Connect with us

Technology

An AI PC you’ll want to tinker with

Published

on

An AI PC you’ll want to tinker with

Hi, friends! Welcome to Installer No. 41, your guide to the best and Verge-iest stuff in the world. (If you’re new here, welcome, hope you like gaming gadgets and silly spy movies, and also you can read all the old editions at the Installer homepage.)

This week, I’ve been reading about the tough times at Humane and how Suicide Squad flopped, watching the TikTok dancing cult documentary and Furiosa, swapping my crappy Roku for a slightly less crappy Apple TV, listening to a lot of WikiHole, mixing up new mocktail recipes, and testing the Phanpy app for all things fediverse.

I also have for you a new Raspberry Pi accessory, an incredibly well-liked movie to watch this weekend, a couple of fun tech books, some gaming gear, and lots more. Let’s do it.

(As always, the best part of Installer is your ideas and tips. What are you into right now? What should everyone else be as into as you are? Tell me everything: email installer@theverge.com, share with @imdavidpierce on Threads, or find me on Signal @davidpierce.11. And if you know someone else who might enjoy Installer, tell them to subscribe here.)

The Drop

Advertisement
  • The Raspberry Pi AI Kit. This is my kind of AI PC: a super simple $70 kit that works with a Raspberry Pi 5 and gives you a surprising amount of power with which to do simple processing tasks. I don’t even know what I’ll use this for! But I’m getting one anyway.
  • Hit Man. A bunch of very smart people have said this comedy-action-thriller Netflix flick is one of the best movies of the year. And why not? Richard Linklater directs, Glen Powell stars, it’s based on an all-timer of a magazine article. I cannot wait to watch.
  • Dark Wire. This is as good a premise for a book as I’ve ever seen: the story of the FBI’s secret tech startup, designed to track some of the world’s most sophisticated criminals. A few places have published excerpts, and I already can’t put this book down.
  • Building SimCity. Two books this week! You love to see it. This is a story all about SimCity, yes, but also about the history of computer simulation, with lots of photos and diagrams to go with it. One for the coffee table for sure.
  • The new Rivian R1. Same look, same funky headlight design, totally new car underneath. A lot of what Rivian’s doing here is clearly just to keep costs down, but this continues to be the EV I lust after the most.
  • The Acolyte. This is a very different kind of Star Wars story, set in a very different time and place, told from a very different point of view, all of which I definitely think is a good thing. The reviews seem pretty mixed so far, but I’m excited to give it a whirl.
  • Sequel 2.3. A very cool update to the Installerverse’s favorite media tracking app for Apple devices. The new feature is called Magic Lookup, and it lets you send a URL to the app and have it automatically parsed and dumped into your lists. Perfect for saving those “20 things coming to Netflix this month” things you see all over the place.
  • The ModRetro Chromatic. The retro gaming hardware boom we’re in right now is just the best thing. And this, a $199 Game Boy homage from a team led by Palmer Luckey, looks great. It’s not shipping until the end of the year, but it’s up for preorders now.
  • The Asus ROG Ally X. Speaking of portable consoles! This one’s a lot bigger, a lot more expensive, and a lot more ambitious than the Chromatic — but it also sounds pretty great. Maybe this is the first Windows handheld that can really stand up to the Steam Deck?
  • Comfort Zone. Fun new podcast from the MacStories crew, with a gimmick I really like: every week, the three hosts have to basically do “Tech Show and Tell” and then issue a tech-related challenge to complete before the next episode. (MacStories also has another new podcast, called NPC, all about portable gaming.
  • “How ‘Wall-E’ Reveals Our Changing Feelings Toward Tech.” I am outrageously jealous of this whole series of episodes from the Offline podcast, looking at how movies like Her and The Social Network influenced the way we think about and build tech. This is the final episode in the miniseries, and they’re all worth a listen.

