Technology
Support family from afar by controlling their screen with FaceTime
Staying connected with family members who live far away can be challenging. However, with the latest update to iOS 18, Apple has introduced a game-changing feature that allows you to remotely control a family member’s screen during a FaceTime call.
This can be incredibly helpful for providing tech support or guiding them through complex tasks on an iPhone or iPad.
Let’s dive into how this feature works and how you can make the most of it.
Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!
A woman on a FaceTime call (Kurt “CyberGuy” Knutsson)
Benefits of remote control
This feature is particularly useful for tech support because it allows you to help family members troubleshoot issues or learn how to use new apps. It also provides guided assistance, enabling you to walk someone through a process step-by-step, such as setting up a new device or configuring settings. Additionally, it enhances communication by making it easier to explain complex tasks without the frustration of miscommunication.
HOW TO PROTECT YOUR IPHONE AND IPAD FROM MALWARE
How to update to iOS 18
First, you’ll want to update your software to iOS 18. Here’s how to do it on your iPhone.
- Unlock your iPhone and tap on the Settings app.
- Scroll down and select General.
- Tap on Software Update. Your device will check for available updates.
- If iOS 18 is available, you will see an option to Download and Install. Tap on it.
- If prompted, enter your device passcode.
- Read through Apple’s terms and conditions, then tap Agree to proceed.
- Your device will download the update and then install it. This process may take some time, so ensure your device is connected to Wi-Fi and has sufficient battery life or is plugged into a charger.
Once the installation is complete, your iPhone will restart, and you’ll be running iOS 18 with all its new features.
CREATE CUSTOM VISUALS ON YOUR IPHONE WITH IMAGE PLAYGROUND IN IOS 18.2
Steps to update your iPhone software (Kurt “CyberGuy” Knutsson)
TOP TABLETS FOR SENIORS: EASY, DISTRACTION-FREE AND WI-FI OPTIONAL
How to use remote control in FaceTime
With iOS 18, Apple has expanded the capabilities of FaceTime to include remote screen control. This feature is part of SharePlay, which was initially introduced in iOS 15.1 for content sharing. Now, it allows users to share their screen and even pass control to another person during a FaceTime call.
To get started, both you and the person you want to help need to have iOS 18 installed on your devices. Before someone can remotely control your screen, that person must be saved in your contacts. Now, let’s say your mom calls you in a panic because she can’t figure out how to set up her new smart home device. No worries. Here’s how you can save the day:
- Start a FaceTime call with her by clicking on the FaceTime app.
- Then click “New FaceTime.”
- Where it says “To:” type in the name of who you want to connect to, in this case, your mom.
- Then click the FaceTime icon at the bottom of the screen.
Steps to use remote control in FaceTime (Kurt “CyberGuy” Knutsson)
- Now, tap the share icon at the top of the screen and select “Ask to Share” Screen.
Steps to use remote control in FaceTime (Kurt “CyberGuy” Knutsson)
- This will send a request to your mom, asking her to share her screen with you
Steps to use remote control in FaceTime (Kurt “CyberGuy” Knutsson)
- Once your mom accepts, her iPhone screen will appear on your device.
- Tap on her screen to enlarge it, so you can see everything clearly.
Steps to use remote control in FaceTime (Kurt “CyberGuy” Knutsson)
- Here’s a great trick: You can use the markup tools to draw or highlight directly on her screen.
- For example, circle the button she needs to tap
Steps to use remote control in FaceTime (Kurt “CyberGuy” Knutsson)
- Or draw an arrow to guide her. This way, you can visually walk her through each step.
Steps to use remote control in FaceTime (Kurt “CyberGuy” Knutsson)
But what if the person you are FaceTiming with gets stuck?
Here’s where the real magic happens. You can actually take control of her screen.
- Just tap the icon in the bottom right corner of her shared screen. This is the “Request Control” button.
Steps to use remote control in FaceTime (Kurt “CyberGuy” Knutsson)
- Your mom will get a prompt to approve or deny your request.
- Once she approves, you’ll be able to tap, swipe and type on her iPhone as if you were holding it yourself.
- You can move things, open apps and help her out directly.
Steps to end remote control (Kurt “CyberGuy” Knutsson)
HOW TO SCHEDULE A FREE SESSION WITH APPLE SUPPORT
How to end remote control
When you’re done playing tech support, ending the remote control is a breeze.
