Connect with us

Technology

Fake Google security page can turn your browser into a spying tool

Published

on

Fake Google security page can turn your browser into a spying tool

NEWYou can now listen to Fox News articles!

A new phishing scam is tricking people into installing malware by pretending to be a Google security check. The page looks convincing and tells you that your Google account needs additional protection. It walks you through a simple setup process that appears to strengthen your security and protect your devices.

If you follow those steps, you may end up installing what looks like a harmless security tool. In reality, security researchers say the page installs a malicious web app that can spy on your device. It can steal login verification codes, watch what you copy and paste, track your location and quietly send internet traffic through your browser. 

The most troubling part is that nothing is technically hacked. Instead of exploiting a software flaw, attackers simply trick you into granting the permissions they need. Once that happens, your own browser can start working for them without you realizing it.

Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Advertisement

THE #1 GOOGLE SEARCH SCAM EVERYONE FALLS FOR

The fake site mimics a Google security page and urges visitors to complete a quick “account protection” setup. (AP Photo/Don Ryan, File)

All about the fake Google security page

Security researchers at Malwarebytes, a cybersecurity company, recently discovered a phishing website that pretends to be part of Google’s account protection system. The site uses the domain google-prism[.]com and presents what looks like a legitimate security page asking you to complete a short verification process. Visitors are told they should complete a four-step setup to improve their account protection. The page explains that these steps will help secure your Google account and protect your devices from threats. During the process, the site asks you to approve several permissions and install what it claims is a security tool.

The tool it installs is actually a Progressive Web App. This type of application runs through your browser but behaves like a regular app on your computer. It opens in its own window, can send notifications and can run tasks in the background. Once installed, the malicious web app can collect contacts, read information you copy to your clipboard, track GPS location data and attempt to capture one-time login codes sent to your phone. These codes are commonly used when you sign in to accounts that use two-factor authentication.

The fake security page may also offer an Android companion app described as a “critical security update.” Researchers found that this app requests 33 permissions, including access to text messages, call logs, contacts, microphone recordings and accessibility features. Those permissions give attackers the ability to read messages, capture keystrokes, monitor notifications and maintain control over parts of the device. Even if the Android app is never installed, the web app alone can still collect sensitive information and quietly run activity through your browser.

Advertisement

How it works and why it matters to you

The scam works because it looks like something you would normally trust. Many people expect security alerts from the services they use, especially when it comes to protecting email or cloud accounts. Attackers take advantage of that trust by presenting the fake page as a helpful security feature. When you approve the permissions and install the web app, you are essentially giving the attackers access to certain parts of your device. One of the main things they try to capture is one-time passwords. These are the short codes you receive when logging in to accounts that require two-factor authentication.

If attackers manage to capture those codes while also knowing your password, they may be able to break into your accounts. That could include your email, financial services, or cryptocurrency wallets, depending on which accounts you use. The malware also watches what you copy and paste. Many people copy cryptocurrency wallet addresses before sending digital currency, and those addresses can be valuable to criminals. The malicious app can collect that information and send it back to the attackers.

Another feature allows attackers to route internet requests through your browser. This means they can run online activity through your device so it appears to come from your home network. The app can also send notifications that look like security alerts or system warnings. When you click those notifications, the app opens again and gains another opportunity to capture information such as login codes or clipboard data.

Google says built-in protections can block the threat

After learning about the phishing campaign, we asked Google about the malicious site and whether users are protected.

A Google spokesperson told CyberGuy that several built-in security systems are designed to stop threats like this before they cause harm.

Advertisement

“We can confirm that Safe Browsing in Chrome warns any user who tries to visit this site. Chrome also shows a confirmation dialog whenever anyone attempts to download an APK. Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.”

Google also said that its current monitoring shows no apps containing this malware are available on the Google Play Store.

ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP

Even if malicious apps are installed from outside official stores, Google says Android devices still have an additional layer of protection. Google Play Protect can warn users or block apps known to exhibit malicious behavior, including apps installed from third-party sources.

However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices, which is why we recommend additional strong antivirus software to detect malicious downloads, suspicious browser activity and phishing attempts before they cause serious damage. It acts as an early warning system that helps block dangerous apps and websites before they gain access to your device or your data.

Advertisement

During the process, users are prompted to approve permissions and install what appears to be a security tool. (iStock)

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

7 ways to protect yourself from fake security pages

If you ever come across a suspicious “security check” like this, a few simple habits can help you avoid falling into the trap and protect your accounts and devices.

