terms, this is full access to your digital life.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Apple's response and what helps&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Apple has already addressed the issue for newer devices. The company pushed updates that block these attacks on current versions of iOS. It also released a security update for older devices that are unable to run the latest version of iOS. Apple says these attacks target out-of-date software and can be triggered through malicious links or compromised websites. If your iPhone is up to date, you are already protected. Apple also says keeping your software updated is the single most important step you can take to protect your device. Devices running the latest versions of iOS were not at risk from these attacks. For older devices, Apple released updates on March 11, 2026, to extend protections. Devices running iOS 13 or iOS 14 must update to iOS 15 to receive those protections. &lt;/p&gt;&lt;p&gt;We reached out to Apple for comment, and the company pointed us to its official security guidance at &lt;i&gt;&lt;strong&gt;&lt;u&gt;support.apple.com/en-us/126776&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; for more details.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/thousands-iphone-apps-expose-data-inside-apple-app-store"&gt;&lt;strong&gt;&lt;u&gt;THOUSANDS OF IPHONE APPS EXPOSE DATA INSIDE APPLE APP STORE&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What you should do right now&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If you have been putting off software updates, now is the time to stop. This situation shows how quickly a targeted threat can turn into a mass risk. Once tools like this are public, they spread fast. Even if you are not specifically being targeted, attackers can automatically scan for vulnerable iPhones and go after them in large numbers.&lt;/p&gt;&lt;p&gt;A quick check can make a big difference:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap&lt;strong&gt; General&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Software Update&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Install the &lt;strong&gt;latest version available&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;strong&gt;Ways to stay safe from DarkSword attacks&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If this sounds concerning, it should. The good news is that there are a few simple steps that can significantly&lt;a href="https://www.foxnews.com/category/tech/topics/security"&gt; &lt;u&gt;reduce your risk.&lt;/u&gt;&lt;/a&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Update your iPhone right away&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;As I mentioned above, this is the most important step. Apple has already patched the vulnerability in newer versions of iOS. If your device is updated, you are protected from this specific attack.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Turn on Lockdown Mode if you want extra protection&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/how-protect-your-apple-iphone-cyberattacks-lockdown-mode"&gt;&lt;u&gt;Lockdown Mode&lt;/u&gt;&lt;/a&gt; is designed for &lt;strong&gt;high-risk situations&lt;/strong&gt;, but anyone can use it. It limits certain features that attackers often rely on.&lt;/p&gt;&lt;p&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt; &gt; &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt; &gt; &lt;strong&gt;Lockdown Mode&lt;/strong&gt; to enable it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Keep in mind:&lt;/strong&gt; Lockdown Mode is an extreme security setting. It restricts some apps, websites and features, and certain functions may not work as expected while it is turned on.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Avoid clicking on unknown links or pop-ups&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many of these attacks rely on you to click on malicious links or open a compromised website. If you receive a strange link in a message or email, do not tap it. Also, use &lt;strong&gt;strong antivirus software &lt;/strong&gt;to help detect malicious links and block suspicious activity before it can compromise your device. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/your-phone-shares-data-night-heres-how-stop"&gt;&lt;strong&gt;&lt;u&gt;YOUR PHONE SHARES DATA AT NIGHT: HERE'S HOW TO STOP IT&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Keep apps and browsers up to date&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Even if your iOS is current, outdated apps can still create security gaps. Regular updates close those openings.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Reduce your exposure with a data removal service&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If your personal information is already circulating online, it can make you an easier target. Data removal services help delete your details from data broker sites, which reduces the amount of information attackers can access in the first place. Check out my &lt;strong&gt;top picks for data removal services &lt;/strong&gt;and get a &lt;strong&gt;free scan&lt;/strong&gt; to find out if your personal information is already out on the web by visiting&lt;i&gt;&lt;strong&gt;&lt;u&gt; Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Use strong device security habits&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Set a strong&lt;a href="https://www.foxnews.com/tech/how-to-update-passcode-on-iphone"&gt;&lt;u&gt; passcode&lt;/u&gt;&lt;/a&gt;, enable &lt;a href="https://www.foxnews.com/tech/how-securely-lock-your-iphone-ipad-from-prying-eyes"&gt;&lt;u&gt;Face ID or Touch ID&lt;/u&gt;&lt;/a&gt; and &lt;a href="https://www.foxnews.com/tech/how-to-update-passcode-on-iphone"&gt;&lt;u&gt;avoid using public Wi-Fi &lt;/u&gt;&lt;/a&gt;without protection. These steps add another layer of defense.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Consider using a security or identity monitoring service&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Some identity theft companies can alert you if your personal data is exposed or being used without your knowledge. That can help you act faster if something goes wrong. See my tips and best picks on &lt;strong&gt;Best Identity Theft Protection &lt;/strong&gt;at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;This is one of those moments where a simple step makes a real difference. Keeping your phone updated is easy to put off, but it is one of the most effective ways to stay protected. When tools like DarkSword become widely available, outdated devices stand out as easy targets. This is real, and it is happening now. So, update your iPhone today.&lt;/p&gt;&lt;p&gt;So here is the bigger question. If a basic update can block a serious attack, what is stopping people from doing it? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products"&gt;&lt;strong&gt;&lt;u&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/u&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter &lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;&lt;p&gt;&lt;br&gt; &lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/darksword-leak-iphone-hack-1.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">871d6529-b199-53ec-abfa-667ecc7312c9</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/apple</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/technologies/iphone</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 27 Mar 2026 10:01:57 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/5-simple-tech-tips-take-back-control-your-social-media</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/5-simple-tech-tips-take-back-control-your-social-media</guid>
            <title>5 simple tech tips to take back control of your social media</title>
            <description>Reduce tracking, limit data sharing and lock down your accounts in minutes</description>
            <content:encoded>&lt;p&gt;&lt;a href="https://www.foxbusiness.com/category/social-media" target="_blank" rel="noopener"&gt;Social media platforms&lt;/a&gt; collect more data than most people realize. They track what you click, who you interact with and even where you go. Over time, that information builds a detailed profile of your habits and behavior.&lt;/p&gt;&lt;p&gt;The good news is you can take back control. A few simple setting changes can limit tracking, reduce data sharing and improve your privacy across your favorite apps.&lt;/p&gt;&lt;p&gt;Many of these &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;privacy controls&lt;/a&gt; also exist inside each app, so it's important to check both your device settings and in-app options.&lt;/p&gt;&lt;p&gt;Here are five simple tech tips to help you regain control of your social media today.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/how-maintain-protect-online-privacy" target="_blank" rel="noopener"&gt;&lt;strong&gt;HOW TO MAINTAIN AND PROTECT YOUR ONLINE PRIVACY&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter    &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;1) Turn off personalized ad tracking&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Social media platforms use your activity to build &lt;a href="https://www.foxnews.com/category/special/20th-anniversary/advertisements" target="_blank" rel="noopener"&gt;advertising profiles.