3.5 C
New York
Friday, March 6, 2026
Home Blog Page 47

Phishing emails hide soft hyphens in subject lines to dodge security

0


NEWYou can now listen to Fox News articles!

Cybercriminals keep finding new angles to get your attention, and email remains one of their favorite tools. Over the years, you have probably seen everything from fake courier notices to AI-generated scams that feel surprisingly polished. Filters have improved, but attackers have learned to adapt. The latest technique takes aim at something you rarely think about: the subject line itself. Researchers have found a method that hides tiny, invisible characters inside the subject so automated systems fail to flag the message. It sounds subtle, but it is quickly becoming a serious problem.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

NEW SCAM SENDS FAKE MICROSOFT 365 LOGIN PAGES

Laptop with code on the screen.

Cybercriminals are using invisible Unicode characters to disguise phishing email subject lines, allowing dangerous scams to slip past filters. (Photo by Donato Fasano/Getty Images)

How the new trick works

Researchers recently uncovered phishing campaigns that embed soft hyphens between every letter of an email subject. These are invisible Unicode characters that normally help with text formatting. They do not show up in your inbox, but they completely throw off keyword-based filters. Attackers use MIME encoded-word formatting to slip these characters into the subject. By encoding it in UTF-8 and Base64, they can weave these hidden characters through the entire phrase.

One analyzed email decoded to “Your Password is About to Expire” with a soft hyphen tucked between every character. To you, it looks normal. To a security filter, it looks scrambled, with no clear keyword to match. The attackers then use the same trick in the body of the email, so both layers slide through detection. The link leads to a fake login page sitting on a compromised domain, designed to harvest your credentials.

If you have ever tried spotting a phishing email, this one still follows the usual script. It builds urgency, claims something is about to expire and points you to a login page. The difference is in how neatly it dodges the filters you trust.

Why this phishing technique is super dangerous

Most phishing filters rely on pattern recognition. They look for suspicious words, common phrases and structure. They also scan for known malicious domains. By splitting every character with invisible symbols, attackers break up these patterns. The text becomes readable for you but unreadable for automated systems. This creates a quiet loophole where old phishing templates suddenly become effective again.

The worrying part is how easy this method is to copy. The tools needed to encode these messages are widely available. Attackers can automate the process and churn out bulk campaigns with little extra effort. Since the characters are invisible in most email clients, even tech-savvy users do not notice anything odd at first glance.

Security researchers point out that this method has appeared in email bodies for years, but using it in the subject line is less common. That makes it harder for existing filters to catch. Subject lines also play a key role in shaping your first impression. If the subject looks familiar and urgent, you are more likely to open the email, which gives the attacker a head start.

How to spot a phishing email before you click

Phishing emails often look legitimate, but the links inside them tell a different story. Scammers hide dangerous URLs behind familiar-looking text, hoping you will click without checking. One safe way to preview a link is by using a private email service that shows the real destination before your browser loads it.

Our top-rated private email provider recommendation includes malicious link protection that reveals full URLs before opening them. This gives you a clear view of where a link leads before anything can harm your device. It also offers strong privacy features like no ads, no tracking, encrypted messages and unlimited disposable aliases.

For recommendations on private and secure email providers, visit Cyberguy.com

PAYROLL SCAM HITS US UNIVERSITIES AS PHISHING WAVE TRICKS STAFF

Hacker typing on a laptop.

A new phishing method hides soft hyphens inside subject lines, scrambling keyword detection while appearing normal to users. (Photo by Silas Stein/picture alliance via Getty Images)

9 steps you can take to protect yourself from this phishing scam

You do not need to become a security expert to stay safe. A few habits, paired with the right tools, can shut down most phishing attempts before they have a chance to work.

1) Use a password manager

A password manager helps you create strong, unique passwords for every account. Even if a phishing email fools you, the attacker cannot use your password elsewhere because each one is different. Most password managers also warn you when a site looks suspicious.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

2) Enable two-factor authentication

Turning on 2FA adds a second step to your login process. Even if someone steals your password, they still need the verification code on your phone. This stops most phishing attempts from going any further.

