Tag: hidden

  • How to spot a hidden GPS tracker on your car

    How to spot a hidden GPS tracker on your car

    The latest stats say 80% of stalking victims are tracked using tech. One of the most popular ways to do it? GPS trackers, like an AirTag. They’re small enough to slip into a bag, pocket or your car undetected.

    “Kim, this doesn’t impact me.” I wish that was true. Maybe you have an ex or friend who won’t buzz off, or maybe you met a stranger at a bar or store who was acting creepy. You’re at risk. Did you drive across the U.S. border? Yep, crooks are targeting tourists, too.

    Win an iPhone 16 Pro with Apple Intelligence ($999 value). 

    No purchase necessary. Enter to win now!

    The good news is your phone can alert you when an unknown tracker is with you. If all else fails, good old-fashioned sleuthing works, too. I’ll show you how.

    THE BIGGEST WI-FI MISTAKE YOU DIDN’T KNOW YOU WERE MAKING

    The clock is ticking

    An AirTag starts beeping only after 24 hours away from its owner. That gives the stalker plenty of time to reach you, especially if they’re local. If a carjacker tags your ride, they could learn your routine and follow you home before you even know what’s going on.

    The rumor mill says Apple’s AirTags 2, coming later this year, will have antistalking tech. With the most current AirTags, tech-savvy stalkers can rip out the built-in speaker so you won’t get alert, but the new ones should make it harder.

    For now, you need to do everything you can to stay safe.

    Apple AirTags, don’t come with antistalking tech quite yet. Other GPS trackers come with similar issues. Read more to see what you can do to protect yourself. (Melina Mara/The Washington Post via Getty Images)

    RELATED: AirTags aren’t just for creeps. I always toss one in my luggage.

    On your iPhone, make sure a few settings are enabled:

    • Open Settings > Privacy & Security > Location Services. From there, toggle on Location Services and Find My iPhone. Then, head to System Services and turn on Significant Locations.
    • Next, go to Settings > Bluetooth and toggle on Bluetooth.
    • Go to Settings > Notifications > Tracking Notifications and toggle on Allow Notifications.
    • Now, open your Find My app and tap Items at the bottom of the screen. Tap on Identify Found Item.

    5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER

    On Android, the process is similar as long as your phone is running Android 6.0 or newer. If it’s not, you really need a new phone!

    • Open Settings > Location and toggle on Use location, Wi-Fi scanning or Bluetooth scanning. Turn on Bluetooth by going to Settings > Bluetooth and toggling on Bluetooth.
    • To make sure alerts are enabled, go to Settings > Safety & Emergency > Find Unknown Tracker Alerts. Toggle on Allow Alerts.

    The alerts aren’t foolproof

    It’s not just ripping out the speakers. Older tracking devices might not set off an alert, and savvy creeps can reconfigure new trackers to follow you undetected for months. 

    Hacker

    Bad actors can easily use GPS trackers against you. Here’s how to check for these unwanted devices’ presence in your car and get rid of any you find. (iStock)

    That’s why it’s important to check your car now and then, even if you don’t hear that telltale beep. First, grab a flashlight and a mirror.

    • Start outside your car. Check spots where the tracker could be magnetically attached, like the wheel wells; grill; underside; bumpers; around the exhaust pipe, roof or hood; and the engine and battery terminals.
    • Inside your car, check the seat crevices and pockets, dashboard, steering wheel, glove compartment, and trunk. Look under the spare tire and dashboard on the driver’s side, too, inside the onboard diagnostics port.

    If you don’t find anything but still feel uneasy, try a bug detector. This well-rated option ($37) works for cars, homes, bags or whatever.

    Small hidden cameras are popular with creeps now, too. Here’s my guide on spotting cameras in a rental, dressing room, private space at the gym or anywhere else you expect privacy.

    I’M A TECH EXPERT: 10 AI PROMPTS YOU’LL USE ALL THE TIME

    ‘I found a tracker. What now?’

    Don’t smash it or disable it. You want to give the police all the info they need to catch whoever planted it. 

    First, hold your iPhone or NFC device to the white side of the AirTag. Tap that notification that pops up to see info about its owner. Jot down the serial number and phone number so you can share them with the cops.

    Apple AirTag

    Resist the temptation to destroy unwanted trackers if you find them – police need them to get valuable information on your stalker. ( James D. Morgan/Getty Images)

    Now, make an aluminum foil envelope. Wrap the tracker inside, making sure there are no gaps or holes. This will block any signals, so the person who installed it will just think it’s out of range. Take the foil-wrapped tracker to a police station. They’ll know how to pin down who put it there.

    Are you being stalked or just paranoid? It’s a fine line. Read this if you can’t shake that “someone’s watching” feeling.

