Technology
5 myths about identity theft that put your data at risk
NEWYou can now listen to Fox News articles!
Most people think identity theft starts with a massive hack. In reality, it usually starts much more quietly, with bits of personal information you didn’t even realize were public: old addresses, family connections, phone numbers and shopping habits.
All are sitting on data broker sites that most people have never heard of. During Identity Theft Awareness Week, organized by the Federal Trade Commission, it’s a good time to clear up some dangerous myths that keep putting people at risk, especially retirees, families and anyone who thinks they’re “careful enough.”
Let’s break them down.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Myth #1: ‘I wasn’t in a data breach, so I’m safe’
FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS
Identity theft often starts quietly, with bits of personal information collected and shared long before a scam ever happens. (Kira Hofmann/picture alliance via Getty Images)
Reality: You don’t need to be in a breach to have your data exposed.
Data brokers legally collect personal information from public records, loyalty programs, apps and online purchases. Over time, they build detailed profiles that can exist for decades, even if you’ve never been hacked. Scammers often use this data as a starting point. It helps them sound legitimate, personalize messages and choose the right angle to trick you.
Actionable tips:
- Don’t assume “no breach” means “no risk”
- Avoid oversharing details on social media
- Remove your personal data from data broker sites so it can’t be reused
Myth #2: ‘Scammers don’t have enough info to impersonate me’
Reality: They usually have more than enough.
Scammers don’t need your Social Security number to cause damage. A name, address history, phone number and family connections can be enough for someone to:
This is why scams often feel unsettlingly personal.
Actionable tips:
- Be suspicious of messages that reference personal details
- Don’t confirm information just because the sender “knows” something about you
- Reduce what’s available by removing your data from broker databases
Myth #3: ‘Retirees aren’t targeted because they’re cautious’
Reality: Retirees are one of the most targeted groups.
Why? Because scammers assume:
- Stable income from pensions or benefits
- More savings
- Greater trust in official-looking messages
- Less familiarity with newer scam tactics
Many scams are designed specifically for retirees, from Medicare updates to fake government notices and investment fraud. A recent widespread scam involves fake IRS calls and the illegitimate “Tax Resolution Oversight Department” that tries to steal your money.
Actionable tips:
- Never act on urgent requests involving benefits or finances
- Verify messages by contacting organizations directly
- Encourage family discussions about scams and warning signs
- Remove publicly available data that helps scammers profile retirees
Data brokers build detailed profiles using public records, apps, purchases and loyalty programs, even if you have never been hacked. (Kurt “CyberGuy” Knutsson)
Myth #4: ‘Credit monitoring will stop identity theft’
Reality: Credit monitoring only tells you after something has gone wrong.
It doesn’t stop scammers from:
- Targeting you
- Attempting account takeovers
- Using your information in phishing or social engineering scams
Think of credit monitoring like a smoke alarm-helpful, but it doesn’t prevent the fire.
Actionable tips:
- Use credit monitoring as a backup, not your main defense
- Lock down accounts with strong passwords and two-factor authentication
- Reduce exposure by removing your data before it’s misused
Myth #5: “There’s nothing I can do about data brokers”
Reality: You can take control, but doing it manually is time-consuming and frustrating.
Most data broker sites allow opt-outs, but each one has a different process. Some require forms. Others need ID verification. And many re-add your data months later. That’s why I recommend a data removal service. These services contact hundreds of data brokers on your behalf, request the removal of your personal information and keep monitoring them so it doesn’t quietly reappear. For families and retirees, this matters even more because once scammers connect relatives through broker profiles, multiple people can become targets.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS
Why identity theft often starts long before you notice
Identity theft rarely begins with a dramatic moment.
It usually starts with:
- Data collected quietly over the years
- Profiles that grow more detailed with time
- Information being sold and resold without your knowledge
By the time fraud shows up on a credit report, the damage has often already been done.
What you can do during Identity Theft Awareness Week
If there’s one takeaway this week, it’s this: reducing your exposed data lowers your risk.
1) Be skeptical of unexpected messages
Do not trust surprise emails, texts or calls, even if they appear to come from a bank, retailer or government agency. Scammers often copy logos, language and phone numbers to look legitimate.
