Connect with us

Technology

Hacked, scammed, exposed: Why you're 1 step away from disaster online

Published

on

Hacked, scammed, exposed: Why you're 1 step away from disaster online

Chances are, you are a lot closer to an online security disaster than you think. Information about you is spread out far and wide online, and losing control of this digital identity can be incredibly embarrassing at best and financially devastating or personally dangerous at worst.

While it may initially seem overwhelming, we’re here to help you stay protected online. We’ve created a list of all the steps to stay safe online. Since there is a lot of information, we suggest you work through it at your own pace.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

A woman stressed about an online disaster (Kurt “CyberGuy” Knutsson)

Advertisement

Step 1 – Enable automatic updates

Keeping your software up to date is one of the easiest ways to keep yourself safe online. Whether you are using a Windows machine, a Mac, an iPhone or an Android smartphone, all these devices are routinely updated with new security fixes. It’s a good idea to double-check and ensure your device’s automatic updates are turned on. Here’s how:

Windows 10 automatic updates

From the start menu, go to Settings > Update & Security > Windows Update. From the Windows Update section, you’ll see a range of options for updating Windows. Here you can set up your “active hours” to make sure that Windows reboots and installs automatic updates outside of your waking or working hours.

Windows 11 automatic updates

Windows 11 users will click the Windows icon and proceed to Settings > Windows Update > Advanced options. From here, you can control when Windows Update will run, similar to the “active hours” control in Windows 10.

macOS

Mac users can open System Preferences > Software Update and click the “Advanced” button. While in the “Advanced” section, make sure every box is checked, as this will ensure they receive timely OS updates.

iOS

If you want to turn on automatic updates with an iPhone, open Settings > General > Software Update and make sure that Automatic Updates is turned on.

Advertisement

Android

If you have an Android device, open Settings > System > Advanced > System Update and ensure the System Update setting is turned on.

AUTO PARTS GIANT EXPOSED: 2.3 CUSTOMERS AT RISK IN MASSIVE DATA BREACH

Step 2 – Use strong passwords

Reusing the same password on multiple websites or applications is one of the most common cybersecurity mistakes. If you use the same password for multiple things, it only takes one service breach to expose your other accounts. Using a password manager is an easy solution to creating strong passwords for multiple accounts.

Illustration of securing your device (Kurt “CyberGuy” Knutsson)

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

Advertisement

Step 3 – Set up and use two-factor authentication

Two-factor authentication is a great way to add an extra layer of security to your online accounts. Enabling two-factor authentication makes it harder for hackers to access your account, as your account will require a one-time code in addition to the password to log in.

Two-factor authentication being displayed on Apple devices (Apple) (Kurt “CyberGuy” Knutsson)

Step 4 – Encrypt your computer’s storage

If you were to lose your laptop, tablet or phone, all of the personal information on those devices may be accessible to whoever finds it. An easy way to keep yourself safe in this scenario is to have your devices encrypted beforehand. Encryption makes the data hard for hackers to read, and while it sounds complicated, the actual process is easy to set up.

Illustration of data on a computer screen (Kurt “CyberGuy” Knutsson)

Step 5 – Locate or erase a lost device

If you’ve lost your device before you could encrypt it, there’s no need to worry too much. It’s easier than ever to locate a lost smartphone or to wipe it remotely. We have a great guide on what to do if you’ve lost your phone for both Androids and iPhones.

Advertisement

You can also use a similar process to locate a lost Windows laptop or MacBook. As operating systems have moved to storing information in the cloud, it’s easy to wipe a lost laptop. If you lose a laptop in public, we recommend remotely wiping it as soon as possible to ensure your data isn’t taken by a malicious actor.

Step 6 – Have strong antivirus software

The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Step 7 – Secure your web browser

We use our web browsers daily. Whether from a laptop, a desktop or a smartphone, you probably use your web browser more than most other apps. Taking a few minutes to regularly update your browser to the latest version, being cautious about the websites you visit and avoiding suspicious downloads are all crucial practices that complement your browser’s security features.

By implementing these security measures, you’re protecting your browser, personal information, financial data and overall digital identity from being exposed to a security risk by potential hackers and cybercriminals.

Step 8 – Secure your smartphone

Smartphones now act as extensions of our personal lives, used for everything from banking to scheduling doctor appointments. It’s more important than ever to keep your smartphone secure, and fortunately, both Android and iOS feature a wide range of built-in features to help protect your personal information.

Advertisement

To enhance your iPhone or Android’s security, start by enabling a strong lock screen method such as a complex passcode, fingerprint recognition or facial recognition. Exercise caution when using public Wi-Fi networks and consider using a VPN for added security.

