Category: Technology

  • World’s first AI-designed, 3D-printed shoe wants to be the next Crocs

    World’s first AI-designed, 3D-printed shoe wants to be the next Crocs

    Move over, Crocs. There’s a new contender in the world of unconventional footwear. 

    Syntilay, a startup with a sparkle in its eye and artificial intelligence on its mind, has just unveiled what it claims to be the world’s first entirely AI-designed and 3D-printed shoe. 

    This futuristic footwear is turning heads and raising eyebrows in equal measure.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    AI-designed, 3D-printed shoe (Syntilay)

    The birth of Syntilay

    Syntilay, whose name is derived from “scintillate” (meaning to sparkle), is the brainchild of 25-year-old entrepreneur Ben Weiss. The company’s journey from concept to creation is as unique as the shoes themselves. Using Midjourney AI, they generated the basic shape, which was then sketched by an artist. This sketch was transformed into a 3D model using Vizcom AI, and finally, generative AI added the distinctive patterns and textures. 

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    Ben tells CyberGuy, “AI designing shoes is going to disrupt the category because of the incredible speed to go to market. New releases for traditionally made shoes take around 18 months for a model to release, with AI making them and 3D printing, that is now only a few months.”

    AI crocs 2

    AI-designed, 3D-printed shoe (Syntilay)

    AI-POWERED ROBOT SINKS SEEMINGLY IMPOSSIBLE BASKETBALL HOOPS

    Customization meets comfort

    One of Syntilay’s standout features is its commitment to personalized comfort. Before you can slip your feet into these futuristic slides, you’ll need to scan your feet using your smartphone. This ensures a custom fit for each customer, even accommodating those with different-sized feet. Available in five colors – blue, black, red, beige and orange – these shoes are priced at a not-so-modest $149.99 per pair.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    AI crocs 3

    Before you can slip your feet into these futuristic slides, you’ll need to scan your feet using your smartphone. (Syntilay)

    SHAPE-SHIFTING AI TRANSFORMER HOMES WILL LEAVE YOU WANTING ONE

    The grand plan

    While Syntilay is pushing the boundaries of shoe design, they’ve also got some serious old-school cred in their corner. Joe Foster, the co-founder of Reebok, is lending his expertise to the project. With Foster’s experience in building a $4 billion shoe empire, Syntilay is hoping to make big strides in the footwear market. Syntilay’s ambitions extend far beyond selling a few thousand pairs of quirky slides. 

    They’re eyeing the $85.8 billion U.S. footwear market, with plans to open their platform to brands and content creators. This could potentially allow influencers and brands to design and sell their own AI-created footwear, tapping into a market that has traditionally been difficult for non-shoe companies to crack.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

    ai crocs 4

    AI-designed, 3D-printed shoe (Syntilay)

    TOP TECH STEALING THE SHOW AT CES 2025

    Sustainability steps

    In an age where environmental concerns are at the forefront, Syntilay is putting its best foot forward. The shoes are 100% recyclable, with customers able to return them at the end of their life to be transformed into new products. This closed-loop system could potentially revolutionize the footwear industry’s approach to sustainability.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    ai crocs 5

    AI-designed, 3D-printed shoe being packaged for shipment (Zellerfeld)

    Kurt’s key takeaways

    Whether Syntilay becomes the next Crocs or fades into obscurity remains to be seen. However, their innovative approach to design and manufacturing is undoubtedly pushing the boundaries of what’s possible in footwear. As AI and 3D printing technologies continue to evolve, we may be witnessing the first steps towards a revolution in how we design, produce and consume fashion.

    What do you think? Are AI-designed, 3D-printed shoes the future of footwear or just a passing fad? Let us know by writing us at Cyberguy.com/Contact.

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • How to organize, protect and streamline your inbox with an email alias

    How to organize, protect and streamline your inbox with an email alias

    Almost everything you do online asks for your email. If you have been using the same one for a while, chances are hundreds or even thousands of services have it. They send promotional messages, social media alerts, newsletters and more, turning your inbox into complete chaos. You can tame this madness using an email alias.

    An email alias helps declutter your inbox by organizing emails based on their purpose. For example, you can create specific aliases for shopping, newsletters or work and set up filters to sort these messages into separate folders automatically. 

    Aliases also help manage spam. If an alias starts receiving too many unwanted messages, you can disable it without affecting your main email.

    Let’s dive into how to create an email alias on different platforms, including Gmail, Outlook and iCloud. 

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    A person setting up an alias email (Kurt “CyberGuy” Knutsson)

    How to create an alias using Gmail

    Gmail doesn’t allow you to create a completely separate alias, but it offers workarounds using “+ addressing” or by adding dots to your existing email address. However, these methods don’t prevent an unscrupulous sender from seeing your primary address, so exercise caution when using them with untrusted correspondents. Follow the steps below to get started.

    Option 1: Create an alias using the ‘plus (+) trick’

    Use your existing Gmail address and add a “+” followed by any keyword before “@gmail.com.”

    Example: If your email is [email protected], you can use:

    No additional setup is needed, just start using this alias when signing up for services or sharing your email.

    Option 2: Create an alias using the ‘dot (.) trick’

    Gmail ignores dots (.) in email addresses, so you can create variations of your email:

    Example: If your email is [email protected], you can use:

    All variations will deliver emails to your main inbox automatically.

    email organize 2

    Setting up an alias on Gmail (Kurt “CyberGuy” Knutsson)

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    How to create an alias in Outlook.com

    Outlook.com allows you to create additional email addresses (aliases) that are linked to your primary account. Emails sent to an alias will arrive in your primary inbox, and you can send messages using the alias as well.

