Technology
Android fixes 129 security flaws in major phone update
NEWYou can now listen to Fox News articles!
Most people never think about Android security updates until a headline like this appears. Suddenly, your phone, the device you use for messages, banking, photos and work, becomes part of a global cybersecurity story.
That is exactly what happened this week. Google released its latest Android security updates, and they fix a massive 129 vulnerabilities. Even more concerning, one of them is already being exploited by attackers.
The flaw targets a component connected to Qualcomm graphics hardware, and researchers say it has already been used in limited targeted attacks. If you use an Android phone, this is the kind of update you want installed as soon as possible.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK
Google’s March Android security update fixes 129 vulnerabilities, including a zero-day flaw already exploited in targeted attacks. (Firdous Nazir/NurPhoto via Getty Images)
Android security flaw already targeted by attackers
One vulnerability in particular has security researchers paying close attention. The flaw is tracked as CVE-2026-21385. Google says there are signs it is already being used in targeted attacks. That makes it a zero-day vulnerability.
In simple terms, attackers discovered the flaw before many devices received a fix. According to Qualcomm, the problem is tied to the graphics processing component inside many of its chipsets. Specifically, the issue involves something called an integer overflow. That technical term means a calculation error can cause memory corruption inside the system. Once that happens, attackers may gain a foothold on the device.
Qualcomm says the flaw impacts 235 different chipsets, which means a large number of Android phones could be affected. Google’s Threat Analysis Group discovered the issue and reported it through coordinated disclosure practices. Qualcomm then worked with device makers to release patches.
Why the Android security vulnerability is dangerous
Several of the patched vulnerabilities allow attackers to execute code remotely or gain elevated privileges on a device. One issue inside the Android System component is especially concerning. Google says it could allow remote code execution without any user interaction.
That means an attacker may exploit the flaw without the victim tapping a link or installing an app. In cybersecurity terms, that type of vulnerability ranks among the most dangerous.
The March Android bulletin addresses ten critical flaws across the System, Framework and Kernel components. These parts sit at the core of Android, so any weakness there can ripple across millions of devices.
ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP
Android users are urged to install the latest security patch as manufacturers roll out updates across devices. (Barrington Coombs/PA Images via Getty Images)
Why some Android phones get security updates faster
Google released two patch levels for this update:
- 2026-03-01 security patch level
- 2026-03-05 security patch level
The second update includes everything in the first, plus fixes for additional hardware components and third-party software. Google Pixel devices typically receive updates immediately. However, many Android users must wait longer.
Phone manufacturers such as Samsung, Motorola and OnePlus often test the patches before releasing them for specific models. Carriers may also delay updates while they verify compatibility. As a result, some users receive security patches quickly while others wait weeks.
How to protect your Android phone from security threats
Security vulnerabilities are a reality in modern software. The good news is that there are several simple steps that can greatly reduce your risk.
1) Install Android updates quickly
Check for updates regularly and install them as soon as they appear. On most devices, go to Settings, tap Security and privacy or Software update, then select Check for updates and install the latest version if one is available. Security updates often fix vulnerabilities that attackers may already be trying to exploit.
2) Avoid apps from unknown sources
Only download apps from trusted stores like Google Play. Third-party app stores pose a higher risk of malware.
3) Keep Google Play Protect enabled
Google Play Protect, which is built-in malware protection for Android devices, scans apps for malicious behavior and warns you if something suspicious appears. It also automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Therefore, we recommend strong antivirus software because it adds another layer of protection by using deeper threat detection, real-time monitoring and broader malware databases that can catch suspicious apps or files that Google Play Protect may overlook. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
4) Use strong device security
Set a strong passcode on your phone and turn on fingerprint or face unlock if your device supports it. This helps keep strangers out of your phone if it is lost or stolen.
5) Be cautious with suspicious links
Many attacks still start with phishing messages. Avoid tapping unknown links in texts, emails, or social media messages.
YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT
A critical Android zero-day tied to Qualcomm chipsets could allow attackers to gain a foothold on affected devices. (Donato Fasano/Getty Images)
The bigger picture behind Android security updates
This Android update also highlights how modern mobile security works behind the scenes. Google’s Threat Analysis Group frequently discovers vulnerabilities that may already be used in real-world attacks. Those findings trigger coordinated responses involving chip manufacturers, phone makers and security researchers. In this case, Qualcomm received the report in December and provided fixes to device makers in early 2026.
By the time the public bulletin arrived, patches were already moving through the Android ecosystem. The process may look slow from the outside. In reality, it involves dozens of companies working together to prevent widespread exploitation.
Kurt’s key takeaways
Security updates rarely feel exciting. Yet they play a critical role in protecting billions of smartphones around the world. This latest Android update proves that point clearly. A zero-day flaw tied to Qualcomm graphics hardware was already being targeted before many users even knew it existed. Installing updates quickly remains one of the simplest ways to protect your device and your personal data. Most of the time, the update only takes a few minutes. Those few minutes can block attacks that might otherwise compromise your phone. So the next time your Android device prompts you to install a security patch, the better question may be this:
When your phone asks for a security update, do you install it immediately or tap remind me later? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Slay the Spire II is even better with a friend
Slay the Spire II launched in early access last week, and it’s already an excellent sequel to one of the best roguelikes of all time. In many ways, it’s very similar to its predecessor. Like Hades II and Hollow Knight: Silksong, Slay the Spire II mostly iterates on an already superb foundation. But it does add online co-op with up to four players. While multiplayer changes the familiar rhythms of Slay the Spire just a bit, it’s still a great way to tackle the arduous climb up the spire.
A round of Slay the Spire II plays essentially the same as the original: In each run, you navigate three different acts across a winding map, slowly making a build by crafting your deck and picking up various perk-giving relics, and fighting enemies, elites, and bosses along the way. Slay the Spire II retains the deliberate, turn-based style of play, meaning that when it’s your turn, you have as much time as you want to decide what to do. Since you can see exactly what your enemies are planning for their next turn, there’s a lot of strategy in deciding how much damage to do and how much defense you might need to set up. Multiplayer adds a slight twist: When it’s your turn, everyone can play simultaneously. That opens up all sorts of new opportunities for planning, but it also requires communication to make sure everyone is using their cards effectively.
My multiplayer partner was my wife, the biggest Slay the Spire fan I know, and on our second run we got a thrilling victory. I played the new Necrobinder character, a necromancer, while she played as the returning Silent, which can make decks built around flurries of shivs. Over the course of the run, we accidentally settled into a strategy where I focused on applying the Vulnerable status to as many enemies as possible before my wife would rain down shivs upon our foes.
Slay the Spire II doesn’t encourage teamwork only in battles. At a campfire rest stop, you can choose to mend a friend’s health to help them out. (Some of the new enemies are tough, so I’m glad this is an option.) You each get a vote on which path to take next on the map. Everyone can draw on the map, too — as I learned many times after seeing the doodles my wife made when I would spend too long in the shop.
Since we had to communicate so much, our winning run took about an hour and a half, slower than how fast I could blast through runs in the first game. When we finally defeated the Act 3 boss, though, it was even more satisfying than most of my solo wins because we did it together. My one complaint is that co-op requires you to each play online on your own copy of the game, and that, because there’s no couch co-op, we each had to play on separate devices even though we were sitting on the couch right next to each other.
Those are annoying tradeoffs, but multiplayer is such a fun addition to Slay the Spire that I don’t mind. I can’t wait to try another multiplayer run and see what challenges — and doodles — are in store for me.
