Technology
How to protect your privacy at hotels
NEWYou can now listen to Fox News articles!
You don’t have to be a celebrity to want hotel privacy. Many guests, like Carol from Wisconsin, wonder if hidden cameras or security lapses could affect their next trip.
The good news: most hotels value guest privacy because it’s central to their business. Still, being aware and taking a few smart steps can give you extra peace of mind during your stay.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME
The bottom line on hotel privacy: Risk is low, but awareness helps
Hotels do not place cameras in guest rooms. Surveillance usually exists only in public spaces like lobbies, elevators or hallways. Even so, it’s worth learning how to check your surroundings and spot potential issues before settling in.
Hotels stress guest privacy, yet a quick room sweep can ease concerns. (D.A. Varela/Miami Herald/Tribune News Service via Getty Images)
How to do a hotel room sweep for hidden cameras
Start by inspecting your room:
- Shine your phone’s flashlight in dark corners. Camera lenses reflect light.
- Check common hiding spots: smoke detectors, alarm clocks, USB chargers, lamps and picture frames.
- Try the fingernail mirror test: touch your fingernail to a mirror. If the reflection meets your nail without a gap, it could be two-way glass.
- Listen for faint buzzing or clicks that might come from disguised devices.
Use your smartphone to detect hidden devices in hotels
Your smartphone can help uncover suspicious devices.
- Open your camera app to spot infrared lights. Many hidden cameras emit IR that shows up on screens.
- Use scanning apps like Fing to check the Wi-Fi network for unusual device names like “IP Camera.” Remember: not all devices will appear.
High-tech tools for finding hidden cameras in hotels
For longer trips or high-security situations, dedicated devices add reassurance:
- IR lens detectors locate hidden camera reflections.
- RF (radio-frequency) scanners pick up wireless signals from covert devices.
These gadgets complement a manual sweep; they don’t replace it.
Hidden camera detector apps for iPhone and Android
If you’re worried about hidden cameras during a hotel stay, several iOS and Android apps claim to help, though their accuracy and costs vary.
iOS
- Hidden Camera Detector – Peek (Kupertino Labs)Has a clean interface and a high user rating. But some users say it only scans the Wi‑Fi network and may prompt a subscription to see results.
- Spy Camera Scanner (AI APPS SRL)Promises IR signal detection and Bluetooth scanning. Simple, but again, the full functionality is gated behind a subscription.
Android
- Hidden Camera Detector (FutureApps)Uses your phone’s magnetic sensor to alert you near electronics and also scans for infrared light. But reviews suggest the free version can feel gimmicky, especially for magnetic detection.
- Camera Detector: Hidden Spy (AppVillage Global)Offers a combo of Wi‑Fi scanning, magnetic sensor detection and metal detection, plus tips on common hiding spots. Visible complaints include relentless ads and paywalls.
5 PHONE SETTINGS TO CHANGE RIGHT NOW FOR A SAFER SMARTPHONE
Simple steps like locking doors and covering peepholes boost hotel security. (Martin Berry/UCG/Universal Images Group via Getty Images)
What to do if you find a hidden camera in your hotel
- Do not remove or tamper with the device.
- Document with photos.
- Notify hotel management immediately. Platforms like Airbnb and Vrbo ban undisclosed cameras.
- For serious concerns, contact law enforcement before contacting the property owner.
Smart security habits for every stage of your stay
From check-in to check-out, taking a few simple precautions can help protect your privacy and keep you in control.
1) Before you arrive
Call ahead and ask:
- 24/7 security: Confirm whether the hotel has round-the-clock protection.
- Guest floor access: Ask if elevators and hallways are restricted to key holders.
2) While you check in
- Incognito listing: Request to be listed as “incognito” or use an alias.
- Visitor control: Let staff know you are not expecting visitors.
3) While in your room
- Do Not Disturb: Ask the operator to block outside calls to your room line.
- Mobile phone: Use your cell phone instead of the in-room phone.
