Technology
Retirees lose millions to fake holiday charities as scammers exploit seasonal generosity
NEWYou can now listen to Fox News articles!
The holidays are supposed to be a season of generosity, family and giving back. For many retirees, October through December is the time to support causes close to their hearts, whether it’s helping veterans, feeding families or donating to disaster relief. But there’s a darker side to this generosity. Scammers know that retirees are among the most generous members of our communities, and they exploit that kindness to line their own pockets.
Millions of dollars are stolen through fake “charities” that pop up just before the holidays. Their calls, letters and emails look legitimate, but the money never reaches those in need. Instead, it funds criminals who are ready to strike again.
Here’s what every retiree (and their loved ones) should know about holiday charity scams and how to protect their money, identity and peace of mind.
HOW RETIREES CAN STOP FAKE DEBT COLLECTOR SCAMS
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Scammers mimic real charities to pressure retirees into quick donations. (Kurt “CyberGuy” Knutsson)
Why retirees are prime targets for fake charities
Retirees often give more generously than other groups. Scammers know this, and they know how to tailor their pitch.
- Emotional appeals: Fraudsters will mention children, veterans or natural disaster victims to tug at heartstrings.
- Polite persistence: Retirees tend to answer calls and engage longer on the phone, which scammers see as an opportunity.
- Data exposure: Your name, age, phone number and even donation history can already be found online through data brokers. That means scammers don’t need to guess; they target you because they know you’ve donated before.
When you combine generosity with publicly available data, scammers see retirees as the “perfect donors.”
HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA
Fake charity red flags
How do you know if a charity request is real or just a scam dressed up for the holidays? Look for these warning signs:
- Pressure to act fast: If a caller insists you donate “right now” or tries to guilt you into giving before you hang up, it’s likely a scam. Real charities welcome donations anytime.
- No details about how money is used: Authentic charities can explain where funds go. Scammers use vague promises like “helping the needy” without specifics.
- Untraceable payment methods: Requests for gift cards, wire transfers or peer-to-peer app transfers (like Venmo or Zelle) are instant red flags.
- Lookalike names: Fraudsters often invent names that sound similar to well-known charities, like “Veterans Hope Relief” or “Children’s Aid International.”
- Caller ID tricks: Scammers can spoof numbers to make it look like they’re calling from a local area code or even a real charity office.
How to safely check a charity before donating
Here’s how to protect yourself while still supporting the causes that matter to you:
- Research the charity’s name: Before donating, search it on sites like Charity Navigator or the Better Business Bureau’s Wise Giving Alliance at give.org/. If it doesn’t appear there, that’s a red flag.
- Ask for written information: Real organizations will happily mail or email details about their mission, budgets and how donations are used.
- Verify tax-exempt status: Use the IRS Tax-Exempt Organization Search at Irs.gov/charities-and-nonprofits to confirm the charity is legitimate.
- Check how much goes to the cause: Some charities are real but inefficient, spending more on salaries than programs. Make sure your donation actually helps.
REMOVE YOUR DATA TO PROTECT YOUR RETIREMENT FROM SCAMMERS
Protecting your payment details
Even if the charity itself is real, you need to protect how you give:
- Use a credit card rather than a debit card because credit cards offer stronger fraud protection.
- Never give payment info over the phone if you didn’t initiate the call.
- Donate through the charity’s official website instead of clicking links in unsolicited emails.
- Keep records of your donations for tax purposes and to spot anything suspicious later.
The elderly must stay vigilant as holiday charity scams target older donors. (iStock)
Why removing your data online reduces charity scam calls
Here’s something most people don’t realize: many charity scams start with data brokers. These companies collect your personal details, such as age, phone number, donation history and even religious or political leanings, and sell them to anyone who asks. That means fraudsters can buy a ready-made list of “generous retirees who donate to veterans’ causes” and start calling immediately. The more information out there about you, the more personalized and convincing scam calls become. That’s why removing your data from broker sites is one of the most powerful defenses available to you.