Screen share

Well, friends, it took 41 issues, but it happened: I had someone lined up for Screen Share this week, and it just didn’t come together in time. So let’s do something slightly different. I’ve recently become obsessed with the Niagara Launcher for Android, which is, in theory, largely optimized for one-handed phone use but is also just a better, quieter way of organizing your homescreen. In the last 10 days, I’ve probably redone my setup eight times. It’s a lot.

Niagara is just so clever! It turns your apps into a customizable list, pops up widgets and notifications right in place, and lets you do a shocking amount of stuff without ever opening an app. This is totally how phones should work. (If you want to understand how it operates, here’s a good thorough video to watch.)

Niagara just got a big update, too, particularly if you pay the $10 a year or $30 lifetime Pro subscription. Its search is better now, it got some cool new icons, and there are a few other little improvements, too.

As I’ve been tinkering with my own homescreen, I’ve been collecting some Niagara setups I like, and I figured I’d share a few. You can do so many things with this launcher!

Cool, right? There are rumors and reports that we’re going to get a bunch of new customization possibilities for iOS, too, so here’s hoping this is a year filled with chaotic homescreen reorgs. If you use Niagara, by the way, or any other awesome Android launcher, I’d love to see your sick homescreen setups. Send them my way. And we’ll be back to regular Screen Share next week!

Advertisement

Crowdsourced

Here’s what the Installer community is into this week. I want to know what you’re into right now as well! Email installer@theverge.com or message me on Signal — @davidpierce.11 — with your recommendations for anything and everything, and we’ll feature some of our favorites here every week. 

“New version of Vibescape just came out for Apple Vision Pro — new Oregon coast-inspired meditation environment! Completely new experience with this and the Forest Ledge environment — pushing the boundaries of what’s possible outside of Apple’s own environments.” – Gregory

“I’ve been using Beeper a ton on my Pixel 8 Pro and MacBook Pro. I actually installed it in early April when the acquisition announcement came out but have really hit my stride with it a month ago. It’s just so helpful to have all of your messaging in one app, both for work and personal.” – Josh

Patrick Willems has a new video this week about what’s next after superhero movies so I’ve been diving back into his channel after a while.” – Mike

Advertisement

“A friend introduced me to Guild Wars 2 a few months back. As someone who likes the concept of an MMO but always felt let down by the execution, I can confidently say this is one of the most underrated games ever made. A fun, free-to-play MMORPG with a healthy community and no microtransactions sounded too good to be true, but it’s not. Plus, with the recent announcements around the next expansion, there are more reasons to play than ever.” – Dallin

“I heard about Microsoft’s Recall, which felt exhausting and tedious to me. So, last weekend, I paved over Windows and installed the Bazzite Linux distro on my gaming PC and have been playing all my Steam and Epic games that way. It’s surprisingly so much better than the last time I tried Linux on the desktop. I’m sure mileage varies, but everything worked with about the same amount of tweaking Windows required.” – Les

“The LOTR movies are finally coming back to theaters. The extended editions — the only versions I’ll watch. So excited to go watch these with my pals, like high school all over again.” – Colin

“Watching Who Killed WCW? from Vice. It’s a three-part miniseries interviewing Eric Bischoff and a bunch of wrestlers like Kevin Nash, Konnan, and Booker T about the inevitable downfall of WCW. Everyone has their own thoughts about who to point the finger at, from Turner executives hating wrestling to Bischoff not knowing what he’s doing to the wrestlers only looking out for themselves. Only one episode out so far, but it’s good.” – Brian

“The new shows Thousandaires from Dropout and Trolley Problems from 2nd Try premiered this week and are both hilarious and great examples of modern media companies and the trend of creating their own streaming platforms.” – Zach

Advertisement

“On the anime watch. I highly recommend Delicious in Dungeon. Very fun to watch, the characters’ comedic timing is excellent. This anime is hilarious while keeping the stakes of the story high.” – John