3) Install a reliable antivirus software

Strong antivirus software does more than scan for malware. Many can flag unsafe pages, block suspicious redirects and warn you before you enter your details on a fake login page. It is a simple layer of protection that helps a lot when an email slips past filters.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

4) Limit your personal data online

Attackers often tailor phishing messages using information they find about you. Reducing your digital footprint makes it harder for them to craft emails that feel convincing. You can use personal data removal services to clean up exposed details and old database leaks.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

AI FLAW LEAKED GMAIL DATA BEFORE OPENAI PATCH

Hacker using a computer.

Researchers warn that attackers are bypassing email defenses by manipulating encoded subject lines with unseen characters. (Photo by Lisa Forster/picture alliance via Getty Images)

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

5) Check sender details carefully

Do not rely on the display name. Always check the full email address. Attackers often tweak domain names by a single letter or symbol. If something feels off, open the site manually instead of clicking any link inside the email.

6) Never reset passwords through email links

If you get an email claiming your password will expire, do not click the link. Go to the website directly and check your account settings. Phishing emails rely on urgency. Slowing down and confirming the issue yourself removes that pressure.

7) Keep your software and browser updated

Updates often include security fixes that help block malicious scripts and unsafe redirects. Attackers take advantage of older systems because they are easier to trick. Staying updated keeps you ahead of known weaknesses.

8) Turn on advanced spam filtering or “strict” filtering

Many email providers (Gmail, Outlook, Yahoo) allow you to tighten spam filtering settings. This won’t catch every soft-hyphen scam, but it improves your odds and reduces risky emails overall.

9) Use a browser with anti-phishing protection

Chrome, Safari, Firefox, Brave, and Edge all include anti-phishing checks. This adds another safety net if you accidentally click a bad link.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaway

Phishing attacks are changing fast, and tricks like invisible characters show how creative attackers are getting. It’s safe to say filters and scanners are also improving, but they cannot catch everything, especially when the text they see is not the same as what you see. Staying safe comes down to a mix of good habits, the right tools, and a little skepticism whenever an email pushes you to act quickly. If you slow down, double-check the details, and follow the steps that strengthen your accounts, you make it much harder for anyone to fool you.

Do you trust your email filters, or do you double-check suspicious messages yourself? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Creating An Engaging Online Community Around Your Brand

0

Latest Blog from RPR Comando: “Creating An Engaging Online Community Around Your Brand”. Creating an engaging online community can turn casual customers into loyal advocates. It provides a space where your audience can interact not only with your brand but also with each other. #BookMarketing #VideoShorts #PressReleaseMarketing #RPRComando  This article originally appeared on https://rprcomando.com/creating-an-engaging-online-community-around-your-brand/

Press release marketing for brand visibility.
Creating An Engaging Online Community Around Your Brand 9
RPR Logo 1
Creating An Engaging Online Community Around Your Brand 10

Control background app activity on iPhone and Android mobile devices

0

NEWYou can now listen to Fox News articles!

Background activity can drain your battery and use your mobile data without you seeing it happen. Apps refresh in the background to keep content updated, which helps you pick up where you left off. The downside is that this constant activity can strain your battery and burn through your data plan. The good news is that you can limit when apps refresh and choose to let them update only on Wi-Fi.

We’ll walk you through how to switch Background App Refresh on iPhone to Wi-Fi only. You also get the Android steps so you can keep background activity in check on any device.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

ADAPTIVE POWER IN IOS 26 BOOSTS IPHONE BATTERY LIFE

Background App Refresh can drain battery and data by allowing apps to update when you’re not using them. (Kurt “CyberGuy” Knutsson)

Why this setting matters

Apps that update behind the scenes use data and power even when you are not opening them. When you switch the feature to Wi-Fi only, you slow down that background drain. It helps save mobile data. It can also help extend battery life because apps refresh less often.

What Background App Refresh does

Background App Refresh lets apps update content while you use other apps or leave your phone locked. When you return to an app, it is already refreshed and ready. That convenience comes with a cost. Each refresh uses data and battery power. By limiting this feature to Wi-Fi, you keep apps updated without using your mobile plan.

