Connect with us

Technology

Energy-saving scam uses Elon Musk’s name – Here’s the truth

Published

on

Energy-saving scam uses Elon Musk’s name – Here’s the truth

Elon Musk, known for leading companies like Tesla, SpaceX, Neuralink and xAI and buying and rebranding Twitter as X, often finds his name linked to innovation and futuristic ideas. But his reputation also makes him a prime target for scammers.

In the past, fraudsters have used Musk’s name in cryptocurrency schemes. Now, a new scam is making the rounds. This time, scammers are promoting bogus “energy-saving” devices, falsely associating Musk with these products to gain credibility. These devices, which don’t work as advertised, are being marketed as revolutionary solutions, duping people into spending money on what is essentially a scam.

We received this email from Rick in Wilkesboro, North Carolina: “I’ve been receiving emails offering an energy-saving device developed by Elon Musk. It claims the device can reduce energy bills by 50%. I never attempted to contact anyone associated with Elon Musk, nor have I done any internet searches for such a device. Are these emails legit or another attempt by scammers hoping I click on their links?”

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Rick, it sounds like those emails are likely scams. There have been numerous reports of scammers using Elon Musk’s name to promote fake energy-saving devices. These scams often claim that the device can drastically reduce energy bills, but there is no evidence that Elon Musk or any of his companies are involved in such products.

Advertisement

Let’s dive into how this scam works and share some ways you can stay safe.

Illustration of a scammer at work (Kurt “CyberGuy” Knutsson)

How does Elon Musk’s energy-saving scam work?

The Elon Musk energy-saving scam works by using flashy online ads, unsolicited emails and other deceptive tactics to lure victims. Scammers promote so-called “revolutionary” devices through social media, pop-ups, emails and even search engine ads, claiming the products are backed by Musk.

These ads often include fake customer reviews, exaggerated claims of slashing electricity bills by 50% or more and time-limited discounts to create urgency. Names of devices advertised in these scams include the Power Pro Save, Heunwa Power Save, Stop Watt, Miracle Watt, True Watt, Real Watt, Watt Rescue, Esaver Watt, Pro Power Save, Voltmod and more. 

Clicking on these ads leads you to sales websites designed to look legitimate. They feature fake logos, doctored before-and-after photos and bogus celebrity endorsements to build trust. The sites throw around pseudo-scientific jargon like “stabilizing electrical currents” or “rebalancing loads” to sound convincing. They also use tactics like showing inflated “regular” prices crossed out to make the current offer seem like a huge bargain.

Advertisement

If you look closely, though, the red flags are clear. These sites lack basic details like a company address, contact number or business registration information. Instead, they push you to place an order through an online form, demanding full payment upfront via credit card or PayPal.

After paying, customers might receive a cheap, non-functional plastic device, or sometimes nothing at all. These devices don’t reduce electricity usage. They might even waste more power. But by the time you realize it, the scammers have already pocketed your money.

Elon Musk scam email ads (Kurt “CyberGuy” Knutsson)

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

The truth about energy-saving devices

Over the years, plenty of power-saving scams have promised to cut down or even eliminate your electricity bill by simply plugging in their devices. The reality is that there’s no device you can plug in that will actually reduce your electricity usage or lower your household bill.

Advertisement

These products often claim to “stabilize voltage” or “reduce power waste.” While voltage stabilization can be useful in industrial settings, it doesn’t make much difference for typical home appliances. Most household appliances are already designed to run efficiently without the issues these devices claim to fix.

If you’re serious about saving on electricity, focus on practical solutions like upgrading to energy-efficient appliances, using smart home devices or adjusting your energy usage schedule.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

A person checking email on a phone (Kurt “CyberGuy” Knutsson)

SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME

Advertisement

Red flags to watch out for

Too good to be true: Claims of reducing energy bills by 50% or more are often exaggerated and unrealistic.

Unsolicited emails: Receiving emails out of the blue, especially when you haven’t shown interest in such products, is a common tactic used by scammers.

