Lori Schott didn’t care what it took to haul her way from her small town in Eastern Colorado to show up to a Los Angeles courtroom where Meta CEO Mark Zuckerberg is set to testify Wednesday. “I don’t care if I had to hire a pack mule to get me here, I was going to be here,” she told The Verge outside the courthouse Tuesday.
Technology
Android malware hidden in fake antivirus app
NEWYou can now listen to Fox News articles!
If you use an Android phone, this deserves your attention.
Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to spread dangerous Android malware.
At first, the threat appears harmless because it is disguised as a fake antivirus app. Then, once you install it, criminals gain direct access to your device. Because of this, the threat stands out as especially troubling. It combines two things people already trust — security apps and AI platforms.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
MALICIOUS GOOGLE CHROME EXTENSIONS HIJACK ACCOUNTS
Researchers say hackers hid Android malware inside a fake antivirus app that looked legitimate at first glance. (Kurt “CyberGuy” Knutsson)
What Hugging Face is and why it matters
For anyone unfamiliar, Hugging Face is an open platform where developers share AI, NLP and machine learning models. It is widely used by researchers and startups and has become a central hub for AI experimentation. That openness is also what attackers exploited. Because Hugging Face allows public repositories and supports many file types, criminals were able to host malicious code in plain sight.
The fake antivirus app behind the attack
The malware first appeared in an Android app called TrustBastion. On the surface, it looks like a helpful security tool. It promises virus protection, phishing defense and malware blocking. In reality, it does the opposite.
Once installed, TrustBastion immediately claims your phone is infected. It then pressures you to install an update. That update delivers the malicious code. This tactic is known as scareware. It relies on panic and urgency to push users into tapping before thinking.
FAKE ERROR POPUPS ARE SPREADING MALWARE FAST
The fake TrustBastion app mimics a legitimate Google Play update screen to trick users into installing malware. (Bitdefender)
How the malware spreads and adapts
According to Bitdefender, a global cybersecurity company, the campaign centers on a fake Android security app called TrustBastion. Victims were likely shown ads or warnings claiming their device was infected and were instructed to manually install the app.
The attackers hosted TrustBastion’s APK files directly on Hugging Face, placing them inside public datasets that appeared legitimate at first glance. Once installed, the app immediately prompted users to install a required “update,” which delivered the actual malware.
After researchers reported the malicious repository, it was taken down. However, Bitdefender observed that nearly identical repositories quickly reappeared, with small cosmetic changes but the same malicious behavior. That rapid re-creation made the campaign harder to fully shut down.
What this Android malware can actually do
This Trojan is not minor or annoying. It is invasive. Bitdefender says the malware can:
Take screenshots of your device
Show fake login screens for financial services
Capture your lock screen PIN
Once collected, that data is sent to a third-party server. From there, attackers can move quickly to drain accounts or lock you out of your own phone.
What Google says about the threat
Google says users who stick to official app stores are protected. A Google spokesperson told CyberGuy, “Based on our current detection, no apps containing this malware are found on Google Play.
“Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.
“Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play.”
BROWSER EXTENSION MALWARE INFECTED 8.8M USERS IN DARKSPECTRE ATTACK
Once installed, the malware could capture screenshots, fake login details and even your lock screen PIN. (Kurt “CyberGuy” Knutsson)
How to stay safe from Hugging Face Android malware
This threat is a reminder that small choices matter. Here is what you should do right now:
1) Stick to trusted app stores
Only download apps from reputable sources like Google Play Store or the Samsung Galaxy Store. These platforms have moderation and scanning in place.
2) Read reviews before installing
Look closely at ratings, download counts and recent comments. Fake security apps often have vague reviews or sudden rating spikes.
3) Use a data removal service
Even careful users can have personal data exposed. A data removal service helps remove your phone number, email and other details from data broker sites that criminals rely on. That reduces follow-up scams, fake security alerts and account takeover attempts.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy.
These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
4) Run Play Protect and use strong antivirus software
Scan your device regularly with Play Protect and back it up with strong antivirus software for added protection. Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it hasn’t been 100% effective at removing all known malware from Android devices.
