Technology
5 myths about identity theft that put your data at risk
NEWYou can now listen to Fox News articles!
Most people think identity theft starts with a massive hack. In reality, it usually starts much more quietly, with bits of personal information you didn’t even realize were public: old addresses, family connections, phone numbers and shopping habits.
All are sitting on data broker sites that most people have never heard of. During Identity Theft Awareness Week, organized by the Federal Trade Commission, it’s a good time to clear up some dangerous myths that keep putting people at risk, especially retirees, families and anyone who thinks they’re “careful enough.”
Let’s break them down.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Myth #1: ‘I wasn’t in a data breach, so I’m safe’
FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS
Identity theft often starts quietly, with bits of personal information collected and shared long before a scam ever happens. (Kira Hofmann/picture alliance via Getty Images)
Reality: You don’t need to be in a breach to have your data exposed.
Data brokers legally collect personal information from public records, loyalty programs, apps and online purchases. Over time, they build detailed profiles that can exist for decades, even if you’ve never been hacked. Scammers often use this data as a starting point. It helps them sound legitimate, personalize messages and choose the right angle to trick you.
Actionable tips:
- Don’t assume “no breach” means “no risk”
- Avoid oversharing details on social media
- Remove your personal data from data broker sites so it can’t be reused
Myth #2: ‘Scammers don’t have enough info to impersonate me’
Reality: They usually have more than enough.
Scammers don’t need your Social Security number to cause damage. A name, address history, phone number and family connections can be enough for someone to:
This is why scams often feel unsettlingly personal.
Actionable tips:
- Be suspicious of messages that reference personal details
- Don’t confirm information just because the sender “knows” something about you
- Reduce what’s available by removing your data from broker databases
Myth #3: ‘Retirees aren’t targeted because they’re cautious’
Reality: Retirees are one of the most targeted groups.
Why? Because scammers assume:
- Stable income from pensions or benefits
- More savings
- Greater trust in official-looking messages
- Less familiarity with newer scam tactics
Many scams are designed specifically for retirees, from Medicare updates to fake government notices and investment fraud. A recent widespread scam involves fake IRS calls and the illegitimate “Tax Resolution Oversight Department” that tries to steal your money.
Actionable tips:
- Never act on urgent requests involving benefits or finances
- Verify messages by contacting organizations directly
- Encourage family discussions about scams and warning signs
- Remove publicly available data that helps scammers profile retirees
Data brokers build detailed profiles using public records, apps, purchases and loyalty programs, even if you have never been hacked. (Kurt “CyberGuy” Knutsson)
Myth #4: ‘Credit monitoring will stop identity theft’
Reality: Credit monitoring only tells you after something has gone wrong.
It doesn’t stop scammers from:
- Targeting you
- Attempting account takeovers
- Using your information in phishing or social engineering scams
Think of credit monitoring like a smoke alarm-helpful, but it doesn’t prevent the fire.
Actionable tips:
- Use credit monitoring as a backup, not your main defense
- Lock down accounts with strong passwords and two-factor authentication
- Reduce exposure by removing your data before it’s misused
Myth #5: “There’s nothing I can do about data brokers”
Reality: You can take control, but doing it manually is time-consuming and frustrating.
Most data broker sites allow opt-outs, but each one has a different process. Some require forms. Others need ID verification. And many re-add your data months later. That’s why I recommend a data removal service. These services contact hundreds of data brokers on your behalf, request the removal of your personal information and keep monitoring them so it doesn’t quietly reappear. For families and retirees, this matters even more because once scammers connect relatives through broker profiles, multiple people can become targets.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS
Why identity theft often starts long before you notice
Identity theft rarely begins with a dramatic moment.
It usually starts with:
- Data collected quietly over the years
- Profiles that grow more detailed with time
- Information being sold and resold without your knowledge
By the time fraud shows up on a credit report, the damage has often already been done.
What you can do during Identity Theft Awareness Week
If there’s one takeaway this week, it’s this: reducing your exposed data lowers your risk.
1) Be skeptical of unexpected messages
Do not trust surprise emails, texts or calls, even if they appear to come from a bank, retailer or government agency. Scammers often copy logos, language and phone numbers to look legitimate.
2) Verify requests on your own
If a message claims there’s a problem with an account, pause and verify it independently. Use the official website or phone number you already know, not the one provided in the message.
3) Reduce your digital footprint with a data removal service
Remove your personal information from data broker websites that collect and sell names, addresses, phone numbers and other details. A data removal service can help you do just that. Less exposed data means fewer opportunities for identity thieves. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
4) Turn on two-factor authentication
Enable two-factor authentication (2FA) wherever it’s available. Even if a criminal gets your password, 2FA adds a second barrier that can stop account takeovers.
