Connect with us

Technology

Get these apps off your phone

Published

on

Get these apps off your phone

The U.S. government doesn’t have a say in what you download, unless you use a government device. Starting Aug. 15, U.S. House of Representatives staffers are banned from using all ByteDance apps on government devices. 

You need a vacation. We’re giving away a $1,000 getaway gift card for your favorite airline. Enter to win now!

HOSPITALS FACING UNPRECEDENTED THREATS; YOU MUST SECURE YOUR HEALTH RECORDS TODAY

TikTok’s already out, but now the ban includes a handful of other apps you or someone in your life might be using. 

  • CapCut: Video editing tools and filters
  • Hypic: Photo editing tools and filters
  • Lark: Collaboration app designed for work
  • Lemon8: Social media app focused on fashion, beauty, travel, food and other lifestyle categories

It all comes down to ByteDance’s ties to Communist China. It’s based in Beijing and is required by Chinese law to give the government access to collected data.

The app for TikTok is pictured on a phone screen. (Yui Mok/PA Images via Getty Images)

Advertisement

Let’s dive deeper into what they collect

If you think the ByteDance paranoia is overblown, here’s the laundry list of data you give up every time you scroll TikTok:

  • Your name, age, username, email address, password, phone number and location.
  • Your IP address, cellphone carrier, time zone, the model of your device and the OS you use.
  • Biometric identifiers, like facial IDs and voiceprints.
  • The content of your messages, plus exactly when you send, receive and read them.
  • If you buy stuff from the TikTop shop, your purchase information, including your credit card numbers, billing and shipping addresses.
  • Your activities on other websites and apps (or in stores), including info on what you purchased.
  • File names and types.
  • Your keystroke patterns and rhythms.
  • Objects and scenery that show up in your videos, including tourist attractions, shops and other landmarks.
  • The web pages you visit the most and how you interact with them.
  • Any text, images and videos on your clipboard.
  • Information about your videos, images and audio.

TikTok also embeds data into images and ads to track the time and date you view a page, complete with a description. The amount of data TikTok collects is so extensive that it can come dangerously close to cloning your entire phone. 

TECH LIFE UPGRADES SMARTER THAN THE STUFF ON TIKTOK

Where TikTok stores its data has also been a major red flag for Congress. Information collected in the U.S. is connected straight to servers in China, though the company says they have changed their systems to store American data in the U.S.

What about Temu?

Last year, one of my warnings about the mega-popular shopping app went viral. The hype is starting to fade, but Temu was the most downloaded app of its kind in the U.S. in 2023.

Temu’s tagline — “Shop like a billionaire” — refers to the low, low prices on everything from clothing to home goods to electronics. Though the company is based in the U.S., Temu is owned by PDD Holdings, which is based in China. And that company also owns Pinduoduo, which was removed from the Google Play store for containing malware.

Advertisement

Temu on the App Store is displayed on a phone screen. (Jakub Porzycki/NurPhoto via Getty Images)

As you shop, Temu can:

  • Monitor activity on other apps
  • Track your notifications
  • Reads private messages
  • Change settings

Depending on what you enable, it gets full access to all your contacts, calendars and photo albums, plus your social media accounts, chats and texts. 

Do this now

It’s up to you, of course, what apps to keep on your phone. You may feel comfortable simply limiting permissions. But you may want to go a step further.

AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER

Delete apps from your Android phone:

  • Long-press an app, then tap App Info > Uninstall.
  • Go to Settings > Apps & Notifications to see a list of your apps and delete them the same way.
  • Or open the Google Play Store app and navigate to Menu > My apps & games. Tap on the app and hit Uninstall.
  • NOTE: Samsung and OnePlus phones have an Uninstall option under the app shortcuts menu.

Delete apps from your iPhone

  • Touch and hold an app, then tap Remove App > Delete App > Delete.
  • Or use the App Library to get a curated list of your apps grouped by category. Swipe past the last page of your Home screen to access it. Tap and hold the app, then select Delete App > Delete.

