Connect with us

Technology

End of annoying robocalls? FTC cracks down on deceptive practices

Published

on

End of annoying robocalls? FTC cracks down on deceptive practices

The Federal Trade Commission reached a settlement with XCast Labs after the Voice over Internet Protocol provider was accused of facilitating billions of robocalls. Federal regulators sued the California-based company, claiming it helped other companies navigate around the Do Not Call Registry.

Now, XCast Labs might have to pay a $10 million fine and must start screening companies to make sure they’re following U.S. telemarketing laws.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

Woman talking on cellphone (Kurt “CyberGuy” Knutsson)

How XCast Labs is accused of helping scammers make millions of fake calls

XCast Labs is accused of aiding other companies to make more than a hundred million robocalls. The California-based voice provider denies any wrongdoing in the settlement. The FTC has been on the case since 2020. That’s when it sent out a letter to Voice over Internet Protocol providers, including XCast Labs, reminding them that aiding illegal telemarketers is against the law.

Advertisement

It filed a complaint back in May, claiming the company still transmitted illegal robocalls. Some of those calls even involved telemarketers posing as government officials, including from the Social Security Administration.

Not only will XCast Labs face a proposed $10 million fine and begin screening companies, but it also has to cut business ties with illegal telemarketers.

Woman talking on cellphone (Kurt “CyberGuy” Knutsson)

MORE: HOW HACKERS CAN SEND TEXT MESSAGES FROM YOUR PHONE WITHOUT YOU KNOWING

How to protect yourself from robocalls

Advertisement

There are 7 things you can do to keep robocalls away.

1) Register your phone number with the National Do Not Call Registry

You can register your phone number with the National Do Not Call Registry using this link. While this settlement proves there are ways around the registry, it’s still an additional layer of security.

2) If you don’t recognize the number, don’t pick it up

Simple as this sounds, this is the easiest way of avoiding a potentially dangerous call. Most carriers now have a way of identifying robocalls by identifying them as “Spam Risk” or the like. Another way they try to get you is by using your local area code, sometimes even the first three digits of your or a family member’s phone number, to entice you to answer. Making it all the more important for you to take an extra careful look at the number on your screen.

3) You should also consider blocking numbers in your phone settings

Another way around this is by blocking unknown phone numbers in your phone settings

For iPhone users: To silence unknown callers:

Advertisement

*Settings may vary depending on your Android phone’s manufacturer

  • Tap Settings
  • Tap Phone
  • Tap Silence Unknown Callers
  • Then toggle to turn it on – it will turn green
  • If a 911 call is placed, this feature is disabled for 24 hours so that emergency calls to you can ring through

Silence Unknown Callers feature on iPhone (Kurt “CyberGuy” Knutsson)

For Android users: To silence unknown callers:

  • Tap Settings
  • Tap Block numbers
  • Turn on the Block Unknown Callers feature

One thing that is important to remember should you use this feature is that it not only blocks potential SPAM callers, but it also blocks any unknown phone number you have never called or texted. So, you might want to think twice about enabling this if you’re expecting a call from someone from whom you haven’t received a call or text.

4) Telemarketers and spammers could be getting your phone number online

Your personal information is out on the web. If you want to make your personal information inaccessible, you might want to look into removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for removal services here.

5) Manually block numbers from spam robocalls

Should an unknown number have called you and not left a voice message, it’s more than likely it was a robocall. While other robocalls go directly to voicemail with a threatening or enticing message, urging those truly vulnerable to act fast. Either way, you can manually block these numbers on an iPhone by:

  • Tapping the unknown number
  • Scroll down on your screen and tap “Block This Caller”
  • Tap “Block Contact”

MORE: HOW TO SEND SPAM CALLS DIRECTLY TO VOICEMAIL

6) Use your wireless carrier’s free spam and robocall-blocking service

Several wireless carriers provide their own free robocall scanning and blocking services. Among them:

