Connect with us

Technology

Fake PayPal email let hackers access computer and bank account

Published

on

Fake PayPal email let hackers access computer and bank account

Online scams are becoming more dangerous and convincing every day. Cybercriminals are finding new ways to gain not just your login credentials but full control of your computer and your bank accounts.

Take John from King George, Virginia, for example. He recently shared his alarming experience with us. His story is a powerful warning about how quickly things can escalate if you respond to suspicious emails.

Here is what happened to John in his own words: “I mistakenly responded to a false PayPal email notifying me of a laptop purchase. The message looked real, and I called the number listed. The person on the phone gave me a strange number to enter into my browser, which installed an app that took control of my PC. A warning popped up saying ‘software updating – do not turn off PC,’ and I could see my entire file system being scanned. The scammer accessed my bank account and transferred money between accounts. He told me to leave my PC running and go to the bank, keeping him on the phone without telling anyone what was happening. I shut everything down, contacted my bank, and changed my passwords.”

John’s quick thinking in shutting down his computer and alerting his bank helped minimize the damage. However, not everyone is as lucky.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

Advertisement

Fake PayPal scam email (Kurt “CyberGuy” Knutsson)

How this scam works

This type of scam is known as a remote access scam. It often begins with a fake email that appears to come from a trusted company like PayPal. The message claims there is an issue, such as an unauthorized charge, and urges the victim to call a phone number or click a link. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once the scammer makes contact, they guide the victim to enter a code into their browser or install a program, claiming it will fix the problem. In reality, this grants the scammer full control of the victim’s computer. 

Once inside, scammers often search for sensitive files, access banking websites, steal login credentials or install malware to maintain long-term access. Even if the immediate scam is stopped, hidden malware can allow scammers to reenter the system later.

Advertisement

A hacker at work (Kurt “CyberGuy” Knutsson)

THE URGENT PAYPAL EMAIL SCAM YOU CAN’T AFFORD TO IGNORE

Key takeaways from John’s experience

John’s close call highlights several important lessons.

Fake emails are harder to spot than ever: Scammers create emails that look almost identical to real ones from trusted companies like PayPal. They copy logos, formatting and even fake customer support numbers. Always double-check the sender’s email address and verify communications by visiting the official website or app directly instead of clicking links inside emails.

Remote access scams can escalate fast: Once scammers gain control of your device, they can steal sensitive data, move funds between accounts and install hidden malware that stays behind even after the scammer disconnects. It often takes only minutes for serious damage to be done, making fast recognition critical.

Advertisement

Psychological pressure plays a big role: Scammers rely on creating a sense of urgency and fear. By keeping you on the phone and urging secrecy, they isolate you from help and rush you into making bad decisions. Recognizing when you are being pressured is key to breaking the scammer’s control.

Fast action can make all the difference: By quickly disconnecting his computer and contacting his bank, John limited the scammer’s access to his accounts. Acting within minutes rather than hours can stop further theft, block fraudulent transactions and protect your sensitive information from being fully compromised.

A warning on a laptop home screen (Kurt “CyberGuy” Knutsson)

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Advertisement

How to protect yourself from remote access scams

Taking simple but strong security steps can protect you from falling victim.

1. Never call a number listed in a suspicious email: Scammers often set up fake phone numbers that sound professional but are designed to manipulate you into handing over control or information. Always find verified contact information through a company’s official website or app, not links/numbers provided in suspicious messages.

2. Be skeptical of unusual instructions: No legitimate company will ask you to install software or enter strange codes to protect your account. If anything seems unusual, trust your instincts and stop the communication immediately.

3. Install strong antivirus software on all devices: Antivirus programs can detect suspicious downloads, block remote access attempts and help prevent hackers from taking over your system. Having strong antivirus protection installed across all your devices is the best way to safeguard yourself from malicious links that install malware and attempt to access your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Use identity theft protection: These services monitor financial accounts, credit reports and online activity for signs of fraud, alerting you to suspicious transactions. See my tips and best picks on how to protect yourself from identity theft.

Advertisement

5. React immediately if you suspect a scam: Disconnect your device from the internet, contact your bank or credit card company immediately and change your passwords, especially for banking and email accounts. Monitor your accounts closely for unauthorized activity and report the scam to the Federal Trade Commission as well as the company that was impersonated. Acting quickly can prevent further access and limit the damage scammers can cause.

6. Use multifactor authentication (MFA): MFA adds a critical layer of security beyond passwords, blocking unauthorized logins even if credentials are stolen. Enable MFA on all accounts, especially banking, email and payment platforms, to stop scammers from bypassing stolen passwords.

7. Update devices and software immediately: Regular updates patch security flaws that scammers exploit to install malware or hijack systems. Turn on automatic updates wherever possible to ensure you’re always protected against newly discovered vulnerabilities.

8. Employ a password manager with strong, unique passwords: Avoid password reuse and use complex passphrases to minimize credential-stuffing attacks. A password manager generates and stores uncrackable passwords, eliminating the risk of weak or repeated credentials. Get more details about my best expert-reviewed password managers of 2025 here.

