Technology
5 social media safety tips to protect your privacy online
NEWYou can now listen to Fox News articles!
Let’s face it: Social media can feel like a minefield. Between oversharing personal details, friend requests from strangers and sneaky scams sliding into your DMs, it’s easy to put yourself at risk without realizing it. But staying safe online doesn’t have to be complicated. With a few smart settings and habits, you can enjoy social media without giving away more than you mean to.
Settings and menus on social media platforms can change over time and may vary by device (iOS vs. Android vs. Web) or region. The steps below were accurate at the time of publishing, but you may see slightly different wording or paths depending on updates, app version or mobile device manufacturer.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter
HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES
1) Turn off Location Sharing
Many apps automatically tag your posts with your location. That can let strangers know your routines or even your home address.
Scammers have a harder time learning about your life the less you share online. (Kurt “CyberGuy” Knutsson)
How to turn off Location Sharing
On iPhone
- Go to Settings.
- Click Privacy & Security.
- Tap Location Services.
- Then pick the app.
- Set it to “Never” or “While Using the App.”
On Android
(Settings may vary depending on your Android phone’s manufacturer.)
- Go to Settings.
- Tap Location.
- Click App permissions.
- Then select the app and toggle location off or select Don’t allow.
Note: Some apps may still have permission for “While using the app” or “Only this time.” So, you should check each app individually, especially camera and social-media apps, for location permissions.
Pro tip: Even turning off location for just your camera app helps keep photos from carrying hidden location data.
META TO ALLOW TEENS’ PARENTS TO DISABLE PRIVATE CHATS WITH AI AFTER BACKLASH OVER FLIRTY CHATBOTS
Parents — and even some teens — are growing increasingly concerned about the effects of social media use on young people. (AP Photo/Kiichiro Sato, File)
2) Use a private account
A private account means only people you approve can see your posts and photos. Think of it like putting a lock on your front door.
How to set private accounts
- Go to Settings & Privacy.
- Tap Settings.
- Scroll to the Audience & Visibility (or Your Activity) section.
- Click Posts.
- Find “Who can see your future posts?” and set it to Friends.
- Tap your profile.
- Tap the menu (☰).
- Tap Account Privacy.
- Toggle on Private account.
TikTok
- Go to your Profile.
- Tap the menu (☰).
- Select Settings and privacy.
- Tap Privacy.
- Toggle on Private account.
X (formerly Twitter)
- Click on your profile icon in the top left of the screen.
- Open Settings and privacy.
- Select Privacy and safety.
- Tap Audience and tagging.
- Toggle Protect your posts (or Protect your Tweets).
- Once enabled, only approved followers can see your posts.
Snapchat
- Open Settings (gear icon).
- Scroll to Privacy Controls.
- Under “Who Can,” adjust options like Contact Me, View My Story and See Me in Quick Add to Friends only.
YouTube
- Go to your YouTube Studio (desktop or mobile app).
- When uploading, set visibility to Private or Unlisted.
- For existing videos, open the video’s settings and change visibility as needed.
Note: Entire channels cannot be made private, only individual videos.
- Tap your profile photo
- Settings.
- Go to Visibility.
- Under Profile viewing options, select Private mode.
- You can also control who sees your connections and activity under “Visibility of your LinkedIn activity.”
Identity theft has become so commonplace that it no longer shocks you to hear about the latest scam. (Cyberguy.com)
3) Report suspicious accounts
Fake profiles are everywhere. Scammers may pose as friends, celebrities or even customer service reps. Reporting them helps keep you (and others) safe.
How to report an account
- Go to the fake or impersonating profile.
- Tap the three-dot menu (Options).
- Select Find support or report profile.
- Choose a reason, such as pretending to be someone else.
- Follow the on-screen prompts to submit the report.
- Go to the profile.
- Tap the three-dot menu.
- Select Report.
- Choose a reason.
- Follow the on-screen instructions to complete the report.
TikTok
- Open the profile.
- Tap the three-dot menu (or sometimes the Share icon).
- Select Report.
- Choose Report account.
- Select the reason.
- Submit the report.
X (formerly Twitter)
- Go to the account profile.
- Tap the three-dot or overflow icon.
- Select Report.
- Choose the type of issue.
- If you’re reporting an entire profile rather than a single post, select Report @username from the profile page.
YouTube
- Go to the channel page.
- Tap the About tab (on desktop) or the three-dot menu (on mobile).
