0.7 C
New York
Friday, February 13, 2026
Home Blog Page 32

5 confusing phone terms explained in simple language for everyday users

0


NEWYou can now listen to Fox News articles!

Technology shouldn’t feel confusing or intimidating, especially when most of us are just trying to use our phones to stay connected, stay informed and stay safe.

The problem is that modern devices throw around terms that sound complicated, even when the concepts are actually pretty simple. Understanding just a few of these everyday phrases can make a huge difference in how confidently you use your phone.

Here are five key phone terms you’ll often see, along with what they really mean.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

HOW TO HELP OLDER RELATIVES WITH TECH OVER THE HOLIDAYS

Person using their iPhone.

Understanding common phone settings helps users stay safer, avoid scams and cut down on battery drain. (Photo by Silas Stein/picture alliance via Getty Images)

1) Background permissions

This refers to what an app is allowed to do when you’re not actively using it. Some apps continue running behind the scenes, checking your location, refreshing content or connecting to the internet, even after you’ve closed them.

Why it matters: If an app has background permission, it may: Use more battery, use more data, track your location or run when you’re not using it.

Examples:

  • A weather app checking your location every hour
  • A fitness app reading your steps even when closed
  • A shopping app accessing data when it shouldn’t

Where to check this on your phone:

On iPhone:

  • Go to Settings
  • Tap Privacy & Security
  • Choose Location Services, Microphone or Camera
  • Review which apps have access and set them to While Using the App instead of Always, or toggle permissions off entirely if the app doesn’t need that access in the background.

On Android:

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Security and Privacy
  • Click More privacy settings 
  • Tap Permission Manager
  • Select a category like Location or Camera

Adjust each app’s level of access to Allow only while using the app, Ask every time or Deny, depending on what it actually needs to function

2) Auto-join networks

Your phone remembers Wi-Fi networks you’ve connected to before, like stores, gyms, hotels, airports or even an old home router and reconnects automatically whenever it detects them again. The problem is that scammers can create look-alike networks with the same name, tricking your phone into joining without you noticing.

Why it matters: Auto-join saves data and speeds things up, but it also removes your control. Your phone could quietly connect to networks you no longer trust or to fake hotspots designed to steal logins, read unencrypted traffic or inject malicious content. Turning off auto-join for places you don’t use often keeps you safer from these silent, high-risk connections.

Examples:

  • Your phone reconnects to the “Airport Wi-Fi” months later
  • You join a café network once, and your phone keeps connecting every time you pass by
  • A fake “Starbucks Wi-Fi” network that tricks devices that auto-join

How to manage auto-join:

On iPhone:

  • Go to Settings
  • Tap Wi-Fi
  • Tap the (i) next to a network
  • Toggle off Auto-Join to stop automatic connections while keeping the network available for future use, like gyms, coffee shops, hotels and airports or choose Forget This Network if you want it gone entirely.

On Android: 

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Network & Internet
  • Tap Internet
  • Tap the gear next to the Wi-Fi network
  • Turn off Auto-connect (or Auto-reconnect on Samsung) to stop automatic connections while still keeping the network available when you choose to join it manually.

FIND A LOST PHONE THAT IS OFF OR DEAD

Person holding their phone.

Background permissions let apps run quietly behind the scenes and may use data or track location if not adjusted. (NIC COURY/AFP via Getty Images)

3) Push notifications

These are the pop-up alerts or banners you get from apps, even when those apps are closed. Some notifications are helpful (messages, alerts, reminders). Others just bombard you with ads or updates you don’t need.

Why it matters: Push notifications can keep you informed, but they also distract you, drain your battery, expose personal details on your lock screen and give apps a way to pull you back in with constant ads or engagement tactics. Managing them reduces noise and limits how much access apps have to your attention and data.

Examples:

  • Bank fraud alerts
  • Weather warnings
  • Sale notifications from a shopping app
  • Games trying to get you to come back

How to manage push notifications:

On iPhone:

  • Go to Settings
  • Tap Notifications
  • Scroll through apps one by one
  • Toggle off Allow Notifications for anything you don’t want

On Android:

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Notifications
  • Tap App Notifications
  • Turn off alerts for apps you no longer want to hear from

4) Security updates

These are small software updates designed specifically to fix vulnerabilities that scammers or hackers could exploit. They don’t add new features; they close holes. Skipping security updates leaves your device exposed. They run quickly, often in the background and keep your phone protected from the latest threats.

Why it matters: Security updates patch weaknesses before attackers can use them, and delaying them gives hackers more time to target your device. Installing them promptly helps block malware, stop data theft and keep your phone safe from new exploits that emerge every month.

Examples:
Patches that fix a flaw in your browser
Updates that stop malware from working
Protection against new phishing techniques

Where to find the security updates:

On iPhone

  • Go to Settings
  • Tap General
  • Tap Software Update
  • Install any available updates, including Security Responses & System Files if they appear

On Android

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Security and Privacy 
  • Tap Security Update, System & Updates or Updates 
  • Tap Security update 
  • Check for new patches

Click Install now or Schedule install

5) App Refresh (also known as Background App Refresh)

This is when apps update their content even when you’re not using them, refreshing news, updating emails, pulling in notifications or syncing data. It keeps apps “fresh,” but also drains more battery and uses more mobile data.

Why it matters:  Background App Refresh can quietly drain your battery, use mobile data and let apps run more often than they need to. Limiting it gives you more control over what apps do behind the scenes and reduces unnecessary tracking, resource use and surprise data charges.