Signing off

I’ve been thinking a lot this week about a blog post Andrew Bosworth, Meta’s CTO, wrote recently. He talks about his system of “Inbox Ten,” which basically means not trying to end every day with nothing on your plate but instead just trying to find a more manageable flow of information in your life. Boz has a whole system for managing his inbox in particular, which I really like — I used to be an Inbox Zero zealot and get stressed out when there’s stuff in there, but I like his slightly less drastic approach. And this sentence has popped into my brain all week, every time I get an email: “Don’t let it linger in your inbox or get yourself talked into work you don’t think is a good use of your time.” Words to live by.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Sending a text the wrong way could cost you money and trouble

Published

on

Sending a text the wrong way could cost you money and trouble

Ever wondered why your text messages sometimes fail to send, show up pixelated or don’t appear at all on the other person’s end? 

It might not be your phone, but your carrier’s messaging support. Knowing the difference between SMS, MMS and RCS and how your carrier handles them can save you money, improve message delivery and ensure you’re using the full potential of your messaging app.

A person texting on their phone  (Kurt “CyberGuy” Knutsson)

Knowing the basics: SMS vs. MMS vs. RCS

Before you can figure out which phone carrier fits your messaging needs, it helps to understand the differences between the three main types of mobile messaging — SMS, MMS and RCS. Each has its own capabilities, limitations and impact on your experience.

Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!

Advertisement

SMS (Short Message Service) is the most basic form of text messaging and has been around since the early days of mobile phones. It allows users to send plain text messages with a strict character limit of 160 characters. SMS messages are sent over the cellular network, which means they work even if you don’t have a data plan or access to Wi-Fi. This makes SMS one of the most reliable messaging options available, especially for simple communication. It works for all phones, even older models, which makes it universal.

MMS (Multimedia Messaging Service) builds upon SMS by allowing the transmission of multimedia content. With MMS, users can send images, videos, audio files and even GIFs. The character limit is significantly higher, typically up to 1,600 characters, although this can vary depending on the carrier. MMS messages also travel over the cellular network but require mobile data to send and receive. They do not require Wi-Fi, but because media files are larger, the reliability can vary. Some carriers compress MMS files or fail to send them if they exceed certain size limits, which means your carefully chosen vacation photo might arrive as a pixelated blur.

RCS (Rich Communication Services) represents the next generation of mobile messaging. It is designed to upgrade the SMS and MMS experience by providing features that rival popular messaging apps like iMessage and WhatsApp. With RCS, users can send high-resolution photos and videos, audio clips, emoji, stickers and even read receipts and typing indicators. There is no character limit, and the service works over Wi-Fi or mobile data instead of over standard cellular channels. 

While RCS allows larger files, some messaging platforms or carriers may still apply soft limits or compress images/videos to ensure consistent performance. However, for RCS to work, both the sender and the recipient need to have RCS enabled on a supported messaging app and carrier. Google Messages is the most reliable app for accessing these RCS features, especially on Android devices. However, it should be noted that Apple devices do not support RCS natively because Apple relies on iMessage for similar functionality.

HOW TO STOP SPAM TEXT MESSAGES ON YOUR PHONE

Advertisement

Why it matters when choosing a wireless carrier

Now that you know what SMS, MMS and RCS are, it’s important to understand how your phone carrier influences your messaging experience. From hidden fees to message delivery issues, the provider you choose can make a big difference in how well these technologies work.

Cost differences

Not all carriers treat these messaging types the same. While SMS is often free and unlimited on many plans, MMS messages may incur additional charges, especially on prepaid or international plans. RCS messages, on the other hand, use mobile data or Wi-Fi and typically do not incur per-message fees, making them a cost-effective option if supported.

For example, carrier A might offer unlimited SMS but charge for every MMS sent. Carrier B might include MMS in the plan but cap the number of SMS messages. Carrier C could fully support RCS, letting users send messages over Wi-Fi for free. Choosing the right carrier based on how you communicate can help avoid surprise charges.