Use of celebrity names: Scammers frequently use well-known names like Elon Musk to lend credibility to their schemes.

Suspicious links: Be cautious of clicking on links in unsolicited emails. They can lead to phishing sites designed to steal your personal information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10 ways to stay safe from such scams

1. Verify the email: Phishing emails are a common tool scammers use to trick people into buying fake products or giving away personal information. These emails often look like they’re from legitimate sources, but they contain links that lead to fraudulent websites or prompt you to download malicious attachments. Always check the sender’s email address and look for signs of a fake message, like poor grammar or urgent calls to action. 

Advertisement

2. Verify claims: If you’re curious about a product, do some research from reputable sources before taking any action.

3. Do not click links: Avoid clicking on any links or downloading attachments from these emails. Instead, hover over the link to see its true destination. This can help you identify if it leads to a legitimate site or a malicious one.

4. Have strong antivirus software actively running on your devices: Ensure you have reliable antivirus software installed on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5. Examine the website carefully: Scammers often create websites that look professional, but they’re easy to spot with a few simple checks. Look for missing or suspicious information, like the absence of a business address, phone number or business registration details. If there are fake testimonials or celebrity endorsements, that’s a red flag.

Advertisement

6. Don’t fall for “too good to be true” deals: Scammers rely on offering deals that seem too good to pass up, like massive discounts or a “limited time offer.” If an ad claims you can save 50% or more on a product, be skeptical. Real, quality products usually don’t come with such extreme savings, and high-tech devices like those promoted by scammers rarely live up to the hype. If it feels like too good a deal, it probably is.

7. Watch out for unusual payment methods: One of the easiest ways to spot a scam is by how the scammers ask you to pay. If a website asks for payment upfront via credit card or PayPal with no option to verify or ship the product first, it’s a major red flag. Scammers take your money upfront and have no intention of sending you anything of value. Stick to reputable payment methods that offer buyer protection and avoid sites that ask for payment without proper verification.

8. Mark spam email as junk or spam: Most email providers have a feature that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.

9. Do not share your email address publicly or with unknown sources: This can reduce the chances of your email address being collected by spammers. You can also use a disposable email or email alias for signing up for online services that you do not trust or need.

10. Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams.

Advertisement

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

YOUR EMAIL DIDN’T EXPIRE, IT’S JUST ANOTHER SNEAKY SCAM

Kurt’s key takeaway

Impersonation scams are a common way scammers steal your money. They often use well-known names like Elon Musk or big companies like Microsoft and Walmart to make you trust them, then trick you into giving away your financial details. To stay safe, avoid unsolicited emails or texts that promote products or offers. If you need to buy something, stick to trusted sellers like Amazon, Best Buy or other reputable platforms. Always double-check the legitimacy of any offer before making a purchase, especially if it comes from an unfamiliar source.

Have you ever encountered a scam using a well-known name or brand? What happened? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2025 CyberGuy.com. All rights reserved.

Technology

Slay the Spire II is even better with a friend

Published

on

Slay the Spire II is even better with a friend

Slay the Spire II launched in early access last week, and it’s already an excellent sequel to one of the best roguelikes of all time. In many ways, it’s very similar to its predecessor. Like Hades II and Hollow Knight: Silksong, Slay the Spire II mostly iterates on an already superb foundation. But it does add online co-op with up to four players. While multiplayer changes the familiar rhythms of Slay the Spire just a bit, it’s still a great way to tackle the arduous climb up the spire.

A round of Slay the Spire II plays essentially the same as the original: In each run, you navigate three different acts across a winding map, slowly making a build by crafting your deck and picking up various perk-giving relics, and fighting enemies, elites, and bosses along the way. Slay the Spire II retains the deliberate, turn-based style of play, meaning that when it’s your turn, you have as much time as you want to decide what to do. Since you can see exactly what your enemies are planning for their next turn, there’s a lot of strategy in deciding how much damage to do and how much defense you might need to set up. Multiplayer adds a slight twist: When it’s your turn, everyone can play simultaneously. That opens up all sorts of new opportunities for planning, but it also requires communication to make sure everyone is using their cards effectively.