2) Verify requests on your own
If a message claims there’s a problem with an account, pause and verify it independently. Use the official website or phone number you already know, not the one provided in the message.
3) Reduce your digital footprint with a data removal service
Remove your personal information from data broker websites that collect and sell names, addresses, phone numbers and other details. A data removal service can help you do just that. Less exposed data means fewer opportunities for identity thieves. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
4) Turn on two-factor authentication
Enable two-factor authentication (2FA) wherever it’s available. Even if a criminal gets your password, 2FA adds a second barrier that can stop account takeovers.
5) Strengthen your account security
Use strong, unique passwords for important accounts and avoid reusing them across sites. A reputable password manager can securely store and generate complex passwords, making it easier to stay protected without memorizing everything.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
Scammers use this background data to sound legitimate, personalize their messages and pressure victims into acting fast. (Matt Cardy/Getty Images)
6) Use identity theft protection software
Consider identity theft protection software that monitors your personal information, alerts you to suspicious activity and helps you respond quickly if something goes wrong. Some services also assist with data broker removal and recovery support if your identity is compromised.
Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
7) Help family members stay protected
Scammers often target seniors and teens. Walk family members through these steps, help them secure accounts and encourage them to slow down before responding to urgent messages.
Kurt’s key takeaways
Identity theft isn’t about being careless; it’s about how much information is floating around without your permission. The fewer places your data lives online, the harder it is for scammers to use it against you. Taking action now won’t just protect you this week; it can reduce scams, fraud attempts and identity theft risks all year long.
Which of these myths did you believe, and what personal information do you think is already out there about you without your consent? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Snap, YouTube, and TikTok settle suit over harm to students
Snap, YouTube, and TikTok have settled the first lawsuit of its kind, alleging that social media addiction has cost public schools massive amounts of money, according to Bloomberg. The suit, filed by the Breathitt County School District in Kentucky, claims that social media has disrupted learning and created a mental health crisis, straining budgets. The terms of the settlement have not been revealed yet, and Meta is still facing a trial in the same suit, which is viewed as a bellwether for over 1,000 similar lawsuits across the country
This follows an earlier case, settled by Snap and TikTok, in which a 19-year-old plaintiff claimed significant personal injury due to addictive social media apps. Google and Meta did not agree to a settlement in that suit, and it eventually went to trial, where a jury awarded the plaintiff $6 million. Meta also recently lost a suit brought by New Mexico’s Attorney General, to the tune of $375 million.
Beyond monetary awards, many, including New Mexico, are pushing for significant changes to social media apps to limit their harm to minors. And this is just the start of what’s shaping up to be a busy year for social media lawsuits. According to Bloomberg, lawyers representing school districts said their “focus remains on pursuing justice for the remaining 1,200 school districts who have filed cases.”
Technology
Missed voicemails with no calls? It could be a scam
NEWYou can now listen to Fox News articles!
It starts quietly. Your phone buzzes. You see a voicemail notification. But your phone never rang. Then it happens again. And again. Before long, your voicemail inbox looks like it’s under attack.
That’s exactly what Mike from Westport, CT, is dealing with right now. He wrote to us saying,
“I am so upset. Every 20 to 30 minutes, I am getting voicemails, but what’s weird is my phone never rings. After blocking the number, it just rolls over to a new source number. When I go to play the message, there is no audio. Is this a scammer just trying to get me to call them back? Not sure what the endgame is here. What can I do to stop this from happening? I really appreciate your help.”
What he is describing is something we’re seeing more often. It may feel random, but there’s a clear pattern behind this voicemail scam and here’s what you need to know to stay safe.
RECEIVING UNEXPECTED INTERNATIONAL CALLS? WHAT YOU NEED TO KNOW
Silent voicemail scams can flood a phone with blank messages even when the device never rings. (Getty Images)
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
What the silent voicemail scam actually is
This tactic is often called a silent voicemail scam or ringless voicemail spam. Here’s how it works in plain terms:
- Scammers drop voicemail messages directly into your inbox
- Your phone never rings, so it feels strange and urgent
- The message is blank, garbled or extremely short
- The number changes constantly to avoid blocks
At first glance, it looks like a glitch. That confusion is the point.
What’s really happening behind the scenes
This pattern almost always points to automated robocall systems using caller ID spoofing, not real people manually calling you.
