Technology
AI deepfake romance scam steals woman’s home and life savings
NEWYou can now listen to Fox News articles!
A woman named Abigail believed she was in a romantic relationship with a famous actor. The messages felt real. The voice sounded right. The video looked authentic. And the love felt personal.
By the time her family realized what was happening, more than $81,000 was gone — and so was the paid-off home she planned to retire in.
We spoke with Vivian Ruvalcaba on my “Beyond Connected” podcast about what happened to her mother and how quickly the scam unfolded. What began as online messages quietly escalated into financial ruin and the loss of a family home. Vivian is Abigail’s daughter. She is now her mother’s advocate, investigator, chief advocate and protector.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
FROM FRIENDLY TEXT TO FINANCIAL TRAP: THE NEW SCAM TREND
Vivian Ruvalcaba says a deepfake video made the scam against her mom, Abigail, feel real, using a familiar face and voice to build trust. (Philip Dulian/picture alliance via Getty Images)
How the scam quietly started
The scam did not begin with a phone call or a threat. It began with a message. “Facebook is where it started,” Vivian explained. “She was directly messaged by an individual.” That individual claimed to be Steve Burton, a longtime star of “General Hospital.” Abigail watched the show regularly. She knew his face. She knew his voice.
After a short time, the conversation moved off Facebook. “He then led her to create an account with WhatsApp,” Vivian said. “When I discovered that, and I looked at the messaging, you can see all the manipulation.”
That shift mattered. This is a major red flag I often warn people about. When a scammer moves a conversation from a public platform like Facebook to an encrypted app like WhatsApp, it is usually deliberate and designed to avoid detection.
Grooming through secrecy and isolation
At first, Abigail told no one. “She was very, very secretive,” Vivian said. “She didn’t share any of this with anyone. Not my father. Not me.”
That secrecy was not accidental. “She was being groomed not to share this information,” Vivian explained.
This is a tactic I see over and over again in scams like this. Once a scammer feels they have someone emotionally invested, the next step is to isolate them. They push victims to keep secrets and avoid talking to family, friends or police. When Vivian finally started asking questions, her mother reacted in a way she never had before. “She said, ‘It’s none of your business,’” Vivian said. “That was shocking.”
The deepfake video that changed everything
When Vivian threatened to go to the police, her mother finally revealed what had been happening. “That’s when she showed me the AI video,” Vivian said. In the clip, a man who looked and sounded like Steve Burton spoke directly to Abigail and referred to her as “Abigail, my queen.” The message felt personal. It used her name and promised love and reassurance.
“It wasn’t grainy,” Vivian said. “To the naked eye, you couldn’t tell.” Still, Vivian sensed something was off. “I looked at it, and I knew right away,” she said. “Mom, this is not real. This is AI.”
Her mother disagreed and argued back. She pointed to the face and the voice. She also believed the phone calls proved it. That is what makes deepfakes so dangerous. When a video looks and sounds real, it can override common sense and even years of trust within a family.
From gift cards to life savings
The money flowed slowly at first. A $500 gift card request raised the first alarm. Then, money orders and Zelle payments. What Vivian discovered next still haunts her. “She pulled out a sandwich baggie,” Vivian said. “About 110 gift cards ranging from $25 up to $500.” Those cards were purchased with credit cards. Cash was mailed. Bitcoin was sent. In total, the Los Angeles Police Department (LAPD) tallied the losses at $81,000. And the scam was not finished.
The scam against Abigail moved from social media to encrypted messaging, a common tactic used to avoid detection. (Kurt “CyberGuy” Knutsson)
When the scammer took her home
After draining Abigail’s available cash, the scam did not stop. It escalated again. The scammer began pushing her to sell the one asset she still had: her home. “He was pressing her to sell,” Vivian told me. “Because he wanted more money.” The pressure came wrapped in romance. The scammer told Abigail they would buy a beach house together and start a new life. In her mind, this was not a scam. It was a plan for the future. That belief set off a chain reaction.
How the home sale happened so quickly
Abigail sold her condo for $350,000, even though similar homes in the area were worth closer to $550,000 at the time. The sale happened quickly. There was no family involvement. Her husband was still living in the home, yet he did not sign the documents. “She just gave away about $200,000 in equity,” Vivian said. “They stole it.”