A man holds an iPhone in his hand. (Silas Stein/picture alliance via Getty Images)

But Kim, I must scroll TikTok …

Advertisement

… Or some other app on my list above. There is a safe-ish way to do it, at least where all the data from your real phone isn’t going who-knows-where:

  • Install TikTok on an old device that’s no longer connected to your email, banking info or anything else.

If you can, keep it off your home’s Wi-Fi network and buy a cheap data plan. Otherwise, be sure to use the guest network. And now ask yourself if those videos, photo editing tools and cheap goods are really worth all the trouble.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

Advertisement

Technology

X claims it has stopped Grok from undressing people, but of course it hasn’t

Published

on

X claims it has stopped Grok from undressing people, but of course it hasn’t

Updates to [@]Grok Account

We have implemented technological measures to prevent the Grok account from allowing the editing of images of real people in revealing clothing such as bikinis. This restriction applies to all users, including paid subscribers.

Additionally, image creation and the ability to edit images via the Grok account on the X platform are now only available to paid subscribers. This adds an extra layer of protection by helping to ensure that individuals who attempt to abuse the Grok account to violate the law or our policies can be held accountable.

Geoblock update

We now geoblock the ability of all users to generate images of real people in bikinis, underwear, and similar attire via the Grok account and in Grok in X in those jurisdictions where it’s illegal.

Advertisement
Continue Reading

Technology

Malicious Mac extensions steal crypto wallets and passwords

Published

on

Malicious Mac extensions steal crypto wallets and passwords

NEWYou can now listen to Fox News articles!

Mac users often assume they’re safer than everyone else, especially when they stick to official app stores and trusted tools.

That sense of security is exactly what attackers like to exploit. Security researchers have now uncovered a fresh wave of malicious Mac extensions that don’t just spy on you, but can also steal cryptocurrency wallet data, passwords and even Keychain credentials. What makes this campaign especially concerning is where the malware was found, inside legitimate extension marketplaces that many people trust by default.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Once active, GlassWorm targets passwords, crypto wallets, and even your macOS Keychain without obvious warning signs. (Cyberguy.com)

Advertisement

How malicious Mac extensions slipped into trusted stores

Security researchers at Koi Security uncovered a new wave of the GlassWorm malware hiding inside extensions for code editors like Visual Studio Code (via Bleeping Computer). If you’re not familiar with code editors, they’re tools developers use to write and edit code, similar to how you might use Google Docs or Microsoft Word to edit text. These malicious extensions appeared on both the Microsoft Visual Studio Marketplace and OpenVSX, platforms widely used by developers and power users.

FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

At first glance, the extensions looked harmless. They promised popular features like code formatting, themes or productivity tools. Once installed, though, they quietly ran malicious code in the background. Earlier versions of GlassWorm relied on hidden text tricks to stay invisible. The latest wave goes further by encrypting its malicious code and delaying execution, making it harder for automated security checks to catch.

Even though this campaign is described as targeting developers, you don’t need to write code to be at risk. If you use a Mac, install extensions or store passwords or cryptocurrency on your system, this threat still applies to you.

What GlassWorm does once it’s on your Mac

Once active, GlassWorm goes after some of the most sensitive data on your device. It attempts to steal login credentials tied to platforms like GitHub and npm, but it doesn’t stop there. The malware also targets browser-based cryptocurrency wallets and now tries to access your macOS Keychain, where many saved passwords are stored.

Advertisement

Researchers also found that GlassWorm checks whether hardware wallet apps like Ledger Live or Trezor Suite are installed. If they are, the malware attempts to replace them with a compromised version designed to steal crypto. That part of the attack isn’t fully working yet, but the functionality is already in place.

To maintain access, the malware sets itself up to run automatically after a reboot. It can also allow remote access to your system and route internet traffic through your Mac without you realizing it, turning your device into a quiet relay for someone else.

