-1 C
New York
Sunday, February 15, 2026
Home Blog Page 71

Kido nursery data breach exposes 8,000 children’s personal information

0


NEWYou can now listen to Fox News articles!

Over the past few years, data breaches targeting schools, healthcare providers, and childcare services have been making headlines, exposing sensitive personal information and leaving families vulnerable. Now, a new breach has come to light that targets a nursery chain. Kido, which operates in the U.S., U.K., China and India, has reportedly had sensitive data stolen from thousands of children. Names, photos, addresses, birthdates, parental details and even safeguarding notes and medical records were allegedly accessed by a hacker group called Radiant.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

Computer monitors connected to wires display code.

The incident highlights how stolen data threatens not just privacy but also long-term child safety. (Kurt “CyberGuy” Knutsson)

What you need to know about nursery breach

According to reports, the hacker group Radiant claims to have stolen data related to around 8,000 children. To prove possession, they posted samples, including pictures and profiles of ten children, on a darknet website. They then issued a ransom demand, threatening to release more sensitive information unless Kido paid. In addition to targeting the nursery chain directly, Radiant reportedly called some of the children’s parents, pressuring them to push Kido into paying the ransom.

FBI WARNS ABOUT NEW EXTORTION SCAM TARGETING SENSITIVE DATA

When questioned about their actions, the group defended their tactics as a form of “penetration testing” for which they supposedly deserved compensation. This defense is misleading, as such testing requires explicit permission from the organization being targeted or participation in an official bug bounty program. Without that consent, these actions are illegal and deeply unethical.

A hacker types on a red, glowing keyboard.

Hackers exploited children’s data in the Kido breach, exposing families to serious risks. (Kurt “CyberGuy” Knutsson)

Why is this attack so disturbing?

The Kido breach is alarming for multiple reasons. First, it involves children’s data, which is particularly sensitive and legally protected in most countries. Second, the attackers combined traditional data theft with intimidation tactics, reaching out to parents directly. History suggests that once criminals gain access to such information, the attacks can escalate.

Breaches like this highlight how personal and digital security are intertwined. The potential misuse of data extends beyond simple identity theft. It can impact children’s safety, family privacy and long-term well-being. With attackers leveraging both the stolen data and psychological pressure on parents, the threat is particularly potent and long-lasting.

A hacker types in a code terminal on a MacBook.

Parents reported being directly contacted by attackers, showing how intimidation adds to the harm. (Kurt “CyberGuy” Knutsson)

7 steps parents can take to protect their child’s data

Even though the investigation into the Kido breach is ongoing, parents and schools can take immediate action to protect children’s data and reduce the risk of further exploitation. Here’s a detailed guide:

1) Monitor your child’s online accounts regularly

Log in to email, school portals and cloud storage accounts linked to your child. Look for unusual activity such as unrecognized logins, changes to passwords or new connected devices. Set up notifications for account activity whenever possible so you are alerted instantly if something suspicious happens.

2) Enable two-factor authentication (2FA) on all accounts

Adding 2FA creates an extra layer of security. Even if a hacker has a password, they won’t be able to access the account without the second verification step. Most email providers, school portals and messaging platforms support this, and it’s a simple step that dramatically improves security.

3) Consider a personal data removal service

Data broker sites often collect names, addresses and other personal details that hackers can use. Services that remove your child’s information from these databases can make it harder for attackers to find and exploit sensitive data.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com/Delete

Get a free scan to find out if your personal information is already out on the web: CyberGuy.com/FreeScan

THINK YOU’RE SAFE? IDENTITY THEFT COULD WIPE OUT YOUR ENTIRE LIFE’S SAVINGS

4) Use identity theft protection services

These services can continuously scan for your child’s personal information online and alert you if their data appears on suspicious websites or the dark web. This early warning allows you to take action before criminals attempt to exploit it.

Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

See my tips and best picks on how to protect yourself from identity theft at CyberGuy.com/IdentityTheft

5) Install antivirus software on all devices

A strong antivirus program protects devices from malware, phishing scams, and suspicious scripts. It is particularly important on devices that children use to access school portals or personal accounts. This ensures that if a hacker tries to use malware to get deeper access, it is blocked.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com/LockUpYourTech

6) Use a secure mail provider for sensitive communications

For communications with schools, healthcare providers or any service handling sensitive information about children, consider using an email service that offers strong encryption and built-in protection against spoofing. This makes it harder for attackers to impersonate a school or parent.

For recommendations on private and secure email providers that offer alias addresses, visit CyberGuy.com/Mail

7) Educate your children about online safety

Teach children not to share personal information online, including photos, addresses or school details. Encourage them to report anything suspicious and explain why it’s important to keep login information private.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaway

Data breaches targeting children are particularly concerning because they can have long-lasting consequences. The Kido incident is a stark reminder of the importance of proactive digital security measures for families. While organizations bear responsibility for protecting sensitive data, parents can take significant steps to monitor, secure and respond to potential threats.

Have you ever reviewed what personal information about your child is online? Let us know by writing to us at CyberGuy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Students turn Google Docs into chat rooms amid strict school phone bans

0


NEWYou can now listen to Fox News articles!

Across the country, schools are cracking down on cell phone use. At least 18 states have rolled out bell-to-bell bans, with New York calling phones “distraction devices.” Teachers are praising the shift, saying classes feel more focused. But teens? They’re not giving up so easily.

Students are sidestepping bans in the most millennial-inspired way possible, turning Google Docs into digital chat rooms. With laptops open, it looks like they’re working on assignments. In reality, they’re typing messages back and forth in real time, just like an old-school AOL chat room.

SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter  

A girl looks at her laptop.