How to set Background App Refresh to Wi-Fi only on iPhone

Follow these steps:

  • Open Settings
  • Tap General
  • Tap Background App Refresh
  • Tap Background App Refresh again

Select Wi-Fi to limit updates to Wi-Fi connections

STOP FOREIGN-OWNED APPS FROM HARVESTING YOUR PERSONAL DATA

Multiple screenshots of the iOS settings app.

Switching Background App Refresh to Wi-Fi only helps iPhone users cut unnecessary data use. (Kurt “CyberGuy” Knutsson)

If you want to block background updates completely, choose Off in step 4. This stops apps from refreshing when you are not using them. It helps save battery, but it can delay updates when you open an app that needs new content before you can use it.

How to limit background activity on Android

Android does not use the exact name Background App Refresh, but it offers similar controls. You can restrict background data and background activity, which helps reduce data use and extend battery life.

Limit background data per app on Android 

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Network and Internet or Connections 
  • Tap Data usage
  • Tap Mobile data usage
  • Select an app
  • Turn Background data off so the app updates only on Wi-Fi

Limit background activity for battery on Android 

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Battery
  • Tap Battery usage
  • Choose an app
  • Tap Manage background activity
  • Turn Allow background activity off

Use Data Saver for extra control on Android

Settings may vary depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Network and Internet or Connections 
  • Tap Data Saver, or you might have to first tap Data usage and then Data saver
  • Turn the switch on to turn on Data Saver 

Data Saver blocks most apps from using background data unless you choose to allow them.

5 HIDDEN BATTERY DRAINERS YOU CAN FIX RIGHT NOW

Screenshot instructions on an iPhone.

Android users can restrict background data and activity to save battery and reduce mobile data consumption. (Kurt “CyberGuy” Knutsson)

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

Changing background refresh settings is one of the fastest ways to protect your battery and data. With a few quick steps, your phone runs more efficiently, and your apps use fewer resources. Whether you use an iPhone or an Android device, these settings help put you back in control.

What phone tips or frustrations should we look into for a future story? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com.  All rights reserved. 

Untouched Roman sarcophagus opened by archaeologists in Hungary after 1,700 years

0

NEWYou can now listen to Fox News articles!

Archaeologists have opened the lid on a rare, untouched Roman sarcophagus in Hungary — the first time it’s been opened in 1,700 years.

The tomb, discovered by archaeologists with the Budapest History Museum, was found in Óbuda, a northern district of Budapest.

Óbuda was known as Aquincum in Roman times, serving as a major settlement located on the banks of the Danube River. The tomb was found in a 3rd-century burial ground, among the ruins of abandoned houses.

MAN STUMBLES ACROSS HOARD OF PRICELESS COINS WHILE OUT FOR NATURE WALK: ‘FACE TO FACE WITH HISTORY’

Remarkably, the tomb hadn’t been opened by looters since it was buried. Its stone lid was secured by molten lead and metal clamps.

Lead archaeologist Gabriella Fényes stressed the undisturbed nature of the findings in comments to The Associated Press. 

Archaeologists in Budapest opened a rare Roman sarcophagus after it had been sealed for nearly 1,700 years. (Gabor Lakos, Budapest History Museum via AP)

“The peculiarity of the finding is that it was a hermetically sealed sarcophagus,” she said. “It was not disturbed previously, so it was intact.”

Inside was a complete skeleton and dozens of artifacts, including two glass vessels, bronze figures and 140 coins.

“They must have really loved who they buried here.”

Excavators deduced that the grave belonged to a young woman when they found a hairpin made of bone, amber jewelry and gold-threaded fabric.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

The items had been “given to the deceased by her relatives for her eternal journey,” Fényes said.

“The deceased was buried very carefully by her relatives,” she said. “They must have really loved who they buried here.”

Archaeologists standing near Roman tomb

The excavation team uncovered the untouched burial in Óbuda, offering a rare glimpse into Roman-era Aquincum. (Gabor Lakos, Budapest History Museum via AP)

Fényes added that she was “very touched by the care and expression of love that we were able to get a glimpse of.”

CLICK HERE FOR MORE LIFESTYLE STORIES

“Even now, I shudder to think how painful it must have been for the people at that time to bury this young lady,” she added.

