Connect with us

Technology

How to protect a loved one’s identity after death

Published

on

How to protect a loved one’s identity after death

NEWYou can now listen to Fox News articles!

When someone you love dies, the to-do list can feel endless. There are legal steps, financial paperwork and emotional weight all happening at once. What many families do not realize is that identity protection rarely makes those lists, even though it should.

Scammers actively target the identities of people who have died. They rely on delays, data gaps and the assumption that someone else is handling it. Janet from Indiana recently reached out with a question many families quietly worry about but rarely ask.

My husband just passed away in December. There are lists upon lists of things to do to wrap up his estate, but nothing that tells me how to lock down his identity now that he’s gone so that fraudsters cannot use it. Maybe our government is efficient enough to report to all of the credit bureaus that he is deceased, but I don’t want to bet my financial security on it. We both have our credit frozen with all three agencies, but is there more that I should do? Thank you.

— Janet in Indiana

Janet’s instincts are exactly right. The system often does not work as cleanly as people expect.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

MICROSOFT CROSSES PRIVACY LINE FEW EXPECTED

Scammers often look for recently deceased names because they know systems do not update instantly and families are overwhelmed.   (Kurt “CyberGuy” Knutsson)

What the government and credit bureaus do and don’t do

When someone dies, Social Security is usually notified by the funeral home. That step helps, but it does not automatically secure a person’s financial identity.

Here is what often surprises families:

Advertisement
  • Credit bureaus are not synchronized in real time
  • A death notice does not instantly stop fraud attempts
  • Scammers specifically target recently deceased individuals
  • Gaps between systems create opportunities for misuse

In short, relying on automation alone leaves room for problems.

AI DEEPFAKE ROMANCE SCAM STEALS WOMAN’S HOME AND LIFE SAVINGS

Credit freezes and alerts help, but they do not stop every attempt to misuse personal information after a death.  (Kurt “CyberGuy” Knutsson)

What you’ve already done right

Before adding more steps, it matters to acknowledge what Janet already did correctly.

  • Credit freezes with all three bureaus
  • Early awareness of identity risks
  • Taking action before fraud appears

When speed matters, credit locks — different from freezes — give you instant on/off control. That combination puts someone well ahead of most families.

Steps to protect a loved one’s identity after death

Once the immediate paperwork is underway, these practical steps help close the gaps scammers look for. None of them is super complicated, but together they create a much stronger layer of protection.

1) Add a deceased flag to credit files

Even with a credit freeze in place, this step adds another layer of protection that lenders see immediately.

Advertisement

Contact Equifax, Experian and TransUnion and ask them to mark the credit file as deceased. Each bureau may request:

A copy of the death certificate

  • Proof that you are the surviving spouse or executor

Once the flag is added, fraudulent applications become much harder to process because lenders are alerted upfront. A credit lock provides the same blocking effect, but with real-time control; this can matter when you’re managing a deceased estate or responding quickly to lender requests.

2) Monitor identity activity while you manage everything else

This is where many checklists fall short. Credit freezes and deceased flags help, but identity misuse can still surface in other ways.

Fraud attempts may appear as:

  • Account takeovers
  • Unauthorized credit inquiries
  • Use of personal data outside traditional credit

That is why ongoing monitoring still matters.

Why identity theft protection helps at this stage

Advertisement

Identity theft protection focuses on identity protection rather than just credit scores, which makes it especially useful after a loss.

  • Monitors for misuse tied to your loved one’s information
  • Sends alerts if something suspicious appears
  • Includes fraud support if action is needed
  • Reduces the burden of constant manual checks

One of the best parts of my pick for top identity theft service is its all-in-one approach to safeguarding your personal and financial life. It includes identity theft insurance of up to $1 million per adult to cover eligible losses and legal fees, plus 24/7 U.S.-based fraud resolution support with dedicated case managers ready to help restore your identity fast. It also combines three-bureau credit monitoring with an instant credit lock that lets you quickly lock down your Experian file right from the app.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

3) Secure sensitive documents during estate administration

Estate administration often requires sharing paperwork, which is where identity leaks can happen.

Lock down and limit access to:

  • Death certificate copies
  • Social Security numbers
  • Old tax returns
  • Insurance and pension records

Only share what is required and keep track of where documents go.

MILLIONS OF AI CHAT MESSAGES EXPOSED IN APP DATA LEAK
 

Advertisement

A man types on a laptop. (Kurt “CyberGuy” Knutsson)

4) Watch mail and phone calls for warning signs

Small signals often reveal fraud attempts early.

Pay close attention to:

  • Bills or collection notices in their name
  • Credit card or loan offers
  • Bank or government letters you did not expect
  • Calls asking to verify personal information

If something feels off, pause before responding and verify the source independently.