The best way to protect yourself against malicious links that install malware and potentially access your private information is to have strong antivirus software installed on all your devices. This protection can also help you detect phishing emails and ransomware, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com
5) Avoid sideloading APK files
Avoid installing apps from websites outside the app store. These apps bypass security checks, so always verify the publisher name and URL.
6) Lock down your Google account
Your phone security depends on it. Enable two-step verification (2FA) first, then use a strong, unique password stored in a password manager to prevent account takeovers.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
7) Be cautious with permissions
Be cautious with accessibility permissions. Malware often abuses them to take control of your device.
8) Watch app updates closely
Malware can hide inside fake updates. Be cautious of urgent fixes that push you outside the app store.
Kurt’s key takeaways
This attack shows how quickly trust can be weaponized. A platform designed to advance AI research was repurposed as a delivery system for malware. A fake antivirus app became the threat it claimed to stop. Staying safe no longer means avoiding sketchy-looking apps. It means questioning even those apps that appear helpful and professional.
Have you seen something on your phone that made you question its security? Let us know your thoughts by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Mark Zuckerberg is taking the stand as social media goes on trial
Schott’s daughter Annalee died by suicide at age 18 in 2020, after struggling with body image issues that her mother says were heightened by social media. After her death, Schott found journal entries where Annalee disparaged her own looks and compared herself to other girls’ profiles. “I was so worried about what my child was putting out online, I didn’t realize what she was receiving,” Schott said.
The way that Meta and Google-owned YouTube designed their products — allegedly luring users into a nonstop loop of taps and scrolling — is at the heart of this month’s bellwether social media trial, which sets the stage for thousands of similar lawsuits. The companies have generally denied the claims. Schott and several other self-described survivor parents have made it their mission to be in the courtroom during the several-week trial in downtown LA.
“I was so worried about what my child was putting out online, I didn’t realize what she was receiving.”
Last week, the parents heard from Instagram CEO Adam Mosseri, who used his time to carve a distinction between clinical addiction to social media and what he called “problematic use.” On the stand, Mosseri testified that using Instagram “too much” is a relative thing that can vary person-to-person, and he wouldn’t use the term addiction for using social media up to 16 hours a day. Mosseri explained why Meta had modified a prior ban on image filters that altered users’ appearance, after previously discussing their potential negative mental health effects. While the plaintiff has argued Meta is motivated by profits and engagement at the expense of users’ safety, Mosseri said that the two are aligned. “In general, we should be focused on the protection of minors, but I believe protecting minors over the long run is good for business and for profit,” he said, according to CNBC.
Several parents camped out overnight in the rain to make sure that they would get spots behind Mosseri while he took the stand. One of them was Julianna Arnold, whose daughter Coco died of fentanyl poisoning at 17 after allegedly meeting a dealer on Instagram she believed had sold her Percocet. The parents wore rain ponchos, played cards, drank coffee, and told stories throughout the night. “Everyone was like, you’re crazy,” she said. “But it didn’t feel like we were crazy, because we were so determined to have survivor parents in the courtroom.”
For Schott, who also stayed overnight to see Mosseri’s testimony, the reality of being in the room quickly became overwhelming. “I really hoped in my heart that it wasn’t as bad as it was,” said Schott, who left the testimony early after hearing the Instagram CEO discuss documents about engagement, profits, and internal research about girls’ mental health. “It is that bad.”
“I want him to see my face, because my face is Anna’s face.”
On Wednesday, Zuckerberg will likely expand on Mosseri’s testimony and explain the company’s choices. While Mosseri is in charge of the product at the center of the trial, Zuckerberg’s role as founder and CEO means that the plaintiff’s lawyers will likely ask him to account for choices they allege harmed young users. Zuckerberg will likely be asked about how and why his company made various design decisions, and research it conducted on user safety. But at least as important as what Zuckerberg will say, for many, is that he’ll get to see their faces. “I’d love to look him in the eye,” Schott says. “I want him to see my face, because my face is Anna’s face.”