Though archaeologists discovered eight other graves nearby, they were struck by the well-preserved condition of the woman’s tomb.

Curators examining the skul

Experts examined artifacts retrieved from the grave, including glass vessels, bronze figures and more than 100 coins. (AP photo/Bela Szandelszky)

Gergely Kostyál, a specialist in Ancient Rome and co-leader of the project, said the tomb’s contents “definitely make it stand out.”

“This probably means that the deceased was well-to-do or of a higher social status,” he told the AP.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“It is truly rare to find a sarcophagus like this, untouched and never used before, because in the 4th century it was common to reuse earlier sarcophagi,” he added. 

“It is quite clear that this sarcophagus was made specifically for the deceased.”

Archaeologists digging in grave's mud

“I suspect we could find jewelry,” Fényes said. (Gabor Lakos, Budapest History Museum via AP)

The grave also contained a thick layer of mud that may hold more treasures, Fényes said.

CLICK HERE TO GET THE FOX NEWS APP

“I suspect we could find jewelry,” she said. “We haven’t found any earrings or other jewelry belonging to the woman, so I hope that these small items will turn up during the sifting of the mud.”

The Associated Press contributed reporting.

TSA to charge $45 fee to any passenger without proper ID starting Feb. 1, 2026

0

NEWYou can now listen to Fox News articles!

The Transportation Security Administration (TSA) will begin charging passengers $45 if they show up at airport checkpoints without an acceptable form of identification, such as a passport or Real ID.

The policy will be implemented starting Feb. 1, 2026, following a proposed rule published in the Federal Register that noted a previous amount of $18.

After careful review, it was determined that the expenses for the new technology and operational costs were higher than originally projected, leading to an increase in the final fee, according to senior TSA officials.

NEW TSA POLICY MAY CHARGE PASSENGERS WHO DO NOT HAVE ACCEPTABLE IDS AT CHECKPOINTS

Travelers who do not have an acceptable form of identification will be able to go online to the TSA website to complete identification steps and pay the $45 fee.

The passenger then receives an email confirmation to present to the TSA officer prior to the checkpoint.

Passengers arriving at TSA checkpoints beginning Feb. 1, 2026, without proper identification will face a nonrefundable $45 fee, plus a verification process. (Ronaldo Schemidt /AFP via Getty Images)

The process is predicted to take between 10 and 15 minutes — but could take 30 minutes or longer.

The confirmation will be valid for 10 days from the day of travel, the TSA said. 

CLICK HERE FOR MORE LIFESTYLE STORIES

Senior TSA officials told Fox News Digital the fee is nonrefundable and is not guaranteed.

“Identity verification is essential to traveler safety, because it keeps terrorists, criminals and illegal aliens out of the skies and other domestic transportation systems such as rail,” said Adam Stahl of the TSA. 

TSA staffers check ID

Ninety-four percent of travelers show up to the airport with an acceptable form of ID. (Reuters)

If the TSA is unable to identify a passenger, that individual will not be able to fly, in order to keep the system safe.

CLICK HERE TO GET THE FOX NEWS APP

If a passenger is in the checkpoint line without an ID, that person will be removed from the queue to fill out the online verification process.

TSA agent checks a passenger ticket.

Senior TSA officials told Fox News Digital the fee is nonrefundable and is not guaranteed. (AP)

Ninety-four percent of travelers show up to the airport with an acceptable form of ID.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

Senior officials say they are working with airlines to help promote the effort in the booking process.

flight passengers at tsa checkpoint at san francisco airport

Officials at the TSA say they’re working with the airlines to help promote the new effort in the booking process. (David Paul Morris/Bloomberg via Getty Images)

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER  

The enforcement comes as Apple Wallet now stores digital passports for screening at 250-plus U.S. airports during domestic travel.

Costa Rica security alert issued to travelers over rental property break-ins, armed robberies

0

NEWYou can now listen to Fox News articles!

The U.S. Embassy San Jose has issued a security alert for Costa Rica.

The alert was issued on Nov. 25, citing reports of recent property crimes, financial crimes and robberies.

“Tourists have reported break-ins and armed robberies at Airbnbs and other rental properties,” the alert says. 