Kurt’s key takeaways

Protecting a loved one’s identity after death is one more responsibility no one prepares you for. It is not about mistrusting the system. It is about protecting yourself during a time when you are already carrying enough. Janet’s question reflects what many families experience quietly. Identity protection does not end when life does, and scammers know that grief creates gaps. Taking a few extra steps now can spare you months or even years of stress later. You are not being overly cautious. You are being careful at a moment when the system does not always move fast enough to keep up with real life.

If you have handled an estate or are planning ahead, have you taken steps to protect a loved one’s identity after death, or is this something you are just learning about now? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.  

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

How scammers target grieving victims through online games

Published

on

How scammers target grieving victims through online games

NEWYou can now listen to Fox News articles!

For many people, games like Words With Friends are a relaxing way to pass the time. You play a few rounds, chat with opponents and enjoy a little mental exercise. But scammers have quietly turned these casual games into hunting grounds.

They look for players who appear friendly, are older, or are recently widowed. Then they start a conversation. At first, it feels harmless. A compliment. A friendly message. A question about where you live.

Weeks later, the conversation often shifts to money. Angela from Lake Mary, MN, recently wrote to us about a situation that has her entire family worried.

“My sister, who lost her Doctor husband of 56 years 1.5 years ago, is communicating with a man she met on an internet game, “Words with Friends”. She is buying him gift cards and giving him the number so he can cash them. My nephews took her to their local police dept and they told her it’s a scam! Dangerous and to STOP. She doesn’t believe anyone!!! Is there a way to find out where these emails and texts are coming from??? We are very concerned! Hope you have some advice.” Angela, Lake Mary, MN

Advertisement

Angela’s situation is heartbreaking. Sadly, it is also very common. Authorities consider these romance scams. They cost victims billions each year. According to the Federal Trade Commission, romance scams remain one of the most expensive fraud categories reported by consumers.

NEW FBI WARNING REVEALS PHISHING ATTACKS HITTING PRIVATE CHATS

Scammers are using casual word games like Words With Friends to target older and grieving players, often turning friendly chats into costly gift card fraud. (Anastasiia Havrysh/Getty Images)

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.

Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

How the Words With Friends scam usually begins

Scammers often start inside casual apps where conversation feels natural. Games like Words With Friends allow players to chat during matches. That simple feature creates the perfect entry point for criminals.

Advertisement

The pattern often follows the same steps. First, the scammer begins a friendly conversation during a game. Next, they ask to move the conversation to email, text or a messaging app. Then they begin building emotional trust. Many claim to be widowed, traveling for work or working overseas.

Eventually, a crisis appears. They claim they need help paying a bill, fixing a problem or buying supplies. Finally, they ask for money through gift cards. Once the gift card numbers are sent, the money is usually gone.

Why gift cards are a major warning sign

Gift cards are one of the biggest red flags in scams. Criminals prefer them because they are fast and difficult to trace. Once someone shares the numbers on the back of the card, the scammer can redeem the balance immediately.

There is almost no way to recover the money after that. Legitimate people do not ask strangers or online acquaintances for gift cards. If someone you met online asks for them, treat it as a serious warning sign.

Can you find where the emails or texts are coming from?

Angela asked whether it is possible to trace the messages. Sometimes it is. Often it is difficult. Scammers work hard to hide their identity and location.

Advertisement

They often use:

  • VoIP numbers such as Google Voice
  • Email accounts created specifically for scams
  • VPN services that hide their true location

Because of this, a message may appear to come from the United States even if the scammer is overseas. Still, there are a few steps that can sometimes uncover clues.

Check the full email headers for clues

If the communication is happening by email, the full email header may reveal the route the message traveled. Headers sometimes contain the originating IP address. That address may show the country where the email began its journey.

Free tools such as Google’s Messageheader analyzer, MXToolbox and Microsoft’s Message Header Analyzer can break down email headers and show the path a message traveled across mail servers. 

While this information will not usually reveal the scammer’s true identity, it can sometimes indicate the network or country where the email originated. 

APPLE PAY TEXT SCAM ALMOST COST HER $15,000

Advertisement

Romance scammers are moving from dating apps to online games, where casual conversation can quickly turn into requests for gift cards and money. (Jeffrey Greenberg/Universal Images Group via Getty Images)

Reverse search the photos

Romance scammers almost always steal photos from real people. Those photos often come from social media profiles or professional websites. You can upload the images to reverse search tools such as Google Images.

If the same photo appears under multiple names or accounts, that is strong evidence of a scam. Showing that proof sometimes helps victims reconsider what is happening.