- Click on the horizontal oval shape at the top of the screen.
Steps to end remote control (Kurt “CyberGuy” Knutsson)
- Then, tap the “red circle with the X in the middle of it” where it says “End.”
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Steps to end remote control (Kurt “CyberGuy” Knutsson)
Privacy and security
Apple has implemented several safeguards to ensure your privacy and security while using this feature. Only trusted contacts can request control, and you have the option to decline any request. Additionally, certain sensitive actions, such as changing Apple ID settings or making payments, are restricted during remote control sessions.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaways
The remote control feature in FaceTime with iOS 18 is a powerful tool for staying connected and providing support to family members from afar. Whether you’re helping your parents navigate their new iPhone or guiding a friend through app setup, this feature makes it easier than ever to lend a hand, no matter the distance. So, next time a family member calls you for tech support, remember that, with iOS 18, you can be right there with them, virtually controlling their screen and making the process smoother and more efficient.
How do you think the new remote control feature in iOS 18 will affect your ability to stay connected and assist family members who live far away? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Google has finally killed the Stadia Bluetooth tool — but this person rescued it
Christopher Klay, who previously developed the Stadia Enhanced browser extension, is one of many who saved a copy of the tool to a personal GitHub page. What’s more, they’re hosting a working copy of that Google website right here to make it even easier.
Technology
Illinois DHS data breach exposes 700K residents’ records
NEWYou can now listen to Fox News articles!
Illinois residents are once again being reminded how fragile government data systems can be. The Illinois Department of Human Services has confirmed a data breach that exposed sensitive records belonging to roughly 700,000 people.
The breach is believed to have exposed two distinct sets of records. One is personal and program-related data tied to more than 672,000 Medicaid and Medicare Savings Program recipients, including addresses, case numbers, demographic details and medical assistance plan names, and another 32,000 Division of Rehabilitation Services customers whose names, addresses, case details and referral information were also exposed over multiple years.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS
The Illinois Department of Human Services confirmed a data breach that exposed sensitive records tied to roughly 700,000 residents, including Medicaid and disability services recipients. (Jakub Porzycki/NurPhoto via Getty Images)
What happened in the Illinois DHS data breach
As spotted by Bleeping Computer, the Illinois Department of Human Services disclosed that unauthorized access to one of its systems led to the exposure of records tied to approximately 700,000 Illinois residents. The affected data was connected to individuals who interacted with DHS programs, which can include benefits, assistance services and support programs across the state.
According to the agency, the breach involved personally identifiable information. While officials have not publicly released every technical detail, DHS confirmed that sensitive records were accessed, prompting notifications to impacted individuals. As is typical in cases like this, the investigation is ongoing, and the full scope of how the intrusion occurred is still being reviewed.
For residents, the key issue is not just that data was accessed, but the type of data DHS holds. Government agencies like DHS often store names, addresses, dates of birth, case numbers and, in some instances, Social Security numbers or benefits-related information. Once that data escapes, it can be misused in ways that last for years.
Why breaches like this are especially risky
When a private company is breached, you can often change a password or close an account. Government data is different. You can’t change your Social Security number easily. You can’t erase past interactions with public assistance programs. That makes breaches involving state agencies particularly dangerous.
Exposed records can be used for identity theft, fraudulent benefit claims, phishing scams and long-term impersonation. Criminals often combine government data with information from other breaches to build detailed profiles that make scams far more convincing. Even if there’s no immediate misuse, stolen data frequently resurfaces months or years later.
As with many large breaches, DHS has stated that it is taking steps to secure its systems and prevent similar incidents in the future. That’s an expected response. But for affected residents, the burden of protection now shifts largely to you.
We reached out to the Illinois Department of Human Services for comment, but did not receive a response before our deadline.
JANUARY SCAMS SURGE: WHY FRAUD SPIKES AT THE START OF THE YEAR
Personal information from Illinois DHS programs was accessed without authorization, raising concerns about long-term identity theft and fraud risks. (Philip Dulian/picture alliance via Getty Images)
7 steps you can take to stay safe after the Illinois DHS breach
If you received a notification from Illinois DHS, or if you’ve ever interacted with DHS programs, these steps can help reduce your risk.