The easy way to do it
Manually contacting hundreds of data brokers is a never-ending task. Each one has its own forms, emails and hoops to jump through, and many will re-add you months later. That’s where a data removal service comes in. They automatically reach out to data brokers on your behalf, demand the removal of your personal info and keep following up so it doesn’t creep back online.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
HOW SCAMMERS EXPLOIT YOUR DATA FOR ‘PRE-APPROVED’ RETIREMENT SCAMS
Protect your personal information by donating only through verified official websites. (Kurt “CyberGuy” Knutsson)
Kurt’s key takeaways
The holidays should be about joy, generosity and giving back, not about lining the pockets of fraudsters. By spotting the red flags of fake charities, double-checking where your money goes and removing your personal information from online databases, you can keep your donations safe and make sure they reach the people who truly need them. Remember: protecting your generosity is just as important as sharing it.
Have you ever been contacted by a fake charity during the holidays? What tipped you off? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Fired Rockstar employees’ plea for interim pay denied
A UK employment tribunal rejected a request from fired Rockstar Games employees to receive interim pay while waiting for a full hearing about their dismissal, according to Bloomberg and IGN. After Rockstar fired 34 employees last year — 31 from the UK and three from Canada — the Independent Workers’ Union of Great Britain (IWGB) accused the company of “union busting.” Rockstar claims that the fired employees were leaking company information in a Discord channel.
The hearing took place over two days last week. “Despite being refused interim relief today, we’ve come out of last week’s hearing more confident than ever that a full and substantive tribunal will find Rockstar’s calculated attempt to crush a union to be not only unjust but unlawful,” IWGB president Alex Marshall says in a statement. “The fact that we were granted this hearing speaks to the strength of our case and, over the course of the two-day hearing, Rockstar consistently failed to back up claims made in the press or to refute that they acted unfairly, maliciously, and in breach of their own procedures.”
“We regret that we were put in a position where dismissals were necessary, but we stand by our course of action as supported by the outcome of this hearing,” a Rockstar Games spokesperson says in statements to Bloomberg and IGN. Rockstar and owner Take-Two didn’t immediately reply to a request for comment.
Rockstar is working on Grand Theft Auto VI, which was recently delayed from a planned May launch to November 19th.
Technology
Why your Android TV box may secretly be a part of a botnet
NEWYou can now listen to Fox News articles!
Android TV streaming boxes that promise “everything for one price” are everywhere right now.
You’ll see them on big retail sites, in influencer videos, and even recommended by friends who swear they’ve cut the cord for good. And to be fair, they look irresistible on paper, offering thousands of channels for a one-time payment. But security researchers are warning that some of these boxes may come with a hidden cost.
In several cases, devices sold as simple media streamers appear to quietly turn your home internet connection into part of larger networks used for shady online activity. And many buyers have no idea it’s happening.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE
Android TV streaming boxes promising unlimited channels for a one-time fee may quietly turn home internet connections into proxy networks, according to security researchers. (Photo By Paul Chinn/The San Francisco Chronicle via Getty Images)
What’s inside these streaming boxes
According to an investigation by Krebs on Security, media streaming devices don’t behave like ordinary media streamers once they’re connected to your network. Researchers closely examine SuperBox, which is an Android-based streaming box sold through third-party sellers on major retail platforms. On paper, SuperBox markets itself as just hardware. The company claims it doesn’t pre-install pirated apps and insists users are responsible for what they install. That sounds reassuring until you look at how the device actually works.
To unlock the thousands of channels SuperBox advertises, you must first remove Google’s official app ecosystem and replace it with an unofficial app store. That step alone should raise eyebrows. Once those custom apps are installed, the device doesn’t just stream video but also begins routing internet traffic through third-party proxy networks.
What this means is that your home internet connection may be used to relay traffic for other people. That traffic can include ad fraud, credential stuffing attempts and large-scale web scraping.
During testing by Censys, a cyber intelligence company that tracks internet-connected devices, SuperBox models immediately contacted servers tied to Tencent’s QQ messaging service, run by Tencent, as well as a residential proxy service called Grass.
Grass describes itself as an opt-in network that lets you earn rewards by sharing unused internet bandwidth. This suggests that SuperBox devices may be using SDKs or tooling that hijack bandwidth without clear user consent, effectively turning the box into a node inside a proxy network.
