Today marked a second weekend of scattered protests at Tesla showrooms, following a “TeslaTakeover” hashtag that has been trending on Twitter alternative Bluesky this week. Protestors’ messages largely focused on the divisive efforts of Tesla CEO Elon Musk as the head of the Department of Government Efficiency since the start of Donald Trump’s Presidency.
Technology
Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap
![Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap Don’t be so quick to click that Google Calendar invite. It could be a hacker’s trap](https://static.foxnews.com/foxnews.com/content/uploads/2025/01/1-outsmart-hackers-who-are-out-to-steal-your-identity.jpg)
A sophisticated phishing campaign exploiting Google Calendar has been uncovered by Check Point Software Technologies, raising alarms among cybersecurity experts.
Cybercriminals are sending fake meeting invitations that appear legitimate, redirecting victims to phishing sites and mimicking Google’s platforms to steal sensitive information.
This emerging threat is particularly concerning given the widespread use of Google Calendar, which serves more than 500 million users globally in 41 languages. Researchers have identified nearly 4,000 phishing attempts in a matter of weeks, impersonating more than 300 reputable brands.
I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Fake Google Meet invitation (Check Point Software Technologies)
How the scam works
Hackers leverage the trust in Google’s services to carry out their attacks. Victims receive seemingly authentic meeting invites via Google Calendar. Upon clicking links within these invites, they are taken to fake web pages that prompt them to input personal data. Once compromised, this information can be used for identity theft, financial fraud and unauthorized access to other accounts. Security experts warn that attackers are now using AI to craft highly convincing fake invitations, making it even harder to spot the fraud. Reacting to the findings from Check Point, a spokesperson for Google said:
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
“We recommend users enable the ‘Only If The Sender Is Known’ setting in Google Calendar. This setting helps defend against this type of phishing by alerting the user when they receive an invitation from someone not in their contact list and/or they have not interacted with from their email address in the past.”
![google meet 2](https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/01/1200/675/2-dont-be-so-quick-to-click-that-google-calendar-invite.-it-could-be-a-hackers-trap.jpg?ve=1&tl=1)
Fake Google Meet invitation (Check Point Software Technologies)
ASK KURT: HOW TO NAVIGATE GOOGLE’S PRIVACY SETTINGS
Google’s ‘Known Senders’ setting: A shield against calendar phishing
Google has introduced the “known senders” feature in Google Calendar to combat sophisticated phishing attempts. This setting helps you filter out potentially malicious calendar invites. Here’s how to enable it:
- Open Google Calendar and click the gear icon to access Settings
- Under General, select Event Settings
- In Add invitations to my calendar, choose Only if the sender is known
This ensures that only events from contacts, your organization or previous interactions are automatically added to your calendar.
![google meet 3](https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/01/1200/675/3-dont-be-so-quick-to-click-that-google-calendar-invite.-it-could-be-a-hackers-trap.jpg?ve=1&tl=1)
Google’s “Known Senders” setting (Kurt “CyberGuy” Knutsson)
HOW ONE MAN GOT SCAMMED IN SECONDS USING GOOGLE
Additional security measures
To further protect yourself from phishing scams, follow these steps.
Scrutinize unexpected invites carefully: Examine the sender’s details, including their name, domain and email address, for any inconsistencies or signs of spoofing.
Avoid clicking suspicious links or downloading attachments from unknown sources: Threat actors often embed malicious links in calendar invites that can lead to phishing websites designed to steal your personal information.
Use strong antivirus software: This provides an additional defense mechanism against malware and can help detect potential phishing attempts before they cause damage. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
Enable two-factor authentication (2FA) for your Gmail account: 2FA adds an extra layer of security that can prevent unauthorized access, even if your credentials are compromised.
Keep your security settings up to date: Regularly review and adjust your calendar and email settings to protect against evolving phishing tactics.
HOW A WRONG GOOGLE SEARCH CAN COMPROMISE YOUR DATA AND BRING LAW ENFORCEMENT CALLING
Kurt’s key takeaways
As phishing tactics evolve, cybercriminals are exploiting trusted platforms like Google Calendar to bypass traditional security measures. This underscores the importance of user vigilance and proactive security practices. By enabling the “known senders” setting and implementing additional security measures, you can significantly reduce the risk of falling victim to calendar-based phishing scams.