1) Never run security checks from random websites

Google does not ask you to install security tools through pop-ups or unfamiliar websites. If a page claims your account needs a security check, close the tab and go directly to Google’s official account page by typing the address yourself. Visiting the real account settings page prevents attackers from redirecting you to a fake site.

2) Check website addresses carefully before trusting them

Phishing pages often use domains that look similar to real companies. Attackers rely on people clicking quickly without paying attention to the address bar. If the website address is not an official Google domain, do not trust it. Even a small change in the spelling can indicate a fake site designed to steal information.

Advertisement

3) Remove suspicious web apps from your browser

If you installed an app through a website and it opens like a standalone program, check your browser’s installed apps or extensions list. Remove anything you do not recognize or do not remember installing. Uninstalling the app immediately prevents it from collecting more information or running commands through your browser.

4) Check your Android phone for unfamiliar apps

Researchers say the malicious Android app may appear as “Security Check” or “System Service.” If you see unfamiliar apps with these names, review the permissions they request and remove them if they look suspicious. Apps asking for extensive permissions such as SMS access, accessibility features, and microphone control should always be investigated.

5) Use a password manager for your accounts

A password manager helps you create and store strong, unique passwords for every account you use online. If attackers obtain one password, they will not automatically gain access to other accounts. Password managers can also help prevent you from entering credentials on fake sites because they usually refuse to auto-fill on lookalike domains.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

6) Enable two-factor authentication whenever possible

Two-factor authentication (2FA) adds an extra layer of protection beyond your password. Even though this attack tries to capture SMS verification codes, many services allow you to use authenticator apps instead. These apps generate login codes on your device and make it much harder for attackers to intercept them.

Advertisement

7) Monitor your accounts for unusual activity

If you think you interacted with a suspicious security page, keep a close eye on your accounts over the following days. Watch for login alerts, password reset emails, or transactions you do not recognize. Acting quickly after suspicious activity can help prevent attackers from gaining full control of your accounts.

Pro tip: Reduce how easily scammers can target you

Scammers often gather personal details from data broker sites to make phishing messages look more convincing. A data removal service can help remove your personal information from many of those databases, reducing the amount of information criminals can use to impersonate companies or craft targeted scams. 

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Researchers say the malicious web app could collect login codes, clipboard data and other sensitive information.  (Felix Zahn/Photothek via Getty Images)

Advertisement

Kurt’s key takeaway

Attackers are changing tactics. Instead of breaking into systems through technical flaws, they are relying on convincing security messages that persuade people to install tools themselves. All of us rely on familiar brands like Google when making security decisions, and attackers know that. Preventing these scams will likely require faster action against impersonation sites and stronger safeguards around what web apps are allowed to do once installed.

Should companies like Google be required to automatically block lookalike domains that pretend to run official security checks before people fall for them? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement

Technology

Five data broker opt-out myths that leave retirees exposed

Published

on

Five data broker opt-out myths that leave retirees exposed

NEWYou can now listen to Fox News articles!

Have you already tried removing your personal information from data broker sites? Maybe you Googled your name, didn’t like what you saw and spent the afternoon filling out opt-out forms on sites like Spokeo, Whitepages and BeenVerified.

That took real effort, and it wasn’t wasted. Still, it doesn’t mean you’re fully protected. The problem comes down to how data brokers operate. Their system isn’t intuitive, and common misconceptions leave people exposed without realizing it.

For retirees with decades of public records, property ownership and family connections, the gap between feeling safe and actually being safe can cost tens of thousands of dollars.

After years of covering scams, one pattern keeps showing up. The most targeted victims are not people who ignored the risks. They are people who took action and believed it was enough. Let’s fix that right now.

Advertisement

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES

Data broker listings often include sensitive details like your address, phone number and relatives, making removal a critical first step. (Kurt “CyberGuy” Knutsson)

 

Myth #1: “I already opted out, so my data is gone”

This is the most dangerous myth of all. And it’s the one I hear most often from retirees who’ve already taken steps to protect themselves.

Here’s the reality: there are hundreds of data broker companies operating in the United States. When you submit an opt-out request to Spokeo, you’ve removed yourself from one of them.

The others? They never heard from you. They’re still listing your name, your address, your phone number, your relatives and your estimated net worth — right now, as you read this.

Advertisement

And even the site you opted out of? It will likely relist your information within weeks or months. Data brokers pull from public records — property filings, voter rolls, court documents — that are constantly updated. Every time those records refresh, your profile can quietly reappear.

Unless you repeat them regularly, manual opt-outs don’t protect you in the long term. They buy you a temporary gap in coverage on a limited number of data broker websites.