Examples:

  • A news app updating headlines every few minutes
  • Email syncing continuously
  • A social media app is loading new posts in the background

How to manage App Refresh:

On iPhone

  • Go to Settings
  • Tap General
  • Tap Background App Refresh
  • Click Background App Refresh again
  • Turn it off entirely to stop all background activity, or choose specific apps that you want to allow refreshing.

APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

Man holding up his phone.

Security updates and app refresh tools protect devices by patching vulnerabilities and limiting unnecessary activity. (Eric Thayer/Bloomberg via Getty Images)

On Android

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Network & Internet or Connections
  • Tap Data Saver, or you might have to click Data Usage and then Data Saver 
  • Toggle on Data Saver to limit background activity

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

Tech terms don’t have to feel like a foreign language. Background permissions help you keep apps from accessing too much information. Auto-join networks show how your phone reconnects to Wi-Fi without asking. Push notifications explain why your phone keeps buzzing. Security updates keep your device protected from new threats. And App Refresh reveals why your battery might drain faster than you expect. Understanding these basics makes your phone safer, faster and easier to use.

What terms still confuse you? Send your questions to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
 

Copyright 2025 CyberGuy.com.  All rights reserved. 



Source link

Marjorie Taylor Greene says she will vote against the NDAA

0

NEWYou can now listen to Fox News articles!

Republican Rep. Marjorie Taylor Greene of Georgia announced Tuesday that she intends to vote against the proposed fiscal year 2026 National Defense Authorization Act, saying the legislation spends too much taxpayer money on foreign priorities. 

Greene said in a post on X that the NDAA is “filled with American’s hard earned tax dollars used to fund foreign aid and foreign country’s wars.”

Greene pointed to the rising national debt, which, according to fiscaldata.treasury.gov, is more than $38.39 trillion.

MTG DEFENDS HERSELF AS ‘AMERICA FIRST’ AFTER TRUMP SLAMS HER ON TRUTH SOCIAL

Rep. Marjorie Taylor Greene, R-Ga., talks with reporters after a meeting of the House Republican Conference at the Capitol Hill Club on Tuesday, Sept. 9, 2025. (Tom Williams/CQ-Roll Call, Inc via Getty Images)

“These American People are $38 Trillion in debt, suffering from an affordability crisis, on the verge of a healthcare crisis, and credit card debt is at an all time high. Funding foreign aid and foreign wars is America Last and is beyond excuse anymore. I would love to fund our military but refuse to support foreign aid and foreign militaries and foreign wars. I am here and will be voting NO,” Greene declared in her post.

But House Speaker Mike Johnson has praised the proposed NDAA.

REPUBLICANS ‘TERRIFIED’ TO STEP OUT OF LINE WITH TRUMP, GREENE SAYS IN CANDID INTERVIEW

“This year’s National Defense Authorization Act helps advance President Trump and Republicans’ Peace Through Strength Agenda by codifying 15 of President Trump’s executive orders, ending woke ideology at the Pentagon, securing the border, revitalizing the defense industrial base, and restoring the warrior ethos,” Johnson said in part of a lengthy statement.

MARJORIE TAYLOR GREENE SPARS WITH ‘60 MINUTES’ HOST OVER ‘ACCUSATORY’ QUESTIONS

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Greene plans to leave office early next month, in the middle of her two-year term.

Ancient 1,500-year-old reindeer trap discovered by archaeologists in Norway mountains

0

NEWYou can now listen to Fox News articles!

An ancient reindeer trap and weapons recently emerged from Norway’s melting mountains, surprising archaeologists and giving them a glimpse into mountain life 1,500 years ago.

The discovery, announced by the Vestland County Municipality on Nov. 10, was made on the Aurlandsfjellet plateau in Sogn, a remote region in western Norway. Archaeologists from the University Museum of Bergen and Vestland County worked together to document the site. 

The research began when a hiker noticed wooden logs near the melting ice and reported them to local authorities.

WARRIORS FOUND STACKED IN ANCIENT WELL REVEAL VIOLENT TALE OF BATTLEFIELD DEFEAT: ARCHAEOLOGISTS

The remains, it turns out, were a 1,500-year-old reindeer hunting facility, consisting of several hundred hewn wooden logs and two fences made of wooden stakes.

Officials also found iron spearheads, arrow shafts, parts of bows and a wooden spear — along with a massive number of well-preserved reindeer antlers.

Archaeologists recently uncovered a 1,500-year-old reindeer hunting trap on a Norwegian mountain plateau. (Thomas Bruen Olsen, Universitetsmuseet, UiB)

Speaking to Fox News Digital, archaeologist Leif Inge Ã…stveit said the entire facility came as a “significant surprise” to researchers.

“We have long been aware that stone trapping facilities existed in the mountains of Norway, but the fact that this facility is entirely constructed of wood was unexpected,” he said.

‘HUGELY EXCITING’ PREHISTORIC ARTIFACTS UNCOVERED DURING HUNT FOR LONG-LOST IRISH CASTLE

“Building this has been challenging,” he said. “Thousands of logs, weighing several tons in total, were transported high into the mountains.”

The facility was designed to lure reindeer into a pen. Ã…stveit said the barriers of the reindeer trap “stretched far out” into a funnel that measured as much as 1,000 feet wide.

“The antlers are incredibly well-preserved, still retaining a reindeer scent after 1,500 years.”

“The animals were likely calmly driven forward at first, but as they were funneled into a narrower area, their pace increased and panic may have spread through the herd,” he said.

“The barrier probably became more solid closer to the trapping pen, preventing any reindeer from breaking free. Eventually, the animals were clustered into a sluice-like enclosure, and then the animals would be extracted one by one.”

