Technology
End of annoying robocalls? FTC cracks down on deceptive practices
The Federal Trade Commission reached a settlement with XCast Labs after the Voice over Internet Protocol provider was accused of facilitating billions of robocalls. Federal regulators sued the California-based company, claiming it helped other companies navigate around the Do Not Call Registry.
Now, XCast Labs might have to pay a $10 million fine and must start screening companies to make sure they’re following U.S. telemarketing laws.
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
Woman talking on cellphone (Kurt “CyberGuy” Knutsson)
How XCast Labs is accused of helping scammers make millions of fake calls
XCast Labs is accused of aiding other companies to make more than a hundred million robocalls. The California-based voice provider denies any wrongdoing in the settlement. The FTC has been on the case since 2020. That’s when it sent out a letter to Voice over Internet Protocol providers, including XCast Labs, reminding them that aiding illegal telemarketers is against the law.
It filed a complaint back in May, claiming the company still transmitted illegal robocalls. Some of those calls even involved telemarketers posing as government officials, including from the Social Security Administration.
Not only will XCast Labs face a proposed $10 million fine and begin screening companies, but it also has to cut business ties with illegal telemarketers.
Woman talking on cellphone (Kurt “CyberGuy” Knutsson)
MORE: HOW HACKERS CAN SEND TEXT MESSAGES FROM YOUR PHONE WITHOUT YOU KNOWING
How to protect yourself from robocalls
There are 7 things you can do to keep robocalls away.
1) Register your phone number with the National Do Not Call Registry
You can register your phone number with the National Do Not Call Registry using this link. While this settlement proves there are ways around the registry, it’s still an additional layer of security.
2) If you don’t recognize the number, don’t pick it up
Simple as this sounds, this is the easiest way of avoiding a potentially dangerous call. Most carriers now have a way of identifying robocalls by identifying them as “Spam Risk” or the like. Another way they try to get you is by using your local area code, sometimes even the first three digits of your or a family member’s phone number, to entice you to answer. Making it all the more important for you to take an extra careful look at the number on your screen.
3) You should also consider blocking numbers in your phone settings
Another way around this is by blocking unknown phone numbers in your phone settings
For iPhone users: To silence unknown callers:
*Settings may vary depending on your Android phone’s manufacturer
- Tap Settings
- Tap Phone
- Tap Silence Unknown Callers
- Then toggle to turn it on – it will turn green
- If a 911 call is placed, this feature is disabled for 24 hours so that emergency calls to you can ring through
Silence Unknown Callers feature on iPhone (Kurt “CyberGuy” Knutsson)
For Android users: To silence unknown callers:
- Tap Settings
- Tap Block numbers
- Turn on the Block Unknown Callers feature
One thing that is important to remember should you use this feature is that it not only blocks potential SPAM callers, but it also blocks any unknown phone number you have never called or texted. So, you might want to think twice about enabling this if you’re expecting a call from someone from whom you haven’t received a call or text.
4) Telemarketers and spammers could be getting your phone number online
Your personal information is out on the web. If you want to make your personal information inaccessible, you might want to look into removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for removal services here.
5) Manually block numbers from spam robocalls
Should an unknown number have called you and not left a voice message, it’s more than likely it was a robocall. While other robocalls go directly to voicemail with a threatening or enticing message, urging those truly vulnerable to act fast. Either way, you can manually block these numbers on an iPhone by:
- Tapping the unknown number
- Scroll down on your screen and tap “Block This Caller”
- Tap “Block Contact”
MORE: HOW TO SEND SPAM CALLS DIRECTLY TO VOICEMAIL
6) Use your wireless carrier’s free spam and robocall-blocking service
Several wireless carriers provide their own free robocall scanning and blocking services. Among them:
- AT&T Call Protect – Available for iPhones and Androids, it lets customers manually block unwanted calls and labels suspected robocalls as a “spam risk,” as well as making efforts to prevent unwanted calls from reaching you.
- Sprint/T-Mobile Scam Shield – An app that labels all potentially dangerous calls as “Scam likely” and opens free controls for several anti-scam protections, including Scam ID, Scam Block and Caller ID. Additionally, the app also provides you with a second phone number for use instead of your private one, ideal for online shopping and helping you avoid calls from scammers as well as telemarketers.
