Connect with us

Technology

Hackers can steal money and make your bank account look intact

Published

on

Hackers can steal money and make your bank account look intact

Hackers have become increasingly sophisticated in targeting bank accounts, sometimes stealing money without the account holder realizing it right away. This raises an unsettling concern among many: could someone actually drain your bank account while making it appear as though your balance remains untouched?

As Bruce from Phoenix asks, “Is it true that hackers can wipe out your bank account but make it look like the money is still there?”

The short answer is yes, though it’s rare and requires a high level of skill. Still, even the possibility is alarming, especially when you consider how easily people can fall victim to common tactics hackers use to gain access to accounts in the first place.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

A hacker at work (Kurt “CyberGuy” Knutsson)

Advertisement

How do hackers access your bank account?

There’s a long list of methods cybercriminals use to get into people’s financial accounts, and most of them don’t involve “hacking” in the Hollywood sense. Instead, they rely on tricking you into handing over sensitive information. Here are some of the most common techniques.

Fake banking apps and mobile trojans: Some apps are designed to look exactly like your bank’s official app, but they’re actually fakes. If you enter your login info, it goes straight to the scammer. Even more advanced are mobile banking trojans, which hide inside seemingly unrelated apps. Once installed, the trojan watches for when you open your real banking app and then quickly overlays a fake login screen. If you type in your credentials, the trojan grabs them and sends them off to the attacker.

Phishing scams: Scammers send emails or texts that appear to be from your bank, asking you to verify a transaction or log in to resolve an issue. These messages often include links to websites that look identical to your bank’s site but are actually fakes. The giveaway is often a small detail, like a misspelled URL. For example, “captial0ne.com” instead of “capitalone.com.”

Keyloggers: Keyloggers are a type of malware that silently records everything you type. If one gets onto your device, it can capture your banking username, password and anything else you type, all without you knowing.

Man-in-the-middle attacks: These attacks happen when hackers intercept the data being transmitted between you and your bank’s website. This is especially risky if you’re on public Wi-Fi. You may think you’re logging in securely, but a hacker could be watching everything or even redirecting you to a fake version of your bank’s site.

Advertisement

SIM swapping: SIM swapping is where a scammer contacts your phone provider, pretends to be you and asks to transfer your number to a new SIM card. If successful, they receive your text messages, including any verification codes sent by your bank. This gives them access to your account, even if two-factor authentication is turned on.

A person using a bank card to shop via laptop (Kurt “CyberGuy” Knutsson)

SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME

Advanced account manipulation

This is where it gets unsettling. In rare cases, hackers can actually make it look like your bank balance hasn’t changed, even though they’ve already taken the money. How? By targeting the display layer of your banking app or web interface. If malware is installed on your device, it can manipulate what shows up on the screen. That means your balance might look normal, while your actual funds are long gone. This type of attack is extremely rare and usually requires access to a compromised or jailbroken device, but it’s technically possible and just sophisticated enough to delay you from realizing what happened.

Bank alert notification on smartphone (Kurt “CyberGuy” Knutsson)

Advertisement

PREVENTING THIS INSIDIOUS EMAIL FORWARDING SCAM THAT WILL DRAIN YOUR BANK ACCOUNT

8 steps to protect your bank account from sophisticated hackers

The good news? You don’t need to be a cybersecurity expert to protect yourself. Just following these key steps can dramatically reduce your risk.

1) Use official apps only: Cybercriminals will try to trick you with fake banking apps and mobile trojans that overlay fake login screens, so it’s critical to download banking apps exclusively from the Apple App Store or Google Play. Never install apps from links in emails or texts.

2) Turn on two-factor authentication (2FA): SIM-swapping attacks can hijack your phone number and intercept SMS codes, so enable app-based 2FA to block unauthorized logins even if hackers obtain your password.

3) Get text or app alerts: Hackers can manipulate your account’s display to hide stolen funds, so set up real-time transaction alerts to expose unauthorized withdrawals immediately, especially for microtransactions used to test your account.

Advertisement

4) Use strong, unique passwords: Phishing scams and keyloggers often harvest weak or reused credentials, so use a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.

5) Avoid clicking suspicious links and install strong antivirus software: Scammers impersonate banks with phishing emails/texts containing misspelled URLs (e.g., “captial0ne.com”), so always navigate directly to your bank’s official website or app instead of clicking embedded links. Strong antivirus software helps protect your devices from fake apps, keyloggers and other threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

6) Check your accounts regularly: Don’t just glance at your balance. Review recent transactions at least once a week to catch any suspicious activity.

7) Avoid public Wi-Fi for banking: Hackers exploit unsecured networks to launch man-in-the-middle attacks and spoof banking sites, so use a VPN to encrypt your connection if you must bank on public Wi-Fi. VPNs will protect you from those who want to track and identify your potential location and the websites that you visit. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

8) Use a personal data removal service: Data brokers sell your contact details and personal information, which hackers can use for targeted phishing attacks or SIM swap scams. These services automatically remove your data from broker databases, reducing the risk of social engineering attempts that could compromise your bank account.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.