Zuckerberg’s testimony will likely be referenced at future trials and legislative hearings. Thousands of social media cases behind this one similarly argue that products like Instagram caused various personal injuries, and that companies should be made to pay damages and change their products to make them safer.
Arnold isn’t sure whether she’ll get one of the limited, lottery-assigned seats inside the courthouse. Either way, “I want to see a row of survivor parents in the front row. That he has to testify to our faces, to parents of kids that died because of his lack of care and lack of accountability — that’s why it’s really important that we’re here.”
Technology
Don’t ignore Apple’s urgent security update
NEWYou can now listen to Fox News articles!
If you use an iPhone, iPad, Mac, Apple Watch or Apple TV, listen up. Apple has released a major security update to fix a zero-day vulnerability, which is a security hole that hackers discover and exploit before the company has a chance to fix it.
Attackers were already using it in targeted attacks. In other words, this was not just a possibility. It was happening.
The flaw, tracked as CVE-2026-20700, affects multiple Apple operating systems. If you have delayed updates lately, this is one you should not ignore.
If you own an Android or Windows PC, this is also a good reminder to check for updates.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
APPLE PATCHES TWO ZERO-DAY FLAWS USED IN TARGETED ATTACKS
Apple’s latest security updates affect iPhone, iPad, Mac, Apple Watch and Apple TV, so now is the time to check every device you own. (iStock)
What is CVE-2026-20700 and why it matters
CVE-2026-20700 is a memory corruption vulnerability affecting:
- iOS 26.3
- iPadOS 26.3
- macOS Tahoe 26.3
- watchOS 26.3
- tvOS 26.3
- visionOS 26.3
In simple terms, this bug could allow an attacker to run arbitrary code on your device. That opens the door to spyware, hidden backdoors or silent takeovers without obvious warning signs. Apple says this vulnerability was used as part of an infection chain combined with two previously patched flaws against devices running older versions of iOS. Those earlier bugs were fixed in December 2025. Devices that skipped those updates remained exposed. This is how many real attacks unfold. Hackers chain vulnerabilities together and quietly move in.
Which devices need updating?
Here is a breakdown of the available updates:
- iOS 26.3 and iPadOS 26.3 for iPhone 11 and later, plus newer iPads
- iOS 18.7.5 and iPadOS 18.7.5 for iPhone XS, XS Max, XR and iPad 7th generation
- macOS Tahoe 26.3, Sequoia 15.7.4, Sonoma 14.8.4
- tvOS 26.3 for Apple TV HD and Apple TV 4K
- watchOS 26.3 for Apple Watch Series 6 and later
- visionOS 26.3 for Apple Vision Pro
- Safari 26.3 for supported macOS versions
If your device qualifies, update it as soon as possible.
Why this update deserves attention
Security updates can feel routine. Many of us see the notification and decide to deal with it later. This time is different. Apple confirmed the flaw was actively exploited. That means attackers already know how to use it. Running older software gives them a window of opportunity. Updating closes that window.
How to update your iPhone or iPad
Updating takes only a few minutes.
- Go to Settings
- Tap General
- Tap Software Update
- If an update appears, tap Download and Install
- Turn on Automatic Updates so you do not miss future fixes
Keep your device connected to Wi-Fi and power during the process.
APPLE WARNS MILLIONS OF IPHONES ARE EXPOSED TO ATTACK
Once you reach this screen on your iPhone, tap Update Now to install Apple’s latest security fix immediately. (Kurt “CyberGuy” Knutsson)
How to update your Mac
- Click the Apple menu in the upper left corner
- Choose System Settings or System Preferences
- Select General
- Click Software Update
- If an update appears, select Restart Now or Update Tonight
Your Mac may restart during the process. Keep it plugged in and connected to the internet until the update finishes.
Mac users will see options like Update Tonight or Restart Now, and installing this update closes a flaw already exploited in attacks. (Kurt “CyberGuy” Knutsson)
How to update Apple Watch
- Keep your Watch on its charger and near your iPhone
- Open the Watch app on your iPhone
- Tap General
- Tap Software Update
- Tap Download and Install if available
Your Watch will restart during the update.