You can use Incogni’s free scanner to check the biggest data broker sites for your information. You may be surprised by how much is still out there.

Myth #2: “My family members’ data doesn’t affect me — or vice-versa”

This one is painful because it involves the people you love most. Data broker profiles don’t just list you. They list your household. They list your relatives. And they map the connections between all of you.

When your daughter opted out of data broker sites, she removed her own profile. But your profile still lists her as a relative, with her current city, her approximate age, and her connection to you. That’s enough.

Advertisement

A scammer calls you: “Grandpa, it’s me. I’m in the hospital. Please don’t tell Mom-she’ll worry. Can you wire me $1,200?”

Scammers may already have your granddaughter’s name and understand your exact relationship to her. They know she’s your granddaughter, not your daughter, and that detail makes the call feel real. That level of accuracy is what triggers panic and lowers your guard. In some cases, they can even clone her voice using AI.

This is called the grandparent scam. It has evolved from a clumsy, random cold call into a precision-targeted operation built on data broker research. According to the FBI’s Annual IC3 Report, both the losses and number of victims of elder fraud have been climbing steeply over the last three years, with average losses in 2025 reaching $38,500.

10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE

Taking simple steps early, like removing your data and freezing your credit, can reduce your risk during the most vulnerable time. (Kurt “CyberGuy” Knutsson)

Advertisement

Myth #3: “My information isn’t interesting enough to target”

I understand why this feels true. You’re (probably) not a celebrity, don’t have a massive social media following, and have lived a private life.

But here’s what a scammer sees when they pull up your data broker profile:

A paid-off home (public property records show no mortgage). A Social Security income estimate. An address you’ve held for more than 20 years. The names of your adult children and their addresses. A spouse or late spouse. And those specific details that answer every security question your bank still uses: mother’s maiden name, previous address and the city you were born in.

To a criminal, that profile is a goldmine. In fact, personal information is implicated in 72% of elder fraud cases.

Retirees represent the single most targeted group for financial fraud in the United States. Not because older Americans are more naive. It’s because their data broker profiles are richer than anyone else’s, built over 60 or 70 years of public records.

Advertisement

Myth #4: “If I haven’t been targeted yet, I must be safe”

Let me offer a different perspective. You haven’t been targeted yet. Or, more likely, you have been targeted, and the attempt simply didn’t land. A phishing email went to spam. A suspicious call got hung up on. A text message felt off in some way and you ignored it. Does any of that sound familiar? Here’s what hasn’t changed: your profile is still there, still searchable, and regularly being updated.

Data brokers don’t delete inactive profiles. They maintain them, refresh them, and sell access to them repeatedly. The question isn’t whether your information is available to scammers. It is. The question is whether the right scammer has found it yet-and whether they’ve decided the payoff is worth the attempt.

Some data brokers have been caught red-handed packaging large datasets and selling them directly to scammers for elder fraud.

Retirees with home equity, retirement accounts, or Medicare benefits are especially attractive targets. A scammer doesn’t need to reach 100 people. They need to reach one person at the right moment after a loss, during a health scare, when the grandchildren are mentioned and their research pays off.

THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY

Advertisement

Removing personal data from data broker sites can reduce exposure to scammers and help protect finances and privacy. (Phil Barker/Future Publishing)

Myth #5: “This is a tech problem for younger people to worry about”

Your grandchildren grew up online. Maybe you didn’t, but that doesn’t mean digital threats can’t touch you. But data brokers don’t care when you were born. They care what you own, what you’ve signed and what public records document about your life. And for most retirees, those records go back further and run deeper than anyone else’s:

  • Property deeds filed when you bought your first home in 1978
  • Divorce proceedings from three decades ago
  • Probate records from when you inherited property
  • Business registrations
  • Political donor records
  • Decades of address changes.

All of that is legally collected and ends up in data broker databases. And all of it makes your profile more complete-and more dangerous-than your grandchildren’s. This isn’t a tech problem. It’s a paper-trail problem. And the paper trail you’ve left over a lifetime is the most detailed (and valuable) one in the household.

So what’s the solution?

The only real answer is regular, repeated data removal for you, and ideally, your entire family.

Submitting a few opt-out requests once is not enough. Your information keeps resurfacing as public records update, which means you have to stay on top of it. That can involve revisiting sites, sending new requests and checking where your data appears over time.

Some people choose to handle this manually, while others use automated services that send ongoing removal requests across hundreds of data broker sites. The key is consistency, because this system does not stop collecting or refreshing your information.

