Connect with us

Technology

Ditch your password, switch to a passkey for your Amazon account

Published

on

Ditch your password, switch to a passkey for your Amazon account

Amazon has introduced a new way of signing in to your Amazon account that does not require a password.

It’s called a passkey. Amazon is an early adopter of this new authentication method.

With a passkey, you can sign in to your Amazon account using the same biometric methods you use to unlock your device, whether it’s through a fingerprint, facial recognition or a lock screen PIN.

UNLOCK EXCLUSIVE INSIGHTS: JOIN KURT’S CYBERGUY NEWSLETTER FOR FREE TO GET SECURITY ALERTS AND LIFE-CHANGING HACKS TO YOUR INBOX

Sign in with a passkey on Amazon shopping app (Kurt “CyberGuy” Knutsson)

Advertisement

What is a passkey?

A passkey is designed to replace traditional passwords with a safer and more convenient alternative. Unlike passwords, which are often vulnerable to theft or guessing, passkeys offer enhanced security by linking your identity to a specific device.

Essentially, a passkey proves that you have physical access to your device and can unlock it. This means you no longer have to rack your brain remembering complex passwords or resorting to easily guessable information like names or birthdays.

Additionally, passkeys are less susceptible to phishing attacks compared to traditional passwords or one-time codes sent via text messages, making them a more secure option for Amazon customers.

MORE: 10 INSIDER TIPS TO GET STUFF ABSOLUTELY FREE ON AMAZON

Signing in to an Amazon account using a biometric method (Amazon)

Advertisement

MORE: A PRIVACY WIN: AMAZON LIMITS POLICE ACCESS TO YOUR RING CAMERA

3 important things to know about Amazon’s passkeys

Here are three key features of Amazon’s passkeys:

1) Cross-platform compatibility: Passkeys work seamlessly across various platforms and browsers, including iPhones, laptops, Android phones, and the Chrome browser.

2) End-to-End Encryption: Your passkeys and biometric data remain private, as they are never shared with Amazon, safeguarding your account against phishing attacks and data breaches.

3) Option to Use Password: If you prefer, you can still use your Amazon password to sign in even after enabling passkeys.

Advertisement

FACIAL RECOGNITION IS EXPANDING ITS WATCHFUL EYE BUT SUFFERS FROM NOTABLE FAILS

Requirements and additional information on Amazon’s passkeys

To enable passkeys, your device must meet specific software requirements:

  • For iOS users: iOS 16 or later
  • For macOS users: macOS Big Sur or later
  • For Android users: Android 9 or later

Additionally, ensure that you are using the latest version of your web browser and have both screen lock and Bluetooth enabled on your device. In the event you need to sign in to another Amazon Marketplace from your browser, you will either need to set up a new passkey or sign in using your Amazon password.

MORE: 6 IMPORTANT AMAZON PRIVACY SETTINGS TO CHANGE RIGHT NOW

How to set up an Amazon passkey for your Amazon account

Switching to a passkey is simple if you have an existing Amazon account along with either an iPhone, Android, or Mac with the latest software.

Setting up a passkey on the Amazon shopping app

If you don’t see that prompt when you sign in or you’re a new Amazon customer, here’s how to set up a passkey on the Amazon app. First, if you don’t already have the Amazon Shopping app, download it from the App Store or Google Play. Setting up a passkey is similar for iOS and Android devices, but you may see some variations in the screens and messages.

Advertisement
  • Launch the Amazon shopping app and sign in with your Amazon account.
  • Tap the profile icon on the bottom toolbar
  • Tap Your Account
  • Under Account settings, tap Login & security
  • Enter your email and press continue

Steps to set up passkey on Amazon shopping app (Kurt “CyberGuy” Knutsson)

  • Enter your password, then click Sign in
  • You may need to enter a verification code that Amazon will send to your phone or email, then click Sign in
  • Next to the word Passkey, click on Set up
  • The next screen explains how passkeys work. Tap the Set up button.

Steps to set up passkey on Amazon shopping app (Kurt “CyberGuy” Knutsson)

  • Then, it will ask you, “Use your Face ID to sign in? Click on Continue

Steps to set up passkey on Amazon shopping app (Kurt “CyberGuy” Knutsson)

Setting up an Amazon passkey on your computer

If you don’t see a prompt when you first sign in or you’re a new Amazon customer, here’s how to set up a passkey on your computer.