What digital security challenges have you encountered recently? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
![](https://newspub.live/wp-content/uploads/2022/03/np-logo.png)
Technology
‘TeslaTakeover’ protests are small, but numerous
![‘TeslaTakeover’ protests are small, but numerous ‘TeslaTakeover’ protests are small, but numerous](https://platform.theverge.com/wp-content/uploads/sites/2/2025/02/gettyimages-2199120167.jpg?quality=90&strip=all&crop=0%2C10.737892056687%2C100%2C78.524215886627&w=1200)
The protests don’t appear to be especially large, but they are numerous, ranging from places like New York to lesser-known locales like Minneapolis, Minnesota suburb Golden Valley. A section of Action Network’s site for organizing protests shows rallies planned for cities in Ohio, Florida, Washington, New Mexico, and Alberta, Canada.
Tesla investors have expressed concern that Musk’s activities are negatively impacting the company, which saw its stock price plummet by 21 percent since Trump’s inauguration according to an ABC story this week. Inside the company, employees and senior staff said in a recent meeting that “the company would be better off if Musk resigned,” The Washington Post reported.
One of the larger rallies today was outside of Tesla’s Manhattan showroom, where a previous protest took place on February 9th. In the videos below, people can be heard chanting, “Don’t buy swasticars” and “Elon Musk can go to Mars; we don’t need your Nazi cars,” perhaps referencing Musk’s support for far-right groups like Germany’s AfD party or his suspicious salute on Inauguration Day.
Other posts showed what protests looked like today in Berkeley, California:
San Francisco, California:
And Kansas City, Missouri:
Similar gatherings occurred in Austin, Texas; Seattle, Washington; and Boston, Massachusetts. Meanwhile, few appear to have shown up today in Pittsburgh, Pennsylvania:
Or Baltimore, Maryland, where a single person held a sign outside a Tesla showroom:
Actor, director, and progressive activist Alex Winter, who heavily promoted this weekend’s protests over the last few days, posted an image of himself holding a sign urging people to sell their Teslas at a protest in Pasadena, California:
Winter re-shared posts from protests at Tesla showrooms in the California cities Corte Madera, San Jose, and Los Angeles, along with others from people who’d posted about rallies in Rockville, Maryland; Tucscon, Arizona; and Golden Valley, Minnesota.
There are many posts on Bluesky with the #TeslaTakeover hashtag, but far fewer show up when searching X, Instagram, or Threads. Outside of picketing, others protested Musk in different ways. Musician Sheryl Crow posted a video of a Tesla being driven away on a flatbed truck, along with a message saying “There comes a time when you have to decide who you are willing to align with. So long Tesla,” and noting that she had donated the money to NPR, which is currently threatened by an FCC investigation into public media.
More protests are expected, including during the President’s Day holiday on Monday, with one set for Lowell, Maine and at least one other in Richmond, Virginia. Those are in addition to numerous demonstrations planned this weekend that don’t target Tesla showrooms but still relate to the actions of Musk, DOGE, and President Trump more broadly.
Technology
How cyberscams are draining Americans wallets by the billions
![How cyberscams are draining Americans wallets by the billions How cyberscams are draining Americans wallets by the billions](https://static.foxnews.com/foxnews.com/content/uploads/2025/02/3-how-cyberscams-are-draining-americans-wallets-by-the-billions.jpg)
Cyberscams have reached alarming levels in the U.S., with nearly 30% of Americans falling victim to fraudulent schemes in the past year alone.
The financial toll is staggering — scams cost Americans over $159 billion annually, with average individual losses now exceeding $3,500 per victim. This epidemic is not just a financial crisis but also a human rights issue, as many scams originate from forced labor operations in Southeast Asia.
With nearly 90% of Americans targeted by scam attempts and 40% receiving suspicious messages daily, the question remains: how can we protect ourselves and hold perpetrators accountable in an increasingly digital world?
STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW
The word scam with data in the background (Kurt “CyberGuy” Knutsson)
The mechanics of “pig butchering”
One of the most pervasive scams today is the so-called “pig butchering” scheme. Originating in China and spreading across Southeast Asia, this scam involves criminals building trust with victims through social media or messaging apps. Once trust is established, victims are lured into fraudulent cryptocurrency investment schemes. These scams are meticulously crafted to appear legitimate, often involving fake trading platforms and simulated profits. Victims are encouraged to invest more until they are “slaughtered,” losing their entire savings when the scammers vanish with their funds.
9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU
Forced labor behind these scam centers
What makes these scams even more horrifying is their reliance on human trafficking. Criminal syndicates in countries like Myanmar, Cambodia and Laos force trafficked individuals to run these operations under threat of violence. These “scam centers” operate in lawless regions controlled by rebel groups or corrupt officials, making international intervention challenging. Survivors describe conditions akin to modern slavery, with physical abuse and even torture being common.
