Technology
Fake PayPal email let hackers access computer and bank account

Online scams are becoming more dangerous and convincing every day. Cybercriminals are finding new ways to gain not just your login credentials but full control of your computer and your bank accounts.
Take John from King George, Virginia, for example. He recently shared his alarming experience with us. His story is a powerful warning about how quickly things can escalate if you respond to suspicious emails.
Here is what happened to John in his own words: “I mistakenly responded to a false PayPal email notifying me of a laptop purchase. The message looked real, and I called the number listed. The person on the phone gave me a strange number to enter into my browser, which installed an app that took control of my PC. A warning popped up saying ‘software updating – do not turn off PC,’ and I could see my entire file system being scanned. The scammer accessed my bank account and transferred money between accounts. He told me to leave my PC running and go to the bank, keeping him on the phone without telling anyone what was happening. I shut everything down, contacted my bank, and changed my passwords.”
John’s quick thinking in shutting down his computer and alerting his bank helped minimize the damage. However, not everyone is as lucky.
Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!
Fake PayPal scam email (Kurt “CyberGuy” Knutsson)
How this scam works
This type of scam is known as a remote access scam. It often begins with a fake email that appears to come from a trusted company like PayPal. The message claims there is an issue, such as an unauthorized charge, and urges the victim to call a phone number or click a link.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Once the scammer makes contact, they guide the victim to enter a code into their browser or install a program, claiming it will fix the problem. In reality, this grants the scammer full control of the victim’s computer.
Once inside, scammers often search for sensitive files, access banking websites, steal login credentials or install malware to maintain long-term access. Even if the immediate scam is stopped, hidden malware can allow scammers to reenter the system later.

A hacker at work (Kurt “CyberGuy” Knutsson)
THE URGENT PAYPAL EMAIL SCAM YOU CAN’T AFFORD TO IGNORE
Key takeaways from John’s experience
John’s close call highlights several important lessons.
Fake emails are harder to spot than ever: Scammers create emails that look almost identical to real ones from trusted companies like PayPal. They copy logos, formatting and even fake customer support numbers. Always double-check the sender’s email address and verify communications by visiting the official website or app directly instead of clicking links inside emails.
Remote access scams can escalate fast: Once scammers gain control of your device, they can steal sensitive data, move funds between accounts and install hidden malware that stays behind even after the scammer disconnects. It often takes only minutes for serious damage to be done, making fast recognition critical.
Psychological pressure plays a big role: Scammers rely on creating a sense of urgency and fear. By keeping you on the phone and urging secrecy, they isolate you from help and rush you into making bad decisions. Recognizing when you are being pressured is key to breaking the scammer’s control.
Fast action can make all the difference: By quickly disconnecting his computer and contacting his bank, John limited the scammer’s access to his accounts. Acting within minutes rather than hours can stop further theft, block fraudulent transactions and protect your sensitive information from being fully compromised.

