Connect with us

Technology

5 myths about identity theft that put your data at risk

Published

on

5 myths about identity theft that put your data at risk

NEWYou can now listen to Fox News articles!

Most people think identity theft starts with a massive hack. In reality, it usually starts much more quietly, with bits of personal information you didn’t even realize were public: old addresses, family connections, phone numbers and shopping habits. 

All are sitting on data broker sites that most people have never heard of. During Identity Theft Awareness Week, organized by the Federal Trade Commission, it’s a good time to clear up some dangerous myths that keep putting people at risk, especially retirees, families and anyone who thinks they’re “careful enough.” 

Let’s break them down.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.   

Advertisement

Myth #1: ‘I wasn’t in a data breach, so I’m safe’

FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

Identity theft often starts quietly, with bits of personal information collected and shared long before a scam ever happens. (Kira Hofmann/picture alliance via Getty Images)

Reality: You don’t need to be in a breach to have your data exposed.

Data brokers legally collect personal information from public records, loyalty programs, apps and online purchases. Over time, they build detailed profiles that can exist for decades, even if you’ve never been hacked. Scammers often use this data as a starting point. It helps them sound legitimate, personalize messages and choose the right angle to trick you.

Actionable tips:

  • Don’t assume “no breach” means “no risk”
  • Avoid oversharing details on social media
  • Remove your personal data from data broker sites so it can’t be reused

Myth #2: ‘Scammers don’t have enough info to impersonate me’

Reality: They usually have more than enough.

Scammers don’t need your Social Security number to cause damage. A name, address history, phone number and family connections can be enough for someone to:

Advertisement

This is why scams often feel unsettlingly personal.

Actionable tips:

  • Be suspicious of messages that reference personal details
  • Don’t confirm information just because the sender “knows” something about you
  • Reduce what’s available by removing your data from broker databases

Myth #3: ‘Retirees aren’t targeted because they’re cautious’

Reality: Retirees are one of the most targeted groups.

Why? Because scammers assume:

  • Stable income from pensions or benefits
  • More savings
  • Greater trust in official-looking messages
  • Less familiarity with newer scam tactics

Many scams are designed specifically for retirees, from Medicare updates to fake government notices and investment fraud. A recent widespread scam involves fake IRS calls and the illegitimate “Tax Resolution Oversight Department” that tries to steal your money.

Actionable tips:

  • Never act on urgent requests involving benefits or finances
  • Verify messages by contacting organizations directly
  • Encourage family discussions about scams and warning signs
  • Remove publicly available data that helps scammers profile retirees

Data brokers build detailed profiles using public records, apps, purchases and loyalty programs, even if you have never been hacked. (Kurt “CyberGuy” Knutsson)

Myth #4: ‘Credit monitoring will stop identity theft’

Reality: Credit monitoring only tells you after something has gone wrong.

It doesn’t stop scammers from:

  • Targeting you
  • Attempting account takeovers
  • Using your information in phishing or social engineering scams

Think of credit monitoring like a smoke alarm-helpful, but it doesn’t prevent the fire.

Actionable tips:

  • Use credit monitoring as a backup, not your main defense
  • Lock down accounts with strong passwords and two-factor authentication
  • Reduce exposure by removing your data before it’s misused

Myth #5: “There’s nothing I can do about data brokers”

Reality: You can take control, but doing it manually is time-consuming and frustrating.

Most data broker sites allow opt-outs, but each one has a different process. Some require forms. Others need ID verification. And many re-add your data months later. That’s why I recommend a data removal service. These services contact hundreds of data brokers on your behalf, request the removal of your personal information and keep monitoring them so it doesn’t quietly reappear. For families and retirees, this matters even more because once scammers connect relatives through broker profiles, multiple people can become targets.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

Why identity theft often starts long before you notice

Identity theft rarely begins with a dramatic moment.

Advertisement

It usually starts with:

  • Data collected quietly over the years
  • Profiles that grow more detailed with time
  • Information being sold and resold without your knowledge

By the time fraud shows up on a credit report, the damage has often already been done.

What you can do during Identity Theft Awareness Week

If there’s one takeaway this week, it’s this: reducing your exposed data lowers your risk.

1) Be skeptical of unexpected messages

Do not trust surprise emails, texts or calls, even if they appear to come from a bank, retailer or government agency. Scammers often copy logos, language and phone numbers to look legitimate.