NEW ADVISORY SAYS ‘TERRORIST GROUPS MAY ATTACK’ IN POPULAR SUNNY DESTINATION

Nearly 3 million people visited Costa Rica in 2024, according to Instituto Costarricense de Turismo.

The alert adds that criminal gangs have forced travelers to withdraw large sums of cash from ATMs or by making bank transfers.

The U.S. Embassy San Jose has issued a security alert for Costa Rica, citing financial crimes, property crimes and robberies. (iStock)

“Do not display signs of wealth, such as wearing expensive jewelry or watches,” the Embassy advises.

Tourists are encouraged to avoid traveling alone, to stay vigilant when visiting banks or ATMs and to never leave valuables unattended in vehicles.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

When renting a car, tourists are told to “double check [that the] vehicle is locked.” The alert added that “thieves often use signal blockers to prevent vehicles from locking with key fobs.”

As for financial crimes, tourists are encouraged to set daily withdrawal limits from bank accounts, minimize funds kept in any one account and discuss security strategies with their banks ahead of any trips.

"Do not display signs of wealth, such as wearing expensive jewelry or watches," says a new alert for Costa Rica. 

“Do not display signs of wealth, such as wearing expensive jewelry or watches,” says a new alert for Costa Rica.  (iStock)

The warm paradise is known for its beaches, rainforests, wildlife and adventure activities.

CLICK HERE TO GET THE FOX NEWS APP

While all-inclusive resorts are popular, there are hundreds of rental properties available.

CLICK HERE FOR MORE LIFESTYLE STORIES

The alert tells tourists to research Airbnbs, rental properties and hotels in advance of trips. 

man soaking in costa rica view of water and rainforrest

Nearly 3 million people visited Costa Rica in 2024 alone. (iStock)

“Ensure the property has strong security measures, and keep doors and windows locked,” the advisory says.

TEST YOURSELF WITH OUR LATEST LIFESTYLE QUIZ

“Avoid properties with reviews that mention security incidents.”

The U.S. State Department has had a Level 2 travel advisory in place since Dec. 10, 2024.

Attractive couple lounging by the pool at a luxury resort

“Avoid properties with reviews that mention security incidents,” says the advisory to travelers.  (iStock)

“Petty crime is common throughout Costa Rica,” says the advisory justification. 

“Violent crime also affects tourists. This includes armed robbery, homicide and sexual assault.”

Scammers exploit Apple Support system to create convincing fake alerts

0


NEWYou can now listen to Fox News articles!

A new phishing scam is getting a lot of attention because it uses real Apple Support tickets to trick people into giving up their accounts. Broadcom’s Eric Moret shared how he nearly lost his entire Apple account after trusting what looked like official communication. He described the full experience in a detailed post on Medium, where he walked through the scam step by step.

This scheme stands out because the scammers relied on Apple’s own support system to make their messages look legitimate. They created an experience that felt polished and professional from the first alert to the final phone call. Here’s how the scam unfolded.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

THE #1 GOOGLE SEARCH SCAM EVERYONE FALLS FOR

iOS email app icon.

Scammers are exploiting real Apple Support tickets to trick users into handing over their accounts, experts warn. (Photo by STR/NurPhoto via Getty Images)

How the scam starts

Moret first received a flood of alerts. These included two-factor authentication notifications that claimed someone was trying to access his iCloud account. Within minutes, he got phone calls from calm, helpful callers who claimed to be Apple agents ready to fix the issue.

The twist is how convincing the entire setup felt. The scammers were able to exploit a flaw in Apple’s Support system that lets anyone create a genuine support ticket without verification. They opened a real Apple Support case in his name, which triggered official emails from an Apple domain. This built instant trust and lowered Moret’s guard.

How scammers gained access to the account

During a 25-minute call, the fake agents guided Moret through what they said would secure his account. They walked him through the steps to reset his iCloud password. They also told him a link would follow so he could close the case.

That link took him to a fake site called appeal apple dot com. The page looked official and claimed his account was being secured. It then told him to enter a six-digit code sent by text to finish the process.

When Moret entered that code, the scammers got exactly what they needed to sign into his account.