  • Log in to amazon.com with your existing account, then hover over “Account & Lists” in the upper right corner, scroll down, and click Account
  • Click Login & Security and enter your password, then click Sign in
  • You may need to enter a verification code that Amazon will send to your phone or email.
  • Click on Set up next to the word Passkey
  • Then click on Set up
  • Then, it will ask you, “Use Face ID, or Touch ID to sign in?” Use your face or thumb to finish the Set up

Now you can use your passkey to sign in to your Amazon account without a password. Just enter your email and choose Sign in with a passkey. Your device will ask you to authenticate with your face, fingerprint, or PIN.

MORE: 9 BEST FEATURES OF AMAZON PRIME YOU MAY NOT KNOW ABOUT

Kurt’s key takeaways

Amazon’s passkey is a new way of signing in to your Amazon account that does not require a password. It is a safer and more convenient alternative to traditional passwords, as it uses your biometric data or lock screen PIN to verify your identity. Passkeys work across different platforms and browsers, and they are encrypted end-to-end, so your data is never shared with Amazon or anyone else.

Advertisement

What do you think of Amazon’s passkey? Are you going to make the switch or stick with using a password? Why or why not? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Department of Justice appeals Google search monopoly ruling

Published

on

Department of Justice appeals Google search monopoly ruling

On Tuesday, the Department of Justice and the plaintiffs in the antitrust case against Google filed a cross-appeal, as the DOJ Antitrust Division announced in a post on X: “Today, the DOJ Antitrust Division filed notice that it will cross-appeal from the remedies decisions in its case against Google’s unlawful monopolization of internet search and search advertising.”

Just a few weeks ago, Google itself filed a notice to appeal and requested a pause on the remedies ordered by DC District Court Judge Amit Mehta last year. Those remedies included requiring Google to share search data with its rivals and barring Google from making exclusive distribution deals for its search or AI products that could hinder distribution for competitors. However, Google was ultimately not required to sell its Chrome browser and wasn’t barred from paying distribution partners for preloading or premium placement of its search or AI products.

The DOJ’s cross-appeal suggests that neither party is fully satisfied with Judge Mehta’s ruling in the case, or at least the remedies ordered in September.

Continue Reading

Technology

149 million passwords exposed in massive credential leak

Published

on

149 million passwords exposed in massive credential leak

NEWYou can now listen to Fox News articles!

It has been a rough start to the year for password security. A massive database containing 149 million stolen logins and passwords was found publicly exposed online. 

The data included credentials tied to an estimated 48 million Gmail accounts, along with millions more from popular services. Cybersecurity researcher Jeremiah Fowler, who discovered the database, confirmed it was not password-protected or encrypted. Anyone who found it could have accessed the data. 

Here is what we know so far and what you should do next.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

A publicly exposed database left millions of usernames and passwords accessible to anyone who found it online. (Wei Leng Tay/Bloomberg via Getty Images)

What was found in the exposed database

The database contained 149,404,754 unique usernames and passwords. It totaled roughly 96 GB of raw credential data. Fowler said the exposed files included email addresses, usernames, passwords and direct login URLs for accounts across many platforms. Some records also showed signs of info-stealing malware, which silently captures credentials from infected devices. 

Importantly, this was not a new breach of Google, Meta or other companies. Instead, the database appears to be a compilation of credentials stolen over time from past breaches and malware infections. That distinction matters, but the risk to users remains real.

Which accounts appeared most often

Based on estimates shared by Fowler, the following services had the highest number of credentials in the exposed database.

Advertisement
  • 48 million – Gmail
  • 17 million – Facebook
  • 6.5 million – Instagram
  • 4 million – Yahoo Mail
  • 3.4 million – Netflix
  • 1.5 million – Outlook
  • 1.4 million – .edu email accounts
  • 900,000 – iCloud Mail
  • 780,000 – TikTok
  • 420,000 – Binance
  • 100,000 – OnlyFans

Email accounts dominated the dataset, which matters because access to email often unlocks other accounts. A compromised inbox can be used to reset passwords, access private documents, read years of messages and impersonate the account holder. That is why Gmail appearing so frequently in this database raises concerns beyond any single service.

SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

Email accounts appeared most often in the leaked data, which is especially concerning because inbox access can unlock many other accounts. (Felix Zahn/Photothek via Getty Images)

Why the exposed database creates serious security risks

This exposed database was not abandoned or forgotten. The number of records increased while Fowler was investigating it, which suggests the malware feeding it was still active. There was also no ownership information attached to the database. After multiple attempts, Fowler reported it directly to the hosting provider. It took nearly a month before the database was finally taken offline. During that time, anyone with a browser could have searched it. That reality raises the stakes for everyday users.