What makes this even more troubling is who bought the property. According to Vivian, the buyer was a wholesale real estate company that moved fast and asked very few questions. Messages later reviewed by the family show Abigail actively trying to hide the sale from her husband. In one text exchange, she warned the buyer not to park in the driveway because her husband had access to a Ring camera. That alone should have raised concerns. Instead, the buyers went along with it. “They appeased whatever she asked for,” Vivian said. “They were getting a property she was basically giving away.”
These buyers were not the original scammers, but they benefited from the pressure the scammer created. The scammer pushed Abigail to sell. The buyers took advantage of the situation and the deeply discounted price. The home was not extra money, it was Abigail’s retirement. It was the only real security she and her husband had after decades of work. By the time Vivian uncovered the sale, Abigail was days away from sending another $70,000 from the proceeds to the scammer. Had that transfer gone through, nearly everything would have been gone.
This is the part of the story people struggle to process. Modern AI-driven scams are no longer limited to draining bank accounts or gift cards. They now push victims into selling real property, often with opportunistic players waiting on the other side of the deal.
Why police and lawyers could not stop the damage
Vivian contacted the police the same day she realized her mother was being scammed. “They assigned an investigator,” she told me. “He was already very aware of the situation and how little they can help.” That reality is difficult for families to hear, but it is common.
Many large-scale scams operate overseas. The money moves quickly through gift cards, wire transfers and crypto. By the time victims realize what is happening, the trail is often cold. “Most of these scammers are out of the country,” Vivian said. “No one is being held accountable.”
When the case shifted from criminal to civil
Law enforcement documented the losses and opened a case, but there was little they could do to recover the money or stop what had already happened. The deeper damage came from the home sale, which fell into a legal gray area far beyond a typical fraud report. Once the condo was sold, the situation shifted from a criminal scam to a complex civil fight.
Vivian immediately began searching for legal help. The first attorneys she contacted discouraged her. One told her it could cost more than $150,000 to pursue a case. Another failed to act even after being told about Abigail’s mental illness and history of bipolar disorder. At one point, an eviction attorney testified in court that Vivian never mentioned the romance scam, something she strongly disputes.
By March, Abigail and her husband were forced out of their home. By October, they were fully evicted and locked out. Both parents are now displaced. Abigail is living with family out of state. Her husband, now in his mid-70s, is still working because the home was his retirement.
It was only after reaching out through personal connections that Vivian found an attorney willing to fight. That attorney is now pursuing the case on a contingency basis, meaning the family does not pay unless there is a recovery. The legal argument centers on Abigail’s mental capacity and whether she could legally understand and execute a home sale under the circumstances. The buyers dispute that claim. The outcome will be decided in court.
This is why stories like this rarely end with a police arrest or quick resolution. Once a scam crosses into real estate and civil law, families are often left to navigate an expensive and exhausting legal system on their own. And by then, the damage has already been done.
Why shame keeps scams hidden
Many victims never report scams. Only about 22% contact the FBI. Fewer than 30% reach out to their local police department. Vivian understands why that happens. “She’s ashamed,” Vivian said. “I know she is.” That shame protects scammers. Silence gives them room to move on and target the next victim.
INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU
What started as online messages escalated into gift cards, lost savings and the sale of a family home. (Kurt “CyberGuy” Knutsson)
Red flags families cannot ignore
This case reveals warning signs every family needs to recognize early.
Red flags to watch for
- Sudden secrecy about finances or online activity
- Requests for gift cards, cash or crypto
- Pressure to move conversations to encrypted apps
- AI videos or voice messages used as proof of identity
- Emotional manipulation tied to urgency or romance
- Requests to sell property or move large assets
I want to be very clear about this. It does not matter how smart you are or how careful you think you are. You can become a victim and not realize it until it is too late.
Tips to stay safe and protect your family
These lessons come from both Vivian’s experience and the patterns I see repeatedly in modern scams. Some are emotional. Others are technical. Together, they can help families spot trouble sooner and limit the damage when something feels off.
1) Watch for platform changes
Moving a conversation from Facebook to WhatsApp or another encrypted app is not harmless. Scammers do this to avoid moderation and make messages harder to trace or flag.
2) Question AI proof
Deepfake videos and cloned voices can look and sound convincing. Never treat a video or voice message as proof of identity, especially when money or property is involved.
