Connect with us

Technology

Sending a text the wrong way could cost you money and trouble

Published

on

Sending a text the wrong way could cost you money and trouble

Ever wondered why your text messages sometimes fail to send, show up pixelated or don’t appear at all on the other person’s end? 

It might not be your phone, but your carrier’s messaging support. Knowing the difference between SMS, MMS and RCS and how your carrier handles them can save you money, improve message delivery and ensure you’re using the full potential of your messaging app.

A person texting on their phone  (Kurt “CyberGuy” Knutsson)

Knowing the basics: SMS vs. MMS vs. RCS

Before you can figure out which phone carrier fits your messaging needs, it helps to understand the differences between the three main types of mobile messaging — SMS, MMS and RCS. Each has its own capabilities, limitations and impact on your experience.

Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!

Advertisement

SMS (Short Message Service) is the most basic form of text messaging and has been around since the early days of mobile phones. It allows users to send plain text messages with a strict character limit of 160 characters. SMS messages are sent over the cellular network, which means they work even if you don’t have a data plan or access to Wi-Fi. This makes SMS one of the most reliable messaging options available, especially for simple communication. It works for all phones, even older models, which makes it universal.

MMS (Multimedia Messaging Service) builds upon SMS by allowing the transmission of multimedia content. With MMS, users can send images, videos, audio files and even GIFs. The character limit is significantly higher, typically up to 1,600 characters, although this can vary depending on the carrier. MMS messages also travel over the cellular network but require mobile data to send and receive. They do not require Wi-Fi, but because media files are larger, the reliability can vary. Some carriers compress MMS files or fail to send them if they exceed certain size limits, which means your carefully chosen vacation photo might arrive as a pixelated blur.

RCS (Rich Communication Services) represents the next generation of mobile messaging. It is designed to upgrade the SMS and MMS experience by providing features that rival popular messaging apps like iMessage and WhatsApp. With RCS, users can send high-resolution photos and videos, audio clips, emoji, stickers and even read receipts and typing indicators. There is no character limit, and the service works over Wi-Fi or mobile data instead of over standard cellular channels. 

While RCS allows larger files, some messaging platforms or carriers may still apply soft limits or compress images/videos to ensure consistent performance. However, for RCS to work, both the sender and the recipient need to have RCS enabled on a supported messaging app and carrier. Google Messages is the most reliable app for accessing these RCS features, especially on Android devices. However, it should be noted that Apple devices do not support RCS natively because Apple relies on iMessage for similar functionality.

HOW TO STOP SPAM TEXT MESSAGES ON YOUR PHONE

Advertisement

Why it matters when choosing a wireless carrier

Now that you know what SMS, MMS and RCS are, it’s important to understand how your phone carrier influences your messaging experience. From hidden fees to message delivery issues, the provider you choose can make a big difference in how well these technologies work.

Cost differences

Not all carriers treat these messaging types the same. While SMS is often free and unlimited on many plans, MMS messages may incur additional charges, especially on prepaid or international plans. RCS messages, on the other hand, use mobile data or Wi-Fi and typically do not incur per-message fees, making them a cost-effective option if supported.

For example, carrier A might offer unlimited SMS but charge for every MMS sent. Carrier B might include MMS in the plan but cap the number of SMS messages. Carrier C could fully support RCS, letting users send messages over Wi-Fi for free. Choosing the right carrier based on how you communicate can help avoid surprise charges.

Not all carriers fully support RCS

While SMS and MMS are universally supported, RCS still depends on carrier infrastructure and the messaging app being used. Some carriers support RCS only through their proprietary apps, which may not be compatible with all devices. Others support “universal RCS”, which works across multiple platforms but still requires the right app, most reliably Google Messages.

If you’re hoping to use RCS features like high-resolution image sharing, read receipts and typing indicators, it’s important to ensure your carrier not only supports RCS but also supports it universally across devices and apps. Otherwise, your message may silently fall back to SMS or MMS if the recipient’s carrier or device does not support RCS.

Advertisement

Illustration of text messaging on a smartphone   (Kurt “CyberGuy” Knutsson)

ANDROID FEATURE PREVENTS SENSITIVE CONTENT IN GOOGLE MESSAGES

As of May 2025, all major U.S. wireless carriers and most of their sub-brands and MVNOs (mobile virtual network operators) fully support SMS, MMS and RCS messaging. This includes both Android and iPhone users (with iOS 18.4 or newer for RCS on iPhone).