Students secretly turn Google Docs into real-time chatrooms. (Kurt “CyberGuy” Knutsson)

A creative workaround for school cell phone bans

Parents and teachers admit the workaround is clever. One teacher said she respects her students’ determination to stay connected and even acknowledged that the phone ban has improved behavior and focus in class. Still, she worries that turning Google Docs into chat rooms could open the door to bullying or cheating. Parents are also weighing in. One parent told CyberGuy that some kids in their district are buying MacBooks just so they can text each other through iMessage. Others, the parent added, are leaning on email threads or even old-school Post-It notes to keep the conversation alive.

A girl writes at a table in front of an open laptop.

Teens share their classroom hacks on TikTok with pride. (Kurt “CyberGuy” Knutsson)

Social media reaction

On TikTok, students proudly show off their “secret” Docs conversations. Captions range from playful, “Your cell phone rule was never going to stop me,” to defiant: “Can’t ever silence us, queens.” The creativity is earning laughs from older generations who remember the days before smartphones. But the trend is also stirring debate. Some parents see it as a harmless way for kids to adapt, while others worry it undermines the entire point of the ban. Educators are split too, amused by the ingenuity, yet frustrated that students are still finding ways to drift off task during lessons. The viral clips prove one thing for sure: when it comes to tech, today’s teens will always find a workaround.

A girl uses the trackpad on a MacBook.

Some kids buy MacBooks to keep texting through iMessage. (Kurt “CyberGuy” Knutsson)

Parent tips for navigating school cell phone bans

If your child’s school has adopted a phone ban, there are a few ways you can help them adjust while keeping communication open and safe:

  • Talk about the rules at home: Explain why schools are putting these bans in place and set expectations for how your child should behave with laptops and other devices.
  • Offer safe communication plans: Work with your child and the school to establish how you’ll contact each other in case of an emergency. Some districts allow phones in lockers or require them to stay powered off in backpacks.
  • Encourage balance: Remind your child that downtime from screens can actually help them focus better in class and relax during the school day.
  • Monitor alternatives: Keep an eye on how your child uses tools like Google Docs, email or messaging apps. What starts as chatting with friends can sometimes veer into bullying or cheating.
  • Be open to feedback: Ask your child how the ban is affecting their school day. Their perspective can help you understand where the real challenges and benefits are showing up.

TEENS AND PHONE USE WHILE DRIVING: WHY THIS DEADLY HABIT PERSISTS

What this means for you

If you’re a parent, this shows just how inventive kids can be when rules are put in place. Cell phone bans may cut down on scrolling, but students are quickly shifting to other tools. They’re chatting through shared Google Docs, buying MacBooks so they can iMessage during class, swapping notes over email, and even sticking to old-school Post-Its to stay in touch. While some of these workarounds seem harmless, they also carry risks, from distractions that take focus away from learning to new opportunities for bullying or even cheating. For teachers, it’s a reminder that managing distractions in the classroom goes beyond phone policies. Laptops, messaging apps, and even simple sticky notes can become back doors for the same behaviors schools are trying to limit. 

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: CyberGuy.com/Quiz

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaways

Phone bans are reshaping the school day, and educators are already seeing benefits. Yet students are proving they’ll always find ways to connect, whether through phones, laptops or even retro workarounds that echo the early internet era.

What do you think? Are these bans helping kids learn better, or are they simply pushing students to get sneakier with tech? Let us know by writing to us at CyberGuy.com/Contact

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com/Newsletter

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link

Experts unveil ancient Colombian faces from 13th-18th centuries by digital reconstruction

0

NEWYou can now listen to Fox News articles!

Researchers recently unveiled the faces of ancient Colombians who lived hundreds of years ago.

Liverpool John Moores University (LJMU) in the United Kingdom announced in an August press release that specialists in its Face Lab were able to digitally extract face masks from corpses found in the Cordillera Oriental region of eastern Colombia.

The results were presented in August at the XI World Congress on Mummy Studies in Cuzco, Peru.

SHOPPERS AT POPULAR MARKETPLACE WALKED OVER ‘VILE’ DUNGEON AS ARCHAEOLOGISTS CITE ‘REMARKABLE’ FINDS

Researchers analyzed four corpses that are held in the Colombian Institute of Anthropology and History’s (ICANH) collection.

The corpses spanned several centuries of Colombian history, from the 13th to the 18th centuries, the release noted.

Specialists at Liverpool John Moores University reconstructed the faces of four mummified individuals from the Cordillera Oriental region of Colombia. An example of their digital reconstruction is shown at right. (Daniel Romero/VW Pics/Universal Images Group via Getty Images; Face Lab, Liverpool John Moores University)

The earliest individual dates to around 1216, while the “newest” mummy is believed to have died around 1797. 

The masks were made directly on the decedents’ skulls, covering their jaw and face.

TREASURES IN ITALY, INCLUDING 2,300-YEAR-OLD TOMB, UNEARTHED DURING SEWER INSTALLATION

Using volumetric CT reconstructions, X-ray diffraction and DNA analysis — among other methods — the team digitally removed funerary masks from the corpses and reconstructed their faces.

Photos show the four reconstructed faces and corresponding skull scans, revealing what the men may have looked like during their time on Earth. 

Skulls on table next to facial depictions

The study spans five centuries of Colombian history, from about 1216 to 1797, researchers said. (Face Lab, Liverpool John Moores University)

Ancient Colombians crafted intricate funerary masks that were very realistic, according to LJMU.

“They crafted masks for their dead with such precision that the mummified bodies appear to be alive,” the university said.

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

“Masks were made of clay, waxes and resins but often contain gold or other decorative material, telling an untold story of the culture and technology of Eastern Colombia between the 13th and 17th centuries.”

Researcher Jessica Liu told Fox News Digital the most surprising aspect of the project was the different shapes of the heads.