Advertisement

Think of it like a leak that keeps coming back. You can scoop water out now and then, or you can stay ahead of it with a system that keeps working in the background.

If you want a clearer picture of your exposure, you can run a scan to see where your personal information shows up online. That gives you a starting point and helps you understand how much work it really takes to stay protected.

See my tips and best picks on Best Identity Theft Protection at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

Protecting your personal data starts with action, but real protection takes more than a few opt-out forms. Submitting requests to a handful of data broker sites only limits exposure temporarily, and those same sites can relist your details as public records refresh. Retirees face a greater risk because their profiles hold decades of information that scammers can easily connect across family members. In many cases, scammers reach out but fail to succeed due to timing or suspicion, not because your data stays hidden. Staying protected requires consistent effort, since data brokers keep collecting and updating information behind the scenes.

Advertisement

If your personal data can resurface at any time, how confident are you that it is not already being used against you? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Dyson’s powerful 360 Vis Nav robovac is down to $279.99 for a limited time

Published

on

Dyson’s powerful 360 Vis Nav robovac is down to 9.99 for a limited time

If you’re tired of running your vacuum multiple times just to get the dirt and debris out of the carpets in your living room, Dyson’s 360 Vis Nav is worth a look. It’s one of the more powerful robot vacuums currently available, and now through May 11th (or while supplies last), it’s on sale at Woot for an all-time low of $279.99 ($919 off) with a full two-year warranty.

The last-gen 360 Vis Nav offers a whopping 65 air watts of suction, allowing it to pull dirt, dust, and pet hair from carpets impressively well. In her brief time testing the robovac, my colleague Jennifer Pattison Tuohy said the Dyson “demolished a pile of dry oatmeal in seconds,” adding that she briefly worried it might even suck up the tassels on her large rug (it didn’t). By comparison, many robot vacuums — including Dyson’s new $1,200 Spot + Scrub AI — require multiple passes to fully eradicate the same kind of mess on your floor.

What’s more, the robovac’s small, D-shaped design and the location of its ultra-fluffy brush allow it to dig into edges and corners more effectively than many of the more roundish robot vacuums, while its lower profile lets it easily get under most beds and sofas. The roomy 500ml dustbin also means you likely won’t need to empty it too often, while Dyson’s built-in handle and terrific quick-release button make removing said bin a relatively simple task when it’s time to do so.

While it is undeniably powerful, it’s worth noting that the 360 Vis Nav lacks a few features found on some of its more modern rivals. Although its navigation worked well enough during our testing, it lacks AI-powered obstacle avoidance and doesn’t come with a self-emptying dock. Battery life is also relatively short at around 65 minutes per charge. Nonetheless, if your top priority is quickly removing dust, dirt, and pet hair from carpets without multiple passes, the Dyson remains an option worth considering, especially at this discounted price.

Continue Reading

Technology

Global scam crackdown leads to 276 arrests

Published

on

Global scam crackdown leads to 276 arrests

NEWYou can now listen to Fox News articles!

We’ve often warned you about romance scams and crypto “investment” opportunities that feel too good to pass up. Now, there’s a major update that shows just how organized these operations have become.

The Department of Justice and Federal Bureau of Investigation announced a sweeping international operation that led to at least 276 arrests and the shutdown of multiple scam centers tied to cryptocurrency fraud. These networks targeted Americans and drained millions of dollars from victims.

The operation spanned continents and involved coordinated efforts by law enforcement and tech companies.

Sign up for my FREE CyberGuy Report

Advertisement
  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

TOP 5 SCAMS SPREADING RIGHT NOW

The Department of Justice and FBI say international scam networks used romance and fake crypto investment schemes to steal millions from victims. (Helena Dolderer/Picture Alliance)

How the cryptocurrency scam crackdown unfolded

Authorities worked with partners around the world, including the Dubai Police and law enforcement agencies in Thailand and beyond. Together, they dismantled at least nine scam centers linked to large-scale crypto fraud.

Several suspects now face federal charges in the United States, including wire fraud and money laundering. Investigators say these operations functioned like businesses, with recruitment, management layers and structured systems designed to deceive victims.

Officials made it clear that this effort sends a message. Fraud crosses borders, and enforcement is now doing the same.

How crypto investment scams target victims

These schemes often follow a pattern known as “pig-butchering.” It is a slow, calculated tactic that builds trust before any money is involved.

Advertisement

A scammer may reach out through social media or a messaging app and start a casual conversation. Over time, that interaction turns more personal. In some cases, it feels like a real relationship. Once trust is established, the topic shifts toward investing, often framed as a unique crypto opportunity.