ANCIENT CHRISTIAN FIGURINES DISCOVERED IN 1,500-YEAR-OLD DESERT GRAVES

The spears that archaeologists found were used for this purpose. 

Researchers also found a pile of antlers that were collected and discarded. Most of them likely belonged to younger reindeer and females, while larger buck antlers were probably repurposed as items like combs and pins.

Man pointing at ancient facility, shot of reindeer antlers

The wooden trap system stretched across the mountainside, funneling animals into a narrow enclosure. (Thomas Bruen Olsen, Universitetsmuseet, UiB; Leif Inge Ã…stveit, Universitetsmuseet, UiB)

Remarkably, after 1,500 years, Åstveit said the antlers still smell like the animals that once bore them. 

“The antlers are incredibly well-preserved, still retaining a reindeer scent after 1,500 years,” he said. 

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“[They] are clustered only a few meters from the trapping pen, suggesting they were likely severed from the skull with an axe, as almost all have distinct cut marks.”

Oddly, no bones or skeletons have been found at the site so far. This suggests it was a “specialized” facility where animals were processed and transported, Ã…stveit said. 

Split image of man holding artifact, man holding long wooden spear

The trap was used for meat processing, the researchers believe, and likely supported a specialized operation. (Thomas Bruen Olsen, Universitetsmuseet, UiB.)

“Transporting such large quantities of meat — potentially tons — would undoubtedly have been a demanding task,” he said.

CLICK HERE FOR MORE LIFESTYLE STORIES

Another star find, Ã…stveit said, was a decorated oar made of pine, which he called a “major revelation.”

“What this oar, which clearly belonged to a rowboat located 1,400 meters lower in the landscape, is doing up here is a mystery,” he said.

“This finding is exceptionally rare and was selected as the ‘Find of the Year’ at the annual archaeology conference in Norway.”

“Our hypothesis is that it may have been used in the assembly of the guiding barriers … [but it] is also eye-opening to consider that an oar features such elaborate ornamentation. These people likely surrounded themselves with items that exhibited various artistic expressions and ornamentation.”

Archaeologists also found an axe-shaped clothing pin made of antler, which Ã…stveit said is “so well-preserved and sharp that it is entirely possible to sting yourself on it.”

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

He added, “Such items have not been found in Norway previously.”

Looking forward, Ã…stveit said future work won’t be a traditional excavation in the way most people imagine; rather, it will involve monitoring and documenting what emerges from melting ice.

Split image of spear, spear in stream, man looking at pile of debris

“Such items have not been found in Norway previously,” said an archaeologist. (Adnan Icagic, Universitetsmuseet, UiB; Leif Inge Ã…stveit, Universitetsmuseet, UiB)

“This finding is exceptionally rare and was selected as the ‘Find of the Year’ at the annual archaeology conference in Norway, despite very strong competition this year,” he said.

But Ã…stveit emphasized that much more research will need to be done on the subject, and archaeologists have only collected samples so far.

CLICK HERE TO GET THE FOX NEWS APP

“This material will likely be vital for research at the University of Bergen in the near future,” he said.

“As new scientific methods emerge, it will undoubtedly provide new insights into various aspects of Early Iron Age society.”

Secret organ-harvesting ring uncovered in Nigeria after surveillance

0

NEWYou can now listen to Fox News articles!

An extensive organ-harvesting ring has been uncovered in Nigeria after weeks of covert surveillance, local officials have said.

In a statement shared on X, the Imo State Police Command said their investigation was launched after reports of a worrying spate of kidnappings near a hotel and mortuary in Ngor Okpala.

According to police, intelligence-led investigations went on to identify a man called High Chief Stanley Oparaugo, also known as “Morocco,” as the suspected leader of the criminal network and who is now on the run and wanted, per reports.

52 CATHOLIC SCHOOL STUDENTS IN NIGERIA KIDNAPPED BY GUNMEN IN LATEST ATTACK: REPORT

A man described as High Chief Stanley Oparaugo from the Jessy Best Hotel is now wanted.

Oparaugo is alleged to own Jessy Best Hotel in Ihitte Okwe and the nearby mortuary known as Ugwudi.

Police said victims were said to have been lured into the hotel before being robbed and abducted, with families also forced to pay ransom. 

Authorities said some people who paid never saw their loved ones again.

The Command said abducted victims were then taken from the hotel to the mortuary, where they were allegedly killed and their organs harvested for sale.

GUNMEN ATTACK CHURCH IN NIGERIA, KILLING TWO AND KIDNAPPING OTHERS

Ngor Okpala

Local Nigerian officials said a suspected secret organ-harvesting ring has been uncovered in Nigera following weeks of covert surveillance. (Imo State Command.)

When officers raided the Jessy Best Hotel, it was abandoned, but at the mortuary they found decomposed and mutilated corpses.

Police spokesperson Henry Okoye said more than 100 bodies had been found.

“A hotel and a private mortuary owned by the suspect, allegedly used by kidnappers and violent criminals, were inspected,” he said in a statement.

TRUMP ADMIN TARGETS ANTI-CHRISTIAN VIOLENCE WITH NEW VISA CRACKDOWN POLICY FOLLOWING NIGERIA ATTACKS

Nigeria

Victims were allegedly lured to hotel before being killed at nearby mortuary for organ sales.

“At the mortuary, decomposed and mutilated corpses were discovered in unhygienic conditions, raising suspicions of illegal organ-harvesting activities.”

He added that the suspect’s residence was also searched and “crucial exhibits” were recovered, with forensic teams documenting evidence for the ongoing investigation.

Maximum security has been deployed along the Owerri–Aba Expressway. The Command assures travelers during the holidays of its commitment to their safety,” he added.