Facial reconstructions next to skulls

Researchers used advanced imaging to separate the funerary masks digitally, preserving the mummies’ physical integrity. (Face Lab, Liverpool John Moores University)

“The four heads were quite different in sizes, and their crania were quite different in shape,” she said.

MORE FROM FOX NEWS LIFESTYLE

“After the conference in Cuzco, we donated the 3D replicas to ICANH [and] they were very pleased with the results,” added Liu.

Close-up of skull models with pictures of faces

Felipe Cárdenas-Arroyo said the funerary masks were crafted with “extraordinary workmanship.” (Face Lab, Liverpool John Moores University)

Researcher Felipe Cárdenas-Arroyo of the Academia Colombiana de Historia said the masks were crafted using “extraordinary workmanship.”

CLICK HERE TO GET THE FOX NEWS APP

“[They are], so far, the only ones known to exist in Colombia,” he observed. 

Nobel Peace Prize goes to Maria Corina Machado, despite calls for Trump to win

0

NEWYou can now listen to Fox News articles!

The Nobel Committee awarded this year’s peace prize to Maria Corina Machado amid calls for President Donald Trump to receive the award in the wake of his brokering a historic deal between Israel and Hamas. 

Trump has received several high-profile nominations since returning to office. However, the committee’s deadline for nominations was Jan. 31, meaning he could be eligible for next year’s prize.

NEW YORK TIMES ANALYSIS SAYS TRUMP HAS LEGITIMATE NOBEL PEACE PRIZE CLAIM IF MIDEAST PEACE DEAL HOLDS

President Donald Trump points to a reporter in the Oval Office of the White House, Tuesday, Sept. 30, 2025, in Washington,D.C.  (Alex Brandon/The Associated Press)

During a Cabinet meeting on Thursday, Trump was asked about the Nobel Peace Prize, but did not comment on the award in his response. Instead, he focused on the possibility of addressing Israel’s Knesset.

Earlier this week, the Hostages and Missing Families Forum, a group representing the families of hostages and terror victims formed after Oct. 7, appealed to the committee on Trump’s behalf.

“In this past year, no leader or organization has contributed more to peace around the world than President Trump. While many have spoken eloquently about peace, he has achieved it. While others have offered empty promises, he has delivered tangible results that have saved countless lives,” the forum wrote in a letter to the committee dated Oct. 6.

“He has not merely spoken of peace — he has delivered it,” the forum added.

Hostage families on the phone in Washington, D.C.

Hostage families in Washington upon receiving the news of President Trump’s announcement of an agreement that will bring all the hostages home. (Liri Agami and Alon Kaplun)

TRUMP HAILED AS PEACEMAKER WORTHY OF NOBEL PRIZE FOR ‘HISTORIC’ ISRAEL-HAMAS PEACE DEAL

Israeli Prime Minister Benjamin Netanyahu told Trump in July during a visit to Washington, D.C., that he had nominated the president for the Nobel Peace Prize. Netanyahu handed the letter he sent the committee to Trump when he told him the news.

“The president has already realized great opportunities. He forged the Abraham Accords. He’s forging peace, as we speak, in one country and one region after the other,” Netanyahu said. “So, I want to present to you, Mr. President, the letter I sent to the Nobel Prize committee. It’s nominating you for the peace prize, which is well-deserved.”

Weeks prior to that meeting, the U.S. and Israel carried out major operations that destroyed Iran’s nuclear infrastructure, as both countries warned a nuclear Tehran would be a threat to the world.

CLICK HERE TO GET THE FOX NEWS APP

Trump was nominated for the award in the past but was not selected. Notably, U.S. Rep. Claudia Tenney, R-N.Y., nominated Trump for the prize in 2020 when he brokered the Abraham Accords, normalizing relations between Israel and Arab nations.

Had he won, Trump would have become the fifth U.S. president to win the Nobel Peace Prize. Previous laureates include former President Barack Obama, former President Jimmy Carter, former President Woodrow Wilson and former President Theodore Roosevelt.

Fox News Digital’s Greg Wehner and Caitlin McFall contributed to this report.

Arizona sheriff’s office turns to AI to speed up paperwork

0


NEWYou can now listen to Fox News articles!

As artificial intelligence becomes more mainstream, the Pima County Sheriff’s Department is looking at how it can use the emerging technology.

At the beginning of the year, deputies began a trial of Axon’s Draft One, which is a program that writes incident reports using AI. A body camera records the interactions, then the program uses the audio plus any additional information from the deputy to create a first draft. Deputies then review everything before submitting the final report.

“They’re able to verify the completeness, the accuracy and all of that,” Capt. Derek Ogden said, “But the initial first draft, they can’t submit as their case report.”

Demonstrating the program, Deputy Dylan Lane showed how Draft One can write a case report that would have taken him 30 minutes to complete in five minutes.

CHATGPT MAY ALERT POLICE ON SUICIDAL TEENS

Pima County deputy enters information into Draft One

A Pima County deputy opens Draft One to begin writing his case report. After it’s finished, he will check it for accuracy before submitting it. (Amalia Roy)

“Most of that time is just the quick changes, making sure that all the information is still accurate and then just adding in those little details,” Lane said.

Ogden said Draft One saves crucial time during shifts when deputies are handling multiple incidents back-to-back. He said the program is one of several ways the department is exploring AI tools.

Police report written by AI

Draft One writes a case report using the recording from an Axon body camera. (Amalia Roy)

“Recently, we saw a detective from our criminal investigative division use AI to identify a deceased unidentified person,” Ogden said. “We’re also looking for ways to increase the productivity and efficiency of our patrol deputies and some of our corrections officers.”

Law enforcement agencies across the country are evaluating how artificial intelligence could help their departments, especially when dealing with resource shortages.