You can expect full support for SMS, MMS and RCS on the following carriers: AT&T, Verizon, T-Mobile, US Cellular, C Spire, Consumer Cellular, Cricket, Family Mobile, FirstNet, H2O Wireless, Metro by T-Mobile, Mint Mobile, Boost Mobile, Google Fi, PureTalk, RedPocket Mobile, Spectrum Mobile, Straight Talk, TracFone, Ultra Mobile, US Mobile, Visible and Xfinity Mobile.

  • SMS and MMS support: All of these carriers offer SMS and MMS. SMS is almost always unlimited on modern plans, while MMS may have limitations or extra charges on some prepaid or international plans.
  • RCS support on iPhone: With the release of iOS 18.4, these carriers also support RCS on iPhones. If you have updated to iOS 18.4 or later, you should have access to RCS features, provided your carrier supports it.
  • RCS support on Android: All these providers support RCS messaging on Android devices, most reliably through the Google Messages app.

If you are using one of these carriers, you can expect the latest messaging features, including high-resolution media sharing, read receipts, typing indicators and the ability to send messages over Wi-Fi or mobile data. For the best experience, make sure your device is updated to the latest software and that you are using a supported messaging app.

  • For iPhones, RCS support requires iOS 18.4 or higher. As of spring 2025, all major U.S. carriers and most MVNOs (mobile virtual network operators) now support RCS on iPhone.
  • On Android, RCS is available through Google Messages and is widely supported across all major carriers and most MVNOs.

BEST WIRELESS PHONE PLANS

International support

RCS support is expanding internationally, with carriers like Orange and Sosh in France offering RCS on iPhones running iOS 18.4 beta. To check if your international carrier supports RCS on iPhone:

Advertisement
  • Go to Settings
  • Tap General
  • Click About
  • Scroll down and tap Carrier. If RCS is supported, you will see Voice, SMS & RCS.

HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES

Recent changes and security

Apple and Google are rolling out support for RCS Universal Profile 3.0, which brings end-to-end encryption for RCS messages, enhancing privacy and security across platforms. Some carriers may still be updating their infrastructure, so check with your provider or device settings if you do not see RCS options enabled.

Pricing considerations

  • SMS is typically unlimited on most plans.
  • MMS may still incur charges on some plans, especially prepaid or international. For example, outbound MMS in Canada is $0.0220 per message as of May 2025.
  • RCS messages use data or Wi-Fi and generally do not incur per-message fees, making them cost-effective for sending media-rich messages.

International messaging can be affected

If you use a smaller or regional provider not mentioned above, or if you plan to travel internationally, it is important to check with your carrier about its current support for RCS, especially if you use an iPhone. While international support for RCS is expanding, it is not yet universal.

When you are abroad, reliable messaging becomes even more critical. SMS is the most dependable option and works almost everywhere, making it a safe choice for staying connected. MMS, on the other hand, can be inconsistent overseas due to differences in network standards and carrier agreements. RCS is even less predictable outside your home country, as it relies on mobile data or Wi-Fi and often does not function while roaming unless your carrier specifically enables it for international use.

So, if you are traveling or using a less common carrier, always confirm whether your plan includes international MMS and RCS support. This will help you avoid unexpected gaps in communication or surprise fees and ensure your messages reach their destination reliably. 

GOT A BANK TRANSFER ALERT TEXT? IT MIGHT BE A SCAM. HERE’S WHAT TO DO

Email-to-text services vary by carrier

Email-to-text is a feature that lets you send a text message to someone’s phone number directly from your email. To do this, you use a special email-to-SMS gateway provided by the recipient’s mobile carrier. For example, to text a friend on AT&T, you’d send an email to something like 1234567890@txt.att.net.

Advertisement

However, not all carriers support this, and some may block the feature altogether to prevent spam or limit abuse. Even among those that do support it, there can be differences between how SMS (text-only) and MMS (media messages) are handled.

Below are examples of the special email addresses (called gateways) that let you send text messages via email:

AT&T

  • SMS: number@txt.att.net
  • MMS: number@mms.att.net

Verizon

  • SMS: number@vtext.com
  • MMS: number@vzwpix.com

T-Mobile

  • SMS & MMS: number@tmomail.net

If you rely on this feature, such as sending yourself reminders from your email or receiving system alerts to your phone, it is important to check whether your carrier supports it. Be aware that not all carriers clearly document this capability, especially smaller providers like Spectrum Mobile or Xfinity Mobile, which may restrict or not support it at all.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A man texting on his iPhone   (Kurt “CyberGuy” Knutsson)

Advertisement

Safety steps for mobile messaging

To enhance your mobile messaging security, follow these best practices:

1. Avoid clicking on unknown links or messages and install strong antivirus software: Be cautious with links or attachments from unknown sources because they can lead to phishing or malware attacks. Also, install strong antivirus software on your device to protect against malware and viruses.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices

2. Enable Multi-factor Authentication (MFA): Use MFA to add an extra layer of security for your messaging apps and accounts. This can include methods like authentication apps, physical security keys, or SMS codes, which help prevent unauthorized access even if your password is compromised. By activating MFA, you significantly reduce the risk of your accounts being hacked, providing an essential safeguard against cyber threats.

