Connect with us

Technology

How to use VPNs without compromising your banking apps

Published

on

How to use VPNs without compromising your banking apps

Using a VPN — a virtual private network — to browse the internet can give you more security and privacy online. It can also be used to access websites that might not be available in your location. (For instance, Netflix may not be available in some countries, but you can access it with a VPN). 

Some people may also use a VPN to make it appear that they are in a given location, even if they aren’t. This may help them to more easily navigate websites that put up blocks to people in different places.

But because of these security measures, some VPN users like Ernie from Blue Ridge, Georgia, who wrote to us, may face the opposite problem of being blocked out of websites, like online banking sites, that they usually would have no problem accessing. This can be frustrating and time-consuming to simply check something online, and it may lead many people to reconsider using a VPN altogether.

But is this the right move? Here’s what you need to know if this happens to you.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Advertisement

A person using a VPN on a laptop  (Kurt “CyberGuy” Knutsson)

FOX NEWS AI NEWSLETTER: EMILY BLUNT’S AI ADMISSION

What does a VPN do?

If you already have a VPN, you might know how it works. But, in case you’re unfamiliar or to give a little recap, a VPN essentially creates a secure tunnel between your device and the internet. This tunnel helps protect your online activities from being spied on by others, including hackers, your internet service provider or even governments.

When you connect to a VPN, it encrypts your data, meaning all the information you send and receive is jumbled up so that it becomes unreadable to anyone who might intercept it. This encryption helps ensure that sensitive information like your passwords, emails and browsing history remain private.  

It does this by masking your actual IP address, which stands for “internet protocol address,” a numerical label that identifies your device and your device’s general geographic location, with one from the VPN server, making it appear as though your online activities are coming from a different location.

Advertisement

This helps with privacy and allows you to access content that might be restricted in your actual location due to censorship or licensing agreements. Essentially, a VPN provides anonymity and freedom online by encrypting your data and hiding your online footprint.

MORE: BEST VPNS FOR BROWSING THE WEB PRIVATELY 2024

Why do some banks and websites not work when your VPN is on?

Because VPNs are designed to provide an additional layer of security and privacy to your online activities —including your banking transactions — some users run into trouble when they try to log into a bank with the VPN on. This is because some banks may block VPN connections as a security measure to prevent fraudulent activities. When you go to the website to log in, it might not let you proceed or give you an error page.

However, this is not a universal practice, and many banks allow VPN connections without issues. It can still happen, not just with banking websites, but with other websites.

A woman using a VPN while shopping online  (Kurt “CyberGuy” Knutsson)

Advertisement

MORE: WILL A VPN PREVENT APPS FROM TRACKING ME? 

What to do if you can’t log in to your online banking with the VPN on

If you’re facing issues logging into your online banking or other websites, it could be due to your VPN. In fact, there have been many times when we thought there was an issue with a website or getting online, and it turns out the VPN was the culprit! So, here’s what you can do:

1. Contact your bank’s customer support: They may be able to provide you with more information on why the app is not working with a VPN and offer a solution.

2. Try a different VPN: Some VPNs with your banking app may work better than others. Try using a different VPN service to see if it resolves the issue.

Advertisement

3. Disable the VPN when using banking apps: If none of the above solutions work, you can disable the VPN when using your banking app and enable it again when you’re done. VPNs with a plugin or widget pinned to your browser’s navigation bar can make enabling and disabling it very easy with a click of a button.

Disabling your VPN while using banking apps may be inconvenient, but it’s always better to err on the side of caution and prioritize your online safety.

If you’re concerned about privacy and security, ensure you’re connecting over a secure, private network and not public Wi-Fi.

A VPN on a laptop  (Kurt “CyberGuy” Knutsson)

MORE: HOW DO I USE A VPN FOR ONLINE BANKING WHEN I TRAVEL? 

Advertisement

The ultimate solution for private web surfing

While VPNs occasionally complicate access to certain websites, their privacy benefits cannot be overstated. So, consider using a VPN to protect against being tracked and identify your potential location on websites you visit. Depending on their privacy settings, many sites can read your IP address and display the city you are corresponding to. A VPN will disguise your IP address to show an alternate location. See my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

MORE: UNFORGETTABLE MOTHER’S DAY GIFTS 2024

Kurt’s key takeaways

Ultimately, regularly using a VPN when accessing the internet can be a great way to enhance your privacy and security while allowing you to access sites you may not otherwise be able to because of your location. However, this benefit is also a problem, as the VPN can prevent you from accessing sites you commonly need to get into, like your banking site. Despite this frustration, we recommend using a VPN whenever possible and taking the above measures to make your bank login seamless.

