Tag: Apple

  • Apple and Google restore ability to download TikTok app

    Apple and Google restore ability to download TikTok app

    Apple and Google have restored access to the TikTok app after removing it briefly last month.

    The app was removed from mobile stores to comply with a ban on the social media platform following a requirement for the Chinese technology company ByteDance to sell or shut it down.

    At issue was the Protecting Americans from Foreign Adversary Controlled Applications Act, a law passed by Congress last April with wide bipartisan support. The law gave TikTok nine months to either divest from its Chinese parent company, ByteDance, or be removed from U.S.-based app stores and hosting services. 

    SUPREME COURT UPHOLDS LOOMING TIKTOK BAN

    A screenshot of an update in the TikTok app on Saturday, Jan. 18, 2025. (Fox News Digital / Fox News)

    Use of the app was restored shortly after it was removed from the app stores due to promises from President Trump to save it, but the ability to download it remained unavailable until Thursday. 

    Trump indicated prior to his election that he was going to extend the time before the law would be in effect so that he could effectively procure a deal that would also protect national security.

    tiktok-phone

    Texas Attorney General Ken Paxton filed a lawsuit against TikTok for allegedly sharing data of minors. (Illustration by Michael M. Santiago/Getty Images / Getty Images)

    TRUMP SAYS FATE OF TIKTOK SHOULD BE IN HIS HANDS WHEN HE RETURNS TO WHITE HOUSE

    “The order will also confirm that there will be no liability for any company that helped keep TikTok from going dark before my order,” Trump posted on Truth Social.

    In a statement from the company, they thanked President Trump and said they will work with the administration to find a long-term solution.

    “We thank President Trump for providing the necessary clarity and assurance to our service providers that they will face no penalties for providing TikTok to over 170 million Americans and allowing over 7 million small businesses to thrive,” TikTok stated.

    An image of Trump and TikTok

    The TikTok logo is seen in this illustration photo taken in Warsaw, Poland on 28 December, 2024. (Jaap Arriens/NurPhoto via Getty Images / Getty Images)

    GET FOX BUSINESS ON THE GO BY CLICKING HERE      

    Although access to the app has been restored, the status of the law is unresolved and there is still no solution. The app’s ownership also has still not been decided.

    Fox News Digital’s Breanne Deppisch contributed to this report.

  • Wyden, Biggs demand Gabbard make UK rescind Apple backdoor order: Gov’t ‘spying’

    Wyden, Biggs demand Gabbard make UK rescind Apple backdoor order: Gov’t ‘spying’

    Sen. Ron Wyden, D-Ore., and Rep. Andy Biggs, R-Ariz., penned a letter to newly sworn-in Director of National Intelligence Tulsi Gabbard, warning that the United Kingdom’s reported new order demanding backdoor Apple data jeopardizes Americans.

    The letter, obtained by Fox News Digital, referenced recent press reports that the U.K.’s home secretary “served Apple with a secret order last month, directing the company to weaken the security of its iCloud backup service to facilitate government spying.” The directive reportedly requires the company to weaken the encryption of its iCloud backup service, giving the U.K. government the “blanket capability” to access customers’ encrypted files. 

    Reports further state that the order was issued under the U.K.’s Investigatory Powers Act 2016, commonly known as the “Snoopers’ Charter,” which does not require a judge’s approval. 

    “Apple is reportedly gagged from acknowledging that it received such an order, and the company faces criminal penalties that prevent it from even confirming to the U.S. Congress the accuracy of these press reports,” Wyden and Biggs note. 

    TULSI GABBARD SWORN IN AT WHITE HOUSE HOURS AFTER SENATE CONFIRMATION

    Tulsi Gabbard is sworn in as director of national intelligence by Attorney General Pam Bondi in the Oval Office at the White House on Feb. 12, 2025. (Andrew Harnik/Getty Images)

    The United Kingdom has been increasingly cracking down on British citizens for opposition commentary, especially online posts and memes opposing mass migration. As riots broke out in the U.K. last August after a mass stabbing at a Taylor Swift-themed dance event left three girls dead and others wounded, London’s Metropolitan Police chief warned that officials could also extradite and jail U.S. citizens for online posts about the unrest. 

