Technology
Don’t let this credit card fraud nightmare happen to you

Credit card fraud has been on the rise in recent years.
The Federal Trade Commission’s most recent database indicates that 416,582 cases of credit card fraud were reported in 2024, making it one of the most common forms of identity theft. You know you’ve been a victim of this fraud when you notice unauthorized transactions on your credit card bill.
These transactions are usually below $100 to avoid detection. However, sometimes they can exceed $1,000. One such incident happened with Martin from Martinsville, Virginia, when he was randomly charged $1,095 in Hong Kong.
I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
“Hello, I recently received a fraud alert from my credit card company that said that there was a $1,095 charge on my credit card in Hong Kong. I use my iPad and Safari browser to buy online. Can you please explain how this could happen? By the way, my credit card company canceled my credit card and will send me a new Mastercard in the mail, and I’m not responsible for the charges on my credit card. What can I do in the future to prevent this from happening again?”
I’m sorry to hear about the fraudulent charge on your credit card, Martin. It’s good that your credit card company is handling it and that you’re not responsible for the charges. For future reference, I’ll be discussing how this could have happened and how to stay safe.
A woman using her credit card to shop online (Kurt “CyberGuy” Knutsson)
How credit card fraud happens
Credit card fraud can happen in several ways, often without you even realizing it. One common method is when fraudsters get hold of your card information through data breaches at online stores or banks, which means your details get leaked without your knowledge.
Another sneaky tactic is phishing, where scammers trick you into giving away your card info by posing as legitimate companies via emails or fake websites.
There’s also the risk of “card skimming,” where devices at ATMs or gas stations secretly capture your card details when you swipe it. In some cases, fraudsters might also exploit weak security on public Wi-Fi networks or compromised apps to access your information while you’re shopping online.

A man using his credit card to shop on his phone (Kurt “CyberGuy” Knutsson)
OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME
Credit card fraud is way too common
A report from Security.org reveals that 52 million Americans experienced credit card fraud in 2023, a figure even higher than the one reported by the FTC. With four out of five American adults owning at least one credit card, the report found that three in five cardholders have faced unauthorized charges — an estimated 128 million victims. Even more concerning, 75% of these victims reported having their credit card information stolen more than once.
The typical unauthorized transaction is around $100, which adds up to approximately $5 billion in criminal purchases each year. Interestingly, most unauthorized transactions involve credit cards that weren’t physically lost or stolen, highlighting the growing risks of online fraud and data breaches.

A woman using her credit card to pay (Kurt “CyberGuy” Knutsson)
THE BEST BALANCE TRANSFER CREDIT CARDS 2025
The need for identity theft protection
Data breaches are one of the main ways credit card fraud happens. Hackers often get unauthorized access to sensitive information stored by businesses or institutions. When a retailer, financial institution or online store experiences a data breach, the hackers usually go after the payment systems where customer credit card details are kept.
If these systems aren’t properly secured, hackers can grab things like credit card numbers, expiration dates and sometimes even security codes. Once they have that info, they can either use it themselves or sell it to others.
But it’s not just credit card information at risk. Data breaches can also expose personal details like names, email addresses and phone numbers. Scammers can then use this stolen info to launch phishing attacks, pretending to be trusted companies and tricking you into giving away more sensitive information.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
This is why identity theft monitoring is so important. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