3) Slow down major financial decisions
Scammers create urgency on purpose. Any request involving large sums, property sales or retirement assets should pause until a trusted third party reviews it.
4) Never send gift cards, cash or crypto
Legitimate people do not ask for payment through gift cards or cryptocurrency. These methods are a common scam tactic because they are hard to trace and nearly impossible to recover.
5) Talk openly as a family
Silence helps scammers. Regular conversations about finances, online contacts and unusual requests make it easier to spot problems early and step in without shame.
6) Reduce online exposure with a data removal service
Scammers research their targets using public databases. They pull names, phone numbers, relatives and property records. Removing that data reduces how easily criminals can build a profile.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
7) Use strong antivirus protection
Malware links can expose financial accounts without obvious signs. Good antivirus software can block malicious links before they lead to deeper access or data theft.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
8) Protect assets early
Living trusts and proper estate planning add protection before a crisis hits. They can help prevent rushed property sales and limit who can legally move assets without oversight.
9) Use conservatorship when capacity is limited
“Conservatorship is the only way,” Vivian said. “Power of attorney may not be enough.” When a loved one has diminished capacity, a conservatorship adds court oversight and can stop unauthorized financial decisions before serious damage occurs.
Kurt’s key takeaways
This scam did not rely on sloppy emails or obvious mistakes. It used emotion, familiarity and AI that looked real. Once trust was built, the damage followed quickly. Money disappeared. Secrecy grew. Pressure increased. The home was sold. What makes this case especially painful is the speed. A few messages led to gift cards. Gift cards turned into life savings. Life savings became the loss of a home built over decades. Most families never expect this to happen. Many do not talk about it until it has already happened. The lesson is clear. Awareness matters more than intelligence. Open conversations matter more than embarrassment. Acting early matters more than trying to undo the damage later. If you want to hear Vivian tell this story in her own words and understand how fast these scams unfold, listen to our full conversation on the “Beyond Connected” podcast.
If a deepfake video showed up on your parent’s phone tonight, would you know before everything was gone? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Trump administration is allegedly collecting $10 billion on the TikTok deal
In September, Donald Trump claimed that “the United States is getting a tremendous fee” for brokering the TikTok deal. Now sources tell the Wall Street Journal and the New York Times that fee is expected to be in the range of $10 billion. The money is supposedly being paid by new investors, including Oracle and Silver Lake. Reports are that $2.5 billion was already paid to the Treasury when the deal closed on January 22nd. The rest will be paid out in installments.
This is the latest example of the Trump administration inserting itself into private business in unprecedented ways, including taking on a 10-percent stake in Intel last August, a “golden share” in US Steel, and a 20-percent cut in chip sales from Nvidia to China. In this instance, the deal also involves one of Trump’s biggest supporters and fundraisers, Larry Ellison, co-founder and CTO of Oracle.
If the reporting is accurate, the fee would represent over 70 percent of the deal’s value, which saw a group of investors take a majority stake in TikTok for $14 billion.
Technology
Iran-linked hackers target US medical tech company
NEWYou can now listen to Fox News articles!
When most people hear about cyberattacks tied to geopolitical conflict, it can seem far away. It sounds like something that happens to governments or giant corporations. Yet the latest cyber incident involving a U.S. medical technology company shows how fragile digital systems can be. Even more important, it raises a question you should all ask yourself: Are you protected against trouble, too?
A hacker group linked to Iran has claimed responsibility for a cyberattack on Stryker, a Michigan-based company that produces medical equipment and healthcare technology used worldwide. Stryker employs about 56,000 people and operates in more than 60 countries, making it one of the largest medical technology companies in the world.
Stryker disclosed the incident in a filing with the U.S. Securities and Exchange Commission, saying the disruption affected parts of its Microsoft environment and that investigators are working to determine the full scope.
The incident appears to be one of the most significant cyber incidents linked to the current conflict so far.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Laboratory assistants from the company BioNTech wear Stryker medical gear in a clean room at a production site in Marburg, Germany, in March 2021. (Boris Roessler/picture alliance via Getty Images)
What happened in the Stryker cyberattack
According to reports, the attack disrupted parts of Stryker’s global network environment. Reports indicate the outages began shortly after midnight on Wednesday on the East Coast. Employees suddenly discovered that their work-issued phones stopped functioning. Communication across teams stalled as devices became unusable.