&lt;/a&gt; These profiles follow you across apps and websites to deliver targeted ads. Turning off ad tracking helps reduce how much data is used to profile you.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;iPhone:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap&lt;strong&gt; Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Tracking&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Turn off &lt;strong&gt;Allow Apps to Request to Track&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Android:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer&lt;/i&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Security &amp; privacy&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Scroll to &lt;strong&gt;More privacy setting&lt;/strong&gt;s&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Ads&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap&lt;strong&gt; Delete advertising ID.&lt;/strong&gt; Then, confirm your decision by tapping &lt;strong&gt;Delete advertising ID&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Reset advertising ID. &lt;/strong&gt;Then, confirm your decision by tapping &lt;strong&gt;Confirm&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This limits how social media apps track your behavior across other apps and services. &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;2) Limit access to contacts, photos and microphone&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Many social media apps request access to your contacts, camera, microphone and photos. In many cases, they collect more data than necessary. Reducing permissions helps limit what these platforms can gather about you.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;iPhone:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Contacts, Photos, Microphone or Camera&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select the &lt;strong&gt;social media app&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Choose &lt;strong&gt;None&lt;/strong&gt;, &lt;strong&gt;Limited Access&lt;/strong&gt; (Photos), or turn access &lt;strong&gt;off&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Important notes for accuracy:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Photos:&lt;/strong&gt; You will see options like &lt;strong&gt;None&lt;/strong&gt;, &lt;strong&gt;Limited Access&lt;/strong&gt; or &lt;strong&gt;Full Access&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Microphone/Camera:&lt;/strong&gt; Toggle access &lt;strong&gt;off&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Contacts:&lt;/strong&gt; Toggle access &lt;strong&gt;off&lt;/strong&gt; (no "None" label appears)&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Android:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your &lt;/i&gt;&lt;a href="https://www.foxnews.com/category/tech/technologies/android" target="_blank" rel="noopener"&gt;&lt;i&gt;Android phone’s&lt;/i&gt;&lt;/a&gt;&lt;i&gt; manufacturer&lt;/i&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Security &amp; privacy&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;More privacy settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Permission Manager&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select a permission (&lt;strong&gt;Contacts, Photos &amp; videos, Microphone, Camera&lt;/strong&gt;)&lt;/li&gt;&lt;li&gt;Choose the &lt;strong&gt;social media app&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Don't allow&lt;/strong&gt; or &lt;strong&gt;Allow only while using the app&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Limiting permissions reduces how much personal data social platforms can access and store.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/5-tech-terms-shape-your-online-privacy" target="_blank" rel="noopener"&gt;&lt;strong&gt;5 TECH TERMS THAT SHAPE YOUR ONLINE PRIVACY&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Turn off location tracking inside social apps&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Many social media platforms track your location to suggest content, ads and nearby connections. You can reduce this by limiting location access both on your device and inside the apps themselves.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;iPhone:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open&lt;strong&gt; Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Location Services&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select the&lt;strong&gt; app&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Choose &lt;strong&gt;Never&lt;/strong&gt; or &lt;strong&gt;While Using the App&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Android:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer&lt;/i&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open&lt;strong&gt; Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Location&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;App location permissions &lt;/strong&gt;or&lt;strong&gt; App permissions&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select the &lt;strong&gt;app&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Choose &lt;strong&gt;Don't allow&lt;/strong&gt; or &lt;strong&gt;Allow only while using&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;You should also check the app's internal settings and turn off location sharing or tagging.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Disable contact syncing&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Some social media apps upload your contact list to find friends and connections. This can expose your personal network without you realizing it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;iPhone:&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy &amp; Security&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap&lt;strong&gt; Contacts&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select the &lt;strong&gt;app&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;None &lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Android:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;S&lt;i&gt;ettings may vary depending on your Android phone’s manufacturer&lt;/i&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Security and privacy&lt;/strong&gt; (or &lt;strong&gt;Privacy&lt;/strong&gt;)&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;More privacy settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Permission manager&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Contacts&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Select the&lt;strong&gt; app&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Choose &lt;strong&gt;Don't allow&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Then check inside the app:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open the&lt;strong&gt; app&lt;/strong&gt; and go to &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Privacy&lt;/strong&gt;, &lt;strong&gt;Account&lt;/strong&gt; or &lt;strong&gt;Permissions&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Turn off &lt;strong&gt;Contact syncing&lt;/strong&gt; or &lt;strong&gt;Upload contacts&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Delete &lt;strong&gt;previously uploaded contacts&lt;/strong&gt; if the option is available&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This prevents the app from accessing your contacts and removes any data that may have already been uploaded.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;5) Review your privacy and security settings regularly&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Social media platforms update their features and policies often. That means your settings may change without you noticing. Take a few minutes every few months to review:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Account privacy settings&lt;/li&gt;&lt;li&gt;Ad preferences&lt;/li&gt;&lt;li&gt;Connected apps&lt;/li&gt;&lt;li&gt;Login activity&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;This helps ensure your account stays secure and your data stays protected over time.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fake-google-security-page-can-turn-your-browser-spying-tool" target="_blank" rel="noopener"&gt;&lt;strong&gt;FAKE GOOGLE SECURITY PAGE CAN TURN YOUR BROWSER INTO A SPYING TOOL&lt;/strong&gt;&lt;/a&gt;&lt;br&gt; &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Bonus: Turn off off-platform activity tracking&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Some social media platforms track your activity even when you are not using their apps. This is often called off-platform activity or off-app tracking. It allows companies to collect data from websites and apps you visit and connect it back to your profile. This type of tracking is most clearly available on &lt;a href="https://www.foxnews.com/category/tech/companies/facebook" target="_blank" rel="noopener"&gt;Meta platforms&lt;/a&gt; like Facebook and Instagram, where it can be turned off inside your account settings.