- Door security: Lock your door and use deadbolts or extra latches.
- Window privacy: Close curtains and cover the peephole with tape or a sticker.
- Sensitive transactions: Avoid banking or entering private logins on public Wi-Fi whenever possible.
- VPN protection: Use a VPN when on hotel Wi-Fi to encrypt your connection and keep browsing private.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.
Pro Tip: Install strong antivirus protection on all your devices before your trip. Use it to block malware, phishing attempts and other threats that often spread through hotel Wi-Fi.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
4) When away from your room
- Secure extra keycards: Keep any spares locked in the room safe to prevent misuse.
- Rely on hotel safes when needed: Electronic safes are generally secure, but you can also log valuables with staff for an extra layer of protection.
- Use built-in anti-theft tools for devices: Features like Find My iPhone or Find My Device (Android/Windows) help you locate or remotely wipe phones, laptops and tablets if they’re stolen.
Try additional anti-theft apps: Tools such as iAlertU for MacBooks and PreyProject.com for Android and Windows laptops can add extra protection. Some even send you a photo if someone tampers with your device.
5 DIRTIEST SPOTS IN HOTEL ROOMS: WHAT EXPERTS SAY TO DO AT CHECK-IN
Smartphones can reveal infrared signals from hidden spy devices. (Photo by: Martin Berry/UCG/Universal Images Group via Getty Images)
Kurt’s key takeaways
Your privacy matters, whether you’re staying one night or a full week. Most hotels respect guests, but technology has made it easier for bad actors to abuse trust. With these tips, apps and gadgets, you can stay in control and protect yourself.
Would you feel safer if hotels were required to disclose their guest privacy and security practices before you book? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
OpenAI’s former Sora boss is leaving
I am immensely grateful to Sam, Mark, Aditya and Jakub for fostering a research environment that allowed us to pursue ideas off-the-beaten path from the company’s mainline roadmap. It’s tempting in life to mode collapse to the most important thing, but cultivating entropy is the only way for a research lab to thrive long-term, and Sam deeply understands this. Sora was a project that could not have happened anywhere but OpenAI, and I will always deeply love this place for that.
Technology
How scammers target grieving victims through online games
NEWYou can now listen to Fox News articles!
For many people, games like Words With Friends are a relaxing way to pass the time. You play a few rounds, chat with opponents and enjoy a little mental exercise. But scammers have quietly turned these casual games into hunting grounds.
They look for players who appear friendly, are older, or are recently widowed. Then they start a conversation. At first, it feels harmless. A compliment. A friendly message. A question about where you live.
Weeks later, the conversation often shifts to money. Angela from Lake Mary, MN, recently wrote to us about a situation that has her entire family worried.
“My sister, who lost her Doctor husband of 56 years 1.5 years ago, is communicating with a man she met on an internet game, “Words with Friends”. She is buying him gift cards and giving him the number so he can cash them. My nephews took her to their local police dept and they told her it’s a scam! Dangerous and to STOP. She doesn’t believe anyone!!! Is there a way to find out where these emails and texts are coming from??? We are very concerned! Hope you have some advice.” Angela, Lake Mary, MN
Angela’s situation is heartbreaking. Sadly, it is also very common. Authorities consider these romance scams. They cost victims billions each year. According to the Federal Trade Commission, romance scams remain one of the most expensive fraud categories reported by consumers.
NEW FBI WARNING REVEALS PHISHING ATTACKS HITTING PRIVATE CHATS
Scammers are using casual word games like Words With Friends to target older and grieving players, often turning friendly chats into costly gift card fraud. (Anastasiia Havrysh/Getty Images)
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
How the Words With Friends scam usually begins
Scammers often start inside casual apps where conversation feels natural. Games like Words With Friends allow players to chat during matches. That simple feature creates the perfect entry point for criminals.