    Example:

    If your primary email is [email protected], you can create an alias like [email protected]. Emails sent to [email protected] will still go to [email protected], but you can choose to send emails using either address.

    Steps to create an alias:

    • Sign in to your Outlook.com account
    • Click the gear icon in the upper-right corner to open Settings
    • Scroll down and select View all Outlook settings
    • Navigate to Mail
    • Then click Sync email
    • Click Manage or choose a primary alias under Account alias
    • Select Add email and follow the prompts to create your new alias
    • Choose whether to create a new Outlook.com email as an alias or use an existing email (non-Outlook) as an alias
    • Click Add alias to confirm

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    Once added, you can send emails using your alias by selecting it in the From field when composing a new message.

    Important limitations to note:

    • You can add up to 10 aliases in total
    • There’s a limit of 10 new aliases that can be created in one year
    • You can only add two aliases per week
    • Existing Hotmail, Live, Outlook.com and MSN addresses can’t be added as aliases
    • Aliases can only contain letters, numbers, dots (.), underscores (_) or hyphens (-)
    • It’s no longer possible to create new aliases with @hotmail, @live.com or @msn.com domains
    email organizer 3

    Setting up an alias using Outlook.com (Kurt “CyberGuy” Knutsson)

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    How to create an alias using your Apple ID

    Apple allows you to create up to three email aliases through iCloud. These aliases can be used for specific purposes, helping you manage your inbox effectively. Here’s how to create one:

    • Go to icloud.com/mail and sign in to your Apple Account if necessary
    • Click the gear icon at the top of the Mailboxes list, then choose Settings
    • Click Account, then click Add Alias
    • Provide the requested information: Alias address – Enter the text to create your alias (e.g., [email protected]). The alias must contain between three and 20 characters; Label – Assign a label for the alias. Aliases are listed alphabetically by their labels; Full Name – Enter the name that will appear in the From field of emails you send using this alias
    • Click Create to finalize the alias
    • Once created, any email sent to this alias will be forwarded to your primary iCloud email address. For example, if your primary email is [email protected] and you create an alias [email protected], any emails sent to [email protected] will appear in your [email protected] inbox. This allows you to use different addresses for different purposes while keeping everything in one place

    It’s important to note that you can still create up to three email aliases through iCloud. Remember that while these aliases provide some flexibility, they do not create separate Apple IDs or completely hide your primary iCloud email address.

    email organizer 4

    Setting up an alias using Apple ID (Kurt “CyberGuy” Knutsson)

    BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

    Understanding email aliases

    While many email providers offer basic alias functionality, most have significant limitations. Gmail’s “+” addressing and dot tricks, Outlook’s linked aliases and Apple’s iCloud aliases all provide some flexibility, but they often fall short of true privacy protection.

    For those of you seeking comprehensive email privacy and robust alias management, my No. 1 pick for private and secure email platforms contains no ads, no tracking and powerful privacy features like password-protected email and unlimited disposable email addresses. See my review of the best secure and private email services here.

    How to keep scammers out of your inbox

    Protecting your inbox from scammers requires a combination of smart practices and proactive tools. Using email aliases is an effective first step. By creating specific aliases for different activities, such as shopping, subscriptions or work, you can track where spam is coming from and deactivate problematic aliases as needed. Below are some other steps to take.

    1. Avoid sharing your primary email address publicly on forums, social media or other platforms to minimize exposure. Most email providers offer robust spam filters, so ensure they are enabled and customize them as needed

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    2. Invest in personal data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

    3. Enable two-factor authentication on all your email accounts to add an extra layer of security.

    4. Be cautious of suspicious links and attachments. Never click on links or download attachments from unknown senders, as these could be phishing attempts.

    5. Use strong antivirus software to protect against potential malware that might come through spam emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    6. Regularly update your email password and make it strong and unique, avoiding common words or easily guessable combinations. Consider using a password manager to generate and store complex passwords.

    These steps will provide a more comprehensive approach to protecting your inbox from scammers and reducing unwanted emails.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    Kurt’s key takeaway

    Taking charge of your inbox doesn’t have to be overwhelming. By implementing the tips and tools mentioned above, you’ll create a more secure, efficient and manageable email experience. Whether you’re battling spam or organizing your digital life, email aliases and secure services are great things to put into place.

    CLICK HERE TO GET THE FOX NEWS APP

    Which email platform do you use most often, and how do you organize your messages there? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Warehouse robot uses AI to play real-life Tetris to handle more than ever before

    Warehouse robot uses AI to play real-life Tetris to handle more than ever before

    In a groundbreaking development for warehouse automation, Ambi Robotics just launched AmbiStack, a multipurpose robotic system that promises to transform the way items are stacked onto pallets and into containers. 

    This innovative solution tackles a fundamental challenge in logistics: maximizing space utilization and reducing shipping costs.

    AmbiStack (Ambi Robotics)

    The AmbiStack advantage

    AmbiStack operates like a real-world 3D Tetris game, expertly arranging items to optimize space in containers and pallets. By minimizing wasted space, warehouses can significantly reduce shipping costs and improve overall efficiency.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    “Logistics companies are under continuous pressure to deliver items faster and for lower cost, which puts a lot of strain on operations to maintain reliability while rapidly adapting for the future,” Jim Liefer, CEO of Ambi Robotics, also tells CyberGuy. 