Advertisement

3. Keep your device and apps updated: Regularly update your operating system and apps to ensure you have the latest security patches.

4. Use end-to-end encrypted messaging apps: Consider using apps with end-to-end encryption for secure communication. This ensures that only you and the intended recipient can read the messages, keeping them safe from hackers or third-party interception. Popular options include Signal, WhatsApp and iMessage, which prioritize privacy and protect sensitive conversations from unauthorized access.

5. Be mindful of public Wi-Fi and use a Virtual Private Network (VPN): Avoid using public Wi-Fi for sensitive communications, as it can be insecure and expose your data to potential eavesdropping or hacking. Consider using a VPN for secure browsing on public networks because it encrypts your internet traffic and masks your IP address, providing a safer experience even on unsecured networks. By using a VPN, you can significantly reduce the risks associated with public Wi-Fi and protect your personal data from unauthorized access. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices

6. Delete sensitive messages: Regularly delete sensitive messages to minimize data exposure. This practice helps protect your privacy by ensuring that confidential information isn’t stored indefinitely on your device or in the cloud, where it could potentially be accessed by unauthorized parties. Additionally, consider using messaging apps that offer features like automatic message deletion or self-destructing messages to further enhance your privacy 

HOW TO BLOCK A PHONE NUMBER OR TEXT ON YOUR SMARTPHONE

Advertisement

Kurt’s key takeaways

Texting may seem simple, but there’s a lot going on behind the scenes, especially when your messages aren’t sending or show up weird. Understanding the difference between SMS, MMS and RCS can save you from headaches, surprise charges and blurry photos. The good news? A little knowledge goes a long way. Now that you’re in the know, you can text smarter, choose the right carrier and keep your conversations running smoothly, wherever you are.

Do you think mobile carriers should do more to protect you from phishing scams and malicious links sent via SMS and MMS? What specific measures would you like them to implement? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Advertisement

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved. 

Advertisement

Technology

Shedding light on Iran’s longest internet blackout

Published

on

Shedding light on Iran’s longest internet blackout

After protests broke out in early January, the Iranian regime shut down the internet, starting the longest blackout in Iranian history. Despite this attempt to stop the protests from spreading, they did not stop. Still, the internet shutdown slowed down the spread of information both inside and outside Iran.

Behind the heavily policed borders and the jammed signals, an unprecedented wave of state violence continues to add to a death toll somewhere between 3,000 and 30,000. Even at the lowest count, which has been acknowledged by the Iranian state and is likely a wild underestimate, these last few weeks have been one of the bloodiest uprisings in modern history.

The situation in Iran can be hard to grasp. The history is complicated; the state of the technology and internet infrastructure there is constantly in flux. To get a sense of what is happening right now, I turned to an expert. Mahsa Alimardani, the associate director of the Technology Threats & Opportunities program at WITNESS, has been a researcher and advocate in the digital rights space — particularly around Iran — since 2012. I spoke with her about what is happening in Iran, and how technology both props up and threatens repressive regimes.

The Verge: What is internet access in Iran like right now?

Mahsa Alimardani: Since the weekend [of January 24], there has been some resumption of connectivity. And I’m a little bit worried that this might convince people that things are back to normal. Last I saw, there was like 30 to 40 percent connectivity on some of the Cloudflare network data in Iran and there’s very inconsistent connectivity. Some circumvention tools have started to work.

Advertisement

Randomly, someone in Iran FaceTime called me yesterday. They were like, “My VPN stopped working, so I just tried to call with FaceTime, and for some reason, it didn’t even need a VPN.” But it was a momentary glitch. Various things are happening across the network, and it’s not really clear why there’s this opening, or what it means for long-term connectivity.

Since January 8th, when there was a surge in the uprising in the protest movement in Iran, there was an internet shutdown — the longest internet shutdown in Iran, they broke the record in length.