The pattern often follows the same steps. First, the scammer begins a friendly conversation during a game. Next, they ask to move the conversation to email, text or a messaging app. Then they begin building emotional trust. Many claim to be widowed, traveling for work or working overseas.
Eventually, a crisis appears. They claim they need help paying a bill, fixing a problem or buying supplies. Finally, they ask for money through gift cards. Once the gift card numbers are sent, the money is usually gone.
Why gift cards are a major warning sign
Gift cards are one of the biggest red flags in scams. Criminals prefer them because they are fast and difficult to trace. Once someone shares the numbers on the back of the card, the scammer can redeem the balance immediately.
There is almost no way to recover the money after that. Legitimate people do not ask strangers or online acquaintances for gift cards. If someone you met online asks for them, treat it as a serious warning sign.
Can you find where the emails or texts are coming from?
Angela asked whether it is possible to trace the messages. Sometimes it is. Often it is difficult. Scammers work hard to hide their identity and location.
They often use:
- VoIP numbers such as Google Voice
- Email accounts created specifically for scams
- VPN services that hide their true location
Because of this, a message may appear to come from the United States even if the scammer is overseas. Still, there are a few steps that can sometimes uncover clues.
Check the full email headers for clues
If the communication is happening by email, the full email header may reveal the route the message traveled. Headers sometimes contain the originating IP address. That address may show the country where the email began its journey.
Free tools such as Google’s Messageheader analyzer, MXToolbox and Microsoft’s Message Header Analyzer can break down email headers and show the path a message traveled across mail servers.
While this information will not usually reveal the scammer’s true identity, it can sometimes indicate the network or country where the email originated.
APPLE PAY TEXT SCAM ALMOST COST HER $15,000
Romance scammers are moving from dating apps to online games, where casual conversation can quickly turn into requests for gift cards and money. (Jeffrey Greenberg/Universal Images Group via Getty Images)
Reverse search the photos
Romance scammers almost always steal photos from real people. Those photos often come from social media profiles or professional websites. You can upload the images to reverse search tools such as Google Images.
If the same photo appears under multiple names or accounts, that is strong evidence of a scam. Showing that proof sometimes helps victims reconsider what is happening.
Search the phone number or username
Another simple step is searching for the contact information online. Enter the phone number, email address or username along with words like scam or romance scam.
Many scammers reuse the same identity across multiple victims. In some cases, other people have already reported the same name or number. Finding those reports can help reveal the pattern.
Report the account inside the game
If the conversation began on Words With Friends, the account can be reported directly through the game. Companies investigate reports and often remove accounts involved in fraud.
That action will not always stop the scammer completely. However, it can prevent them from targeting additional players.
The hardest part of these scams
The emotional connection can be stronger than the evidence. Scammers spend weeks building trust. They learn about the victim’s life, their losses and their fears. Then they present themselves as someone who understands.
For someone who is grieving or lonely, that connection can feel very real. Experts often recommend approaching the situation carefully.
Avoid accusations or heated arguments. Instead, focus on protecting finances and calmly presenting evidence.
Family members may also help by monitoring financial activity or encouraging a pause before sending money.
GOOGLE SEARCH LED TO A COSTLY SCAM CALL
Experts warn that scammers often build trust for weeks inside games and messaging apps before inventing a crisis and asking victims to send gift cards. (Suzanne Kreiter/The Boston Globe via Getty Images)
How to stay safe from Words With Friends and romance scams
Romance scams continue to grow. A few practical steps can help reduce the risk.
1) Be cautious with strangers in online games
Friendly chat inside games can easily become manipulation. Be careful when strangers try to move the conversation elsewhere.
2) Never send gift cards to someone you met online
Gift cards are one of the most common tools used in scams. Treat any request for them as a warning sign.
3) Reverse search profile photos
Running a quick image search can reveal stolen photos used by scammers.
4) Talk to family before sending money
A second opinion can stop a scam before it becomes expensive.