Advertisement
  • AT&T Call Protect – Available for iPhones and Androids, it lets customers manually block unwanted calls and labels suspected robocalls as a “spam risk,” as well as making efforts to prevent unwanted calls from reaching you.
  • Sprint/T-Mobile Scam Shield – An app that labels all potentially dangerous calls as “Scam likely” and opens free controls for several anti-scam protections, including Scam ID, Scam Block and Caller ID. Additionally, the app also provides you with a second phone number for use instead of your private one, ideal for online shopping and helping you avoid calls from scammers as well as telemarketers.
  • Verizon Call Filter appHelps protect you from unwanted calls and lets you decide who can reach you. Call Filter also detects spam and blocks high-risk spam calls by forwarding them to voicemail.

7) Third-party spam-blocking apps

Several third-party apps can help protect you from scam artists. Among our most recommended include:

  • RoboKiller is an app that claims to reduce 99% of unwanted calls or texts. The app is not free for iPhone and Android users. However, it comes with a 7-day free trial, which might be worth checking out before investing.
  • Call Control is an app currently only available to Android users; the app helps you filter out unwanted callers by manually adding them to a blacklist.
  • Nomorobo: For those of you who still have a landline, thanks to a package deal with your internet providers, this app helps prevent robocalls from reaching you both at home and on the go. Currently free for VolP landlines, the basic mobile package currently starts at $1.99 a month.

Woman using her cellphone (Kurt “CyberGuy” Knutsson)

MORE: HOW TO IGNORE YOUR FRIEND’S TEXT MESSAGES AND PRETEND YOU NEVER SAW THEM

What about spam texts?

You might recall all 51 attorney generals backing a proposal by the Federal Communications Commission (FCC) to put an end to illegal and malicious texts. Since then, the FCC has included spam texts in do-not-call protections. More companies are also looking for ways to fine spammers. T-Mobile just introduced new fines for illegal spam texting this year. You can also block spam texts on an iPhone and Android following these steps.

How to block spam texts on an iPhone

  • Open the Messages app on your iPhone and then the message from the number you want to block
  • Tap the number or contact name at the top of the conversation
  • Tap Info
  • Scroll down and tap Block this Caller

How to block spam texts on an Android

Settings may vary depending on your Android phone’s manufacturer. 

  • Open the messaging app on your Android device
  • Find the spam message you want to block
  • Tap and hold the message until a menu appears
  • Look for an option like Block or Spam and select it
  • Confirm you want to block future messages from that sender

How to block texts using your carrier

Most carriers also offer options to block spam calls and texts, such as Verizon’s Block Calls & Messages, AT&T’s Secure Family and T-Mobile’s Message blocking. The exact steps to use these features will vary depending on your carrier.

Kurt’s key takeaways

While this settlement proves there are ways around the National Do Not Call Registry, it also highlights how important it is to have as many layers of security as you can. Each one protects you at a different level, ensuring spam calls and texts likely won’t head your way.

Are you worried about more companies skirting past the National Do Not Call Registry? How do you keep robocalls at bay? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Best gift ideas:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Hospital cyberattacks threaten patient safety

Published

on

Hospital cyberattacks threaten patient safety

NEWYou can now listen to Fox News articles!

If you watched a recent episode of “The Pitt” on Max, a streaming medical drama about life inside a high-pressure emergency department, you saw how quickly a hospital can spiral during a cyberattack. It made for gripping television. But in Mississippi, it was not a script. It was real life.

After a ransomware attack hit the University of Mississippi Medical Center, clinics across the state closed. Elective procedures were canceled. Phone systems and emails went down. Emergency care continued, but access to electronic medical records was disrupted.

When a hospital’s systems fail, the impact goes far beyond IT. It affects real people waiting for care. That is why hospital cyberattacks are no longer just a tech problem. They are a public safety issue.

Sign up for my FREE CyberGuy Report

Advertisement

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

FIGURE DATA BREACH EXPOSES NEARLY 1M ACCOUNTS

A ransomware attack can lock hospital systems in seconds, disrupting access to critical medical records and patient care. (iStock)

Why hospitals have become prime targets

Hospitals cannot afford downtime. When systems fail, patient care is immediately affected, and the pressure to restore operations is intense. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification and biometric authentication company, explains the reality.

