Technology
How to protect yourself from the Venmo, Zelle and Cash App scam that can wipe out your savings in seconds
paymen
Imagine walking down the sidewalk and being confronted at gunpoint by a crook.
Open the payment app on your phone and transfer out your hard-earned cash, or take a bullet in the head. That’s one phone cash ripoff scenario of many playing out in real-life America.
Other cash app crimes are happening due to the vulnerability of an unlocked iPhone without the new Stolen Device Protection turned on in iOS. These are examples of how mobile payment apps can put your money and your life at risk.
Do you use mobile payment apps like Venmo, Zelle or Cash App to send and receive money? If so, you’re not alone. These peer-to-peer payment services now handle an estimated $1 trillion in payments. And with that much money involved, there are also now a lot of fraud and scams going on, according to Alvin Bragg, the Manhattan district attorney. He says these apps are exposing many people to scammers and thieves and are costing them a lot of their hard-earned cash.
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
Manhattan District Attorney Alvin Bragg (manhattanda.org)
In response, Bragg has written letters to the companies that own these apps, demanding they improve their security and protect their users from scams and thefts. His specific request is that they impose limits on transactions, require secondary verification of up to a day and better monitor unusual activity. He says he is requesting meetings with the companies to discuss these issues.
Venmo, Cash App and Zelle apps (Kurt “Cyberguy” Knutsson)
How an unlocked device can lead to financial disaster and personal harm
Bragg’s letters describe how these financial apps enable criminals to access unlocked devices and exploit them for financial gain and identity theft, saying,
“These crimes involve an unauthorized user gaining access to unlocked devices and then draining bank accounts of significant sums of money, making purchases with mobile financial applications, and using financial information from the applications to open new accounts.
“Offenders also take over the phone’s security by changing passwords, recovery accounts, and application settings. The ease with which offenders can collect five- and even six-figure windfalls in a matter of minutes is incentivizing a large number of individuals to commit these crimes, which are creating serious financial, and in some cases physical, harm to our residents.”
MANHATTAN DA ALVIN BRAGG CALLS FOR CASH APPS TO CRACK DOWN ON FRAUDSTERS
What are the mobile payment apps doing to prevent fraud?
The companies that own these apps have responded to Bragg’s comments and said that they are doing their best to provide a safe and reliable service to their customers. We reached out to all three companies. Here are their responses to us.
“PayPal and Venmo take the safety and security of our customers and their information very seriously. In addition to proactively leveraging sophisticated fraud detection tools, manual investigations, and partnering closely with law enforcement agencies to protect our customers against common scams, we have several options in place to enable enhanced layers of security and protection directly within our apps.” — PayPal and Venmo spokesperson
“Cash App continues to be committed to building trust with our customers and investing in areas that help build a safe and secure platform. We work proactively and diligently to safeguard our customer’s money and mitigate against the risk of fraud on our platform through a combination of preventative controls like multi-factor authentication, account transaction limits, fraud detection, and consumer education. We also partner with law enforcement agencies to detect and combat criminal activity.” — Cash App spokesperson
“We are aware of isolated criminal incidents described in the Manhattan District Attorney’s letter. Providing a safe and reliable service to consumers is the top priority of Early Warning Services, LLC, the network operator of Zelle®, and our 2,100 participating banks and credit unions. As a result of our continued efforts to build on Zelle’s strong foundation of security, less than one tenth of one percent of transactions are reported as fraud or scams, and that percentage keeps getting smaller. Our efforts include implementing industry-leading fraud and scam prevention measures for consumers like in-app safety notifications, and send limits and restrictions.” — Spokesperson for Early Warning Services, LLC, the network operator of Zelle
What’s the problem with mobile payment apps?
Bragg says that he is seeing a lot of cases where people have lost money or had their personal information stolen by using these apps. He said that this is happening because of the way these apps work on your phone or tablet. Here are three ways that crooks can cheat you or steal from you using these apps.
1) Phishing: This is when someone pretends to be someone else and sends you a message or email asking you to send money or give them your account details. For example, you might get a message from someone who says they are your friend, family member or a charity and they need your help urgently. Or you might get an email from someone who says they are your bank, the IRS or a mobile payment app and they need you to verify your account or update your information.
2) Spoofing: This is when someone creates a fake profile or account that looks like a real one and tries to fool you into sending money or accepting a payment. For example, you might get a payment request from someone who says they are selling something online, but their name, photo, or username is slightly different from the real seller. Or you might get a payment from someone who says they are a buyer, but they are actually using a fake check or a stolen credit card.