9. Never share screen access or grant remote control: Scammers exploit screen-sharing tools to steal passwords and manipulate transactions in real time. Legitimate tech support will never demand unsolicited screen access; terminate the call immediately if pressured.

Advertisement

10. Invest in personal data removal services: These services automate requests to delete your personal information from data brokers and people-search sites, reducing publicly available details scammers could exploit for phishing or impersonation. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

PROTECT YOURSELF FROM TECH SUPPORT SCAMS

Kurt’s key takeaways

John’s story is a reminder that online scams are evolving quickly and becoming more aggressive. Staying skeptical, verifying all suspicious messages and acting quickly if something feels wrong can make the difference between staying safe and losing sensitive information. Protect your devices, trust your instincts and remember it is always better to be cautious than to take a risk with your security.

Have you or someone you know been targeted by a scam like this? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2025 CyberGuy.com. All rights reserved.

Technology

Brendan Carr is a dummy

Published

on

Brendan Carr is a dummy

All year on The Vergecast, we’ve been tracking the many bizarre and problematic actions of FCC Chairman Brendan Carr. There has been a lot to discuss! Then, this week, ahead of one of our last episodes of the year, Carr appeared in front of the Senate Commerce Committee and spent three hours explaining how he thinks about his job, the FCC, and the state of online communication and entertainment. It was a lot.

On this episode of The Vergecast, we begin with a dissection of Carr’s testimony, his threats against broadcasters, and the ways in which he’s using old ideas about content delivery to get his political way. Nilay and David walk through some of Carr’s most important quotes, explain the history of broadband regulation, and look ahead to how Carr might bring these same tactics to internet regulation next year.

Also, an important housekeeping note: The Vergecast will be live at CES! We’ll be at the Brooklyn Bowl in Las Vegas, at 3:30PM on Wednesday, January 7th. There will be podcasting, and hanging out, and bowling. It’s going to be great, and if you’re going to be in Vegas we’d love to see you there.

Until then, if you want to know more about everything we discuss in this episode, here are some links to get you started, first on Brendan Carr:

And in the streaming wars:

Advertisement

And in the lightning round:

Continue Reading

Technology

AI photo match reunites Texas woman with lost cat after 103 days

Published

on

AI photo match reunites Texas woman with lost cat after 103 days

NEWYou can now listen to Fox News articles!

Holiday gatherings and year-end travel often lead to a spike in missing pets. Doors open more often, routines shift and animals can slip outside in a moment of confusion. 

New Year’s Eve creates loud fireworks, and shelters report some of their busiest nights of the entire year. Amid all that, one Texas family just experienced a heartwarming reunion thanks to an AI photo matching on Petco Love Lost.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

FIND A LOST PHONE THAT IS OFF OR DEAD

Advertisement

An AI photo-matching on Petco Love Lost helped reunite a Texas family with their missing cat after 103 days. (ULISES RUIZ/AFP via Getty Images)

How AI photo matching kept the search going

Pam’s 11-year-old indoor cat, Grayson, had never been outside alone. She believes he slipped out while she unloaded groceries at their home in Plano, Texas. The moment she realized he was gone, she acted fast. 

She said, “We went up and down the streets day and night. We went online in the neighborhood and on Love Lost. We put up flyers all over the neighborhood. Friends and neighbors were looking for him. I went to the animal shelter, posted him there, and went every day for over a month, hoping to find him.”

Pam uploaded Grayson’s photo to Petco Love Lost right away. She checked her daily match alerts and hoped she would see his familiar face pop up. She told CyberGuy, “I received match alerts almost every day from Lost Love, but never saw Grayson. His profile had been on their site for over 90 days.”

The moment everything changed

Missy, a nearby resident, spotted a thin cat in an alley near her home. She brought him inside, took a picture of him and then turned to Love Lost to see if anyone had reported a missing cat like him.

Advertisement

Missy explained how simple the process felt. “I used Lost Love to reunite them,” she said. “I uploaded a photo of the cat that we found, and it was matched through AI with the photo that the owner uploaded.”

She soon received an AI match alert and learned that the cross street Grayson’s owner, Pam, had listed in her lost post was only a mile from her home. Missy contacted Pam right away.

That message changed everything. “I am sure that if we had not posted his picture and enabled the ability to match the images, we would never have known what happened to Grayson,” Pam said. “And we would not have connected with Missy.”

AI TECH HELPS A SENIOR REUNITE WITH HER CAT AFTER 11 DAYS

Grayson, an indoor cat from Plano, Texas, was finally found thanks to a neighbor who uploaded his photo to an AI search tool. (DANIEL PERRON/Hans Lucas/AFP via Getty Images)

Advertisement

A long road for an aging cat

Grayson is almost 12 and has never lived outdoors. That made this reunion feel even more emotional, Pam said.