Not all carriers fully support RCS

While SMS and MMS are universally supported, RCS still depends on carrier infrastructure and the messaging app being used. Some carriers support RCS only through their proprietary apps, which may not be compatible with all devices. Others support “universal RCS”, which works across multiple platforms but still requires the right app, most reliably Google Messages.

If you’re hoping to use RCS features like high-resolution image sharing, read receipts and typing indicators, it’s important to ensure your carrier not only supports RCS but also supports it universally across devices and apps. Otherwise, your message may silently fall back to SMS or MMS if the recipient’s carrier or device does not support RCS.

Advertisement
text message

Illustration of text messaging on a smartphone   (Kurt “CyberGuy” Knutsson)

ANDROID FEATURE PREVENTS SENSITIVE CONTENT IN GOOGLE MESSAGES

As of May 2025, all major U.S. wireless carriers and most of their sub-brands and MVNOs (mobile virtual network operators) fully support SMS, MMS and RCS messaging. This includes both Android and iPhone users (with iOS 18.4 or newer for RCS on iPhone).

You can expect full support for SMS, MMS and RCS on the following carriers: AT&T, Verizon, T-Mobile, US Cellular, C Spire, Consumer Cellular, Cricket, Family Mobile, FirstNet, H2O Wireless, Metro by T-Mobile, Mint Mobile, Boost Mobile, Google Fi, PureTalk, RedPocket Mobile, Spectrum Mobile, Straight Talk, TracFone, Ultra Mobile, US Mobile, Visible and Xfinity Mobile.

  • SMS and MMS support: All of these carriers offer SMS and MMS. SMS is almost always unlimited on modern plans, while MMS may have limitations or extra charges on some prepaid or international plans.
  • RCS support on iPhone: With the release of iOS 18.4, these carriers also support RCS on iPhones. If you have updated to iOS 18.4 or later, you should have access to RCS features, provided your carrier supports it.
  • RCS support on Android: All these providers support RCS messaging on Android devices, most reliably through the Google Messages app.

If you are using one of these carriers, you can expect the latest messaging features, including high-resolution media sharing, read receipts, typing indicators and the ability to send messages over Wi-Fi or mobile data. For the best experience, make sure your device is updated to the latest software and that you are using a supported messaging app.

  • For iPhones, RCS support requires iOS 18.4 or higher. As of spring 2025, all major U.S. carriers and most MVNOs (mobile virtual network operators) now support RCS on iPhone.
  • On Android, RCS is available through Google Messages and is widely supported across all major carriers and most MVNOs.

BEST WIRELESS PHONE PLANS

International support

RCS support is expanding internationally, with carriers like Orange and Sosh in France offering RCS on iPhones running iOS 18.4 beta. To check if your international carrier supports RCS on iPhone:

  • Go to Settings
  • Tap General
  • Click About
  • Scroll down and tap Carrier. If RCS is supported, you will see Voice, SMS & RCS.

HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES

Recent changes and security

Apple and Google are rolling out support for RCS Universal Profile 3.0, which brings end-to-end encryption for RCS messages, enhancing privacy and security across platforms. Some carriers may still be updating their infrastructure, so check with your provider or device settings if you do not see RCS options enabled.

Advertisement

Pricing considerations

  • SMS is typically unlimited on most plans.
  • MMS may still incur charges on some plans, especially prepaid or international. For example, outbound MMS in Canada is $0.0220 per message as of May 2025.
  • RCS messages use data or Wi-Fi and generally do not incur per-message fees, making them cost-effective for sending media-rich messages.

International messaging can be affected

If you use a smaller or regional provider not mentioned above, or if you plan to travel internationally, it is important to check with your carrier about its current support for RCS, especially if you use an iPhone. While international support for RCS is expanding, it is not yet universal.