    “AmbiStack can be rapidly configured to automate the repetitive motions involved in a huge variety of stacking and palletizing applications, driving greater accuracy and efficiency, while future-proofing warehouse operations.”

    warehouse robot 2A

    AmbiStack (Ambi Robotics)

    CHINA’S NEWEST HUMANOID ROBOT IS READY TO SERVE LIKE NEVER BEFORE

    Powered by PRIME-1: AI at its core

    The rapid development and deployment of AmbiStack was made possible by PRIME-1, Ambi Robotics’ new artificial intelligence foundation model for warehouse robots. This advanced AI enables AmbiStack to begin working efficiently from day one in production environments.

    Ken Goldberg, co-founder and chief scientist at Ambi Robotics, tells CyberGuy, “The engineering team at Ambi Robotics used 4 years of proprietary warehouse data to train a state-of-the-art generative model for 3D warehouse operations; their experiments with real production systems confirm that PRIME-1 significantly outperforms their previous systems.”

    warehouse robot 3A

    AmbiStack (Ambi Robotics)

    ROBOTS PERFORM LIKE HUMAN SURGEONS BY JUST WATCHING VIDEOS

    Why AmbiStack matters

    Cost reduction and efficiency: AmbiStack addresses the pressing need for automated solutions that cut labor costs, reduce manual inefficiencies and tackle accuracy challenges.

    Ergonomic improvements: The system alleviates the physical strain on workers by handling heavy lifting tasks.

    Adaptive intelligence: Trained using Sim2Real reinforcement learning, AmbiStack can make real-time decisions, adapting to various scenarios and delivering a faster return on investment.

    Tackling complex tasks: Stacking presents more challenges than sorting, making AmbiStack a significant advancement in robotic capabilities.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    warehouse robot 4A

    AmbiStack (Ambi Robotics)

    CHINESE ROBOT LIFTS 35 POUNDS PER HAND

    The AmbiStack process

    AmbiStack utilizes advanced vision systems and AI models trained on extensive data from parcel sorting experiences. The robot learns in a virtual environment, earning higher scores for better stacking performance with random items.

    Jeff Mahler, co-founder and CTO of Ambi Robotics, tells CyberGuy, “AmbiStack represents an evolution of our AI-powered robotics, building on our technology in physical AI to add stacking as a fundamental new robot skill in AmbiOS. We’ve started the AI flywheel for stacking with Sim2Real reinforcement learning and performance will only improve as robots collect data from production environments. We are committed to advancing this capability to provide reliable systems that deliver a strong ROI for our customers.”

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    WAREHOUSE ROBOT 5A

    AmbiStack (Ambi Robotics)

    Market impact and future prospects

    The potential market for AmbiStack is vast, as efficient packing and stacking are crucial in logistics. By optimizing container usage, AmbiStack ensures that companies aren’t “shipping air,” leading to substantial cost savings in transportation.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    warehouse robot 6A

    AmbiStack (Ambi Robotics)

    Benefits for warehouse workers

    AmbiStack is designed to complement human workers, not replace them. It allows employees to focus on decision-making and strategic tasks while reducing physical strain and repetitive motions.

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    warehouse robot 7

    AmbiStack (Ambi Robotics)

    Kurt’s key takeaways

    By combining advanced AI with practical robotics, AmbiStack is addressing a long-standing challenge in logistics. As the industry continues to evolve, solutions like AmbiStack will play a crucial role in shaping the future of warehouse operations and supply chain efficiency.

    Do you believe these technologies will ultimately complement human workers or gradually replace them entirely in logistics and warehouse operations? Let us know by writing us at Cyberguy.com/Contact.

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Fox News AI Newsletter: DeepSeek underscores US-China race for AI dominance, OpenAI says

    Fox News AI Newsletter: DeepSeek underscores US-China race for AI dominance, OpenAI says

    Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

    IN TODAY’S NEWSLETTER:

    – DeepSeek is the newest front in the AI competition between the US and China

    – Trump, OpenAI CEO weigh in on DeepSeek frenzy

    – Willing to pay $175,000 for a life-size robot friend that remembers everything about you?

    CRITICAL FIGHT: DeepSeek’s release of a high-profile new AI model underscores a point we at OpenAI have been making for quite some time: the U.S. is in a competition with the Chinese Communist Party that will determine whether democratic AI wins over the Chinese Communist Party’s authoritarian version of the technology. The U.S. must come out on top–and the stakes could not be higher.

    ‘WAKE-UP CALL’: President Donald Trump and OpenAI CEO Sam Altman both joined in on the buzz surrounding Chinese artificial intelligence startup DeepSeek, which sent the technology sector into turmoil on Monday following its emergence as a potential rival to leading U.S.-based firms.

    melody the robot 1

    Melody the life-sized AI robot  (Realbotix)

    ROBOT FRIEND MELODY: In a world where loneliness is becoming increasingly prevalent, researchers have taken a bold step forward by introducing Melody, a life-sized artificial intelligence robot designed to combat this growing epidemic. 

    AI RACE: China-based artificial intelligence startup DeepSeek’s release of new AI models that rival those made by leading U.S. tech firms roiled markets on Monday and prompted concerns about U.S. firms losing their edge in the AI race to Chinese rivals.