They also broke the record in number of protesters that have been massacred. It’s horrifying to think that technology helps enable such crimes.

Why does the Iranian government fear internet access?

In 1988, there was a fatwa where the government massacred a lot of political prisoners in a short span of time. I bring this up because it happened when there was no internet, and the media was heavily controlled and centralized by the state. If you did not flee Iran, and if you were not part of the generation of prisoners and political activists that survived, it was very hard to pass on the memory of that event. Peers of mine in Iran didn’t grow up with the same information. It’s so interesting having these conversations with people and realizing they are learning history only when they leave the country.

Advertisement

What’s been a real game changer is the way you can document and witness these kinds of crimes in the age of the internet. I think it’s obviously a big threat to the regime. It’s a massive threat to them to be able to hold them accountable, and be able to document and witness what they’re doing.

Anytime anyone sees a severe crackdown like an internet shutdown, you know that it’s going to be followed by violence. In 2019 there was a week-long internet shutdown, under the blanket of which they massacred 1,500 people. The reason why is because they don’t want people to use the internet for mobilization and communication, and they don’t want there to be a way to document what’s happening.

Anytime anyone sees a severe crackdown like an internet shutdown, you know that it’s going to be followed by violence

So the denial of the scale of their crimes is part of what they do in Iran, because it’s very hard to assess the percentage of legitimacy that the regime has, because obviously you can’t do free polling. You don’t have free media. Even when you have foreign journalists that go there, they’re followed by minders and the reporting is super-limited. The UN hasn’t been able to really have anyone do proper site visits for human rights documentation, since the start of this regime in 1979.

There isn’t any real access to professional on-the-ground documentation and fact-finding. So it all really depends on the internet, on people, on citizen media. People sending things, putting them online, and then having professional fact-checkers and verification.

Advertisement

What was internet access in Iran like most recently? What platforms and service providers did people use before the blackout started?

Iranians are extremely tech savvy because there’s been a cat-and-mouse game across the internet for most of its existence. Since 2017, 2018, on average, there’s been protests every two years. Each time they have a different level of censorship, new kinds of rules and regulations.

In 2017, [messaging app] Telegram was massive. Some people were even saying Telegram was the internet for Iranians, they were doing everything across Telegram. It worked really well, especially with network bandwidth being really low. So Telegram was a place for news, chatting, socializing everything, even like online markets. But then they blocked it in 2018 when protests started, because protest mobilization on there was a threat to the regime.

There was a move toward Instagram and WhatsApp becoming the most popular applications.

They had yet to be blocked back then. Instagram was more for fun, but it became much more politicized after Telegram was blocked. Then, during the Woman Life Freedom movement in 2022, Instagram and WhatsApp got blocked.

Advertisement

The regime has spent a lot of effort in trying to disable VPNs

Most people are just on VPNs. The regime has spent a lot of effort in trying to disable VPNs. There’s a lot of different VPN projects both for-profit and nonprofit that work within that cat-and-mouse game where protocols are being disabled and new ones are created.

An average Iranian often has many different VPNs. When one can’t work, they’ll turn on another one.

We’ve talked about how technology threatens the regime and how average Iranians use it. Let’s switch over to the other side of this issue: how does technology enable repression?

So there’s various different things the regime does, different levels of enacting information controls. There’s the censorship level of shutting it down.

Advertisement

Then there’s physical coercion. Like, I know people who have not reported their children who have been killed recently because they were so frightened by the process by which they had to get their loved one’s body.

They also flood the information space with a lot of misinformation. They create a lot of doubt.

They’ve been doing this information manipulation even before the internet. Iran is a very complicated information space. There are a lot of actors beyond the regime who also want to manipulate it. Even authentic dissidents and activism will get lumped in with Mossad or CIA operations.

Iran’s foreign relations muddy its information space

In 1953, the American CIA and British MI6 overthrew the democratic government of Iran, consolidating power under a monarchy that was more favorable to the US and the UK. Many believe that the political instability caused by the CIA and MI6 eventually led to the Islamic Revolution of 1979, which established the current authoritarian regime.

Advertisement

From 2014 to 2024, Iran and Russia joined a strategic partnership with the Syrian dictatorship as part of the Syrian civil war. The United States formed its own coalition; both coalitions purported to fight ISIS. The civil war spawned massive amounts of internet disinformation, and in 2018, Facebook and Twitter deleted hundreds of accounts originating in Russia and Iran that formed a global influence network pushing disinformation. The Syrian regime was overthrown at the end of 2024. The next year, following decades of hostilities, Israel and Iran engaged in a 12-day war.