1) Enroll in identity theft protection if it’s offered
If DHS provides free identity monitoring or credit protection, sign up. These services can alert you to suspicious activity involving your Social Security number or credit file before the damage spreads. Beyond basic monitoring, full identity theft services can help with recovery, paperwork and financial reimbursement if fraud occurs. This can be especially useful after large-scale government breaches.
Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
2) Use a password manager immediately
A password manager helps you create and store strong, unique passwords for every account. If your personal data is leaked, attackers often try the same credentials across multiple services. Unique passwords stop one breach from turning into many.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
3) Run strong antivirus software on your devices
Strong antivirus tools do more than scan files. They monitor suspicious behavior, phishing attempts and malicious links that often follow large data breaches. This matters because breach victims are frequently targeted with follow-up scams.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
4) Place a fraud alert or credit freeze on your credit file
A fraud alert tells lenders to verify your identity before opening new accounts. A credit freeze goes further by blocking new credit entirely unless you lift it. If Social Security numbers were exposed, a freeze is often the safest option.
5) Use a personal data removal service
Once your information leaks, it often spreads to data broker sites that sell personal details. Personal data removal services work to request takedowns and reduce how much of your information is publicly available. While they can’t erase everything, they significantly lower your exposure.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
6) Watch for phishing and impersonation scams
After breaches involving government agencies, scammers often pretend to be state officials, benefits offices, or support hotlines. Don’t click links or share information unless you independently verify the source through official websites or phone numbers.
7) Review your credit reports regularly
You’re entitled to free credit reports from major credit bureaus. Check them for unfamiliar accounts, inquiries or address changes. Early detection makes identity theft far easier to contain.
COVENANT HEALTH DATA BREACH AFFECTS NEARLY 500,000 PATIENTS
State officials say the breach involved Medicaid, Medicare Savings Program and rehabilitation services records spanning multiple years. (Silas Stein/picture alliance via Getty Images)
Kurt’s key takeaway
Even government agencies are not immune to large-scale security failures. When nearly 700,000 residents are affected, the impact goes far beyond a single system or department. While DHS works through its investigation, protecting your identity now depends largely on the steps you take next. Acting early, layering protections and staying vigilant can make the difference between a breach being an inconvenience or a long-term nightmare.
Do you trust state agencies to protect your personal data? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Roland’s Go:Mixer Studio turns your phone into a mobile music studio
Roland now offers a more capable audio mixer for phones and tablets with the launch of the Go:Mixer Studio. The Go:Mixer audio interface lineup has always been a bit limited, better suited for scrappy live streams and capturing quick demos on their phones than professional recording. The Go:Mixer Studio is an attempt to actually reach that lofty goal, with more inputs and outputs, built-in effects, and up to 24-bit / 192kHz audio. There’s even an iOS app that allows you to capture video and multitrack audio simultaneously.
Streaming and social video are still the major use cases here. The Go:Mixer Studio can even be mounted on a mic stand so you can keep it in easy reach during a live session. The screen and knobs allow you to control all the parameters on the Go:Mixer Studio directly, but there’s also a desktop app for Windows and MacOS that gives you complete control of the mixer remotely.
There’s plenty of connectivity, including two XLR inputs on the back with phantom power, a 1/4-inch instrument input for directly connecting a guitar or bass, stereo 1/4-inch line-in jacks, and an aux input. There’s also 1/8-inch TRS MIDI in and out, two headphone jacks, and stereo line outs for connecting to studio monitors. Each audio input has a dedicated EQ and compressor on the channel. The XLR and instrument ins also have reverb available.
The Go:Mixer Studio is available now for $299.
-
Montana1 week agoService door of Crans-Montana bar where 40 died in fire was locked from inside, owner says
-
Virginia1 week agoVirginia Tech gains commitment from ACC transfer QB
-
Minnesota1 week agoICE arrests in Minnesota surge include numerous convicted child rapists, killers
-
Detroit, MI6 days agoSchool Closings: List of closures across metro Detroit
-
Lifestyle6 days agoJulio Iglesias accused of sexual assault as Spanish prosecutors study the allegations
-
Oklahoma1 week agoMissing 12-year-old Oklahoma boy found safe
-
Education1 week agoVideo: Violence at a Minneapolis School Hours After ICE Shooting
-
Oregon1 week agoDan Lanning Gives Oregon Ducks Fans Reason to Believe