“I am still amazed at Grayson’s journey,” she added. “I look at him and cannot believe he made it through those 103 days. He is almost 12 years old, so he is not a young kitty.”

Pam said she still thinks about what those months were like for him. “[I] guess I will always wonder where he was and how many stops he made before he reached Missy’s loving home,” she said. “He must have known she would take care of him. It takes a special person to take the time to reunite a beloved pet with their family. Missy and her family went above and beyond to reunite us with Grayson.”

Why pet tech matters during the holidays

This season brings joy but also risks for pets. Visitors, travel and loud celebrations create more chances for animals to slip out or feel spooked. Tools like AI photo matching help families act fast when a pet goes missing. Love Lost connects shelters and neighbors in one place so that people like Pam and Missy can find each other.

What to do if your pet goes missing

Losing a pet can feel overwhelming, but taking fast action helps. These steps guide you through what to do right away.

Advertisement

1) Search your home and neighborhood right away

Look in closets, garages and under furniture. Walk your street and ask neighbors to check yards and sheds.

2) Upload your pet’s photo to Petco Love Lost

Take a clear photo and post it on the site. AI photo matching alerts you when a possible match appears. It also helps others contact you fast.

3) Visit your local shelters in person

Shelters update kennels throughout the day. Staff can guide you and help flag your pet’s profile. Go often until you get updates.

4) Post on local community groups

Use neighborhood apps, local Facebook groups and community forums. Include your pet’s photo, last known location and your contact info.

5) Put up flyers right away

Use a large photo and simple details. Place flyers at busy intersections and near schools, parks and businesses.

Advertisement

6) Contact your pet’s microchip registry

If your pet is microchipped, call the registry or log in to your account. Make sure the chip is registered to you, update your contact info and mark your pet as missing so shelters and vets can reach you fast.

7) Stay consistent with your search

Check Love Lost alerts often. Visit shelters and follow up on every lead. Persistence made the difference for Pam and Grayson.

LOST DOGS ON FOURTH OF JULY: HOW TO KEEP YOUR PET SAFE

A pet owner is seen cradling a cat on their lap. (Diego Herrera Carcedo/Anadolu via Getty Images)

How AirTags can help you find a lost pet faster

While tools like AI photo matching are invaluable after a pet goes missing, prevention and real-time tracking can make an enormous difference during the first critical hours. That’s where Apple AirTags come in. An AirTag isn’t a GPS tracker, but it can still be a powerful recovery tool when used correctly. When attached securely to your pet’s collar, an AirTag uses Apple’s vast Find My network. That network consists of hundreds of millions of nearby iPhones, iPads and Macs that can anonymously and securely relay the AirTag’s location back to you.

Advertisement

If your pet wanders into a neighborhood, apartment complex or busy area, the chances are high that another Apple device will pass nearby and update the location automatically. You won’t know who helped, and they won’t know it was them, but the location can show up on your map within minutes. For indoor cats or dogs that don’t usually roam far, this can be especially helpful. Even a rough location can narrow your search area and save precious time.

Important limits to know: AirTags work best in populated areas. They rely on nearby Apple devices, so coverage may be limited in rural or remote locations. They also don’t update continuously like true GPS pet trackers. That’s why AirTags should be seen as a backup layer, not a replacement for microchipping or dedicated pet trackers.  

How to use an AirTag safely with pets

  • Use a secure, pet-specific AirTag holder that won’t break easily.
  • Attach it to a breakaway collar for cats and dogs to reduce injury risk.
  • Make sure Find My notifications are turned on so you get alerts quickly.
  • Combine it with microchipping and ID tags for the best protection.

Used together, these tools give you multiple ways to reconnect with your pet, whether minutes or months have passed.

For a list of the best pet trackers, go to Cyberguy.com  and search “best pet trackers.”

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com  

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP   

Kurt’s key takeaways 

Grayson’s reunion is a reminder that tech works best when caring people put it to use. AI matched the photos, but Missy took action, and Pam never stopped looking. Their persistence helped a senior cat get home after a long and risky journey.

If your pet went missing today, would you know the first step to bring them home fast? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.

Advertisement

Continue Reading

Technology

TikTok ban: all the news on the app’s shutdown and return in the US

Published

on

TikTok ban: all the news on the app’s shutdown and return in the US

After briefly going dark in the US to comply with the divest-or-ban law targeting ByteDance that went into effect on January 19th, TikTok quickly came back online. It eventually reappeared in the App Store and Google Play as negotiations between the US and China continued, and Donald Trump continued to sign extensions directing officials not to apply the law’s penalties.

Finally, in mid-December, TikTok CEO Shou Zi Chew told employees that the agreements to create TikTok USDS Joint Venture LLC, which includes Oracle, Silver Lake, and MGX as part owners, have been signed, and the deal is expected to close on January 22nd, 2026. His letter said that for users in the US, the new joint venture will oversee data protection, the security of a newly-retrained algorithm, content moderation, and the deployment of the US app and platform.

Read on for all the latest news on the TikTok ban law in the US.

Continue Reading

Trending