Connect with us

Technology

Is your Roku safe? Massive data breach exposes thousands of accounts

Published

on

Is your Roku safe? Massive data breach exposes thousands of accounts

Join Fox News for access to this content

Plus special access to select articles and other premium content with your account – free of charge.

Please enter a valid email address.

By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. To access the content, check your email and follow the instructions provided.

Having trouble? Click here.

Hackers have stolen data from at least 15,363 Roku users, including credit card information, passwords and more. 

According to Roku officials, hackers used information from third-party sources to break into accounts. They then sold user data for just $0.50 per account, according to BleepingComputer.

Advertisement

This effectively lets anyone who wants to pay 50 cents use the credit card stored in the account. 

While Roku says they have secured affected accounts, you can still take steps to ensure your safety.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Roku stuffing attack

According to Roku, hackers obtained usernames and passwords from a third party. This is called a password stuffing attack. Hackers will try to use those logins on several websites, hoping to get your personal information. Once they do break into your account, your credit card information, shipping address, email, and password are all susceptible.

Advertisement

FRENCH GOVERNMENT HIT WITH ‘UNPRECEDENTED’ WAVE OF CYBERATTACKS

Roku has secured accounts and forced password resets on affected accounts. The company also investigated for fraudulent charges, canceled subscriptions and issued refunds to defrauded users.

MORE: HOW TO FIND OUT WHO’S SPYING ON YOU

Someone else is controlling my Roku

We often hear of people wondering how someone else nearby can get access to their Roku device. Channels may change unexpectedly, content can be cast onto the Roku or the previously viewed shows may not be recognizable. If this happens, in addition to locking down your wireless home network and following advice in the next section, check your Roku settings for anything unusual. Here’s how.

Advertisement
  • On the Roku remote, press the home button to go to the main screen
  • Select “Settings,” then System, find Screen Mirroring, and make sure “none” is selected for others having permission to stream content to your Roku
  • Next, do the same for Remotes by selecting Remotes & Devices from the Settings menu. Unless you have permitted others, you should not see any other remote control devices connected except yours
  • Now check the Guest Mode by clicking Guest Mode from the Settings menu. Make sure no other people are shown — who may have access to your Roku in Guest Mode
  • Finally, from the Settings menu, select System, then Advanced System Settings. Click Control by mobile apps and make sure you see either “default” or “disabled” selected so that no one else is using a mobile app to control your Roku

Data on a computer. (Kurt “CyberGuy” Knutsson)

MORE: HOW TO PROTECT YOURSELF FROM STREAMING HACKS

Roku’s response to the hack

Roku announced the breach in a public memo sent to customers dated March 8, citing various information on what happened and what the company is doing to combat the issue:

“We are committed to maintaining the privacy and security of your Roku account and we are taking this incident very seriously. When we identified potentially impacted Roku accounts, we secured the accounts from further unauthorized access by requiring the registered account holder to reset the password, we investigated account activity to determine whether the unauthorized actors had incurred any charges, and we took steps to cancel unauthorized subscriptions and refund any unauthorized charges.

“We did not delay notification as a result of a law enforcement investigation, and we are providing this letter to notify you about these issues, to provide information about how you can further protect yourself, and to let you know that we are continuing our investigation to identify any additional appropriate steps. Finally, our team continues to actively monitor for signs of suspicious activity, to ensure that all customer information and data is kept secure.”

What to do if you’ve been hacked

If it has already happened and you’ve been hacked, then you should take immediate action to minimize the damage and secure your device. Here are some steps that you can follow.

Advertisement

Change your Roku passwords

If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device, so the hacker isn’t recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.

Enable two-factor authentication: You’ll want to activate two-factor authentication for an extra layer of security.

Monitor your accounts and transactions

You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or the authorities as soon as possible. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.

Use identity theft protection

Identity Theft protection companies can monitor personal information like your home title, Social Security Number (SSN), phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

Advertisement

Contact your bank and credit card companies

If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should contact your bank and credit card companies and inform them of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.

Alert your contacts

If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual. 

Hacker on a computer. (Kurt “CyberGuy” Knutsson)

MORE: HACKERS USE PIRATED SOFTWARE TO HIJACK MAC, ANDROID AND WINDOWS DEVICES

Kurt’s key takeaways

Who knew hackers could snag your info for less than a cup of coffee? The good news is Roku took action and locked things down. Plus, we now have a game plan to keep our accounts extra secure. Remember, the key is making it as tough as possible for hackers. Strong passwords, two-factor authentication — that kind of stuff. And keeping an eye on your accounts for anything fishy. If you think you’ve been hacked, don’t panic. Just follow the steps we discussed — changing passwords, checking accounts and contacting your bank.

Advertisement

Do you think streaming services have a responsibility to do more to protect user data? Why or why not? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most-asked CyberGuy questions:

Advertisement

Copyright 2024 CyberGuy.com. All rights reserved.

