Connect with us

Technology

Cellphone nightmare leads to ported numbers, identity theft and fight for recovery

Published

on

Cellphone nightmare leads to ported numbers, identity theft and fight for recovery

Imagine this scenario: You’re going about your day, and suddenly you can’t make calls or send texts. Little did you know, but you’ve become the latest victim of a ported phone number scam, a devious tactic in which hackers hijack your phone number to take over your identity.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

A woman talking on her cellphone (Kurt “CyberGuy” Knutsson)

What is the ported phone number scam?

A CyberGuy Report subscriber contacted us to share that they’ve been a victim of a ported phone number scam. Also known as a SIM swapping or port-out scam, this is when a hacker steals a victim’s phone number to gain control over it. Once they have control, they use that number to commit identity theft by gaining access to their other accounts.

A man typing on his cellphone (Kurt “CyberGuy” Knutsson)

Advertisement

MORE: TV HOST ANDY COHEN SWINDLED IN COSTLY BANK SCAM: HOW TO AVOID BECOMING A VICTIM YOURSELF

How hackers hijack your identity via ported phone number scam

Though there are several ways they may go about porting a victim’s phone number, one of the most common ways is to use your stolen personal information in order to call your mobile provider, pass their security checks, and once they are through, they request that the number be ported to a new carrier or transferred to a new SIM card that they have sent to them.

Once the scammer successfully ports the phone number, they receive all the calls and messages intended for the victim. This access allows them to bypass security measures like two-factor authentication (2FA) that sends a code via text message to the phone number associated with an account.

With this power, the scammer can use this method to reset passwords and gain unauthorized access to your personal accounts, whether it be a social media account, online bank account or another account. Once they continue to gain access to your other various accounts, there’s no telling what else they can do.

Image of bank cards (Kurt “CyberGuy” Knutsson)

Advertisement

MORE: WHAT TO DO WHEN YOUR OWN NUMBER APPEARS TO RING YOUR HOME PHONE

How to protect yourself from ported number scams in the future

If you manage to pull yourself out of identity theft once, chances are you’ll do whatever it takes to ensure you don’t end up in that position again. All this being said, it’s important not to blame yourself. Scammers are very sophisticated, and they are always looking for ways to stay one step ahead of their victims. So, do what you can to stay one step ahead of them:

1) Secure your phone number: If you can take any extra measures to keep your phone number safe, don’t think twice. For instance, add a secondary security code or PIN on your Android or iPhone.

2) Enable two-factor authentication (2FA): This adds an extra layer of security to all of your accounts.

3) Secure your email account: Just as you would for your phone, add extra verification methods when possible and notifications if someone logs into your account from another device.

Advertisement

4) Secure your other accounts: Take the same measures for your other accounts, like your bank or social media accounts. For instance, ask to receive notifications every time there is activity on the account, so you can monitor it and quickly determine if that activity was made by you or someone else.

5) Limit who you give your number to: Be cautious about who you share your phone number with.

6) Consider using a secondary or burner number for online use: This can help protect your primary phone number.

7) Change your password: Use a strong password that’s more than 12 characters (if applicable) and a mix of numbers and upper and lowercase letters. Consider using a password manager to generate and store complex passwords.

8) Be cautious with emails: Don’t open attachments or click links in emails unless you are positive that they are safe. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

Advertisement

How do you know if your identity has been stolen?

You might become aware of a ported phone number scam when your mobile service is unexpectedly interrupted because your number has been ported to a different carrier’s SIM card. Such incidents could escalate into full-blown identity theft.

A scammer might exploit one-time passwords (OTPs) – unique codes sent to your phone for security verification – to unlawfully access all the data on your device, including credit card details. This breach could result in you being barred from your own accounts.

When a scammer successfully ports your phone number to a different carrier’s SIM card, they can receive these OTPs intended for you. This allows them to bypass security measures and gain unauthorized access to your accounts, such as email, banking and social media, potentially leading to identity theft.

Regaining control of your phone number and securing any accounts that were compromised is often a difficult and lengthy process. This underscores the need for you to be proactive, protect your personal information and stay alert for any unusual activities on your accounts.

Woman holding bank card (Kurt “CyberGuy” Knutsson)

Advertisement

MORE: WHY YOU NEED AN IDENTITY PROTECTION PIN THIS TAX SEASON

What to do if a scammer takes your identity

If you discover that your identity has been stolen – whether through this phone port scam or another type of identity theft – there are a few steps you should take.