“Hospitals are in a uniquely difficult position. If systems go down, patient care is immediately affected. That creates real pressure to restore operations fast, which is why ransomware groups often target healthcare.” He points to another major factor driving hospital cyberattacks. “Hospitals hold some of the most sensitive data that exists, including medical records, identity information and insurance details. That combination of urgency and high-value data makes them very attractive targets.”

Advertisement

Healthcare systems also rely on vendors and service providers. One weak link can open the door. “In healthcare, you’re only as secure as the entire ecosystem around you,” Amper said.

How AI-powered impersonation is changing the game

Many people imagine hackers breaking through firewalls. That still happens. But today, attackers often target people instead of systems. “What we’re seeing more and more is that attacks aren’t always about breaking into systems, they’re about tricking people,” Amper said.

Artificial intelligence (AI) has made impersonation easier and scalable. Criminals can clone voices, generate convincing emails or create deepfake videos that appear to come from a trusted doctor, vendor or IT administrator. “AI doesn’t replace social engineering, it supercharges it.”

In practical terms, that might mean an employee receives what looks like a legitimate request to reset a password or approve a login. One click can open the door. “An employee is tricked into giving up credentials or approving a fraudulent authentication request. The attacker logs in as a legitimate user, and from there, they move quietly through internal systems,” Amper explained. Because the activity appears to come from a real employee, it may go undetected until significant damage is done.

5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK

Advertisement

Healthcare workers operate in high pressure environments, which makes social engineering and impersonation attacks more effective. (Paul Bersebach/MediaNews Group/Orange County Register/Getty Images)

Why hospitals are especially vulnerable to cyberattacks

Inside a hospital, speed matters. Decisions happen quickly, and staff move from one urgent task to the next. That constant pressure creates opportunities for attackers who rely on deception. “Healthcare professionals are focused on patients, not cybersecurity. They work in high-pressure environments where speed matters. That urgency can make it easier for attackers to exploit trust or distraction,” Amper said.

Many hospitals also operate with legacy systems layered over time. Security was often added after the fact rather than built in from the start. That complexity increases risk. He also challenges how leaders think about the problem. “One misconception is thinking of cybersecurity as just an IT problem,” Amper said.

Today’s hospitals depend on digital systems for intake, diagnostics and billing. When those systems fail, care delivery suffers. “Cybersecurity today is fundamentally about operational resilience. It’s about keeping the hospital running safely and continuously.”

What happens to your data after a breach

When a hospital is breached, the exposed data often goes beyond a credit card number. “Breaches can expose medical histories, Social Security numbers, insurance information, billing details and contact data,” Amper said.

Advertisement

That combination is powerful. Criminals can use it for identity fraud, insurance fraud and highly targeted scams. Unlike a credit card, a medical identity cannot simply be replaced. “Stolen medical data can’t simply be canceled and replaced. That makes it especially valuable and long-lasting in criminal markets.”

The impact may not show up right away. “The impact isn’t always immediate; it can surface months or even years later.”

When hospital networks are breached, sensitive medical histories, identity details and insurance data can be exposed for years. (iStock)

How hospitals can strengthen defenses

Identity now sits at the center of cybersecurity. “Identity has become the front line of cybersecurity. If an attacker can successfully impersonate a trusted user, many traditional defenses can be bypassed,” Amper said. Stronger identity verification, layered authentication and systems that can detect impersonation or deepfakes are becoming essential. The more certain a hospital is about who is accessing its systems, the harder it becomes for attackers to move quietly.

How to check if your information is on the dark web

After a hospital breach, many patients worry about whether their data has been sold or shared. One simple step is checking whether your email address appears in known data breaches. You can visit haveibeenpwned.com and enter your email address into the search bar. The site will show whether your information has appeared in past breaches tied to that email. If your email appears in a breach, take action immediately. Change passwords for affected accounts and make sure each account uses a unique password.

