This is Optimizer, a weekly newsletter sent every Friday from Verge senior reviewer Victoria Song that dissects and discusses the latest gizmos and potions that swear they’re going to change your life. Opt in for Optimizer here.
Technology
From TikTok to trouble: How your online data can be weaponized against you
Let’s talk about something that’s becoming a real headache these days: your online presence and how it can come back to bite you. A stark example of this occurred when 20 teachers from Great Valley Middle School in Malvern, Pennsylvania, fell victim to student impersonations on TikTok using information found online. Yikes. It’s time we face the music: Sharing our lives online, especially on social media, is riskier than ever.
Social media platforms have become an integral part of our personal and professional lives. However, they also expose us to various risks that can have serious consequences. Sure, you can’t stop someone from trying to mess with your reputation, but you can make it a whole lot harder for them.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
Image of social media apps on the home screen of a cellphone (Kurt “CyberGuy” Knutsson)
How your online data can sabotage your reputation and safety
Having your online reputation damaged can hurt your chances of something as small as making friends in a new neighborhood, to something much more serious, like landing the job you’ve always dreamed of.
According to a Career Builder study, every two out of three hiring managers screen candidates’ social profiles before hiring. But it gets worse. Other statistics reveal that more than half of recruiters rejected a candidate because of what they found on their social media. However, the risks of having your personal data online don’t stop there. The list includes:
- Identity theft and fraud
- Stalking and harassment
- Doxxing and swatting
- Scams and phishing attempts
- Data breaches
These issues are more common than you might think. The Bureau of Justice Statistics (BJS) estimates that around 10% of Americans were victims of identity theft within the year prior to their research. For 1 in 5, it has happened at some point in their lifetime. A recent data breach at National Public Data – a data broker – might have exposed the Social Security numbers of every American. BJS further reports that 3.4 million Americans were stalked in one year and 69% of those cases involved the use of technology. And that only includes reported incidents. The FBI confirms that cyberstalking is on the rise. Being anonymous online isn’t just about comfort. It’s about safety. Fortunately, you can take steps to protect your personal information on the web.
A woman scrolling on social media on her phone (Kurt “CyberGuy” Knutsson)
HACKED, SCAMMED, EXPOSED: WHY YOU’RE 1 STEP AWAY FROM DISASTER ONLINE
Erase your digital footprint and protect your privacy
You’ve probably heard the saying, “Once you put something on the internet, it’s there forever.” But that’s not entirely true. Disappearing from the internet is possible, though it’s not easy, especially if you try to do it on your own. Fortunately, some professional services can help. These services not only assist in deleting your existing data but also help prevent new information from resurfacing online. Here’s what you can do to remove your digital footprint from the web.
1) Remove yourself from people search sites
If you want to take on the task yourself, you’ll need to be prepared to put in some work. Most of your data is stored on what’s called people search sites. These are large databases of personal information, with some containing more than 300 million individual records.
People search sites publish highly private information, starting with your contact details and extending to your family, colleagues and even your sexual orientation. That data is often used by scammers. And the less your information is out there, the more difficult it is for bad actors to exploit you. The good news is that you can request the removal of your personal data from these sites. Each site has its own process, but they generally follow a similar pattern:
- Visit the people search site, e.g., Whitepages
- Look for an opt-out form (often found in the site’s footer)
- Search for your personal information and select your profile
- Confirm your identity and wait for the data to be removed
2) Invest in professional data removal services
It’s best not to leave anything to chance. While opting out from data brokers yourself is technically possible, the sheer number of brokers makes this a monumental task.
Moreover, protecting your privacy online isn’t a one-time effort. It requires continuous monitoring and frequent opt-out requests, as data brokers are constantly collecting personal information. Even if you successfully remove your profile, it could reappear later. Check out my top picks for data removal services here.
A woman scrolling on social media on her phone (Kurt “CyberGuy” Knutsson)
PHARMA GIANT’S DATA BREACH EXPOSES PATIENTS’ SENSITIVE INFORMATION
3) Remove yourself from Google search results
However, to fully protect yourself from cyberstalking, you also need to address the images associated with your online identity. If someone wants to hurt your reputation, knowing your name and home address might only be part of the puzzle. The other piece could be finding your images. Using personal details like your childhood home address, school or past employers, stalkers can unearth potentially damaging content and use it to harm your online reputation. But images aren’t the only thing you should address. If you want to leave no trace on Google, make sure to:
- Remove your personal information and images from Google
- Modify social media settings to be more private and delete old accounts (they will appear in search results)
- Delete your trail of website comments
- Blur your house on Google and Apple Maps
Unfortunately, you can’t remove content from Google search results directly. You can submit a removal request, but Google must approve it first. For more details, refer to my previous post on how to remove yourself from Google searches. If your request is denied, you’ll need to contact the site owner and ask them to take it down. However, your options here are limited. Once bad actors get hold of your data, it’s difficult to regain control. That’s why it’s so important to stop stalkers from accessing your information in the first place.