&lt;/p&gt;&lt;p&gt;To turn it off on Facebook &lt;a href="https://www.foxnews.com/category/tech/companies/instagram" target="_blank" rel="noopener"&gt;or Instagram:&lt;/a&gt;&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Open the app and go to &lt;strong&gt;Settings&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Accounts Center&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Your information and permissions&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Your activity off Meta technologies&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Clear previous activity&lt;/strong&gt; (optional)&lt;/li&gt;&lt;li&gt;Tap &lt;strong&gt;Manage future activity → Disconnect future activity&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Other platforms may offer similar controls under names like &lt;strong&gt;Data sharing&lt;/strong&gt;, &lt;strong&gt;Ad preferences&lt;/strong&gt; or &lt;strong&gt;Partner activity&lt;/strong&gt;, though the steps vary. Disabling these settings reduces how much data platforms collect about your behavior outside their apps.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Pro tip: Add a safety layer for malicious links and scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Even if you lock down your privacy settings, social media platforms are still filled with malicious links, fake ads and scam messages designed to trick you into clicking. These attacks often bypass built-in protections and rely on human behavior. Using &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;strong antivirus software&lt;/a&gt; or an antivirus app on your phone adds an extra layer of protection by detecting harmful links, blocking phishing attempts and warning you before you interact with suspicious content. This is especially important if you ever accidentally tap on a link in a message, comment or ad. One wrong click can expose your personal information or lead to account compromise. &lt;strong&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What this means to you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Social media platforms are built to collect and analyze your behavior, often in ways that are not obvious. The longer you use them, the more detailed that profile becomes. Taking a few minutes to adjust your settings can significantly reduce how much of your personal information is tracked, stored and shared.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Take my quiz: How safe is your online security?&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;       &lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You do not need to quit social media to protect your privacy. You just need to be more intentional about how these apps access your data. Most people never check these settings, which is exactly why they matter. Taking a few minutes today to review your permissions and tracking options can help you stay in control instead of letting algorithms control you.&lt;/p&gt;&lt;p&gt;Have you ever checked how much data your social media apps are collecting about you, or would it surprise you? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;br&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide - free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter &lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/social-media-privacy-tech-tips-2.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">0257df5e-f3c9-53ff-b574-cd15a22c5756</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/privacy</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/facebook</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/instagram</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 27 Mar 2026 08:07:17 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/politics/stefanik-grills-university-michigan-leader-lack-audit-after-string-chinese-national-arrests</link>
            <guid isPermaLink="true">https://www.foxnews.com/politics/stefanik-grills-university-michigan-leader-lack-audit-after-string-chinese-national-arrests</guid>
            <title>Stefanik grills University of Michigan leader on lack of audit after string of Chinese national arrests</title>
            <description>Interim University of Michigan president Domenico Grasso concedes no review was done</description>
            <content:encoded>&lt;p&gt;Rep. Elise Stefanik, R-N.Y., continued her relentless cross examinations of college administrators Thursday – this time pressing &lt;a href="https://www.foxnews.com/category/us/us-regions/midwest/michigan" target="_blank" rel="noopener"&gt;Michigan's interim president&lt;/a&gt; Domenico Grasso on Chinese student spies at the university.&lt;/p&gt;&lt;p&gt;Stefanik wanted to know why Chinese nationals in Michigan were accused of spying on America and his university is not auditing potential national security vulnerabilities in research there.&lt;/p&gt;&lt;p&gt;"Last year, facing congressional pressure, Michigan ended its partnership with Shanghai Jiao Tong University after five Chinese students were caught spying at night and taking illegal photos of U.S. military drills and equipment on the remote &lt;a href="https://www.foxnews.com/us/chinese-university-michigan-students-charged-after-allegedly-spying-military-base" target="_blank" rel="noopener"&gt;Michigan installation Camp Grayling,&lt;/a&gt;" Stefanik said. "These students lied and misled U.S. law enforcement about their motives and later conspired on the CCP-controlled messaging app WeChat to clear their phones and cameras of photos and evidence."&lt;/p&gt;&lt;p&gt;"Has the university conducted a full audit to determine what intellectual property or federally funded research was compromised?" the congresswoman asked.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/us/chinese-university-michigan-students-charged-after-allegedly-spying-military-base" target="_blank" rel="noopener"&gt;&lt;strong&gt;CHINESE UNIVERSITY OF MICHIGAN STUDENTS CHARGED AFTER ALLEGEDLY SPYING ON MILITARY BASE&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Without an audit, Grasso responded, "we are unaware of any research that was compromised by these individual students," noting the alleged spying occurred "miles and miles away from campus."&lt;/p&gt;&lt;p&gt;But Stefanik was nonplussed by the answer.&lt;/p&gt;&lt;p&gt;"I understand Camp Grayling is off campus, but was there an audit conducted?"&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/politics/trump-doubles-down-plan-600000-chinese-student-visas-despite-maga-backlash" target="_blank" rel="noopener"&gt;&lt;strong&gt;TRUMP DOUBLES DOWN ON PLAN FOR 600,000 CHINESE STUDENT VISAS DESPITE MAGA BACKLASH&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Grasso admitted Michigan did not.&lt;/p&gt;&lt;p&gt;"Well, they were not researchers," he said, doubting "they did something nefarious." "They were undergraduate students. So, we did not do an audit."&lt;/p&gt;&lt;p&gt;And, adding, "they did not have any access to any of our research."&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/politics/foreign-backed-influence-schools-exposed-under-gop-trace-act-giving-parents-access-curriculum" target="_blank" rel="noopener"&gt;&lt;strong&gt;FOREIGN-BACKED INFLUENCE IN SCHOOLS TO BE EXPOSED UNDER GOP ‘TRACE ACT’ GIVING PARENTS ACCESS TO CURRICULUM&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;But Stefanik noted they &lt;a href="https://www.foxnews.com/category/politics/executive/national-security" target="_blank" rel="noopener"&gt;were accused of spying&lt;/a&gt;.&lt;/p&gt;&lt;p&gt;"Well, they did do something nefarious off campus," she said. "I think it would be important for the university to ensure that there is a full audit conducted to make sure that no research, that they didn't take any &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;nefarious acts&lt;/a&gt; there."&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Grasso admitted he does "not know what all of our researchers are involved in," but doubted the &lt;a href="https://www.foxnews.com/category/politics/defense" target="_blank" rel="noopener"&gt;Department of War&lt;/a&gt; would clear them for access to U.S. secrets on campus.&lt;/p&gt;&lt;p&gt;"Congresswoman, we have improved, and we're continuing to improve our &lt;a href="https://www.foxnews.com/category/us/immigration" target="_blank" rel="noopener"&gt;background checks for all of our&lt;/a&gt; researchers and students that come into the country, but we also have to partner more closely with our federal intelligence community to make sure that these students are vetted before they're allowed to get visas to enter our country as well," he concluded.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/elise-stefanik-domenico-grasso-split.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">b3fc9bf0-24a3-51cc-9187-1b92dc8456c8</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/politics/executive/national-security</category>
            <category domain="foxnews.com/taxonomy">fox-news/world/world-regions/china</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/politics/house-of-representatives</category>
            <category domain="foxnews.com/section-path">politics</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Thu, 26 Mar 2026 15:24:04 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/youtube-job-scam-text-how-spot-fast</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/youtube-job-scam-text-how-spot-fast</guid>
            <title>YouTube job scam text: How to spot it fast</title>
            <description>A suspicious text promises easy money for boosting YouTube views. Here is why it is a classic scam and what to do next</description>