He then got an alert that his Apple ID had been used to sign into a Mac mini he did not own. That confirmed the takeover attempt. Even though the scammer on the phone said this was normal, he trusted his instinct. He reset his password again, which kicked them out and stopped the attack.

BEWARE FAKE CREDIT CARD ACCOUNT RESTRICTION SCAMS

Apple email app icon.

A Broadcom executive says he nearly lost access to his Apple ID after trusting a fraudulent support call that looked legitimate. (Photo by Jakub Porzycki/NurPhoto via Getty Images)

How to protect yourself from the Apple Support ticket scam

This type of scam works because it feels real. The messages look official, and the callers sound trained. Still, you can stay safer by watching out for signs that something is off.

1) Verify support tickets inside your Apple account

Scammers created a real-looking ticket to make the entire experience seem legitimate. You can confirm what’s real by checking directly with Apple. Sign in at appleid.apple.com or open the Apple Support app to view your recent cases. If the case number isn’t listed there, the message is fake, even if the email comes from an Apple domain.

2) Hang up and call Apple yourself

Never stay on a call that you did not initiate. Scammers rely on long conversations to build trust and pressure you into quick decisions. Hang up right away and call Apple Support directly at 1-800-275-2273 or through the Support app. A real agent will quickly confirm whether anything is wrong.

3) Check your Apple ID device list

If something feels off, look at the devices signed into your account. Go to Settings, tap your name and scroll to see all devices linked to your Apple ID. Remove anything you don’t recognize. This step can stop attackers fast if they’ve managed to get in.

4) Never share verification codes

No real support agent will ever ask for your two-factor authentication codes. Treat any request for these codes as a major warning.

5) Check every link carefully

Look closely at URLs. Fake sites often add extra words or change formatting to appear real. Apple will never send you to a site like appeal apple dot com.

SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS

Woman holding an Apple Macbook.

Criminals are using Apple’s own support system to generate real case emails that build false confidence with victims. (Photo by Fairfax Media via Getty Images via Getty Images)

6) Use strong antivirus software

Strong antivirus software can spot dangerous links, unsafe sites, and fake support messages before you tap them. Anti-phishing tools are especially important with scams like this one since the attackers used a fake site and real ticket emails to trick victims.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

7) Use a data removal service

Data brokers collect your phone number, home address, email, and other details that scammers use to personalize attacks. A data removal service can wipe much of that information from broker sites, which makes you a harder target for social engineering attempts like the one described in this article.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

8) Turn on strong multi-layer protection

Keep two-factor authentication (2FA) on for every major account.  This creates a barrier that quickly stops attackers.

9) Slow down before reacting

Scammers want you to panic. Pause before you act. Trust your instinct when something feels rushed or strange. A short delay could save your entire account.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

This scam shows how convincing criminals can be when they exploit real systems. Even careful users can fall for messages that look official and calls that sound professional. The best defense is to stay alert and take a moment before responding to anything unexpected. When you slow down, double-check support tickets, and never share verification codes, you make yourself far harder to fool. Adding layers like antivirus protection and data removal services also gives you more control over what attackers can access. These simple habits can stop even the most polished scams before they get to your accounts.

What would you do if you got a support call that felt real but didn’t seem right? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Podcasting As a Content Marketing Tool: Getting Started

0

Latest Blog from RPR Comando: “Podcasting As a Content Marketing Tool: Getting Started”. Podcasting As a Content Marketing Tool has taken the world by storm, transforming how we consume content. With millions of podcasts available across various platforms, it’s clear that people are hungry for authentic, engaging audio experiences. #BookMarketing #VideoShorts #PressReleaseMarketing #RPRComando  
This article originally appeared on https://rprcomando.com/podcasting-as-a-content-marketing-tool-getting-started/

Is This The Head of Your PR Department 1
Podcasting As a Content Marketing Tool: Getting Started 45
RPR Logo
Podcasting As a Content Marketing Tool: Getting Started 46

FoloToy restores AI teddy bear Kumma sales after addressing safety concerns

0


NEWYou can now listen to Fox News articles!