Illustration of a credit card crook (Kurt “CyberGuy” Knutsson)
HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY
10 ways to protect yourself from credit card fraud
1. Notify your credit card issuer immediately: If you notice fraudulent charges on your credit card, start by calling the number on the back of your credit card. From there, you should get more detailed information on what to do next.
2. Monitor your statements regularly: One of the best ways to catch credit card fraud early is to keep an eye on your statements. Review your transactions regularly to spot any unfamiliar charges. The sooner you notice something suspicious, the quicker you can report it to your credit card company and prevent further damage.
3. Regularly check your credit report: In addition to monitoring your credit card statements, periodically review your credit report to catch any unauthorized accounts opened in your name.
4. Use strong, unique passwords: Always use strong, unique passwords for your online accounts, especially those that store payment details. Avoid using easily guessable information, and consider using a password manager to store and generate secure passwords. This reduces the chances of fraudsters accessing your accounts.
5. Use credit card alerts: Set up transaction alerts with your credit card company. This way, you’ll receive a notification via email or text for every transaction made with your card. If you receive an alert for a purchase you didn’t make, you can take immediate action to report it and prevent further charges.
6. Be Cautious with public Wi-Fi: Avoid making purchases or entering sensitive information when connected to public Wi-Fi networks because they’re often not secure. If you need to make an online purchase while on the go, consider using a VPN (Virtual Private Network) to encrypt your connection and keep your credit card details safe from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices
7. Don’t store credit card info on browsers and websites: Storing your credit card information on browsers or websites can make it convenient, but it also exposes you to a higher risk of fraud. If your browser or the website’s security gets compromised, hackers could gain access to your saved card details. To stay safe, avoid saving your credit card information and manually enter it each time you make a purchase. If a site offers to save your details for future use, think twice before accepting. It’s better to take the extra step to enter your information each time, ensuring your data stays secure.
8. Use EMV chip technology: When making in-person purchases, always use the chip reader instead of swiping your card. Chip technology provides an extra layer of security against fraud.
9. Be wary of phishing attempts and have strong antivirus software: Be cautious of unsolicited emails, texts or phone calls asking for your credit card information. Legitimate companies typically don’t request sensitive information through these channels. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
10. Keep your card in sight: When using your card in restaurants or stores, try to keep it within view. This reduces the risk of someone copying your card details.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Kurt’s key takeaway
It’s clear that credit card fraud is more prevalent than ever, affecting millions of Americans each year. The good news is that there are effective steps to protect yourself from becoming a victim. By staying vigilant and employing best practices — like monitoring your statements and using strong passwords — you can significantly reduce your risk. Remember, awareness and proactive measures are your best defenses against credit card fraud.
Have you or someone you know ever experienced credit card fraud, and how did it impact you? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
Netflix’s ad tier is growing really fast — and that means more ads

Amy Reinhard, Netflix’s president of advertising, said the streaming service has “the most engaged audience anywhere,” with subscribers on its ad-supported tier spending an average of 41 hours per month on the service.
The new ad formats are part of Netflix’s in-house advertising platform, which is now live in the US after arriving in Canada. It plans to bring the platform to all 12 countries with ad-supported plans by June. “The foundations of our ads business are in place,” Reinhard said. “And going forward, the pace of progress will be even faster.”
Technology
Fake PayPal email let hackers access computer and bank account

Online scams are becoming more dangerous and convincing every day. Cybercriminals are finding new ways to gain not just your login credentials but full control of your computer and your bank accounts.
Take John from King George, Virginia, for example. He recently shared his alarming experience with us. His story is a powerful warning about how quickly things can escalate if you respond to suspicious emails.
Here is what happened to John in his own words: “I mistakenly responded to a false PayPal email notifying me of a laptop purchase. The message looked real, and I called the number listed. The person on the phone gave me a strange number to enter into my browser, which installed an app that took control of my PC. A warning popped up saying ‘software updating – do not turn off PC,’ and I could see my entire file system being scanned. The scammer accessed my bank account and transferred money between accounts. He told me to leave my PC running and go to the bank, keeping him on the phone without telling anyone what was happening. I shut everything down, contacted my bank, and changed my passwords.”
John’s quick thinking in shutting down his computer and alerting his bank helped minimize the damage. However, not everyone is as lucky.
Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!
Fake PayPal scam email (Kurt “CyberGuy” Knutsson)
How this scam works
This type of scam is known as a remote access scam. It often begins with a fake email that appears to come from a trusted company like PayPal. The message claims there is an issue, such as an unauthorized charge, and urges the victim to call a phone number or click a link.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Once the scammer makes contact, they guide the victim to enter a code into their browser or install a program, claiming it will fix the problem. In reality, this grants the scammer full control of the victim’s computer.
Once inside, scammers often search for sensitive files, access banking websites, steal login credentials or install malware to maintain long-term access. Even if the immediate scam is stopped, hidden malware can allow scammers to reenter the system later.

