Connect with us

Technology

1 billion identity records exposed in ID verification data leak

Published

on

1 billion identity records exposed in ID verification data leak

NEWYou can now listen to Fox News articles!

Things like your name, home address, date of birth and even your Social Security number may have been sitting on the open internet. Researchers say an unprotected database tied to IDMerit, a company that claims to help businesses verify identities, exposed roughly 1 billion sensitive records across 26 countries.

In the United States alone, more than 203 million records were left unsecured. This involves the exact documents and details companies use to confirm you are really you. If criminals get that kind of information, they’d have everything they need.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

BE AWARE OF EXTORTION SCAM EMAILS CLAIMING YOUR DATA IS STOLEN

Advertisement

Researchers say an exposed database tied to IDMerit left roughly 1 billion sensitive identity records visible on the open internet. (Morteza Nikoubazl/NurPhoto via Getty Images)

What you need to know about the massive data leak

Researchers at Cybernews, a cybersecurity news and research publication, discovered an exposed MongoDB database on Nov. 11, 2025, that they believe belongs to IDMerit, a global identity verification provider that serves banks, fintech firms and other financial services companies. IDMerit uses artificial intelligence tools to help businesses perform KYC, short for Know Your Customer, which is the identity verification process required when you open financial accounts.

The database was not protected by a password. Anyone who knew where to look could access it. Inside were full names, home addresses, postal codes, dates of birth, national ID numbers, phone numbers, email addresses and gender information. Some records also included telecom-related metadata and internal flags that may have referenced past breaches.

The exposure affected people in 26 countries. The United States had the highest number of exposed records at more than 203 million. Mexico, the Philippines, Germany, Italy and France were also heavily impacted.

Researchers notified the company, and the database was secured the following day. There is currently no public evidence that criminals downloaded the data. Still, it’s worth noting that automated bots constantly scan the internet for exposed databases and can copy them within minutes.

Advertisement

YOU COULD BE SHARING YOUR SOCIAL SECURITY NUMBER WHEN YOU DON’T NEED TO

The unsecured database reportedly contained highly sensitive details including names, home addresses, dates of birth and national ID numbers. (Silas Stein/picture alliance via Getty Images)

How it happened and why it matters for you

When you open a bank account, sign up for a crypto platform or verify your identity for a financial app, you are often asked to upload a government ID and provide personal details. Companies like IDMerit process that information behind the scenes. That means this database likely contained the same details you would use to prove your identity to a bank or government agency.

For criminals, that is gold. With your full name, date of birth, national ID and phone number, scammers can attempt SIM-swap attacks. This is when someone convinces your mobile carrier to transfer your phone number to their device. Once they control your number, they can intercept security codes sent by text message and break into your bank or email accounts. They can also launch highly targeted phishing scams. Imagine receiving a call or email that includes your real home address and ID number. It would feel legitimate, and that’s exactly the point.

Because the data was neatly organized, criminals could sort it by country or other details and use automated tools to target huge numbers of people with scams.

Advertisement

We reached out to IDMerit for comment, but did not hear back before our deadline.

FIGURE DATA BREACH EXPOSES NEARLY 1M ACCOUNTS

Experts warn that data like this can help criminals launch SIM swap attacks and highly targeted phishing scams. (Kurt “CyberGuy” Knutsson)

8 ways you can protect yourself from data leaks

Before criminals have a chance to use this information against you, here are practical steps you can take right now to lock things down and reduce your risk.

1) Freeze your credit reports

Contact the major credit bureaus in your country and place a credit freeze. This prevents criminals from opening loans or credit cards in your name. Even if someone has your national ID and date of birth, lenders will not be able to access your credit file without your permission.

Advertisement

2) Stop relying on text message security codes

If your bank or email account still uses SMS codes for two-factor authentication, switch to an authenticator app instead. Text messages can be intercepted during SIM-swap attacks. An authenticator app generates codes directly on your device, making it much harder for criminals to break in.

