Technology
TV host Andy Cohen swindled in costly bank scam: How to avoid becoming a victim yourself
Andy Cohen, the host of Bravo’s “Watch What Happens Live with Andy Cohen,” recently revealed he was scammed out of a large sum of money by an imposter who pretended to be from his bank.
He shared his story on TV, social media and on his Sirius XM “Andy Cohen’s Daddy Diaries Podcast,” hoping to raise awareness and prevent others from falling into the same trap.
What is an imposter scam?
An imposter scam is when someone contacts you pretending to be someone you trust, such as a government official, a bank employee, a family member or a friend.
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
They may use fake names, phone numbers, email addresses, or websites to trick you into giving them your money or personal information. They may also use threats, promises or emotional appeals to pressure you into acting quickly.
According to the Federal Trade Commission (FTC), imposter scams are the most common type of fraud reported by consumers in the U.S.
How did Andy Cohen get scammed?
Cohen said that his ordeal started when he lost his bank card and reported it lost. The next day, he received an email that looked like it was from his bank’s fraud alert system. The email asked him to click on a link and sign in to his bank account to verify some suspicious transactions. This is how it all went down from there.
CLICK HERE FOR MORE US NEWS
Andy Cohen (Getty Images for Sirius XM)
The fake email that started it all
Cohen said he clicked on the link and entered his username and password, thinking that the email was legitimate. However, he later realized that the link was fake and that he had given the scammers access to his bank account.
The Apple ID request that gave them access
The scammers then asked him to sign in to his Apple ID, which he said was a red flag. He said he closed the browser and ignored the request, but it was too late. The scammers had already gained control of his phone and his bank account.
Apple ID on iPhone (Apple)
The text and phone call that confirmed the scam
The next day, he received a text message from what appeared to be his bank, asking him if he was trying to use his card. He replied that it was not him, and then he received a phone call from someone who claimed to be from his bank’s fraud department.
The caller asked him to confirm some recent charges on his account, which he said were accurate because the scammers could see his transactions. The caller then said they would send him some codes to verify his identity and asked him to read them back.
The codes that were actually wire transfers
Cohen said he received three codes, which he later learned were actually wire transfers from two of his accounts to the scammers. He said he thought he was talking to his bank and that the codes were part of the security process.
The call-forwarding trick that blocked the real bank
The scammers then did something even more sneaky. They asked him to enter some numbers, which they gave him, on his phone’s keypad, which activated the call-forwarding feature. This meant that any incoming calls to his phone would be redirected to the scammers, including the calls from his real bank.
Call forwarding on iPhone (Kurt “CyberGuy” Knutsson)
Cohen said he tried calling his bank’s fraud number but never received a callback. He said his phone was silent all night, which he found strange. The next day, a visit to his bank revealed that a significant sum of money had been wired out of his account, the exact amount of which he did not reveal. Cohen highlighted the harsh reality that once money is wired out, it’s generally not recoverable.
The discovery of the loss and the report to the police
He said he reported the incident to the NYPD Cyber Security Unit and that the case was still under investigation. He said he wanted to share his experience to warn others.
MORE: PROTECT YOURSELF FROM TECH SUPPORT SCAMS
How can you avoid imposter scams?
Andy Cohen shared some tips on how to avoid imposter scams based on what he learned from his experience. Here is his advice, along with some additional suggestions.
1) Check the email address
If you receive an email that claims to be from your bank, your government, or any other organization, always check the sender’s email address. It may look official, but if you click on it, you may see that it is not from the domain you expect. For example, it may say “Bank of America,” but the email address may be something like “bankofamerica@gmail.com” or “bankofamerica@fraud.com.” Do not click on any links or attachments in the email, and do not reply to it. Instead, contact the organization directly using a phone number or a website that you know is genuine.
2) Avoid the sense of urgency
Many imposter scams rely on creating a sense of urgency or panic in the victim. They may tell you that your account has been hacked, that you owe money to the IRS, that your loved one is in trouble, or that you have won a prize. They may ask you to act quickly and send money, provide personal information, or buy gift cards. Do not let them rush you or pressure you. Take a breath and think twice before you respond. If you are not sure, talk to someone you trust, such as a friend, a family member, or a financial advisor. Remember, legitimate organizations will never ask you to pay them with gift cards, wire transfers, or cryptocurrency.