When you are abroad, reliable messaging becomes even more critical. SMS is the most dependable option and works almost everywhere, making it a safe choice for staying connected. MMS, on the other hand, can be inconsistent overseas due to differences in network standards and carrier agreements. RCS is even less predictable outside your home country, as it relies on mobile data or Wi-Fi and often does not function while roaming unless your carrier specifically enables it for international use.

So, if you are traveling or using a less common carrier, always confirm whether your plan includes international MMS and RCS support. This will help you avoid unexpected gaps in communication or surprise fees and ensure your messages reach their destination reliably. 

GOT A BANK TRANSFER ALERT TEXT? IT MIGHT BE A SCAM. HERE’S WHAT TO DO

Email-to-text services vary by carrier

Email-to-text is a feature that lets you send a text message to someone’s phone number directly from your email. To do this, you use a special email-to-SMS gateway provided by the recipient’s mobile carrier. For example, to text a friend on AT&T, you’d send an email to something like 1234567890@txt.att.net.

However, not all carriers support this, and some may block the feature altogether to prevent spam or limit abuse. Even among those that do support it, there can be differences between how SMS (text-only) and MMS (media messages) are handled.

Advertisement

Below are examples of the special email addresses (called gateways) that let you send text messages via email:

AT&T

  • SMS: number@txt.att.net
  • MMS: number@mms.att.net

Verizon

  • SMS: number@vtext.com
  • MMS: number@vzwpix.com

T-Mobile

  • SMS & MMS: number@tmomail.net

If you rely on this feature, such as sending yourself reminders from your email or receiving system alerts to your phone, it is important to check whether your carrier supports it. Be aware that not all carriers clearly document this capability, especially smaller providers like Spectrum Mobile or Xfinity Mobile, which may restrict or not support it at all.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

man texting

A man texting on his iPhone   (Kurt “CyberGuy” Knutsson)

Safety steps for mobile messaging

To enhance your mobile messaging security, follow these best practices:

1. Avoid clicking on unknown links or messages and install strong antivirus software: Be cautious with links or attachments from unknown sources because they can lead to phishing or malware attacks. Also, install strong antivirus software on your device to protect against malware and viruses.

Advertisement

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices

2. Enable Multi-factor Authentication (MFA): Use MFA to add an extra layer of security for your messaging apps and accounts. This can include methods like authentication apps, physical security keys, or SMS codes, which help prevent unauthorized access even if your password is compromised. By activating MFA, you significantly reduce the risk of your accounts being hacked, providing an essential safeguard against cyber threats.

3. Keep your device and apps updated: Regularly update your operating system and apps to ensure you have the latest security patches.

4. Use end-to-end encrypted messaging apps: Consider using apps with end-to-end encryption for secure communication. This ensures that only you and the intended recipient can read the messages, keeping them safe from hackers or third-party interception. Popular options include Signal, WhatsApp and iMessage, which prioritize privacy and protect sensitive conversations from unauthorized access.

Advertisement

5. Be mindful of public Wi-Fi and use a Virtual Private Network (VPN): Avoid using public Wi-Fi for sensitive communications, as it can be insecure and expose your data to potential eavesdropping or hacking. Consider using a VPN for secure browsing on public networks because it encrypts your internet traffic and masks your IP address, providing a safer experience even on unsecured networks. By using a VPN, you can significantly reduce the risks associated with public Wi-Fi and protect your personal data from unauthorized access. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices

6. Delete sensitive messages: Regularly delete sensitive messages to minimize data exposure. This practice helps protect your privacy by ensuring that confidential information isn’t stored indefinitely on your device or in the cloud, where it could potentially be accessed by unauthorized parties. Additionally, consider using messaging apps that offer features like automatic message deletion or self-destructing messages to further enhance your privacy 

HOW TO BLOCK A PHONE NUMBER OR TEXT ON YOUR SMARTPHONE

Kurt’s key takeaways

Texting may seem simple, but there’s a lot going on behind the scenes, especially when your messages aren’t sending or show up weird. Understanding the difference between SMS, MMS and RCS can save you from headaches, surprise charges and blurry photos. The good news? A little knowledge goes a long way. Now that you’re in the know, you can text smarter, choose the right carrier and keep your conversations running smoothly, wherever you are.