3) Use a password manager

If attackers pair leaked identity data with passwords from older breaches, they can try to access your accounts. A password manager creates strong, unique passwords for every account, so one leak does not unlock everything else.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

4) Consider identity theft protection

Identity theft monitoring services can alert you if your personal information is used to open accounts or appears on dark web marketplaces. Early detection can mean the difference between stopping fraud quickly and discovering it months later. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com

5) Watch your mobile account closely

Log in to your mobile carrier account and enable extra security features, such as a port-out PIN if available. This adds an additional layer of protection so someone cannot easily move your phone number to another SIM card.

Advertisement

6) Run antivirus software on your devices

Good antivirus software can block malicious links, fake login pages and spyware that may be used in follow-up attacks. After a large data exposure, phishing campaigns often spike, and having protection in place can stop you from clicking into trouble. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

7) Consider a personal data removal service

Your personal information is often scattered across data broker sites and people-search databases that sell access to your details. A personal data removal service can monitor where your information appears online and work to get it taken down. This reduces the amount of data criminals can find about you in one place, making it harder for them to piece together your identity and target you with scams or fraud. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

8) Be skeptical of calls that know too much

If someone contacts you and references your address, date of birth or ID number, do not assume they are legitimate. Hang up and call the official number listed on the company’s website. Criminals use real data to make fake stories sound convincing.

Kurt’s key takeaway

This incident exposes a larger problem. Companies that handle identity verification have become critical infrastructure for the digital economy. When one of them leaves a database open, the fallout spreads across countries and millions of ordinary people who never even heard of the company. You trusted a bank or app with your ID. That bank trusted a third party. Somewhere in that chain, basic security controls failed.

Should companies that handle identity verification face automatic penalties when they expose millions of people’s most sensitive data? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved.

Technology

It’s primetime for conspiracy theorist video creators

Published

on

It’s primetime for conspiracy theorist video creators

In the days since this year’s White House Correspondents’ Dinner was cut short when shots were fired at the event, there has been a boom of conspiracy theory videos created by people who insist that the entire situation was a false flag operation. These kinds of theories are nothing new, but the way they’re spreading now is a reflection of how reaction video culture is reshaping our social media landscape. And even though the initial chaos around the shooting has started to die down, content creators are still posting about what “really” happened.

There is still much we do not know about Cole Allen, the 31-year-old suspected shooter who allegedly traveled from Los Angeles to Washington, DC, ahead of the WCHD and was staying in the same Hilton where the event was held. But that has not stopped content creators from flooding platforms like YouTube, TikTok, Instagram, and X with videos purporting to have more insightful takes on the situation than what’s being reported by the mainstream media.

None of these videos reveal anything that hasn’t already been reported out via traditional media outlets. But each of them speaks to the way that this brand of content has become a normal part of people’s media consumption habits and something that creators see as a viable way to capture attention. In the US, trust in traditional media outlets is at a historic low and more people are turning to social media to stay informed about world events. And that shift has given conspiracy-minded content creators a choice opportunity to influence the way people understand reality.

All of this is similar to what happened in 2024 when Donald Trump survived an assassination attempt while campaigning for the presidency. Then, creators rushed to capitalize on the event while also writing it off as a false flag designed to garner sympathy for the Republican nominee. That news cycle and subsequent discourse dragged on for weeks, both because it was a significant moment in an election year and because it was difficult to understand how Trump could have been shot in his ear without sustaining any visible damage afterward.

Many of the newer videos about the WHCD shooting suggest that we should look at these events as a response to the Trump administration’s propensity for spreading misinformation. And while there is no evidence to suggest that the WHCD shooting was, in fact, orchestrated with Trump’s approval, one could argue the administration is at least partially responsible for the way that this idea has gained traction across the internet.