Additional tips to safeguard your online reputation
1) Be cautious about sharing personal information on social media. Adjust privacy settings to limit what’s publicly visible.
2) Monitor your digital footprint regularly. Set up Google Alerts for your name to stay informed about new mentions online.
3) Strengthen your passwords and enable two-factor authentication on all accounts to prevent unauthorized access. Also, consider using a password manager to generate and store complex passwords.
4) Exercise caution with links and attachments. Don’t click on suspicious links in social media posts, emails or messages as they may lead to phishing sites or malware downloads. Verify the source before opening any attachments, especially from unknown senders. When in doubt, contact the purported sender through a separate, trusted channel to confirm the legitimacy of the link or attachment. Additionally, use strong antivirus software and keep it updated to provide an extra layer of protection against potential threats.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
TAKE BACK YOUR PRIVACY WITH THIS IPHONE SAFETY FEATURE
Kurt’s key takeaways
From fake TikTok profiles to data breaches, it seems like our online presence is constantly under siege. But here’s the thing: While we can’t stop every bad actor out there, we can definitely make their job a lot harder. It’s all about taking control of your digital footprint. Whether it’s scrubbing yourself from people search sites, investing in professional data removal services or being more mindful of what we share online, there are steps we can take to protect ourselves. Remember, your online reputation isn’t just about social media likes; it can impact everything from job prospects to personal safety. So, maybe it’s time we all took a good hard look at our online presence and asked ourselves: Is it really serving us or is it leaving us vulnerable?
What role do you think social media platforms should play in protecting your privacy and preventing impersonation or harassment? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
I don’t think Gwyneth Paltrow knows what a peptide is
These days, it seems I cannot escape peptides. Online, I’ve been assaulted by videos of shirtless Chads injecting dubiously sourced bottles of the so-called “Wolverine stack.” On the New York City subway, I’m haunted by Serena Williams’ Ro ads for easy GLP-1 access. Silicon Valley seems to be a parade of peptide parties. In Washington, RFK Jr. has said he’s pro-peptide and wants to expand access. In July, the FDA will meet to possibly reclassify 14 peptides so they can be eligible for compounding.
And in Hollywood, Gwyneth Paltrow — mother Goop, one of the original wellness influencers — is selling a series of peptide skincare products. Except, after some research, I’m not sure Paltrow actually understands what peptides are.
You might be wondering why I’m fixating on a Goop product in Optimizer. The short answer: While researching peptides for a forthcoming feature, I’ve descended into madness.
The longer answer is that peptide mania is central to Silicon Valley’s current fixation with longevity and metabolic optimization. As I’ve recently written, wellness trends increasingly inform new health tech features and gadgets that make up the wearable surveillance state. Peptides are also being framed on social media as an innovation that democratizes healthcare. (A similar rhetoric used to describe wearables!) It’s part of the wellness Wild West feedback loop that’s fueling Silicon Valley’s obsession with self-optimization. With that in mind, it’s worth examining how “peptide washing” has crept into various corners of the internet — and the resulting ripple effects.
While peptide shots are a relatively new trend, we’ve known about peptides and how they work for decades. They’re short chains of amino acids, which, in turn, make up proteins. In other words, building blocks for the building blocks. Because a peptide can be a chain ranging from two to roughly 100 amino acids, there are potentially trillions of peptides. Their main function is to act as messengers for various bodily functions. Some are naturally occurring and often come from the foods you eat. Others are made synthetically in a lab. The most famous ones include insulin and GLP-1 medications like semaglutide (Ozempic and Wegovy) and tirzepatide (Zepbound and Mounjaro).
What’s taking social media by storm are peptides that exist in legal gray areas. They’re not widely tested or FDA-approved drugs, and are sometimes sourced from dubious suppliers. I’ve previously written about retatrutide — another popular weight loss peptide — in Optimizer, but there’s a whole slew of others with names that sound vaguely like Star Wars droids. The most popular ones include BPC-157, TB-500, GHK-Cu, and CJC1295. These peptides are touted as biohacks for ailments ranging from fat loss and muscle growth, to faster wound healing, anti-aging, and increased energy. Essentially, everything associated with living a longer, healthier life. Lumped alongside these is NAD+, which is not a peptide but is often marketed as one. That’s partly because it’s frequently consumed as an IV drip and is thus an injectable substance.