Nigeria has seen a rising amount of crime with kidnappings and abductions. 

As reported by Fox News Digital, the government of Nigeria also secured the release of the 100 schoolchildren who were abducted, according to local media.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Those children were taken from St. Mary’s School in Papiri, Niger state, on Nov. 21. 

The news came as Christians face ongoing persecution in Nigeria, leading President Donald Trump to declare the West African nation a “country of particular concern.”

Norovirus outbreak hits AIDAdiva cruise ship, sickening nearly 100 passengers

0

NEWYou can now listen to Fox News articles!

The U.S. Centers for Disease Control and Prevention (CDC) has confirmed another norovirus outbreak aboard a cruise ship.

Aida Cruises’ AIDAdiva cruise ship was hit with a norovirus outbreak that sickened nearly 100 passengers during its Nov. 10–Dec. 16 voyage.

The cruise notified the CDC of the outbreak on Nov. 30, according to the agency’s report.

CDC REPORTS 19TH CRUISE SHIP NOROVIRUS OUTBREAK THIS YEAR, AFFECTING PASSENGERS AND CREW

The vessel departed from Hamburg, Germany and was heading to England, the U.S., Mexico, and Costa Rica, according to CruiseMapper.

Ninety-five passengers and six crew reported diarrhea and vomiting, the CDC’s data shows.

Aida Cruises’ AIDAdiva was hit by a norovirus outbreak during its almost month-long voyage, leaving nearly 100 passengers sick. (Krisztian Bocsi/Bloomberg)

Over 2,000 passengers, plus 640 crew members, were on board.

In response to the outbreak, Aida Cruises said it increased cleaning and disinfection efforts across the ship. It also isolated sick passengers and crew, and collected stool samples for testing.

NOROVIRUS SICKENS OVER 200 CRUISE SHIP PASSENGERS ON MONTH-LONG VOYAGE

“Seasonal illness peaks between November and April, and the AIDAdiva report reflects infection patterns on land,” an AIDA spokesperson told USA TODAY. 

“Therefore, we’ve added more hygiene protocols onboard, and cases are already going down.”

A large cruise ship, decorated with a painted mouth and eye, moves across the ocean.

Ninety-five passengers and six crew members reported symptoms, according to CDC data. (iStock)

The cruise line also consulted with CDC Vessel Sanitation Program officials about sanitation procedures and case reporting.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Scott Weisenberg, M.D., medical director of the NYU Langone Infectious Disease Associates and the NYU Travel Medicine Program, previously told Fox News Digital that the virus is highly contagious — and that it can spread quickly in crowded settings such as cruise ships.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“If people have acute vomiting, they should avoid public areas, since even if they don’t touch anything, the virus can spread through the air,” he said.

Large AIDA cruise ship departing a harbor as people watch and take photos from the waterfront promenade.

As a result of the outbreak, enhanced sanitation measures were implemented on board, along with isolating those who became ill. (Krisztian Bocsi/Bloomberg)

Weisenberg also noted that proper hygiene plays a key role in preventing transmission. Shared surfaces can easily become contaminated, putting anyone who touches them at risk of infection.

He added that washing hands with soap and water offers better protection than using alcohol-based sanitizers.

CLICK HERE FOR MORE LIFESTYLE STORIES

This latest incident adds to a growing number of norovirus outbreaks reported on cruise ships this year.

There have now been a total of 21 outbreaks, according to the CDC.

CLICK HERE TO GET THE FOX NEWS APP

Fox News Digital reached out to Aida Cruises for comment.

Criminals test stolen data by opening deposit accounts in your name

0



couple looks at bills

NEWYou can now listen to Fox News articles!

Identity theft now hits people in sneaky ways. Criminals no longer stop at credit cards or loans. They test stolen personal data by applying for deposit accounts under your name, which confuses many victims and leaves them unsure how to respond. Brian in Clinton, Pennsylvania recently experienced this twice in the same week. Here is the email he sent us:

“I was recently notified by two different banking institutions that someone completed an online application to open a deposit account in my name. Both banks denied the applications and sent me notifications. One bank sent an email and the other sent a letter. Neither bank will share any information with me about what information was submitted or why the applications were denied. I understand why fraudsters try to open credit accounts, but why would they try to open deposit accounts? One bank told me they could not share any information with me about the failed application due to privacy policy and the other bank said they do not save any information from declined applications from non-customers. 

Why would banking institutions not capture or share information about declined online applications? As far as I know, the credit bureaus do not collect information about deposit accounts and Early Warning Services only has information from banks that voluntarily report to them. So, how do I respond or react to someone trying to open deposit accounts in my name? I have put a one year fraud alert on with the credit bureaus but I don’t believe that will help me if someone tries to open a deposit account. Any help or advice would be greatly appreciated. Thanks.”  Brian, Clinton, PA

You are right to take this seriously. Deposit account fraud is rising fast as criminals build synthetic identities and test stolen data. When thieves apply for a checking or savings account in your name, they are gathering information about which stolen identities work and which fail. That gives them room to launch more damaging attacks later.

LANDLINE IDENTITY THEFT LEADS TO MAJOR BANK FRAUD

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Why criminals open deposit accounts

Criminals use deposit accounts for several strategic reasons that help them test stolen data and prepare bigger attacks.

Testing stolen data

Fraudsters often begin with deposit accounts because the approval process can be less tied to credit checks. They want to see if your data passes early verification steps.

Moving stolen money

A new deposit account helps criminals launder funds or receive payments linked to scams, unemployment fraud or tax refund theft.

Setting up future attacks

Once they confirm your identity can be used, they may open credit lines or build a synthetic profile that blends your real data with fake details.