- Verizon Call Filter app – Helps protect you from unwanted calls and lets you decide who can reach you. Call Filter also detects spam and blocks high-risk spam calls by forwarding them to voicemail.
7) Third-party spam-blocking apps
Several third-party apps can help protect you from scam artists. Among our most recommended include:
- RoboKiller is an app that claims to reduce 99% of unwanted calls or texts. The app is not free for iPhone and Android users. However, it comes with a 7-day free trial, which might be worth checking out before investing.
- Call Control is an app currently only available to Android users; the app helps you filter out unwanted callers by manually adding them to a blacklist.
- Nomorobo: For those of you who still have a landline, thanks to a package deal with your internet providers, this app helps prevent robocalls from reaching you both at home and on the go. Currently free for VolP landlines, the basic mobile package currently starts at $1.99 a month.
Woman using her cellphone (Kurt “CyberGuy” Knutsson)
MORE: HOW TO IGNORE YOUR FRIEND’S TEXT MESSAGES AND PRETEND YOU NEVER SAW THEM
What about spam texts?
You might recall all 51 attorney generals backing a proposal by the Federal Communications Commission (FCC) to put an end to illegal and malicious texts. Since then, the FCC has included spam texts in do-not-call protections. More companies are also looking for ways to fine spammers. T-Mobile just introduced new fines for illegal spam texting this year. You can also block spam texts on an iPhone and Android following these steps.
How to block spam texts on an iPhone
- Open the Messages app on your iPhone and then the message from the number you want to block
- Tap the number or contact name at the top of the conversation
- Tap Info
- Scroll down and tap Block this Caller
How to block spam texts on an Android
Settings may vary depending on your Android phone’s manufacturer.
- Open the messaging app on your Android device
- Find the spam message you want to block
- Tap and hold the message until a menu appears
- Look for an option like Block or Spam and select it
- Confirm you want to block future messages from that sender
How to block texts using your carrier
Most carriers also offer options to block spam calls and texts, such as Verizon’s Block Calls & Messages, AT&T’s Secure Family and T-Mobile’s Message blocking. The exact steps to use these features will vary depending on your carrier.
Kurt’s key takeaways
While this settlement proves there are ways around the National Do Not Call Registry, it also highlights how important it is to have as many layers of security as you can. Each one protects you at a different level, ensuring spam calls and texts likely won’t head your way.
Are you worried about more companies skirting past the National Do Not Call Registry? How do you keep robocalls at bay? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Best gift ideas:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Hospital cyberattacks threaten patient safety
NEWYou can now listen to Fox News articles!
If you watched a recent episode of “The Pitt” on Max, a streaming medical drama about life inside a high-pressure emergency department, you saw how quickly a hospital can spiral during a cyberattack. It made for gripping television. But in Mississippi, it was not a script. It was real life.
After a ransomware attack hit the University of Mississippi Medical Center, clinics across the state closed. Elective procedures were canceled. Phone systems and emails went down. Emergency care continued, but access to electronic medical records was disrupted.
When a hospital’s systems fail, the impact goes far beyond IT. It affects real people waiting for care. That is why hospital cyberattacks are no longer just a tech problem. They are a public safety issue.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
FIGURE DATA BREACH EXPOSES NEARLY 1M ACCOUNTS
A ransomware attack can lock hospital systems in seconds, disrupting access to critical medical records and patient care. (iStock)
Why hospitals have become prime targets
Hospitals cannot afford downtime. When systems fail, patient care is immediately affected, and the pressure to restore operations is intense. Ricardo Amper, founder and CEO of Incode Technologies, a digital identity verification and biometric authentication company, explains the reality.
“Hospitals are in a uniquely difficult position. If systems go down, patient care is immediately affected. That creates real pressure to restore operations fast, which is why ransomware groups often target healthcare.” He points to another major factor driving hospital cyberattacks. “Hospitals hold some of the most sensitive data that exists, including medical records, identity information and insurance details. That combination of urgency and high-value data makes them very attractive targets.”