These are some, but not all of the factors that contribute to the complicated information space in Iran that Alimardani is referring to.

The regime’s campaign existed pre-internet, but with technology, it went into overdrive. They’ve been quite clever in some of the ways they’ve covered the protests. They’ve been able to even mobilize, like, people who are sympathetic to the Palestinian cause, against, you know, the Iranian cause for liberation.

There have been a lot of documented efforts of them trying to manipulate protest documentation, undermine it, you know, use the concept of the Liar’s Dividend, which is very easy to use in the increasingly AI world we’re in.

Hold on, can you go through those examples you just mentioned? About mobilizing people who are sympathetic to the Palestinian cause?

Advertisement

Yeah, so, Iran is quite complicated in that it’s an Islamic fascist state. They use Islam in a lot of ways to repress the people. And there is a lot of very valid rhetoric about Islamophobia in the West, from the very specific context and history of the United States, such as what happened during the War on Terror.

But in Iran, it’s quite different. And this can really be manipulated and conflated, right? Mosques in Iran are often also the headquarters for the Basij [the Iranian paramilitary corps], and people might not know this. So there will be videos like, “Look at these protesters who are setting fire to this mosque. Look at these Islamophobic rioters.”

You might see that, without the context that the mosques also are places where the security forces that kill people are stationed, and lose why something like that would be attacked by Iranians seeking liberation.

You mentioned the regime’s use of AI — do you want to talk a little bit more about that?

Yeah, so, we didn’t need AI for authoritarian regimes to deny evidence of their crimes. Even before AI, Bashir al-Assad [the former dictator of Syria] was saying that reliable documentation of his crimes in Syria were not valid.

Advertisement

Whether we like it or not, AI is being integrated into a lot of things. AI editing is slowly becoming ubiquitous. Like, in fact, we might come to a point where editing photos or anything might become unavoidable without the use of generative AI.

So you no longer have that binary of like, if it’s AI, it’s fake. If there’s no AI, it’s real.

So there’s this very symbolic image that everyone has said reminded them of the Tiananmen Square Tank Man from 1989. But here, a protester is standing in front of armed security forces on motorcycles with weapons. [Ed. note: The New York Post ran with the headline “Powerful image of lone Iranian protester in front of security forces draws parallels to Tiananmen Square ‘Tank Man.’”]

This was a very low resolution video taken from a high rise [building]. Someone had screenshotted a frame from the video and it was quite blurry.

They used some AI editing software to enhance it, and you could see some AI artifacts. Nevertheless, this is an authentic, verified image of a brave protester. Lots of credible sources have verified it. But immediately, it was pointed out to have these AI artifacts, and a lot of the regime accounts started this narrative of “This is all AI slop from Zionists.”

Advertisement

And of course, because, you know, Israel has a special interest in Iran, they have a Farsi-language state account. Israel’s Farsi state account shared the image, which further fueled the claim that this authentic image from Iran was AI slop being pushed by the enemy, Israel.

As you’ve already mentioned, Iran has a complicated information environment. What would you say are the various actors in this space? What kinds of things are they doing?

Obviously there are foreign policy interests by Israel and the US in Iran, just because of the history and very antagonistic relationship they’ve had from the very beginning of the revolution.

The Iran-Israel war in June 2025 was a super interesting moment because the war started a few weeks after Google launched Veo 3, which has made access to very realistic generative AI content very easy. So right off the bat, you could see, from both sides, a lot of AI content coming from the war. This wasn’t the first war where that’s happened — like the Ukraine war has had so many different examples — but since Russia’s invasion of Ukraine [beginning in 2022], the technology has advanced far more, so it became a very big part of the narrative of the situation in Iran.

The most famous example from the Iran-Israel war was a piece of manipulated content that Citizen Lab later was able to attribute to the Israeli state. It was this AI-generated video of Israel bombing the gates of Evin Prison, perpetuating this narrative that they have very precise military operations and that they were freeing these political prisoners.

Advertisement

Evin is a very famous prison for a lot of activists and dissidents and intellectuals in Iran. Human Rights Watch and Amnesty International called the bombing of Evin Prison a war crime. And indeed, political prisoners were casualties of the bombing.

But that deepfaked video went viral. Mainstream media even reposted it immediately before a lot of various different researchers, including our deepfakes rapid response force and others, were able to attest that indeed this was a manipulated video.