My multiplayer partner was my wife, the biggest Slay the Spire fan I know, and on our second run we got a thrilling victory. I played the new Necrobinder character, a necromancer, while she played as the returning Silent, which can make decks built around flurries of shivs. Over the course of the run, we accidentally settled into a strategy where I focused on applying the Vulnerable status to as many enemies as possible before my wife would rain down shivs upon our foes.

Slay the Spire II doesn’t encourage teamwork only in battles. At a campfire rest stop, you can choose to mend a friend’s health to help them out. (Some of the new enemies are tough, so I’m glad this is an option.) You each get a vote on which path to take next on the map. Everyone can draw on the map, too — as I learned many times after seeing the doodles my wife made when I would spend too long in the shop.

Since we had to communicate so much, our winning run took about an hour and a half, slower than how fast I could blast through runs in the first game. When we finally defeated the Act 3 boss, though, it was even more satisfying than most of my solo wins because we did it together. My one complaint is that co-op requires you to each play online on your own copy of the game, and that, because there’s no couch co-op, we each had to play on separate devices even though we were sitting on the couch right next to each other.

Advertisement

Those are annoying tradeoffs, but multiplayer is such a fun addition to Slay the Spire that I don’t mind. I can’t wait to try another multiplayer run and see what challenges — and doodles — are in store for me.

Continue Reading

Technology

Android fixes 129 security flaws in major phone update

Published

on

Android fixes 129 security flaws in major phone update

NEWYou can now listen to Fox News articles!

Most people never think about Android security updates until a headline like this appears. Suddenly, your phone, the device you use for messages, banking, photos and work, becomes part of a global cybersecurity story.

That is exactly what happened this week. Google released its latest Android security updates, and they fix a massive 129 vulnerabilities. Even more concerning, one of them is already being exploited by attackers.

The flaw targets a component connected to Qualcomm graphics hardware, and researchers say it has already been used in limited targeted attacks. If you use an Android phone, this is the kind of update you want installed as soon as possible.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

Advertisement

GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK
 

Google’s March Android security update fixes 129 vulnerabilities, including a zero-day flaw already exploited in targeted attacks. (Firdous Nazir/NurPhoto via Getty Images)

Android security flaw already targeted by attackers

One vulnerability in particular has security researchers paying close attention. The flaw is tracked as CVE-2026-21385. Google says there are signs it is already being used in targeted attacks. That makes it a zero-day vulnerability.

In simple terms, attackers discovered the flaw before many devices received a fix. According to Qualcomm, the problem is tied to the graphics processing component inside many of its chipsets. Specifically, the issue involves something called an integer overflow. That technical term means a calculation error can cause memory corruption inside the system. Once that happens, attackers may gain a foothold on the device.

Advertisement

Qualcomm says the flaw impacts 235 different chipsets, which means a large number of Android phones could be affected. Google’s Threat Analysis Group discovered the issue and reported it through coordinated disclosure practices. Qualcomm then worked with device makers to release patches.

Why the Android security vulnerability is dangerous

Several of the patched vulnerabilities allow attackers to execute code remotely or gain elevated privileges on a device. One issue inside the Android System component is especially concerning. Google says it could allow remote code execution without any user interaction.

That means an attacker may exploit the flaw without the victim tapping a link or installing an app. In cybersecurity terms, that type of vulnerability ranks among the most dangerous.

The March Android bulletin addresses ten critical flaws across the System, Framework and Kernel components. These parts sit at the core of Android, so any weakness there can ripple across millions of devices.