    ROBOTIC DOG COMPANION: U.S. robotics company Tombot has introduced “Jennie,” an innovative AI-powered robotic pet designed to provide comfort and companionship to those facing cognitive health challenges.

    Jennie the AI dog 1

    AI-powered robotic dog  (Tombot)

    Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

    FOLLOW FOX NEWS ON SOCIAL MEDIA

    Facebook
    Instagram
    YouTube
    Twitter
    LinkedIn

    SIGN UP FOR OUR OTHER NEWSLETTERS

    Fox News First
    Fox News Opinion
    Fox News Lifestyle
    Fox News Health

    DOWNLOAD OUR APPS

    Fox News
    Fox Business
    Fox Weather
    Fox Sports
    Tubi

    WATCH FOX NEWS ONLINE

    Fox News Go

    STREAM FOX NATION

    Fox Nation

    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

  • UnitedHealth cyberattack exposes 190 million in largest US healthcare data breach

    UnitedHealth cyberattack exposes 190 million in largest US healthcare data breach

    UnitedHealth’s Change Healthcare unit suffered a data breach in February 2024, the news of which surfaced Feb. 21. 

    Initially reported to have affected around 100 million individuals, the U.S. health insurance giant has now revealed that the actual number is significantly higher: 190 million. This makes it the largest breach of medical data in U.S. history, affecting nearly half the country’s population. 

    A breach of this magnitude can have devastating consequences for the American people as malicious actors could exploit the data for a range of attacks if it finds its way to the dark web.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    A doctor looking at patient’s private information (Kurt “CyberGuy” Knutsson)

    The updated impact assessment

    UnitedHealth confirmed on Friday, Jan. 24, 2025, that the ransomware attack on its Change Healthcare unit affected approximately 190 million people in the United States. The company had previously estimated the number of affected individuals to be around 100 million in its preliminary analysis filed with the Office for Civil Rights, a division of the U.S. Department of Health and Human Services that investigates data breaches.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    UnitedHealth stated that the majority of those impacted have already been notified, either directly or through substitute notice. The final tally of affected individuals will be confirmed and submitted to the Office for Civil Rights at a later date.

    The company tells CyberGuy it is “not aware of any misuse of individuals’ information as a result of this incident and has not seen electronic medical record databases appear in the data during the analysis.” However, UnitedHealth did not disclose when it became aware of the additional 90 million victims, how the revised figure was determined or what changes led to the updated number.

    hacker

    Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

    THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

    What you need to know about the data breach

    The cyberattack on Change Healthcare in February caused widespread disruptions across the U.S. healthcare sector, as the company took its systems offline to contain the breach. This shutdown impacted critical services such as claims processing, payments and data sharing, which many healthcare providers rely on.

    The stolen data varied by individual but included a broad range of personal and sensitive information, such as names, addresses, dates of birth, phone numbers, email addresses and government ID numbers, including Social Security, driver’s license and passport details.

    Plus, hackers may have accessed health-related information, including diagnoses, medications, test results, imaging records, care and treatment plans, and health insurance details. Financial and banking information tied to claims and payment data was also reportedly compromised.

    The breach was the result of a ransomware attack carried out by ALPHV/BlackCat, a Russian-speaking ransomware and extortion group. The attack, a form of malware intrusion, locks victims out of their data unless a ransom is paid. ALPHV/BlackCat later took credit for the attack.

    During a House hearing in April, Change Healthcare admitted that the breach was made possible due to inadequate security measures, specifically the absence of two-factor authentication to protect its systems.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    another hacker

    Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

    FROM TIKTOK TO TROUBLE: HOW YOUR ONLINE DATA CAN BE WEAPONIZED AGAINST YOU

    6 ways to protect yourself from Change Healthcare data breach

    1. Remove your personal information from the internet: The breach has exposed sensitive personal data, making it essential to reduce your online footprint. While no service can guarantee complete data removal, a reputable data removal service can significantly limit your exposure. These services systematically monitor and erase your personal information from numerous websites and data brokers. Check out my top picks for data removal services here.

    2. Be wary of mailbox communications: With addresses among the compromised data, scammers may exploit this breach to send fraudulent letters. Be aware of mail claiming missed deliveries, account suspensions or security alerts. Always verify the authenticity of such communications before responding or taking action.

    3. Be cautious of phishing attempts and use strong antivirus software: Scammers may use your compromised email or phone number to target you with phishing attacks. Be wary of messages asking for personal information or containing suspicious links. To protect yourself, ensure strong antivirus software is installed on all your devices. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    4. Monitor your accounts: Given the scope of this breach, regular monitoring of your bank accounts, credit card statements and other financial accounts is critical. Look for unauthorized transactions or suspicious activity and immediately report any issues to your bank or credit card provider.

    5. Recognize and report a Social Security scam: If your Social Security number is exposed, you could become a target for related scams. Official communication regarding Social Security issues usually comes via mail, not phone calls or emails. Learn more about spotting and reporting scams by visiting the Social Security Administration’s scam information page.

    6. Invest in identity theft protection: Data breaches happen every day, and most never make the headlines, but with an identity theft protection service, you’ll be notified if and when you are affected. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    Kurt’s key takeaway

    It’s surprising that a company of UnitedHealth’s scale failed to implement even basic cybersecurity measures when handling customer data. A breach affecting 190 million people – nearly half of the U.S. population – is staggering, leaving almost anyone at risk of becoming a target for hackers. While the company is still assessing the full extent of the breach, you can take precautions now by being cautious with any unknown links or unsolicited calls. Bad actors may use a variety of tactics to cause harm.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you think these companies are doing enough to protect your data, and is the government doing enough to catch those behind cyberattacks? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap

    Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap

    A sophisticated phishing campaign exploiting Google Calendar has been uncovered by Check Point Software Technologies, raising alarms among cybersecurity experts. 