    I’ve heard too many stories from stalking victims. I don’t want you or a loved one to be another. Share this with folks in your life.

    CLICK HERE TO GET THE FOX NEWS APP

    Get tech-smarter on your schedule

    Award-winning host Kim Komando is your secret weapon for navigating tech.

    Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

  • Fake job interview emails installing hidden cryptocurrency mining malware

    Fake job interview emails installing hidden cryptocurrency mining malware

    The job market hasn’t been great in the last few years, especially in tech, leaving a lot of people actively looking for jobs. 

    Scammers are taking advantage of this. They have come up with a new trick where they pretend to be recruiters to spread crypto miners on people’s devices. 

    It starts with an email inviting the person to schedule an interview for a job. But when they click the link, it installs a malicious app that secretly mines cryptocurrency. This app hijacks your PC’s resources, like the CPU and GPU, which slows down its performance significantly.

    I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

    A person typing on their laptop. (Kurt “CyberGuy” Knutsson)

    What you need to know

    This malicious campaign begins with an email that tricks victims into thinking it is part of a recruitment process, as reported by Dark Reading. In most cases, these emails are pretending to be from recruiters at the cybersecurity company CrowdStrike.

    The fraudulent email contains a link claiming to take the recipient to a site where they can schedule an interview. However, in reality, it redirects the victim to a malicious website that offers a download for a supposed “CRM application.”

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    The site provides download options for both Windows and macOS. Regardless of which option the victim selects, the download will be a Windows executable written in Rust. This executable then downloads the XMRig cryptominer.

    The executable performs several environmental checks to analyze the device and avoid detection. It scans running processes, checks the CPU and more. If the device passes these checks, the executable will display a fake error message while secretly downloading additional payloads needed to run the XMRig miner.

    fake interview email

    Fake CrowdStrike job application download. (CrowdStrike)

    HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

    How does a cryptominer affect your PC?

    A cryptomining app can significantly impact your PC’s performance. Once installed, it hijacks your computer’s resources, including the CPU and GPU, to secretly mine cryptocurrency. This process requires a lot of computational power, which can cause your system to slow down drastically. You might notice your computer becoming unresponsive, running hotter than usual, or consuming more power. 

    In some cases, prolonged use of cryptominers can also lead to hardware damage due to the increased strain on your components. Additionally, these miners often run in the background without your knowledge, making it harder to detect the issue until the damage is already done.

    CrowdStrike is aware of the scam and advises individuals to stay vigilant. “This campaign highlights the importance of vigilance against phishing scams, particularly those targeting job seekers. Individuals in the recruitment process should verify the authenticity of CrowdStrike communications and avoid downloading unsolicited files, the company said in a blog post

    “Organizations can reduce the risk of such attacks by educating employees on phishing tactics, monitoring for suspicious network traffic and employing endpoint protection solutions to detect and block malicious activity.”

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    people on laptops

    People working on their laptops. (Kurt “CyberGuy” Knutsson)

    BEWARE OF ENCRYPTED PDFS AS THE LATEST TRICK TO DELIVER MALWARE TO YOU

    5 ways to stay safe from job interview scams

    1. Check if you applied for the job: If you receive an unsolicited interview invitation, think back to whether you actually applied for that job or company. Scammers often target jobseekers randomly, hoping someone takes the bait. If you didn’t apply, it’s likely a scam. Always confirm directly with the company before proceeding.

    2. Verify recruiter credentials: Always double-check the recruiter’s details before responding to an email or clicking any links. Verify their email address, LinkedIn profile and company association. Legitimate companies will use official email domains, not free services like Gmail or Yahoo.

    3. Avoid downloading unsolicited files: Be cautious of emails asking you to download any files or applications. Legitimate recruitment processes rarely require you to install software. If unsure, contact the company directly to confirm the request.

    4. Inspect links before clicking: Hover over any links in the email to see their actual URL. Scammers often use URLs that mimic legitimate sites but have subtle differences. If a link looks suspicious, avoid clicking on it.

    5. Use strong antivirus software: Use strong antivirus or endpoint protection software to detect and block malicious downloads. Regularly update your security tools to ensure they can handle new threats effectively.

    The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

    Kurt’s key takeaway

    Cybercriminals always manage to come up with new ways to exploit people. While this particular scam is more focused on using your computer’s resources than stealing data, it is still very dangerous. It shows that if a hacker can easily install software on your PC, they can also go ahead and steal your financial information and other personal data. Always verify the emails you receive, and try not to download anything you don’t trust.

    Have you ever received a suspicious email that looked like a job offer? Let us know by writing us at Cyberguy.com/Contact

    CLICK HERE TO GET THE FOX NEWS APP

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.