- Select Report.
- Choose the reason.
- Submit the report.
Snapchat
- Go to the user’s profile.
- Tap the three-dot menu or gear icon.
- Select Report.
- Choose the reason.
- Submit the report.
- Visit the fake or suspicious profile.
- Tap the More button (or three dots).
- Select Report abuse.
- Select a reason and follow the prompts.
Pro tip: Don’t just block. Report alerts to the platform so they can remove the account for everyone.
With a few smart settings and habits, you can enjoy social media without giving away more than you mean to. (Thai Liang Lim/Getty Images)
4) Enable two-factor authentication (2FA)
Even if someone steals your password, 2FA makes it harder for them to break in. It adds an extra step, like a code texted to your phone.
How to enable two-factor authentication (2FA)
- Go to the menu and select Settings & Privacy, then Settings.
- Tap Accounts Center.
- Then click Password and Security.
- Tap Two-factor authentication.
- It may ask you to choose an account to set up two-factor authentication.
- Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.
- Go to your profile and open Settings.
- Click Accounts Center.
- Select Password and Security.
- Then Two-Factor Authentication.
- It may ask you to choose an account to set up two-factor authentication.
- Choose your preferred method, such as an authentication app, text message or security key and follow the on-screen instructions.
TikTok
- Go to your Profile.
- Then open the Menu.
- Select Settings and privacy.
- Then, Security and permissions.
- Tap 2-step verification.
- Choose one or more verification methods, such as text message, email or an authentication app.
- Click Turn On.
- Follow the prompts to finish setup.
X (formerly Twitter)
- Click on your profile on the upper left of the screen.
- Open Settings and privacy.
- Select Security and account access, then Security.
- Tap Two-factor authentication.
- Choose your preferred method, such as text message, authentication app or security key.
- Follow the steps to turn it on.
Note: Text message (SMS) verification on X may only be available for paid (Premium) users or in certain regions. If SMS isn’t available, you can still use an authentication app or a physical security key for two-factor authentication.
Pro tip: Use an authenticator app (like Google Authenticator or Authy) instead of text messages for stronger protection.
5) Check your photos before posting
Your photos may reveal more than you think — house numbers, car license plates or even vacation details that signal you’re away from home.
Quick fixes before posting
- Crop or blur backgrounds that show personal details.
- Avoid posting in real time while traveling. Wait until you’re back.
- Review old posts to make sure you’re not unintentionally sharing private info.
SOCIAL MEDIA VERIFICATION SYSTEMS LOSE POWER AS SCAMMERS PURCHASE CHECKMARKS TO APPEAR LEGITIMATE
Bonus tip: Keep personal info under wraps
Every time you post, share or comment online, you’re leaving small clues about your life, and scammers are great at putting those pieces together. The less information fraudsters can find about you, the weaker their scams become.
Many impersonators use public details like your hometown, workplace or family connections to build fake profiles that seem trustworthy. Even information like your email address or phone number can be exploited if it’s floating around the internet.
A personal data removal service can help reduce that risk by scrubbing your personal details from people search sites and data brokers. While no solution is perfect, minimizing your digital footprint makes you a much harder target for impersonation and social-engineering scams. These services actively monitor and systematically remove your information from hundreds of sites, saving you time and giving you peace of mind.
Protecting your privacy online isn’t just about what you share on social media; it’s also about controlling what’s out there already. Limiting that data means scammers can’t easily cross-reference your information with data from breaches or the dark web.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.
Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.
Kurt’s key takeaways
Staying safe on social media isn’t about deleting your accounts; it’s about taking control of your information. Turning off location sharing keeps your whereabouts private. Switching to a private account gives you more say over who sees your posts. Being cautious with friend requests and DMs helps you avoid scams. And double-checking your photos before posting prevents oversharing. With just a few quick settings and habits, you can enjoy social media with peace of mind.
Have you ever spotted a scam or fake account online? Tell us what happened by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Musk says he’s going to open-source the new X algorithm next week
In 2023, what was then still called Twitter, open-sourced at least portions of the code that decided what it served up in your feed. But that GitHub repository is hopelessly out of date, with the vast majority of the files appearing to be from the initial upload three years ago. Elon Musk says that in seven days, he will open-source X’s new algorithm and finally give people a peek behind the curtain and possibly a technical explanation as to why your feed is 90 percent rage bait.