So you have this information space that is quite complicated. But in this scenario, I think it would really be remiss to put that much emphasis on the role that these other actors have. There are things from these outside actors that fog up the information space, but ultimately what’s really happening is that there’s a really unprecedented massacre happening. And the perpetrator is the Islamic Republic of Iran.

I’ve seen some reporting about how Iranians bought Starlink terminals prior to the blackout. Can you say anything about that?

Yeah, I want to start by referencing a really great article by the Sudanese activist Yassmin Abdel-Magied, called “Sudanese People Don’t Have the Luxury of Hating Elon Musk.” Whatever my personal ideas are about Elon Musk, you have to give credit where credit is due. This technology is a game changer. It’s been a game changer in Sudan. And it has been in Iran.

Advertisement

We’ve had a few days of a little bit of connectivity of people coming online just through the ordinary network, but when the shutdown was full and complete, Starlink was really the only window we had into Iran.

When the shutdown was full and complete, Starlink was really the only window we had into Iran

And if you talk to documentation organizations, they’ll tell you, they were getting evidence and doing the verification through what was coming in from the Starlink connections. I know of people who had a Starlink and had like a whole neighborhood of people come in to check in and use the Wi-Fi.

The most credible stats before the situation was that there’s about 50,000 Starlinks. There’s likely more than 56,000 now. It became very popular during the Iran-Israel War, because of course, then the Islamic Republic enacted another shutdown. A lot of people invested in getting Starlink then.

You can get anything you want in Iran through smugglers — I think Starlink was like $1,000 at the time because demand was so high. Receivers are ordinarily a few hundred US dollars. The last price I heard was they were being sold for $2,000 in Iran. It’s a lot of money, but given the demand and the massive risk the smugglers have to undertake, I think it’s fair, but also, it means you can’t really scale this, and the people that have it are very privileged or have access to very privileged people.

Advertisement

What we’re seeing is a very small window. When having discussions with various folks that have been doing firsthand documentation, they’ve expressed, “We’re not getting enough from Kurdistan. We’re not getting enough documentation from Sistan and Baluchestan.” Historically, these areas are often at the forefront of protests, because the regime often has the bloodiest forms of repression in these provinces with marginalized ethnicities. Areas like Sistan and Baluchestan have a lot of economic poverty, so they’d have less access to something privileged like Starlink.

Satellite internet is really this way of reimagining connectivity

For all these years, myself, many people, have been working on this concept of internet censorship and internet shutdowns. And there really hasn’t been a way to reimagine this system. There’s this concept of digital sovereignty in place in terms of internet access and internet infrastructure that fits within national borders. In even the most democratic of countries, this is still national infrastructure that the government can have access or forms of control over.

This concept has to be broken. Satellite internet is really this way of reimagining connectivity, not just for Iran, but anywhere where lack of connectivity results in a crisis, whether humanitarian one, or a massacre of this proportion.

It’s really important to reconceive access to satellite internet in a way that could scale beyond those who are privileged and beyond those willing to take the risk. And one of the ideas that I’ve had and have been working on with other colleagues at Access Now has been to push for direct-to-cell access, which is a form of satellite internet connectivity that depends on technology that exists in phones created from 2020 onwards. We launched this campaign called Direct 2 Cell, hoping to push forward this concept.

Advertisement

On a personal note, how are you doing? Have you heard from your friends, family, other people you know in Iran recently?

I’ve been able to be in touch with some of my family and others here and there.

I also had that random FaceTime audio call from another person I know. I was very worried about them because they’ve been at the protests. I had heard through various people that they were okay, but I finally heard from them firsthand, and it was such a bizarre experience, speaking to them.

I had never heard them sound the way that they sounded: recounting their experience of leaving the protest before the military tanks came to open fire on the crowds, how they got tear gassed, and for the next few days, seeing water hoses washing blood off the streets. It sounded like they were making a lot of dark jokes — I had never heard them sound this way. I don’t know how you can walk the streets of your neighborhood, seeing people wash off blood, and just…. like, something not fundamentally change in your mind.

I just, I don’t, I can’t imagine how to process it if I was there. As someone in the diaspora, it’s hard to process being privileged and being away.

Advertisement
Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Technology

Tax season scams surge as filing confusion grows

Published

on

Tax season scams surge as filing confusion grows

NEWYou can now listen to Fox News articles!

Tax season already brings stress. In 2026, it brings added confusion. Changes to tax filing programs and the discontinuation of the free government-run filing system have left many taxpayers unsure about what is legitimate. That uncertainty has created an opening for scammers who move quickly when people hesitate. 

