Technology
Cloud Storage Full scam steals your photos and money
NEWYou can now listen to Fox News articles!
A new scam is sweeping across smartphones and catching thousands of people off guard. Criminals are sending fake “Cloud Storage Full” or “photo deletion” alerts that claim your images and videos are about to disappear unless you upgrade your storage. The warning looks urgent and real. It even mimics major cloud services. But the moment you click the link, you enter a trap.
Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
How this fast-growing Cloud Storage Full scam tricks victims
Trend Micro researchers recently uncovered this fast-growing phishing campaign after seeing a massive jump in activity. The company reports a 531% month-over-month spike from September to October, which shows how quickly the scheme is spreading.
PROTECT YOUR DATA BEFORE HOLIDAY SHOPPING SCAMS STRIKE
Scammers use convincing storage alerts and fake dashboards to push victims into paying small fees that expose their credit card details. (Pixelfit/Getty Images)
Scammers are sending personalized SMS and iMessage alerts that include your name and a believable count of photos or videos. Once you tap the link, you land on a very convincing fake website that appears to be a cloud storage dashboard. From there, you are urged to pay a tiny $1.99 upgrade fee to prevent deletion. Instead of protecting anything, you hand over your credit card, PayPal login or other personal information.
Trend Micro provided several screenshots and internal samples that reveal how polished the scam has become. The fake sites use progress bars, countdown timers and warnings that your files will be lost. They even simulate a cloud storage layout to match the look of popular platforms.
Jon Clay, VP of Threat Intelligence at Trend Micro, shared an important warning to CyberGuy:
“The recent spike in ‘Cloud Storage Full’ scams shows just how well cybercriminals are perfecting emotional manipulation. These scams prey on fear and urgency, warning users their photos will be deleted unless they pay a small upgrade fee. During a time of year when we may be capturing many precious moments on camera, scammers are targeting older adults who may think this type of scam message is legitimate and who may be worried and anxious about losing something that cannot easily replace. Consumers should always stay cautious of unsolicited messages and always verify alerts directly through official apps or websites.”
Trend Micro’s analysis outlines exactly how the scam works, from the initial message to the final theft. Their screenshots show fake dashboards, false warnings and pages asking for credit card or PayPal details. Some versions even redirect to legitimate sites later to cover their tracks.
How the Cloud Storage Full scam works
Scammers follow a predictable pattern with this scheme, and each stage reveals a clear red flag that can help you spot the danger early.
1) Initial contact
Victims receive an unsolicited SMS or iMessage that claims their photos or videos will be deleted soon. Messages include the person’s first name and fake counts like “1,675 images” or “2,010 snaps” to boost credibility. Scammers add statements like “Act now” or “Final warning” to trigger panic. Each message ends with a short link that leads to a malicious .info domain.
FAKE CHATGPT APPS ARE HIJACKING YOUR PHONE WITHOUT YOU KNOWING
2) Trust building
After tapping the link, the user arrives at a fake “Cloud Storage Full” website. It mirrors the fonts, icons and button styles of real cloud services. Users see alerts such as “Your photos, contacts and private data will be lost.” Everything looks polished to reduce suspicion.
3) The hook
The site claims your storage is completely full and urges a one-time upgrade for $1.99. A progress bar sits at 100 percent full and a countdown timer warns that data will vanish in minutes. The “Continue” button goes to a fake payment page.
4) The exit
Once victims enter credit card or PayPal details, scammers harvest the data instantly. Attackers may use stolen credentials for unauthorized purchases, credential stuffing or resale on dark web markets. Some victims receive fake receipt emails to make the charge look legitimate.
Trend Micro reports that certain scam sites later redirect to real pages like iolo.com to hide their tracks.
Scammers use fake dashboards and alerts to push victims to share payment info. (Kurt “CyberGuy” Knutsson)
Red flags to watch for
- Urgent warnings that your photos will be deleted
- Unfamiliar links ending in .info
- Messages that include your name to appear credible
- Payment requests for tiny fees like $1.99
- Countdown timers meant to force quick decisions
- Sites that look familiar but have unusual URLs
Tips to stay safe from Cloud Storage Full scams
Scammers rely on fear and urgency to push quick decisions, but a few smart habits can shut down their tricks before they start.