But just because you can inject something, that doesn’t make it a peptide.
Do you have experience using peptides?
Or extremely strong feelings about this trend? I’m researching this phenomenon and I’d love to chat with you. Hit me up at victoria.song@theverge.com or on Signal at @ vicmsong.14.
NAD stands for nicotinamide adenine dinucleotide. It’s a coenzyme — basically an enzyme booster — that’s found in every cell. Its primary job is to help convert food into energy. It does this by shuttling electrons from one chemical reaction to another. As you age, your NAD levels naturally decline. This can lead to an array of conditions associated with aging, like Type 2 diabetes, lower energy levels, and saggy skin. Not to get too weedsy, but the + in NAD+ simply denotes one of two versions of the NAD molecule. (The other is NADH.)
Which, finally, brings me to the Goop Youth Boost NAD+ Peptide Rich Cream and whether Gwyneth Paltrow actually knows what a peptide is.
In my research, I was looking into influential people who have spoken out about peptide injections. There’s a long list, but in Hollywood, Paltrow’s name kept popping up. Cue this recent Elle interview, in which Paltrow plays a “fuck, marry, kill” game with wellness trends.
From the get-go, the Elle article incorrectly identifies NAD+ as a peptide. Paltrow is then quoted as saying she uses NAD+ IV drips and an injectable NAD+ pen for impromptu energy boosts. She goes on to say that injectable peptides dealing with inflammation and brain health that are “being formulated for longevity” will be the next NAD+. In the fuck, marry, kill game, Paltrow is asked to choose between NAD+, B12, and peptide shots. She refuses, saying she’d marry them all.
What’s worrisome is the conflation of these treatments, even though they’re three separate things. It’s easy for the average person to read this article and think, “NAD+ is a type of peptide shot and a rich, glamorous celebrity like Gwyneth Paltrow does it, so this must be their secret to looking good.”
(For the curious: B12 is a vitamin. Supplementation can boost energy if you have a B12 deficiency, which is relatively common in the elderly, vegetarian, and vegan populations. As for NAD+, there’s considerable research interest, but limited clinical evidence for drips or supplements at the moment. I wrote a whole Optimizer newsletter about dubious peptide shots.)
From this interview, I get the sense that Paltrow knows that peptides are trendy, but she doesn’t actually admit to using any specific one. After some more digging, I found she has stated that she loves glutathione IV drips. Now, that is a peptide. However, she characterized her usage as “I love IV drips!” so, again, I’m not sure if Paltrow is aware that IV drips and peptides are not the same thing. Upon looking into her “peptide-rich” moisturizer, I’m even less certain.
Calling it a “Youth Boost NAD+ Peptide Rich Cream” would suggest this $105 moisturizer has both NAD+ and a bunch of peptides. Peruse the ingredient list, and you’ll find it doesn’t even have NAD+. It has NMN, or nicotinamide mononucleotide, a precursor (another kind of building block) for NAD+. As for its peptide content, the marketing claims the cream features “biomimetic plant-derived peptides.” Again, the list only refers to one true peptide molecule: arginine/lysine polypeptide. (A polypeptide is a longer peptide; this one supposedly helps with wrinkles.) It also appears last. In skincare, the ingredient list is generally ordered in terms of concentration. The top three to five ingredients make up the bulk of the formula. One hack is to find the so-called “one percent line”, which you can estimate from when the first preservative or fragrance appears. Given how this list is written, this is a standard moisturizer with a teeny sprinkle of a single peptide thrown in for marketing flavor. Even if there was a more potent amount, peptides are delicate molecules. Effectiveness for any topical skincare active — be it peptides or salmon sperm DNA — depends on stable formulation, concentration, whether the molecule can penetrate the skin barrier, and packaging that prevents degradation.
In any case, I reached out to Goop to clarify the peptide content in this cream. I have not heard back.
The only thing I can conclude is Paltrow isn’t afraid to try fringe wellness trends. (That and she loves an IV drip.) If someone handed her a peptide shot with the promise of energy and youth, I’d bet she’d do it. But do I think a peptide-curious person could ask her to explain the pros and cons of this trend based on her public statements? Now that’s a bet I would not take.