3) Verify the caller’s identity
If you receive a phone call from someone who claims to be from your bank, your government, or any other organization, do not trust them blindly. They may use fake names, phone numbers, or caller ID information to fool you. They may also have some information about you, such as your name, your address, or your account number, to make you think they are real. However, this does not mean they are who they say they are. They may have obtained this information from public sources, data breaches, or previous scams. Do not give them any more information, such as your password, your PIN, your social security number, or your credit card number. Do not agree to any requests, such as sending money, buying gift cards, or entering codes. Instead, hang up and call the organization directly using a phone number that you know is genuine. You can also check the organization’s website for any alerts or warnings about scams.
4) Protect your devices: Have good antivirus software on all your devices
Imposter scammers may try to access your devices, such as your computer, your phone, or your tablet, to steal your information or money. They may send you fake emails, texts, or pop-ups that ask you to click on a link, download a file, or install software. Do not do it.
They may also ask you to sign in to your online accounts, such as your email, your bank, or your Apple ID. Do not fall for these tricks. They may infect your devices with malware, spyware, or ransomware, or they may lock you out of your accounts.
The best way to protect yourself from these types of cyberthreats or having your data breached is to have antivirus protection installed on all your devices. Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.
5) Use strong and unique passwords
Create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills passwords in for you when you’re logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts.
6) Perform regular software updates
Developers frequently release updates to patch vulnerabilities and improve overall security. Both Apple and Android issue updates regularly, so check for and install them often.
Scam alert illustration (Kurt “CyberGuy” Knutsson)
MORE: THE ‘UNSUBSCRIBE’ EMAIL SCAM IS TARGETING AMERICANS
I’ve been scammed like Andy. What to do next?
Below are some next steps if you find you or your loved one is a victim of identity theft from an imposter scam.
1) Change your passwords. If you suspect that your phone has been hacked or that someone is impersonating you, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn’t’ recording you setting up your new password on your hacked device. Use strong and unique passwords that are hard to guess or crack. You can also consider using a password manager to generate and store your passwords securely.
2) Look through bank statements and check account transactions to see where outlier activity started.
3) Use a fraud protection service. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
Some of the best parts of using an identity theft protection service include identity theft insurance to cover losses and legal fees and a white glove fraud resolution team where a US-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.
4) Report any breaches to official government agencies like the Federal Communications Commission.
5) You may wish to get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft and if being a victim of criminal identity theft leaves you unable to secure employment or housing
6) Alert all three major credit bureaus and possibly place a fraud alert on your credit report.
7) Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.
8) Alert your contacts. If hackers have accessed your device through SMS spoofing, they could use them to send spam or phishing messages to your contacts. They could impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.
9) Restore your device to factory settings. If you want to make sure that your device is completely free of any malware or spyware, you can restore it to factory settings. This will erase all your data and settings and reinstall the original version. You should back up your important data BEFORE doing this, and only restore it from a trusted source.
If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.
MORE: ALL NEW TRICKY THREAT OF THE FAKE BROWSER UPDATE SCAM
Kurt’s key takeaways
Imposter scams are a serious threat that can cost you a lot of money and stress. Andy Cohen learned this the hard way, but he decided to share his story to help others avoid the same mistake.
By following his tips and the FTC’s advice, you can protect yourself and your loved ones from imposter scammers. Remember, if something sounds too good to be true, or too bad to be true, it probably is. Be smart, be vigilant, and be safe.
How do you think the authorities and the banks should handle imposter scams and help the victims recover their losses? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Anker’s last-gen sleep buds are nearly 40 percent off ahead of daylight saving time
Bad news: most Americans are about to lose an hour of sleep next week. Good news: if you have trouble falling (or staying asleep), Newegg is currently selling Anker’s Soundcore Sleep A20 earbuds for $113.99 ($66 off) when you use coupon code MMSF88 at checkout, which drops them to just $6 shy of their lowest price to date.