Advertisement

ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP
 

Android users are urged to install the latest security patch as manufacturers roll out updates across devices. (Barrington Coombs/PA Images via Getty Images)

Why some Android phones get security updates faster

Google released two patch levels for this update:

  • 2026-03-01 security patch level
  • 2026-03-05 security patch level

The second update includes everything in the first, plus fixes for additional hardware components and third-party software. Google Pixel devices typically receive updates immediately. However, many Android users must wait longer.

Phone manufacturers such as Samsung, Motorola and OnePlus often test the patches before releasing them for specific models. Carriers may also delay updates while they verify compatibility. As a result, some users receive security patches quickly while others wait weeks.

Advertisement

How to protect your Android phone from security threats

Security vulnerabilities are a reality in modern software. The good news is that there are several simple steps that can greatly reduce your risk.

1) Install Android updates quickly

Check for updates regularly and install them as soon as they appear. On most devices, go to Settings, tap Security and privacy or Software update, then select Check for updates and install the latest version if one is available. Security updates often fix vulnerabilities that attackers may already be trying to exploit.

2) Avoid apps from unknown sources

Advertisement

Only download apps from trusted stores like Google Play. Third-party app stores pose a higher risk of malware.

3) Keep Google Play Protect enabled

Google Play Protect, which is built-in malware protection for Android devices, scans apps for malicious behavior and warns you if something suspicious appears. It also automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices.  Therefore, we recommend strong antivirus software because it adds another layer of protection by using deeper threat detection, real-time monitoring and broader malware databases that can catch suspicious apps or files that Google Play Protect may overlook. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

4) Use strong device security

Set a strong passcode on your phone and turn on fingerprint or face unlock if your device supports it. This helps keep strangers out of your phone if it is lost or stolen.

Advertisement

5) Be cautious with suspicious links

Many attacks still start with phishing messages. Avoid tapping unknown links in texts, emails, or social media messages.

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT
 

A critical Android zero-day tied to Qualcomm chipsets could allow attackers to gain a foothold on affected devices. (Donato Fasano/Getty Images)

The bigger picture behind Android security updates

Advertisement

This Android update also highlights how modern mobile security works behind the scenes. Google’s Threat Analysis Group frequently discovers vulnerabilities that may already be used in real-world attacks. Those findings trigger coordinated responses involving chip manufacturers, phone makers and security researchers. In this case, Qualcomm received the report in December and provided fixes to device makers in early 2026.

By the time the public bulletin arrived, patches were already moving through the Android ecosystem. The process may look slow from the outside. In reality, it involves dozens of companies working together to prevent widespread exploitation.

Kurt’s key takeaways

Security updates rarely feel exciting. Yet they play a critical role in protecting billions of smartphones around the world. This latest Android update proves that point clearly. A zero-day flaw tied to Qualcomm graphics hardware was already being targeted before many users even knew it existed. Installing updates quickly remains one of the simplest ways to protect your device and your personal data. Most of the time, the update only takes a few minutes. Those few minutes can block attacks that might otherwise compromise your phone. So the next time your Android device prompts you to install a security patch, the better question may be this:

When your phone asks for a security update, do you install it immediately or tap remind me later? Let us know by writing to us at Cyberguy.com

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading

Technology

Apple smart home display rumors now point to a fall launch with iOS 27

Published

on

Apple smart home display rumors now point to a fall launch with iOS 27

The rumored “HomePod with a screen” we’ve heard so much about was reportedly lined up for launch in 2025, and then this spring, and now, according to the latest updates, it’s on the shelf until this fall. Leaker Kosutami posted as much on X last week, and today, Bloomberg reporter Mark Gurman followed up with similar information, saying its robot arm-equipped cousin is now planned for launch in 2027.

That was supposed to be ready by now, but it is now predicted to arrive later this year, along with the iPhone 18 Pro plus 2027 updates for iOS, macOS, and all the rest. He describes a silver aluminum-cased device with a 7-inch screen and USB-C power port running a version of tvOS 27, while new versions of the HomePod speaker and Apple TV 4K box are also waiting in the wings for that Siri update, and a smart home sensor is in the works, too.

Continue Reading

Trending