1) Verify alerts inside the official app or website
Open your cloud storage app or go to the official website directly. If you see a real problem, it will appear there. This simple step prevents you from reacting to fake warnings.
GHOST-TAPPING SCAM TARGETS TAP-TO-PAY USERS
2) Never tap storage alerts sent through SMS or iMessage, and use strong antivirus software
Break the habit of tapping links in messages. Real cloud services rarely text users about photo deletion. A strong antivirus tool will flag dangerous links before they open.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
3) Use a data removal service
Consider using a reputable data removal service to scrub your personal details from data broker sites. This step makes it harder for scammers to target you with personalized messages that look real.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
4) Watch for strange links
Look closely at every link. Scammers rely on short domains that look suspicious. Legitimate companies avoid shortened URLs and unknown domains.
5) Use multi-factor authentication
Turn on multi-factor authentication (MFA) for all cloud and payment accounts. It adds a powerful layer of protection if criminals steal your login.
6) Check your credit card for small test charges
Review your statements often. Attackers start with tiny charges to test a card before making bigger purchases.
GEEK SQUAD SCAM EMAIL: HOW TO SPOT AND STOP IT
7) Use a password manager
A good password manager helps you create strong, unique passwords. It limits the fallout if your login appears in a data breach.
Next, see if your email has been exposed in past breaches. Our #1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
These fake storage warnings mimic real cloud services and pressure users to upgrade for $1.99. Once you enter payment info, scammers steal it instantly. (uchar/Getty Images)
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com
8) Report suspicious messages
Forward scam texts to 7726 (SPAM). This helps carriers block similar messages for everyone.
Kurt’s key takeaways
This scam spreads because it hits people where they are most vulnerable. Our phones store personal memories, family events and moments we never want to lose. Scammers know this and are now creating messages that look real enough to fool even the most cautious users. Emotional triggers like fear and urgency remain powerful tools for cybercriminals. Always question surprise warnings about data loss. When in doubt, check your account directly through the official app or website. A few seconds of verification can save you from credit card theft and identity headaches.
Have you ever received a message like this, and how did you handle it? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
NASA did eventually solve Artemis II’s Outlook glitch
On Thursday, during Artemis II’s journey to the Moon, commander Reid Wiseman ran into a tech issue some of us back on Earth can relate to: Microsoft Outlook wasn’t working. In a conversation captured in NASA’s Artemis livestream and shared on Bluesky, Wiseman reported to Mission Control: “I also see that I have two Microsoft Outlooks and neither one of those are working.”
To take care of the issue, Mission Control had to remotely access Wiseman’s personal computing device (PCD), a Microsoft Surface Pro. During a press conference on Thursday, Artemis flight director Judd Frieling said NASA had fixed the issue, stating, “This is not uncommon. We have this on-station all the time. You know, sometimes Outlook has issues getting configured, especially when you don’t have a network that’s directly connected. And so essentially we just had to reload his files on Outlook to get it working.”
NASA uses a combination of its Near Space Network and Deep Space Network to stay in touch with Artemis II, relying on a mix of antennas around the world and satellites in orbit. Mission Control at the Johnson Space Center in Houston, Texas has to shift communications between these networks as Artemis II gets further away from Earth.
Aside from the Microsoft Surface Pro, the Artemis II crew’s gear list also includes Nikon D5 DSLR cameras, a ZCube video encoder, and handheld GoPro cameras for filming content for a Disney/National Geographic documentary. The crew was also allowed to bring their phones with them — you can even see their phones being stowed away in their spacesuit pockets in NASA’s livestream.
Technology
Fox News AI Newsletter: Palantir CTO warns US has only ‘eight days of weapons’ in hypothetical China battle
NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.