Technology
Apple smart home display rumors now point to a fall launch with iOS 27
The rumored “HomePod with a screen” we’ve heard so much about was reportedly lined up for launch in 2025, and then this spring, and now, according to the latest updates, it’s on the shelf until this fall. Leaker Kosutami posted as much on X last week, and today, Bloomberg reporter Mark Gurman followed up with similar information, saying its robot arm-equipped cousin is now planned for launch in 2027.
That was supposed to be ready by now, but it is now predicted to arrive later this year, along with the iPhone 18 Pro plus 2027 updates for iOS, macOS, and all the rest. He describes a silver aluminum-cased device with a 7-inch screen and USB-C power port running a version of tvOS 27, while new versions of the HomePod speaker and Apple TV 4K box are also waiting in the wings for that Siri update, and a smart home sensor is in the works, too.
Technology
Fake Google Gemini AI pushes ‘Google Coin’ crypto scam
NEWYou can now listen to Fox News articles!
You may think you can spot a crypto scam from a mile away. But what if the pitch comes from what looks like an official Google AI assistant, answering your questions in real time and showing projected profits? That is exactly what scammers are doing now. Security researchers at Malwarebytes, a cybersecurity company known for tracking malware and online scams, recently uncovered a live “Google Coin” presale site featuring a chatbot that claimed to be Google’s Gemini AI.
The bot walked visitors through an investment pitch, gave detailed return estimates and guided them to send cryptocurrency payments. Google does not have a cryptocurrency. Yet the site looked polished and professional, convincing enough to appear legitimate at first glance.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
BE AWARE OF EXTORTION SCAM EMAILS CLAIMING YOUR DATA IS STOLEN
Security researchers at Malwarebytes uncovered a polished crypto scam that falsely claims Google launched a new digital coin. (Photo by Helena Dolderer/picture alliance via Getty Images)
What you need to know about the “Google Coin” crypto scam
Researchers discovered a fraudulent website promoting a fake cryptocurrency called “Google Coin.” The site was designed to look like it belonged to Google and claimed the project was connected to its AI assistant, Gemini.
At the center of the scam was a chatbot that introduced itself as “Gemini, your AI assistant for the Google Coin platform.” It used familiar branding and visuals to make visitors believe they were interacting with a legitimate Google product.
When asked simple investment questions, the chatbot gave specific financial projections. For example, it claimed that buying 100 tokens at $3.95 each could turn into more than $2,700 once the coin was “listed.” The site displayed fake progress counters, countdowns and claims of millions of tokens already sold. Once someone clicked “Buy,” they were instructed to send Bitcoin to a specific wallet address. The payment was final and irreversible.
There is no official Google Coin. The entire operation was built to collect cryptocurrency from unsuspecting investors.
How the “Google Coin” crypto scam works
This scam combines two powerful tricks: brand impersonation and artificial intelligence. First, the scammers created a website that mimics Google’s look and feel, including logos, design, and tech language. Then they layered in a chatbot that acts like a real AI assistant. Because many people are now used to chatting with AI tools, this interaction seemed normal and legitimate.
The chatbot is programmed with a tight script. It answers questions confidently, avoids admitting risk, and refuses to acknowledge the possibility of a scam. If you ask about company registration or regulation, it deflects with vague promises about security and transparency.
This means you are not debating with a clumsy scammer over email. You are interacting with software designed to persuade you around the clock. The chatbot can talk to hundreds of people at once, give each one personalized answers and push them toward sending cryptocurrency. Once you send it, your money is gone.
This type of scam is dangerous because it’s interactive and appears credible. When a chatbot answers your questions in real time, it can lower your guard. You might think, “If this were fake, it would not sound so professional.” But that is exactly the point. AI allows scammers to scale up their confidence and polish.
If you fall for it, the financial loss can be immediate and permanent. Cryptocurrency payments cannot be reversed like credit card charges. There is no customer support line to call. There is no refund process.
Even worse, once you engage with a scam site, your contact details, email or wallet address could be added to lists that circulate among fraud groups. That can make you a target for future investment scams, phishing emails or impersonation attempts.