    Cybercriminals are sending fake meeting invitations that appear legitimate, redirecting victims to phishing sites and mimicking Google’s platforms to steal sensitive information. 

    This emerging threat is particularly concerning given the widespread use of Google Calendar, which serves more than 500 million users globally in 41 languages. Researchers have identified nearly 4,000 phishing attempts in a matter of weeks, impersonating more than 300 reputable brands.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Fake Google Meet invitation (Check Point Software Technologies)

    How the scam works

    Hackers leverage the trust in Google’s services to carry out their attacks. Victims receive seemingly authentic meeting invites via Google Calendar. Upon clicking links within these invites, they are taken to fake web pages that prompt them to input personal data. Once compromised, this information can be used for identity theft, financial fraud and unauthorized access to other accounts. Security experts warn that attackers are now using AI to craft highly convincing fake invitations, making it even harder to spot the fraud. Reacting to the findings from Check Point, a spokesperson for Google said:

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    “We recommend users enable the ‘Only If The Sender Is Known’ setting in Google Calendar. This setting helps defend against this type of phishing by alerting the user when they receive an invitation from someone not in their contact list and/or they have not interacted with from their email address in the past.”

    google meet 2

    Fake Google Meet invitation (Check Point Software Technologies)

    ASK KURT: HOW TO NAVIGATE GOOGLE’S PRIVACY SETTINGS

    Google’s ‘Known Senders’ setting: A shield against calendar phishing

    Google has introduced the “known senders” feature in Google Calendar to combat sophisticated phishing attempts. This setting helps you filter out potentially malicious calendar invites. Here’s how to enable it:

    • Open Google Calendar and click the gear icon to access Settings
    • Under General, select Event Settings
    • In Add invitations to my calendar, choose Only if the sender is known

    This ensures that only events from contacts, your organization or previous interactions are automatically added to your calendar.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    google meet 3

    Google’s “Known Senders” setting (Kurt “CyberGuy” Knutsson)

    HOW ONE MAN GOT SCAMMED IN SECONDS USING GOOGLE

    Additional security measures

    To further protect yourself from phishing scams, follow these steps.

    Scrutinize unexpected invites carefully: Examine the sender’s details, including their name, domain and email address, for any inconsistencies or signs of spoofing.

    Avoid clicking suspicious links or downloading attachments from unknown sources: Threat actors often embed malicious links in calendar invites that can lead to phishing websites designed to steal your personal information.

    Use strong antivirus software: This provides an additional defense mechanism against malware and can help detect potential phishing attempts before they cause damage. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    Enable two-factor authentication (2FA) for your Gmail account: 2FA adds an extra layer of security that can prevent unauthorized access, even if your credentials are compromised.

    Keep your security settings up to date: Regularly review and adjust your calendar and email settings to protect against evolving phishing tactics.

    HOW A WRONG GOOGLE SEARCH CAN COMPROMISE YOUR DATA AND BRING LAW ENFORCEMENT CALLING

    Kurt’s key takeaways

    As phishing tactics evolve, cybercriminals are exploiting trusted platforms like Google Calendar to bypass traditional security measures. This underscores the importance of user vigilance and proactive security practices. By enabling the “known senders” setting and implementing additional security measures, you can significantly reduce the risk of falling victim to calendar-based phishing scams.

    CLICK HERE TO GET THE FOX NEWS APP

    What digital security challenges have you encountered recently? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Fake toll road texts sweep America as Chinese scammers target US drivers

    Fake toll road texts sweep America as Chinese scammers target US drivers

    A new scam has come to light targeting residents across the United States with text messages that pretend to be from toll road operators. For many who receive these messages, it’s an easy and expensive trap to fall into.

    The scam begins when people receive a message claiming they have unpaid tolls and may be charged fines. Scammers then ask for card details and a one-time password sent via SMS to steal their money. Security researchers believe that Chinese smishing groups are behind this scam, selling SMS-based phishing kits to thousands of scammers.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Enter the giveaway by signing up for my free newsletter.

    Fake toll road scam text (Kurt “CyberGuy” Knutsson)

    What you need to know about the fake toll scam

    As reported by KrebsOnSecurity, the scam begins with a text message claiming to be from a toll road operator, such as E-ZPass or SunPass. The message warns about unpaid tolls and the possibility of fines, forcing recipients to act quickly. Victims are directed to a fake website mimicking the toll operator’s site, where they are asked to provide sensitive information, including payment card details and one-time passwords. 

    Security researchers have traced the scam to Chinese smishing groups known for creating and selling sophisticated SMS phishing kits. One such kit, “Lighthouse,” makes it easy for scammers to spoof toll road operators in multiple states. These kits are designed to trick users into sharing financial information, which is then used to commit fraud. 

    Reports of these phishing attacks have surfaced across the U.S., targeting users of toll systems like EZDriveMA in Massachusetts, SunPass in Florida and the North Texas Toll Authority in Texas. Similar scams have been reported in states including California, Colorado, Connecticut, Minnesota and Washington. The phishing pages are mobile-optimized and won’t load on non-mobile devices, making them even more deceptive.