A couple of us here at The Verge are fans of Anker’s last-gen sleep buds, which do a good job of muffling disruptive noises (including snoring). They’re lightweight and comfortable enough to wear overnight, even while sleeping on your side, with multiple ear tips and wings for a personalized fit. In fact, in his review, my colleague Thomas Ricker said that they improved his average sleep time by nearly 30 minutes within a two-week period.
What’s even more convenient is that they offer a variety of sleep-focused features to help you rest better. For example, you can use them to play a range of relaxing sounds, from meditation exercises and nature clips to white noise. You can use them as a regular pair of Bluetooth earbuds, too, just in case you prefer to listen to audiobooks or your own curated sleep playlist. They even come with adjustable EQ as well, though we wouldn’t recommend using them as your primary earbuds for music, given that they can’t match the audio quality you’d get from a pair of midrange earbuds from Apple, Sony, or Bose.
In addition, the Sleep A20 offer up to 14 hours of battery life and sleep tracking, providing insights into how long and how well you’ve slept via a companion app that also details your sleep positions and movements. The newer Soundcore Sleep A30 feature active noise cancellation, which is more effective at masking sounds than the A20’s passive isolation, but Anker’s last-gen earbuds remain a decent, budget-friendly option that can help you comfortably tune out most nighttime distractions for nearly half the price.
Technology
Figure data breach exposes nearly 1M accounts
Cyber expert shares tips to avoid AI phishing scams
Kurt ‘The CyberGuy’ Knutsson shares practical ways to avoid falling victim to AI-generated phishing scams and discusses a report that North Korean agents are posing as I.T. workers to funnel money into the country’s nuclear program.
NEWYou can now listen to Fox News articles!
If you have applied for a loan online, you probably shared more than you realized. Your name. Your email. Your date of birth. Maybe even your home address and phone number. Now imagine all of that sitting on a dark web forum.
That is the reality for nearly 1 million people after hackers breached Figure Technology Solutions, a blockchain-focused fintech lender.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
What happened in the Figure data breach
Figure Technology Solutions, founded in 2018, uses the Provenance blockchain for lending, borrowing and securities trading. The company says it has unlocked more than $22 billion in home equity through partnerships with banks, credit unions, fintechs and home improvement companies. However, behind the scenes, attackers were working on a very different angle.
GOOGLE DROPPED DARK WEB MONITORING: SHOULD YOU CARE?
Nearly 1 million accounts were exposed after hackers breached fintech lender Figure Technology Solutions in a social engineering attack. (Felix Zahn/Photothek via Getty Images)
According to breach notification data shared by Have I Been Pwned, information from 967,200 accounts was exposed. The leaked data included more than 900,000 unique email addresses along with names, phone numbers, physical addresses and dates of birth. That is a gold mine for identity thieves. Figure says the incident stemmed from a social engineering attack. What that means in simple terms is that someone inside the company was tricked into handing over access.
“We recently identified that an employee was socially engineered, and that allowed an actor to download a limited number of files through their account,” a Figure Technology Solutions spokesperson told CyberGuy in a statement. “We acted quickly to block the activity and retained a forensic firm to investigate what files were affected. We understand the importance of these matters and are communicating with partners and those impacted as appropriate. We are also implementing additional safeguards and training to further strengthen our defenses. We are offering complimentary credit monitoring to all individuals who receive a notice. We continuously monitor accounts and have strong safeguards in place to protect customers’ funds and accounts.”
Social engineering is the real weapon
When people hear the word blockchain, they think secure and untouchable. But attackers did not break cryptography. They targeted a human being. Groups like ShinyHunters specialize in this playbook. They reportedly claimed responsibility for the breach and, according to BleepingComputer, posted 2.5GB of data allegedly tied to thousands of loan applicants.
In recent weeks, the same group has claimed breaches involving companies like Canada Goose, Panera Bread and SoundCloud. Not every case is connected. Still, security researchers have observed a troubling pattern. Attackers impersonate IT support. They call employees. They create urgency. Then they direct victims to fake login portals that look nearly identical to real ones.
Once employees enter credentials and even multi-factor authentication codes, attackers gain access to single sign-on systems tied to major platforms like Microsoft and Google. From there, one compromised account can unlock a web of connected tools and internal systems.