I could be wrong. In which case, I find her statements and her moisturizer to be disappointing given her status and influence. Case in point, the average person likely isn’t going to go through the trouble of accessing gray market peptide vials. They probably won’t be able to afford the same quality treatments as Paltrow, either. But a so-called peptide cream from a celebrity? That’s easily accessible. And in this particular case, that consumer wouldn’t be getting much of the thing they purportedly want to try.
More concerning is the flattening of any injectable as a peptide. Paltrow showing up to a podcast with an IV drip, speaking of peptides, phospholipids, and regular vitamins in a single breath? That’s confusing. It conflates relatively harmless therapies — like vitamin supplementation — with those that aren’t as well-studied. And the more influential people do this, the more regular people will too.
Peptides aren’t inherently dangerous. Injections aren’t evil. But the way peptide mania has made a more extreme, experimental trend as casual as taking a multivitamin? That feels like the slipperiest of slopes.
Technology
FCC router rule raises questions about future updates
NEWYou can now listen to Fox News articles!
A new move from the Federal Communications Commission is being framed as a national security step. But if you already have a router at home, the bigger question is simple: how long will it keep getting security updates?
The FCC recently updated its “Covered List” to include routers produced in foreign countries, which blocks new models of that covered equipment from being approved for sale in the U.S.
At the same time, the FCC made something else clear. This change does not affect routers you already own, and it does not stop retailers from continuing to sell models that were previously approved.
So nothing shuts off overnight. However, the policy introduces a new layer of uncertainty around how long some devices will continue receiving updates.
IS YOUR HOME WI-FI REALLY SAFE? THINK AGAIN
The FCC’s router move targets future approvals, not the device already running your home Wi-Fi. Existing models can still be used and sold while update rules keep evolving. (kazakova0684/Getty Images)
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
What the FCC router rule actually changed
The policy focuses on future device approvals, not the devices already in your home.
Here is what the FCC says in plain terms:
- Existing routers can still be used
- Previously approved models can still be sold and imported
- New covered models cannot receive FCC authorization
This action is tied to national security concerns about supply chain risks, not a product-by-product security test of individual routers. The key takeaway is this: your current router is not banned, recalled or disabled.
Why the FCC router rule raises update concerns
The real issue is not about using your router today. It is about future software and firmware updates. Alongside the policy change, the FCC issued a temporary waiver. That waiver allows existing routers to continue receiving updates that patch vulnerabilities, maintain functionality and ensure compatibility with operating systems. Right now, that waiver runs through at least March 1, 2027.
That date is not a guaranteed cutoff. The FCC has said it will re-evaluate the policy before then and may extend or modify the waiver. So the situation is still evolving.
How the FCC router rule could affect your router security
Your router is the gateway to everything connected in your home. Phones, laptops, smart TVs and cameras all depend on it. When a vulnerability is discovered, a software update is usually what fixes it.
If updates slow down or stop, the risk builds over time. That does not mean your router suddenly becomes unsafe. But it can become easier for attackers to exploit known flaws.
Even the FCC acknowledged this in its waiver, noting that continued updates help mitigate harm to consumers and support essential security functions. So the concern is not immediate. It is about what happens over time if support policies change.
BROWSER EXTENSIONS PUT MILLIONS OF GOOGLE CHROME USERS AT RISK
The FCC says home routers already in use can stay in use, but future support for some models now depends on waivers and conditional approvals. (deepblue4you/Getty Images)
Why the FCC is making exceptions for some routers
One important wrinkle is that the FCC has already begun granting conditional approvals for some devices. In April 2026, the agency approved certain products from NETGEAR and Adtran to continue operating under specific conditions through October 1, 2027.
That shows this is not a one-size-fits-all rule. Instead, it is an evolving policy where some devices may continue receiving support while others may face tighter restrictions.
What the FCC says about router risks and next steps
The FCC says the decision is based on national security concerns, including supply chain vulnerabilities and potential cybersecurity risks tied to certain foreign-produced equipment.
At the same time, the policy includes a path for exceptions. Companies can seek conditional approvals through federal agencies, and regulators can revisit the rules as more information becomes available.
That means the final impact will likely depend on how those decisions play out over time.
8 ways to protect your network after the FCC router rule
Until there is more clarity, a few simple steps can help keep your home network secure.
1) Check how long your router is supported
First, find your router’s exact model number. You can usually see it on a label on the bottom or back of the device. Next, go to the manufacturer’s website, such as NETGEAR, Linksys or TP-Link, and search for that model. Open its support page and look for sections like Support, Downloads, Firmware or End of Life. Then, check for a support timeline, the date of the most recent firmware update or any notes saying the product is no longer supported. If you cannot find clear information, that is a warning sign that your router may not receive regular security updates.