    Fake toll road texts sweep America as Chinese scammers target US drivers

    Fake toll road scam text (Kurt “CyberGuy” Knutsson)

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    Phishing scams are evolving 

    Recent advancements in phishing kits include better deliverability through integration with Apple iMessage and Android’s RCS technology, bypassing traditional SMS spam filters. These methods increase the likelihood of victims receiving and engaging with fraudulent messages. The phishing sites are operated dynamically in real time by criminals, making them harder to detect and shut down. Even individuals who don’t own a vehicle have reported receiving these messages, indicating random targeting.

    Fake toll road texts sweep America as Chinese scammers target US drivers

    Illustration of a scammer sending toll road texts to scam victims (Kurt “CyberGuy” Knutsson)

    THAT APPLE ID DISABLED MESSAGE? IT’S A DANGEROUS SCAM

    7 ways to stay safe from toll scam messages

    By staying vigilant and following the steps below, you can protect yourself from falling victim to toll scams. 

    1) Verify directly with toll operators: If you receive a message about unpaid tolls or fines, do not click on any links. Instead, visit the official website of your toll operator or contact their customer service directly to verify the claim.

    2) Install strong antivirus software: The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    3) Do not share personal information: Never provide sensitive details like payment card information, Social Security numbers or one-time passwords via text or unverified websites. Legitimate toll operators will not request such information through SMS.

    4) Enable two-factor authentication (2FA): Use 2FA for your accounts whenever possible. This adds an extra layer of protection by requiring two forms of verification, reducing the risk of unauthorized access even if some details are compromised.

    5) Be wary of urgency in messages: Scammers often create a sense of urgency, claiming immediate action is required to avoid penalties. Take a moment to assess the situation and verify the legitimacy of the message through official channels.

    6) Report suspicious messages: If you suspect a phishing attempt, report it to the Federal Trade Commission or the FBI’s Internet Crime Complaint Center. Include details like the sender’s phone number and any links in the message. Additionally, inform your mobile carrier to help block similar scams.

    7) Use a personal data removal service: Employ a reputable data removal service to reduce your online footprint and minimize the risk of scammers obtaining your personal information. These services can help remove your data from various data broker sites, making it harder for scammers to target you with personalized scams. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    Kurt’s key takeaway

    It’s deeply concerning how these scams are becoming increasingly sophisticated and widespread. It’s no longer just about random phishing attempts. These are carefully crafted schemes designed to exploit our trust in systems we rely on daily. The fact that scammers can impersonate toll road operators so convincingly is alarming, and it shows how vulnerable we are to such attacks. It frustrates me to think of how many people may fall victim to these tactics, losing their hard-earned money.

    Have you recently received a suspicious text message claiming to be from a toll road operator or any other service? How did you react? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2024 CyberGuy.com. All rights reserved.

  • How to share a YouTube video starting at a specific time

    How to share a YouTube video starting at a specific time

    Ever watched a YouTube video and thought, “I need to share this exact moment with my friends?” Well, you’re in luck. Sharing specific moments from YouTube videos is actually pretty easy. Whether you’re on a computer, iPhone or Android device, I’m here to show you how easy it is to do just that.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Enter the giveaway by signing up for my free newsletter.

    YouTube app (Kurt “CyberGuy” Knutsson)

    On your computer: Two simple options

    The right-click method

    • Head to YouTube.com, then locate and click on the video you want to send to someone
    How to share a YouTube video starting at a specific time

    Steps to share exact time of YouTube video on a computer (Kurt “CyberGuy” Knutsson)

    • Pause the video at the exact moment you want to share
    • Right-click inside the video frame and select Copy video URL at current time
    How to share a YouTube video starting at a specific time

    Steps to share exact time of YouTube video on a computer (Kurt “CyberGuy” Knutsson)

    • That’s it. You’ve got your timestamp link. Paste it wherever you’d like: in an email, message or on social media

    YOUTUBE’S 5 MOST OVERLOOKED USEFUL FEATURES

    The share button method

    • Head to YouTube.com, then locate and click on the video you want to send to someone
    How to share a YouTube video starting at a specific time

    Steps to share exact time of YouTube video on a computer (Kurt “CyberGuy” Knutsson)

    • Pause the video at the desired moment
    • Click the Share button under the video
    How to share a YouTube video starting at a specific time

    Steps to share exact time of YouTube video on a computer (Kurt “CyberGuy” Knutsson)

    • Check the box next to Start at to adjust your desired start time, if necessary
    • Copy the link
    • Your timestamped link is ready to share; Paste it wherever you’d like: in an email, message or on social media
    How to share a YouTube video starting at a specific time

    Steps to share exact time of YouTube video on a computer (Kurt “CyberGuy” Knutsson)

    SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

    On your iPhone

    • Open the YouTube app
    • Find the video you want to share and click on it
    • Play the video to your desired starting point
    • Tap the Share button below the video
    • Choose your preferred sharing method (e.g., Messages, Mail or Copy Link)
    • The link you share will now include the timestamp, and the video will start at that point when opened
    How to share a YouTube video starting at a specific time

    Steps to share exact time of YouTube video on an iPhone (Kurt “CyberGuy” Knutsson)

    HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

    On your Android

    YouTube has recently introduced a new, simplified method for sharing video timestamps on Android.

    Settings may vary depending on your Android phone’s manufacturer. 