Healthcare systems also rely on vendors and service providers. One weak link can open the door. “In healthcare, you’re only as secure as the entire ecosystem around you,” Amper said.
How AI-powered impersonation is changing the game
Many people imagine hackers breaking through firewalls. That still happens. But today, attackers often target people instead of systems. “What we’re seeing more and more is that attacks aren’t always about breaking into systems, they’re about tricking people,” Amper said.
Artificial intelligence (AI) has made impersonation easier and scalable. Criminals can clone voices, generate convincing emails or create deepfake videos that appear to come from a trusted doctor, vendor or IT administrator. “AI doesn’t replace social engineering, it supercharges it.”
In practical terms, that might mean an employee receives what looks like a legitimate request to reset a password or approve a login. One click can open the door. “An employee is tricked into giving up credentials or approving a fraudulent authentication request. The attacker logs in as a legitimate user, and from there, they move quietly through internal systems,” Amper explained. Because the activity appears to come from a real employee, it may go undetected until significant damage is done.
5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK
Healthcare workers operate in high pressure environments, which makes social engineering and impersonation attacks more effective. (Paul Bersebach/MediaNews Group/Orange County Register/Getty Images)
Why hospitals are especially vulnerable to cyberattacks
Inside a hospital, speed matters. Decisions happen quickly, and staff move from one urgent task to the next. That constant pressure creates opportunities for attackers who rely on deception. “Healthcare professionals are focused on patients, not cybersecurity. They work in high-pressure environments where speed matters. That urgency can make it easier for attackers to exploit trust or distraction,” Amper said.
Many hospitals also operate with legacy systems layered over time. Security was often added after the fact rather than built in from the start. That complexity increases risk. He also challenges how leaders think about the problem. “One misconception is thinking of cybersecurity as just an IT problem,” Amper said.
Today’s hospitals depend on digital systems for intake, diagnostics and billing. When those systems fail, care delivery suffers. “Cybersecurity today is fundamentally about operational resilience. It’s about keeping the hospital running safely and continuously.”
What happens to your data after a breach
When a hospital is breached, the exposed data often goes beyond a credit card number. “Breaches can expose medical histories, Social Security numbers, insurance information, billing details and contact data,” Amper said.
That combination is powerful. Criminals can use it for identity fraud, insurance fraud and highly targeted scams. Unlike a credit card, a medical identity cannot simply be replaced. “Stolen medical data can’t simply be canceled and replaced. That makes it especially valuable and long-lasting in criminal markets.”
The impact may not show up right away. “The impact isn’t always immediate; it can surface months or even years later.”
When hospital networks are breached, sensitive medical histories, identity details and insurance data can be exposed for years. (iStock)
How hospitals can strengthen defenses
Identity now sits at the center of cybersecurity. “Identity has become the front line of cybersecurity. If an attacker can successfully impersonate a trusted user, many traditional defenses can be bypassed,” Amper said. Stronger identity verification, layered authentication and systems that can detect impersonation or deepfakes are becoming essential. The more certain a hospital is about who is accessing its systems, the harder it becomes for attackers to move quietly.
How to check if your information is on the dark web
After a hospital breach, many patients worry about whether their data has been sold or shared. One simple step is checking whether your email address appears in known data breaches. You can visit haveibeenpwned.com and enter your email address into the search bar. The site will show whether your information has appeared in past breaches tied to that email. If your email appears in a breach, take action immediately. Change passwords for affected accounts and make sure each account uses a unique password.
What patients should do after a hospital breach
If you receive a breach notification letter, do not panic. But do act. Amper offers clear guidance. “First, stay calm but take it seriously. Read the notice carefully and enroll in any credit or identity monitoring services offered.”
Then take practical steps right away:
- Review insurance statements for unfamiliar claims
- Check medical records for incorrect diagnoses or procedures
- Monitor your credit reports
- Consider placing a free credit freeze with the major credit bureaus if your Social Security number was exposed
- Enable two-factor authentication (2FA) on email, financial and healthcare accounts wherever it is available
- Be cautious of emails or calls referencing the breach
- Reducing the amount of personal information available on data broker sites with a data removal service can also limit how easily scammers craft convincing follow-up attacks using your real details. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
“If something feels off, contact the hospital directly using official contact information. Don’t rely on links or numbers provided in unexpected messages.” He adds one final reminder. “Take your medical identity as seriously as your financial identity. Monitor your records, question anything unfamiliar and stay alert.”