2) Verify requests on your own

If a message claims there’s a problem with an account, pause and verify it independently. Use the official website or phone number you already know, not the one provided in the message.

3) Reduce your digital footprint with a data removal service 

Remove your personal information from data broker websites that collect and sell names, addresses, phone numbers and other details. A data removal service can help you do just that. Less exposed data means fewer opportunities for identity thieves. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Advertisement

4) Turn on two-factor authentication

Enable two-factor authentication (2FA) wherever it’s available. Even if a criminal gets your password, 2FA adds a second barrier that can stop account takeovers.

5) Strengthen your account security

Use strong, unique passwords for important accounts and avoid reusing them across sites. A reputable password manager can securely store and generate complex passwords, making it easier to stay protected without memorizing everything.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

Scammers use this background data to sound legitimate, personalize their messages and pressure victims into acting fast. (Matt Cardy/Getty Images)

Advertisement

6) Use identity theft protection software

Consider identity theft protection software that monitors your personal information, alerts you to suspicious activity and helps you respond quickly if something goes wrong. Some services also assist with data broker removal and recovery support if your identity is compromised.

Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

7) Help family members stay protected

Scammers often target seniors and teens. Walk family members through these steps, help them secure accounts and encourage them to slow down before responding to urgent messages.

Kurt’s key takeaways

Identity theft isn’t about being careless; it’s about how much information is floating around without your permission. The fewer places your data lives online, the harder it is for scammers to use it against you. Taking action now won’t just protect you this week; it can reduce scams, fraud attempts and identity theft risks all year long.

Advertisement

Which of these myths did you believe, and what personal information do you think is already out there about you without your consent? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.  

Advertisement

Technology

Sonos’ Super Bowl sale knocks hundreds off its audio gear

Published

on

Sonos’ Super Bowl sale knocks hundreds off its audio gear

Sonos isn’t exactly synonymous with the Super Bowl, although the brand discounts its gear every year around this time like clockwork. It’s knocking 20 percent off many of its marquee products, including soundbars and standalone speakers — all of which can be paired together to improve sound quality and to put audio in more places at home.

Through February 16th, the company is keeping its prices in place on the Era 100 and the larger Era 300 speakers, the Beam and Arc Ultra soundbars, as well as its selection of wireless subwoofers. To put the prices in context, some of these discounts match — or beat — the current costs of Sonos’ certified refurbished gear.

The Era 100 very well may be the best, most feature-packed smart speaker around in its price range. In our 2023 review, we praised its stereo sound playback and improved bass response over its predecessor, the Sonos One. Notably, it supports Bluetooth playback (in addition to Wi-Fi connectivity) as well as line-in audio via USB-C, in case you’d rather plug in a wired audio source. While this model typically sells for $219, it’s currently available for $179 through Sonos, as well as Amazon and Best Buy.

The Era 300 is Sonos’ modern spin on the Sonos Five, offering bigger sound than the Era 100. Its specialty is spatial audio, which sounds incredible when you find a song that’s been mixed just right (the thing is, not all Dolby Atmos tunes are mixed equally). Like the Era 100, this model offers Bluetooth and Wi-Fi wireless connections, as well as line-in via USB-C. Our review notes, however, that stereo playback is an area where the Era 300 actually falters compared to its predecessor. But given its improvements overall (and since the Five that launched in 2020 is no longer on sale), the 300 is a great speaker to consider if you really want to feel immersed in your music. It’s $379 during the sale period at Sonos and Best Buy, down from $479.

Jumping to soundbars, the second-gen Beam is down to $369 from its original $499 price. While it’s definitely not the most feature-packed soundbar that you can get at around this price, its ability to tie-in with other Sonos products, plus its improved soundstage over the first-gen model might make it worth considering for you. The inclusion of Dolby Atmos is its marquee feature, although we noted in our review that it’s a virtualized effect since it lacks upward firing speakers that truly enable the vertical sound effects to shine. Note that it’s lacking in physical connectivity compared to most other models, with just a power plug, an HDMI eARC port, and an ethernet jack. In the event that you wish to connect the Beam to your TV or receiver via optical audio, you’ll need to purchase this $25 HDMI-to-optical adapter.

Advertisement

The Arc Ultra is a much better soundbar than the Beam, and carriers a larger $899 price (down from $1,099). Our reviewer noted that the bass improvements in this model are such that it can stand on its own without the purchase of a wireless subwoofer. It also boasts more immersive sound quality, plus Bluetooth connectivity, which was missing in the original Arc. The Arc Ultra’s sound can be further enhanced by connecting other Sonos speakers to the mix, although its older Play:1 and Play:3 speakers are ineligible to join the speaker family for surround sound.