Elon has always made promises to open-source parts of X, and has followed through to at least some degree, including Grok-1 in 2024. But xAI is now on Grok-3, and the Grok GitHub repository hasn’t been updated in two years. The timing of the announcement open-sourcing the X algorithm is also likely to be met with some suspicion, as Musk is fending off criticism from across the globe and the political spectrum regarding Grok’s willingness to make deepfake nudes.
Musk says this release of the X algorithm will include “all code used to determine what organic and advertising posts are recommended to users.” He also says this will be just the first, with updates coming every four weeks, and that those will include developer notes highlighting any changes. Of course, considering how things played out in 2023, you’ll have to forgive us for taking that promise with a grain of salt.
Technology
Covenant Health data breach affects nearly 500,000 patients
NEWYou can now listen to Fox News articles!
When a healthcare data breach is first disclosed, the number of people affected is often far lower than the final tally. That figure frequently climbs as investigations continue.
That’s exactly what happened with Andover, Massachusetts-based Covenant Health. The Catholic healthcare provider has confirmed a cyberattack discovered last May may have affected nearly 500,000 patients, a sharp increase from the fewer than 8,000 people it initially reported earlier this year.
A ransomware group later claimed responsibility for the incident, though Covenant Health has not publicly confirmed the use of ransomware. The attackers accessed names, addresses, Social Security numbers and health information, among other sensitive data that could put patients at serious risk.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
UNIVERSITY OF PHOENIX DATA BREACH HITS 3.5M PEOPLE
Covenant Health detected suspicious activity in late May 2025, but investigators later confirmed attackers had already accessed systems days earlier. (Kurt “CyberGuy” Knutsson)
What happened in the Covenant Health breach
Covenant Health says it detected unusual activity in its IT environment May 26, 2025. A later investigation revealed that an attacker had actually gained access eight days earlier, on May 18, and was able to access patient data during that window.
In July, Covenant Health told regulators that the breach affected 7,864 individuals. After completing what it describes as extensive data analysis, the organization now says that up to 478,188 individuals may have been affected.
Covenant Health operates hospitals, nursing and rehabilitation centers, assisted living residences and elder care organizations across New England and parts of Pennsylvania. That wide footprint means the breach potentially touched patients across multiple states and care settings.
In late June, the Qilin ransomware group claimed responsibility for the attack, Bleeping Computer reported. The group alleged it stole 852 GB of data, totaling nearly 1.35 million files. Covenant Health has not confirmed those figures, but it did acknowledge that patient information was accessed.
According to the organization, the exposed data may have included names, addresses, dates of birth, medical record numbers, Social Security numbers, health insurance details and treatment information such as diagnoses, dates of treatment and types of care received.
700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS
Qilin ransomware lists Covenant Health on its data leak site. (Bleeping Computer)
What Covenant Health is telling patients
In a notice sent to regulators and patients, Covenant Health says it engaged third-party forensic specialists to investigate the incident and determine what data was involved. The organization says its data analysis is ongoing as it continues identifying individuals whose information may have been involved.
Then there are the familiar statements every company makes after a breach, claiming they’ve strengthened the security of their IT systems to help prevent similar incidents in the future. Covenant Health says it has also set up a dedicated toll-free call center to handle questions related to the breach.
Beginning Dec. 31, 2025, the organization started mailing notification letters to patients whose information may have been compromised. For individuals whose Social Security numbers may have been involved, Covenant Health is offering complimentary credit monitoring and identity theft protection services.
We reached out to Covenant Health, and the company confirmed the expanded scope of the incident and outlined steps being taken to notify patients and enhance security safeguards.
DATA BREACH EXPOSES 400K BANK CUSTOMERS’ INFO
The breach exposed highly sensitive information, including names, Social Security numbers, medical records and treatment details tied to nearly half a million patients. (Kurt “CyberGuy” Knutsson)
7 steps you can take to protect yourself after the Covenant Health breach
If you received a notice from Covenant Health, or if your data has been exposed in any healthcare breach, these steps can help reduce the risk of misuse.
1) Enroll in the free identity protection offered
If the organization offers you credit monitoring or identity protection, take it. These services can alert you to suspicious activity tied to your Social Security number, credit file or identity details before real damage is done. If you’re not offered one and want to be on the safer side, you might consider getting one yourself.
Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com
2) Monitor medical and insurance statements closely
Medical identity theft often shows up quietly. Review an explanation of benefits (EOBs), insurance claims and billing statements for services you don’t recognize. If something looks off, report it to your insurer immediately.