GOT A BANK TRANSFER ALERT TEXT? IT MIGHT BE A SCAM. HERE’S WHAT TO DO

Kurt’s key takeaways

Hackers don’t need to break into your bank’s system; they just need to trick you. Whether it’s phishing, malware or SIM swaps, the goal is always the same: get access to your login and verification codes. Fortunately, you can make it much harder for them by using secure habits and staying alert. Your money belongs with you, not in the hands of a scammer.

Has this ever happened to you or someone you know? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement

Technology

Anthropic upgrades Claude’s memory to attract AI switchers

Published

on

Anthropic upgrades Claude’s memory to attract AI switchers

Anthropic is making it easier to switch to its Claude AI from other chatbots with an update that brings Claude’s memory feature to users on the free plan, along with a new prompt and dedicated tool for importing data from other chatbots. These upgrades could allow users who have been using rivals like OpenAI’s ChatGPT or Google’s Gemini to quickly copy the data their preferred AI has collected on them and bring it over to Anthropic’s chatbot. That way, they don’t have to “start over” teaching Claude the context and history their previous chatbot already knows.

The option to import and export memories from Claude has been available since October, when Anthropic also rolled out the option for users to turn on Claude’s memory. Up until now, the memory feature was only available to users on paid Claude subscriptions, but now all Claude users can turn it on by going into “settings” then “capabilities.” This menu is also where users can find the new memory importing tool, which has users copy a pre-written prompt into their previous AI then copy the output from that prompt back into Claude’s importing tool.

Anthropic is introducing the upgraded memory importing tool as Claude is seeing a rise in popularity, driven by tools like Claude Code and Claude Cowork. Last month, Anthropic launched its new Opus 4.6 and Sonnet 4.6 models, which the company says are better at coding and completing complex tasks like working through a spreadsheet or filling out forms.

Anthropic has also been experiencing a spike in attention recently after pushing back against demands from the Pentagon to loosen the guardrails on its AI models, with the company stating publicly that they drew “red lines” around mass surveillance and fully autonomous lethal weapons.

Continue Reading

Technology

Why the Microsoft 365 Copilot bug matters for data security

Published

on

Why the Microsoft 365 Copilot bug matters for data security

NEWYou can now listen to Fox News articles!

You trust your email security settings for a reason. So when an AI assistant quietly reads and summarizes messages marked confidential, that trust takes a hit.

Microsoft says a bug in Microsoft 365 Copilot allowed its AI chat feature to process sensitive emails since late January.

The issue bypassed Data Loss Prevention policies that organizations rely on to protect private information. Put simply, emails that were supposed to stay locked down were being summarized anyway.

Sign up for my FREE CyberGuy Report 

Advertisement

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter    

Microsoft 365 Copilot’s work chat interface sits at the center of the issue after a bug allowed it to summarize confidential emails. (Microsoft)

Microsoft 365 Copilot bug summarized confidential emails

Microsoft says a coding error impacted Microsoft 365 Copilot Chat, specifically the “work tab” feature. The AI assistant helps business users summarize content, draft responses and analyze information across Word, Excel, PowerPoint, Outlook and OneNote.

Beginning Jan. 21, an internal bug labeled CW1226324 caused Copilot to read and summarize emails stored in Sent Items and Drafts folders.

The real concern runs deeper. Several of those messages carried confidentiality or sensitivity labels.

Advertisement

Companies apply those labels along with DLP policies to block automated systems from accessing restricted content. Despite those safeguards, Copilot still generated summaries. 

We reached out to Microsoft, and a spokesperson provided CyberGuy with the following statement:

“We identified and addressed an issue where Microsoft 365 Copilot Chat could return content from emails labeled confidential authored by a user and stored within their Draft and Sent Items in Outlook desktop. This did not provide anyone access to information they weren’t already authorized to see. While our access controls and data protection policies remained intact, this behavior did not meet our intended Copilot experience, which is designed to exclude protected content from Copilot access. A configuration update has been deployed worldwide for enterprise customers.” 

Why the Microsoft 365 Copilot bug matters for data security

AI tools feel helpful. They save time and reduce busy work. But they also rely on deep access to your data. When safeguards fail, even temporarily, sensitive content can move in ways you did not expect.

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

Advertisement

For businesses, that could mean:

Legal discussions summarized outside intended controls

Financial projections processed despite restrictions

HR communications are exposed to automated analysis

Even if no data leaves the organization, the bypass itself raises concerns about how AI integrates with enterprise security systems.

Advertisement

Business users rely on Copilot to streamline work, but a recent bug raised concerns about how it handles sensitive email content. (Microsoft)

How Microsoft is fixing the Microsoft 365 Copilot bug

Microsoft says it began rolling out a fix in early February. The company continues to monitor deployment and is contacting some affected users to verify the fix works.