Why banks won’t share details

Banks follow strict privacy rules under federal law. Those rules limit the information they can share about any application, even when it misuses your identity. Many banks:

  • Purge declined applications fast to reduce their exposure to unnecessary data
  • Use external verification services that store the data outside the bank
  • Require subpoenas before releasing IP addresses to law enforcement

Even though an IP address can help identify a fraudster, banks will not share it without a legal request tied to an active investigation.

How to protect yourself from deposit account fraud

Take these actions now to lock down your identity and reduce the chances that a criminal can misuse your information again.

 1) Consider identity monitoring

Deposit account fraud often falls outside normal credit monitoring. A service that looks at bank accounts and dark web activity adds extra protection. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

2) File an FTC Identity Theft Report

Go to IdentityTheft.gov and complete the report. It creates a formal record you can use if you need to file a local police report later.

3) Add stronger alerts or freezes

Brian, you already placed a one-year fraud alert, but you can upgrade to a seven-year alert. You can also freeze your credit at Equifax, Experian and TransUnion to stop new credit lines from opening.

4) Use a data removal service

A data removal service scrubs your personal details from people search sites that criminals often use to build synthetic identities. This reduces how much of your information can be exploited in future attacks.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

5) Check ChexSystems and Early Warning Services

These companies track deposit account activity. Request your reports at chexsystems.com and earlywarning.com. Look for unauthorized entries and add a security alert or freeze to both.

6) Notify the banks

Even if they cannot share details, ask them to document the attempt on your record. This helps flag future fraud attempts.

7) Watch your mail

Look for debit cards, 1099 forms or bank statements you did not request. Those often reveal when criminals succeed somewhere else.

Next steps

Print every letter or email from the banks. Complete the FTC report and use it if you need to file a police report. Review your ChexSystems and Early Warning reports and add freezes where possible so your identity becomes less useful to criminals.

Kurt’s key takeaways

Deposit account fraud feels confusing because it works outside traditional credit systems. Yet the goal is simple. Criminals want to see which stolen identities pass early checks so they can launch larger attacks later. A few fast steps can shut that door and give you control again.

What other questions do you want us to tackle about identity theft and online banking safety? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.



Source link

Study links early smartphone use to depression, obesity in kids under 12

0


NEWYou can now listen to Fox News articles!

Parents everywhere wrestle with one big question. What is the right age to let a child have a smartphone?

Tweens ask for one long before many adults feel ready. At the same time, researchers keep sounding alarms about how early access may shape health and behavior. Now, a large new study gives parents even more to think about.

Published in Pediatrics, the research tracked more than 10,500 children in the national Adolescent Brain Cognitive Development Study. It found strong links between early smartphone ownership and higher odds of depression, obesity and insufficient sleep by age 12. The earlier kids got a phone, the greater their risk.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

What the study reveals about early smartphone ownership

The study compared 12-year-olds who owned smartphones with those who did not. Kids with phones were more likely to show signs of depression, carry extra weight and sleep less than their peers without devices. Researchers noted that these patterns held even after accounting for income, neighborhood, parental monitoring and other factors.

TEENS TURNING TO AI FOR LOVE AND COMFORT

A boy holds a smartphone horizontally.

Parents can lower these risks by delaying devices, setting limits and keeping phones out of bedrooms at night. (Kurt “CyberGuy” Knutsson)

They also looked at children who still did not own a phone at age 12. One year later, those who had finally received one showed more mental health concerns and worse sleep than those who still did not have a device. These shifts happened quickly, which raised concerns about how powerful the change can be.

Lead author Dr Ran Barzilay explained that parents should treat the decision like a real health milestone. A device changes how kids sleep, move and socialize. That combination may create more strain for a 12-year-old than for a 16-year-old who has more maturity and self-regulation.

Why age matters more than many parents expect

The research shows an association, not a direct cause. Yet the patterns match earlier findings. Kids with smartphones often stay up later, scroll more and move less. That mix can disrupt physical health and emotional well-being. Adolescence is a sensitive stage when small shifts in sleep or mood can have long-lasting effects.

Experts also pointed out how nearly every teen now has smartphone access. That makes the decision even harder for families who want to delay. Still, researchers say the data is strong enough to guide parents toward waiting when possible. Parents do not need perfect evidence to choose a slower timeline.

Pediatric mental health experts warn that a smartphone is not a simple tool. It opens the entire internet with no natural limits. Families need clear rules and protections and those steps require real work from adults. Many parents feel pressure to hand over a device early, yet the expert urged families to trust their instincts when deciding the timing.

The sleep connection families cannot ignore

Most experts agree that phones disrupt sleep. A large share of preteens keep devices in their bedrooms, which leads to late-night scrolling and overnight notifications. Even the glow of the screen can make it harder to fall asleep.

Researchers who study adolescent sleep and screen habits have found that many 11 to 12-year-olds keep devices within reach at night, and a notable share report being awakened by notifications. Experts in this field urge parents to move phones out of bedrooms overnight because better sleep can reduce some of the risks tied to early smartphone access.

EVEN THE FUTURE KING DISCOVERS SMARTPHONES ARE A ROYAL PAIN FOR KIDS AND PARENTS

Boy looks at an iPhone

Researchers found that kids who got phones sooner showed more mental health strain within a year. (Matt Cardy/Getty Images)

The challenge is consistency. Many parents struggle to set rules when screens support school work, friendships and safety. Yet researchers stress that even one boundary, like no phones in bedrooms, can protect sleep and reduce stress.