Technology

Adobe actually won’t discontinue Animate

Published

on

Adobe actually won’t discontinue Animate

Adobe is no longer planning to discontinue Adobe Animate on March 1st. In an FAQ, the company now says that Animate will now be in maintenance mode and that it has “no plans to discontinue or remove access” to the app. Animate will still receive “ongoing security and bug fixes” and will still be available for “both new and existing users,” but it won’t get new features.

An announcement email that went out to Adobe Animate customers about the discontinuation did “not meet our standards and caused a lot of confusion and angst within the community,” according to a Reddit post from Adobe community team member Mike Chambers.

Animate will be available in maintenance mode “indefinitely” to “individual, small business, and enterprise customers,” according to Adobe. Before the change, Adobe said that non-enterprise customers could access Animate and download content until March 1st, 2027, while enterprise customers had until March 1st, 2029.

Continue Reading

Technology

Your phone shares data at night: Here’s how to stop it

Published

on

Your phone shares data at night: Here’s how to stop it

NEWYou can now listen to Fox News articles!

If your smartphone stays on your bedside table overnight, it stays busy long after you fall asleep. 

Even while it appears idle, your phone continues to send and receive data in the background. Some of that activity is expected. Your device checks for security patches, syncs system settings and keeps essential services running. Other data transfers are far less obvious and far less necessary.

Experts warn that smartphones routinely transmit tracking and advertising signals without you fully realizing it. In many cases, that data includes information that should only be shared with clear and informed consent.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

Even while you sleep, a nearby smartphone can continue sending and receiving data in the background. (Getty Images/monkeybusinessimages)

What data your phone sends while you sleep

Your phone is not just charging overnight. It operates in a continuous data loop that generally falls into two categories.

Legitimate system data

This includes updates, crash reports and basic diagnostics. Operating systems rely on this information to fix bugs, improve stability and protect against security threats. In most cases, this data collection is disclosed and configurable.

Advertisement

Tracking and advertising data

This is where concerns grow. Smartphones also transmit location signals, device identifiers, advertising IDs, usage patterns and app behavior data. Companies combine this information to build detailed user profiles and deliver targeted ads that promise higher engagement. The problem is that the line between necessary diagnostics and commercial tracking is often blurry. Many of us never realize how much data flows out of our phones overnight.

TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

Phones often stay active overnight, syncing apps, checking networks and refreshing data unless you limit background activity. (Kurt “CyberGuy” Knutsson)

What we know about phone tracking today

Independent academic investigations found that some Android devices transmitted data linked to tracking behaviors involving major companies like Meta and Yandex. The research, conducted by teams from IMDEA Networks Institute and European universities, showed that certain apps and services continued communicating with external servers even after users attempted to limit tracking. The researchers observed data flows that could link web activity with app identifiers, raising concerns about how effectively privacy controls were enforced at the system level.

Advertisement

There is also long-standing concern around smartphones appearing to “listen” to conversations. While no public evidence shows that phones actively record private speech for advertising, many users report ads that closely mirror recent conversations. At a minimum, aggressive data collection combined with location, app usage and search history can make these moments feel unsettling.

Despite years of scrutiny, most smartphones still operate this way today. The good news is that you can reduce how much data leaves your device.

How to protect yourself from overnight data sharing

You do not need to give up your smartphone to regain control. Small settings changes can make a real difference.

1) Review app permissions

Start with your installed apps. Focus on those with access to your location, microphone, camera and tracking data. Only allow sensitive permissions while the app is in use. Be especially cautious with apps that run continuously in the background.

How to review app permissions on iPhone 

Advertisement
  • Open Settings
  • Tap Privacy & Security
  • Tap Location ServicesMicrophoneCamera or Tracking
  • Select an app from the list
  • Choose While Using the App or Never when available

For tracking controls:

  • Go to Settings
  • Click Privacy & Security
  • Tap Tracking
  • Turn off Allow Apps to Request to Track

This prevents apps from accessing your advertising identifier and sharing activity across apps and websites.

AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

Turning off app tracking on your iPhone blocks apps from linking your activity across other apps and websites. (Kurt “CyberGuy” Knutsson)

How to review app permissions on Android

Settings may vary depending on your Android phone’s manufacturer.

  • Open Settings
  • Tap Privacy & Security or Security and privacy 
  • Click More privacy settings 
  • Tap Permission Manager
  • Select LocationMicrophoneCamera or Sensors
  • Tap an app and choose Allow only while using the app or Don’t allow

To review background access:

  • Go to Settings
  • Click Apps
  • Select an app
  • Tap Mobile data & Wi-Fi
  • Turn off Background data if the app does not need constant access

This limits silent data transfers when the app is not actively open.

2) Limit background activity

Disabling background activity reduces how often apps sync data when you are not using them. This also limits automatic cloud activity. Keep in mind that this may affect real-time backups or notifications. Weigh the convenience against the privacy trade-off.