PANERA BREAD DATA BREACH EXPOSES 5.1M CUSTOMERS
Security researchers say the Figure data leak underscores how social engineering bypasses even blockchain-based platforms. (Maxim Konankov/NurPhoto via Getty Images)
Why this matters to you
If your information was part of the Figure data breach, criminals now have enough detail to craft convincing phishing emails or phone scams. They can reference your real name. They can cite your address. They can pretend to be a lender or bank calling about your application.
Even if you never applied for a loan with Figure, this incident highlights something bigger. No platform is immune to human error. And social engineering works because it targets trust, not technology.
The bigger lesson about blockchain and trust
Figure markets itself as blockchain native. Blockchain can provide transparency and strong cryptographic security. However, none of that protects against a well-crafted phone call.
Security failures often happen at the human layer. That is where attackers focus their energy. As more financial services move online, the attack surface grows. Loan applications, identity verification tools and cloud-based systems create convenience. They also create new targets.
How to protect yourself after the Figure data breach
You cannot control how companies secure their systems. You can control how you respond. Start by checking whether your email address appears in the exposed dataset, then take the steps below to lock down your accounts.
SUBSTACK DATA BREACH EXPOSES EMAILS AND PHONE NUMBERS
Figure says an employee was tricked into granting access, allowing attackers to download sensitive customer data. (Luke MacGregor/Bloomberg via Getty Images)
Check if your email was exposed
To see if your email address was affected, visit https://haveibeenpwned.com/. Enter your email address to find out whether your information appears in the leak. When finished, return here and begin Step 1 below.
Take these steps immediately
- Change any exposed passwords right away. Do not leave a known leaked password in place. Update it everywhere you used it. Use a password manager to create strong, unique passwords for every account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
- Turn on multi-factor authentication wherever possible.
- Never share login codes with anyone, even if they claim to be IT support.
- Install strong antivirus software to help block phishing links, malicious downloads and ransomware that often follow major breaches. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
- Consider a data removal service to reduce your personal information on data broker sites, which scammers often combine with breached data. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
- Place a free fraud alert or credit freeze with the major credit bureaus.
- Monitor your bank and credit card statements weekly for suspicious activity.
Also, be cautious of unexpected calls about your accounts. If someone pressures you to act immediately, hang up and call the company directly using a number from its official website.
Kurt’s key takeaways
The Figure data breach is a reminder that technology alone cannot protect sensitive information. A single employee tricked into revealing credentials can expose hundreds of thousands of people. That is not a blockchain failure. It is a trust failure. If your data was involved, take action now. Even if it was not, treat this as a wake-up call. Your personal information has value. Criminals know it. Companies should know it too.
If one phone call can unlock nearly a million records, are companies investing enough in training people, or are they still betting everything on technology alone? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Apple’s website leaks MacBook ‘Neo,’ which could be its new cheaper laptop
During Apple’s week-long product launch event on Tuesday, a listing for the “MacBook Neo (Model A3404)” appeared on a regulatory compliance page on Apple’s website under its line-up of 2026 MacBooks. First spotted by MacRumors, the listing appears to be an accident and has since been removed, but may have been a leaked reference to a rumored entry-level MacBook. Unfortunately, it didn’t include any additional details beyond the device’s name and model number.
The lower price and an “entirely new design” could help the new MacBook appeal to students and casual users, competing with Chromebooks and low-cost Windows laptops. A more affordable MacBook could be especially appealing after Apple announced the M5 MacBook Air on Tuesday, which has a higher starting price than last year’s Air.
-
World6 days agoExclusive: DeepSeek withholds latest AI model from US chipmakers including Nvidia, sources say
-
Massachusetts7 days agoMother and daughter injured in Taunton house explosion
-
Denver, CO7 days ago10 acres charred, 5 injured in Thornton grass fire, evacuation orders lifted
-
Louisiana1 week agoWildfire near Gum Swamp Road in Livingston Parish now under control; more than 200 acres burned
-
Oregon5 days ago2026 OSAA Oregon Wrestling State Championship Results And Brackets – FloWrestling
-
Florida3 days agoFlorida man rescued after being stuck in shoulder-deep mud for days
-
Maryland3 days agoAM showers Sunday in Maryland
-
Culture1 week agoTry This Quiz on Thrilling Books That Became Popular Movies