How parents can use this information right now

No one wants to shame parents who already gave their kids a phone. Many families made the decision for safety or communication needs. The study does not claim that every early smartphone user will face health issues. It simply highlights patterns worth considering before making the call. Parents can use these insights to create a healthier plan.

1) Delay smartphones until children show readiness

Readiness is more than age. Look for consistent responsibility with chores, schoolwork and device-free rules on other screens.

2) Set clear family rules for screen time

Kids follow rules when they understand why they exist. Set limits that work for your household and adjust them as schedules and needs change.

3) Keep devices out of bedrooms at night

Nighttime use and notifications interrupt sleep. A “charging station” in the kitchen or living room solves this fast.

4) Talk often about online safety and emotional well-being

Short regular check-ins work better than one long conversation. Keep the tone open and supportive.

5) Use parental controls and app limits

Cell phones give parents straightforward tools to manage what kids can see and when they can use their devices.

TEENS FACE NEW PG-13 LIMITS ON INSTAGRAM

How to set healthy limits on an iPhone 

Set downtime

  • Open Settings
  • Tap Screen Time
  • Select Downtime
  • Toggle on Scheduled 
  • Scroll down and set a schedule where only essential apps are allowed

Use app limits

  • Go to Settings
  • Tap Screen Time
  • Select App Limits
  • Tap Add limit to set daily time limits for social apps, videos and games
  • Click Next and set the Time and Customize Days
  • Click the Check Mark in the upper right-hand corner

Restrict adult content

  • Open Settings
  • Tap Screen Time
  • Select Content & Privacy Restrictions
  • Turn on Content & Privacy Restrictions
  • Tap App Store, Media, Web & Games
  • Select Web Content
  • Select Limit Adult Websites

How to set healthy limits on Android 

Set digital wellbeing limits

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Digital Wellbeing & parental controls
  • Select Dashboard
  • Choose an app
  • Tap App Timer and set a daily limit

Enable Google Family Link

Settings may vary depending on your Android phone’s manufacturer

  • Open the Family Link app on the parent device
  • Add your child’s Google account
  • Set app approvals
  • Restrict content through Filters on Google Play
  • Enable location and activity reports

Turn on SafeSearch (blocks explicit results in Google Search)

Settings may vary depending on your Android phone’s manufacturer

  • Open the Google app or go to google.com
  • Tap your profile photo
  • Select Settings
  • Tap SafeSearch
  • Turn on Filter explicit results

Strengthen browser protection in Chrome

Settings may vary depending on your Android phone’s manufacturer

  • Open Chrome
  • Tap the three dots
  • Select Settings
  • Tap Privacy and security
  • Select Safe Browsing
  • Choose Enhanced protection
  • Click the Left arrow to exit.

Experts who study youth mental health stress that the point is not fear. It is preparation. Thoughtful rules, controlled access and earlier boundaries can reduce risks associated with early smartphone ownership. Small changes make a big difference when kids are still developing the habits that shape their health.

Pro tip: Add device protection

Kids download apps, click links and explore online spaces that can expose them to harmful content or scams. Strong antivirus software adds an extra layer of protection by blocking risky sites and unsafe downloads. It helps keep their device safer while you work on healthy screen habits.

The best way to safeguard your kids’ devices from malicious links that install malware, potentially accessing their private information, is to have strong antivirus software installed on all their devices. This protection can also alert them to phishing emails and ransomware scams, keeping their personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your kids’ Windows, Mac, Android and iOS devices at Cyberguy.com.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Smartphones bring connection, opportunity and convenience. They also introduce stress distraction and real health challenges for younger users. Research keeps showing that age matters. A 12-year-old may not be built for the same digital world that a 16-year-old can handle with more confidence and self-control. Families do not need guilt. They need facts and support so they can choose what fits their values. As more data arrives, the message grows clearer. Slowing down may give kids the best chance to thrive online and off.

At what age do you think is right for a first smartphone? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.  



Source link

Treasure hunter finds Jesus figurine, nearly 1,000 years old, in windswept Norway field

0

NEWYou can now listen to Fox News articles!

A metal detectorist in Norway recently found a striking depiction of Jesus Christ in a grassy meadow — a gilded figure that dates back nearly 1,000 years.

Kim Erik Dybvik, the hobbyist who found the artifact, uncovered it on Nov. 1 in a field in Ã…ndalsnes, a coastal town about 260 miles northwest of Oslo.

The figurine, which dates to around 1100 A.D., was found on All Saints’ Day, the Christian holy day that honors all martyrs and saints.

ARCHAEOLOGIST UNCOVERS ‘COMPELLING EVIDENCE’ OF TRUE LOCATION WHERE JESUS TURNED WATER INTO WINE

Photos of the discovery show the weathered figurine depicting Jesus on the cross, still bearing remnants of gilding and fine detail on its torso.

Dybvik told Fox News Digital he became interested in metal detecting as a child while living on a remote islet in Norway, where his father worked as a lighthouse keeper. 

A metal detectorist in Norway recently found this striking depiction of Jesus Christ in a grassy meadow — a gilded figure that dates back nearly 1,000 years. (Kim Erik Dybvik)

“The fact that the island had volcanic origins sparked my curiosity about what rare rocks might lie underground — and whether it could be possible to find gold there,” he recalled. 

Though he wanted to become an archaeologist as a child, Dybvik ultimately pursued a career in healthcare, he said — but still lives out that childhood dream in his free time, searching for treasure across Norway.

Dybvik said he partnered up with a fellow metal detectorist named Warren Schmidt, an American expat, to travel across Norway searching for treasure. On Nov. 1, the two found numerous other artifacts before uncovering the figurine.

