Technology
Beware of new Android malware hiding in popular apps
A new Android Trojan could be targeting your brand-new device. Even more terrifyingly, it was distributed on the Google Play Store. The virus is posing as innocent apps related to health, games, horoscope, and productivity. Google has removed those apps from the Play Store, but not before they were reportedly downloaded by hundreds of thousands of users worldwide, and they could still be lurking on the web.
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
Image of Android (Kurt “CyberGuy” Knutsson)
What is Xamalicious and how does it work?
The Xamalicious Trojan uses innocent apps to bypass your accessibility features. It then takes over your phone using features that are normally locked down to take control of your device. Specifically, the Trojan scans your device for any information it can use in a hack: your OS, location, contacts, passwords, and more. It then executes a code to take over your device and take your information.
So far, the virus has been attached to 13 apps on Google Play that have since been deleted. Google removing an app from its store doesn’t delete it from your device. If you have any of the following apps installed, delete them immediately:
- Step Keeper: Easy Pedometer
- Track Your Sleep
- Essential Horoscope for Android
- 3D Skin Editor for PE Minecraft
- Logo Maker Pro
- Auto Click Repeater
- Count Easy Calorie Calculator
- Sound Volume Extender
- LetterLink
- Numerology: Personal Horoscope & Number Predictions
- Sound Volume Booster
- Astrological Navigator: Daily Horoscope & Tarot
- Universal Calculator
The virus doesn’t work alone either. McAfee researchers found a link to another app called Cash Magnet, which can be installed by Xamalicious. That app automatically clicks ads, installs apps, sends messages, and other actions to fraudulently steal money.
Woman holding Android (Kurt “CyberGuy” Knutsson)
MORE: THIS STEALTHY ANDROID MALWARE CAN STEAL YOUR MONEY AND INVADE YOUR PRIVACY
How to protect yourself from Xamalicious
It’s important to note that these apps might be available on third-party app markets or online.
1) Stick to official app stores
First, stick to official app stores like the Google Play Store, Amazon Appstore or Samsung Galaxy Store. They all have safeguards in place to detect malware, albeit not 100%. Android users are protected by Google Play Protect, which can warn you of identified malicious apps on Android devices, but this does not guarantee that all apps are safe.
2) Sideloading is a bad idea
Also, this story is a good reminder why sideloading is a bad idea. Sideloading is when you download an app straight off of a website. While it can be convenient, you never know what might be lurking in those files.
3) Have good antivirus software on all your devices
You should always have good antivirus software running on all your devices. Antivirus software helps protect you from clicking on potentially malicious links or from downloading any dangerous viruses like the Xamalicious Trojan, which could allow hackers to gain access to your personal information. Get my picks for the best antivirus protection winners for your Windows, Mac, Android & iOS devices.
Image of Android (Kurt “CyberGuy” Knutsson)
MORE: BEWARE OF THESE POPULAR ANDROID APPS CONTAINING DECEPTIVE ADWARE
What should you do if your data is compromised?
If malware has already invaded your device, then you should take immediate action to minimize the damage and secure your device. Here are some steps that you can follow.
Change your passwords
Xamalicious can give hackers access to your online accounts and your personal or financial information. To prevent this, you should change your passwords for all your important accounts as soon as possible. However, you should not do this on your infected device, because the hacker might see your new passwords. Instead, you should use ANOTHER DEVICE, such as your laptop or desktop, to change your passwords. Make sure you use strong and unique passwords that are difficult to guess or break. You can also use a password manager to generate and store your passwords securely.
Monitor your accounts and transactions
You should check your online accounts and transactions regularly for suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or the authorities as soon as possible. You should also review your credit reports and scores to see signs of identity theft or fraud.
Use identity theft protection
Xamalicious can access everything on your Android device, including your personal and financial information. Hackers can use this information to create fake accounts in your name, access your existing accounts, and pretend to be you online. This can cause serious damage to your identity and credit score.
To avoid this, you should use identity theft protection services. These services can track your personal information, such as your home title, Social Security Number (SSN), phone number, and email address, and notify you if they detect any suspicious activity. They can also help you freeze your bank and credit card accounts to stop hackers from using them. Read more of my review of best identity theft protection services here.
Contact your bank and credit card companies
If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should contact your bank and credit card companies and inform them of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges, and issue new cards for you.
Alert your contacts
If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.
Restore your device to factory settings
If you want to make sure that your device is completely free of any malware or spyware, you can restore it to factory settings. This will erase all your data and settings and reinstall the original Android version. You should back up your important data before doing this, and only restore it from a trusted source.
MORE: THE 7 SIGNS YOU’VE BEEN HACKED
Kurt’s key takeaways
Viruses like Xamalicious aren’t anything to mess around with, especially when you consider they got around Google’s strict guidelines. That’s why it’s so important that you stay vigilant in the app store. Only download apps from trusted publishers and read reviews.