Advertisement

As easy as it is to laugh at the constant barrage of shitposts coming out of the president’s social media accounts and other official governmental channels, they have undoubtedly had an impact on the way that the public thinks about the current administration. By sharing ugly, immature memes and AI-generated images of Trump as a Christlike figure, the White House has told people that nothing is to be taken seriously and everything can be turned into a crude joke. And at a time when all of the internet’s biggest social media platforms have begun encouraging their users to upload videos of themselves while chasing engagement, it makes sense that many would see this past weekend’s shooting as a chance to boost their profiles.

Trump has made nonsensical “jokes” a significant part of his political brand, and people are responding with very similar energy.

Continue Reading

Technology

Runway-to-Space Challenge brings spaceflight closer

Published

on

Runway-to-Space Challenge brings spaceflight closer

NEWYou can now listen to Fox News articles!

For years, getting anything into space has been slow and expensive. You prepare for months, sometimes years, and you often get one shot to run your experiment. If something does not work, you wait again. That model is starting to change.

A new U.S. competition called the Runway-to-Space Spaceplane Challenge is opening the door to a different way of doing space research. Instead of relying on traditional rocket launches, teams will be able to fly payloads on a reusable spaceplane that takes off and lands on a runway. It sounds simple, but it could reshape how innovation happens.

SPACE CAPSULE MARKS MILESTONE FOR BRINGING CARGO BACK FROM ORBIT

The Aurora spaceplane from Dawn Aerospace is designed to take off and land like an aircraft, enabling rapid turnaround between missions. (Dawn Aerospace)

Advertisement

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

How the Runway-to-Space Challenge changes space testing

The program is built around the Aurora spaceplane from Dawn Aerospace, operating out of the Infinity One Oklahoma Spaceport. This vehicle can reach the edge of space, traveling at speeds above Mach 3.5 and climbing to altitudes of about 62 miles. During each flight, payloads can experience a short window of microgravity that lasts just over two minutes.

On its own, that may sound similar to other suborbital missions. What makes this different is how often it can fly. The Aurora is designed for rapid turnaround, which means it can land, be prepared again and return to flight much faster than a traditional launch system. That shift removes one of the biggest bottlenecks in space research.

A closer look at how this spaceplane works

The Aurora spaceplane has already completed more than 60 missions, with a focus on making access to the edge of space more routine and scalable.

“Meaningful access to microgravity typically means going to orbit, which is expensive, slow, and often out of reach for early-stage ideas,” said Stefan Powell, CEO of Dawn Aerospace. “Aurora changes that by giving teams a fast, lower-cost way to access microgravity and iterate within months. It’s not a substitute for long-duration missions, but it enables experiments that would otherwise never leave the ground, turning ideas that might never have flown into viable missions that can ultimately progress to orbit.”

That idea of faster iteration is what makes this program stand out. It gives researchers a way to test concepts, adjust them and return to flight without long delays.

Advertisement

Former NASA Administrator Jim Bridenstine also sees the bigger picture.

“This competition is about capturing the imagination of scientists, engineers and researchers, while also enabling a new way of working, where research can move faster, iterate more frequently, and strengthen U.S. leadership in space-enabled science and industry.”

US GENERAL WARNS RUSSIA MAY BE DEVELOPING NUCLEAR ANTI-SATELLITE WEAPON IN ORBIT

The uncrewed Mk-II rocket-powered spaceplane by Dawn Aerospace demonstrates its capability to reach high altitudes and speeds, advancing reusable spaceplane technology. (Dawn Aerospace)

Why spaceflight is starting to look more like aviation

Think about how commercial aviation works. Planes land, refuel and take off again in a matter of hours. That same rhythm is now being applied to space access. Instead of designing a perfect experiment for a single launch, researchers can test, adjust and fly again. That creates a more flexible process where ideas can evolve in real time.

Advertisement

This matters because many early-stage concepts never make it to space. The cost and complexity are simply too high. With a reusable system, smaller teams have a better chance to test bold ideas without waiting years between attempts. It does not replace long missions in orbit, but it fills a gap that has existed for decades.