Advertisement

Do you think mobile carriers should do more to protect you from phishing scams and malicious links sent via SMS and MMS? What specific measures would you like them to implement? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved. 

Advertisement
Continue Reading

Technology

The FTC puts off enforcing its ‘click-to-cancel’ rule

Published

on

The FTC puts off enforcing its ‘click-to-cancel’ rule

The Federal Trade Commission (FTC) was set to start enforcing the remaining provisions of its “click-to-cancel” rule on May 14th, requiring that subscriptions be as easy to cancel as to start. Now, the agency says it won’t enforce the rule until July 14th, as TechCrunch reports.

Also known as the Negative Option Rule, the big component of click-to-cancel is that it forbids companies from making customers jump through hoops that differ from the process to sign up for an account. If you can sign up online, you must be able to cancel online, too. As the FTC points out, the original May 14th deadline was already a deferral for that and related provisions.

The agency says it chose to push enforcement back even further after “a fresh assessment of the burdens that forcing compliance by this date would impose.” The FTC voted 3-0 for the delay, but as TechCrunch notes, two of a typical five commissioners were absent from the vote. That’s because they were illegally fired by Donald Trump in March.

Perhaps on the bright side for consumers, the FTC says that starting on the new deadline, “regulated entities must be in compliance with the whole of the Rule because the Commission will begin enforcing it.” However, it doesn’t rule out changing any of the regulation’s provisions, writing that it’s “open to amending the Rule” if enforcing it “exposes any problems.”

Continue Reading

Technology

How SIM swapping led to a $1.8M cyber fraud case

Published

on

How SIM swapping led to a .8M cyber fraud case

A San Fernando Valley, California, man has been sentenced to more than five years in federal prison after orchestrating a massive fraud operation that targeted dozens of victims, many of them elderly. 

Oren David Sela, 36, stole mail, hijacked phone numbers through SIM swapping, and used victims’ identities to drain bank accounts, stealing over $1.8 million. 

Here is how the scheme worked and what you can do to avoid becoming a victim of a similar attack.

Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!

A SIM card. (Kurt “CyberGuy” Knutsson)

Advertisement

What is SIM swapping?

SIM swapping is a form of identity theft where a scammer tricks a mobile carrier into transferring your phone number to a new SIM card they control. Once they hijack your number, they can intercept text messages, including verification codes, and gain access to your bank accounts, emails and more.

There are two common ways scammers pull off SIM swaps:

  • Social engineering: They impersonate you and contact your phone carrier’s customer support, claiming their phone was lost or stolen. They then convince the carrier to activate a new SIM card with your number.
  • Insider threats: In some cases, scammers bribe or trick employees at mobile carriers into switching the number without following proper verification steps.

Once they control your phone number, they can:

  • Receive all your incoming calls and texts
  • Reset passwords on your email, bank, and social media accounts
  • Bypass security alerts sent to your phone
  • Lock you out of your own accounts

SIM swapping turns your phone number into a master key for stealing your identity and money.

HOW TO AVOID MALICIOUS SIM SWAPPING SCAM

Inside the $1.8M fraud scheme

Between November 2021 and October 2023, Sela stole mail from homes in Beverly Hills, California, and nearby neighborhoods. He collected personal information, including:

  • Debit and credit card details
  • Bank account numbers
  • Social Security numbers
  • Driver’s licenses

Using this information, Sela carried out SIM swapping attacks to bypass two-factor authentication (2FA) protections. This allowed him to:

  • Break into victims’ online banking and financial accounts
  • Open new fraudulent accounts in the victims’ names
  • Transfer money into intermediary accounts he controlled
  • Order new debit and credit cards linked to the victim accounts

Sela made hundreds of fraudulent withdrawals and transfers. He attempted to steal nearly $2.6 million and successfully stole at least $1.8 million.