Protect your accounts from long-term damage
Even if everything appears normal right now, take steps to secure your accounts. Credential leaks often surface weeks or months later.
- Consider identity theft protection. Identity monitoring services can alert you if criminals try to open accounts in your name or misuse your personal information. See my tips and best picks on Best Identity Theft Protection at Cyberguy.com
- Stop reusing passwords immediately. If attackers gain access to one working login, they often test it across dozens of websites automatically.
- Change reused passwords first, starting with email, financial and cloud accounts. Each account should have its own unique password.
- Consider using a password manager to generate and store strong passwords securely. You can also use breach scanning tools that alert you if your email address or passwords appear in future leaks. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
- Install strong antivirus software on your devices to help detect malware, phishing links and credential-stealing threats that could target you after a breach. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
Taking these steps now can prevent a hospital breach from turning into long-term identity damage later.
Kurt’s key takeaways
When hospital cyberattacks disrupt care, the consequences ripple across entire communities. Appointments get canceled. Surgeries are delayed. Families worry. This is not only about stolen records. It is about trust in the healthcare system. Technology has transformed medicine. It has also created new risks. The challenge now is building resilience into every layer of care. Because the next cyberattack will not feel like a TV episode. It will feel personal.
And that raises an uncomfortable question. If your local hospital went offline tomorrow, would you trust that your medical identity and your care are truly protected? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Valve’s huge SteamOS 3.8 update adds long-awaited features — and supports Steam Machine
Not only is it the first release to support the upcoming Steam Machine living room gaming PC, it comes with long-awaited features for Valve’s handhelds and more support for other companies’ handhelds than we’ve seen to date — including Microsoft and Asus’ Xbox Ally series, the Lenovo Legion Go 2, the OneXPlayer X1, and additional support for MSI, GPD, Anbernic, OrangePi, and Zotac.
The one that excites me most: Valve is adding genuine hibernation and “memory power down” modes to the Steam Deck — though just the LCD model to start — which should help extend battery life when you hit the power button or leave them idle. Some Windows machines currently last longer than the Steam Deck when asleep, because they self-hibernate to save power, while the Steam Deck has an instant-on sleep mode.
Plus, Valve has finally added a setting in its gaming mode to let you use your Bluetooth headset microphones — something I’ve been asking for since the beginning. (Valve did add it to the Linux desktop mode last year.) And the Steam Deck LCD is finally getting Bluetooth Wake re-enabled, so you can turn on your TV-connected Deck with a wireless controller from your couch.
The update comes with all sorts of improvements for the Linux desktop modes that sound like they’ll come in handy on a Steam Machine plugged into a TV or monitor, too, including desktop HDR, VRR display support, per-display scaling, “improved windowing behavior for games running in Proton,” and an upgrade to KDE Plasma 6.4.3 among other things.
And for a Steam Machine or Steam handheld plugged into a home entertainment system, they can now detect how many audio channels you have over HDMI to enable surround sound. (I believe surround sound was already a thing, so perhaps this is just a different and better automatic implementation.)
There’s also a new Arch system base and an updated graphics driver.
Perhaps most surprisingly, the “Non-Deck” section of the changelog is huge. Valve says long-pressing your power button should work “across a wide variety of devices” to power off, restart, or switch to the desktop mode. You should be able to change your processor’s power modes on the Xbox Ally now, and night mode and screen color settings should work on AMD Z2 Extreme handhelds in general.
There’s also “Greatly improved video memory management with discrete GPU platforms,” you can limit how far the battery charges in any of the Lenovo Legion Go handhelds (in desktop mode), and it should fix “washed out colors for Zotac and OneXPlayer handhelds with OLED.”
There’s a lot in this update, and it’s possible I missed a feature you care about, so check out the whole changelog here and below.
Technology
Fox News AI Newsletter: Wall-climbing robots swarm US Navy warships
Under the five-year contract, Gecko will begin work on 18 ships in the U.S. Pacific Fleet, with the initial award valued at up to $54 million. The contract vehicle is structured to allow other military services to access the technology as well. (Gecko Robotics )
NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.