    The letter, however, described the threat of China, Russia and other adversaries spying on Americans.

    Wyden, who sits on the Senate Intelligence Committee, and Biggs, who chairs a House Judiciary subcommittee on Crime and Federal Government Surveillance, asked Gabbard to “act decisively to protect the security of Americans’ communications from dangerous, shortsighted efforts by the United Kingdom (U.K.) that will undermine Americans’ privacy rights and expose them to espionage by China, Russia and other adversaries.” 

    The Washington Post was among the outlets to report about the U.K. order. 

    “These reported actions seriously threaten the privacy and security of both the American people and the U.S. government,” Wyden and Biggs wrote. “Apple does not make different versions of its encryption software for each market; Apple customers in the U.K. use the same software as Americans. If Apple is forced to build a backdoor in its products, that backdoor will end up in Americans’ phones, tablets, and computers, undermining the security of Americans’ data, as well as of the countless federal, state and local government agencies that entrust sensitive data to Apple products.” 

    The letter also references a Chinese hacking operation known as “Salt Typhoon.” Last year, the Biden White House admitted the Chinese hacked at least nine U.S. telecommunications companies. 

    Wyden during Gabbard confirmation

    Sen. Ron Wyden at the U.S. Capitol on Feb. 12, 2025. (Anna Moneymaker/Getty Images)

    “The Salt Typhoon hack of U.S. telephone carriers’ wiretapping systems last year – in which President Trump and Vice President Vance’s calls were tapped by China – provides a perfect example of the dangers of surveillance backdoors,” the letter says. “They will inevitably be compromised by sophisticated foreign adversaries and exploited in ways harmful to U.S. national security. As the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI confirmed last November, People’s Republic of China (PRC)-affiliated actors were involved in ‘copying of certain information that was subject to U.S. law enforcement requests pursuant to court orders.’” 

    TRUMP LANDS KEY TULSI GABBARD CONFIRMATION FOLLOWING UPHILL SENATE BATTLE

    “While the U.K has been a trusted ally, the U.S. government must not permit what is effectively a foreign cyberattack waged through political means. If the U.K. does not immediately reverse this dangerous effort, we urge you to reevaluate U.S.-U.K. cybersecurity arrangements and programs as well as U.S. intelligence sharing with the U.K.,” the letter says.

    Citing a December 2023 report by the U.K. Parliament’s intelligence oversight committee, the letter states that the U.K. benefits greatly from a “mutual presumption towards unrestricted sharing of [Signals Intelligence]” between the U.S. and U.K. and that “[t]he weight of advantage in the partnership with the [National Security Agency] is overwhelmingly in [the U.K.’s] favour.” 

    iPhone in UK store

    A display of Apple iPhone 16 handsets in an Apple store in central London, on Jan. 27, 2025. (Jason Alden/Bloomberg via Getty Images)

    “The bilateral U.S.-U.K. relationship must be built on trust. If the U.K. is secretly undermining one of the foundations of U.S. cybersecurity, that trust has been profoundly breached,” Wyden and Biggs wrote. 

    At her confirmation hearing, Gabbard stated that “backdoors lead down a dangerous path that can undermine Americans’ Fourth Amendment rights and civil liberties.” In written responses to senators’ questions, she also said, “mandating mechanisms to bypass encryption or privacy technologies undermines user security, privacy, and trust and poses significant risks of exploitation by malicious actors.”

    “We urge you to put those words into action by giving the U.K. an ultimatum: back down from this dangerous attack on U.S. cybersecurity, or face serious consequences,” Wyden and Biggs wrote.

    CLICK HERE TO GET THE FOX NEWS APP

    The letter asks Gabbard specifically whether the Trump administration was made aware of the reported order, either by the U.K. or Apple, prior to the press reports and, if so, when and by whom. They also ask what the Trump administration’s understanding is of U.K. law “and the bilateral CLOUD Act agreement with regard to an exception to gag orders for notice to the U.S. government.” Wyden and Biggs asked what the Trump administration’s understanding is “of its obligation to inform Congress and the American public about foreign government demands for U.S. companies to weaken the security of their products, pursuant to the CLOUD Act?” The letter asked that unclassified answers be provided by March 3. 