The lavish lifestyle and his downfall

Sela often spent the stolen money on luxury goods, including a nearly $17,000 watch. In 2022, he was arrested in Beverly Hills and found with nearly $25,000 in cash, various pieces of expensive jewelry, and numerous fraudulent debit and credit cards belonging to elderly victims. Despite this arrest, Sela continued committing fraud. During two subsequent searches of his properties in 2022 and 2023, law enforcement discovered more than $70,000 in cash, stolen mail, fraudulent identification documents, and banking information linked to dozens of victims.

Advertisement

In October 2024, Sela pleaded guilty to bank fraud and aggravated identity theft. On April 22, 2025, he was sentenced to 61 months in federal prison and ordered to pay $1,818,369 in restitution.

SIM swapping 2

Illustration of two-factor authentication. (Kurt “CyberGuy” Knutsson)

FBI WARNS ABOUT NEW EXTORTION SCAM TARGETING SENSITIVE DATA 

Why SIM swapping is so dangerous

Two-factor authentication provides an extra layer of security, but it is only effective if the attacker cannot access your phone. When scammers hijack your phone number, they can intercept 2FA codes sent by text and quickly take control of your accounts. Once inside your email or banking app, they can:

  • Reset passwords
  • Move money
  • Lock you out
  • Open new lines of credit in your name

They do not even need your password if they can control your number.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SIM swapping 3

Illustration of security on smart device. (Kurt “CyberGuy” Knutsson)

WHAT EXACTLY IS A DATA BREACH AND WHY SHOULD I CARE?

Advertisement

How to protect yourself from SIM swapping and identity theft

Take these important steps to secure your information:

1. Monitor your accounts: Regularly review your bank statements, credit card statements, and financial accounts for unauthorized activity. Report any suspicious transactions immediately.

2. Lock your SIM card: Set a PIN on your SIM card through your mobile carrier. Without it, your number cannot be moved without your permission.

3. Be cautious about sharing personal information: Limit the amount of personal information you share online, especially on social media. Scammers often use small details like birthdays, pet names, or locations to guess security questions or impersonate you.

4. Place a fraud alert: Contact one of the three major credit bureaus (Equifax, Experian, or TransUnion) and request a fraud alert. This makes it harder for identity thieves to open new accounts in your name.

Advertisement

5. Check your credit reports: Obtain free copies of your credit reports and review them carefully for suspicious activity. If you find errors or signs of fraud, report them right away.

6. Freeze your credit: A credit freeze prevents new accounts from being opened in your name without your consent. It is free to set up and does not affect your credit score.

7. Use an authenticator app, not SMS for two-factor authentication: Use apps like Microsoft Authenticator or Google Authenticator instead of relying on text message codes, which can be intercepted if your phone number is stolen.

8. Strengthen your passwords: Create strong, unique passwords for each account. Consider using a password manager to generate and store complex passwords securely. Get more details about my best expert-reviewed Password Managers of 2025 here.

Advertisement

9. Invest in identity theft protection: Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

10. Be cautious of phishing attempts and use strong antivirus software: Watch out for emails, texts, or calls asking for personal information. Always verify the source before providing sensitive details. Installing antivirus software on all your devices can help protect you by blocking malicious links, detecting phishing attempts, and stopping malware before it can steal your private information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 

Kurt’s key takeaways

If scammers can steal your phone number, they can steal your money, your accounts, and even your identity. SIM swapping is a serious threat because it gives criminals a shortcut around your strongest defenses. Take action today to protect your phone, your accounts, and your personal information. A few small steps can make the difference between staying safe and facing a devastating financial loss.

Have you ever been targeted by a SIM swapping scam or identity theft? Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2025 CyberGuy.com. All rights reserved.  

Continue Reading
Advertisement

Trending