IN TODAY’S NEWSLETTER:
– Palantir CTO warns US has only ‘eight days of weapons’ in hypothetical battle against China
– AI robot now helps travelers at San José airport
– New AI coalition targets Washington, Big Tech as group warns child safety risks outpacing safeguards
Palantir CTO Shyam Sankar discussed the looming threat of China and his new book, “Mobilize,” with Fox News Digital. (Fox News Digital/Nikolas Kokovlis/NurPhoto via Getty Images)
ARSENAL ALERT: The U.S. is wrong about military deterrence, according to Palantir CTO Shyam Sankar. America relies on the threat of its large weapons stockpiles to discourage aggression, but Sankar says the real deterrent is production capacity — “the ability to generate the stockpile.”
WIRED WELCOME: At San José Mineta International Airport in California, travelers can now get help from a humanoid robot named José. It greets passengers, answers questions and helps people find their way around the terminal.
DIGITAL DILEMMA: As artificial intelligence expands into classrooms, workplaces, and homes, a new coalition warns that risks to children and workers are growing faster than efforts to control the new technology.
Mark Zuckerberg, CEO of Meta, arrives to testify before the US Senate Judiciary Committee hearing, “Big Tech and the Online Child Sexual Exploitation Crisis,” in Washington, DC, on January 31, 2024. (ANDREW CABALLERO-REYNOLDS/AFP via Getty Images)
The newly formed Alliance for a Better Future (ABF) is pushing for AI safeguards as Washington debates regulation.
DIGITAL WARFARE: For years, Silicon Valley operated as if war was someone else’s problem. Operation Epic Fury proved otherwise. The U.S.-Israeli campaign against Iran, launched Feb. 28, pulled American technology companies to the center of active warfare — not as distant suppliers, but as participants and now deliberate targets. In my forthcoming book, “The New AI Cold War,” I warned this moment was coming. Iran made it real.
Two F/A-18 Super Hornets launch from the flight deck of the U.S. Navy Nimitz-class aircraft carrier USS Abraham Lincoln in support of the Operation Epic Fury attack on Iran from an undisclosed location March 3, 2026. (U.S. Navy/Handout via Reuters)
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
Twitter
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
Fox News
Fox Business
Fox Weather
Fox Sports
Tubi
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.
Technology
AO3 is finally out of beta after 17 years
Archive of Our Own (AO3) is officially exiting beta. The Organization for Transformative Works — the nonprofit behind the fanfiction site — announced the update on Thursday, which comes 17 years after AO3’s launch in 2009.
“Since 2009, AO3 has grown and changed a lot,” the announcement says. “We’ve introduced many features over the years through the efforts of our volunteers and coding contributors, as well as the contractors we’ve been able to hire thanks to generous donations from our users.”
The post highlights some of the features that AO3 has since its launch, including a tagging system, fanworks downloads, privacy settings that allow creators to limit access to their work, and more. Just because AO3 is exiting beta, doesn’t mean the updates will stop flowing:
As the AO3 software has been stable for a long time, the change is mostly cosmetic and does not indicate that everything is finalized or perfectly working. Exiting beta doesn’t mean we’ll stop continuing to improve AO3—our volunteer coders and community contributors will still be working to add to and improve AO3 every day.
One of the most significant changes to the site is the absence of the tiny “beta” label inside the AO3 logo displayed at the top of the platform. (AO3 briefly changed the beta to “omega” for April Fools’ Day this year).
You can keep tabs on the updates coming to AO3 by viewing its projects on Jira
-
Culture1 week agoWil Wheaton Discusses ‘Stand By Me’ and Narrating ‘The Body’ Audiobook
-
South-Carolina6 days agoSouth Carolina vs TCU predictions for Elite Eight game in March Madness
-
Culture1 week agoWhat Happens When We Die? This Wallace Stevens Poem Has Thoughts.
-
Miami, FL1 week agoJannik Sinner’s Girlfriend Laila Hasanovic Stuns in Ab-Revealing Post Amid Miami Open
-
Minneapolis, MN1 week agoBoy who shielded classmate during school shooting receives Medal of Honor
-
Education1 week agoVideo: Transgender Athletes Barred From Women’s Olympic Events
-
Vermont6 days ago
Skier dies after fall at Sugarbush Resort
-
Politics6 days agoTrump’s Ballroom Design Has Barely Been Scrutinized