Search the phone number or username

Another simple step is searching for the contact information online. Enter the phone number, email address or username along with words like scam or romance scam.

Many scammers reuse the same identity across multiple victims. In some cases, other people have already reported the same name or number. Finding those reports can help reveal the pattern.

Advertisement

Report the account inside the game

If the conversation began on Words With Friends, the account can be reported directly through the game. Companies investigate reports and often remove accounts involved in fraud.

That action will not always stop the scammer completely. However, it can prevent them from targeting additional players.

The hardest part of these scams

The emotional connection can be stronger than the evidence. Scammers spend weeks building trust. They learn about the victim’s life, their losses and their fears. Then they present themselves as someone who understands.

For someone who is grieving or lonely, that connection can feel very real. Experts often recommend approaching the situation carefully.

Avoid accusations or heated arguments. Instead, focus on protecting finances and calmly presenting evidence. 

Advertisement

Family members may also help by monitoring financial activity or encouraging a pause before sending money.

GOOGLE SEARCH LED TO A COSTLY SCAM CALL

Experts warn that scammers often build trust for weeks inside games and messaging apps before inventing a crisis and asking victims to send gift cards. (Suzanne Kreiter/The Boston Globe via Getty Images)

How to stay safe from Words With Friends and romance scams

Romance scams continue to grow. A few practical steps can help reduce the risk.

1) Be cautious with strangers in online games

Friendly chat inside games can easily become manipulation. Be careful when strangers try to move the conversation elsewhere.

Advertisement

2) Never send gift cards to someone you met online

Gift cards are one of the most common tools used in scams. Treat any request for them as a warning sign.

3) Reverse search profile photos

Running a quick image search can reveal stolen photos used by scammers. 

4) Talk to family before sending money

A second opinion can stop a scam before it becomes expensive. 

5) Report scams to authorities

If you suspect fraud, report it to the Federal Trade Commission at https://reportfraud.ftc.gov.

Reports help investigators track organized criminal networks.

Advertisement

6) Keep conversations inside the game platform

Scammers almost always try to move the conversation to text, email or messaging apps. Staying inside the game platform makes it easier to report suspicious behavior.

7) Monitor credit and financial accounts

Some scammers eventually ask victims for personal details such as bank information or identification documents. Monitoring your credit reports and financial accounts can help detect suspicious activity early. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.

8) Reduce how much personal information appears online

Scammers often research potential victims through people-search websites and public records. Limiting the personal details that appear online can make it harder for criminals to target you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

9) Watch for sudden emergencies or travel stories

Romance scammers often claim they are working overseas, stuck on an oil rig or deployed in the military. These stories are designed to explain why they cannot meet in person.  

Kurt’s key takeaways

Angela’s story shows how easily these scams can begin. They often start in places that feel harmless. A simple word game. A friendly chat. A conversation that slowly becomes personal. By the time money enters the picture, the emotional bond may already feel strong. That is why families must focus on patience and protection. Helping someone step back from a scam can take time, but support and evidence can make a difference.

Advertisement

If a friendly opponent in a simple word game started messaging you every day, would you recognize the moment when the conversation turns into a scam? Let us know by writing to us at Cyberguy.com.

 

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Continue Reading

Technology

A giant cell tower is going to space this weekend

Published

on

A giant cell tower is going to space this weekend

This weekend’s scheduled Blue Origin rocket launch is rather momentous. Success would signal an end to SpaceX’s monopoly on reusable orbital launch vehicles, and set up a three-way race to make that “No Service” indicator on your phone disappear forever.

On Sunday morning, Jeff Bezos’ massive New Glenn rocket is scheduled to launch with the first-stage booster that launched and landed on the program’s second mission last November. It’s a critical test, because cost-effective booster reuse is what’s made SpaceX’s Falcon 9 so dominate.

Amazon desperately needs a reusable rocket of its own to accelerate its Leo launches. Without one, it’s only been able to launch 241 Leo satellites, putting it well behind schedule. In that same 12-month time period, SpaceX’s Falcon 9 rocket was able to deploy over 1,500 satellites to its Starlink constellation.

Sunday’s mission will carry AST SpaceMobile’s BlueBird 7 satellite to low Earth orbit. Instead of blanketing the region with thousands of small satellites like Amazon and SpaceX, AST’s plan is to deploy fewer satellites that are much more powerful. Bluebird 7 features a massive 2,400-square-foot phased-array antenna, making it the largest commercial communications array ever deployed in low Earth orbit. It’s essentially a cell tower in space, and will be the second of the company’s “Block 2” next-generation satellites to launch.