Report the theft to your local police department: Some businesses may require a police report to remove fraudulent debts from your account.

Visit IdentityTheft.gov: This website helps you recover from identity theft. You can answer questions about what happened to you, get your Identity Theft Report and create a recovery plan just for you.

Contact your credit card companies: Inform them about the situation and follow their procedures for securing your accounts. You may need to close your current accounts and open new ones.

Advertisement

Check your credit reports: Look for any accounts or charges you did not make and report them.

Place a fraud alert on your credit reports: This makes it hard for someone else to open new accounts in your name.

Use an identity theft protection service: Identity Theft companies can monitor personal information like your Social Security Number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

Smartphone with sim card (Kurt “CyberGuy” Knutsson)

MORE: HOW TO STOP PHONE NUMBER SPOOFING AND PROTECT YOURSELF FROM SCAMMERS

Advertisement

Kurt’s key takeaways

Unfortunately, once a scammer steals your identity, it can be very arduous to get it back. That being said, there are steps you can take to reclaim your identity while ensuring that your number doesn’t get ported again in the future.

What measures do you think mobile carriers should implement to prevent ported phone number scams? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Advertisement

Copyright 2024 CyberGuy.com. All rights reserved.

Technology

Use this map to find the data centers in your backyard

Published

on

Use this map to find the data centers in your backyard

When Oregon resident Isabelle Reksopuro heard Google was gobbling up public land to fuel its data centers in her home state, she didn’t initially know what to believe. “There’s a lot of misinformation about data centers,” she said. “Google has denied taking that land.”

Technically, she explains, The Dalles, a city near the Washington state border, sought to reclaim that land, “and Google is just a big, unnamed power user.” The city had in fact asked for ownership of a 150-acre portion of Mount Hood National Forest, claiming it needs access to Mount Hood’s watershed to meet municipal needs as its population — 16,010 as of the 2020 census — grows. But critics, including environmentalists, say the city is trying to secure more water for Google, which has a sprawling data center campus in The Dalles that already consumes about one-third of the city’s water supply.

This controversy made Reksopuro curious about the backlash to data centers being built in other communities. So Reksopuro, a student at the University of Washington who studies the connections between tech and public policy, decided to map it out. Using information collected by Epoch AI and data scraped from legislation on data centers, she built an interactive map tracking AI policy around the world. She designed it to be simple enough for anyone to use. “I wanted it to be something that my younger sisters could play through and explore to understand what are the data centers in the area and what’s actually being done about it,” Reksopuro said. She hoped to shift their opinions that way, “instead of like, through TikTok.”

Four times a day, the map searches for new sources and checks them against the existing database Reksopuro built out. “Once it does that, it will write a new summary, add it to the news feed, and populate it on the sidebar,” she said. “I wanted it to be self-updating, since I’m also a student.”

Reksopuro isn’t against data centers, but she thinks tech giants benefit from a lack of transparency around data center policies. “Right now, it’s this really opaque thing — and all of a sudden, there’s a facility,” she said. “I think that if people knew about data centers beforehand, it would give them leverage. They would be able to negotiate: ask for job training programs, tax revenue, environmental monitoring, things to improve their community.”

Advertisement
Continue Reading

Technology

Fox News AI Newsletter: Graduation speaker praises AI, gets instantly booed

Published

on

Fox News AI Newsletter: Graduation speaker praises AI, gets instantly booed

NEWYou can now listen to Fox News articles!

 

Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

IN TODAY’S NEWSLETTER:

– UCF graduates clobber commencement speaker with boos after she says AI is the ‘next Industrial Revolution’

– OPINION: DIRECTOR KASH PATEL: We brought the FBI out of the past and into the AI age

Advertisement

– OpenAI backs creation of global AI governance body led by the U.S. that would include China as a member

TOUGH CROWD: During a recent commencement ceremony at the University of Central Florida, a speaker was met with loud boos from the graduating class after declaring that artificial intelligence represents the next industrial revolution. Fox News Digital reporting captures this tense cultural moment, illustrating the mixed public sentiment and skepticism surrounding AI’s growing footprint in daily life.