            <content:encoded>&lt;p&gt;Most of us have received a random text that makes us pause for a second. Maybe it promises a prize. Maybe it claims to be from a delivery company. Lately, another type of message is spreading quickly: the remote job scam.&lt;/p&gt;&lt;p&gt;That is exactly what happened to Peter from New York. He wrote in after receiving a suspicious message about a high-paying YouTube job.&lt;/p&gt;&lt;p&gt;Here is what he sent:&lt;/p&gt;&lt;p&gt;"I received this text today, and I think it's a scam. How can I tell for sure, and what do I do next?"&lt;/p&gt;&lt;p&gt;Below is the message Peter received. At first glance, it looks like a &lt;a href="https://www.foxnews.com/category/us/economy/jobs" target="_blank" rel="noopener"&gt;job opportunity&lt;/a&gt;. However, when you break it down line by line, several warning signs appear. Let's walk through them.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;i&gt;&lt;strong&gt;CYBERGUY.COM&lt;/strong&gt;&lt;/i&gt; newsletter.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fake-google-security-page-can-turn-your-browser-spying-tool" target="_blank" rel="noopener"&gt;&lt;strong&gt;FAKE GOOGLE SECURITY PAGE CAN TURN YOUR BROWSER INTO A SPYING TOOL&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Red flag 1: A random job offer from a stranger&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The text comes from an unknown international phone number starting with &lt;strong&gt;+63&lt;/strong&gt;, which is the country code for the Philippines. Legitimate companies rarely recruit through random text messages from unknown numbers. Real employers usually contact candidates through job platforms, email or professional networks like LinkedIn. When a job appears out of nowhere and promises high pay, it should immediately raise suspicion.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Red flag 2: The pay is wildly unrealistic&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The message claims:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;$200 to $600 per day&lt;/li&gt;&lt;li&gt;$10,000 or more per month&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Those numbers are a major warning sign. Entry-level remote work, such as "boosting video views" or "YouTube optimization," does not pay anywhere near that range. Scammers often use unusually high pay to trigger excitement and urgency. When money sounds too good to be true, it usually is.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Red flag 3: No experience required but huge income&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The text says "no experience required, free paid training provided." Scammers often combine high income with zero qualifications. That combination is designed to attract as many people as possible.&lt;/p&gt;&lt;p&gt;Real digital marketing jobs usually require:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;SEO or marketing experience&lt;/li&gt;&lt;li&gt;Analytics knowledge&lt;/li&gt;&lt;li&gt;Platform expertise&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;A company offering $10K per month with no requirements is not realistic.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/aware-extortion-scam-emails-claiming-your-data-stolen" target="_blank" rel="noopener"&gt;&lt;strong&gt;BE AWARE OF EXTORTION SCAM EMAILS CLAIMING YOUR DATA IS STOLEN&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Red flag 4: The job description is vague&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The text claims the job is to "increase video exposure and view count."&lt;/p&gt;&lt;p&gt;That description is extremely vague. It does not explain:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;What tools you would use&lt;/li&gt;&lt;li&gt;What company you would work for&lt;/li&gt;&lt;li&gt;How the work is measured&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Scam job offers often stay vague so they can adapt the story later.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Red flag 5: Pressure to respond immediately&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The message says: "5 urgent openings available, first come first served."&lt;i&gt; &lt;/i&gt;This is a classic scam tactic. Urgency pushes people to respond quickly before they have time to research the offer. Real companies rarely hire qualified candidates on a first-come basis through text messages.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Red flag 6: The strange reply instructions&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The message tells recipients to reply "OK" and then send a numeric code. This step is often used to move the conversation to another messaging platform, such as Telegram or WhatsApp, where scammers continue the scheme. Once the conversation moves there, victims may be asked to:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Complete fake tasks&lt;/li&gt;&lt;li&gt;Send cryptocurrency&lt;/li&gt;&lt;li&gt;Pay deposits for "training"&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;These scams are often called &lt;a href="https://www.foxnews.com/tech/teen-hackers-recruited-through-fake-job-ads" target="_blank" rel="noopener"&gt;task scams,&lt;/a&gt; where victims complete simple online tasks and may even receive small payments at first before scammers demand larger deposits for payouts that never come. They have exploded worldwide over the past few years.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Red flag 7: No company information&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The message never names a real company. It mentions a "manager" named Goldie but provides:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;No company website&lt;/li&gt;&lt;li&gt;No corporate email&lt;/li&gt;&lt;li&gt;No office address&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Legitimate employers want applicants to know who they are. Scammers avoid details that can be verified.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How these YouTube job scams usually work&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Many of these scams follow the same pattern. First, scammers promise easy money for simple tasks lsuch as liking videos or boosting views. At the beginning, they may even send a small payment to build trust. Then things change. Victims are asked to deposit money to unlock larger payouts or complete "premium tasks." Once payments are sent, the scammers disappear. The Federal Trade Commission says Americans lost hundreds of millions of dollars to job scams in recent years, and &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;text message recruitment scams&lt;/a&gt; are rising fast.&lt;/p&gt;&lt;p&gt; &lt;strong&gt;Google warns about growing job scams and how to verify recruiters&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;We reached out to Google, and a spokesperson provided the following statement to CyberGuy:&lt;/p&gt;&lt;p&gt;"Google is aware of these job scams happening across the industry and believes they're growing around the world. We strongly encourage any candidate, or individual receiving them, to exercise caution and report it to the platform you received it on as a phishing attempt and/or spam. Our recruiting team focuses on contacting candidates in official capacities and are very clear about who we are, why we're reaching out, and do so from legitimate emails or profiles on job sites. Jobseekers should verify anyone contacting them by email addresses, looking up the person online, such as on LinkedIn, and if something does seem suspicious, flag it to the outlet where it was received. Folks can also vet and report these scams to Google at &lt;strong&gt;support.google.com&lt;/strong&gt;. Our &lt;a href="https://www.foxnews.com/category/tech/companies/google" target="_blank" rel="noopener"&gt;Google careers page&lt;/a&gt; reflects all of our current job postings, so candidates should check offers against those. Generally speaking, Google also continues to offer a range of tools and insights that help people automatically spot and avoid scams like these whether they receive them via email, search results, text messages, etc."&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/fake-google-gemini-ai-pushes-google-coin-crypto-scam" target="_blank" rel="noopener"&gt;&lt;strong&gt;FAKE GOOGLE GEMINI AI PUSHES ‘GOOGLE COIN’ CRYPTO SCAM&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Ways to stay safe from job text scams&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If you receive a message like Peter's, here are some smart steps to take.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Never respond to unknown job texts&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Replying confirms your number is active. That can lead to more scam messages.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Do not click links or download attachments&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scam texts sometimes include links that lead to &lt;a href="https://www.foxnews.com/tech/dont-click-that-link-how-to-spot-prevent-phishing-attacks-in-your-inbox" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt;phishing pages&lt;/u&gt;&lt;/a&gt; designed to steal login credentials or financial information. Install strong antivirus software on your devices, which can help detect malicious links, block dangerous websites and warn you before you open something risky. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Reduce how easily scammers can find your information&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Scammers often harvest phone numbers and personal details from data broker sites and public profiles. Using a data removal service to remove your information from these sites can make it harder for criminals to target you with job scams and other fraud. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Research the company independently&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Search for the company name online. Look for an official website, verified social media or job listings.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Avoid jobs that ask for money&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Legitimate employers never require deposits for training, equipment or task access.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;6) Block and report the number&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;You can report scam texts directly from your phone.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On iPhone:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Open the &lt;strong&gt;message&lt;/strong&gt;, tap the &lt;strong&gt;phone number at the top of the screen&lt;/strong&gt;, scroll down and select &lt;strong&gt;Block Contact&lt;/strong&gt;. You can also tap &lt;strong&gt;Report Spam&lt;/strong&gt; under the message. If the option appears, then click &lt;strong&gt;Delete and Report Spam,&lt;/strong&gt; which sends the report to Apple and deletes the message.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;On Samsung Galaxy phones:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;Steps may vary slightly depending on your Samsung model and software version.&lt;/i&gt;&lt;/p&gt;&lt;p&gt;Open the &lt;strong&gt;Messages app&lt;/strong&gt; and select the &lt;strong&gt;conversation&lt;/strong&gt;. Tap the &lt;strong&gt;three-dot menu&lt;/strong&gt; in the upper right corner, then tap &lt;strong&gt;Block and report spam&lt;/strong&gt;, then &lt;strong&gt;confirm &lt;/strong&gt;by tapping &lt;strong&gt;Yes.&lt;/strong&gt; This blocks the number and helps Samsung identify and filter future scam messages.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Report it to the FTC&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;In the United States, you can report scams at reportfraud.ftc.gov. Reports help investigators track large scam networks.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;So what should Peter do next?&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The safest move is simple. Peter should not reply to the message. Instead, he should block the number and report it as spam. If he has already responded, he should stop communicating immediately and avoid clicking any links or sending money. If he shared personal information such as his phone number, email address or financial details, it may also be wise to monitor his accounts closely and consider signing up for an identity theft protection service. The good news is that spotting the red flags early can prevent a much bigger problem later. See my tips and best picks on Best Identity Theft Protection at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways &lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers constantly adapt their tactics. Today, it might be a fake delivery notice. Tomorrow, it might be a high-paying remote job. The message Peter received hits many of the classic warning signs: unrealistic pay, vague job duties, urgent language and a request to reply quickly. When a stranger promises easy money through a random text message, pause for a moment. That short pause can save you a lot of trouble.&lt;/p&gt;&lt;p&gt;Now I am curious. If a text suddenly promised you $10,000 a month for simple online tasks, would you recognize the warning signs before replying? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt; &lt;/p&gt;&lt;p&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;i&gt;&lt;strong&gt;CYBERGUY.COM&lt;/strong&gt;&lt;/i&gt; newsletter. &lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/02/931/523/youtube-homepage.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">d44e36f3-e765-5b81-9f8d-3f8ceada1983</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sun, 22 Mar 2026 14:25:37 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/fake-google-security-page-can-turn-your-browser-spying-tool</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/fake-google-security-page-can-turn-your-browser-spying-tool</guid>
            <title>Fake Google security page can turn your browser into a spying tool</title>
            <description>It steals your credentials and crypto</description>
            <content:encoded>&lt;p&gt;A new phishing scam is tricking people into installing malware by pretending to be a &lt;a href="https://www.foxnews.com/category/tech/companies/google" target="_blank" rel="noopener"&gt;Google security check&lt;/a&gt;. The page looks convincing and tells you that your Google account needs additional protection. It walks you through a simple setup process that appears to strengthen your security and protect your devices.&lt;/p&gt;&lt;p&gt;If you follow those steps, you may end up installing what looks like a harmless security tool. In reality, security researchers say the page installs a &lt;a href="https://www.foxnews.com/category/tech/technologies/apps" target="_blank" rel="noopener"&gt;malicious web app&lt;/a&gt; that can spy on your device. It can steal login verification codes, watch what you copy and paste, track your location and quietly send internet traffic through your browser. &lt;/p&gt;&lt;p&gt;The most troubling part is that nothing is technically hacked. Instead of exploiting a software flaw, attackers simply trick you into granting the permissions they need. Once that happens, your own browser can start working for them without you realizing it.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report. &lt;/strong&gt;Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/1-google-search-scam-everyone-falls" target="_blank" rel="noopener"&gt;&lt;strong&gt;THE NO. 1 GOOGLE SEARCH SCAM EVERYONE FALLS FOR&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;All about the fake Google security page&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Security researchers at Malwarebytes, a cybersecurity company, recently discovered a phishing website that pretends to be part of Google's account protection system. The site uses the domain google-prism[.]com and presents what looks like a legitimate security page asking you to complete a short verification process. &lt;/p&gt;&lt;p&gt;Visitors are told they should complete a four-step setup to improve their account protection. The page explains that these steps will help &lt;a href="https://www.foxnews.com/tech/fake-google-gemini-ai-pushes-google-coin-crypto-scam" target="_blank" rel="noopener"&gt;secure your Google account&lt;/a&gt; and protect your devices from threats. During the process, the site asks you to approve several permissions and install what it claims is a security tool.&lt;/p&gt;&lt;p&gt;The tool it installs is actually a Progressive Web App. This type of application runs through your browser but behaves like a regular app on your computer. It opens in its own window, can send notifications and can run tasks in the background. &lt;/p&gt;&lt;p&gt;Once installed, the malicious web app can collect contacts, read information you copy to your clipboard, track GPS location data and attempt to capture one-time login codes sent to your phone. These codes are commonly used when you sign in to accounts that use two-factor authentication.&lt;/p&gt;&lt;p&gt;The fake security page may also offer an Android companion app described as a "critical security update." Researchers found that this app requests 33 permissions, including access to text messages, call logs, contacts, microphone recordings and accessibility features. &lt;/p&gt;&lt;p&gt;Those permissions give attackers the ability to read messages, capture keystrokes, monitor notifications and maintain control over parts of the device. Even if the Android app is never installed, the web app alone can still collect sensitive information and quietly run activity through your browser.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How it works and why it matters to you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;The scam works because it looks like something you would normally trust. Many people expect security alerts from the services they use, especially when it comes to protecting email or cloud accounts. Attackers take advantage of that trust by presenting the fake page as a helpful security feature. When you approve the permissions and install the web app, you are essentially giving the attackers access to certain parts of your device. One of the main things they try to capture is one-time passwords. These are the short codes you receive when logging in to accounts that require two-factor authentication.&lt;/p&gt;&lt;p&gt;If attackers manage to capture those codes while also knowing your password, they may be able to break into your accounts. That could include your email, financial services or cryptocurrency wallets, depending on which accounts you use. The malware also watches what you copy and paste. Many people copy cryptocurrency wallet addresses before sending digital currency, and those addresses can be valuable to criminals. The malicious app can collect that information and send it back to the attackers.