Victims are guided through setting up accounts and transferring funds to platforms that appear legitimate. The dashboards may even show fake gains to build confidence. At that point, control of the money is already gone. Funds are quickly moved through multiple accounts and eventually end up with the scammers.

Many victims are encouraged to keep going, sometimes borrowing money or taking out loans to invest more. By the time the truth becomes clear, the losses can be devastating.

How Meta Platforms, Inc. helped track scam networks

Meta Platforms, Inc. played a key role in the investigation by providing data that helped law enforcement identify and track these networks.

The company says it has taken aggressive action across its platforms. In 2025 alone, Meta removed more than 159 million scam ads and shut down 10.9 million accounts linked to scam centers. More recently, it disabled over 150,000 accounts connected to these networks as part of a coordinated enforcement effort.

Advertisement

“Meta is committed to combatting online fraud and scams, and we are proud to partner with law enforcement in these efforts,” Chris Sonderby, Meta’s vice president and deputy general counsel, said. “We applaud the DOJ and FBI for their leadership in holding criminal scammers accountable and protecting American consumers.”

FROM FRIENDLY TEXT TO FINANCIAL TRAP: THE NEW SCAM TREND

Federal authorities announced a sweeping international crackdown that led to at least 276 arrests tied to cryptocurrency scam centers targeting Americans. (Kurt “CyberGuy” Knutsson)

New tools to stop cryptocurrency scams in real time

Meta is also rolling out new protections across its apps to help users spot scams before they get pulled in.

On Facebook, users may see alerts tied to suspicious friend requests, especially when an account shows unusual behavior such as limited connections or inconsistent location details. 

Advertisement

On WhatsApp, new warnings are designed to prevent scammers from linking their own devices to someone else’s account, giving users a chance to pause before approving a risky request.

Messenger is also expanding its scam detection tools. When a conversation shows patterns linked to common fraud tactics, users may receive prompts that explain the risk and suggest actions like blocking or reporting the account.

Why this cryptocurrency scam crackdown matters to you

This operation highlights how organized these scam networks have become. These are not random messages from a single person. They are coordinated groups running structured operations designed to build trust, create urgency and move money quickly.

Even with hundreds of arrests, the threat remains. New networks continue to emerge, often using the same playbook with slight changes. That means staying informed is still one of the most effective ways to protect yourself. 

Ways to stay safe from cryptocurrency scams

Scammers follow familiar patterns, which means there are clear warning signs you can watch for and simple steps you can take to protect yourself. 

Advertisement

1) Slow down unexpected connections

If someone you do not know reaches out and quickly builds a personal connection, slow things down and question the situation. Scammers rely on momentum, so taking a pause can help you spot inconsistencies. 

2) Verify investment platforms before sending money

Before sending money to any investment platform, take time to verify that it is legitimate. A professional-looking website or app does not guarantee it is real. Look for independent reviews and official registration details.

3) Avoid sending crypto to unknown sources

Avoid sending cryptocurrency to individuals or platforms you cannot confirm. Once those transactions go through, they are extremely difficult to recover.

4) Watch for pressure and urgency

Be aware of pressure. If someone pushes you to act quickly or invest more, that urgency is often a warning sign.

5) Use strong antivirus protection

Strong antivirus software can help block malicious links, fake investment sites and other threats before they reach you, adding another layer of defense against scam attempts. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

THE ONE THING SCAMMERS CHECK BEFORE TARGETING YOU ONLINE

Meta said it removed more than 159 million scam ads in 2025 and helped investigators track networks tied to cryptocurrency fraud. (Halfpoint/Getty Images)

6) Limit your personal data exposure

Scammers often rely on publicly available information to build trust. Reducing how much of your personal data appears online by using a data removal service can make it harder for them to target you in the first place. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

7) Strengthen your account security

It also helps to strengthen your digital security. Enable two-factor authentication (2FA) on your accounts and use trusted security tools to reduce exposure to malicious links and messages.

8) Report scams as soon as possible

If you believe you have been targeted or defrauded, report it to the FBI’s Internet Crime Complaint Center at ic3.gov as soon as possible.

Advertisement

Kurt’s key takeaways

This global crackdown is a meaningful step forward. It shows what can happen when law enforcement, tech companies and international partners work together. At the same time, these scams are not going away. The tactics will continue to evolve, and new networks will take the place of those that were shut down. Awareness and caution remain your strongest defenses.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

We report a lot about scams but not so much about scammers getting caught. Does this make you feel like real progress is being made in stopping them? Let us know by writing to us at CyberGuy.com.

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading
Advertisement

Trending