Are you worried about Xamalicious? What steps are you taking to protect yourself? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Ideas for using those Holiday Gift cards:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Plaud updates the NotePin with a button
Plaud has updated its compact NotePin AI recorder. The new NotePin S is almost identical to the original, except for one major difference: a button. It’s joined by a new Plaud Desktop app for recording audio in online meetings, which is free to owners of any Plaud Note or NotePin.
The NotePin S has the same FitBit-esque design as the 2024 original and ships with a lanyard, wristband, clip, and magnetic pin, so you can wear it just about any way you please — now all included in the box, whereas before the lanyard and wristband were sold separately.
It’s about the same size as the NotePin, comes in the same colors (black, purple, or silver), offers similar battery life, and still supports Apple Find My. Like the NotePin, it records audio and generates transcriptions and summaries, whether those are meeting notes, action points, or reminders.
But now it has a button. Whereas the first NotePin used haptic controls, relying on a long squeeze to start recording, with a short buzz to let you know it worked, the S switches to something simpler. A long press of the button starts recording, a short tap adds highlight markers. Plaud’s explanation for the change is simple: buttons are less ambiguous, so you’ll always know you’ve successfully pressed it and started recording, whereas original NotePin users complained they sometimes failed to record because they hadn’t squeezed just right.
AI recorders like this live or die by ease of use, so removing a little friction gives Plaud better odds of survival.
Alongside the NotePin S, Plaud is launching a new Mac and PC application for recording the audio from online meetings. Plaud Desktop runs in the background and activates whenever it detects calls from apps including Zoom, Meet, and Teams, recording both system audio and from your microphone. You can set it to either record meetings automatically or require manual activation, and unlike some alternatives it doesn’t create a bot that joins the call with you.
Recordings and notes are synced with those from Plaud’s line of hardware recorders, with the same models used for transcription and generation, creating a “seamless” library of audio from your meetings, both online and off.
Plaud Desktop is available now and is free to anyone who already owns a Plaud Note or NotePin device. The new NotePin S is also available today, for $179 — $20 more than the original, which Plaud says will now be phased out.
Technology
OpenAI admits AI browsers face unsolvable prompt attacks
NEWYou can now listen to Fox News articles!
Cybercriminals don’t always need malware or exploits to break into systems anymore. Sometimes, they just need the right words in the right place. OpenAI is now openly acknowledging that reality. The company says prompt injection attacks against artificial intelligence (AI)-powered browsers are not a bug that can be fully patched, but a long-term risk that comes with letting AI agents roam the open web. This raises uncomfortable questions about how safe these tools really are, especially as they gain more autonomy and access to your data.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
NEW MALWARE CAN READ YOUR CHATS AND STEAL YOUR MONEY
AI-powered browsers can read and act on web content, which also makes them vulnerable to hidden instructions attackers can slip into pages or documents. (Kurt “CyberGuy” Knutsson)
Why prompt injection isn’t going away
In a recent blog post, OpenAI admitted that prompt injection attacks are unlikely to ever be completely eliminated. Prompt injection works by hiding instructions inside web pages, documents or emails in ways that humans don’t notice, but AI agents do. Once the AI reads that content, it can be tricked into following malicious instructions.
OpenAI compared this problem to scams and social engineering. You can reduce them, but you can’t make them disappear. The company also acknowledged that “agent mode” in its ChatGPT Atlas browser increases risk because it expands the attack surface. The more an AI can do on your behalf, the more damage it can cause when something goes wrong.
OpenAI launched the ChatGPT Atlas browser in October, and security researchers immediately started testing its limits. Within hours, demos appeared showing that a few carefully placed words inside a Google Doc could influence how the browser behaved. That same day, Brave published its own warning, explaining that indirect prompt injection is a structural problem for AI-powered browsers, including tools like Perplexity’s Comet.
This isn’t just OpenAI’s problem. Earlier this month, the National Cyber Security Centre in the U.K. warned that prompt injection attacks against generative AI systems may never be fully mitigated.
FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE
Prompt injection attacks exploit trust at scale, allowing malicious instructions to influence what an AI agent does without the user ever seeing it. (Kurt “CyberGuy” Knutsson)
The risk trade-off with AI browsers
OpenAI says it views prompt injection as a long-term security challenge that requires constant pressure, not a one-time fix. Its approach relies on faster patch cycles, continuous testing, and layered defenses. That puts it broadly in line with rivals like Anthropic and Google, which have both argued that agentic systems need architectural controls and ongoing stress testing.
Where OpenAI is taking a different approach is with something it calls an “LLM-based automated attacker.” In simple terms, OpenAI trained an AI to act like a hacker. Using reinforcement learning, this attacker bot looks for ways to sneak malicious instructions into an AI agent’s workflow.
The bot runs attacks in simulation first. It predicts how the target AI would reason, what steps it would take and where it might fail. Based on that feedback, it refines the attack and tries again. Because this system has insight into the AI’s internal decision-making, OpenAI believes it can surface weaknesses faster than real-world attackers.