SCHOOLS TURN TO AI GUN DETECTION FOR SAFETY

“A lot of policing agencies are budget constrained. It is very attractive to them to have a tool that could allow them to do more with less,” said Max Isaacs from The Policing Project, which is a non-profit within NYU School of Law that studies public safety and police accountability. 

Isaacs said while AI offers opportunities to save resources, there’s not much data on how much help these programs truly provide.

Body camera on officer

A Pima County deputy wears an Axon body camera in a simulation of an emergency call. (Amalia Roy)

“You have a lot of examples of crimes being solved or efficiencies being realized,” Isaacs said, “But in terms of large-scale studies that rigorously show us the amount of benefit, we don’t have those yet.”

TRUMP SIGNS EXECUTIVE ORDER TO HARNESS AI IN FIGHT AGAINST CHILDHOOD CANCERS

 Isaacs also raised the issue of accuracy. 

“AI is not perfect. It can rely on data that is flawed. The system itself could be flawed. When you have errors in AI systems, that can lead to some pretty serious consequences. It can lead to false arrests. It could lead to investigators going down a dead end and wasting time and resources,” Isaacs said.

Addressing those concerns, Ogden agreed that information can be flawed. He said it’s why human eyes must review every report written with Draft One.

After a successful trial with 20 deputies, Ogden said the next step is to expand Draft One to corrections officers.

CLICK HERE TO GET THE FOX NEWS APP



Source link

Why Open AI’s new Sora 2 will make you never trust video again

0


NEWYou can now listen to Fox News articles!

I have to tell you about Sora 2. It’s OpenAI’s new video-generating app that’s both mind-blowing and terrifying.

It’s the first tool from any AI company that lets you give it a prompt, and in literally seconds, you get a full-blown, AI-generated video up to a minute long. The results aren’t perfect, but they’re close. Like Hollywood close. 

LEAKED META DOCUMENTS SHOW HOW AI CHATBOTS HANDLE CHILD EXPLOITATION

The lighting, camera motion, facial expressions, it’s all shockingly realistic. 

AI messaging

AI videos surge in light of the new Sora 2 video-generating app. (iStock)

Want to see a golden retriever surfing through Times Square in slow motion? Done. A drone shot of a city being built out of clouds? Easy. 

Dead celebrities

People are using Sora 2 to generate fake videos of dead celebrities doing things they never did. 

  • JFK is deepfaked into a WWE superstar.
  • Tupac appears with Mr. Rogers talking about respect.
  • Stephen Hawking is attacked in the UFC. Warning: I knew this was all AI, but it was still upsetting to watch. Weird, right?
  • Even Sam Altman, CEO of OpenAI, is shoplifting GPUs from Target.

SEN SANDERS: AI MUST BENEFIT EVERYONE, NOT JUST A HANDFUL OF BILLIONAIRES

I’m sure you know that under U.S. law, “defaming” someone only applies to living people, not the dead. That means families and estates have no legal recourse when someone uses AI to humiliate or misrepresent their loved one. It’s a free-for-all right now, and no one’s accountable. 

Even creepier?  

Photo of Sora artificial intelligence app on a phone with the Open AI logo in the background

In this photo illustration, a smartphone screen shows the Sora 2 app icon developed by OpenAI, in front of the company’s logo, on October 8, 2025, in Chongqing, China. Sora 2 is OpenAI’s next-generation generative video model that powers the Sora app, supporting synchronized audio, realistic motion, and physically accurate scene simulation. (Photo illustration by Cheng Xin/Getty Images) ((Photo illustration by Cheng Xin/Getty Images))

Sora is also being used for stalking and impersonation. All it takes is a photo, and you can make a video of anyone doing anything. Fake crimes, revenge content, political lies, it’s all possible. 

Zero guardrails

DEMOCRATS DEMAND ‘ROBOT TAX’ AS AI REPORTEDLY THREATENS TO REPLACE 100M US JOBS

OpenAI says you need permission to use a person’s face or voice. Yea, like that’s going to stop someone.  

If the guy who runs OpenAI can’t stop his own face from being misused, what chance do the rest of us have? Right now, you can only get Sora 2 as an iPhone app. You’ll need an OpenAI account, and it’s still invite-only, so most people don’t have access yet.  

Sam Altman speaking into a microphone

Sam Altman, chief executive officer of OpenAI Inc., during a media tour of the Stargate AI data center in Abilene, Texas, US, on Tuesday, Sept. 23, 2025. Stargate is a collaboration of OpenAI, Oracle and SoftBank, with promotional support from President Donald Trump, to build data centers and other infrastructure for artificial intelligence throughout the US. (Photographer: Kyle Grillot/Bloomberg via Getty Images) (Kyle Grillot/Bloomberg via Getty Images)

Sora 2 is an incredible tool. But it’s being abused, and the guardrails are flimsy at best. So from now on, when a video goes viral, you better assume it’s fake until proven real.

CLICK HERE TO GET THE FOX NEWS APP

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

  • National radio:  Airing on 500+ stations across the US – Find yours or get the free podcast.
  • Daily newsletter: Join 650,000 people who read the Current (free!)
  • Watch: On Kim’s YouTube channel

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved. 



Source link

Wi-Fi calling may drain iPhone battery faster than cellular connection

0


NEWYou can now listen to Fox News articles!

When you live in an area with limited or no cell service, Wi-Fi calling can be a lifesaver. It keeps you connected for calls and texts when your phone would otherwise be useless. However, some iPhone users have noticed that this feature appears to drain their battery more quickly than usual. Laura B wrote to us asking,

“Living in a rural area with no cell service, naturally, my iPhone is used with Wi-Fi and Wi-Fi calling only. It seems to me it uses more battery this way than when connected to cellular data. Is this possible?”