This was not a traditional hack or company breach

Hackers did not break into Google or Meta systems. Instead, malware infected individual devices and harvested login details as people typed them or stored them in browsers. This type of malware is often spread through fake software updates, malicious email attachments, compromised browser extensions or deceptive ads. Once a device is infected, simply changing passwords does not solve the problem unless the malware is removed.

TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

Advertisement

Researchers believe infostealing malware collected the credentials, silently harvesting logins from infected devices over time. (Jaap Arriens/NurPhoto via Getty Images)

How to protect your accounts after a massive password leak

This is the most important part. Take these steps even if everything seems fine right now. Credential leaks like this often surface weeks or months later.

1) Stop reusing passwords immediately

Password reuse is one of the biggest risks exposed by this database. If attackers get one working login, they often test it across dozens of sites automatically. Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse. 

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

Advertisement

2) Switch to passkeys where available

Passkeys replace passwords with device-based authentication tied to biometrics or hardware. That means there is nothing for malware to steal. Gmail and many major platforms already support passkeys, and adoption is growing fast. Turning them on now removes a major attack surface.

3) Enable two-factor authentication on every account

Two-factor authentication (2FA) adds a second checkpoint, even if a password is exposed. Use authenticator apps or hardware keys instead of SMS when possible. This step alone can stop most account takeover attempts tied to stolen credentials.

4) Scan devices for malware with strong antivirus software

Changing passwords will not help if malware is still on your device. Install strong antivirus software and run a full system scan. Remove anything flagged as suspicious before updating passwords or security settings. Keep your operating system and browsers fully updated as well.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

5) Review account activity and login history

Most major services show recent login locations, devices and sessions. Look for unfamiliar activity, especially logins from new countries or devices. Sign out of all sessions if the option is available and reset credentials right away if anything looks off.

6) Use a data removal service to reduce exposure

Stolen credentials often get combined with data scraped from data broker sites. These profiles can include addresses, phone numbers, relatives and work history. Using a data removal service helps reduce the amount of personal information criminals can pair with leaked logins. Less exposed data makes phishing and impersonation attacks harder to pull off.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Advertisement

7) Close accounts you no longer use

Old accounts are easy targets because people forget to secure them. Close unused services and delete accounts tied to outdated app subscriptions or trials. Fewer accounts mean fewer chances for attackers to get in.

Kurt’s key takeaways

This exposed database is another reminder that credential theft has become an industrial-scale operation. Criminals move fast and often prioritize speed over security. The good news is that simple steps still work. Unique passwords, strong authentication, malware protection and basic cyber hygiene go a long way. Do not panic, but do not ignore this either.

If your email account was compromised today, how many other accounts would fall with it? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved.  

Continue Reading

Technology

The Switch is now Nintendo’s best-selling console of all time

Published

on

The Switch is now Nintendo’s best-selling console of all time

The original Switch is officially Nintendo’s best-selling console of all time after surpassing the DS handheld in lifetime sales. In its latest earnings release, Nintendo reports that the Nintendo Switch has, as of December 31, 2025, sold 155.37 million units since its launch in 2017, compared to 154.02 million units for the 2004 Nintendo DS.

In November, Nintendo reported that the Switch and DS were neck and neck. We expected the holiday sales period would see the Switch surpass the DS, even with Nintendo announcing that primary development would focus on the Switch 2. Nintendo previously said that it would continue to sell the original Switch “while taking consumer demand and the business environment into consideration.”

Nintendo has to keep selling the Switch if it wants to dethrone Sony’s PlayStation 2 as the best-selling video game console of all time. The PlayStation 2, discontinued in January 2013, sold more than 160 million units over its 13-year lifespan.

Demand for the Switch 2 accelerated over the holidays, with Nintendo reporting 7.01 million units sold during the quarter covering October through December, compared to 4.54 million units in the previous quarter. In total, the Switch 2 has now sold 17.37 million units since it launched in June 2025, taking less than a year to surpass the Wii U’s 13.7 million lifetime sales.

The Switch 2 launch has helped Nintendo to drive a 51 percent increase in net profit over the first nine months of FY26, reaching ¥358.86 billion (about $2.31 billion). Net sales almost doubled during the same period, jumping to ¥1.906 trillion (about $12.2 billion) compared to ¥956.2 billion ($6.1 billion) last year. Looking ahead, Nintendo maintains its forecast to sell 19 million Switch 2 units by the end of this financial year.

Advertisement
Continue Reading

Trending