5) Strengthen your account security
Use strong, unique passwords for important accounts and avoid reusing them across sites. A reputable password manager can securely store and generate complex passwords, making it easier to stay protected without memorizing everything.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
Scammers use this background data to sound legitimate, personalize their messages and pressure victims into acting fast. (Matt Cardy/Getty Images)
6) Use identity theft protection software
Consider identity theft protection software that monitors your personal information, alerts you to suspicious activity and helps you respond quickly if something goes wrong. Some services also assist with data broker removal and recovery support if your identity is compromised.
Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
7) Help family members stay protected
Scammers often target seniors and teens. Walk family members through these steps, help them secure accounts and encourage them to slow down before responding to urgent messages.
Kurt’s key takeaways
Identity theft isn’t about being careless; it’s about how much information is floating around without your permission. The fewer places your data lives online, the harder it is for scammers to use it against you. Taking action now won’t just protect you this week; it can reduce scams, fraud attempts and identity theft risks all year long.
Which of these myths did you believe, and what personal information do you think is already out there about you without your consent? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Anthropic essentially bans OpenClaw from Claude by making subscribers pay extra
Starting tomorrow at 12pm PT, Claude subscriptions will no longer cover usage on third-party tools like OpenClaw.
You can still use these tools with your Claude login via extra usage bundles (now available at a discount), or with a Claude API key.
We’ve been working hard to meet the increase in demand for Claude, and our subscriptions weren’t built for the usage patterns of these third-party tools. Capacity is a resource we manage thoughtfully and we are prioritizing our customers using our products and API.
Subscribers get a one-time credit equal to your monthly plan cost. If you need more, you can now buy discounted usage bundles. To request a full refund, look for a link in your email tomorrow.
We want to be intentional in managing our growth to continue to serve our customers sustainably long-term. This change is a step toward that.
Technology
NYC schools track bathroom time with digital hall passes
NEWYou can now listen to Fox News articles!
Leaving class for a quick bathroom break now comes with a timer for many students in New York City.
A digital hall pass system called SmartPass is rolling out across public schools. It replaces the old paper pass with a digital one. Students sign out on a classroom iPad. Then the system tracks how long they are gone.
On paper, it sounds efficient. In practice, it is stirring strong reactions.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
95% OF FACULTY SAY AI MAKING STUDENTS DANGEROUSLY DEPENDENT ON TECHNOLOGY FOR LEARNING: SURVEY
New York City students now use SmartPass, a digital hall pass system that tracks when they leave class, where they go and how long they are gone. (Alejandra Villa Loarca/Newsday RM via Getty Images)
How the SmartPass digital hall pass works
SmartPass logs when a student leaves class and tracks how long they are out and where they go. Teachers can view that information in real time, which gives them a live snapshot of student movement during the school day. SmartPass says the system is designed to improve safety, reduce disruptions and give staff better visibility into student movement.
The system keeps a running total of time spent outside the classroom. It can also limit how many students are allowed in the hallway at once. In some cases, it can flag or block overlapping passes between students. Schools can also restrict when passes are allowed, depending on the schedule or specific rules set by staff.
Supporters say this helps reduce disruptions and keeps students accountable. They also argue it improves safety during emergencies because staff can quickly see who is out of class. However, that is only one side of the story.
Students say SmartPass feels like surveillance
Many students are not buying the “efficiency” argument. Some say the system makes them feel rushed during basic needs. Others worry about being constantly monitored.
One student described it as uncomfortable, like someone is always watching. Another said it turns something simple into a stressful countdown.
There are also reports of strict time limits. In some cases, students say teachers set very short timers for bathroom use. That can create awkward situations fast.
And then there are loopholes. Students have figured out ways to sign out under someone else’s name. That can block another student from leaving class at all.
NEW AI COALITION TARGETS WASHINGTON, BIG TECH AS GROUP WARNS CHILD SAFETY RISKS OUTPACING SAFEGUARDS
A digital hall pass system in New York City schools is raising questions about privacy, student trust and whether tracking tools belong in everyday school life. (Melina Mara/The Washington Post via Getty Images)
SmartPass raises growing privacy concerns
Privacy advocates are raising bigger concerns. Critics say tools like SmartPass go too far.
“Hyper invasive, error-prone AI surveillance technologies have no place in school bathrooms,” said Charlotte Pope, Equal Justice Works Fellow at the NYCLU. “Third-party surveillance products, like the electronic hall passes, put students’ sensitive, personal data at the whims of for-profit corporations, unnecessarily put even more punitive discipline into students’ lives, and add more fuel to the school-to-prison pipeline. For generations, students went to the bathroom without big brother watching just fine – the difference is that now, companies are making money off it.”