Laura’s question is a common one, and the short answer is: yes, Wi-Fi calling can sometimes use more battery than a strong cellular connection. The reasons haven’t changed much in iOS 26, but Apple has added a few tools that make it easier to understand and manage battery use. And if you’re on Android, don’t worry; we’ll cover the steps for your phone too, further down.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

10 IOS 26 TRICKS THAT HELP YOU GET MORE OUT OF YOUR IPHONE

A person in a red sweater holds a smartphone with a colorful home screen, typing on the device.

Wi-Fi calling keeps you connected but can drain your iPhone battery faster. (Kurt “CyberGuy” Knutsson)

Why Wi-Fi calling can use more power

Even though Wi-Fi calling is designed to keep you connected, there are a few behind-the-scenes reasons it may drain your iPhone battery faster than expected.

1) Your phone still looks for a cellular signal

Even when you don’t have service, your iPhone may periodically scan for towers. That search drains energy unless you take steps to stop it.

2) Wi-Fi antenna + call processes stay active

Wi-Fi calling requires your Wi-Fi radio to remain on constantly while also running extra background processes to stabilize calls. That workload can use more energy than simply maintaining a strong LTE signal.

3) Weak or unstable Wi-Fi makes things worse

If your Wi-Fi signal drops or fluctuates, your iPhone works harder to maintain the connection. That extra effort can warm the phone and eat into your battery.

WHY IPHONE USERS ARE THE NEW PRIME SCAM TARGETS

A person wearing a blue shirt uses a smartphone at a round table with a notebook, pen, and cup of coffee.

Simple tweaks help you enjoy Wi-Fi calling without killing your charge. (Kurt “CyberGuy” Knutsson)

How to Make Wi-Fi Calling More Battery-Friendly on iOS 26

These settings are tried-and-true and work just as well in iOS 26:

1) Stop your iPhone from searching for towers

  • Go to Settings
  • Tap Airplane Mode
  • Turn it ON
  • Then go back to Wi-Fi in Settings and turn Wi-Fi ON manually

This keeps your iPhone from wasting power looking for nonexistent cell service.

2) Keep Wi-Fi Calling enabled

  • Open Settings.
  • Scroll down and tap Apps.
  • Click Phone.
  • Tap Wi-Fi Calling.
  • Make sure “Wi-Fi Calling on This iPhone” is switched ON.

3) Reduce background activity

  • Background App Refresh: Settings → General → Background App Refresh → set to Wi-Fi only or turn it off for apps you don’t need.
  • Mail Fetch: Settings → Apps →Mail → Accounts → Fetch New Data → change to Manually or set a longer interval like Every 30 minutes or Every 15 Minutes. 

4) Cut screen and system drain

  • Brightness: Settings → Display & Brightness → lower brightness or use Auto-Brightness by clicking Automatic. 
  • Location Services: Settings → Privacy & Security → Location Services → turn off for apps that don’t need it.

5) Keep Wi-Fi connection strong

  • Place your phone closer to the router
  • Consider upgrading to a mesh Wi-Fi system if your signal drops across the house

YOUR PHONE IS TRACKING YOU EVEN WHEN YOU THINK IT’S NOT

Close-up of a smartphone with a green case resting on a wooden surface, showing its USB-C charging port.

iOS 26 adds new battery analytics to track and manage power use. (Kurt “CyberGuy” Knutsson)

What iOS 26 adds to the mix

Apple didn’t change how Wi-Fi calling itself works in iOS 26, but it did improve how you can monitor and manage battery use:

  • Adaptive Power (on supported iPhones): This feature adjusts things like screen brightness, refresh rates and background tasks automatically when your battery starts draining faster than usual.
  • New battery analytics: iOS 26 shows a single weekly average view with clearer breakdowns of which apps and processes are using power. To check this: Open Settings → scroll down and tap Battery→ the Weekly view of average battery use appears by default → tap a bar to see a specific day’s app and process usage → scroll down and tap Show All Battery Usage to view Screen Active vs. Screen Idle time and charging history alongside the updated weekly stats

These tools don’t remove Wi-Fi calling’s overhead, but they give you better visibility and, in some cases, automatic tweaks to help stretch your charge.

How Wi-Fi calling affects battery on Android

Android users face many of the same challenges as iPhone owners when it comes to Wi-Fi calling and battery drain. The basic reasons overlap; extra processes, Wi-Fi radios staying active and unstable signals. But Android also has some unique quirks and settings worth adjusting.

Settings may vary depending on your Android phone’s manufacturer 

Your phone still scans for cell towers

Even when Wi-Fi calling is on, your Android device may keep searching for mobile networks in the background. This constant scan eats up power unless you turn it off.

Fix: Enable Airplane Mode, then manually switch Wi-Fi back on. To do this open Settings, tap Network & Internet, and turn on Airplane Mode. Once it’s active, go back into Wi-Fi, switch it on manually and reconnect to your network so Wi-Fi calling still works without the phone constantly searching for cell towers.

Carrier settings differ

Not every carrier handles Wi-Fi calling the same way on Android. Some route calls differently, which can use more energy depending on the network.

Fix: Check your carrier’s Wi-Fi calling preferences in Settings → Network & Internet → Mobile Network → Advanced → Wi-Fi Calling.

Background apps can pile on

Unlike iOS, many Android devices allow dozens of apps to keep running in the background. When Wi-Fi calling is active, that extra load can drain faster.

Fix: Go to Settings → Battery → Battery Usage and identify apps draining the most power, then restrict background activity.

Adaptive Battery and Power Saving modes

Most Android phones (Pixel, Samsung Galaxy, OnePlus, etc.) include Adaptive Battery or similar power-saving tools. These features limit battery-hungry apps when Wi-Fi calling is active.

Fix: Enable Adaptive Battery in Settings → Battery → Adaptive Preferences, or use Power Saving mode if you notice faster drain during calls.