A statue on the campus of the University of Central Florida in Orlando, Florida. (iStock)

BADGE MEETS BYTE: Reflecting on the modernization of national security in a Fox News op-ed, FBI Director Kash Patel explores how the bureau must adapt its strategies to address modern threats and advance beyond the artificial intelligence age.

TECH DIPLOMACY: OpenAI is throwing its support behind the establishment of a new global artificial intelligence governance organization that would be led by the United States while notably including China as a member. Fox News Digital reporting examines the geopolitical dynamics and regulatory implications of this proposed framework as global powers race to set the standards for AI development.

Advertisement

EQUITY ELEVATION: The massive wave of wealth generated by the explosive growth of ChatGPT and the broader AI industry is driving a sudden surge in the San Francisco Bay Area’s luxury real estate market. Fox News Digital reporting breaks down how the influx of new tech capital is reshaping local housing dynamics and fueling a high-end property frenzy.

FBI Director Kash Patel listened as Acting Attorney General Todd Blanche spoke during a press conference at the Department of Justice on April 28, 2026, in Washington, D.C. (Tasos Katopodis/Getty Images)

STRATEGY RESET: Tech giant Cisco is planning to eliminate thousands of jobs as the company shifts its primary focus to accelerate its artificial intelligence initiatives, a move that comes despite the company beating earnings expectations. Fox News Digital reporting details the corporate restructuring and broader economic trends pushing legacy tech firms to aggressively pivot toward AI.

ROAD HAZARD: Waymo is issuing a sweeping recall of its autonomous vehicle fleet following a concerning incident that highlighted significant safety issues with the self-driving technology. Fox News Digital reporting outlines the specifics of the recall, the nature of the safety flaw, and what this setback means for the future of fully autonomous transportation on public roads.

BOTS IN THE BAY: A newly developed, artificial intelligence-powered robot has been engineered to seamlessly change and balance vehicle tires without human intervention. Fox News Digital reporting showcases this latest innovation, exploring how automation and AI mechanics could soon revolutionize the automotive service and repair industry.

Advertisement

OpenAI CEO Sam Altman speaks during the 2026 Infrastructure Summit in Washington, D.C., on March 11, 2026. (Kylie Cooper/Reuters)

 

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook

Instagram

YouTube

Twitter

Advertisement

LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First

Fox News Opinion

Fox News Lifestyle

Fox News Health

Advertisement

DOWNLOAD OUR APPS

Fox News

FOX Business

Fox Weather

Fox Sports

Tubi

Advertisement

WATCH FOX NEWS ONLINE

Fox News Go

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Continue Reading

Technology

Microsoft’s Edge Copilot update uses AI to pull information from across your tabs

Published

on

Microsoft’s Edge Copilot update uses AI to pull information from across your tabs

Microsoft Edge is adding a new feature that will allow its Copilot AI chatbot to gather information from all of your open tabs. When you start a conversation with Copilot, you can ask the chatbot questions about what’s in your tabs, compare the products you’re looking at, summarize your open articles, and more.

In its announcement, Microsoft says you can “select which experiences you want or leave off the ones you don’t.” The company is retiring Copilot Mode as well, which could similarly draw information from your tabs but offered some agentic features, like the ability to book a reservation on your behalf. Microsoft has since folded these agentic capabilities into its “Browse with Copilot” tool.

Several other AI features are coming to Edge, including an AI-powered “Study and Learn” mode that can turn the article you’re looking at into a study session or interactive quiz. There’s a new tool that turns your tabs into AI-powered podcasts as well, similar to what you’d find on NotebookLM, and an AI writing assistant that will pop up when you start entering text on a webpage.

You can also give Copilot permission to access your browsing history to provide more “relevant, high-quality answers,” according to Microsoft. Copilot in Edge on desktop and mobile will come with “long-term memory” as well, which can tailor its responses based on your previous conversations. And, when you open up a new tab, you’ll see a redesigned page that combines chat, search, and web navigation, along with the Journeys feature, which uses AI to organize your browsing history into categories that you can revisit.

Meanwhile, an update to Edge’s mobile app will allow you to share your screen with Copilot and talk through the questions about what you’re seeing. Microsoft says you’ll see “clear visual cues” when Copilot is active, “so you know when it’s taking an action, helping, listening, or viewing.”

Advertisement
Continue Reading
Advertisement

Trending