FoloToy paused sales of its AI teddy bear Kumma after a safety group found the toy gave risky and inappropriate responses during testing. Now the company says it has restored sales after a week of intense review. It also claims that it improved safeguards to keep kids safe.

The announcement arrived through a social media post that highlighted a push for stronger oversight. The company said it completed testing, reinforced safety modules, and upgraded its content filters. It added that it aims to build age-appropriate AI companions for families worldwide.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

TEXAS FAMILY SUES CHARACTER.AI AFTER CHATBOT ALLEGEDLY ENCOURAGED AUTISTIC SON TO HARM PARENTS AND HIMSELF

Photo of the FoloToy Teddy bear.

FoloToy resumed sales of its AI teddy bear Kumma after a weeklong review prompted by safety concerns. (Kurt “CyberGuy” Knuttson)

Why FoloToy’s AI teddy bear raised safety concerns

The controversy started when the Public Interest Research Group Education Fund tested three different AI toys. All of them produced concerning answers that touched on religion, Norse mythology, and harmful household items.

Kumma stood out for the wrong reasons. When the bear used the Mistral model, it offered tips on where to find knives, pills, and matches. It even outlined steps to light a match and blow it out.

Tests with the GPT-4o model raised even sharper concerns. Kumma gave advice related to kissing and launched into detailed explanations of adult sexual content when prompted. The bear pushed further by asking the young user what they wanted to explore.

Researchers called the behavior unsafe and inappropriate for any child-focused product.

FoloToy paused access to its AI toys

Once the findings became public, FoloToy suspended sales of Kumma and its other AI toys. The company told PIRG that it started a full safety audit across all products.

OpenAI also confirmed that it suspended FoloToy’s access to its models for violating policies designed to protect anyone under 18.

LAWMAKERS UNVEIL BIPARTISAN GUARD ACT AFTER PARENTS BLAME AI CHATBOTS FOR TEEN SUICIDES, VIOLENCE

Photo of an AI Teddy bear.

The company says new safeguards and upgraded filters are now in place to prevent inappropriate responses. (Kurt “CyberGuy” Knutsson)

Why FoloToy restored Kumma’s sales after its safety review

FoloToy brought Kumma back to its online store just one week after suspending sales. The fast return drew attention from parents and safety experts who wondered if the company had enough time to fix the serious issues identified in PIRG’s report.

FoloToy posted a detailed statement on X that laid out its version of what happened. In the post, the company said it viewed child safety as its “highest priority” and that it was “the only company to proactively suspend sales, not only of the product mentioned in the report, but also of our other AI toys. FoloToy said it took this action “immediately after the findings were published because we believe responsible action must come before commercial considerations.”

The company also emphasized to CyberGuy that it was the only one of the three AI toy startups in the PIRG review to suspend sales across all of its products and that it made this decision during the peak Christmas sales season, knowing the commercial impact would be significant. FoloToy told us, “Nevertheless, we moved forward decisively, because we believe that responsible action must always come before commercial interests.”

The company also said it took the report’s disturbing examples seriously. According to FoloToy, the issues were “directly addressed in our internal review.” It explained that the team “initiated a deep, company-wide internal safety audit,” then “strengthened and upgraded our content-moderation and child-safety safeguards,” and “deployed enhanced safety rules and protections through our cloud-based system.”

After outlining these steps, the company said it spent the week on “rigorous review, testing, and reinforcement of our safety modules.” It concluded its announcement by saying it “began gradually restoring product sales” as those updated safeguards went live.

FoloToy added that as global attention on AI toy risks grows, “transparency, responsibility and continuous improvement are essential,” and that the company “remains firmly committed to building safe, age-appropriate AI companions for children and families worldwide.”

LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

A child with the AI Teddy bear.

Safety testers previously found the toy giving risky guidance about weapons, matches and adult content.

Why experts still question FoloToy’s AI toy safety fixes

PIRG researcher RJ Cross said her team plans to test the updated toys to see if the fixes hold up. She noted that a week feels fast for such significant changes, and only new tests will show if the product now behaves safely.

Parents will want to follow this closely as AI-powered toys grow more common. The speed of FoloToy’s relaunch raises questions about the depth of its review.