5) Report scams to authorities
If you suspect fraud, report it to the Federal Trade Commission at https://reportfraud.ftc.gov.
Reports help investigators track organized criminal networks.
6) Keep conversations inside the game platform
Scammers almost always try to move the conversation to text, email or messaging apps. Staying inside the game platform makes it easier to report suspicious behavior.
7) Monitor credit and financial accounts
Some scammers eventually ask victims for personal details such as bank information or identification documents. Monitoring your credit reports and financial accounts can help detect suspicious activity early. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.
8) Reduce how much personal information appears online
Scammers often research potential victims through people-search websites and public records. Limiting the personal details that appear online can make it harder for criminals to target you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
9) Watch for sudden emergencies or travel stories
Romance scammers often claim they are working overseas, stuck on an oil rig or deployed in the military. These stories are designed to explain why they cannot meet in person.
Kurt’s key takeaways
Angela’s story shows how easily these scams can begin. They often start in places that feel harmless. A simple word game. A friendly chat. A conversation that slowly becomes personal. By the time money enters the picture, the emotional bond may already feel strong. That is why families must focus on patience and protection. Helping someone step back from a scam can take time, but support and evidence can make a difference.
If a friendly opponent in a simple word game started messaging you every day, would you recognize the moment when the conversation turns into a scam? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
A giant cell tower is going to space this weekend
This weekend’s scheduled Blue Origin rocket launch is rather momentous. Success would signal an end to SpaceX’s monopoly on reusable orbital launch vehicles, and set up a three-way race to make that “No Service” indicator on your phone disappear forever.
On Sunday morning, Jeff Bezos’ massive New Glenn rocket is scheduled to launch with the first-stage booster that launched and landed on the program’s second mission last November. It’s a critical test, because cost-effective booster reuse is what’s made SpaceX’s Falcon 9 so dominate.
Amazon desperately needs a reusable rocket of its own to accelerate its Leo launches. Without one, it’s only been able to launch 241 Leo satellites, putting it well behind schedule. In that same 12-month time period, SpaceX’s Falcon 9 rocket was able to deploy over 1,500 satellites to its Starlink constellation.
Sunday’s mission will carry AST SpaceMobile’s BlueBird 7 satellite to low Earth orbit. Instead of blanketing the region with thousands of small satellites like Amazon and SpaceX, AST’s plan is to deploy fewer satellites that are much more powerful. Bluebird 7 features a massive 2,400-square-foot phased-array antenna, making it the largest commercial communications array ever deployed in low Earth orbit. It’s essentially a cell tower in space, and will be the second of the company’s “Block 2” next-generation satellites to launch.
The BlueBird 7 is designed to provide 4G and 5G broadband, at speeds exceeding 120 Mbps, to the phones we already carry. AST plans to have 45 to 60 satellites launched by the end of 2026. When AST lights up its service sometime this year, it will be in direct competition with Starlink’s direct-to-cell service, already operating with T-Mobile in the US, and Globalstar, the satellite network snapped up by Amazon that keeps iPhones and Apple Watches communicating in dead zones.
-
Ohio3 days ago‘Little Rascals’ star Bug Hall arrested in Ohio
-
Arkansas1 week agoArkansas TV meteorologist Melinda Mayo retires after nearly four decades on air
-
Austin, TX1 week agoABC Kite Fest Returns to Austin for Annual Celebration – Austin Today
-
Politics3 days agoDem fundraising giant in the hot seat as GOP lawmakers demand answers over dodged subpoena
-
Science3 days ago‘Dr. Pimple Popper’ Sandra Lee had a stroke last fall. Here’s how the TV doc is bouncing back
-
Politics6 days agoTrump blasts Spanberger ahead of Virginia meetings, says state faces tax base exodus like New York, California
-
Health1 week agoWoman discovers missing nose ring traveled to her lungs, causing month-long cough
-
Detroit, MI1 week agoByron Allen’s “Comics Unleashed” replacing Colbert’s “Late Show”