&lt;/p&gt;&lt;p&gt;Another feature allows attackers to route internet requests through your browser. This means they can run online activity through your device so it appears to come from your home network. The app can also send notifications that look like security alerts or system warnings. When you click those notifications, the app opens again and gains another opportunity to capture information such as login codes or clipboard data.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Google says built-in protections can block the threat&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;After learning about the phishing campaign, we asked Google about the malicious site and whether users are protected.&lt;/p&gt;&lt;p&gt;A Google spokesperson told CyberGuy that several &lt;a href="https://www.foxnews.com/category/columns/bias-alert" target="_blank" rel="noopener"&gt;built-in security systems&lt;/a&gt; are designed to stop threats like this before they cause harm.&lt;/p&gt;&lt;p&gt;"We can confirm that Safe Browsing in Chrome warns any user who tries to visit this site. Chrome also shows a confirmation dialog whenever anyone attempts to download an APK. Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on &lt;a href="https://www.foxnews.com/category/tech/technologies/android" target="_blank" rel="noopener"&gt;Android devices&lt;/a&gt; with Google Play Services."&lt;/p&gt;&lt;p&gt;Google also said that its current monitoring shows no apps containing this malware are available on the Google Play Store.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/android-malware-hidden-fake-antivirus-app" target="_blank" rel="noopener"&gt;&lt;strong&gt;ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;Even if malicious apps are installed from outside official stores, Google says Android devices still have an additional layer of protection. Google Play Protect can warn users or block apps known to exhibit malicious behavior, including apps installed from third-party sources.&lt;/p&gt;&lt;p&gt;However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices, which is why we recommend additional strong antivirus software to detect malicious downloads, suspicious browser activity and phishing attempts before they cause serious damage. It acts as an early warning system that helps block dangerous apps and websites before they gain access to your device or your data.&lt;/p&gt;&lt;p&gt;Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;7 ways to protect yourself from fake security pages&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If you ever come across a suspicious "security check" like this, a few simple habits can help you avoid falling into the trap and protect your accounts and devices.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;1) Never run security checks from random websites&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Google does not ask you to install security tools through pop-ups or unfamiliar websites. If a page claims your account needs a security check, close the tab and go directly to Google's official account page by typing the address yourself. Visiting the real account settings page prevents attackers from redirecting you to a fake site.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;2) Check website addresses carefully before trusting them&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Phishing pages often use domains that look similar to real companies. Attackers rely on people clicking quickly without paying attention to the address bar. If the website address is not an official Google domain, do not trust it. Even a small change in the spelling can indicate a fake site designed to steal information.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;3) Remove suspicious web apps from your browser&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you installed an app through a website and it opens like a standalone program, check your &lt;a href="https://www.foxnews.com/category/tech/technologies/browsers" target="_blank" rel="noopener"&gt;browser's installed apps or extensions&lt;/a&gt; list. Remove anything you do not recognize or do not remember installing. Uninstalling the app immediately prevents it from collecting more information or running commands through your browser.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;4) Check your Android phone for unfamiliar apps&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Researchers say the malicious Android app may appear as "Security Check" or "System Service." If you see unfamiliar apps with these names, review the permissions they request and remove them if they look suspicious. Apps asking for extensive permissions such as SMS access, accessibility features and microphone control should always be investigated.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;5) Use a password manager for your accounts&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;A &lt;a href="https://www.foxnews.com/tech/new-email-scam-uses-hidden-characters-slip-past-filters" target="_blank" rel="noopener"&gt;password manager helps you&lt;/a&gt; create and store strong, unique passwords for every account you use online. If attackers obtain one password, they will not automatically gain access to other accounts. Password managers can also help prevent you from entering credentials on fake sites because they usually refuse to auto-fill on lookalike domains.&lt;/p&gt;&lt;p&gt;Check out the best expert-reviewed password managers of 2026 at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;6) Enable two-factor authentication whenever possible&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;Two-factor authentication (2FA) adds an extra layer of protection beyond your password. Even though this attack tries to capture SMS verification codes, many services allow you to use authenticator apps instead. These apps generate login codes on your device and make it much harder for attackers to intercept them.&lt;/p&gt;&lt;h3&gt;&lt;strong&gt;7) Monitor your accounts for unusual activity&lt;/strong&gt;&lt;/h3&gt;&lt;p&gt;If you think you interacted with a suspicious security page, keep a close eye on your accounts over the following days. Watch for login alerts, password reset emails or transactions you do not recognize. Acting quickly after suspicious activity can help prevent attackers from gaining full control of your accounts.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Pro tip: Reduce how easily scammers can target you&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Scammers often gather personal details from data broker sites to make phishing messages look more convincing. A &lt;a href="https://www.foxnews.com/category/tech/topics/privacy" target="_blank" rel="noopener"&gt;data removal service&lt;/a&gt; can help remove your personal information from many of those databases, reducing the amount of information criminals can use to impersonate companies or craft targeted scams. &lt;/p&gt;&lt;p&gt;Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Get a free scan to find out if your personal information is already out on the web: &lt;/strong&gt;&lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com.&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaway&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Attackers are changing tactics. Instead of breaking into systems through technical flaws, they are relying on convincing security messages that persuade people to install tools themselves. All of us rely on familiar brands like Google when making security decisions, and attackers know that. Preventing these scams will likely require faster action against impersonation sites and stronger safeguards around what web apps are allowed to do once installed.&lt;/p&gt;&lt;p&gt;Should companies like Google be required to automatically block lookalike domains that pretend to run official security checks before people fall for them? Let us know by writing to us at &lt;i&gt;&lt;strong&gt;&lt;u&gt;Cyberguy.com&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report.&lt;/strong&gt; Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;i&gt;&lt;strong&gt;&lt;u&gt;CYBERGUY.COM&lt;/u&gt;&lt;/strong&gt;&lt;/i&gt; newsletter. &lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com.  All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2020/11/931/523/google.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">00745421-a07d-56e5-bcc1-b0cc8752210e</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/companies/google</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Sat, 21 Mar 2026 10:24:16 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/politics/fbi-warns-russian-hackers-targeting-americans-signal-thousands-accounts-compromised</link>
            <guid isPermaLink="true">https://www.foxnews.com/politics/fbi-warns-russian-hackers-targeting-americans-signal-thousands-accounts-compromised</guid>
            <title>FBI warns Russian hackers targeting Americans on Signal; thousands of accounts compromised</title>
            <description>FBI Director Kash Patel says targets include US officials, military personnel and journalists whose accounts have been taken over</description>