3) Place a fraud alert or credit freeze
A fraud alert tells lenders to take extra steps to verify your identity before approving credit. A credit freeze goes further by blocking new accounts entirely unless you lift it. If Social Security numbers were exposed, a freeze is usually the safer option.
To learn more about how to do this, go to Cyberguy.com and search “How to freeze your credit.”
4) Use a password manager
Healthcare breaches often lead to credential-stuffing attacks elsewhere. A password manager ensures every account uses a unique password, so one exposed dataset can’t unlock everything else. It also makes it easier to update passwords quickly after a breach.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
5) Be cautious of phishing scams and use strong antivirus software
Breaches are frequently followed by phishing emails, texts or calls that reference the incident to sound legitimate. Attackers may pose as the healthcare provider, an insurer or a credit bureau. Don’t click links or share information unless you verify the source independently.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
6) Consider a personal data removal service
Once your data leaks, it often spreads across data broker sites. Personal data removal services help reduce your digital footprint by requesting takedowns from these databases. While they can’t erase everything, they lower your exposure and make targeted fraud harder.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
7) Review your credit reports regularly
You’re entitled to free credit reports from all major bureaus. Check them for unfamiliar accounts, hard inquiries or address changes. Catching fraud early makes it far easier to contain.
Kurt’s key takeaway
Healthcare organizations remain prime targets for cybercriminal groups because of the volume and sensitivity of the data they store. Medical records contain a mix of personal, financial and health information that is difficult to change once exposed. Unlike a password, you cannot reset a diagnosis or treatment history. This breach also shows how early disclosures often underestimate impact. Large healthcare networks rely on complex systems and third-party vendors, which can slow forensic analysis in the early stages. As investigations continue, the number of affected individuals often climbs.
Do you think healthcare organizations do enough to protect user data? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Amazfit’s Active 2 tracker and Blu-rays are this week’s best deals
The start of the year is typically a great time to snag deals on health and fitness gear, including trackers and wireless earbuds, and this week was no exception. We found plenty on sale and highlighted the best picks below. Not all of the deals are related to New Year’s resolutions, though; there are also a number of other worthwhile deals worth checking out. Despite the Consumer Electronics Show wrapping up earlier this week, we’re already seeing deals roll in, for example. And if your main goal is to unwind this weekend, we’ve spotted solid deals on Blu-rays to help you relax. Below, you’ll find all of our favorite deals from this week.
Of fitness trackers on sale right now, the deal on the Amazfit Active 2 is ideal, especially if you’re on a budget. It’s currently on sale for just $84.99 ($15 off) at Amazon, Best Buy, and Target, which is just $5 shy of its lowest price to date.
We think the Active 2 is one of the best fitness tracker you can currently buy, namely because it offers a feature set you don’t typically don’t find at this price point. It covers most of the health and fitness features people need and then some, with continuous heart rate and blood oxygen tracking, in addition to menstrual cycle tracking. You also get offline maps with turn-by-turn navigation and up to nine days of battery life — far longer than most smartwatches. It looks stylish, too, thanks to its stainless steel case and 2,000-nit OLED display that makes it seem more expensive than it is.
What makes the latest Nano Charger stand out from previous models its built-in display, which shows real-time charging details like power flow, charge level, and temperature at a glance. If you have an iPhone 15 or newer — or an iPad Pro released in 2020 or later — it can also adjust charging based on the device’s power needs. What’s more, it delivers up to 45W of power in a compact design with folding prongs that rotate 180 degrees, allowing you to squeeze it into smaller spaces.
Three more of this week’s best deals
-
Detroit, MI1 week ago2 hospitalized after shooting on Lodge Freeway in Detroit
-
Technology5 days agoPower bank feature creep is out of control
-
Dallas, TX2 days agoAnti-ICE protest outside Dallas City Hall follows deadly shooting in Minneapolis
-
Dallas, TX6 days agoDefensive coordinator candidates who could improve Cowboys’ brutal secondary in 2026
-
Delaware2 days agoMERR responds to dead humpback whale washed up near Bethany Beach
-
Iowa5 days agoPat McAfee praises Audi Crooks, plays hype song for Iowa State star
-
Health7 days agoViral New Year reset routine is helping people adopt healthier habits
-
Nebraska4 days agoOregon State LB transfer Dexter Foster commits to Nebraska