3) Device theft: This is when someone takes your phone or tablet and uses your mobile payment apps to take your money or make purchases without your permission. For example, someone might grab your phone while you are using it in public, or break into your car or home and take your device. Or someone might ask to use your phone for a legitimate reason, but then use it to access your mobile payment apps behind your back.
Woman on iPhone. (Kurt “Cyberguy” Knutsson)
MORE: STOLEN DEVICE PROTECTION IN LATEST IOS 17.3 UPDATE PROTECTS YOUR IPHONE EVEN MORE FROM CROOKS — THIS THIS ON ASAP
How can you protect yourself from mobile payment fraud?
Mobile payment apps have some security features to help protect you, but they are not enough, and you should not rely on them alone. You should also do these 10 things.
1) You should always access the payment app from the official app or website, and not from any third-party platforms or services.
2) Look at the security settings that the payment app offers and make sure they’re all set to the highest and most protective settings.
3) You should create a strong, unique, and complex password for each of your mobile payment apps and change it often. Consider using a password manager to generate and store complex passwords.
4) Enable two-factor authentication, which means that you need to enter a code or use your fingerprint or face to unlock your account to prevent unauthorized access. This way, even if someone knows your password, they can’t log in without your device or confirmation.
5) Lock your device and log out of your apps. You should always lock your phone with a password, PIN, pattern, fingerprint or face. Never share your password, PIN or security code with anyone. You should also log out of your mobile payment apps after each use and turn off the auto-login feature. This way, even if someone takes or borrows your device, they can’t access your mobile payment apps without your approval.
6) Verify the identity and legitimacy of the sender or receiver. You should always check the name, photo, username and contact information of the person or organization you are sending money to or receiving money from before accepting or sending any payment requests. You should also confirm the reason and amount of the transaction before you agree to it. If you are not sure or have any doubts, you should contact the person or organization directly through another way, such as a phone call, text message or email, but only if you know for sure that those forms of communication are legitimate. You should never send money or give your account details to anyone you don’t know or trust, or anyone who asks you to do so out of the blue.
7) Link your Venmo, Cash App and PayPal account to a credit card as opposed to a debit card, so you can dispute a charge from scammers more easily. Zelle does not allow credit card payments. However, keep in mind that linking a credit card to your payment app can provide additional protection in the event of fraud, but this can come with extra costs in terms of transaction fees.
8) Try not to keep a balance in your money-transferring apps. You have a much better chance of being helped by your bank or credit card company when it comes to fraud than you do from a money-transferring app.
9) Never click on links from unknown sources, especially when an email or text appears to have come from the payment App. Protect yourself from accidentally clicking malicious links by running antivirus software on your device. Get my picks for best antivirus software here.
10) Monitor your account activity and report any suspicious or unauthorized transactions. You should set up notifications from your payment app and your bank via text or email, and check your account activity regularly. Look for any signs of fraud, such as payments you didn’t make or receive, or changes to your account settings or information.
MORE: WATCH OUT FOR THIS ZELLE IMPOSTER SCAM ON FACEBOOK MARKETPLACE
What to do if you believe you have been scammed on Zelle, Cash App or Venmo
1) If you notice any suspicious or unauthorized transactions, report them to the payment app as soon as possible. You can contact their customer support team or use the report feature on the app or website to report any scams, phishing attempts or unauthorized transactions. You can also block or unfriend any users who are involved in scams.
2) Second, if you used your bank account or credit card to fund the transaction, contact your bank or credit card issuer to report the fraud and dispute the charge.
3) The third step is to change your password immediately to prevent further unauthorized transactions. Consider using a password manager to generate and store complex passwords.
4) Also, if you believe you have been scammed, you can file a complaint with the Federal Trade Commission (FTC) to report the fraudulent activity.
5) If you feel your personal data has been stolen, and you want a service that will walk you through every step of the reporting and recovery process, one of the best things you can do to protect yourself from this type of fraud is to subscribe to an identity theft protection company.
This service will monitor personal information like your home title, Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. Get my review of best identity theft protection software here.
6) Lastly, always report the scammer. If you have any information about the scammer, such as their name, phone number or email address, report it to the app company and the authorities.
Kurt’s key takeaways
Mobile payment apps are convenient and useful, but they also come with some risks that you are now aware of. By following these tips, you can protect yourself from mobile payment fraud and enjoy the benefits of these apps safely and securely.