![cyberscam 2](https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/02/1200/675/2-how-cyberscams-are-draining-americans-wallets-by-the-billions-1.jpg?ve=1&tl=1)
Illustration of a scam on a computer key. (Kurt “CyberGuy” Knutsson)
BEST PRESIDENT’S DAY DEALS
Why America is a prime target
Cyberscams have taken hold in the U.S. for several reasons that make it particularly vulnerable. As an American, you’re likely connected to the digital world through social media platforms, messaging apps and other online tools. This high level of connectivity makes it easier for scammers to reach you directly, whether through a text message, email or social media chat. The sheer number of people online in the U.S. creates a vast pool of potential targets for cybercriminals.
Additionally, the growing popularity of cryptocurrency in the U.S. has made it a prime medium for fraud. Cryptocurrency transactions are fast, anonymous and difficult to trace, which makes them ideal for scammers looking to steal funds without leaving a trail. Many scams are designed to exploit this lack of transparency, leaving victims with little chance of recovering their money once it’s gone.
Another major issue is the lack of a centralized reporting system for cyberscams in the U.S. If you’ve ever been scammed or know someone who has, you might have noticed how confusing it can be to figure out where to report the crime — whether to the FBI, the Federal Trade Commission (FTC) or another agency. This fragmented system not only makes it harder for victims to seek help but also prevents authorities from gathering comprehensive data to tackle the problem effectively. These factors combined have made Americans some of the most targeted individuals in the world when it comes to cyberscams.
![person typing](https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/02/1200/675/3-how-cyberscams-are-draining-americans-wallets-by-the-billions.jpg?ve=1&tl=1)
Illustration of a scammer at work. (Kurt “CyberGuy” Knutsson)
FBI’S NEW WARNING ABOUT AI-DRIVEN SCAMS THAT ARE AFTER YOUR CASH
Global solutions: Lessons from other nations
Several countries have implemented innovative measures to combat cyberscams, offering valuable lessons for the U.S. Singapore, for instance, has introduced a mandatory SMS Sender ID Registry (SSIR) that requires organizations to register their alphanumeric Sender IDs. This system effectively blocks unregistered SMS senders, significantly reducing impersonation scams. In fact, cases involving scam SMSes in Singapore fell by 70% over three months after mandating the SSIR.
Britain has taken a different approach by establishing a dedicated “159” hotline, allowing residents to instantly verify suspicious calls. This simple yet effective system provides a quick way for individuals to check the legitimacy of unexpected communications, potentially preventing many scams before they occur.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Many nations have also implemented stricter authentication measures, such as biometric checks and in-app verifications, which have proven highly effective in reducing fraud. For example, Singapore has required facial verification for higher-risk transactions through Singpass since 2022, resulting in no further reports of malware-enabled scams involving unauthorized CPF withdrawals since its implementation in June 2023.
Some countries are exploring ways to slow down cryptocurrency transactions or cap transfer amounts, which could significantly hinder scammers who rely on quick, anonymous transfers. These measures, combined with a coordinated global response involving major victim nations like the U.S. and China, could prove instrumental in dismantling criminal networks more effectively. By learning from these international examples and adapting them to the American context, the U.S. could significantly strengthen its defenses against the rising tide of cyberscams.
![cyberscam 4](https://a57.foxnews.com/static.foxnews.com/foxnews.com/content/uploads/2025/02/1200/675/4-how-cyberscams-are-draining-americans-wallets-by-the-billions.jpg?ve=1&tl=1)
Illustration of scamming techniques. (Kurt “CyberGuy” Knutsson)
Tips to protect yourself and your loved ones
Recognizing red flags is essential to avoid falling victim to scams. Here are some important red flags to be aware of:
- Unsolicited calls or emails: Be wary of anyone asking for personal or financial information. Legitimate organizations will not ask for sensitive information in this manner.
- Urgent requests for payment: Scammers often demand immediate action to avoid scrutiny. Take a moment to verify the request through official channels before responding.
- Unfamiliar contact information: Be cautious if the contact information provided does not match the official contact details of the company or organization.
- Untraceable payment methods: Requests for payment via gift cards, cryptocurrency or wire transfers are major warning signs. Reputable companies will not ask for these types of payments.
- Too good to be true offers: If an offer seems too good to be true, it likely is. Research and verify any claims before proceeding.