“Every tax season we see scammers ramp up their activity, and with likely confusion now that the free government-run filing system is discontinued, we’re sure scammers will take advantage,” said Lynette Owens, vice president of consumer marketing and education at Trend Micro.

In past years, scammers have leaned heavily on impersonation. Fake IRS emails promising refunds, text messages claiming accounts have been flagged under new rules and fraudulent tax help offers that promise faster returns continue to circulate, Owens said. As February begins, many taxpayers feel pressure to file quickly. That urgency creates the perfect conditions for fraud.

Sign up for my FREE CyberGuy Report

Advertisement

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

WHY SCAMMERS OPEN BANK ACCOUNTS IN YOUR NAME

Scam emails often pose as IRS notices and demand immediate action to protect a refund. The IRS does not contact taxpayers this way. (Kurt “CyberGuy” Knutsson)

Why scammers thrive when tax rules feel unclear

Uncertainty is one of the most effective tools scammers have. When taxpayers are unsure how filing rules work or whether a message is legitimate, criminals step in with communications designed to sound official and helpful. The goal is not clarity. It is speed.

“Scammers aim to create a heightened sense of anxiety among the people they are targeting,” Owens said. “When taxpayers don’t feel confident about what’s real, whether it’s new filing options, eligibility rules or program updates, criminals step in with messages that sound official and helpful.” They often pose as the IRS, a tax prep service, or even government support. Once trust is established, the message quickly turns transactional, asking for clicks, personal data or payments.

Advertisement

The most common IRS impersonation scams right now

While the delivery methods change, the core message rarely does. Something is wrong, and it must be fixed immediately. 

“The most common tactic we’re seeing is fake refund or account alert messages that claim something is wrong and demand immediate action,” Owens said. Other scams go a step further. Some direct victims to fake IRS login pages designed to steal credentials.

Others promote fraudulent tax assistance, presenting themselves as government-backed or low-cost help in order to collect personal and financial information. These scams arrive by email, text message, phone calls and fake websites. Many are polished enough to appear legitimate at first glance.

Why phrases like new rules and urgent issues work

Language plays a central role in tax scams. Phrases such as new rules or urgent account issues are designed to trigger panic before logic has a chance to catch up. They suggest the recipient has missed something important or risks losing money.

“Those phrases work because they can trigger panic and urgency, and people are more likely to react emotionally than logically,” Owens said. “New rules suggest you may have missed something important, and an urgent account issue creates fear of penalties, delays or losing a refund.” 

Advertisement

The safest response is to pause. Do not click links, reply to messages or call phone numbers included in the alert. Instead, go directly to a trusted source like IRS.gov using your own browser.

A real tax scam message that looks legitimate

Many tax scams follow a familiar structure. A common example reads: “IRS Notice: Your tax refund is on hold due to a filing discrepancy under updated 2026 rules. Verify your identity now to avoid delays.” 

At first glance, messages like this may appear credible. They often include official-looking logos, reference numbers and links that resemble real government pages.

“It may include a convincing IRS-style logo, a case number and a link that looks legitimate at a glance,” Owens said. “But the red flags are usually the same.” The message pressures immediate action, directs users to non-government websites, and requests sensitive information such as Social Security numbers, bank details or login credentials.

HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET

Advertisement

Fake IRS alerts use urgent language like “account issue” or “new rules” to trigger panic. Scammers rely on fear to push quick decisions. (Kurt “CyberGuy” Knutsson)

What happens after someone falls for a tax scam?

The damage rarely ends with a single click. 

“The most serious consequences are identity theft and financial loss,” Owens said. “Once scammers have personal information, they can file fraudulent tax returns, steal refunds, open credit accounts and access bank funds.”

Victims often spend months working to recover lost money, repair credit damage and restore their identities.

How the IRS really communicates with taxpayers

Despite repeated warnings, many people still believe the IRS might email or text them. 

Advertisement

“A legitimate tax service or the IRS won’t reach out unexpectedly by email, text or social media, and they won’t pressure you to act immediately,” Owens said.

Scam messages often share the same warning signs. They sound urgent, include links or attachments and ask for sensitive information right away. If a message creates panic or demands fast action, that alone is reason to be skeptical. The IRS primarily communicates by official mail. Unexpected digital contact should always raise concern.

What to watch for next as scams evolve

Tax scams continue to grow more sophisticated each year. 

“Taxpayers should watch for scams that feel more real than ever,” Owens said. “That includes highly polished phishing emails, refund texts designed for quick mobile clicks, fake tax help ads and cloned websites that mimic real IRS or tax prep portals.”