A warning on a laptop home screen (Kurt “CyberGuy” Knutsson)
DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX
How to protect yourself from remote access scams
Taking simple but strong security steps can protect you from falling victim.
1. Never call a number listed in a suspicious email: Scammers often set up fake phone numbers that sound professional but are designed to manipulate you into handing over control or information. Always find verified contact information through a company’s official website or app, not links/numbers provided in suspicious messages.
2. Be skeptical of unusual instructions: No legitimate company will ask you to install software or enter strange codes to protect your account. If anything seems unusual, trust your instincts and stop the communication immediately.
3. Install strong antivirus software on all devices: Antivirus programs can detect suspicious downloads, block remote access attempts and help prevent hackers from taking over your system. Having strong antivirus protection installed across all your devices is the best way to safeguard yourself from malicious links that install malware and attempt to access your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
4. Use identity theft protection: These services monitor financial accounts, credit reports and online activity for signs of fraud, alerting you to suspicious transactions. See my tips and best picks on how to protect yourself from identity theft.
5. React immediately if you suspect a scam: Disconnect your device from the internet, contact your bank or credit card company immediately and change your passwords, especially for banking and email accounts. Monitor your accounts closely for unauthorized activity and report the scam to the Federal Trade Commission as well as the company that was impersonated. Acting quickly can prevent further access and limit the damage scammers can cause.
6. Use multifactor authentication (MFA): MFA adds a critical layer of security beyond passwords, blocking unauthorized logins even if credentials are stolen. Enable MFA on all accounts, especially banking, email and payment platforms, to stop scammers from bypassing stolen passwords.
7. Update devices and software immediately: Regular updates patch security flaws that scammers exploit to install malware or hijack systems. Turn on automatic updates wherever possible to ensure you’re always protected against newly discovered vulnerabilities.
8. Employ a password manager with strong, unique passwords: Avoid password reuse and use complex passphrases to minimize credential-stuffing attacks. A password manager generates and stores uncrackable passwords, eliminating the risk of weak or repeated credentials. Get more details about my best expert-reviewed password managers of 2025 here.
9. Never share screen access or grant remote control: Scammers exploit screen-sharing tools to steal passwords and manipulate transactions in real time. Legitimate tech support will never demand unsolicited screen access; terminate the call immediately if pressured.
10. Invest in personal data removal services: These services automate requests to delete your personal information from data brokers and people-search sites, reducing publicly available details scammers could exploit for phishing or impersonation. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
PROTECT YOURSELF FROM TECH SUPPORT SCAMS
Kurt’s key takeaways
John’s story is a reminder that online scams are evolving quickly and becoming more aggressive. Staying skeptical, verifying all suspicious messages and acting quickly if something feels wrong can make the difference between staying safe and losing sensitive information. Protect your devices, trust your instincts and remember it is always better to be cautious than to take a risk with your security.
Have you or someone you know been targeted by a scam like this? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
Apple’s latest AirPods are already on sale for $99 before Prime Day

Amazon Prime Day kicks off tomorrow, July 8th, but you don’t have to wait until then to pick up Apple’s latest pair of AirPods at a discount. Right now, the AirPods 4 are available for around $99 ($30 off) at Amazon, Best Buy, and Walmart, while the AirPods 4 with noise cancellation are going for around $149 ($30 off) at Amazon, Best Buy, and Walmart. That’s within $10 of the lowest price we’ve seen on the ANC model and matches the lowest price to date on the base pair.
Both versions of Apple’s current-gen earbuds feature shorter stems and larger buds than previous models, allowing them to accommodate a broader range of ear shapes. The open-style earbuds use a hard plastic body that doesn’t create a tight seal inside your ear, which means they sacrifice some bass response compared to gummy-tipped earbuds. Hardshell earbuds won’t create pressure in your ear, though, which can feel uncomfortable after listening to music for a few hours.
Overall, the fourth-gen AirPods sound better than previous models due to a custom amplifier and new acoustic architecture. Audio quality is somewhat subjective and largely depends on how the music was recorded, mixed, and mastered; however, former Verge staffer Chris Welch noted in his review that he was pleased with the sound of Apple’s latest pair of wireless earbuds. If you’re upgrading from an older pair, you’ll notice a difference.
The AirPods 4 run on Apple’s H2 chip, which is required for Voice Isolation, a feature that reduces background noise and amplifies the volume of your voice during calls. If you’re using an iPhone, you can say “Hey Siri” to evoke Apple’s smart assistant to place calls, hear and return messages, and play music. You can also locate the earbuds using the Find My app on Apple devices if they’re misplaced.
The entry-level model can last up to five hours on a single charge and can be fully charged five times using the included USB-C charging case (the ANC model also offers wireless charging). Both pairs of earbuds are also IP54-rated for dust, sweat, and water resistance, ensuring you can wear them safely during workouts. Needless to say, the AirPods 4 are excellent earbuds at their current price, whether you opt for the model with active noise cancellation or not.
Three more deals worth your time
Technology
How micro-robots may soon treat your sinus infections