Advertisement

How to limit background activity on iPhone

Turn off Background App Refresh

  • Open Settings
  • Tap General
  • Tap Background App Refresh
  • Tap Background App Refresh at the top
  • Select Off or Wi-Fi

To disable it for specific apps:

  • Stay on the Background App Refresh screen
  • Toggle off apps that do not need to update in the background

This prevents apps from quietly syncing data when they are not open.

How to limit background activity on Android 

Settings may vary depending on your Android phone’s manufacturer.

Restrict background data

Advertisement
  • Open Settings
  • Tap Apps
  • Select an app
  • Tap Mobile data & Wi-Fi
  • Turn off Background data

Restrict background battery usage

  • From the app’s settings screen, tap Battery
  • Select Restricted or Limit background usage

This reduces background syncing and prevents apps from running silently when you are not actively using them.

3) Turn off personalized advertising

Personalized ads rely on device identifiers and activity data collected across apps. Turning this off limits how your behavior is used for ad targeting, even when your phone is idle.

How to turn off personalized ads on iPhone

  • Open Settings
  • Tap Privacy & Security
  • Tap Tracking
  • Turn off Allow Apps to Request to Track

To limit Apple ads:

  • Go to Settings
  • Click Privacy & Security
  • Tap Apple Advertising
  • Turn off Personalized Ads

This reduces ad targeting based on your activity within Apple services.

TAX SEASON SCAMS SURGE AS FILING CONFUSION GROWS

Disabling personalized ads reduces how your behavior is used to target ads, even when your phone is idle. (Kurt “CyberGuy” Knutsson)

How to turn off personalized ads on Android

Advertisement

Settings may vary depending on your Android phone’s manufacturer.

  • Open Settings
  • Tap Privacy & Security or Security and privacy
  • Click More privacy settings
  • Tap Ads or Advertising
  • Tap Delete advertising ID or Opt out of Ads Personalization
  • Click Delete advertising ID

You can also reset your advertising ID from this menu to break the link between past activity and future ads.

This limits how apps and advertisers track behavior across apps and websites.

4) Consider a VPN

A reputable VPN can help obscure your IP address and reduce certain forms of network-based tracking. It does not stop all data collection, but it adds a layer of protection, especially on shared or public networks.

For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Remove your data from broker sites

Even if you lock down your phone, much of your personal information already exists online. Data brokers collect and sell details like your name, address, phone number and browsing behavior.

Advertisement

Using a reputable data removal service can help locate and remove your information from these sites. This reduces how easily advertisers and third parties can link your phone activity to your real identity.

For ongoing protection, these services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Use airplane mode or power off at night

If overnight data sharing concerns you, the simplest option is also the most effective. Turning your phone off or using airplane mode cuts off wireless communication while still allowing alarms to work.

Advertisement

How to turn on airplane mode on iPhone

  • Open Control Center by swiping down from the top right corner
  • Tap the airplane icon so it turns orange
  • Confirm that cellular, Wi Fi and Bluetooth turned off

How to turn on airplane mode on Android

Settings may vary depending on your Android phone’s manufacturer.

  • Swipe down from the top of the screen to open Quick Settings
  • Tap the airplane mode icon
  • Check that mobile data, Wi Fi and Bluetooth are disabled

If you still want Bluetooth for a watch or headphones, you can turn it back on manually after enabling airplane mode. This keeps most background data transfers blocked while you sleep.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Your smartphone works around the clock, even when you do not. Some background data sharing keeps your device secure and functional. Other data collection exists primarily to fuel tracking and advertising. The key is awareness and control. By tightening permissions, limiting background activity and disabling ad personalization, you reduce how much of your personal data leaves your phone while you sleep. Privacy is not about fear. It is about informed choices.

Advertisement

Do you leave your phone fully on overnight, or will tonight be the night you finally switch it off? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.  

Advertisement
Continue Reading

Technology

Department of Justice appeals Google search monopoly ruling

Published

on

Department of Justice appeals Google search monopoly ruling

On Tuesday, the Department of Justice and the plaintiffs in the antitrust case against Google filed a cross-appeal, as the DOJ Antitrust Division announced in a post on X: “Today, the DOJ Antitrust Division filed notice that it will cross-appeal from the remedies decisions in its case against Google’s unlawful monopolization of internet search and search advertising.”

Just a few weeks ago, Google itself filed a notice to appeal and requested a pause on the remedies ordered by DC District Court Judge Amit Mehta last year. Those remedies included requiring Google to share search data with its rivals and barring Google from making exclusive distribution deals for its search or AI products that could hinder distribution for competitors. However, Google was ultimately not required to sell its Chrome browser and wasn’t barred from paying distribution partners for preloading or premium placement of its search or AI products.

The DOJ’s cross-appeal suggests that neither party is fully satisfied with Judge Mehta’s ruling in the case, or at least the remedies ordered in September.

Continue Reading

Trending