Your Apple Watch also receives critical security fixes, so keep it on the charger and update it just like your iPhone. (Kurt “CyberGuy” Knutsson)
How to update Apple TV
- Open Settings on Apple TV
- Go to System
- Select Software Updates
- Choose Update Software
- Select Download and Install
Stay connected to power and Wi Fi until the update completes.
How to update Safari
Safari updates are included with macOS updates.
- Go to the Apple menu
- Click System Settings
- Select General
- Click Software Update
If Safari appears separately, click Update Now and restart your Mac.
How to update your Apple Vision Pro
- Put on your Vision Pro and open the Settings app.
- Select General from the sidebar.
- Tap Software Update.
- If an update appears for visionOS 26.3, choose Download and Install.
- Make sure your Vision Pro stays charged and connected to Wi-Fi until the update completes.
MALICIOUS MAC EXTENSIONS STEAL CRYPTO WALLETS AND PASSWORDS
Ways to stay safe
Installing this update is the most important step. Still, there are additional habits that strengthen your protection.
- Turn on automatic updates for every Apple device
- Restart devices regularly to clear temporary processes
- Avoid clicking unsolicited links or attachments, and use strong antivirus software. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
- Remember, Apple threat notifications will never ask for passwords or verification codes
- Be cautious when viewing HTML-formatted emails in Apple Mail
- Consider enabling Lockdown Mode if you face a higher risk
Cybercriminals rely on hesitation. They count on us assuming we will get to the update later.
Kurt’s key takeaways
Apple moved fast to fix this vulnerability, and that is reassuring. Now it is up to us to do our part. I get it. Updates interrupt your day. They force a restart. They rarely feel urgent. But here is the thing. Installing updates is still the simplest and most effective way to protect your device from active threats. A few minutes now can prevent a serious security problem later.
What is your biggest reason for delaying updates, and has it ever cost you? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Meta’s new deal with Nvidia buys up millions of AI chips
Meta has struck a multiyear deal to expand its data centers with millions of Nvidia’s Grace and Vera CPUs and Blackwell and Rubin GPUs. While Meta has long been using Nvidia’s hardware for its AI products, this deal “represents the first large-scale Nvidia Grace-only deployment,” which Nvidia says will deliver “significant performance-per-watt improvements in [Meta’s] data centers.” The deal also includes plans to add Nvidia’s next-generation Vera CPUs to Meta’s data centers in 2027.
Meta is also working on its own in-house chips for running AI models, but according to the Financial Times, it has run into “technical challenges and rollout delays” with its chip strategy. Nvidia is also dealing with concerns about depreciation and chip-back loans used to finance AI buildouts, as well as the pressure of competition. CNBC notes that Nvidia’s stock dropped four percent after a November report about Meta considering using Google’s Tensor chips for AI, and late last year, AMD announced chip arrangements with both OpenAI and Oracle.
Nvidia and Meta did not disclose how much the deal cost, but this year’s AI spending from Meta, Microsoft, Google, and Amazon is estimated to cost more than the entire Apollo space program.
-
Illinois1 week ago2026 IHSA Illinois Wrestling State Finals Schedule And Brackets – FloWrestling
-
Culture1 week agoTry This Quiz on Passionate Lines From Popular Literature
-
Science1 week agoVideo: Why Mountain Lions in California Are Threatened
-
Health7 days agoJames Van Der Beek shared colorectal cancer warning sign months before his death
-
Oklahoma15 hours agoWildfires rage in Oklahoma as thousands urged to evacuate a small city
-
Politics6 days agoCulver City, a crime haven? Bondi’s jab falls flat with locals
-
Movie Reviews7 days ago“Redux Redux”: A Mind-Blowing Multiverse Movie That Will Make You Believe in Cinema Again [Review]
-
Technology6 days agoHP ZBook Ultra G1a review: a business-class workstation that’s got game