If you’re considering either the Bean or the Arc Ultra (or if you already own one of its soundbars), their performance will benefit greatly with the addition of a Sonos subwoofer, of which the company makes two models. The Sub 4 is its high-end option, which is $759 during the sale period (down from $899). Anything this close to $1,000 is extremely expensive for a subwoofer, especially considering that most companies include one with their surround sound systems. The Sub 4 is able to lay horizontally or sit vertically — however suits your room best.

For almost half the cost of the Sub 4, you can get the Sub Mini. It’s $399, down from $499. You may be thinking that even this one is still pretty costly, and I agree. Although, it’s a product that Sonos loyalists were begging for, as before it there was no other choice than to spring for its more expensive subwoofer. In our review, we deemed it unworthy for filling large rooms with bass, but totally sufficient in most other ways. Something cool about its design is the force-canceling effect that reduces floor vibrations, which could be great if you’re worried about disturbing neighbors or other people in the house.

Continue Reading

Technology

Under Armour data breach claims trigger alerts for millions of users

Published

on

Under Armour data breach claims trigger alerts for millions of users

NEWYou can now listen to Fox News articles!

Sportswear and fitness brand Under Armour is investigating claims of a massive data breach after customer records were posted on a hacker forum. 

The breach became widely known after millions of people received alerts warning their information may have been compromised. While Under Armour says its investigation is ongoing, cybersecurity researchers reviewing the leaked data say it appears to include personal details potentially linked to customer purchases.

According to breach notification service Have I Been Pwned, the dataset contains email addresses linked to approximately 72 million people, prompting the organization to notify affected users directly. The scale of the exposure has raised new concerns about how consumer data can be misused long after a breach occurs.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS  

Millions of Under Armour customers were alerted after stolen account data surfaced on a hacker forum, bringing the breach into public view. (Thomas Trutschel/Photothek via Getty Images)

What happened in the Under Armour data breach

The stolen data is reportedly linked to a ransomware attack that occurred in November 2025. At the time, the Everest ransomware group claimed responsibility and attempted to extort Under Armour by threatening to leak internal files. In January 2026, customer data from that incident appeared publicly on a popular hacking forum. Soon after, breach notification service Have I Been Pwned obtained a copy of the data and alerted affected users by email. According to reports, the seller claimed the stolen files came directly from the November breach and included millions of customer records.

What data was exposed

The leaked dataset reportedly includes a broad range of personal information. While payment card details have not been confirmed, the exposed data is still valuable to cybercriminals.

Compromised information may include:

Advertisement

Researchers also found email addresses belonging to Under Armour employees within the data. That increases the risk of targeted phishing and business email compromise scams.

Under Armour’s response so far

“We are aware of claims that an unauthorized third party obtained certain data,” an Under Armour spokesperson told CyberGuy. “Our investigation of this issue, with the assistance of external cybersecurity experts, is ongoing. Importantly, at this time, there’s no evidence to suggest this issue affected UA.com or systems used to process payments or store customer passwords. Any implication that sensitive personal information of tens of millions of customers has been compromised is unfounded. The security of our systems and data is a top priority for UA, and we take this issue very seriously.”

Why this breach matters

Even without passwords or payment details, this breach still poses serious risks. Names, email addresses, birth dates and purchase history can be used to create highly convincing scams. Cybercriminals often reference real purchases or account details to gain trust. As a result, phishing emails tied to this breach may appear legitimate and urgent. Over time, exposed data like this can also be combined with other breaches to build detailed identity profiles that are harder to protect against.

How to check if your passwords were stolen

To see if your email was affected, visit the Have I Been Pwned website. It is the first and official source for this newly added dataset. Enter your email address to find out if your information appears in the leak. When done, come back here for Step 1 below.

Ways to stay safe after the Under Armour data breach

If you received a breach alert or believe your information may be included, taking action now can reduce your risk later.

Advertisement

1) Change reused passwords and use a password manager

If you reused the same password on other sites, change those passwords right away. Even if Under Armour says passwords were not affected, exposed email addresses are often used in follow-up attacks. A password manager makes this easier. It creates strong, unique passwords for each account and stores them securely. That way, one breach cannot unlock multiple accounts.