10 ways to protect yourself from being scammed
Protecting yourself and your loved ones from scams requires vigilance and awareness. Here are eight effective ways to safeguard against scammers:
1. Verify before you act: Always verify the identity of the person or organization contacting you. Use official contact information to reach out directly and confirm the legitimacy of the request.
2. Limit personal information sharing: Avoid sharing personal or financial information over the phone, email or online unless you are certain of the recipient’s identity and legitimacy.
3. Use strong, unique passwords for all your accounts: A robust password should include a mix of uppercase and lowercase letters, numbers and symbols. Avoid reusing passwords across multiple platforms, and consider using a reputable password manager to store and generate complex passwords securely.
4. Enable two-factor authentication (2FA) wherever possible: 2FA adds an extra layer of security by requiring a secondary verification method, such as a code sent to your phone or biometric authentication. This ensures that even if your password is compromised, unauthorized access remains highly unlikely.
5. Keep your devices and software up to date: By regularly installing the latest updates and security patches, you can ensure your devices are equipped with the latest security features and bug fixes, reducing the risk of becoming a target for cyberattacks. Many cyberattacks exploit unpatched vulnerabilities, so enabling automatic updates for your operating system, apps and antivirus software can significantly reduce your risk.
6. Invest in personal data removal services: Consider using a service that specializes in removing your personal information from the internet to reduce your exposure to potential scammers. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
7. Monitor financial accounts: Regularly check your bank and credit card statements for any unusual or unauthorized transactions. Promptly report any suspicious activity.
8. Be skeptical of unsolicited requests: Treat unexpected requests for money or personal information with caution. Scammers often create a sense of urgency to pressure you into acting quickly.
9. Be vigilant against phishing attempts and use strong antivirus software: Avoid clicking on links or downloading attachments from unsolicited emails or messages. Ensure your devices are protected with strong antivirus software that can detect and block malicious activities. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
10. Report Suspected Scams: If you suspect you’ve encountered a scam, report it to your local authorities, the Federal Trade Commission (FTC), and any relevant financial institutions.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaways
The rise of cyberscams is not just an economic issue but a moral one that demands immediate action. With billions lost annually and countless lives disrupted, we cannot afford complacency in addressing this crisis. By learning from global best practices and fostering international collaboration, we can begin to dismantle these criminal networks. Be sure to follow the steps I outlined to keep yourself safe.
What do you think should be done to tackle cyberscams more effectively? Should governments focus on stricter regulations or public education campaigns? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
All the smart home news, reviews, and gadgets you need to know about
![All the smart home news, reviews, and gadgets you need to know about All the smart home news, reviews, and gadgets you need to know about](https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/24423300/236527_Matter_smart_plugs_JTuohy_0007.jpg?quality=90&strip=all&crop=0%2C10.732984293194%2C100%2C78.534031413613&w=1200)
The smart home holds so much promise. It can make life more convenient with lights that turn on as you walk in a room, doors that unlock as you approach, and robots that clean your floors. It can also make your home safer, more energy efficient, and even a little more fun. (Have you tried asking Alexa to beam you up?)
But for all its benefits, the smart home can be complicated, confusing, and occasionally maddening. It’s also hard to keep up with all the changes. New gadgets are arriving daily, new features come to old products, and there are so many different ways to turn on a smart light bulb.
If you need a guide, that’s what I’m here for.
Here, I’ll be posting the latest smart home reviews, guides, news, and opinions on everything happening in the connected home. Follow this page to stay updated on what Apple, Amazon, Samsung, Google, and Home Assistant and the rest are doing with their smart home platforms. I’ll keep you in the loop on all the newest technologies — including Matter, Thread, Sidewalk, UWB — as well as the old favorites. And, of course, I’ll cover all the news on the latest gadgets and the biggest releases around tech for your home.
-
World1 week ago
Georgia’s EU membership by 2030 is achievable, PM Kobakhidze says
-
News1 week ago
Justice Department sues Chicago and Illinois over 'sanctuary' laws
-
Politics1 week ago
The Hitchhiker's Guide to House Republicans releasing their tax and spending cut plan
-
Politics1 week ago
Sanctuary city mayors to testify at House Oversight after AG Bondi cuts them off from federal funds
-
Technology1 week ago
Tinder adds new Explore categories to help you find likeminded dates
-
World1 week ago
Cyprus jails Syrian man over death of young girl on migrant boat
-
World1 week ago
Fact check: Did Clinton set the precedent for mass federal worker buyouts?
-
Politics1 week ago
Hegseth to look into 'what went wrong' in Afghanistan and pledges accountability, slams diversity motto