Advertisement

What patients should do after a hospital breach

If you receive a breach notification letter, do not panic. But do act. Amper offers clear guidance. “First, stay calm but take it seriously. Read the notice carefully and enroll in any credit or identity monitoring services offered.”

Then take practical steps right away:

  • Review insurance statements for unfamiliar claims
  • Check medical records for incorrect diagnoses or procedures
  • Monitor your credit reports
  • Consider placing a free credit freeze with the major credit bureaus if your Social Security number was exposed
  • Enable two-factor authentication (2FA) on email, financial and healthcare accounts wherever it is available
  • Be cautious of emails or calls referencing the breach
  • Reducing the amount of personal information available on data broker sites with a data removal service can also limit how easily scammers craft convincing follow-up attacks using your real details. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

“If something feels off, contact the hospital directly using official contact information. Don’t rely on links or numbers provided in unexpected messages.” He adds one final reminder. “Take your medical identity as seriously as your financial identity. Monitor your records, question anything unfamiliar and stay alert.”

Protect your accounts from long-term damage

Even if everything appears normal right now, take steps to secure your accounts. Credential leaks often surface weeks or months later.

  • Consider identity theft protection. Identity monitoring services can alert you if criminals try to open accounts in your name or misuse your personal information. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com
  • Stop reusing passwords immediately. If attackers gain access to one working login, they often test it across dozens of websites automatically.
  • Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password.
  • Consider using a password manager to generate and store strong passwords securely. You can also use breach scanning tools that alert you if your email address or passwords appear in future leaks. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
  • Install strong antivirus software on your devices to help detect malware, phishing links and credential-stealing threats that could target you after a breach. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

Taking these steps now can prevent a hospital breach from turning into long-term identity damage later.

Kurt’s key takeaways

When hospital cyberattacks disrupt care, the consequences ripple across entire communities. Appointments get canceled. Surgeries are delayed. Families worry. This is not only about stolen records. It is about trust in the healthcare system. Technology has transformed medicine. It has also created new risks. The challenge now is building resilience into every layer of care. Because the next cyberattack will not feel like a TV episode. It will feel personal.

And that raises an uncomfortable question. If your local hospital went offline tomorrow, would you trust that your medical identity and your care are truly protected? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Valve’s huge SteamOS 3.8 update adds long-awaited features — and supports Steam Machine

Published

on

Valve’s huge SteamOS 3.8 update adds long-awaited features — and supports Steam Machine

Not only is it the first release to support the upcoming Steam Machine living room gaming PC, it comes with long-awaited features for Valve’s handhelds and more support for other companies’ handhelds than we’ve seen to date — including Microsoft and Asus’ Xbox Ally series, the Lenovo Legion Go 2, the OneXPlayer X1, and additional support for MSI, GPD, Anbernic, OrangePi, and Zotac.

The one that excites me most: Valve is adding genuine hibernation and “memory power down” modes to the Steam Deck — though just the LCD model to start — which should help extend battery life when you hit the power button or leave them idle. Some Windows machines currently last longer than the Steam Deck when asleep, because they self-hibernate to save power, while the Steam Deck has an instant-on sleep mode.

Plus, Valve has finally added a setting in its gaming mode to let you use your Bluetooth headset microphones — something I’ve been asking for since the beginning. (Valve did add it to the Linux desktop mode last year.) And the Steam Deck LCD is finally getting Bluetooth Wake re-enabled, so you can turn on your TV-connected Deck with a wireless controller from your couch.

The update comes with all sorts of improvements for the Linux desktop modes that sound like they’ll come in handy on a Steam Machine plugged into a TV or monitor, too, including desktop HDR, VRR display support, per-display scaling, “improved windowing behavior for games running in Proton,” and an upgrade to KDE Plasma 6.4.3 among other things.

And for a Steam Machine or Steam handheld plugged into a home entertainment system, they can now detect how many audio channels you have over HDMI to enable surround sound. (I believe surround sound was already a thing, so perhaps this is just a different and better automatic implementation.)