            <content:encoded>&lt;p&gt;Russian intelligence-linked hackers are targeting users of popular messaging apps like Signal, gaining access to private messages and impersonating victims in a sweeping global campaign, according to a joint warning from the FBI and U.S. cybersecurity officials.&lt;/p&gt;&lt;p&gt;The FBI and the Cybersecurity and Infrastructure Security Agency said the operation has already compromised "thousands of individual" commercial messaging app (CMA) accounts, allowing attackers to read messages, access contact lists and send messages posing as the victim.&lt;/p&gt;&lt;p&gt;FBI Director &lt;a href="https://www.foxnews.com/category/person/kash-patel" target="_blank" rel="noopener"&gt;Kash Patel&lt;/a&gt; warned the campaign is targeting individuals of "high intelligence value," including U.S. officials, military personnel and journalists, and has already resulted in widespread account compromises.&lt;/p&gt;&lt;p&gt;Patel warned the attackers could exploit compromised accounts to impersonate victims and target others using a trusted identity.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/millions-ai-chat-messages-exposed-app-data-leak" target="_blank" rel="noopener"&gt;&lt;strong&gt;MILLIONS OF AI CHAT MESSAGES EXPOSED IN APP DATA LEAK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;"This global campaign has resulted in &lt;a href="https://www.foxnews.com/category/tech/topics/hackers" target="_blank" rel="noopener"&gt;unauthorized access&lt;/a&gt; to thousands of individual CMA accounts," the agencies said in a joint public service announcement.&lt;/p&gt;&lt;p&gt;"&lt;a href="https://www.ic3.gov/PSA/2026/PSA260320" target="_blank" rel="nofollow noopener"&gt;After compromising an account&lt;/a&gt;, malicious actors can view the victims’ messages and contact lists, send messages, and conduct additional phishing against other CMA accounts."&lt;/p&gt;&lt;p&gt;Officials said the activity is linked to actors associated with Russian intelligence services.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/malicious-browser-extensions-hit-4-3m-users" target="_blank" rel="noopener"&gt;&lt;strong&gt;MALICIOUS BROWSER EXTENSIONS HIT 4.3M USERS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;"RIS actors have compromised individual CMA accounts, but not CMAs’ encryption or the applications themselves," the FBI and CISA said.&lt;/p&gt;&lt;p&gt;The agencies emphasized the activity does not involve breaking Signal’s encryption. Instead, it relies on tricking users through phishing schemes.&lt;/p&gt;&lt;p&gt;"Phishing remains one of the most unsophisticated, yet effective means of cyber compromise, often rendering other protections irrelevant, including end-to-end encryption," the agencies said.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/spotify-voting-scam-exposed" target="_blank" rel="noopener"&gt;&lt;strong&gt;SPOTIFY VOTING SCAM EXPOSED&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;According to officials, the hackers often pose as messaging app support or send &lt;a href="https://www.foxnews.com/category/tech/topics/security" target="_blank" rel="noopener"&gt;fake security alerts&lt;/a&gt; designed to create urgency, prompting users to click malicious links or share verification codes or PINs.&lt;/p&gt;&lt;p&gt;If a user complies, attackers can link their own device to the account or take it over entirely, allowing them to monitor private conversations and impersonate the victim.&lt;/p&gt;&lt;p&gt;Patel cautioned that the scheme allows cybercriminals to "conduct additional phishing."&lt;/p&gt;&lt;p&gt;"After gaining access, the actors can view messages and contact lists, send messages as the victim and conduct additional phishing from a trusted identity," Patel said. &lt;/p&gt;&lt;p&gt;The PSA said users who believe they may have been targeted should report incidents to the FBI’s Internet Crime Complaint Center.&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;The link to "cyber actors" associated with Russian Intelligence was not made more specific in the agencies' joint PSA.&lt;/p&gt;&lt;p&gt;Signal did not immediately respond to Fox News Digital's request for comment. The FBI did not provide further comment to Fox News Digital.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/kash-patel-senate-hearing.jpg?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/jpg"/>
            <category domain="foxnews.com/metadata/dc.identifier">4034b1e4-7538-53e1-8571-8ef05d3dfa25</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/fbi</category>
            <category domain="foxnews.com/taxonomy">fox-news/world/world-regions/russia</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/taxonomy">fox-news/person/kash-patel</category>
            <category domain="foxnews.com/section-path">politics</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 20 Mar 2026 17:26:54 -0400</pubDate>
        </item>
        <item>
            <link>https://www.foxnews.com/tech/hospital-cyberattacks-threaten-patient-safety</link>
            <guid isPermaLink="true">https://www.foxnews.com/tech/hospital-cyberattacks-threaten-patient-safety</guid>
            <title>Hospital cyberattacks threaten patient safety</title>
            <description>How AI impersonation and ransomware are disrupting care and what patients can do to protect their medical identity</description>
            <content:encoded>&lt;p&gt;If you watched a recent episode of "The Pitt" on Max, a streaming medical drama about life inside a high-pressure emergency department, you saw how quickly a hospital can spiral during a cyberattack. It made for gripping television. But in Mississippi, it was not a script. It was real life.&lt;/p&gt;&lt;p&gt;After a &lt;a href="https://www.foxnews.com/tech/covenant-health-data-breach-affects-nearly-500000-patients" target="_blank" rel="noopener"&gt;ransomware attack&lt;/a&gt; hit the University of Mississippi Medical Center, clinics across the state closed. Elective procedures were canceled. Phone systems and emails went down. Emergency care continued, but access to electronic medical records was disrupted.&lt;/p&gt;&lt;p&gt;When a hospital's systems fail, the impact goes far beyond IT. It affects real people waiting for care. That is why hospital cyberattacks are no longer just a tech problem. They are a public safety issue.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;CYBERGUY.COM&lt;/strong&gt; newsletter.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/figure-data-breach-exposes-nearly-1-million-accounts" target="_blank" rel="noopener"&gt;&lt;strong&gt;FIGURE DATA BREACH EXPOSES NEARLY 1M ACCOUNTS&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why hospitals have become prime targets&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Hospitals cannot afford downtime. When systems fail, patient care is immediately affected, and the pressure to restore operations is intense. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification and biometric authentication company, explains the reality.&lt;/p&gt;&lt;p&gt;"Hospitals are in a uniquely difficult position. If systems go down, patient care is immediately affected. That creates real pressure to restore operations fast, which is why ransomware groups often target healthcare." He points to another major factor driving hospital cyberattacks. "Hospitals hold some of the most sensitive data that exists, including medical records, identity information and insurance details. That combination of urgency and high-value data makes them very attractive targets."&lt;/p&gt;&lt;p&gt;Healthcare systems also rely on vendors and service providers. One weak link can open the door. "In healthcare, you're only as secure as the entire ecosystem around you," Amper said.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How AI-powered impersonation is changing the game&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Many people imagine hackers breaking through firewalls. That still happens. But today, attackers often target people instead of systems. "What we're seeing more and more is that attacks aren't always about breaking into systems, they're about tricking people," Amper said.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/category/tech/artificial-intelligence" target="_blank" rel="noopener"&gt;Artificial intelligence (AI)&lt;/a&gt; has made impersonation easier and scalable. Criminals can clone voices, generate convincing emails or create deepfake videos that appear to come from a trusted doctor, vendor or IT administrator. "AI doesn't replace social engineering, it supercharges it."&lt;/p&gt;&lt;p&gt;In practical terms, that might mean an employee receives what looks like a legitimate request to reset a password or approve a login. One click can open the door. "An employee is tricked into giving up credentials or approving a fraudulent authentication request. The attacker logs in as a legitimate user, and from there, they move quietly through internal systems," Amper explained. Because the activity appears to come from a real employee, it may go undetected until significant damage is done.&lt;/p&gt;&lt;p&gt;&lt;a href="https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk" target="_blank" rel="noopener"&gt;&lt;strong&gt;5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Why hospitals are especially vulnerable to cyberattacks&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Inside a hospital, speed matters. Decisions happen quickly, and staff move from one urgent task to the next. That constant pressure creates opportunities for attackers who rely on deception. "Healthcare professionals are focused on patients, not cybersecurity. They work in high-pressure environments where speed matters. That urgency can make it easier for attackers to exploit trust or distraction," Amper said.