The fear is not only about today. It is about what happens to that data later. School officials say the system meets strict privacy rules. They also say schools are not required to use it. Still, critics argue that once data is collected, the risk never fully disappears.
How much NYC is spending on SmartPass
There is also a financial angle. New York City reportedly spent hundreds of thousands of dollars on SmartPass contracts in recent years. That breaks down to a few thousand dollars per school.
At the same time, the city faces major budget gaps. That raises a fair question. Should schools invest in tracking tools or focus on staffing and facilities? Students are asking that question too.
Why this conversation is not going away
Technology in schools is not new. But the level of tracking is changing. What used to be a simple hall pass is now a data point. Multiply that across a school day, and you start to see a pattern forming.
Some people see that as progress. Others see it as overreach. Either way, tools like SmartPass are likely just the beginning.
TIM TEBOW URGES SUPREME COURT TO MAKE BIG TECH ‘PROTECT KIDS OVER PROFIT’ IN CSAM CASE
SmartPass is rolling out in New York City public schools, replacing paper hall passes with a digital system that logs student movement in real time. (Deb Cohn-Orbach/UCG/Universal Images Group via Getty Images)
What this means to you
Even if you are not a student in New York, this trend still matters. Digital monitoring tools are becoming part of everyday life. You can now find them in schools, workplaces and public spaces.
As a result, data collection is starting to feel normal in places where it never used to exist. Even simple systems can build detailed profiles over time. That information can reveal patterns about behavior without people realizing it.
At the same time, convenience often comes with tradeoffs. Tools that make things easier can also reduce privacy. Once these systems are in place, they rarely stay limited. They tend to expand and track more over time.
If you have kids, it is worth asking how their school collects and stores data. If you are a student, you have a right to understand what is being tracked and why it matters.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
There is a real balance to strike here. Schools want safety and structure. Students want trust and privacy. Those goals do not always line up. SmartPass sits right in the middle of that tension. It promises control and visibility. It also raises questions about how much monitoring is too much. The bigger issue may not be this one system. It is the direction things are heading.
If tracking tools become standard in schools, where should the line be drawn between safety and personal space? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
NASA did eventually solve Artemis II’s Outlook glitch
On Thursday, during Artemis II’s journey to the Moon, commander Reid Wiseman ran into a tech issue some of us back on Earth can relate to: Microsoft Outlook wasn’t working. In a conversation captured in NASA’s Artemis livestream and shared on Bluesky, Wiseman reported to Mission Control: “I also see that I have two Microsoft Outlooks and neither one of those are working.”
To take care of the issue, Mission Control had to remotely access Wiseman’s personal computing device (PCD), a Microsoft Surface Pro. During a press conference on Thursday, Artemis flight director Judd Frieling said NASA had fixed the issue, stating, “This is not uncommon. We have this on-station all the time. You know, sometimes Outlook has issues getting configured, especially when you don’t have a network that’s directly connected. And so essentially we just had to reload his files on Outlook to get it working.”
NASA uses a combination of its Near Space Network and Deep Space Network to stay in touch with Artemis II, relying on a mix of antennas around the world and satellites in orbit. Mission Control at the Johnson Space Center in Houston, Texas has to shift communications between these networks as Artemis II gets further away from Earth.
Aside from the Microsoft Surface Pro, the Artemis II crew’s gear list also includes Nikon D5 DSLR cameras, a ZCube video encoder, and handheld GoPro cameras for filming content for a Disney/National Geographic documentary. The crew was also allowed to bring their phones with them — you can even see their phones being stowed away in their spacesuit pockets in NASA’s livestream.
-
Culture1 week agoWhat Happens When We Die? This Wallace Stevens Poem Has Thoughts.
-
South-Carolina6 days agoSouth Carolina vs TCU predictions for Elite Eight game in March Madness
-
Miami, FL1 week agoJannik Sinner’s Girlfriend Laila Hasanovic Stuns in Ab-Revealing Post Amid Miami Open
-
Education1 week agoVideo: Transgender Athletes Barred From Women’s Olympic Events
-
Minneapolis, MN1 week agoBoy who shielded classmate during school shooting receives Medal of Honor
-
Vermont6 days ago
Skier dies after fall at Sugarbush Resort
-
Politics6 days agoTrump’s Ballroom Design Has Barely Been Scrutinized
-
Atlanta, GA6 days agoFetishist ‘No Kings’ protester in mask drags ‘Trump’ and ‘JD Vance’ behind her wheelchair