Connect with us

Technology

Holiday travel privacy risks and how to stay safe

Published

on

Holiday travel privacy risks and how to stay safe

NEWYou can now listen to Fox News articles!

Holiday travel is stressful enough with crowded airports, expensive flights and last-minute itinerary changes. But there’s a hidden part of the travel industry most people don’t know about: your personal data is being harvested, packaged and sold every time you book a flight, reserve a hotel room or check a travel app.

Whether you’re traveling for a Christmas break or booking early for New Year’s, the companies you trust with your most sensitive details—full name, home address, passport info, travel dates and device data—are sharing and selling far more than you think.

And during the holiday rush, that data becomes a goldmine for scammers.

Let’s unpack how this works, which companies collect the most and what you can do before you travel to keep your personal information out of the wrong hands.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

PROTECT YOUR DATA BEFORE HOLIDAY SHOPPING SCAMS STRIKE

Holiday travel brings more than stress because every booking and check-in quietly generates personal data you may not realize you are giving away. (iStock)

Why holiday travel puts your data at risk

The holiday season is the peak period for travel-related data collection. Airlines, hotels, booking platforms, loyalty programs and travel apps all experience massive traffic spikes—millions of Americans are searching for deals, comparing prices, checking gate changes and re-booking delayed flights.

Every one of those actions creates trackable data points, including:

Advertisement
  • Email address
  • Phone number
  • Full name and DOB
  • Address history
  • Travel itineraries
  • Passport or ID data
  • Device fingerprint
  • IP address and location
  • Shopping habits and spending patterns.

You might assume this data stays with the airline or hotel. It doesn’t.

Most companies share it with advertisers, analytics firms, data brokers and dozens of unnamed “partners.” Some even use your data to profile you—how often you travel, how much you’ll likely spend and whether you’re a “high-value” target.

That information can easily leak into scammer databases, which is why holiday travelers suddenly see:

  • Fake “your flight is canceled” texts
  • Phishing emails that look identical to hotel confirmations
  • Bogus baggage fee requests
  • Fake TSA PreCheck renewal notices
  • “Urgent re-verification required” messages.

Scammers rely on the fact that you’re stressed, rushing and expecting travel updates. And because they already have your personal data, their attacks are frighteningly convincing.

STOP FOREIGN-OWNED APPS FROM HARVESTING YOUR PERSONAL DATA

Airlines, hotels, apps and booking platforms collect far more information than most travelers know and that data often gets shared with advertisers and data brokers. (AP Photo/Ryan Sun)

Examples of what major travel companies collect

Here are real-world examples of how holiday travel platforms collect and share your data:

Advertisement

1) Airlines (Delta, American, United, Southwest)

Major U.S. airlines collect not just your name, phone number and email, but also travel companions, payment details, geolocation data, device data and loyalty-program activity.

They share this with:

  • “Marketing partners”
  • Analytics platforms
  • Third-party advertisers
  • Data-enrichment firms.

Many of these partners, over time, become part of the data broker ecosystem.

2) Booking platforms (Expedia, Booking.com, Hotels.com)

Each booking platform details what it collects in its privacy policy. Oftentimes, these sites track:

  • Search history
  • Price views
  • Device fingerprint
  • Click behavior
  • IP-based location
  • Payment attempts—even abandoned carts.

This is used to build profiles that determine what deals you’re shown and how aggressively you’re targeted.

3) Hotel chains (Marriott, Hilton, IHG)

Marriott’s privacy policy and other privacy statements list over 60 categories of data it collects. Some chains were caught sharing guest data with:

  • Ad networks
  • Social media platforms
  • Third-party “guest experience” tools
  • Affiliate networks
  • Data brokers for cross-device tracking.

Cybercriminals have been using the information of over 500 million Marriott guests, exposed during a four-year-long breach that started in 2014, to craft and execute travel-themed scams to this day.

4) Travel apps (Airbnb, Hopper, KAYAK, TripIt)

These are some of the most aggressive data collectors because they run nonstop on your phone. Many collect:

Advertisement
  • Real-time location
  • Contacts
  • Clipboard data
  • Behavioral analytics
  • Device ID
  • In-app browsing.