A person holding an Android phone (Kurt “CyberGuy” Knutsson)

10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE’S SECURITY AND PRIVACY

Step 9 – Protect your wireless network

Your home Wi-Fi network can power your smart home devices, but it can also leave you vulnerable to hackers. Luckily, it’s easy to tweak your home wireless settings to keep yourself more protected. Similar to our previous steps, you’ll want to make sure your router has the most recent updated firmware and that you use two-factor authentication and a strong password for your wireless connection.

People on their computers using a wireless network (Kurt “CyberGuy” Knutsson)

Advertisement

Step 10 – Regularly back up your data

Regularly backing up your data protects your digital life from hardware failures, theft or cyberattacks. Choose a reliable backup method that suits your needs, such as cloud storage or external hard drives. Set up automatic backups to run consistently, ensuring all your devices, including smartphones and tablets, are covered. Secure your backups by using strong passwords, enabling two-factor authentication for cloud storage or encrypting physical backups.

Periodically, test your backups by restoring files to ensure the system works correctly. Remember, a solid backup strategy is an essential component of your overall cybersecurity plan, providing both protection and peace of mind.

Step 11 – Invest in personal data removal services 

In today’s digital landscape, your personal information can end up in numerous online databases and people search sites without your knowledge or consent. These data aggregators collect and sell your information, potentially exposing you to privacy risks and unwanted solicitations. Using a data removal service can help mitigate these risks by systematically removing your personal information from these databases.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. 

By reducing your digital footprint, you decrease the chances of your personal information being misused for identity theft, targeted advertising or other privacy-invading practices. While it’s challenging to completely erase your online presence, using a data removal service is an effective step towards regaining control over your personal information and enhancing your overall online privacy and security. Check out my top picks for data removal services here.

Advertisement

Kurt’s key takeaways

Protecting your online presence might seem daunting, but remember, it’s all about taking small, consistent steps. Think of it as building a digital fortress: each measure you implement is another brick in your wall of cybersecurity. Don’t feel pressured to tackle everything at once. Start with the basics, like enabling automatic updates and using strong passwords, then gradually work your way through the more steps. The digital world is constantly evolving and so should our security practices.

How has your approach to online security changed over the years and what prompted those changes? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

OpenAI keeps shuffling its executives in bid to win AI agent battle

Published

on

OpenAI keeps shuffling its executives in bid to win AI agent battle

OpenAI announced yet another reorganization Friday, consolidating certain areas and making company president Greg Brockman the official lead of all things product.

In a memo viewed by The Verge, Brockman wrote that since OpenAI’s product strategy for this year is to go all-in on AI agents, the company is combining its products to “invest in a single agentic platform and to merge ChatGPT and Codex into one unified agentic experience for all.”

To do this, the company is making a suite of org chart changes, although it’s still operating under some of the same ones from last month. That’s when AGI boss Fidji Simo went on medical leave and OpenAI announced that Brockman would be in charge of product strategy and CSO Jason Kwon, CFO Sarah Friar, and CRO Denise Dresser would take control of business operations.

It’s all part of OpenAI’s recent strategic shift to focus on key revenue drivers like coding and enterprise and stop pouring resources into “side quests” ahead of its potential IPO later this year and amid investor pressure to turn a profit.

In Simo’s continued absence, Brockman’s role leading product strategy is now official, as well as the company’s “scaling” arm. Under Brockman will be four different pillars. The first is core product and platform, led by Thibault Sottiaux, who has been OpenAI’s engineering lead for Codex, and the second is critical enterprise industries, led by ChatGPT head Nick Turley. Third is the consumer pillar, such as health, commerce, and personal finance, which will be led by Ashley Alexander, who has been its healthcare products VP. The fourth pillar — core infrastructure, ads, data science, and growth — will be led by Vijaye Raji, who has been OpenAI’s CTO of applications.

Advertisement

Brockman wrote in the memo that OpenAI’s goal is now to “bring agents to ChatGPT scale, in order to give individuals and organizations significantly more value and utility from our products.”

Continue Reading

Technology

Is that traffic ticket text a scam or real?

Published

on

Is that traffic ticket text a scam or real?

NEWYou can now listen to Fox News articles!

You’re going about your day when your phone buzzes. A text hits your phone. It looks official. It sounds urgent. And suddenly, you are being told you owe money for a traffic violation. That is exactly what Todd from Texas experienced. He emailed us and said:

“I received this text message today. It was so baffling because I haven’t lived in California for nearly a decade. I didn’t click on anything or respond. How can I tell if this is for real or if this is a scam?”

If you’ve gotten a message like this, you are not alone. This type of scam is spreading fast, and it is designed to pressure you into acting before you think. Let’s break down what is really going on.

Sign up for my FREE CyberGuy Report

Advertisement
  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

FAKE AGENT PHONE SCAMS ARE SPREADING FAST ACROSS THE US

This message may look official, but several red flags show it is likely a scam designed to pressure you into paying quickly. (Kurt “CyberGuy” Knutsson)

What the traffic ticket scam text looks like

At first, the message seems convincing. It claims to be a “final reminder” from the California DMV, and it warns of penalties like license suspension and added fees. It even includes a link that appears somewhat official. However, once you slow down and take a closer look, the red flags quickly start to pile up.