Have you ever encountered unexpected limitations or benefits while using a VPN?  Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.

Advertisement

Technology

Meta is closing down three VR studios as part of its metaverse cuts

Published

on

Meta is closing down three VR studios as part of its metaverse cuts

Meta is laying off about 10 percent of its Reality Labs metaverse division, and the cuts include closing down some of its VR gaming studios.

Twisted Pixel Games, the developer of Marvel’s Deadpool VR, Sanzaru Games, the developer of the Asgard’s Wrath franchise, and Armature Studio, which worked on the Resident Evil 4 VR port, are all being closed down, according to an internal memo viewed by Bloomberg. The team behind the VR fitness app Supernatural will no longer develop new content or features for it, though the “existing product” will still be supported, Bloomberg says. Meta spokesperson Tracy Clayton confirmed to The Verge that Bloomberg’s reporting is accurate.

Laid off staffers have posted about the closures online.

Meta acquired Supernatural developer Within in 2023 (after a fight with the FTC), Twisted Pixel and Armature in 2022, and Sanzaru in 2020. The company closed Echo VR developer Ready at Dawn, which it also acquired in 2020, in 2024.

In a statement about the broader Reality Labs layoffs, Clayton said that “We said last month that we were shifting some of our investment from Metaverse toward Wearables. This is part of that effort, and we plan to reinvest the savings to support the growth of wearables this year.”

Advertisement

Update, January 13th: Added details from Bloomberg about the studio closures.

Continue Reading

Technology

Teen hackers recruited through fake job ads

Published

on

Teen hackers recruited through fake job ads

NEWYou can now listen to Fox News articles!

At first glance, the job posts look completely harmless. They promise fast money, flexible hours and paid training. No experience required. Payment comes in crypto. But these are not tutoring gigs or customer service roles. They are recruiting ads for ransomware operations. 

And many of the people responding are middle and high school students. Some posts openly say they prefer inexperienced workers. Others quietly prioritize young women. All of them promise big payouts for “successful calls.”

What they leave out is the risk. Federal charges. Prison time. Permanent records. This underground ecosystem goes by a familiar name. Insiders often refer to it as “The Com,” short for “The Community.”

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS

Fake job ads promising fast cash and flexible hours are quietly recruiting teens into ransomware and extortion schemes, often paying in cryptocurrency to hide criminal activity. (Donato Fasano/Getty Images)

How The Com operates behind the scenes

The Com is not a single organized gang. It functions as a loose network of groups that regularly change names and members. Well-known offshoots tied to this ecosystem include Scattered Spider, Lapsus$, ShinyHunters and related splinter crews. Some groups focus on data theft. Others specialize in phishing or extortion. Collaboration happens when it benefits the operation. 

Since 2022, these networks have targeted more than 100 major companies in the U.S. and UK. Victims include well-known brands across retail, telecom, finance, fashion and media, including companies such as T-Mobile, Nike and Instacart. The combined market value of affected companies exceeds one trillion dollars.

Teenagers often take on the riskiest roles within these schemes. Phone calls, access testing and social engineering scripts typically fall to younger participants. More experienced criminals remain in the background, limiting their exposure.

Advertisement

That structure mirrors what identity and fraud experts are seeing across the industry. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification company, says fake job ads are effective because they borrow trust from a familiar social contract. 

“A job post feels structured, normal and safe, even when the actual behavior being requested is anything but,” Amper said. “A job posting implies a real process – a role, a manager, training and a paycheck. That’s exactly why it works. It lowers skepticism and makes risky requests feel like normal onboarding.”

Amper notes that what’s changed is not just the scale of recruitment, but how criminals package it. “Serious crime is now being sold as ‘work.’”

Why teens excel at social engineering attacks

Teenagers bring a unique mix of skills that make them highly convincing. Fluent English and comfort with modern workplace technology help them sound legitimate. Familiarity with tools like Slack, ticketing systems and cloud platforms makes impersonation easier.