Here’s what’s likely happening:
- Automated dialing systems are repeatedly hitting your number
- They use spoofed or constantly changing caller IDs, which is why blocking one number doesn’t stop it
- Some calls connect briefly, then drop, leaving behind a silent or very short voicemail
- In some cases, the system is “pinging” your number to confirm it’s active
Once a number is confirmed as active, it can be shared across spam networks and used in future campaigns.
Why scammers leave empty voicemails
It seems pointless, but there’s a strategy behind it.
1) They want you to call back
Curiosity does the work for them. Many people return the call just to figure out what happened. When you call back, you may:
- Reach a premium-rate number that charges per minute
- Get routed into a scam call center
- Confirm your number is active and monitored
2) They test if your number is real
Even if you never call back, your voicemail confirms your number is in use. That makes it more valuable for future scams.
3) They try to bypass spam filters
Because your phone never rings, traditional call filters may not catch it. That lets more of these messages slip through.
Why do the numbers keep changing
You block one number, and another appears minutes later. That’s usually a sign of caller ID spoofing and number cycling. Scammers use software to falsify the number that shows up on your phone and rotate through large batches of numbers to stay ahead of blocks and spam filters. Some of those numbers may be completely fabricated, while others may belong to real people whose caller ID information is being misused. Many of those numbers are:
- Fake
- Reassigned or temporarily used
- Tied to real people who have no idea their number is being spoofed
Blocking a single number can still be worth doing, but it usually will not stop the campaign by itself because the caller can keep switching numbers.
GOOGLE SEARCH LED TO A COSTLY SCAM CALL
Scammers may use ringless voicemail spam and caller ID spoofing to test whether a phone number is active. (Getty Images)
Is your phone being hacked?
This is one of the first things many people worry about. In most cases, no. These silent voicemails are more likely to be part of a scam call or robocall campaign than a sign that your phone has been hacked. Scammers can use tactics such as caller ID spoofing and ringless voicemail to reach you without making the call feel normal.
The bigger risk isn’t your phone itself. It’s how the scam tries to get you to respond. Calling back, pressing prompts or engaging with the message can confirm that your number is active and may expose you to more scam attempts. The FTC specifically advises people to hang up or delete the voicemail and not call back unknown numbers.
How to stop silent voicemail scams
You don’t have to just put up with it. There are ways to reduce or stop these messages.
1) Do not call back unknown numbers
Even if it feels harmless, skip it. If it’s important, the caller will leave a real message.
2) Enable spam call filtering
On iPhone and Android, turn on built-in call filtering and silence unknown callers. This helps reduce future attempts.
How to enable spam call filtering
On iPhone (latest iOS)
Apple now gives you two strong options: Silence Unknown Callers and Call Screening.
Option 1: Silence unknown callers
- Open Settings
- Tap Apps
- Tap Phone
- Scroll down and turn on Unknown Callers
This sends calls from numbers not in your contacts straight to voicemail without ringing.
Option 2: Turn on Call Screening (recommended)
- Open Settings
- Tap Apps
- Tap Phone
- Scroll down and under Screen Unknown Callers, select Ask Reason for Calling
This feature prompts unknown callers to say who they are before your phone rings, which filters out many spam calls automatically.
Optional: Enable spam identification
- Go to Settings
- Tap Apps
- Tap Phone
- Tap Call Blocking & Identification
- Tap Business Call Identification
- Make sure it is set to ON
This allows your iPhone to show verified business names and logos for legitimate callers when available.
On Samsung
Samsung combines spam protection with AI call screening.
Settings and feature names may vary depending on your Samsung model, carrier and software version.
Option 1: Turn on spam protection
- Open the Phone app
- Tap the three-dot menu (top right)
- Tap Settings
- Tap Caller ID and spam protection
- Toggle it ON
This flags suspected spam calls before you answer.
Option 2: Block unknown callers
- Open the Phone app
- Tap the three-dot menu (top right)
- Tap Settings
- Tap Block numbers
- Turn on Block calls from unknown numbers
This stops hidden or unidentified numbers from ringing your phone.
Option 3: Enable Call Screen (best option)
- Open the Phone app
- Tap the three-dot menu (top right)
- Tap Settings
- Tap Bixby Text Call or just Text Call
- Toggle it ON
This lets your phone answer unknown calls with AI and show you what the caller says in real time.