    • Open the YouTube app on your Android device
    • Find and play the video you want to share
    • Pause the video at the desired timestamp
    • Tap the Share button below the video
    • In the share menu, you’ll see a new toggle labeled Start at [current timestamp]
    • Enable this toggle to include the timestamp in your shared link
    • Choose your preferred sharing method or tap Copy link to copy the timestamped URL to your clipboard
    How to share a YouTube video starting at a specific time

    Steps to share exact time of YouTube video on an Android (Kurt “CyberGuy” Knutsson)

    These updated steps make sharing timestamps much simpler, as you no longer need to use Chrome or request the desktop site. For those using older versions of the YouTube app or Android OS or if the update isn’t yet available on your device, here are the previous steps:

    Settings may vary depending on your Android phone’s manufacturer. 

    • Open the YouTube app
    • Find and play the video you want to share
    • Pause the video at the desired timestamp
    • Tap the Share button and then Copy link
    How to share a YouTube video starting at a specific time

    Steps to share exact time of YouTube video on an Android (Kurt “CyberGuy” Knutsson)

    • Open Google Chrome, paste the link in the address bar or click where it says, “Link you copied,” and load the video
    • Tap the three-dot menu icon
    • Click Desktop site
    • Play video and pause at the desired start time
    • Tap the Share button again, check the box next to “Start at,” and the current timestamp will be automatically filled in.
    • Tap Copy to get the timestamped URL
    • Now, you can easily share the time-stamped URL via your preferred messaging app or social media platform
    How to share a YouTube video starting at a specific time

    Steps to share exact time of YouTube video on an Android (Kurt “CyberGuy” Knutsson)

    Both methods allow you to share specific moments in YouTube videos on your Android, but the new process is more streamlined and user-friendly.

    TOP ANDROID PHONES OF 2025

    Kurt’s key takeaways

    Sharing specific parts of a YouTube video has never been easier. Whether you’re on a computer, iPhone or Android device, these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.

    Now that you know the steps to share an exact moment, follow our guide and share a specific part of our video with your friends right away. Don’t forget to let us know their reactions by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2024 CyberGuy.com. All rights reserved.

  • Outsmart hackers who are out to steal your identity

    Outsmart hackers who are out to steal your identity

    Did you know that identity theft happens every 22 seconds? This means that, by the time you finish reading this sentence, someone has likely had their identity stolen. At best, identity theft will steal away your time and patience. But more often, identity theft leads to severe consequences, like losing control over your financial accounts, having your credit score affected or even losing lifelong savings.

    However, you don’t have to be a statistic. By understanding how identity thieves operate and implementing smart protection strategies, you can make your personal data a fortress that’s too challenging for cybercriminals to breach. Drawing from the Federal Trade Commission’s (FTC) latest Identity Theft Awareness Week insights, I’ll walk you through expert-backed strategies to shield your most valuable asset: your identity.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Enter the giveaway by signing up for my free newsletter.

    Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

    Lesson 1: Identity theft is more common than you think

    With so much of our lives having moved online, identity thieves are having an easier time than ever. Your most important accounts – banking, credit, Social Security – are all digital. Thieves don’t need to know much about you to steal your identity, just a few pieces of personal information can be enough. According to the Bureau of Justice Statistics, 24 million Americans reported identity theft in the past 12 months. In their lifetime, 1 in 3 Americans (more than 110 million people) have experienced identity theft. Here’s the part many people don’t realize: You might have already been a target. Maybe your identity was stolen, and the thieves failed, or maybe your good online habits saved you without you even knowing, which brings us to the next lesson: prevention.

    Outsmart hackers who are out to steal your identity

    Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

    THINK YOU’RE SAFE? IDENTITY THEFT COULD WIPE OUT YOUR ENTIRE LIFE’S SAVINGS

    Lesson 2: You can protect yourself from identity theft

    You don’t need to spend a fortune to guard against identity theft. While professional services can be helpful, most of what you need comes down to better habits and awareness. Here are some simple steps you can take today:

    1) Check your accounts regularly: Review your bank, credit card and Social Security accounts for transactions you didn’t make, failed login attempts and password reset requests you didn’t initiate.

    2) Keep an eye on your mail: Look for letters regarding accounts you didn’t open, notices of data breaches and transaction summaries that don’t match your records.

    3) Monitor your email inbox: Be alert for password reset emails you didn’t request, confirmation of new accounts you didn’t open, receipts for purchases you didn’t make.

    4) Use two-factor authentication (2FA): 2FA adds extra layers of security to your accounts. Even if a thief has your password, they won’t be able to log in without a second step, like a code sent via text message or app-based verification. While logging in might take an extra moment, it’s worth it; 2FA dramatically increases account security.

    5) Check your credit report annually: Visit AnnualCreditReport.com to get your free credit report once a year. Use it to spot suspicious activity early. If you see something unusual, take action right away.

    6) Use strong passwords: Use complex passwords and a password manager to secure your online accounts. Strong passwords are your first line of defense against cyber threats.

    7) Stop oversharing: Limit the personal information you share on social media and other platforms. It’s a treasure trove for cybercriminals who use it to craft convincing fraud campaigns targeted specifically at you.