The BlueBird 7 is designed to provide 4G and 5G broadband, at speeds exceeding 120 Mbps, to the phones we already carry. AST plans to have 45 to 60 satellites launched by the end of 2026. When AST lights up its service sometime this year, it will be in direct competition with Starlink’s direct-to-cell service, already operating with T-Mobile in the US, and Globalstar, the satellite network snapped up by Amazon that keeps iPhones and Apple Watches communicating in dead zones.

Advertisement
Continue Reading

Technology

New FBI warning reveals phishing attacks hitting private chats

Published

on

New FBI warning reveals phishing attacks hitting private chats

NEWYou can now listen to Fox News articles!

You probably think your messages are safe. After all, apps like WhatsApp, Signal and Telegram promote strong encryption.

Advertisement

But a new warning from the Cybersecurity and Infrastructure Security Agency and the Federal Bureau of Investigation shows that attackers do not need to break encryption at all.

Instead, they are going after you.

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

FBI WARNS ABOUT FOREIGN APPS AND YOUR DATA
 

A new federal advisory says phishing campaigns tied to Russian intelligence are going after messaging app users instead of trying to break encryption. (MStudioImages/Getty Images)

What the FBI and CISA just revealed

According to the joint advisory, cyber actors tied to Russian intelligence are running large-scale phishing campaigns targeting messaging apps.

Advertisement

These attacks are not random. They have focused on high-value targets like government officials, military personnel and journalists. However, the tactics can easily spread to everyday users.

Here is the key takeaway: Hackers are not cracking the apps themselves. They are tricking people into giving up access. 

How these messaging app attacks actually work

This is where it gets interesting and a bit unsettling. Instead of breaking encryption, attackers use phishing to gain control of individual accounts. Once inside, they can:

  • Read private conversations
  • Access contact lists
  • Send messages as if they were you
  • Launch new scams targeting your contacts

It becomes a chain reaction. One compromised account can quickly lead to many more. In some cases, attackers impersonate trusted contacts. That makes the scam feel real and urgent.

Why encryption is not enough anymore

Encryption still matters. It protects messages as they travel between devices. But here is the problem. If someone logs into your account, they see everything just like you do.

That means even the most secure app cannot protect you if your login gets compromised. This is a shift in how cyberattacks work. The weakest link is no longer the technology. It is human behavior.

Advertisement

AI IS NOW POWERING CYBERATTACKS, MICROSOFT WARNS
 

The FBI and CISA are warning that attackers are targeting users of encrypted messaging apps by tricking them into handing over account access. (BackyardProduction/Getty Images)

Who is at risk from messaging app phishing attacks

While the advisory highlights high-profile targets, the tactics are not limited to them.

If you use messaging apps for:

  • Personal conversations
  • Work communication
  • Sharing sensitive information

You are a potential target. Phishing works because it relies on simple mistakes. A quick tap on the wrong link is often all it takes. 

What this means for you

This warning highlights a bigger trend. Cyberattacks are becoming more personal. Instead of attacking systems, hackers are targeting people directly. That makes awareness your strongest defense. The more you understand how these scams work, the harder it becomes for attackers to succeed.

Advertisement

Ways to stay safe from messaging app phishing attacks

You do not need to be a cybersecurity expert to protect yourself. You just need to slow things down and follow a few smart habits.

1) Be skeptical of unexpected messages

If a message feels urgent or out of place, pause. Even if it looks like it came from someone you know.

2) Never click suspicious links

Avoid links sent through messages unless you can verify them independently. Strong antivirus software can help detect suspicious behavior after a compromise. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

3) Turn on two-factor authentication

Two-factor authentication (2FA) adds a second layer of protection even if your password gets exposed.

TECH GIANTS UNITE TO FIGHT ONLINE SCAMS
 

Advertisement

Officials say hackers can read messages, access contacts and impersonate users once they gain control of a messaging app account. (FreshSplash/Getty Images)

4) Watch for login alerts

Many apps notify you when a new device signs in. Do not ignore these warnings.

5) Verify requests in another way

If a contact asks for something unusual, call them or confirm through another channel.

6) Use a data removal service

Limit how much of your personal information is available online. Data removal services work to delete your data from broker sites, making it harder for scammers to target you with convincing phishing messages. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

7) Keep your device and apps updated

Install updates regularly. Security patches fix vulnerabilities that attackers can exploit after gaining access.

Advertisement

Kurt’s key takeaways

Messaging apps feel private. They feel secure. That sense of comfort is exactly what attackers are counting on. The technology is still strong. The real question is whether your habits are keeping up. So the next time a message pops up that feels slightly off, trust that instinct and take a second look.

Have you ever received a suspicious message that made you stop and question if it was real? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Trending