The biggest mistake people still make is treating an unexpected tax message like an emergency. 

Advertisement

“In tax season, speed is the scammer’s advantage,” Owens said. “Taking 30 seconds to double-check the source can prevent months of financial and identity damage.”

What to do if you clicked or responded by mistake

If someone realizes too late that a message was fraudulent, fast action can limit the damage. 

“First, stop engaging immediately,” Owens said. “Don’t click links, download attachments or reply.”

Next, report the incident. Forward phishing emails to phishing@irs.gov and file a report at reportfraud.ftc.gov.

After that, monitor financial accounts closely, change passwords and consider placing a fraud alert or credit freeze if necessary.

Advertisement

To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.” 

SCAMMERS TARGET RETIREES AS MAJOR 401(K) RULE CHANGES LOOM FOR 2026 TAX YEAR AHEAD NATIONWIDE

Tax scammers target personal and financial data to steal refunds or commit identity theft. (Kurt “CyberGuy” Knutsson)

Ways to stay safe during tax season

Scammers count on rushed decisions. The good news is that a few smart habits can dramatically lower your risk.

1) Slow down before responding to tax messages

Urgency is the scammer’s favorite tool. Messages that demand immediate action aim to short-circuit your judgment. 

Advertisement

“Scammers rely on fear, urgency or false promises, especially during tax season,” Owens said. “It’s important to slow down, verify information through official channels, and use trusted security tools.” If a message pressures you to act fast, stop. Take a breath before doing anything else.

2) Verify filing changes through official IRS channels

Scam messages often reference new rules, updated policies or eligibility changes. That language sounds credible when filing programs shift. Always confirm changes by typing IRS.gov directly into your browser or signing in to your trusted tax provider account. Never rely on links or phone numbers included in a message.

3) Protect tax accounts with strong credentials

Tax portals hold valuable personal and financial data. Weak passwords make them easy targets. Use strong and unique passwords for every tax-related account. A password manager can help generate and store secure credentials without relying on memory.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

Advertisement

4) Watch for pressure tactics and refund promises

Scammers know refunds motivate quick action. Messages claiming your refund is waiting, delayed or at risk often signal fraud. Be cautious of promises like faster refunds, guaranteed results or special access to government-backed assistance. Legitimate services do not operate that way.

5) Avoid links and secure your devices with strong antivirus software 

Clicking a single link can expose login credentials or install malware. Do not click on links in unexpected tax messages. Also, use strong antivirus software to help block malicious sites and detect threats before damage occurs.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

6) Reduce your digital footprint

Personal data fuels tax scams. The more information criminals can find online, the easier impersonation becomes. Using a data removal service can help limit exposed personal details across data broker sites. Less data means fewer opportunities for scammers to exploit your identity.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

Kurt’s key takeaways

Tax season pressure makes even cautious people vulnerable. In 2026, filing confusion adds fuel to the fire. Scammers know this and design messages to look official, urgent and helpful. Pausing, verifying and trusting official sources remains the strongest defense. When something feels rushed, it is usually for a reason.

Have you received a suspicious IRS message this tax season, and what made you question whether it was real? Let us know by writing to us at Cyberguy.com

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

Bill Gates says accusations contained in Epstein files are ‘absolutely absurd’

Published

on

Bill Gates says accusations contained in Epstein files are ‘absolutely absurd’

Reports of Bill Gates’ connections with Jeffrey Epstein grow more lurid with each dump of documents from the Department of Justice. The latest includes somewhat confusing emails that Epstein may have been drafting on behalf of someone named Boris, who worked at the Bill & Melinda Gates Foundation. The messages claim that Bill contracted an STD and wanted to “surreptitiously” give Melinda antibiotics. It also claims that Bill had “trysts” with married women and “Russian girls.”

“These claims are absolutely absurd and completely false. The only thing these documents demonstrate is Epstein’s frustration that he did not have an ongoing relationship with Gates and the lengths he would go to entrap and defame.”

It’s unclear who the Boris referenced in the emails is, or if the messages were ever sent to anyone. Only Epstein is listed in the to and from fields.

Gates’ relationship with Epstein has become a major issue for the billionaire philanthropist. He initially downplayed his connections, but documents have suggested the two were closer than Gates admitted. He has repeatedly denied associating with Epstein outside of fundraising and philanthropic efforts and said their meetings were a “huge mistake.” However, Melinda Gates has stated that Bill’s association with Epstein played a role in her decision to file for divorce.

Continue Reading

Trending