Why SuperBox activity resembles botnet behavior
In simple terms, a botnet is a large group of compromised devices that work together to route traffic or perform online tasks without the owners realizing it.
Researchers discovered SuperBox devices contained advanced networking and remote access tools that have no business being on a streaming box. These included utilities like Tcpdump and Netcat, which are commonly used for network monitoring and traffic interception.
The devices performed DNS hijacking and ARP poisoning on local networks, techniques used to redirect traffic and impersonate other devices on the same network. Some models even contained directories labeled “secondstage,” suggesting additional payloads or functionality beyond streaming.
SuperBox is just one brand in a crowded market of no-name Android streaming devices. Many of them promise free content and quick setup, but often come preloaded with malware or require unofficial app stores that expose users to serious risk.
In July 2025, Google filed a lawsuit against operators behind what it called the BADBOX 2.0 botnet, a network of more than ten million compromised Android devices. These devices were used for advertising fraud and proxy services, and many were infected before consumers even bought them.
Around the same time, the Feds warned that compromised streaming and IoT devices were being used to gain unauthorized access to home networks and funnel traffic into criminal proxy services.
We reached out to SuperBox for comment but did not receive a response before our deadline.
8 steps you can take to protect yourself
If you already own one of these streaming boxes or are thinking about buying one, these steps can help reduce your risk significantly.
1) Avoid devices that require unofficial app stores
If a streaming box asks you to remove Google Play or install apps from an unknown marketplace, stop right there. This bypasses Android’s built-in security checks and opens the door to malicious software. Legitimate Android TV devices don’t require this.
2) Use strong antivirus software on your devices
Even if the box itself is compromised, strong antivirus software on your computers and phones can detect suspicious network behavior, malicious connections or follow-on attacks like credential stuffing. Strong antivirus software monitors behavior, not just files, which matters when malware operates quietly in the background. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
3) Put streaming devices on a separate or guest network
If your router supports it, isolate smart TVs and streaming boxes from your main network. This prevents a compromised device from seeing your laptops, phones or work systems. It’s one of the simplest ways to limit damage if something goes wrong.
4) Use a password manager
If your internet connection is being abused, stolen credentials often come next. A password manager ensures every account uses a unique password, so one leak doesn’t unlock everything. Many password managers also refuse to autofill on suspicious or fake websites, which can alert you before you make a mistake.
MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA
Investigators warn some Android-based streaming boxes route user bandwidth through third-party servers linked to ad fraud and cybercrime. (Photo Illustration by Thomas Fuller/SOPA Images/LightRocket via Getty Images)
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
5) Consider using a VPN for sensitive activity
A VPN won’t magically fix a compromised device, but it can reduce exposure by encrypting your traffic when browsing, banking or working online. This makes it harder for third parties to inspect or misuse your data if your network is being relayed.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.
6) Watch your internet usage and router activity
Unexpected spikes in bandwidth, slower speeds or strange outbound connections can be warning signs. Many routers show connected devices and traffic patterns.
If you notice suspicious traffic or behavior, unplug the streaming box immediately and perform a factory reset on your router. In some cases, the safest option is to stop using the device altogether.
Also, make sure your router firmware is up to date and that you’ve changed the default admin password. Compromised devices often try to exploit weak router settings to persist on a network.
7) Be wary of “free everything” streaming promises
Unlimited premium channels for a one-time fee usually mean you’re paying in some other way, often with your data, bandwidth or legal exposure. If a deal sounds too good to be true, it usually is.
8) Consider a data removal service
If your internet connection or accounts have been abused, your personal details may already be circulating among data brokers. A data removal service can help opt you out of people-search sites and reduce the amount of personal information criminals can exploit for follow-up scams or identity theft. While it won’t fix a compromised device, it can limit long-term exposure.