    Fox News Digital reached out to Apple and the White House regarding the letter, but neither immediately responded.

  • Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

    Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

    Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong. 

    While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device. 

    The issue also affects those downloading apps from the Google Play Store.

    STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    A person holding an iPhone. (Kurt “CyberGuy” Knutsson )

    How the malware works and what makes it different

    According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.

    One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.

    Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.

    The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

    Messaging app

    Messaging app in the App Store designed to lure victims.

    THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

    What’s being stolen, and who’s responsible?

    The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.

    The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.

    We reached out to Apple for a comment but did not hear back before our deadline. 

    App Store

    Messaging app in the App Store designed to lure victims. (Kaspersky)

    Apple’s response to screenshot-scanning malware discovered in App Store

    Apple has removed the 11 iOS apps mentioned in Kaspersky’s report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple’s policies, resulting in the termination of their developer accounts.

    Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library. 

    The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.

    In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    What Google is doing to stop malware 

    A Google spokesperson tells CyberGuy: 

    “All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.”

    However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Here’s why:

    What Google Play Protect can do:

    • Scans apps from the Google Play Store for known threats.
    • Warns you if an app behaves suspiciously.
    • Detects apps from unverified sources (sideloaded APKs).
    • Can disable or remove harmful apps.

    What Google Play Protect can’t do:

    • It does not provide real-time protection against advanced threats like spyware, ransomware or phishing attacks.
    • It does not scan files, downloads or links outside of Play Store apps.
    • It may miss malware from third-party app stores or sideloaded apps.
    • It lacks features like VPN protection, anti-theft tools and privacy monitoring.
    password

    Image of a person typing in their password on screen. (Kurt “CyberGuy” Knutsson)

    HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

    5 ways users can protect themselves from such malware

    1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android

    4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.

    5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities. 

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

    Kurt’s key takeaway

    The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    Apple’s Macs are generally considered more secure than Windows PCs, but they are not immune to hackers. Numerous incidents demonstrate that Macs are not impenetrable, and a new one has recently been added to the list. Security researchers have discovered a new variant of stealer malware that targets browser credentials, cryptocurrency wallets and other personal data. I reported on this malware in 2024 as well. Previously, it relied on macOS browser extensions to steal data. Now, it uses phishing websites and fake GitHub repositories to target Macs, which have a user base of 100 million people.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Enter the giveaway by signing up for my free newsletter.

    A person working on their Apple laptop (Kurt “CyberGuy” Knutsson)

    The evolution of info-stealer Mac malware

    Cybersecurity company Check Point has discovered a new variant of info-stealer malware, BanShee. Elastic Security Labs first highlighted this malware in mid-2024, noting that it operates as malware-as-a-service, a business model in which cybercriminals provide access to malicious software and related infrastructure for a fee. At that time, it was available for as much as $3,000 per month.

    Check Point says this malware evolved in September after being exposed. This time, its developers had “stolen” a string encryption algorithm from Apple’s own XProtect antivirus engine, which replaced the plain text strings used in the original version. Since antivirus programs expect to see this kind of encryption from Apple’s legitimate security tools, they weren’t flagged as suspicious, allowing the BanShee to remain undetected and quietly steal data from targeted devices.

    Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    A woman working on her Apple desktop and Apple laptop (Kurt “CyberGuy” Knutsson)

    4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

    How the Mac malware operates

    BanShee Stealer is a prime example of how advanced malware has become. Once it’s on a system, it gets straight to work stealing all kinds of sensitive information. It goes after data from browsers like Chrome, Brave, Edge and Vivaldi, as well as cryptocurrency wallet extensions. It even takes advantage of two-factor authentication (2FA) extensions to grab credentials. On top of that, it collects details about the device’s software and hardware, as well as the external IP address.