IN TODAY’S NEWSLETTER:
– WATCH: Wall-climbing robot swarms crawl US Navy warships as China’s fleet surges
– OPINION: AI comes with a hefty charge, and you are the one who gets stuck with the bill
– Dell workforce shrinks 10% for third consecutive year
Swarms of wall-climbing robots will soon be crawling across U.S. Navy warships in a $71 million effort to slash repair delays and boost fleet readiness as China continues expanding its naval power. (Gecko Robotics )
TECH AT SEA: WATCH: wall-climbing robot swarms crawl US Navy warships as China’s fleet surges – Fox News Digital reports on a new development in naval technology, featuring wall-climbing robot swarms that are crawling on U.S. Navy warships. This advancement comes at a critical time in defense politics as China’s naval fleet continues to surge in size and capability.
WALLET SHOCK: OPINION: AI comes with a hefty charge, and you are the one who gets stuck with the bill – In this opinion piece, the author discusses the economic implications of the growing artificial intelligence industry. The article argues that the hefty costs associated with AI development and its massive energy infrastructure will ultimately be passed down, leaving everyday consumers to foot the bill.
Dell Technologies headquarters in Round Rock, Texas, US, on Sunday, Nov. 26, 2023. (Sergio Flores/Bloomberg via Getty Images)
COST CRUNCH: Dell workforce shrinks 10% for third consecutive year – Fox Business reports that Dell’s workforce has shrunk by ten percent. This marks the third consecutive year of workforce reductions for the major technology company amid shifting economic conditions and corporate restructuring.
AIMING HIGH: FULL AUTONOMY: AI pilot technology advances towards military capability – Merlin CEO Matt George details how the company is using artificial intelligence to enable military and commercial aircraft to operate fully autonomously on Fox Business’ ‘The Claman Countdown.’
Single family homes in a residential neighborhood in San Marcos, Texas, US, on Tuesday, March 12, 2024. (Photographer: Jordan Vonderhaar/Bloomberg via Getty Images)
SHOULD I BUY?: Homebuyers, sellers turning to AI chatbots for advice – Prairie Operating Co.’s Lou Basenese and real estate broker Kirsten Jordan discuss how artificial intelligence is impacting homebuyers and sellers on ‘Fox Business In Depth.’
DISRUPTION IS HERE: Charles Payne: AI disruption is here – Fox Business host Charles Payne discusses the economic impact of the rise in artificial intelligence on ‘Making Money.’
BUILDING HER BUSINESS: How Angie Hicks turned Angi into a home services giant and AI player – Angi co-founder Angie Hicks discusses entrepreneurship, company growth and how she built out her business on ‘Mornings with Maria.’
FOLLOW FOX NEWS ON SOCIAL MEDIA
Facebook
Instagram
YouTube
X
LinkedIn
SIGN UP FOR OUR OTHER NEWSLETTERS
Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health
DOWNLOAD OUR APPS
Fox News
Fox Business
Fox Weather
Fox Sports
Tubi
WATCH FOX NEWS ONLINE
Fox News Go
STREAM FOX NATION
Fox Nation
Stay up to date on the latest AI technology advancements, and learn about the challenges and opportunities AI presents now and for the future with Fox News here.
-
Detroit, MI2 days agoDrummer Brian Pastoria, longtime Detroit music advocate, dies at 68
-
Oklahoma6 days agoFamily rallies around Oklahoma father after head-on crash
-
Nebraska1 week agoWildfire forces immediate evacuation order for Farnam residents
-
Georgia4 days agoHow ICE plans for a detention warehouse pushed a Georgia town to fight back | CNN Politics
-
Massachusetts1 week agoMassachusetts community colleges to launch apprenticeship degree programs – The Boston Globe
-
Alaska5 days agoPolice looking for man considered ‘armed and dangerous’
-
Colorado1 week ago‘It’s Not a Penalty’: Bednar Rips Officials For MacKinnon Ejection | Colorado Hockey Now
-
Southwest1 week agoTalarico reportedly knew Colbert interview wouldn’t air on TV before he left to film it