The biggest red flags in this message

Here are the key warning signs to watch for in messages like this.

9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU

1) The phone number makes no sense

The message comes from a number with a +63 country code. That is the Philippines, not California. Government agencies in the U.S. do not send official legal notices from international numbers. That alone is a major warning sign.

Advertisement

2) No name, just “Dear Driver”

Legitimate notices from a DMV or court almost always include your full name or at least some identifying information. “Dear Driver” is vague on purpose. It allows scammers to send the same message to thousands of people.

3) The link isn’t a real DMV website

The message includes this link:

ca.mnvtl.life/dmv

That isn’t a government domain. Official DMV websites in California use “.ca.gov” or similar trusted domains. Scammers often create lookalike links to trick you into clicking.

4) Urgency and threats

The message pushes you to act quickly with a deadline. It lists consequences like license suspension and extra charges. Scammers rely on fear. When you feel rushed, you are more likely to click without thinking.

Advertisement

FBI WARNS OF DANGEROUS NEW ‘SMISHING’ SCAM TARGETING YOUR PHONE

5) Asking you to reply to proceed

The text says to reply with “Y” to get instructions. That is another trap. Responding confirms your number is active, which can lead to more scam messages.

6) Generic language and odd phrasing

Parts of the message feel slightly off. The tone is formal but not quite right. That subtle awkwardness is common in scam messages sent to large groups of people.

7) Overloaded threats designed to scare you

The message piles on consequences like license suspension, added fees, court action and even credit damage. In this case, it even mentions a license suspension and a $160 late payment charge. That combination is meant to overwhelm you and push you to act fast. Real agencies usually provide clear, specific notices, not a long list of escalating threats in a single text.

INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU

Advertisement

Scam texts like this often arrive out of nowhere and try to create urgency before you have time to question them. (Kurt “CyberGuy” Knutsson)

What this means for you

Even if you have never driven in California, you could still receive this message. Scammers cast a wide net and hope someone takes the bait. If you click the link, you could be taken to a fake payment page. That page may ask for your credit card details, personal information or login credentials. In some cases, it can also install malware on your device or redirect you to credential-stealing pages. This isn’t about a ticket. It is about getting your data.  State DMVs typically do not send final legal notices or payment demands by text message.

Why these scams keep working

These messages work because they tap into something most people fear. Legal trouble, fines and losing driving privileges. They also look just real enough to pass a quick glance. That is all scammers need. As more services move online, these scams will continue to evolve.

Unlike typical DMV scams, this message impersonates a court and escalates the threats to make the situation feel more serious (Kurt “CyberGuy” Knutsson)

Ways to stay safe from traffic ticket text scams

Start with a simple rule. Never trust a payment request that shows up out of nowhere. Here are practical steps you can take:

Advertisement

1) Do not click the link

If you are unsure, do not tap anything in the message. That includes links and reply options.

2) Use strong antivirus software

If you accidentally click a link, strong antivirus software can help detect malware and protect your data. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

3) Verify directly with the DMV

Go to your state’s official DMV website by typing it yourself into your browser. Do not use the link in the text.

4) Check the sender carefully

Look at the phone number. International numbers or random strings are a clear warning sign.

5) Ignore generic greetings

Real notices will usually include your name or case details. Vague language is a red flag.

Advertisement

6) Consider a data removal service

Scammers often get your number from data broker sites. Removing your personal info from those databases with a data removal service can reduce these messages. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

7) Block and report the number

On your phone, block the sender and report it as spam. This helps reduce future attempts.

8) Turn on spam filtering

Enable spam filtering on your phone or through your carrier to catch more of these messages before they reach you.

Kurt’s key takeaways

Todd did the right thing. He paused, questioned the message and did not click. That one decision likely saved him from handing over personal information. When it comes to messages like this, skepticism is your best defense. If something feels off, trust that instinct.

Should phone carriers and tech companies be doing more to block scams like this before you ever see them? Let us know by writing to us at Cyberguy.com

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join. 

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Honda’s hybrid future starts with new Accord and RDX prototypes

Published

on

Honda’s hybrid future starts with new Accord and RDX prototypes

Honda revealed prototypes of two new hybrid models, an Accord sedan and the Acura RDX SUV, during its annual business briefing this week, built on a platform that it says will begin launching next year. The RDX was announced earlier this year as Honda’s first SUV to feature the next-gen version of its two-motor hybrid system.

In March, Honda announced it would take a writedown of up to 2.5 trillion yen ($15.7 billion) on its EV investments. Now Honda says its EV-related losses will be “resolved” by 2029, and that it will reevaluate its EV plans in 2030.

Continue Reading
Advertisement

Trending