10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026
Cyber experts say certain low-cost streaming devices behave more like botnet nodes than legitimate media players once connected to home networks. (Photo by Alessandro Di Ciommo/NurPhoto via Getty Images)
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
Kurt’s key takeaway
Streaming boxes like SuperBox thrive on frustration. As subscriptions pile up, people look for shortcuts. But when a device promises everything for nothing, it’s worth asking what it’s really doing behind the scenes. Research shows that some of these boxes don’t just stream TV. They quietly turn your home network into a resource for others, sometimes for criminal activity. Cutting the cord shouldn’t mean giving up control of your internet connection. Before plugging in that “too good to be true” box, it’s worth slowing down and looking a little closer.
Would you still use a streaming box if it meant sharing your internet with strangers? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Anthropic wants you to use Claude to ‘Cowork’ in latest AI agent push
Anthropic wants to expand Claude’s AI agent capabilities and take advantage of the growing hype around Claude Code — and it’s doing it with a brand-new feature released Monday, dubbed “Claude Cowork.”
“Cowork can take on many of the same tasks that Claude Code can handle, but in a more approachable form for non-coding tasks,” Anthropic wrote in a blog post. The company is releasing it as a “research preview” so the team can learn more about how people use it and continue building accordingly. So far, Cowork is only available via Claude’s macOS app, and only for subscribers of Anthropic’s power-user tier, Claude Max, which costs $100 to $200 per month depending on usage.
Here’s how Claude Cowork works: A user gives Claude access to a folder on their computer, allowing the chatbot to read, edit, or create files. (Examples Anthropic gave included the ability fo “re-organize your downloads by sorting and renaming each file, create a new spreadsheet with a list of expenses from a pile of screenshots, or produce a first draft of a report from your scattered notes.”) Claude will provide regular updates on what it’s working on, and users can also use existing connectors to link it to external info (like Asana, Notion, PayPal, and other supported partners) or link it to Claude in Chrome for browser-related tasks.
“You don’t need to keep manually providing context or converting Claude’s outputs into the right format,” Anthropic wrote. “Nor do you have to wait for Claude to finish before offering further ideas or feedback: you can queue up tasks and let Claude work through them in parallel. It feels much less like a back-and-forth and much more like leaving messages for a coworker.”
The new feature is part of Anthropic’s (and its competitors’) bid to provide the most actually useful AI agents, both for consumers and enterprise. AI agents have come a long way from their humble beginnings as mostly-theoretically-useful tools, but there’s still much more development needed before you’ll see your non-tech-industry friends using them to complete everyday tasks.
Anthropic’s “Skills for Claude,” announced in October, was a partial precursor to Cowork. Starting in October, Claude could improve at personalized tasks and jobs, by way of “folders that include instructions, scripts, and resources that Claude can load when needed to make it smarter at specific work tasks — from working with Excel [to] following your organization’s brand guidelines,” per a release at the time. People could also build their own Skills for Claude relative to their specific jobs and tasks they needed to be completed.
As part of the announcement, Anthropic warned about the potential dangers of using Cowork and other AI agent tools, namely the fact that if instructions aren’t clear, Claude does have the ability to delete local files and take other “potentially destructive actions” — and that with prompt injection attacks, there are a range of potential safety concerns. Prompt injection attacks often involve bad actors hiding malicious text in a website that the model is referencing, which instructs the model to bypass its safeguards and do something harmful, such as hand over personal data. “Agent safety — that is, the task of securing Claude’s real-world actions — is still an active area of development in the industry,” Anthropic wrote.
Claude Max subscribers try out the new feature by clicking on “Cowork” in the sidebar of the macOS app. Other users can join the waitlist.
-
Detroit, MI1 week ago2 hospitalized after shooting on Lodge Freeway in Detroit
-
Technology7 days agoPower bank feature creep is out of control
-
Dallas, TX4 days agoAnti-ICE protest outside Dallas City Hall follows deadly shooting in Minneapolis
-
Delaware4 days agoMERR responds to dead humpback whale washed up near Bethany Beach
-
Montana3 days agoService door of Crans-Montana bar where 40 died in fire was locked from inside, owner says
-
Dallas, TX1 week agoDefensive coordinator candidates who could improve Cowboys’ brutal secondary in 2026
-
Iowa7 days agoPat McAfee praises Audi Crooks, plays hype song for Iowa State star
-
Virginia3 days agoVirginia Tech gains commitment from ACC transfer QB