Strengthen your Wi-Fi signal

As with iPhones, weak Wi-Fi is a big culprit. Dropped or unstable Wi-Fi forces your Android phone to work overtime to keep a call steady.

Fix: Stay near your router or consider upgrading to a mesh Wi-Fi system.

CLICK HERE TO GET THE FOX NEWS APP

Kurt’s key takeaways

Wi-Fi calling is a lifesaver when you’re off the grid, but it does come with trade-offs. It can use more power than a strong cellular connection, especially if your Wi-Fi signal isn’t steady. The good news is that iOS 26 gives you better battery insights and smarter tools to help manage power. With a few simple tweaks, like turning on Airplane Mode when there’s no service, limiting background apps and keeping your Wi-Fi strong, you can cut unnecessary drain.

What’s been your biggest challenge with your phone’s battery life, and how do you manage it? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.  



Source link

Sweden launches tourist campaign for doctors to prescribe visits for health and wellness

0

NEWYou can now listen to Fox News articles!

Sweden has launched a novel tourist campaign that urges boosting mind and body by traveling there, yet some are already sharing differing thoughts. 

The “Prescribe Sweden” campaign has partnered with medical professionals to help people benefit from the country’s “restorative experiences,” as announced by Visit Sweden.

Stress management, lifting one’s spirits and balancing everyday life are among the benefits of taking a trip to the country, according to the program. 

DOGS TREATED LIKE FAMILY IN MAJOR AMERICAN CITY NOW FACE CANINE CANCEL CULTURE

Visitors can fill out a referral forum to bring to their doctor to serve as the basis for taking a medically prescribed trip.

“Medical doctors can generate a prescription and advise patients to spend time in Sweden,” notes Visit Sweden on its site. 

Boats are shown docked at an island in Sweden. Stress management, lifting one’s spirits and balancing everyday life are among the benefits of taking a trip to the country, according to a new campaign.  (iStock)

Professor Yvonne Forsell at Karolinska Institute created a list of recommended nature, lifestyle and cultural activities. 

Swedish saunas, for example, are suggested to promote relaxation, social connection and physical recovery.

For more Lifestyle articles, visit foxnews.com/lifestyle

Regular sauna bathing is linked to a 65% lower risk of Alzheimers disease and dementia, Visit Sweden said, citing a 2018 study published in the National Library of Medicine. 

Another activity listed is foraging in the wild — highlighting the tradition of looking for fresh berries and mushrooms. 

woman in sweden laying on grass

Visit Sweden has created a medical referral program in which doctors can prescribe trips for people’s mental and physical health. (iStock)

Foraging supports well-being, said Visit Sweden, through stress reduction, connection to nature and mental restoration.

The tourist board states that it does not cover “any costs incurred with a prescription to visit Sweden.” 

City of Gothenburg rooftops panoramic view, Vastra Gotaland County of Sweden

A town in Sweden. A professor has created a list of recommended nature, lifestyle and cultural activities to partake in when traveling to the country. (iStock)

Dr. Sam Everington, British Medical Association vice president, is listed as a medical professor who supports the “prescription.”

“Spending time in nature and engaging with culture are evidence-based ways to support both mental and physical health. Sweden offers an ideal setting for this kind of care,” Everington is quoted as saying on the Visit Sweden site. 

Sweden skyline

The tourist board states that it does not cover “any costs incurred with a prescription to visit Sweden.”  (Jeff Overs/BBC News & Current Affairs via Getty Images)

About 9.15% of foreign travelers were American in 2024, according to Visit Sweden. 

In the “r/Sweden” forum on Reddit, one traveler called the Nordic country the best in the world.

CLICK HERE TO GET THE FOX NEWS APP

“Just got back home (to the USA) from Sweden with utter depression. Visiting Sweden has taught me what a country ought to look like,” the user wrote.

Couple on a hike

Spending time in nature supports well-being through stress reduction, connection to the outdoors and mental restoration, health experts say. (iStock)

The traveler added, “I got to pick some mushrooms! They were delicious. I’ve never seen beard moss until I went to the Swedish forest.”

Another person, however, claimed to be Swedish and wrote on the forum, “Not wishing to be a downer, but it is a bit disheartening to hear our streets being described as clean, pristine and impeccable.”

tourists sweden

About 9.15% of foreign travelers were American in 2024, according to Visit Sweden. (iStock)

“I see tons of plastic, paper, cans … pretty much everywhere l go,” the person added. 

Another person warned, “Just be aware [of] the thick winter darkness.”

MAJOR CRUISE LINE SUSPENDS CARIBBEAN DESTINATION VISITS AMID KIDNAPPINGS, SAFETY CONCERNS

“It’s a great country, but not without its problems,” said yet another person. 

On Facebook, a different person posed this question: “And who will pay for travel and visa?”

Stockholm old town city skyline, cityscape of Sweden at sunset

A waterfront town in Sweden is shown above. “It’s a great country, but not without its problems,” wrote a social media user.  (iStock)

Said another, “Even if my doc prescribes me to visit Sweden, my [job] won’t allow it.”

CLICK HERE TO SIGN UP FOR OUR LIFESTYLE NEWSLETTER

Fox News Digital reached out to the Swedish government for comment. 

No end to Gaza war unless Hamas returns all hostages and disarms: ambassador

0

NEWYou can now listen to Fox News articles!

There will be no end to the war in Gaza if Hamas does not hand over all 48 living and deceased hostages and completely disarm per the terms of the agreement finalized overnight between Hamas and Israel, Jerusalem’s ambassador to the U.S., Yechiel Leiter, warned in an interview with Fox News Digital on Thursday. 