    Outsmart hackers who are out to steal your identity

    Illustration of the need for digital security (Kurt “CyberGuy” Knutsson)

    10 SIGNS YOUR IDENTITY HAS BEEN COMPROMISED

    Lesson 3: Know what to do if identity theft happens

    Nearly half of Americans don’t know how to respond if they fall victim to identity theft. Acting quickly can make a huge difference. Here’s what to do:

    1) Contact the affected institution: Contact the company immediately if you notice something unusual, like a suspicious charge or an unfamiliar account. They’ll guide you through securing your account.

    2) Change your passwords: Update the password for the affected account and any others using the same credentials. Use strong, unique passwords for each account to avoid further risks.

    3) Report the theft to the FTC: Visit IdentityTheft.gov to report identity theft and get personalized recovery steps.

    4) Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

    Bonus tip: Invest in personal data removal services

    Data breaches often start with personal information that’s readily available online. People search sites and data brokers collect and sell this information, including your name, address, phone number and more. Can you get your data removed? Yes, but it’s tricky. These companies don’t make it easy, and managing removal requests for hundreds of sites can be overwhelming. 

    Instead, consider using a personal data removal service. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

    CELLPHONE NIGHTMARE LEADS TO PORTED NUMBERS, IDENTITY THEFT, FIGHT FOR RECOVERY

    Kurt’s key takeaways

    Look, identity theft is scary, but you’re not helpless. By staying smart and proactive, you can dramatically reduce your risks. Think of protecting your identity like locking your front door: It’s just good common sense in today’s digital world. At the end of the day, a little awareness goes a long way, and you’ve already taken the first step by reading this article. Now, take what you’ve learned and apply it to keep you safe from cybercriminals.

    What situation have you found yourself in where you felt vulnerable to identity theft or needed help protecting your personal information? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2024 CyberGuy.com. All rights reserved.

  • Scammers find sneaky way to bypass your iPhone’s safety features

    Scammers find sneaky way to bypass your iPhone’s safety features

    In an alarming development, cybercriminals have devised a new method to circumvent Apple’s built-in phishing protection for iMessage, potentially exposing you to malicious links and scams. This sophisticated tactic exploits a security feature designed to protect you, turning it into a vulnerability that could lead to significant personal and financial risks.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Enter the giveaway by signing up for my free newsletter.

    Scammer’s phishing text message sent to iPhone (Kurt “CyberGuy” Knutsson)

    The trick unveiled

    Apple’s iMessage automatically disables links in messages from unknown senders as a security measure. However, cybercriminals have found a way to exploit this protection. By instructing you to reply to the message, often with a simple “Y,” the attackers can re-enable previously disabled links. This seemingly innocuous action not only activates the links but also signals to the scammers that they’ve found an engaged target for future attacks.

    We reached out to Apple for a comment but did not hear back before our deadline.

    Scammers find sneaky way to bypass your iPhone's safety features

    Scammer’s phishing text message sent to iPhone (Kurt “CyberGuy” Knutsson)

    HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

    Common phishing lures

    These deceptive messages often masquerade as notifications from trusted organizations, such as:

    • Undeliverable packages from courier services (USPS, DHL, FedEx)
    • Unpaid road tolls
    • Outstanding payments or fees

    The messages typically end with instructions like: “(Please reply Y, then exit the SMS, re-open the SMS activation link, or copy the link to open in Safari).”

    Scammers find sneaky way to bypass your iPhone's safety features

    Scammer’s phishing text messages sent to iPhone (Kurt “CyberGuy” Knutsson)

    THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE

    The rising threat of smishing

    This new tactic is part of a broader trend of smishing (SMS phishing) attacks targeting mobile users. With the increasing reliance on smartphones for various activities, including financial transactions and personal communications, these attacks pose a significant threat to users’ security and privacy.

    DOES MY IPHONE NEED ANTIVIRUS PROTECTION?

    How to protect yourself

    To safeguard against these sophisticated phishing attempts, consider the following steps.

    1) Never reply to suspicious messages: Avoid responding to texts from unknown senders, especially those asking you to reply to activate links. Additionally, make sure to delete suspicious text messages and block the sender to prevent further attempts. Since the sender is not in your contact list, you can click Report Junk at the bottom of the text. Then click Delete and Report Junk. This will report the conversation as junk by sending it to your wireless carrier and Apple using your phone number.

    2) Verify sender identity: Contact organizations directly through official channels if you’re unsure about a message’s legitimacy.

    3) Be skeptical of urgency: Scammers often use urgent language to prompt quick, thoughtless actions.

    4) Enable message filtering: Use your device’s built-in filtering options to sort messages from unknown senders. Here are the steps:

    • Open Settings
    • Scroll down and click Apps 
    • Tap Messages
    • Turn on Filter Unknown Senders

    This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently.

    5) Use two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

    6) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    7) Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you these deceptive iMessage phishing texts in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

    What to do if you’ve been targeted

    If you suspect you’ve fallen victim to a smishing attack:

    • Report the incident to relevant authorities and institutions
    • Freeze your credit to prevent potential identity fraud
    • Change passwords and PINs for all your accounts; consider using a password manager to generate and store complex passwords
    • Monitor your finances and online accounts for suspicious activity
    • Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

    One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

    Kurt’s key takeaways

    This latest trick targeting iMessage users serves as a reminder that even seemingly secure systems can be vulnerable to social engineering. By remaining cautious and following best practices for digital security, you can significantly reduce your risk of falling victim to these sophisticated phishing attempts.

    What other cybersecurity challenges have you encountered with your mobile devices, and what questions do you have for us? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2024 CyberGuy.com. All rights reserved.