    The Mac malware also tricks users with fake pop-ups that look like real system prompts, tricking victims into entering their macOS passwords. Once it has gathered the stolen information, BanShee exfiltrates it to command-and-control servers, using encrypted and encoded files to ensure the data remains secure.

    The malware’s creators used GitHub repositories to spread BanShee. They set up fake repositories that looked like they hosted popular software, complete with stars and reviews, to seem trustworthy. These campaigns didn’t just target macOS users with BanShee. They also hit Windows users with a different malware called Lumma Stealer. Over three waves, the attackers used these fake repositories to trick people into downloading their malicious files.

    Mac malware mayhem as 100 million Apple users at risk of having personal data stolen

    A woman working on her laptop (Kurt “CyberGuy” Knutsson)

    MASSIVE SECURITY FLAW PUTS MOST POPULAR BROWSERS AT RISK ON MAC

    5 tips to protect yourself from Mac malware

    Follow these essential tips to safeguard your Mac from the latest malware threats, including the notorious BanShee Stealer.

    1) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    2) Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.

    3) Keep your software updated: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see my guide on keeping all your devices updated.

    4) Use strong and unique passwords: To protect your Mac from malware, it’s also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. A password manager can be incredibly helpful here; it generates and stores complex passwords for you, making them difficult for hackers to crack.

    It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you don’t have to remember them yourself. By reducing the number of passwords you need to recall, you’re less likely to reuse them, which lowers the risk of security breaches. Get more details about my best expert-reviewed password managers of 2025 here.

    5) Use two-factor authentication (2FA): Enable 2FA for your important accounts, including your Apple ID, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

    Kurt’s key takeaway

    No device is immune to cyberattacks when a human operator is involved. Take the BanShee Stealer, for example. It managed to target Macs not due to weak cybersecurity measures by Apple but because it successfully tricked users into installing it and granting the required permissions. Most breaches, hacks and other cyberattacks stem from human error. This highlights the importance of maintaining basic cybersecurity hygiene. It’s crucial to know what you’re downloading, ensure it’s from a trusted source and carefully review the permissions you grant to any online service or application.

    When downloading new software, how do you determine if it’s safe to install? Do you rely on app store ratings, reviews or something else? Let us know by writing us at Cyberguy.com/Contact.

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most asked CyberGuy questions:

    New from Kurt:

    Copyright 2024 CyberGuy.com. All rights reserved.

  • That Apple ID disabled message? It’s a dangerous scam

    That Apple ID disabled message? It’s a dangerous scam

    Let’s talk about something that’s been popping up in inboxes lately — those sneaky “Your Apple ID has been disabled” emails. 

    Like many people who’ve reached out to us, you might have gotten one that looks pretty legit, saying something like, “Your Apple ID has been temporarily disabled. Verify your Apple ID Information.” 

    Spoiler alert: It’s most likely a scam, and we’re going to break down why.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    Apple ID scam email. (Kurt “CyberGuy” Knutsson)

    The anatomy of the scam

    So, here’s how these tricksters operate. You get an email that looks totally legit with an Apple logo and creates a sense of urgency, claiming your Apple ID is in trouble. They’ll say something like, “If you do not verify your account within 48 hours, it will be permanently locked.” Yikes, right? That’s exactly what they want you to think. So, you’ll “Click the button below to verify as soon as possible.” They want you to click where it says, “Go to Apple ID.”

    Once you do that, you’re directed to a fake Apple website designed to look almost identical to the real one. This fraudulent site prompts you to enter your username, password and other sensitive information, which the scammers can then use to access your Apple account and potentially steal your personal data or make unauthorized purchases.

    apple id scam 2

    Apple ID scam email. (Kurt “CyberGuy” Knutsson)

    NEW CYBERATTACK TARGETS IPHONE AND APPLE IDS: HERE’S HOW TO STAY SAFE

    Let’s play detective and look at some red flags in these scam emails

    Urgent language: They’re trying to scare you into acting without thinking. Classic scammer move.

    Vague claims: “Missing or invalid information”? That’s purposely unclear to make you doubt yourself.

    Threats of lockout: Nothing like a good threat to get your heart racing, huh?