ANDROID FIXES 129 SECURITY FLAWS IN MAJOR PHONE UPDATE
The hacker group Handala claimed responsibility on social media platforms, including Telegram and X. However, the claim has not been independently verified. Some employees also reported seeing the hacker group’s logo appear on company login pages during the disruption. In posts online, the group said the attack was retaliation for a bombing at a school in Minab, Iran, though those claims have not been independently verified.
Security experts believe the attackers may have gained access to the company’s Microsoft Intune management console. This platform allows companies to manage corporate devices such as smartphones and laptops remotely. Once inside that system, attackers appear to have triggered a powerful administrative feature. Reports suggest many company-connected phones and laptops were wiped back to factory settings.
Signage at the Stryker Corp. headquarters in Portage, Michigan, on Thursday, March 12, 2026. A cyberattack on Stryker Corp. has kept the medical technology company’s ordering and shipping systems offline as the firm continues to struggle to address a crippling hack claimed by a group linked to Iran. (Kristen Norman/Bloomberg via Getty Images)
How hackers may have used legitimate tools against the company
The attack did not rely on traditional ransomware or malware. Instead, the hackers appear to have used a legitimate system feature in a destructive way. Remote wipe tools exist for good reasons. Companies use them when a device is lost, stolen or retired. However, if attackers gain control of the management console, those same tools can become weapons. Some cybersecurity researchers believe attackers may have accessed the company’s Microsoft Intune device management system, though the exact method of the attack has not been publicly confirmed.
Once the attackers accessed the device management system, they likely triggered remote wipe commands across multiple employee devices. The result looked like a mass reset event that effectively shut down normal operations. Stryker later confirmed it experienced a cybersecurity incident affecting its Microsoft environment. The company said it saw no evidence of ransomware or malware and believes the incident is contained. Stryker said it has activated business continuity measures so it can continue supporting customers and partners while systems are restored.
Iran’s long history of destructive cyberattacks
This type of attack fits into a broader pattern. Iran-linked groups have previously launched some of the most damaging “wiper” cyberattacks on record. These attacks aim to destroy data rather than steal it.
Two notable examples include:
Since the start of the current conflict, cybersecurity companies such as Google and Proofpoint have mostly observed Iranian groups conducting espionage operations. However, the Stryker disruption may signal a shift toward more aggressive actions targeting corporate infrastructure. We contacted both Stryker and Microsoft for comment but did not hear back before our deadline.
Why this matters beyond one company
Large cyber incidents rarely stay isolated. When attackers demonstrate a new method, other groups often study and reuse it. That means techniques used against a corporation today can show up in smaller attacks tomorrow. Small businesses, hospitals and even individuals sometimes become targets when criminals adapt the same tactics. In other words, this story about a medical technology company also carries a warning for everyday digital life.
The logo of Stryker medical technology is seen on their plant in the IDA (Industrial Development Agency) estate, in Carrigtwohill, County Cork, Ireland on March 28, 2025. (Reuters/Clodagh Kilcoyne)
How to protect yourself from cyberattacks and device wipe threats
Cyberattacks against corporations reveal weaknesses that can affect anyone who uses connected devices. A few proactive steps can reduce your risk.
1) Use strong and unique passwords
Never reuse passwords across accounts. If attackers obtain one password, they often test it across many services. Consider using a password manager to generate and securely store complex passwords, so you do not need to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
2) Enable two-factor authentication
Adding a second verification step, such as two-factor authentication (2FA), can stop attackers even if they obtain your password.
3) Consider a data removal service
Data broker sites collect and sell personal details that criminals may exploit. Removing that information can reduce your exposure. Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
4) Install strong antivirus software
Reliable antivirus protection helps detect suspicious activity, phishing attempts and malware before it can spread. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Back up important files regularly
If a device is wiped or compromised, backups allow you to restore critical data quickly.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Cyberattacks once focused mainly on stealing information. Today, many attackers try to disrupt systems, erase data or create chaos. The reported incident involving Stryker shows how hackers can turn everyday administrative tools into powerful weapons. If someone gains access to the right controls, they may not need traditional malware at all. For many people, cyber conflict between countries can seem far away. Yet the same technology involved in those attacks powers the devices and services we rely on every day. Your phone, laptop and cloud accounts all connect to systems that depend on trust and access permissions. That is why digital safety now requires layers of protection. Strong passwords help. Secure devices help. Staying aware of threats helps, too. Preparation can make the difference between a quick recovery and a major disruption. If something unexpected happens, the people who bounce back fastest are usually those who took a few steps to protect themselves in advance.