Tips for parents before buying AI toys

AI toys can feel exciting and helpful, but they can also surprise you with content you’d never expect. If you plan to bring an AI-powered toy into your home, these simple steps can help you stay in control.

1) Check which AI model the toy uses

Not every model follows the same guardrails. Some include stronger filters while others may respond too freely. Look for transparent disclosures about which model powers the toy and what safety features support it.

2) Read independent reviews

Groups like PIRG often test toys in ways parents cannot. These reviews flag hidden risks and point out behavior you may not catch during quick demos.

3) Set clear usage rules

Keep AI toys in shared spaces where you can hear or see how your child interacts with it. This helps you step in if the toy gives a concerning answer.

4) Test the toy yourself first

Ask the toy questions, try creative prompts, and see how it handles tricky topics. This lets you learn how it behaves before you hand it to your child.

5) Update the toy’s firmware

Many AI toys run on cloud systems. Updates often add stronger safeguards or reduce risky answers. Make sure the device stays current.

6) Check for a clear privacy policy

AI toys can gather voice data, location info, or behavioral patterns. A strong privacy policy should explain what is collected, how long it is stored, and who can access it.

7) Watch for sudden behavior changes

If an AI toy starts giving odd answers or pushes into areas that feel inappropriate, stop using it and report the problem to the manufacturer.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com 

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

AI toys can offer fun and learning, but they can also expose kids to unexpected risks. FoloToy says it improved Kumma’s safety, yet experts still want proof. Until the updated toy goes through independent testing, families may want to stay cautious.

Do you think AI toys can ever be fully safe for young kids? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com.  All rights reserved. 



Source link

War Sec. Pete Hegseth posts meme of children’s book character blowing up boat

0

NEWYou can now listen to Fox News articles!

As the Trump administration conducts deadly strikes against alleged drug boats of narco-terrorists, War Secretary Pete Hegseth posted a meme depicting the children’s book series character Franklin firing a weapon at such a vessel.

“For your Christmas wish list…” Hegseth joked when sharing the fake book cover.

The meme shows the turtle character in a helicopter, firing what appears to be an RPG at one of the boats in the water below. The RPG fired by Franklin flies toward the vessel, where there is already an explosion occurring.

HEGSETH DEFENDS LETHAL STRIKES AGAINST ALLEGED DRUG TRAFFICKERS: ‘BIDEN CODDLED TERRORISTS, WE KILL THEM’

U.S. Secretary of Defense Pete Hegseth smiles during a press conference at the Dominican National Palace in Santo Domingo on Nov. 26, 2025 ( Felix Leon / AFP via Getty Images)

“Franklin Targets Narco Terrorists,” the title on the fake book cover reads.

Democratic Rep. Seth Moulton of Massachusetts, who is running for Senate, blasted Hegseth. 

WAR SECRETARY PETE HEGSETH SPENDS THANKSGIVING WITH US TROOPS IN LATIN AMERICA: ‘WE ARE GRATEFUL FOR YOU’

Rep. Seth Moulton

Rep. Seth Moulton, D-Mass., speaks during the U.S. Chamber of Commerce’s Global Aerospace Summit in Washington, D.C., on Wednesday, Sept. 10, 2025.  (Al Drago/Bloomberg via Getty Images)

“You’re a disgrace,” he wrote.

“There’s nothing Christian about war crimes,” former Rep. Justin Amash wrote in response to Hegseth’s post.

WAR SECRETARY HEGSETH DELIVERS THANKSGIVING MESSAGE TO TROOPS

War Secretary Pete Hegseth

U.S. Secretary of War Pete Hegseth stands prior to the NFL 2025 game between Detroit Lions and Washington Commanders at Northwest Stadium on Nov. 9, 2025 in Landover, Md. (Lauren Leigh Bacho/Getty Images)

CLICK HERE TO GET THE FOX NEWS APP

“As we’ve said from the beginning, and in every statement, these highly effective strikes are specifically intended to be ‘lethal, kinetic strikes.’ The declared intent is to stop lethal drugs, destroy narco-boats, and kill the narco-terrorists who are poisoning the American people. Every trafficker we kill is affiliated with a Designated Terrorist Organization,” Hegseth wrote in part of a recent post on X.