The leaked data reportedly includes email addresses, birth dates and purchase details, which can be exploited in targeted phishing scams. (Kurt “CyberGuy” Knutsson)

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

2) Watch for phishing emails tied to Under Armour

Cybercriminals often move fast after a breach. As a result, emails that appear to come from Under Armour or fitness brands may land in your inbox. Be cautious of messages that claim there is an issue with your account or a recent purchase. Do not click links or open attachments in unexpected emails. Instead, go directly to the company’s official website if you need to check your account. Using strong antivirus software can also help block malicious links and attachments before they cause harm.

Advertisement

ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

3) Turn on two-factor authentication everywhere you can

Two-factor authentication (2FA) adds an extra layer of protection. Even if someone gets your password, they still need a second step to log in. Turn it on for email accounts first. Then enable it for shopping, fitness and financial accounts. This single step can stop many account takeover attempts linked to breached data.

4) Monitor for password reset attempts and account alerts

After a breach, attackers often test stolen email addresses across multiple sites. That activity can trigger password reset emails you did not request. Pay close attention to these alerts. If you see one, secure the account immediately by changing the password and reviewing recent activity.

Advertisement

5) Be skeptical of messages that reference past purchases

This breach included purchase information, which makes scams more convincing. Attackers may reference real products or order details to earn your trust. Treat any message that pressures you to act quickly as suspicious. Legitimate companies do not demand immediate action by email or text.

6) Reduce your exposure with a data removal service

Over time, exposed personal data often ends up with data brokers. These companies collect and sell profiles that scammers use for targeting. A data removal service can help you request the deletion of your information from these databases. Reducing what is publicly available makes it harder for criminals to build detailed profiles.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Advertisement

Security experts warn that even without payment data, exposed personal information can fuel fraud long after a breach is discovered. (Cheng Xin/Getty Images)

Kurt’s key takeaways

The Under Armour data breach is a reminder that even major global brands can become targets. While payment systems appear unaffected, the exposure of personal data still creates long-term risks for millions of customers. Data breaches often unfold over time. What starts as leaked records can later fuel scams, identity theft and targeted attacks. Staying alert now can reduce the chance of bigger problems later.

If your personal shopping or fitness data were exposed in a breach like this, would you keep using the brand or move on to a competitor? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved.  

Continue Reading

Technology

It’s a new heyday for gas thanks to data centers

Published

on

It’s a new heyday for gas thanks to data centers

The US is now leading a global surge in new gas power plants being built in large part to satisfy growing energy demand for data centers. And more gas means more planet-heating pollution.

Gas-fired power generation in development globally rose by 31 percent in 2025. Almost a quarter of that added capacity is slated for the US, which has surpassed China with the biggest increase of any country. More than a third of that growth in the US is expected to directly power data centers, according to a recent analysis by the nonprofit Global Energy Monitor (GEM).

More gas means more planet-heating pollution

The rush to install more powerful hardware into expanding data centers used for generative AI has led to forecasts of skyrocketing power demand. There’s still a lot of uncertainty about whether AI will become as ingrained in everyday life as tech companies might like, and many proposed data centers could fall flat. Even so, plans to build out more gas plants in the name of AI are stalling efforts to transition to cleaner energy sources.

“There is a risk that this capacity could lock in future emissions and become stranded assets if anticipated electricity demand from AI never materializes,” Jenny Martos, project manager for GEM’s Global Oil and Gas Plant Tracker, said in a press release.

Advertisement

Already, 2026 is shaping up to be a record-smashing year for gas. If all of this year’s proposed projects cross the finish line, it would be an even bigger jump in added capacity than the record set in 2002. That’s pretty remarkable considering the 2000s ushered in America’s so-called “shale gas revolution,” when fracking suddenly unleashed previously hard-to-reach reserves. Gas is now a cheaper power source than coal and creates less carbon pollution when burned. But gas production releases methane, a more potent greenhouse gas than carbon dioxide even though it doesn’t persist in the atmosphere for as long.

Image: Global Energy Monitor

Ramping up electricity generation from gas is also a sharp pivot away from global climate goals. A decade ago, nearly every country on Earth — including its two biggest greenhouse gas polluters, China and the US — signed a historic deal in Paris to limit global warming. The only way to achieve the most ambitious goals set out in the Paris agreement would be to replace fossil fuels with less-polluting alternatives like renewable energy and slash greenhouse gas emissions to net zero by around 2050.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Trending