Do you think these payment apps are doing enough to protect you from scammers? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most-asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Anker’s last-gen sleep buds are nearly 40 percent off ahead of daylight saving time
Bad news: most Americans are about to lose an hour of sleep next week. Good news: if you have trouble falling (or staying asleep), Newegg is currently selling Anker’s Soundcore Sleep A20 earbuds for $113.99 ($66 off) when you use coupon code MMSF88 at checkout, which drops them to just $6 shy of their lowest price to date.
A couple of us here at The Verge are fans of Anker’s last-gen sleep buds, which do a good job of muffling disruptive noises (including snoring). They’re lightweight and comfortable enough to wear overnight, even while sleeping on your side, with multiple ear tips and wings for a personalized fit. In fact, in his review, my colleague Thomas Ricker said that they improved his average sleep time by nearly 30 minutes within a two-week period.
What’s even more convenient is that they offer a variety of sleep-focused features to help you rest better. For example, you can use them to play a range of relaxing sounds, from meditation exercises and nature clips to white noise. You can use them as a regular pair of Bluetooth earbuds, too, just in case you prefer to listen to audiobooks or your own curated sleep playlist. They even come with adjustable EQ as well, though we wouldn’t recommend using them as your primary earbuds for music, given that they can’t match the audio quality you’d get from a pair of midrange earbuds from Apple, Sony, or Bose.
In addition, the Sleep A20 offer up to 14 hours of battery life and sleep tracking, providing insights into how long and how well you’ve slept via a companion app that also details your sleep positions and movements. The newer Soundcore Sleep A30 feature active noise cancellation, which is more effective at masking sounds than the A20’s passive isolation, but Anker’s last-gen earbuds remain a decent, budget-friendly option that can help you comfortably tune out most nighttime distractions for nearly half the price.
Technology
Figure data breach exposes nearly 1M accounts
Cyber expert shares tips to avoid AI phishing scams
Kurt ‘The CyberGuy’ Knutsson shares practical ways to avoid falling victim to AI-generated phishing scams and discusses a report that North Korean agents are posing as I.T. workers to funnel money into the country’s nuclear program.
NEWYou can now listen to Fox News articles!
If you have applied for a loan online, you probably shared more than you realized. Your name. Your email. Your date of birth. Maybe even your home address and phone number. Now imagine all of that sitting on a dark web forum.
That is the reality for nearly 1 million people after hackers breached Figure Technology Solutions, a blockchain-focused fintech lender.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
What happened in the Figure data breach
Figure Technology Solutions, founded in 2018, uses the Provenance blockchain for lending, borrowing and securities trading. The company says it has unlocked more than $22 billion in home equity through partnerships with banks, credit unions, fintechs and home improvement companies. However, behind the scenes, attackers were working on a very different angle.
GOOGLE DROPPED DARK WEB MONITORING: SHOULD YOU CARE?
Nearly 1 million accounts were exposed after hackers breached fintech lender Figure Technology Solutions in a social engineering attack. (Felix Zahn/Photothek via Getty Images)
According to breach notification data shared by Have I Been Pwned, information from 967,200 accounts was exposed. The leaked data included more than 900,000 unique email addresses along with names, phone numbers, physical addresses and dates of birth. That is a gold mine for identity thieves. Figure says the incident stemmed from a social engineering attack. What that means in simple terms is that someone inside the company was tricked into handing over access.
“We recently identified that an employee was socially engineered, and that allowed an actor to download a limited number of files through their account,” a Figure Technology Solutions spokesperson told CyberGuy in a statement. “We acted quickly to block the activity and retained a forensic firm to investigate what files were affected. We understand the importance of these matters and are communicating with partners and those impacted as appropriate. We are also implementing additional safeguards and training to further strengthen our defenses. We are offering complimentary credit monitoring to all individuals who receive a notice. We continuously monitor accounts and have strong safeguards in place to protect customers’ funds and accounts.”
Social engineering is the real weapon
When people hear the word blockchain, they think secure and untouchable. But attackers did not break cryptography. They targeted a human being. Groups like ShinyHunters specialize in this playbook. They reportedly claimed responsibility for the breach and, according to BleepingComputer, posted 2.5GB of data allegedly tied to thousands of loan applicants.
In recent weeks, the same group has claimed breaches involving companies like Canada Goose, Panera Bread and SoundCloud. Not every case is connected. Still, security researchers have observed a troubling pattern. Attackers impersonate IT support. They call employees. They create urgency. Then they direct victims to fake login portals that look nearly identical to real ones.