    Terms of service talk: They throw this in to sound official, but it’s just smoke and mirrors.

    Grammar goofs: Real Apple emails are polished. Scammers? Not so much.

    Fishy sender address: Always check if it’s actually from @apple.com (spoiler: it’s probably not). Any legitimate email from Apple will come from a domain ending in “@email.apple.com. As you can see from the scam email below, it’s from a fake email: mfrasier@wavecable.com, not Apple.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    apple id scam 3

    Apple ID scam email. (Kurt “CyberGuy” Knutsson)

    HOW TO SECURELY LOCK YOUR IPHONE AND IPAD FROM PRYING EYES

    Why are scammers after your Apple ID?

    You might wonder, “Why are these scammers so obsessed with Apple IDs?” Well, there are a few reasons:

    • iCloud goldmine: Your photos, contacts and documents are valuable for identity theft or blackmail.
    • Shopping spree potential: Stored payment info means they could go on a spending spree on your dime.
    • Financial account access: Many folks link their bank accounts to their Apple ID. Jackpot for hackers.
    • Dark web data deals: Your personal info can fetch a pretty penny in shady online marketplaces.

     5 THINGS TO DO FIRST IF YOU GOT A NEW MAC

    How to keep these scammers at bay

    To keep scammers at bay and secure your Apple ID, follow these comprehensive steps:

    1. Enable Two-Factor Authentication (2FA): This crucial security feature adds an extra layer of protection to your Apple ID. Set it up by going to Settings[your name] > Sign-In & Security on your iPhone or iPad, or Apple menuSystem Settings > [your name]Sign-In & Security on your Mac.

    2. Use strong passcodes: Opt for alphanumeric passcodes instead of simple PINs. When in public, use biometrics (Face ID or Touch ID) and be cautious when entering your passcode.

    3. Enable Stolen Device Protection: If you’re using iOS 17.3 or later, turn on this feature for additional security against theft.

    4. Keep software updated: Regularly update your operating system and apps to ensure you have the latest security patches.

    5. Don’t click on suspicious links, use strong antivirus software: If the email asks you to click a link, don’t do it right away. Hover over the link to see the actual URL. If it doesn’t look like an official Apple website (or any site you trust), don’t click it.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    6. Use a password manager: Generate and store strong, unique passwords for all your accounts by using a password manager.

    7. Enable Find My: Turn on Find My iPhone to help locate your device if it’s lost or stolen.

    8. Use a personal data removal service: Consider using a service that finds and removes your personal information from data broker sites. These services can help reduce your digital footprint, making it harder for scammers to obtain your data to target you in the first place. Look for a service that offers automated removals from hundreds of data aggregators and provides detailed verification of removals.

    While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

    9. Don’t click on suspicious links: If the email asks you to click a link, don’t do it right away. Hover over the link to see the actual URL. If it doesn’t look like an official Apple website (or any site you trust), don’t click it.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    apple id scam 4

    Apple ID scam email. (Kurt “CyberGuy” Knutsson)

    TOP PHONE CHARGING CABLES THAT WILL SUPERCHARGE YOUR APPLE DEVICES

    How Apple actually reaches out

    Apple will never email you asking for your password or threaten to lock your account. If there’s a real issue, you’ll usually get a notification on your trusted device or be asked to sign in to your Apple ID account page directly. Remember, Apple will never ask for your password via email, phone or text message. Always access your account through official Apple websites or apps.

    Kurt’s key takeaways

    These scammers are getting craftier, but with a bit of know-how and caution, you can keep your Apple ID (and all the good stuff connected to it) safe and sound. Remember, if something feels fishy, trust your gut. When in doubt, go straight to Apple’s official website or give their support team a call. Keep your digital life secure, and don’t let those scammers take a bite out of your Apple.

    CLICK HERE TO GET THE FOX NEWS APP

    Have you ever fallen victim to a digital scam, and what steps did you take to protect yourself afterward? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Pelosi discloses sales of Nvidia and Apple shares, purchase of Alphabet and Amazon

    Pelosi discloses sales of Nvidia and Apple shares, purchase of Alphabet and Amazon

    Former House Speaker Nancy Pelosi, D-Calif., reported several stock trades on Inauguration Day that were made in December and early January involving several of the world’s largest tech companies, an industry her husband Paul has traded in before. 