NEWYou can now listen to Fox News articles!
A breakthrough in medical technology could soon change how sinus infections are treated. Scientists have created micro-robots for sinus infection treatment that can enter the nasal cavity, eliminate bacteria directly at the source, and exit without harming surrounding tissue. This drug-free, targeted approach may reduce our dependence on antibiotics.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.
A woman with a sinus infection. (Kurt “CyberGuy” Knutsson)
What are micro-robots for sinus infection treatment?
These microscopic robots are smaller than a speck of dust. They are made of magnetic particles enhanced with copper atoms. Doctors insert them through a narrow duct in the nostril. Once inside, the micro-robots are guided by magnetic fields to reach the infected area.
At that point, a fiber optic light heats the particles and triggers a chemical reaction. This reaction breaks through thick mucus and destroys harmful bacteria at the infection site. As a result, treatment becomes faster, more precise, and far less invasive.
This latest advancement comes from a collaboration of researchers at the Chinese University of Hong Kong, along with universities in Guangxi, Shenzhen, Jiangsu, Yangzhou, and Macau. Their work, published in “Science Robotics,” has helped move micro-robotic medical technology closer to real-world applications.
Why use micro-robots instead of antibiotics?
Traditional antibiotics circulate throughout the entire body. In contrast, micro-robots target only the infected area. This reduces side effects and lowers the risk of antibiotic resistance. Furthermore, patients may recover faster because the treatment goes straight to the source.

A woman with a sinus infection. (Kurt “CyberGuy” Knutsson)
Are micro-robots safe?
So far, animal trials have shown promising results. Micro-robots successfully cleared infections in pig sinuses and live rabbits, without causing tissue damage. However, scientists still need to ensure that every robot exits the body after treatment. Leftover particles could pose long-term risks.
In addition, public acceptance remains a challenge. The idea of tiny machines inside the body makes some people uncomfortable. Nevertheless, experts believe those fears will fade over time.
What other uses are possible?
Researchers are already exploring how micro-robots could treat infections in the bladder, stomach, intestines, and bloodstream. Several teams around the world are working to make the technology more advanced and adaptable for deep internal use. If successful, these innovations could revolutionize the way we fight bacteria in the human body.

A doctor examining a woman with a sinus infection. (Kurt “CyberGuy” Knutsson)
Kurt’s key takeaways
The rise of micro-robots for sinus infection treatment marks a major shift in medical care. By offering precise, non-invasive therapy without antibiotics, this method could redefine how infections are treated. With continued research and testing, these tiny tools may soon become powerful allies in modern medicine.
Would you let microscopic robots crawl through your sinuses if it meant never needing antibiotics again? Let us know by writing to us at Cyberguy.com/Contact.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Cyberpunk Edgerunners 2 will be even sadder and bloodier

The new season will be directed by Kai Ikarashi, who also directed episode six in the first season, “Girl on Fire.” There’s no word yet on when Cyberpunk: Edgerunners 2 will premiere, but they did show off this new poster artwork. A trailer will be shown later tonight during a panel at 8:30PM PT for the animation studio, Trigger.
Showrunner and writer Bartosz Sztybor said during Friday’s panel that for season one, “I just wanted to make the whole world sad… when people are sad, I’m a bit happy,” and that this new 10-episode season will be “…of course, sadder, but it will be also darker, more bloody, and more raw.”
A brief summary of the follow-up series tells fans what to expect following the end of David’s story in season one:
Cyberpunk: Edgerunners 2 presents a new standalone 10-episode story from the world of Cyberpunk 2077— a raw chronicle of redemption and revenge. In a city that thrives in the spotlight of violence, one question remains: when the world is blinded by spectacle, what extremes do you have to go to make your story matter?
-
News1 week ago
How Every Senator Voted on the Iran War Powers Resolution
-
Politics1 week ago
Trump's 'big, beautiful bill' faces Republican family feud as Senate reveals its final text
-
Technology1 week ago
Facebook is starting to feed its Meta AI with private, unpublished photos
-
Health1 week ago
Why Mariah Carey Doesn’t Use a Scale After Her 70-Lb Weight Loss
-
World1 week ago
Tech industry group sues Arkansas over new social media laws
-
News1 week ago
What is birthright citizenship and what happens after the Supreme Court ruling?
-
Science1 week ago
After U.S. and Israeli Strikes, Could Iran Make a Nuclear Bomb?
-
Business1 week ago
California lawmakers approve expanded $750-million film tax credit program