Some of the malicious extensions showed tens of thousands of downloads. Those numbers can be manipulated, but they still create a false sense of trust that makes people more likely to install them.

7 steps you can take to stay safe from malicious Mac extensions

Malicious extensions don’t look dangerous. That’s what makes them effective. These steps can help you reduce the risk, even when threats slip into trusted marketplaces.

1) Only install extensions you actually need

Every extension you install increases risk. If you’re not actively using one, remove it. Be especially cautious of extensions that promise big productivity gains, premium features for free or imitate popular tools with slightly altered names.

Advertisement

2) Verify the publisher before installing anything

Check who made the extension. Established developers usually have a clear website, documentation and update history. New publishers, vague descriptions or cloned names should raise red flags.

These malicious extensions looked like helpful tools but quietly ran hidden code once installed. (Cyberguy.com)

3) Use a password manager

A password manager keeps your logins encrypted and stored safely outside your browser or editor. It also ensures every account has a unique password, so if one set of credentials is stolen, attackers can’t reuse it elsewhere.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

Advertisement

HOW HACKERS ARE BREAKING INTO APPLE DEVICES THROUGH AIRPLAY

4) Run strong antivirus software on your Mac

Modern macOS malware doesn’t always drop obvious files. Antivirus tools today focus on behavior, looking for suspicious background activity, encrypted payloads and persistence mechanisms used by malicious extensions. This adds a critical safety net when something slips through official marketplaces.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Consider a personal data removal service

When your data leaks, it often spreads across data broker sites and breaches databases. Personal data removal services help reduce how much of your information is publicly available, making it harder for attackers to target you with follow-up scams or account takeovers.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Turn on two-factor authentication (2FA)

Enable 2FA wherever possible, especially for email, cloud services, developer platforms and crypto-related accounts. Even if a password is stolen, 2FA can stop attackers from logging in.

7) Keep macOS and your apps fully updated

Security updates close gaps that malware relies on. Turn on automatic updates so you’re protected even if you miss the headlines or forget to check manually.

Advertisement

Mac users often trust official app stores, but that trust is exactly what attackers are counting on. (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaway

GlassWorm shows that malware doesn’t always come from shady downloads or obvious scams. Sometimes it hides inside tools you already trust. Even official extension stores can host malicious software long enough to cause real harm. If you use a Mac and rely on extensions, a quick review of what’s installed could save you from losing passwords, crypto or access to important accounts.

When was the last time you checked the extensions running on your Mac? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved. 

Continue Reading

Technology

BMW says electric M3 will be a ‘new level’ of performance

Published

on

BMW says electric M3 will be a ‘new level’ of performance

BMW teased its forthcoming all-electric M-series performance sedan today, promising that the quad-motor M3 sports car would feature specs that are truly next level when it arrives in 2027.

The M3 will have four electric motors and simulated gear shifting, a feature that is quickly becoming a must-have for electrified sports cars. BMW says the setup unlocks the benefits of both rear and all-wheel drive, with the ability to decouple the front axle.

The electric M3 will also be built on BMW’s Neue Klasse platform that promises more efficient batteries, lightning fast charging, and higher powered computers. The architecture will be 800-volt, the regenerative braking will be highly efficient, and if the camouflaged pictures are any indication, it will be a real looker on the streets.

Speaking of computers, the M3 will have four of them, unified under its oddly named “Heart of Joy” component that aggregates all the traction, stability, and electric motor management functions of the vehicle. That means when software updates are made available, the vehicle’s brain will be able to receive them over-the-air faster than BMW’s current processors.

The M3’s simulated gear shifting will feature a “newly developed soundscape” that “channels pure emotion.” Like other automakers, BMW is loath to alienate its loyal M-series customers by giving them all the torque but none of the gearing feedback. And now a fake “soundscape” will accompany all that shifting. Porsche, Hyundai, and Dodge are also on board the fake EV gear shifting bandwagon.

Advertisement
Continue Reading
Advertisement

Trending