According to Amper, teens don’t need technical expertise to get pulled in. “The on-ramp is usually social, a Discord server, a DM, a ‘quick gig,’” he said. “It can feel like trolling culture, but the targets are real companies and the consequences are real people.”

Advertisement

Risk awareness is often lower. Conversations frequently take place in public chats, where tactics and mistakes are shared quickly. That visibility accelerates learning and increases the likelihood of detection and arrest.

Gaming culture feeds the pipeline

For many teens, it starts small. Pranks in online games turn into account takeovers. Username theft becomes crypto theft. Skills escalate. So do the stakes.

Recruitment often begins in gaming spaces where fast learning and confidence are rewarded. Grooming is common. Sextortion sometimes appears. By the time real money enters the picture, legal consequences feel distant.

Amper compares the progression to gaming itself. “These crews package crime as a ladder,” he said. “Join the group, do small tasks, level up, get paid, get status.”

Why young women are being targeted

Cybercrime remains male-dominated, but recruiters adapt. Young women are increasingly recruited for phone-based attacks. Some use AI tools to alter accents or tone. Others rely on stereotypes. Distress lowers suspicion faster than authority. Researchers say women often succeed because they are underestimated. That same dynamic puts them at risk inside these groups. Leadership remains overwhelmingly male. Girls often perform low-level work. Training stays minimal. Exploitation is frequent.

Advertisement

Red flags that signal fake job scams and ransomware recruitment

These warning signs show up repeatedly in cases involving teen hackers, social engineering crews and ransomware groups.

Crypto-only pay is a major warning sign

Legitimate employers do not pay workers exclusively in cryptocurrency. Crypto-only pay makes transactions hard to trace and protects criminals, not workers.

Per-call or per-task payouts should raise concern

Promises of hundreds of dollars for a single call or quick task often point to illegal activity. Real jobs pay hourly or a salary with documentation.

Recruitment through Telegram or Discord is a red flag

Criminal groups rely on private messaging apps to avoid oversight. Established companies do not recruit employees through gaming chats or encrypted DMs.

Anonymous mentors and vague training are dangerous

Being “trained from scratch” by unnamed individuals is common in ransomware pipelines. These mentors disappear when arrests happen.

Advertisement

Secrecy requests signal manipulation

Any job that asks teens to hide work from parents or employees to hide tasks from employers is crossing a line. Secrecy protects the recruiter, not the recruit.

Amper offers a simple rule of thumb: “If a ‘job’ asks you to pretend to be someone else, obtain access, move money, or share sensitive identifiers before you’ve verified the employer, you’re not in a hiring process. You’re in a crime pipeline.”

He adds that legitimate employers collect sensitive information only after a real offer, through verified HR systems. “The scam version flips the order,” he said. “It asks for the most sensitive details first, before anything is independently verifiable.”

Urgency and emotional pressure are deliberate tactics

Rushing decisions or creating fear lowers judgment. Social engineering depends on speed and emotional reactions.

If you see more than one of these signs, pause immediately. Walking away early can prevent serious legal consequences later.

Advertisement

MICROSOFT TYPOSQUATTING SCAM SWAPS LETTERS TO STEAL LOGINS

Cybercrime recruiters are targeting middle and high school students for risky roles like social engineering calls, exposing them to federal charges and prison time. (Philip Dulian/picture alliance via Getty Images)

Law enforcement is cracking down on teen cybercrime

Since 2024, government indictments and international arrests have shown cybercriminal groups tied to The Com and Scattered Spider are under increasing scrutiny from law enforcement. In Sept. 2025, U.S. prosecutors unsealed a Department of Justice complaint against 19-year-old Thalha Jubair, accusing him of orchestrating at least 120 ransomware and extortion attacks that brought in over $115 million in ransom payments from 47 U.S. companies and organizations, including federal court networks. Prosecutors charged Jubair with computer fraud, wire fraud and money laundering conspiracy.

Across the Atlantic, British authorities charged Jubair and 18-year-old Owen Flowers for their alleged roles in a Transport for London cyberattack in 2024 that compromised travel card data and disrupted live commuter information. Both appeared in court under the U.K.’s Computer Misuse Act. Earlier law enforcement action in the U.S. included criminal charges against five Scattered Spider suspects for mass phishing campaigns that stole login credentials and millions in cryptocurrency, laying out how members of this collective staged coordinated extortion and data theft.