We reached out to Google for comment but did not hear back before our deadline.
SPOTIFY VOTING SCAM EXPOSED
Scammers are using a fake “Google Coin” presale site with a chatbot posing as Google’s Gemini AI to lure investors into sending cryptocurrency. (Photo by Thomas Trutschel/Photothek via Getty Images)
7 ways you can protect yourself from a crypto scam
Crypto scams are getting more sophisticated, especially with AI tools that make fake investments look polished and legitimate. The good news is that you can dramatically lower your risk by taking a few smart precautions before you invest or send any digital currency.
1) Be skeptical of “new” coins tied to famous brands
If you see a cryptocurrency claiming to be launched by a well-known company, verify it directly on the company’s official website. Major corporations publicly announce major financial products. If you cannot find confirmation on the company’s real domain, assume it is fake and walk away.
2) Never trust guaranteed or specific return projections
No legitimate investment can promise that your $395 will turn into $2,700. When a chatbot gives exact future prices or guaranteed multipliers, that is a red flag. Real investments carry risk and uncertainty. Promises of quick, predictable profits are classic scam tactics.
3) Use a password manager
A password manager creates strong, unique passwords for each of your accounts and stores them securely. If scammers trick you into entering credentials on a fake site, unique passwords prevent them from accessing your other accounts. Many password managers also alert you if your information appears in known data breaches. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
4) Install antivirus software
Strong antivirus software helps detect malicious websites, phishing attempts, and suspicious downloads before they can harm your device. It adds another layer of protection if you accidentally click a dangerous link. This can stop hidden malware from being installed while you are distracted by a convincing scam pitch. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
5) Consider identity theft protection
An identity theft protection service monitors your personal information, such as your Social Security number or email, and alerts you if it is being misused. If scammers collect your details through a fake investment site, early alerts can help you act quickly before financial damage spreads. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.
6) Use a personal data removal service
Data removal services work to remove your personal details from public data broker sites. The less personal information available about you online, the harder it is for scammers to target you with personalized pitches. Reducing your digital footprint lowers your overall exposure to fraud. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
7) Slow down before sending cryptocurrency
Crypto payments are fast and irreversible. Before sending any digital currency, pause and verify the recipient independently. Search for reviews, warnings, and official announcements. If the investment requires urgency, such as a countdown or “final stage” message, treat that pressure as a warning sign.
300,000 CHROME USERS HIT BY FAKE AI EXTENSIONS
The AI-powered scam mimics Google branding and uses real-time chat to build trust before requesting irreversible crypto payments. Google does not have a cryptocurrency, despite claims on a convincing “Google Coin” investment website. (Photo by Thomas Trutschel/Photothek via Getty Images)
Kurt’s key takeaway
Scammers are no longer relying only on clumsy emails or obvious red flags. They are using artificial intelligence to create polished, persuasive conversations that feel real and responsive. When that fake AI wears the face of a trusted brand, it becomes even more convincing. The good news is that awareness is powerful. If you take a moment to verify claims, question guaranteed returns, and use protective tools, you dramatically reduce your risk.
Do you think AI is making online scams harder to recognize than they were a few years ago? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
-
Wisconsin1 week agoSetting sail on iceboats across a frozen lake in Wisconsin
-
Massachusetts1 week agoMassachusetts man awaits word from family in Iran after attacks
-
Maryland1 week agoAM showers Sunday in Maryland
-
Pennsylvania5 days agoPa. man found guilty of raping teen girl who he took to Mexico
-
Florida1 week agoFlorida man rescued after being stuck in shoulder-deep mud for days
-
Sports6 days agoKeith Olbermann under fire for calling Lou Holtz a ‘scumbag’ after legendary coach’s death
-
Virginia6 days agoGiants will hold 2026 training camp in West Virginia
-
Politics1 week agoMamdani’s response to Trump’s Iran strike sparks conservative backlash: ‘Rooting for the ayatollah’