However, Microsoft has not provided a final timeline for full remediation. It has also not disclosed how many organizations were affected.

The issue is tagged as an advisory, which usually signals limited scope or impact. Still, many security professionals will want deeper clarity before feeling comfortable.

What this Microsoft 365 Copilot issue reveals about AI security

This incident highlights something many companies are wrestling with right now. AI assistants sit inside productivity platforms. They need access to email, documents and collaboration tools to work well.

Advertisement

TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

At the same time, those platforms contain your most sensitive information. When AI features expand quickly, security policies must evolve just as fast. Otherwise, even a small code mistake can create unexpected exposure.

The Copilot chat feature was designed to boost productivity, yet a code error let it process emails labeled confidential. (Microsoft)

Ways to stay safe after the Microsoft 365 Copilot bug

If your organization uses Microsoft 365 Copilot, here are practical steps to reduce risk:

1) Review Copilot access settings

Work with your IT team to confirm which folders and data sources Copilot can access.

Advertisement

2) Revalidate DLP policies

Test sensitivity labels and DLP (Data Loss Prevention)  rules to ensure they block AI processing as intended.

3) Monitor advisory updates

Stay current on Microsoft service alerts and verify that the fix is fully deployed in your tenant.

4) Limit AI scope during investigations

If you have concerns, consider temporarily restricting Copilot features until verification is complete.

5) Train employees on AI boundaries

Remind staff that AI assistants can process drafts and send messages. Encourage careful handling of sensitive content.

6) Audit Copilot activity logs

Review audit logs to see whether Copilot accessed or summarized labeled emails. This helps determine actual exposure rather than assumed risk.

Advertisement

7) Review sensitivity label configuration

Confirm that confidential labels are configured to block AI processing where required. Misconfigured labels can create gaps even after a bug is fixed.

8) Reassess retention and draft policies

Because the issue involved Sent Items and Drafts, evaluate whether sensitive drafts should be stored long-term or deleted after sending.

9) Limit Copilot to specific user groups

Instead of enabling Copilot organization-wide, consider a phased deployment to departments with lower sensitivity exposure.

10) Conduct a post-incident security review

Use this moment to reassess how AI tools integrate with compliance controls. Treat it as a learning opportunity rather than a one-time glitch.

Pro Tip: This Copilot bug centers on enterprise controls. Even so, AI tools operate on your devices and accounts, so keeping software up to date and using strong antivirus software adds an important layer of defense. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

Advertisement

Considering a more private email provider

Enterprise AI bugs raise a bigger question: how much access should email platforms have to your data in the first place? If you want an added layer of privacy beyond mainstream providers, privacy-focused email services are worth exploring.

Some offer end-to-end encryption, support for PGP encryption and a strict no-ads business model that avoids scanning messages for marketing purposes.

AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

Many also allow you to create disposable email aliases, which can reduce spam and limit exposure if one address is compromised.

While no provider is immune to software bugs, choosing an email service built around privacy rather than data monetization can limit how much of your information is accessible to automated systems in the first place.

Advertisement

For individuals, journalists and small businesses especially, that added control can make a meaningful difference.

For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

Kurt’s key takeaways

AI assistants are becoming part of daily work life. They promise speed, efficiency and smarter workflows. But convenience should never outrun security.

This Copilot bug may have a limited impact. Still, it serves as a reminder that AI tools are only as strong as the guardrails behind them.

When those guardrails slip, even briefly, sensitive information can move in unexpected ways. As AI becomes more embedded in business software, trust will depend on transparency, fast fixes and clear communication.

Advertisement

Here is the real question: If your AI assistant can see everything you write, are you fully confident it respects every boundary you set? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved.  

Advertisement

Related Article

149 million passwords exposed in massive credential leak
Continue Reading

Technology

Samsung’s Digital Home Key lets you use your phone as your key

Published

on

Samsung’s Digital Home Key lets you use your phone as your key

Just days after showing off the Galaxy S26, Samsung is finally rolling out the ability for users to unlock their home with a tap of their phone or by simply approaching their door. The new feature, called Digital Home Key, will live inside Samsung Wallet and is powered by the Aliro smart home standard.

Samsung first teased its Digital Home Key feature in 2024 and said the feature would be available in 2025. That didn’t pan out, as the CSA’s Aliro standard — which will let users unlock smart locks with any phone — only arrived in February of this year. The new standard uses near-field communication (NFC) for its tap-to-unlock technology. It also supports ultra-wideband (UWB), giving users the ability to unlock their door as they approach and without pulling out their phone.

To add a Digital Home Key to your wallet, you’ll need to set up a compatible smart lock through SmartThings using Matter. Only some Galaxy smartphones support both NFC and UWB, including the Galaxy Z Fold 4 and up, as well as the Galaxy S22 Ultra and up. You can view the full list of compatible devices on Samsung’s website.

Continue Reading

Trending