A hacker at work (Kurt “CyberGuy” Knutsson)
THE URGENT PAYPAL EMAIL SCAM YOU CAN’T AFFORD TO IGNORE
Key takeaways from John’s experience
John’s close call highlights several important lessons.
Fake emails are harder to spot than ever: Scammers create emails that look almost identical to real ones from trusted companies like PayPal. They copy logos, formatting and even fake customer support numbers. Always double-check the sender’s email address and verify communications by visiting the official website or app directly instead of clicking links inside emails.
Remote access scams can escalate fast: Once scammers gain control of your device, they can steal sensitive data, move funds between accounts and install hidden malware that stays behind even after the scammer disconnects. It often takes only minutes for serious damage to be done, making fast recognition critical.
Psychological pressure plays a big role: Scammers rely on creating a sense of urgency and fear. By keeping you on the phone and urging secrecy, they isolate you from help and rush you into making bad decisions. Recognizing when you are being pressured is key to breaking the scammer’s control.
Fast action can make all the difference: By quickly disconnecting his computer and contacting his bank, John limited the scammer’s access to his accounts. Acting within minutes rather than hours can stop further theft, block fraudulent transactions and protect your sensitive information from being fully compromised.

A warning on a laptop home screen (Kurt “CyberGuy” Knutsson)
DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX
How to protect yourself from remote access scams
Taking simple but strong security steps can protect you from falling victim.
1. Never call a number listed in a suspicious email: Scammers often set up fake phone numbers that sound professional but are designed to manipulate you into handing over control or information. Always find verified contact information through a company’s official website or app, not links/numbers provided in suspicious messages.
2. Be skeptical of unusual instructions: No legitimate company will ask you to install software or enter strange codes to protect your account. If anything seems unusual, trust your instincts and stop the communication immediately.
3. Install strong antivirus software on all devices: Antivirus programs can detect suspicious downloads, block remote access attempts and help prevent hackers from taking over your system. Having strong antivirus protection installed across all your devices is the best way to safeguard yourself from malicious links that install malware and attempt to access your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
4. Use identity theft protection: These services monitor financial accounts, credit reports and online activity for signs of fraud, alerting you to suspicious transactions. See my tips and best picks on how to protect yourself from identity theft.
5. React immediately if you suspect a scam: Disconnect your device from the internet, contact your bank or credit card company immediately and change your passwords, especially for banking and email accounts. Monitor your accounts closely for unauthorized activity and report the scam to the Federal Trade Commission as well as the company that was impersonated. Acting quickly can prevent further access and limit the damage scammers can cause.
6. Use multifactor authentication (MFA): MFA adds a critical layer of security beyond passwords, blocking unauthorized logins even if credentials are stolen. Enable MFA on all accounts, especially banking, email and payment platforms, to stop scammers from bypassing stolen passwords.
7. Update devices and software immediately: Regular updates patch security flaws that scammers exploit to install malware or hijack systems. Turn on automatic updates wherever possible to ensure you’re always protected against newly discovered vulnerabilities.
8. Employ a password manager with strong, unique passwords: Avoid password reuse and use complex passphrases to minimize credential-stuffing attacks. A password manager generates and stores uncrackable passwords, eliminating the risk of weak or repeated credentials. Get more details about my best expert-reviewed password managers of 2025 here.
9. Never share screen access or grant remote control: Scammers exploit screen-sharing tools to steal passwords and manipulate transactions in real time. Legitimate tech support will never demand unsolicited screen access; terminate the call immediately if pressured.
10. Invest in personal data removal services: These services automate requests to delete your personal information from data brokers and people-search sites, reducing publicly available details scammers could exploit for phishing or impersonation. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
PROTECT YOURSELF FROM TECH SUPPORT SCAMS
Kurt’s key takeaways
John’s story is a reminder that online scams are evolving quickly and becoming more aggressive. Staying skeptical, verifying all suspicious messages and acting quickly if something feels wrong can make the difference between staying safe and losing sensitive information. Protect your devices, trust your instincts and remember it is always better to be cautious than to take a risk with your security.
Have you or someone you know been targeted by a scam like this? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Meta’s beef with the press flares at its antitrust trial