The Israeli government is expected to approve the peace deal first presented by President Donald Trump late last month, and then agreed to by Prime Minister Benjamin Netanayhu. 

But concerns remain over Hamas’ commitment and ability to return all the bodies of the deceased hostages within a 72-hour window beginning Friday night local time, as directed under the terms of the agreement.

Palestinians, including children, gathered in the city of Khan Yunis celebrate after the announcement of the ceasefire agreement in Gaza on Oct. 9, 2025 in Khan Yunis, Gaza.  (Abdallah F.s. Alattar/Anadolu via Getty Images)

TRUMP PEACE DEAL TRIGGERS 72-HOUR COUNTDOWN FOR HAMAS TO RELEASE 48 HOSTAGES FROM GAZA

“They have an obligation to return everyone in 72 hours. Hopefully we’re going be able to keep everything within that framework,” Leiter said when asked about concerns over Hamas’ ability to immediately hand over all the deceased hostages. “There are some glitches that we have to deal with, and this issue is one of them. 

“But we need to see all the bodies back, and I don’t think we’re going to be able to move forward until we do have everyone,” he added.

Leiter said a part of the problem is Hamas did not diligently keep track of where it left the bodies of the deceased, but warned that until every body is returned, Israel will not withdraw its forces from the Gaza Strip.

An international task force involving the U.S., Qatar and Egypt has been formed to help Israel recover the bodies of the deceased, but the White House did not respond to Fox News Digital’s questions regarding what role the U.S. will play or if there will be American boots on the ground aiding the search. 

An agreement was reached overnight after mediators from the U.S., Egypt and Qatar worked for days with Hamas and Israeli officials to hash out details of the peace agreement, though it remains unclear if there were any changes made to Trump’s original 20-point plan. 

Netanyahu stands next to Ambassador Yechiel Leiter

Benjamin Netanyahu, Israel’s prime minister, left, and Yechiel Leiter, Israel’s ambassador to the U.S., speak to members of the media following a meeting with US House Speaker Mike Johnson, a Republican from Louisiana, not pictured, at the US Capitol in Washington, D.C., US, on Tuesday, July 8, 2025.  (Graeme Sloan/Bloomberg via Getty Images)

FATHER OF YOUNGEST AMERICAN HOSTAGE HOLDS OUT SLIVER OF HOPE AFTER TRUMP SECURES GAZA PEACE DEAL

Reports over the weekend suggested Hamas objected to the calls that it completely disarm – though in exchange it would also be granted amnesty and a path out of Gaza to an accepting third party nation should they choose to leave – and Leiter was unable to shed light on whether Hamas has formally conceded to the disarmament terms. 

“We hope it proceeds according to the president’s plan,” Leiter said. “We assume, having long experience with Hamas and Islamic Jihad and these terrorist organizations, that there are going to be glitches along the way.

“Look, they’re going down. This is basically a surrender on Hamas’s part. They don’t like it one bit, and they’re going to do whatever they can to try to show that they’re still relevant,” the ambassador warned. 

People gather in Hostages Square as a woman holds a large yellow sign listing hostages’ names in Hebrew.

People gather in Hostages Square during a rally as a participant displays a sign listing hostages’ names following the Israel-Hamas peace deal. (Dana Reany/Hostages and Missing Families Forum)

Disarmament is not a part of the first phase, which involves the complete return of all hostages, the partial withdrawal of Israeli troops to a designated line as agreed to by Israel and Hamas, and the release of nearly 2,000 Palestinian prisoners, including 250 of whom are serving life sentences for terrorist offenses, including murder. 

The second phase would involve further withdrawal of Israeli forces in coordination with the complete disarmament of Hamas and demilitarization of the enclave. An international “peace body” headed by Trump would also be established to begin the process of rebuilding the Gaza Strip. 

“We’ve put all the focus now on the first phase,” Leiter said, while acknowledging that Hamas has made comments suggesting it will not disarm and the second phase of a peace deal could once again collapse.  

War continues in Gaza

A smoke plume billows following Israeli bombardment on the Gaza Strip as seen from northwest of Nuseirat refugee camp in Gaza, on Oct. 9, 2025.  (Majdi Fathi/NurPhoto via Getty Images)

CLICK HERE TO GET THE FOX NEWS APP

“But that’s part of the plan – that’s very clearly part of the president’s plan. That was the goal set out by Prime Minister Netanyahu from the outset, that Hamas is disarmed, that Gaza is de-radicalized and demilitarized. 

“We can’t go back into a situation where we have Jihadi militants sitting at our border, or else we haven’t accomplished anything,” the ambassador said. “This is performance-based. They disarm, they are disarmed if necessary, and then Israel withdraws.”

Scammers mimic real work emails, making phishing attacks nearly undetectable

0


NEWYou can now listen to Fox News articles!

Cybercriminals are getting smarter every day, and one of their most convincing tricks is disguising phishing emails to look like they’re coming from people you trust. Work emails are particularly dangerous because they lower your guard. After all, if the sender is your boss or IT department, why would you suspect anything? Unfortunately, scammers know this and use it to their advantage. I recently received an email from Krysti from Rockwall, Texas, who highlighted a similar issue.

“I received a spam email from my employer’s email. It had a document attached to it. I tried to open it and could not. I contacted my employer and they told me they hadn’t sent me anything. I changed my password and ran a virus scan. I also have been checking on the dark web for anything coming up on me. So far everything is okay. I did sign up for antivirus software based on your recommendation and we are signed up for identity theft protection. Is there anything else I should do?”

Incidents like this are more common than many realize, Krysti. And while it sounds like you took the right first steps by changing your password, scanning for malware and monitoring for identity misuse, there are a few additional precautions worth taking. A close call is often a warning sign that your digital habits might need tightening. Let’s break down why these attacks are so dangerous and what everyone should do to make sure they’re fully protected.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

PROTECT YOURSELF FROM SNEAKY WEB INJECTION SCAMS

A person wearing headphones sits in a dark room, working on multiple computer screens displaying code.