2) Keep your router updated
Next, log into your router settings. To do this, open a web browser and type your router’s IP address into the address bar. Common ones include 192.168.1.1 or 192.168.0.1. Then sign in using your admin username and password. Once you are in, look for sections labeled Firmware, Software Update or Administration. Check for available updates and install them if needed. If your router supports automatic updates, turn that on. This helps close security gaps quickly without you having to check manually. If you are not sure where to find these settings, you can also use your router’s mobile app if it has one, which often makes updates easier.
GET FASTER WI-FI WITH THESE SIMPLE HOME FIXES
Security updates remain the key protection for home routers as the FCC blocks new authorizations for covered foreign-produced models. (Kevin Dietsch/Getty Images)
3) Plan ahead for replacement
If your router is already a few years old, start planning for a replacement. Do not wait until updates stop. Instead, look for models with clearly stated support timelines. Check out our picks for the Top Routers for best security at cyberguy.com
4) Secure your devices as a backup layer
Your router is the first line of defense. However, your devices matter too. Keep your phone, computer and tablet updated. Also, use strong antivirus software to help catch threats that slip through. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
5) Review connected devices
From time to time, check what is connected to your network. You can do this in your router settings under “Connected Devices” or in your router’s app. If you see anything unfamiliar, remove it right away.
6) Use strong passwords
Create a strong Wi-Fi password and a separate admin password for your router. Avoid using default credentials. A password manager can help you generate and store secure logins. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
7) Turn off remote access
First, log into your router settings using a web browser. Type your router’s IP address, such as 192.168.1.1 or 192.168.0.1, into the address bar and sign in with your admin credentials. Next, look for settings labeled Remote Access, Remote Management, Web Access from WAN, or Cloud Access. These are often found under sections like Advanced, Administration or Security. Then, turn that setting off and save your changes. This prevents your router from being accessed from outside your home network. If you cannot find the option, check your router’s mobile app or the manufacturer’s support page. Some routers hide this setting or disable it by default.
8) Restart your router regularly
First, unplug your router from the power outlet. Wait about 30 seconds to let it fully shut down. Next, plug it back in and wait a few minutes for it to reconnect to the internet. You can also restart your router through its settings. Log in, then look for options like Reboot or Restart under sections such as Administration or System. Doing this every few weeks can help apply updates and clear temporary issues that may affect performance or security. If your router supports scheduled reboots, you can turn that on to automate the process.
Kurt’s key takeaway
This is not a situation where your internet suddenly becomes unsafe. There is no recall. There is no shutdown. Your router will not stop working on a specific date. However, there is a new question mark that did not exist before. The Federal Communications Commission has created a system where future updates for some devices could depend on how the rules evolve. That puts more importance on something most people rarely think about: how long their router will stay supported. For now, you still have time. The current waiver runs into 2027, and regulators have signaled they may revisit the policy before then. The smart move is simple. Know what you own, keep it updated and stay aware as this situation develops.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
As policies around your home tech change, how much responsibility should fall on regulators versus the companies that keep your devices updated? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
US arrests soldier who allegedly made $400k on Maduro Polymarket bets
On or about January 6, 2026, for example, VAN DYKE asked Polymarket to delete his Polymarket account, falsely claiming that he had lost access to the email address to which the account had been associated. That same day, VAN DYKE changed the email registered to his cryptocurrency exchange account to an email address that was not subscribed to in his name, which email address was created on or about December 14., 2025.
-
Detroit, MI28 minutes agoDetroit Tigers vs Cincinnati Reds – April 24, 2026 – Redleg Nation
-
San Francisco, CA40 minutes agoSan Francisco ranks top in the U.S. for desserts. Here’s where to go.
-
Dallas, TX46 minutes agoFC Dallas Injury Report vs. Seattle Sounders: Who Is In and Who Is Out?
-
Miami, FL52 minutes ago‘The Mummy’ New Movie To Open in 2027, ‘Miami ’85’ Now 2028
-
Boston, MA58 minutes agoAlexandria Ocasio-Cortez joins Boston Mayor Wu, Ayanna Pressley to slam Trump’s childcare funding cuts
-
Denver, CO1 hour agoDenver police still looking for help solving double murder at American Elm restaurant 3 years ago
-
Seattle, WA1 hour agoTraffic flagger, 70, hospitalized after dump truck strike on Seattle’s Capitol Hill
-
San Diego, CA1 hour agoSan Diego guts arts funding to balance budget as California cities make deep spending cuts