Once employees enter credentials and even multi-factor authentication codes, attackers gain access to single sign-on systems tied to major platforms like Microsoft and Google. From there, one compromised account can unlock a web of connected tools and internal systems.
PANERA BREAD DATA BREACH EXPOSES 5.1M CUSTOMERS
Security researchers say the Figure data leak underscores how social engineering bypasses even blockchain-based platforms. (Maxim Konankov/NurPhoto via Getty Images)
Why this matters to you
If your information was part of the Figure data breach, criminals now have enough detail to craft convincing phishing emails or phone scams. They can reference your real name. They can cite your address. They can pretend to be a lender or bank calling about your application.
Even if you never applied for a loan with Figure, this incident highlights something bigger. No platform is immune to human error. And social engineering works because it targets trust, not technology.
The bigger lesson about blockchain and trust
Figure markets itself as blockchain native. Blockchain can provide transparency and strong cryptographic security. However, none of that protects against a well-crafted phone call.
Security failures often happen at the human layer. That is where attackers focus their energy. As more financial services move online, the attack surface grows. Loan applications, identity verification tools and cloud-based systems create convenience. They also create new targets.
How to protect yourself after the Figure data breach
You cannot control how companies secure their systems. You can control how you respond. Start by checking whether your email address appears in the exposed dataset, then take the steps below to lock down your accounts.
SUBSTACK DATA BREACH EXPOSES EMAILS AND PHONE NUMBERS
Figure says an employee was tricked into granting access, allowing attackers to download sensitive customer data. (Luke MacGregor/Bloomberg via Getty Images)
Check if your email was exposed
To see if your email address was affected, visit https://haveibeenpwned.com/. Enter your email address to find out whether your information appears in the leak. When finished, return here and begin Step 1 below.
Take these steps immediately
- Change any exposed passwords right away. Do not leave a known leaked password in place. Update it everywhere you used it. Use a password manager to create strong, unique passwords for every account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
- Turn on multi-factor authentication wherever possible.
- Never share login codes with anyone, even if they claim to be IT support.
- Install strong antivirus software to help block phishing links, malicious downloads and ransomware that often follow major breaches. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
- Consider a data removal service to reduce your personal information on data broker sites, which scammers often combine with breached data. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
- Place a free fraud alert or credit freeze with the major credit bureaus.
- Monitor your bank and credit card statements weekly for suspicious activity.
Also, be cautious of unexpected calls about your accounts. If someone pressures you to act immediately, hang up and call the company directly using a number from its official website.
Kurt’s key takeaways
The Figure data breach is a reminder that technology alone cannot protect sensitive information. A single employee tricked into revealing credentials can expose hundreds of thousands of people. That is not a blockchain failure. It is a trust failure. If your data was involved, take action now. Even if it was not, treat this as a wake-up call. Your personal information has value. Criminals know it. Companies should know it too.
If one phone call can unlock nearly a million records, are companies investing enough in training people, or are they still betting everything on technology alone? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Apple’s website leaks MacBook ‘Neo,’ which could be its new cheaper laptop
During Apple’s week-long product launch event on Tuesday, a listing for the “MacBook Neo (Model A3404)” appeared on a regulatory compliance page on Apple’s website under its line-up of 2026 MacBooks. First spotted by MacRumors, the listing appears to be an accident and has since been removed, but may have been a leaked reference to a rumored entry-level MacBook. Unfortunately, it didn’t include any additional details beyond the device’s name and model number.
The lower price and an “entirely new design” could help the new MacBook appeal to students and casual users, competing with Chromebooks and low-cost Windows laptops. A more affordable MacBook could be especially appealing after Apple announced the M5 MacBook Air on Tuesday, which has a higher starting price than last year’s Air.
-
World6 days agoExclusive: DeepSeek withholds latest AI model from US chipmakers including Nvidia, sources say
-
Massachusetts7 days agoMother and daughter injured in Taunton house explosion
-
Denver, CO7 days ago10 acres charred, 5 injured in Thornton grass fire, evacuation orders lifted
-
Louisiana1 week agoWildfire near Gum Swamp Road in Livingston Parish now under control; more than 200 acres burned
-
Oregon5 days ago2026 OSAA Oregon Wrestling State Championship Results And Brackets – FloWrestling
-
Florida3 days agoFlorida man rescued after being stuck in shoulder-deep mud for days
-
Maryland3 days agoAM showers Sunday in Maryland
-
Culture1 week agoTry This Quiz on Thrilling Books That Became Popular Movies