Federal agencies are also issuing advisories about the group’s social engineering techniques, noting how attackers impersonate help desks, abuse multi-factor authentication and harvest credentials to access corporate networks.

Advertisement

Parents often learn the truth late. In many cases, the first warning comes when federal agents arrive at the door. Teens can move from online pranks to serious federal crimes without realizing where the legal line lies.

How parents and teens can avoid ransomware recruitment traps

This type of cybercrime thrives on silence and speed. Slowing things down protects families and futures.

Tips for parents and guardians to spot fake job scams early

Parents play a critical role in spotting early warning signs, especially when online “work” starts happening behind closed doors or moves too fast to explain.

1) Pay attention to how online “jobs” are communicated

Ask which platforms your child uses for work conversations and who they talk to. Legitimate employers do not recruit through Telegram or Discord DMs.

Advertisement

2) Question sudden income with no clear employer

Money appearing quickly, especially in crypto, deserves scrutiny. Real jobs provide paperwork, supervisors and pay records.

3) Treat secrecy as a serious warning sign

If a teen is told to keep work private from parents or teachers, that is not independence. It is manipulation.

4) Talk early about legal consequences online

Advertisement

Many teens do not realize that cybercrime can lead to federal charges. Honest conversations now prevent life-changing outcomes later. Also, monitoring may feel uncomfortable. However, silence creates more risk.

Tips for teens to avoid fake job offers and cybercrime traps

Teenagers with tech skills have real opportunities ahead, but knowing how to spot fake offers can mean the difference between building a career and facing serious legal trouble.

1) Be skeptical of private messages offering fast money

Real companies do not cold-recruit through private chats or gaming servers.

2) Avoid crypto-only payment offers

Advertisement

Being paid only in cryptocurrency is a common tactic used to hide criminal activity.

3) Choose legal paths to build skills and reputation

Bug bounty programs, cybersecurity clubs and internships offer real experience without risking your future. Talent opens doors. Prison closes them.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

Advertisement

FBI WARNS OF FAKE KIDNAPPING PHOTOS USED IN NEW SCAM

A loose cybercrime network known as “The Com” has been linked to major U.S. and U.K. data breaches affecting companies worth trillions combined. (Photo by Uli Deck/picture alliance via Getty Images)

Kurt’s key takeaways

What makes this trend so unsettling is how ordinary it all looks. The job ads sound harmless. The chats feel friendly. The crypto payouts seem exciting. But underneath that surface is a pipeline pulling teenagers into serious crimes with real consequences. Many kids do not realize how far they have gone until it is too late. What starts as a quick call or a side hustle can turn into federal charges and years of fallout. Cybercrime moves fast. Accountability usually shows up much later. By the time it does, the damage is already done.

If fake job ads can quietly recruit teenagers into ransomware gangs, how confident are you that your family or workplace would spot the warning signs before it is too late? Let us know by writing to us at Cyberguy.com.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading

Technology

Fired Rockstar employees’ plea for interim pay denied

Published

on

Fired Rockstar employees’ plea for interim pay denied

A UK employment tribunal rejected a request from fired Rockstar Games employees to receive interim pay while waiting for a full hearing about their dismissal, according to Bloomberg and IGN. After Rockstar fired 34 employees last year — 31 from the UK and three from Canada — the Independent Workers’ Union of Great Britain (IWGB) accused the company of “union busting.” Rockstar claims that the fired employees were leaking company information in a Discord channel.

The hearing took place over two days last week. “Despite being refused interim relief today, we’ve come out of last week’s hearing more confident than ever that a full and substantive tribunal will find Rockstar’s calculated attempt to crush a union to be not only unjust but unlawful,” IWGB president Alex Marshall says in a statement. “The fact that we were granted this hearing speaks to the strength of our case and, over the course of the two-day hearing, Rockstar consistently failed to back up claims made in the press or to refute that they acted unfairly, maliciously, and in breach of their own procedures.”

“We regret that we were put in a position where dismissals were necessary, but we stand by our course of action as supported by the outcome of this hearing,” a Rockstar Games spokesperson says in statements to Bloomberg and IGN. Rockstar and owner Take-Two didn’t immediately reply to a request for comment.

Rockstar is working on Grand Theft Auto VI, which was recently delayed from a planned May launch to November 19th.

Continue Reading
Advertisement

Trending