ARCHAEOLOGISTS REVEAL STRANGE INSCRIPTIONS IN ROOM OF THE LAST SUPPER IN JERUSALEM

“It was extremely windy — so windy that at times we struggled to stay on our feet,” Dybvik recalled.

“But we persevered. … We found 78 buttons, some coins, buckles, a medieval weight and a lot of the usual finds.”

“I had so many thoughts and emotions rushing through me.”

The star discovery emerged after sunset, when the two were ready to pack up and head home.

“Warren was almost at the car, and I was a bit behind, when I suddenly got a strong signal from my detector,” Dybvik said. “A strong signal usually indicates a large object and is often not a good sign — it can easily be trash.”

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“I bent down, and right beneath the surface, he revealed himself to me — I looked Jesus straight in the eyes.”

At the time, Dybvik said he was “completely stunned.”

Kim at site where figurine was found, close-up of figurine

Metal detectorist Kim Erik Dybvik uncovered the medieval figure on Nov. 1, during a windy day of searching near Ã…ndalsnes. (Kim Erik Dybvik)

“A hundred thoughts rushed through my head,” he said. “I quickly dismissed the idea that it could be modern — I recognized the medieval style and remains of gilding.”

He added, “I carefully set it down and ran to Warren, saying, ‘I want to share this moment with you — I may have just made my best find ever.’ Warren was also completely blown away.”

CLICK HERE FOR MORE LIFESTYLE STORIES

The situation, Dybvik said, was “magical and poetic” — and he said he experienced a glimpse of divinity.

“The wind was blowing, and in the background, a few hundred meters away, you could see a hill where an old church once stood,” he said. 

Car on field in dark, excavator at scene

The artifact was reported immediately to Norwegian authorities, as required for objects dated before 1537. (Kim Erik Dybvik)

“I had so many thoughts and emotions rushing through me.”

The detectorist promptly called experts and reported the find. In Norway, Dybvik said, all objects from before 1537 must be reported to authorities.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

The artifact was examined by field archaeologist Aaron Johnston. It is now being conserved under the supervision of county archaeologist Kristoffer Dahle, Dybvik noted.

The detectorist had found Viking-era artifacts in the past, including old silver coins, but he said a figurine of Jesus “was unheard of” in the area.

Split image of Kim holding coin, close-up of coin

Dybvik unearthed Viking relics before, including the silver coin shown above, but he said the Jesus figurine was unlike anything he’d ever seen. (Kim Erik Dybvik)

“I don’t think anything like it has ever been found in Norway before in this way,” he said.

As for the future of the figurine, Dybvik said he hopes it will eventually be put on display for others to see.

CLICK HERE TO GET THE FOX NEWS APP

“That’s why I am passionate about this — to help ensure that pieces of our cultural heritage can contribute to a clearer picture of who we are and where we come from,” he said.

Clyburn agrees with Michelle Obama that America is not ready for woman president

0

NEWYou can now listen to Fox News articles!

Rep. James Clyburn, D-S.C., said on Sunday that former first lady Michelle Obama was “absolutely correct” in claiming that America was not ready for a woman president.

“If you look at the history, we demonstrated that we were not ready,” Clyburn said on NBC’s “Meet the Press.” “These are incredible women who have run: Hillary Clinton, Kamala Harris, and I think that we are getting there. That’s why we can’t afford to turn the clock back. We’ve taken one, two and three steps forward and let’s not take two, three and four steps backwards which is what we are doing in these elections.”

Obama’s comments came last month while promoting her new book, “The Look,” where she cited former Vice President Kamala Harris’ 2024 presidential election loss to President Donald Trump as proof the country wasn’t “ready.”

BILL MAHER SWIPES MICHELLE OBAMA’S ‘BAD ATTITUDE’ FOR SAYING AMERICA ISN’T READY FOR A WOMAN PRESIDENT

Rep. James Clyburn, D-S.C., agreed with former first lady Michelle Obama on “Meet the Press.” (Tom Williams/CQ-Roll Call, Inc via Getty Images)

“As we saw in this past election, sadly, we ain’t ready,” she said. “That’s why I’m like, don’t even look at me about running, because you all are lying. You’re not ready for a woman. You are not.”

The former first lady went on to say that she did not believe men in America are comfortable with a woman leading them.

MICHELLE OBAMA SAYS SHE’LL ‘NEVER EVER’ CHANGE HER MIND ABOUT NOT RUNNING FOR OFFICE

“You know, we’ve got a lot of growing up to do, and there’s still, sadly, a lot of men who do not feel like they can be led by a woman, and we saw it,” Obama continued.

Michelle Obama speaks

Michelle Obama had previously said America wasn’t ready for a female president. (Michelle Obama YouTube channel)

Despite agreeing with Obama, Clyburn said that people shouldn’t stop the “pursuit” for a female president.

‘THE VIEW’ HOST REJECTS MICHELLE OBAMA’S CLAIM THAT COUNTRY NOT READY FOR FEMALE PRESIDENT

“My dad used to tell me all the time, ‘Son, the darkest part of the night is that moment just before dawn,’” Clyburn said. “And so we may be in a dark moment as it relates to women serving as president, but we may be in that moment just before dawn, where the woman will serve. And in order for that to happen, they have got to run. So I want women to run. I want to support them. I’m the father of three fantastic women. I want them to keep their pursuit and not give up on this country.”

Former First Lady Michelle Obama speaks on stage at the Democratic National Convention in Chicago.

Former first lady Michelle Obama speaks during the second day of the Democratic National Convention at the United Center in Chicago, Illinois, on August 20, 2024. (Chip Somodevilla/Getty Images)

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Fox News Digital reached out to Obama’s office for comment.