Even with these defenses, AI browsers aren’t safe. They combine two things attackers love: autonomy and access. Unlike regular browsers, they don’t just display information, but also read emails, scan documents, click links and take actions on your behalf. That means a single malicious prompt hidden in a webpage, document or message can influence what the AI does without you ever seeing it. Even when safeguards are in place, these agents operate by trusting content at scale, and that trust can be manipulated.
THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS
As AI browsers gain more autonomy and access to personal data, limiting permissions and keeping human confirmation in the loop becomes critical for safety. (Kurt “CyberGuy” Knutsson)
7 steps you can take to reduce risk with AI browsers
You may not be able to eliminate prompt injection attacks, but you can significantly limit their impact by changing how you use AI tools.
1) Limit what the AI browser can access
Only give an AI browser access to what it absolutely needs. Avoid connecting your primary email account, cloud storage or payment methods unless there’s a clear reason. The more data an AI can see, the more valuable it becomes to attackers. Limiting access reduces the blast radius if something goes wrong.
2) Require confirmation for every sensitive action
Never allow an AI browser to send emails, make purchases or modify account settings without asking you first. Confirmation breaks long attack chains and gives you a moment to spot suspicious behavior. Many prompt injection attacks rely on the AI acting quietly in the background without user review.
3) Use a password manager for all accounts
A password manager ensures every account has a unique, strong password. If an AI browser or malicious page leaks one credential, attackers can’t reuse it elsewhere. Many password managers also refuse to autofill on unfamiliar or suspicious sites, which can alert you that something isn’t right before you manually enter anything.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com
4) Run strong antivirus software on your device
Even if an attack starts inside the browser, antivirus software can still detect suspicious scripts, unauthorized system changes or malicious network activity. Strong antivirus software focuses on behavior, not just files, which is critical when dealing with AI-driven or script-based attacks.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
5) Avoid broad or open-ended instructions
Telling an AI browser to “handle whatever is needed” gives attackers room to manipulate it through hidden prompts. Be specific about what the AI is allowed to do and what it should never do. Narrow instructions make it harder for malicious content to influence the agent.
6) Be careful with AI summaries and automated scans
When an AI browser scans emails, documents or web pages for you, remember that hidden instructions can live inside that content. Treat AI-generated actions as drafts or suggestions, not final decisions. Review anything the AI plans to act on before approving it.
7) Keep your browser, AI tools and operating system updated
Security fixes for AI browsers evolve quickly as new attack techniques emerge. Delaying updates leaves known weaknesses open longer than necessary. Turning on automatic updates ensures you get protection as soon as they’re available, even if you miss the announcement.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaway
There’s been a meteoric rise in AI browsers. We’re now seeing them from major tech companies, including OpenAI’s Atlas, The Browser Company’s Dia, and Perplexity’s Comet. Even existing browsers like Chrome and Edge are pushing hard to add AI and agentic features into their current infrastructure. While these browsers can be useful, the technology is still early. It’s best not to fall for the hype and to wait for it to mature.
Do you think AI browsers are worth the risk today, or are they moving faster than security can keep up? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Surprise, surprise: Silksong wins Steam’s Game of the Year
Valve has announced the winners of the 2025 Steam Awards and, unsurprisingly, Hollow Knight: Silksong, took home the Game of the Year honors. It was also given the “Best Game You Suck At” award, which, I’m not sure if that’s a good thing or not. Given the relentless fawning over Silksong since its release in September, an event that nearly brought the entire digital video game distribution system to its knees, that it would win Game of the Year felt like something of a forgone conclusion.
The Best Game on Steam Deck was awarded to Hades II (an award we’d already unofficially granted it). The mechanics of Hades lend it to being played in short bursts, and the stylized graphics scale down well. Silent Hill f won the Outstanding Visual Style award and, while there’s no denying it’s a gorgeous title, I can’t help but feel like Dream BBQ, with its uniquely hallucinatory visuals, got robbed. Check out the full list of winners and nominees here at the Steam Awards 2025 landing page.
-
World7 days agoHamas builds new terror regime in Gaza, recruiting teens amid problematic election
-
Indianapolis, IN1 week agoIndianapolis Colts playoffs: Updated elimination scenario, AFC standings, playoff picture for Week 17
-
Business1 week agoGoogle is at last letting users swap out embarrassing Gmail addresses without losing their data
-
Southeast1 week agoTwo attorneys vanish during Florida fishing trip as ‘heartbroken’ wife pleads for help finding them
-
World1 week agoSnoop Dogg, Lainey Wilson, Huntr/x and Andrea Bocelli Deliver Christmas-Themed Halftime Show for Netflix’s NFL Lions-Vikings Telecast
-
Politics1 week agoMost shocking examples of Chinese espionage uncovered by the US this year: ‘Just the tip of the iceberg’
-
World1 week agoPodcast: The 2025 EU-US relationship explained simply
-
News1 week agoRoads could remain slick, icy Saturday morning in Philadelphia area, tracking another storm on the way