&lt;/p&gt;&lt;p&gt;Many hospitals also operate with legacy systems layered over time. Security was often added after the fact rather than built in from the start. That complexity increases risk. He also challenges how leaders think about the problem. "One misconception is thinking of cybersecurity as just an IT problem," Amper said.&lt;/p&gt;&lt;p&gt;Today's hospitals depend on digital systems for intake, diagnostics and billing. When those systems fail, care delivery suffers. "Cybersecurity today is fundamentally about operational resilience. It's about keeping the hospital running safely and continuously."&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What happens to your data after a breach&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;When a &lt;a href="https://www.foxnews.com/category/tech/topics/cybercrime" target="_blank" rel="noopener"&gt;hospital is breached&lt;/a&gt;, the exposed data often goes beyond a credit card number. "Breaches can expose medical histories, Social Security numbers, insurance information, billing details and contact data," Amper said.&lt;/p&gt;&lt;p&gt;That combination is powerful. Criminals can use it for&lt;a href="https://www.foxnews.com/tech/5-myths-about-identity-theft-put-your-data-risk" target="_blank" rel="noopener noreferrer nofollow"&gt;&lt;u&gt; identity fraud&lt;/u&gt;&lt;/a&gt;, insurance fraud and highly targeted scams. Unlike a credit card, a medical identity cannot simply be replaced. "Stolen medical data can't simply be canceled and replaced. That makes it especially valuable and long-lasting in criminal markets."&lt;/p&gt;&lt;p&gt;The impact may not show up right away. "The impact isn't always immediate; it can surface months or even years later."&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How hospitals can strengthen defenses&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Identity now sits at the center of cybersecurity. "Identity has become the front line of cybersecurity. If an attacker can successfully impersonate a trusted user, many traditional defenses can be bypassed," Amper said. Stronger identity verification, layered authentication and systems that can detect impersonation or deepfakes are becoming essential. The more certain a hospital is about who is accessing its systems, the harder it becomes for attackers to move quietly.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;How to check if your information is on the dark web&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;After a hospital breach, many patients worry about whether their data has been sold or shared. One simple step is checking whether your email address appears in known data breaches. You can visit haveibeenpwned.com and enter your email address into the search bar. The site will show whether your information has appeared in past breaches tied to that email. If your email appears in a breach, take action immediately. Change passwords for affected accounts and make sure each account uses a unique password.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;What patients should do after a hospital breach&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;If you receive a breach notification letter, do not panic. But do act. Amper offers clear guidance. "First, stay calm but take it seriously. Read the notice carefully and enroll in any credit or identity monitoring services offered."&lt;/p&gt;&lt;p&gt;Then take practical steps right away:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Review insurance statements for unfamiliar claims&lt;/li&gt;&lt;li&gt;Check medical records for incorrect diagnoses or procedures&lt;/li&gt;&lt;li&gt;Monitor your &lt;a href="https://www.foxnews.com/category/us/personal-freedoms/privacy" target="_blank" rel="noopener"&gt;credit reports&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Consider placing a free credit freeze&lt;u&gt; &lt;/u&gt;with the major credit bureaus if your Social Security number was exposed&lt;/li&gt;&lt;li&gt;Enable &lt;a href="https://www.foxnews.com/tech/what-two-factor-authentication-should-enable-it" target="_blank" rel="noopener"&gt;two-factor authentication (2FA)&lt;/a&gt; on email, financial and healthcare accounts wherever it is available&lt;/li&gt;&lt;li&gt;Be cautious of emails or calls referencing the breach&lt;/li&gt;&lt;li&gt;Reducing the amount of personal information available on data broker sites with a data removal service can also limit how easily scammers craft convincing follow-up attacks using your real details. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting &lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;"If something feels off, contact the hospital directly using official contact information. Don't rely on links or numbers provided in unexpected messages." He adds one final reminder. "Take your medical identity as seriously as your financial identity. Monitor your records, question anything unfamiliar and stay alert."&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Protect your accounts from long-term damage&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;Even if everything appears normal right now, take steps to secure your accounts. &lt;a href="https://www.foxnews.com/tech/149-million-passwords-exposed-massive-credential-leak" target="_blank" rel="noopener"&gt;Credential leaks&lt;/a&gt; often surface weeks or months later.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Consider identity theft protection.&lt;/strong&gt; Identity monitoring services can alert you if criminals try to open accounts in your name or misuse your personal information. See my tips and best picks on Best Identity Theft Protection at &lt;strong&gt;Cyberguy.com&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Stop reusing passwords immediately.&lt;/strong&gt; If attackers gain access to one working login, they often test it across dozens of websites automatically.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Change reused passwords first&lt;/strong&gt;, starting with email, financial and cloud accounts. Each account should have its own unique password.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Consider using a password manager&lt;/strong&gt; to generate and store strong passwords securely. You can also use breach scanning tools that alert you if your email address or passwords appear in future leaks. Check out the best expert-reviewed password managers of 2026 at &lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Install &lt;strong&gt;strong antivirus software&lt;/strong&gt; on your devices to help detect malware, phishing links and credential-stealing threats that could target you after a breach. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android &amp; iOS devices at &lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Taking these steps now can prevent a hospital breach from turning into long-term identity damage later.&lt;/p&gt;&lt;h2&gt;&lt;strong&gt;Kurt's key takeaways&lt;/strong&gt;&lt;/h2&gt;&lt;p&gt;When hospital cyberattacks disrupt care, the consequences ripple across entire communities. Appointments get canceled. Surgeries are delayed. Families worry. This is not only about stolen records. It is about trust in the healthcare system. Technology has transformed medicine. It has also created new risks. The challenge now is building resilience into every layer of care. Because the next cyberattack will not feel like a TV episode. It will feel personal.&lt;/p&gt;&lt;p&gt;And that raises an uncomfortable question. If your local hospital went offline tomorrow, would you trust that your medical identity and your care are truly protected? Let us know by writing to us at &lt;strong&gt;Cyberguy.com.&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://foxnews.onelink.me/xLDS?pid=AppArticleLink&amp;af_dp=foxnewsaf%3A%2F%2F&amp;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products" target="_blank" rel="noopener"&gt;&lt;strong&gt;CLICK HERE TO DOWNLOAD THE FOX NEWS APP&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sign up for my FREE CyberGuy Report&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my &lt;strong&gt;CYBERGUY.COM&lt;/strong&gt; newsletter. &lt;/p&gt;&lt;p&gt;Copyright 2026 CyberGuy.com. All rights reserved.&lt;/p&gt;</content:encoded>
            <media:content url="http://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2026/03/931/523/empty-hospital-bed.png?ve=1&amp;tl=1" expression="full" width="931" height="523" type="image/png"/>
            <category domain="foxnews.com/metadata/dc.identifier">a0610c89-e745-5a89-91f5-a8ea94a328e6</category>
            <category domain="foxnews.com/metadata/prism.channel">fnc</category>
            <category domain="foxnews.com/metadata/dc.source">Fox News</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/cybercrime</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/security</category>
            <category domain="foxnews.com/taxonomy">fox-news/tech/topics/hackers</category>
            <category domain="foxnews.com/section-path">tech</category>
            <category domain="foxnews.com/content-type">article</category>
            <pubDate>Fri, 20 Mar 2026 12:57:36 -0400</pubDate>
        </item>
    </channel>
</rss>