Long-simmering tension between Silicon Valley and the press that covers it is surfacing during the Federal Trade Commission’s antitrust trial against Meta.
During a heated cross-examination of the FTC’s key economic expert, Scott Hemphill, Meta’s lead attorney, Mark Hansen, noted that Hemphill joined Facebook co-founder Chris Hughes and former Biden official Tim Wu in pitching regulators on an antitrust probe of the company back in 2019. The pitch deck for the probe that was shown in court included “public recognition” of the company’s aggressive acquisition strategy from two reporters: Kara Swisher, who currently hosts two podcasts for The Verge’s parent company, Vox Media, and Om Malik, the founder of the early tech blog GigaOm who is now a venture capitalist.
In an attempt to undercut Hemphill’s credibility, Hansen caught Swisher and Malik in the crossfire. He called Malik a “failed blogger” with an axe to grind against Meta. He then suggested that Swisher, whom he referred to as a Vanity Fair columnist (she last wrote for the site in 2015), was similarly biased against the company. In court, he projected a headline about her recently calling Mark Zuckerberg a “small little creature with a shriveled soul.”
The 2019 pitch deck shown at court by Hansen also cited a Post story to support that Facebook should be investigated as a monopoly. Meta’s Hansen asked if Hemphill agreed that “The New York Post is a scandal sheet,” to which he replied that he didn’t “have a view one way or another.” Hansen showed the infamous Post front page headline, “Headless Body in Topless Bar,” to make his point.
The exchange resurfaced years-old tensions between the press and tech titans. After experiencing relatively positive coverage during the early, aspirational days of Silicon Valley, Facebook and a handful of startups grew to become the largest platforms in the world. Along the way, they’ve chafed at increasingly critical coverage of their businesses.
Malik and Swisher have indeed both criticized Meta and its executives. In 2016, Malik critiqued Facebook’s intentions for offering free access to its apps and others in India, after board member Marc Andreesseen blamed local resistance to the program on “anti-colonialism” in a later-deleted tweet. “I am suspicious of any for-profit company arguing its good intentions and its free gifts,” Malik wrote at the time.
It was not the first time Meta has pointed a finger at the media while at trial
Tuesday’s exchange was not the first time that Meta has pointed a finger at the media while at trial. When discussing major scandals like Cambridge Analytica from the witness stand, company leaders have chalked up downswings in user sentiment to negative media attention and testified that Meta’s services haven’t seen comparable declines in engagement.
The FTC has argued that this fact is a sign of monopoly power because people can’t leave Facebook and Instagram without viable alternatives. A judge will ultimately decide if that is true or not. In the meantime, Meta’s grudges with the press are on full display.
-
Austin, TX4 days ago
Best Austin Salads – 15 Food Places For Good Greens!
-
Education1 week ago
In Alabama Commencement Speech, Trump Mixes In the Political
-
Technology1 week ago
Be careful what you read about an Elden Ring movie
-
Culture1 week ago
Pulitzer Prizes 2025: A Guide to the Winning Books and Finalists
-
World6 days ago
The Take: Can India and Pakistan avoid a fourth war over Kashmir?
-
Technology6 days ago
Netflix is removing Black Mirror: Bandersnatch
-
Education1 week ago
University of Michigan President, Santa Ono, Set to Lead University of Florida
-
News6 days ago
Reincarnated by A.I., Arizona Man Forgives His Killer at Sentencing