One important reality check: Even with these turned on, some calls may still go to voicemail. That’s because voicemail is controlled by your carrier, not your phone.
HOW TO STOP SPAM MAIL, POLITICAL TEXTS AND EMAIL SPAM FOR GOOD
Unknown voicemail messages that contain no audio may be part of an automated robocall campaign. (Kurt “CyberGuy” Knutsson)
3) Use a call-blocking app
Apps can spot patterns faster than manual blocking and stop repeat offenders. Many of these apps can also identify known scam numbers and automatically block high-risk calls, helping reduce how often your phone gets hit.
4) Contact your carrier
Many carriers offer network-level spam blocking. Ask about tools that block ringless voicemail or robocalls.
5) Use a data removal service
If your number keeps getting hit, it may already be circulating on marketing lists or data broker sites. These data removal services scan for your personal information and help remove it from databases that scammers often tap into. Cutting down where your number appears can reduce how often you get targeted over time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
6) Report the activity
You can report unwanted calls and voicemails to the Federal Trade Commission at reportfraud.ftc.gov or by calling 1-877-FTC-HELP (1-877-382-4357). Reports help track and shut down large scam campaigns.
7) Protect your number going forward
Avoid posting your phone number publicly. The less exposure it has, the harder it is for scammers to target you.
8) Register your phone number on the National Do Not Call Registry at donotcall.gov/
This can help reduce telemarketing calls from legitimate businesses, but it unfortunately won’t stop scammers, illegal robocalls, or exempt organizations (like charities and political groups) from calling you. Scammers often ignore the registry and use tactics like number spoofing to bypass it. Want to know more about why your phone still won’t stop ringing and what you can do about it? Check out our article on the ‘Do Not Call’ list loophole.
Kurt’s key takeaways
Silent voicemails are designed to mess with your instincts. They rely on curiosity and confusion, not sophisticated hacking. The best move is simple. Don’t engage. Let them hit a dead end. Over time, that tells the system your number isn’t worth the effort.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
So here’s the real question: If scammers are counting on curiosity to hook you, how often do you think that instinct is working on other people right now? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Xbox is now XBOX
Xbox just allcapsmaxxed: Meet XBOX. This isn’t a joke; Microsoft appears to be actually rebranding Xbox to XBOX. Asha Sharma, Xbox CEO, ran a poll on X earlier this week, asking fans whether Microsoft should use Xbox or XBOX. The results were in favor of XBOX, and the company has now renamed its X account.
Curiously, the Threads and Bluesky accounts for Xbox haven’t been renamed yet, but if Microsoft is going ahead with a rebranding then I expect those will change soon. I asked Microsoft to comment on this potential Xbox rebranding and the company simply referred me to Sharma’s post.
The use of all caps for Xbox is a return to original form, though. Microsoft’s first Xbox logo for its console was all caps, and the company has favored using similar capped versions for the Xbox 360, Xbox One, and Xbox Series X / S console logos.
The apparent rebranding comes just a few weeks after Sharma scrapped Microsoft Gaming and renamed Microsoft’s gaming division back to Xbox. It’s part of Sharma’s continued promise of a “return of Xbox,” which has involved fan-focused console updates, a new Xbox logo, Game Pass pricing changes, and lots more in recent weeks.
-
California13 seconds agoGovernor’s Race: Katie Porter speaks 1-on-1 on strengths, criticisms and priorities for California
-
Colorado6 minutes agoKeeler: Colorado’s best prep distance runner? Niwot’s Addison Ritzenhein makes case with 4A record
-
Connecticut12 minutes agoPolice investigating fatal crash in New Haven
-
Delaware18 minutes agoDelaware man charged with 2 gas station armed robberies, escaping police chase
-
Florida24 minutes agoCountry star Morgan Wallen walks out with Florida legend Tim Tebow, refuses to Gator chomp
-
Georgia30 minutes ago
Tech Mercy-Rules No. 23 BC for 6th ACC Sweep
-
Hawaii36 minutes ago9 Best Small Towns To Retire In Hawaii
-
Idaho42 minutes ago2A STATE SOFTBALL: Loggers fall to Pilots, finish second in …