And that leads to an important question: If your phone, laptop or cloud account were suddenly wiped tomorrow, would you be ready to recover? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Hulu, Disney Plus, and the Pixel Watch 4 are among this week’s best deals
Happy Saturday, all! This week, we found a number of deals that should help you unwind and relax over the next few days (and beyond). If you’re planning to stream the Oscars on Sunday, there’s still time to take advantage of a great deal on Hulu and Disney Plus, as well as Google’s latest 4K streaming device. Speaking of Google, you can also currently save $60 on the Pixel Watch 4; there are also savings to be had on microSD Express cards, ice cream makers, and a host of other great tech this weekend. So, without further ado, let’s get to it.
Hulu and Disney Plus recently launched a terrific promo that drops the price of the ad-supported bundle for new and returning subscribers to just $4.99 a month ($8 off) through 11:59AM ET on March 24th. That’s the best deal we’ve seen on the bundle since Black Friday and Cyber Monday, and a great way to stream the 98th Academy Awards without paying full price when they air tomorrow, March 15th, at 7PM ET.
In addition to the aforementioned awards show, Disney’s discounted bundle lets you catch up on 2026 nominees like The Secret Agent, It Was Just An Accident, and Elio. You also get access to the rest of Hulu and Disney’s massive catalog of movies and TV shows, which includes everything from Predator: Badlands and Anora to both seasons of Andor and the upcoming second season of Daredevil: Born Again.
If you want a terrific Android smartwatch to keep tabs on your health and fitness goals, the Google Pixel Watch 4 is down to a new low price. You can currently pick up the Wi-Fi-enabled 41mm model for $289.99 ($60 off) at Amazon and Best Buy, or the larger 45mm variant for $339.99 (also $60 off) via the same retailers (Amazon / Best Buy).
Google’s latest wearable offers a wide range of helpful health and fitness tools, allowing you to track your activity, sleep, blood oxygen levels, and heart rate. It can automatically record certain cardio workouts, while dual-frequency GPS enables more accurate navigation in challenging environments, including cities. Being a Google device, the Watch 4 also integrates well with the company’s various services, with support for apps like Google Maps, Google Wallet, and Google Assistant. You can also make hands-free calls with Google Gemini using the raise-to-talk gesture, which is helpful when you’re out for a run.
While the watch works well with most Android phones, it pairs especially nicely with Pixel devices. Pixel phone owners, for example, can use it as a remote shutter for the Pixel camera and take advantage of features like Recorder, which can generate AI-powered summaries of recordings. As an added plus, the screen and battery are both repairable and replaceable, so you won’t necessarily need to buy a whole new watch if either gets damaged.
While many first-party Nintendo Switch 2 games don’t take up a huge amount of space, storage can fill up quickly if you keep adding to your digital library or buy a lot of third-party games, such as Cyberpunk 2077. That makes this a solid deal, as the Switch 2 is limited to 256GB of built-in storage and requires pricier microSD Express cards for storage expansion. Samsung’s card uses the newer microSD Express standard, which delivers superior read and write speeds to traditional microSD cards, helping reduce load times and speed up larger downloads.
More great deals from this week
-
Detroit, MI1 week agoU.S. Postal Service could run out of money within a year
-
Pennsylvania1 week agoPa. man found guilty of raping teen girl who he took to Mexico
-
Oklahoma7 days ago
OSSAA unveils Class 6A-2A basketball state tournament brackets, schedule
-
Michigan6 days agoOperation BBQ Relief helping with Southwest Michigan tornado recovery
-
Southeast5 days ago‘90 Day Fiancé’ alum’s boyfriend on trial for attempted murder over wild ‘Boca Bash’ accusations
-
Health7 days agoAncient herb known as ‘nature’s Valium’ touted for improving sleep and anxiety
-
Nebraska2 days agoWildfire forces immediate evacuation order for Farnam residents
-
Tennessee1 week ago
Lady Vols fall to Alabama in SEC Tournament for seventh loss in row