Fox News’ Landon Mion contributed to this report.

Ivy League schools face wave of data breaches including Harvard hit

0


NEWYou can now listen to Fox News articles!

Elite universities like Harvard, Princeton and Columbia spend fortunes on research, talent and digital infrastructure. Even then, they’ve become easy targets for attackers who see massive databases filled with personal information and donation records as a goldmine. Over the past few months, breaches across Ivy League campuses have exposed the same problem. These institutions handle huge amounts of sensitive data, but their internal defenses often don’t match the scale of what they store. That pattern brings us to Harvard’s newest incident, which exposed a database of alumni, donors, some students and faculty to hackers.

Sign up for my FREE CyberGuy Report

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

CHECK IF YOUR PASSWORDS WERE STOLEN IN HUGE LEAK

Harvard University building

Elite universities hold massive troves of personal and financial data that make them irresistible targets for attackers. (Photo by Aaron M. Sprecher/Getty Images)

A phone phishing attack unlocks Harvard’s data

Harvard confirmed that a database tied to alumni, donors, faculty and some students was accessed by an unauthorized party. This happened after a phone phishing attack tricked someone into giving the attacker a way into the system.

“On Tuesday, November 18, 2025, Harvard University discovered that information systems used by Alumni Affairs and Development were accessed by an unauthorized party as a result of a phone-based phishing attack,” the university said in a notification posted on its website. “The University acted immediately to remove the attacker’s access to our systems and prevent further unauthorized access.”

The exposed data includes personal contact details, donation histories and other records tied to the university’s fundraising and alumni operations. For Harvard, a school that routinely raises more than a billion dollars a year, this database is one of its most valuable assets, which makes the breach even more serious.

This is also the second time Harvard has had to investigate a breach in recent months. In October, it looked into reports that its data was caught up in a broader hacking campaign targeting Oracle customers. That earlier warning already showed that the school sits in a high-risk category. This latest breach only confirms it.

SCAMMERS NOW IMPERSONATE COWORKERS, STEAL EMAIL THREADS IN CONVINCING PHISHING ATTACKS

Someone typing code on a computer.

Harvard’s latest breach began with a phone phishing scam that let an intruder access a key alumni and donor database. (Jens Büttner/picture alliance via Getty Images)

Ivy League schools are in a growing crisis

Harvard isn’t alone here. Ivy League campuses have seen a wave of incidents that line up almost back-to-back. Princeton reported on November 15 that one of its databases tied to alumni, donors, students and community members was compromised.

The University of Pennsylvania said on October 31 that information systems connected to its development and alumni activities were accessed without permission. Columbia has been dealing with an even larger fallout. A breach in June exposed the personal data of roughly 870,000 people, including students and applicants.

These attacks show how universities have become predictable targets. They store identities, addresses, financial records and donor information. They also run sprawling IT systems where a single mistake, a weak password or a convincing phone call can create an entry point.

Hackers know this, and they strike repeatedly. The recent cluster of Ivy League breaches suggests that attackers are mapping these environments, looking for shared weaknesses that appear again and again.

NEW EMAIL SCAM USES HIDDEN CHARACTERS TO SLIP PAST FILTERS

Chinese hackers target US telecoms: What you need to know to protect your data

A wave of incidents across Ivy League campuses shows hackers are exploiting the same weaknesses again and again. (Kurt “CyberGuy” Knutsson)

7 steps you can take to protect yourself from such data breaches

You can’t stop a university or company from being breached, but you can make sure that your own information is harder to exploit. These steps help you reduce the fallout when your data ends up in the wrong hands.

1) Turn on two-factor authentication (2FA)

Using 2FA gives your accounts an extra layer of security. Even if someone steals your password in a breach, they still need the one-time code from your phone or authentication app. It blocks most casual attempts and forces attackers to work much harder.

2) Use a password manager

A password manager creates and stores strong, unique passwords for every site you use. This keeps one compromised password from unlocking everything else. It also removes the stress of remembering dozens of logins, so you don’t cut corners.

Next, see if your email has been exposed in past breaches. Our #1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

3) Reduce the personal info floating around

You can request takedowns from data broker sites, delete old accounts and trim what you share publicly. When your information isn’t scattered across the internet, attackers have a much harder time piecing together your identity.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

4) Be cautious with emails, texts and calls

Phishing doesn’t always come as obvious scam mail. Attackers spoof institutions, copy their tone, and pressure you into sharing details quickly. Slow down, verify the message through an official website or helpline, then decide.

The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

5) Keep your devices fully updated

Many attackers rely on old flaws in operating systems, browsers and apps. Regular updates patch these holes and shut down the most common attack paths. If you’re someone who delays updates, turning on automatic updates helps.

6) Separate your online identities

Use alias email addresses for banking, education, shopping and newsletters. If one of them gets exposed, it won’t automatically give attackers a map of your entire digital life. It makes targeted scams much harder to pull off, and also stops attackers from stealing your identity. By creating email aliases, you can protect your information and reduce spam. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches.

For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

7) Use an identity theft protection service

You might also want to consider an identity theft protection service to be on the safe side. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com

Kurt’s key takeaway

Harvard’s latest breach adds to a growing list of cyberattacks that show how vulnerable top universities have become. Even the most well-funded institutions aren’t keeping pace with modern threats. When a simple phone phishing call can open the door to sensitive data tied to donors, alumni and students, it’s clear that these campuses need stronger defenses and more proactive monitoring. Until that happens, you can expect more headlines like this and more investigations after the damage is already done.

Do you trust universities to protect the personal data you’ve shared with them? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com. All rights reserved.



Source link