    Congressional stock trading disclosures, known as periodic transaction reports, cover trades made by both the member of Congress and a spouse.

    Ian Krager, a spokesperson for the former speaker, told FOX Business, “Speaker Pelosi does not own any stocks, and she has no prior knowledge or subsequent involvement in any transactions.”

    NANCY PELOSI’S HUSBAND SOLD MORE THAN $500K IN VISA STOCK AHEAD OF DOJ ACTION

    Pelosi’s disclosure showed the purchase of 50 call options for Alphabet, the parent company of Google, along with 50 call options for Amazon, according to her latest periodic transaction report filed with the clerk of the House of Representatives. 

    Both sets of call options have a strike price of $150 and were valued between $250,001 and $500,000. Call options give investors the right to buy shares of a company at a specific price.

    Ticker Security Last Change Change %
    AAPL APPLE INC. 223.83 +1.19 +0.53%
    NVDA NVIDIA CORP. 147.07 +6.24 +4.43%
    GOOGL ALPHABET INC. 198.37 +0.32 +0.16%
    AMZN AMAZON.COM INC. 235.01 +4.30 +1.86%

    The disclosure showed the sale of 10,000 shares of Nvidia along with 31,600 shares of Apple on Dec. 31. After the sale, Paul Pelosi bought 50 more Nvidia call options on Jan. 14 that had a strike price of $80 in a trade that was in the range between $250,000 and $500,000. He also exercised 500 call options for Nvidia on Dec. 20 that had a strike price of $12 and were due to expire that day. 

    That trade was in the range between $500,000 and $1 million.

    Former House Speaker Nancy Pelosi, D-Calif., reported new stock trades involving notable tech companies. (Chip Somodevilla/Getty Images / Getty Images)

    The former speaker’s disclosure also noted several other investments that occurred in the last month, including that 140 call options were exercised for 14,000 shares of Palo Alto Networks at a strike price of $100 that were due to expire Dec. 20 in a trade reported as being between $1 million and $5 million.

    Pelosi also disclosed the purchase of 50 call options of Tempus AI with a $20 strike price, as well as 50 call options of Vistra Corp. with a $50 strike price, on Jan. 14. The Vistra purchase was in the $500,000 to $1 million range, while Tempus was between $50,000 and $100,000.

    Ticker Security Last Change Change %
    VST VISTRA CORP 186.85 +1.41 +0.76%
    TEM TEMPUS AI 50.45 +2.81 +5.90%

    BIPARTISAN GROUP OF SENATORS REACHES AGREEMENT TO BAN LAWMAKERS FROM TRADING STOCKS

    Paul and Nancy Pelosi

    Former Speaker of the House Nancy Pelosi, D-Calif., and husband Paul Pelosi attend the Vanity Fair Oscars Party at the Wallis Annenberg Center for the Performing Arts in Beverly Hills, California, on March 10, 2024. (Michael Tran/AFP via Getty Images / Getty Images)

    Investments made by Paul Pelosi have attracted scrutiny amid mounting calls for members of Congress and their immediate family members to be banned from stock trading. 

    Ticker Security Last Change Change %
    V VISA INC. 323.54 -0.07 -0.02%

    Last fall, Paul Pelosi sold over $500,000 in Visa stock ahead of a Justice Department antitrust suit against the credit card giant. Earlier last year, an analysis estimated that he made the couple nearly $4 million in a six-month period off of Nvidia call options he bought in November 2023.

    Lawmakers’ spouses can trade in companies or industries their partner may help regulate, but it’s illegal for members of Congress and their family members to profit from inside information.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    Members of Congress on both sides of the political aisle have proposed legislation in recent years that would ban lawmakers and their family members from owning stock. Bipartisan bills to that end were developed in the Senate during the last Congress, but neither became law before the end of the 118th Congress, leaving the issue to the current Congress.

    FOX Business’ Breck Dumas contributed to this report.