Phishing emails often look like they come from someone you know, making them harder to spot. (Kurt “CyberGuy” Knutsson)

Why work email scams are so dangerous

Phishing attempts that impersonate coworkers or employers are particularly effective because they rely on trust and urgency. You’re more likely to open an attachment or click a link if you believe it’s tied to your job. Scammers often spoof legitimate email addresses or use addresses that look almost identical to the real ones, hoping you won’t notice the subtle difference.

Once you interact with these emails, the risks multiply. Opening a malicious attachment could install spyware or ransomware. Clicking a fake link might lead to a login page designed to harvest your credentials. Even if nothing obvious happens right away, attackers could still be collecting background information to use in a future attack.

These scams are becoming harder to spot, too. Some are powered by artificial intelligence-generated text, making them free of the usual grammar mistakes that used to be obvious red flags. Others use stolen email threads to insert themselves into ongoing conversations. That’s why even seasoned professionals fall for them.

GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP

A man in a white shirt uses a smartphone, focusing on the screen as he taps with one hand.

Opening a fake attachment can secretly install malware or spyware on your device. (Kurt “CyberGuy” Knutsson)

What to do immediately after a close call

Changing your password or running a malware scan is often not enough to stop attackers. It’s worth going a little further to make sure nothing slipped through. Start by checking your login history to see if there are any unauthorized sign-ins on your email or work accounts.

Most platforms allow you to review recent activity, including device type and location, and if anything looks suspicious, sign out of all sessions immediately and change your password again. Next, enable two-factor authentication on your email and any other critical accounts. Even if attackers manage to steal your password, they won’t be able to gain access without the second verification step.

It’s also important to alert your IT team, especially if the email appears to come from your employer’s address. This could mean the company’s email system has been compromised, and notifying them will allow them to investigate and secure other accounts if necessary. Finally, make sure all your software is up to date. Malware often exploits vulnerabilities in outdated systems, so regularly updating your operating system, antivirus and productivity tools adds another layer of protection against future attacks.

DON’T FALL FOR THIS BANK PHISHING SCAM TRICK

Close-up of a person typing on a laptop keyboard, with a computer monitor in the background.

Work email scams are rising, and even experienced professionals can get fooled. (Kurt “CyberGuy” Knutsson)

7 ways to check if your device or data is compromised

Some cyber threats don’t reveal themselves immediately. Scammers often collect small bits of data over time or wait weeks before trying to use what they’ve stolen. The following steps are actions anyone can take to make sure their device and personal data remain secure, and to catch any signs of compromise before they turn into serious problems.

1) Consider a personal data removal service

The more personal information about you that’s publicly available, the easier it is for scammers to target you. Data removal services can help by scanning hundreds of data broker websites and removing your details from them. Reducing this digital footprint not only makes it harder for attackers to build profiles on you but also limits how easily phishing attempts can be tailored to your life.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

HOW FAKE MICROSOFT ALERTS TRICK YOU INTO PHISHING SCAMS 

2) Monitor for already exposed personal data

Your information could already be circulating in breach dumps and underground markets without you realizing it. Identity protection services monitor known dark-web sources, forums and leak sites for your email, phone, SSN and other sensitive details. If they find a match, they alert you so you can act quickly: change passwords, turn on two-factor authentication and place fraud alerts or credit freezes with the credit bureaus.

Your information might already be circulating in dark web marketplaces without you realizing it. Identity theft protection services can help by continuously scanning those underground sites for your email, passwords or other sensitive details. If your data does show up, these services notify you right away so you can reset credentials, freeze accounts or take other protective actions before the information is misused.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

3) Watch for suspicious financial activity

Even if you never shared payment details, attackers may attempt account takeovers or fraudulent transactions using any information they have. Review your bank, credit card and online account statements frequently for unusual activity. Pairing this habit with identity theft protection tools gives you an added safety net, as they often include financial monitoring and fraud alerts to catch problems quickly. 

4) Review connected accounts

Email accounts are often the central hub for many other services. If your inbox is compromised, attackers might try to break into linked accounts such as cloud storage, messaging apps or collaboration tools. Check each of these services for unfamiliar logins, permission changes or device activity, and secure them by changing passwords and enabling two-factor authentication. 

5) Use a password manager

Weak or reused passwords are one of the easiest ways for attackers to break into accounts after a breach. A password manager solves this by generating and storing strong, unique passwords for every site you use. It also acts as a passive phishing detector. If the tool doesn’t autofill a login form, that’s a sign the page could be fake. Over time, this significantly reduces your risk of falling victim to credential-based attacks.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

6) Install reliable antivirus protection

Modern cyber threats go beyond viruses. A strong antivirus solution now acts as a full security layer, blocking phishing websites, detecting malicious scripts and stopping suspicious activity before it can compromise your device. If you’ve interacted with a suspicious attachment or link, a reputable antivirus tool can catch malware that might still be hiding in the background.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

7) Enable account alerts

Most major platforms allow you to turn on alerts for unusual account activity, such as new sign-ins, password resets or changes to security settings. These real-time notifications act as an early warning system, giving you a chance to lock down your accounts before significant damage occurs.

CLICK HERE TO GET THE FOX NEWS APP 

Kurt’s key takeaway

Close calls like this are unsettling, but they are also valuable wake-up calls. Cybercriminals are constantly refining their tactics, and phishing emails that once looked laughably fake can now be nearly indistinguishable from the real thing. The key is to build layers of defense, not just reactive steps after an incident, but proactive habits that make you a harder target in the first place.

Have you ever clicked on an email that turned out to be a scam? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.



Source link