How the US is pushing faster space innovation

The challenge is being led by the Oklahoma Space Industry Development Authority, which is working to expand the state’s role in the growing space economy. There is real investment behind that effort. The spaceport is undergoing major upgrades to support more advanced operations, including new infrastructure designed specifically for spaceplane missions.

Programs like this reflect a broader push to speed up space research and make it more responsive. When teams can test ideas more frequently, progress tends to follow. The timeline reflects that long view. Applications open in April 2026 and close in September, with flights expected to begin in 2027. That gives teams time to prepare payloads while the supporting infrastructure continues to expand.

Runway-to-Space Challenge details and how to apply

If you are wondering who can actually take part, the program is structured to center on Oklahoma institutions while still allowing broader collaboration. Applications must be led by an Oklahoma-based university or research institution, though out-of-state partners can join as collaborators. The application window opens April 16, 2026, and closes Sept. 25, 2026, at 5 p.m. CT.

Selected teams will be able to fly payloads weighing up to 33 pounds. Each mission can reach altitudes of about 62 miles, exceed Mach 3.5 and provide up to 127 seconds of microgravity. Flights are expected to begin in mid- to late 2027, giving teams about a year to prepare.

Advertisement

FIRST ELECTRIC PASSENGER PLANE LANDS AT JFK IN MILESTONE FLIGHT

Flying at the edge of space, these missions give researchers a short window of microgravity to test ideas and refine them quickly. (Dawn Aerospace)

What this means to you

Even if you are not working in aerospace, this shift could still affect you. When access to space becomes faster and more flexible, innovation tends to accelerate. Research that once took years can move forward in shorter cycles. That can influence everything from materials science to weather forecasting.

It also signals a broader change. Space is moving away from rare, high-stakes missions and toward a model that supports routine experimentation. That usually leads to more competition and more rapid breakthroughs. Over time, those breakthroughs often show up in everyday technology, even if the connection is not always obvious.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Advertisement

Kurt’s key takeaways

Spaceflight has always pushed the limits of what is possible, but the process has remained slow for a long time. The Runway-to-Space Challenge points to a future where reaching the edge of space becomes more practical and repeatable. That alone could unlock ideas that have been sitting on the sidelines. If space starts to operate more like aviation, the pace of discovery could change in ways that ripple far beyond the aerospace industry.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

If spaceflight becomes routine enough for constant testing, how quickly should we expect new technologies to move from experiments to everyday life? Let us know by writing to us at CyberGuy.com.

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

DJI’s new Mic Mini 2 adds colorful covers to help them blend in

Published

on

DJI’s new Mic Mini 2 adds colorful covers to help them blend in

As with the Osmo Pocket 4 and recent Lito drones, DJI has no plans to release the Mic Mini 2 in the US, but it’s now available in most other markets. Pricing starts at €59 (around $69) for a bundle that includes a single mic transmitter, a compact USB-C wireless receiver, and a smaller charging case. There are several additional bundles available, including a €99 (around $116) option with two mic transmitters, a larger version of the wireless receiver that can be used with cameras, and a charging case large enough to accommodate them all. Obsidian black and glaze white magnetic covers are included, while 12 more colorful alternatives are sold separately.

The Mic Mini 2 transmitters are slightly larger and a gram heavier than the originals as a result of the redesign that accommodates the covers. But they’re much smaller than the Insta360 Mic Pro’s transmitters that will feature a customizable color E Ink screen. Battery life remains the same at 11.5 hours for the Mic Mini 2 with ANC turned off and 10.5 hours for the receiver, while the wireless transmission distance still maxes out at just over 1,312 feet. There’s still no redundant on-mic recording, but DJI teased a Mic Mini 2S version with that feature as part of today’s announcement that it claims will be announced this summer.

Continue Reading
Advertisement

Trending