Advertisement

There’s also a new Arch system base and an updated graphics driver.

Perhaps most surprisingly, the “Non-Deck” section of the changelog is huge. Valve says long-pressing your power button should work “across a wide variety of devices” to power off, restart, or switch to the desktop mode. You should be able to change your processor’s power modes on the Xbox Ally now, and night mode and screen color settings should work on AMD Z2 Extreme handhelds in general.

There’s also “Greatly improved video memory management with discrete GPU platforms,” you can limit how far the battery charges in any of the Lenovo Legion Go handhelds (in desktop mode), and it should fix “washed out colors for Zotac and OneXPlayer handhelds with OLED.”

There’s a lot in this update, and it’s possible I missed a feature you care about, so check out the whole changelog here and below.

Advertisement
Continue Reading

Technology

Fox News AI Newsletter: Wall-climbing robots swarm US Navy warships

Published

on

Fox News AI Newsletter: Wall-climbing robots swarm US Navy warships

NEWYou can now listen to Fox News articles!

Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

IN TODAY’S NEWSLETTER:

WATCH: Wall-climbing robot swarms crawl US Navy warships as China’s fleet surges

OPINION: AI comes with a hefty charge, and you are the one who gets stuck with the bill

Advertisement

Dell workforce shrinks 10% for third consecutive year

Swarms of wall-climbing robots will soon be crawling across U.S. Navy warships in a $71 million effort to slash repair delays and boost fleet readiness as China continues expanding its naval power.  (Gecko Robotics )

TECH AT SEA: WATCH: wall-climbing robot swarms crawl US Navy warships as China’s fleet surgesFox News Digital reports on a new development in naval technology, featuring wall-climbing robot swarms that are crawling on U.S. Navy warships. This advancement comes at a critical time in defense politics as China’s naval fleet continues to surge in size and capability.

WALLET SHOCK: OPINION: AI comes with a hefty charge, and you are the one who gets stuck with the bill – In this opinion piece, the author discusses the economic implications of the growing artificial intelligence industry. The article argues that the hefty costs associated with AI development and its massive energy infrastructure will ultimately be passed down, leaving everyday consumers to foot the bill.

Dell Technologies headquarters in Round Rock, Texas, US, on Sunday, Nov. 26, 2023.  (Sergio Flores/Bloomberg via Getty Images)

Advertisement

COST CRUNCH: Dell workforce shrinks 10% for third consecutive year – Fox Business reports that Dell’s workforce has shrunk by ten percent. This marks the third consecutive year of workforce reductions for the major technology company amid shifting economic conditions and corporate restructuring.

AIMING HIGH: FULL AUTONOMY: AI pilot technology advances towards military capability – Merlin CEO Matt George details how the company is using artificial intelligence to enable military and commercial aircraft to operate fully autonomously on Fox Business’ ‘The Claman Countdown.’

Single family homes in a residential neighborhood in San Marcos, Texas, US, on Tuesday, March 12, 2024. (Photographer: Jordan Vonderhaar/Bloomberg via Getty Images)

SHOULD I BUY?: Homebuyers, sellers turning to AI chatbots for advice – Prairie Operating Co.’s Lou Basenese and real estate broker Kirsten Jordan discuss how artificial intelligence is impacting homebuyers and sellers on ‘Fox Business In Depth.’

DISRUPTION IS HERE: Charles Payne: AI disruption is here – Fox Business host Charles Payne discusses the economic impact of the rise in artificial intelligence on ‘Making Money.’

Advertisement

BUILDING HER BUSINESS: How Angie Hicks turned Angi into a home services giant and AI player – Angi co-founder Angie Hicks discusses entrepreneurship, company growth and how she built out her business on ‘Mornings with Maria.’

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
X
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

Fox News
Fox Business
Fox Weather
Fox Sports
Tubi

WATCH FOX NEWS ONLINE

Fox News Go

Advertisement

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements, and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Advertisement
Continue Reading

Trending