Some of these firms then “share information with partners for marketing enhancement,” which is typically code for data selling.

YOUR DISCARDED LUGGAGE TAGS ARE WORTH MONEY TO SCAMMERS

Scammers use leaked travel details to send fake flight alerts, hotel messages and urgent payment notices that look real because they already have your personal information. (iStock)

How scammers use your travel data

Once your information enters the ecosystem, scammers build travel-themed attacks designed to hit you at the worst possible time. Some common examples include:

  • Fake airline notifications: (e.g., “Your flight has been canceled, click here to rebook”)
  • Urgent hotel “payment failure” emails: Scammers use leaked address and booking data to send emails that look exactly like they’re from the Hilton or Marriott
  • Fake baggage fees: (e.g., “Pay $24.90 to release your checked bag”)
  • TSA and Global Entry renewal scams.

This isn’t guesswork. They already have your name, flight, hotel, location and travel dates—because the travel industry’s data partners sold or leaked them.

How to protect yourself before you travel

Here are my top steps to staying private this holiday season:

Advertisement

1) Check what data the travel companies already have

Hotels, airlines and booking sites all have data removal options—though they’re buried in their privacy settings.

2) Stop apps from tracking your location

Turn off location permissions for apps like:

  • Hopper
  • Airbnb
  • Expedia
  • HotelTonight.

Many track you even when not in use. Here’s how to do it for iPhone and Android:

On iPhone: Open Settings, tap Privacy & Security, then tap Location Services, scroll down to the app and tap each app, and set location access to “While Using the App” or “Never,” and turn off “Share My Location” if you don’t want them to see your exact spot.

On Android: Open Settings, tap Location, then choose App location permissions or App permissions, find the app and tap it, and change each one to “Allow only while using the app” or “Don’t allow” so they can’t track you in the background. (Settings may vary depending on your Android phone’s manufacturer.)

3) Remove your personal data from data broker sites

This is the most important step. Even if you stop airlines and hotels from collecting new data, your existing data is already circulating through dozens of data brokers, and that’s what scammers use to target travelers.

Advertisement

Data brokers hold:

  • Your travel patterns
  • Address history
  • Email and phone details
  • Income level
  • Household info
  • Your family members’ names.

You can manually request removal from hundreds of sites, but it takes months. That’s why I recommend a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

4) Use an email alias for bookings

An alias email reduces the amount of spam and phishing attempts you’ll receive. By creating email aliases, you can also protect your information. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches. 

For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

Advertisement

5) Avoid airport Wi-Fi for anything involving payments

Scammers often run fake hotspots. So, avoid airport public Wi-Fi when accessing financial information.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

The holiday season is here, and many of us are getting ready to travel to see family and friends. As travel picks up, personal data collection and sharing also increases. Airlines, hotels and travel apps often share your information with unknown third parties, which scammers can use to target you during your trip. Before you pack your bags, take a few minutes to remove your personal data from online brokers. Doing this helps protect your identity and lets you travel with peace of mind.

How do you protect your personal information when you travel during the holidays? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.

Technology

Inside Microsoft’s AI content verification plan

Published

on

Inside Microsoft’s AI content verification plan

NEWYou can now listen to Fox News articles!

Scroll your social media feed for five minutes. You will likely see something that looks real but feels slightly off.

Maybe it is a viral protest image that turns out to be altered. Maybe it is a slick video pushing a political narrative. Or maybe it is an artificial intelligence voice clip that spreads before anyone stops to question it.

AI-enabled deception now permeates everyday life. And Microsoft says it has a technical blueprint to help verify where online content comes from and whether it has been altered.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Microsoft’s proposal would attach digital fingerprints and metadata to help trace where online content originated. (YorVen/Getty Images)

Why AI-generated content feels more convincing today

AI tools can now generate hyperrealistic images, clone voices and create interactive deepfakes that respond in real time. What once required a studio or intelligence agency now requires a browser window. That shift changes the stakes.

It is no longer about spotting obvious fakes. It is about navigating a digital world where manipulated content blends into your daily scroll. Even when viewers know something is AI-generated, they often engage with it anyway. Labels alone do not automatically stop belief or sharing. So Microsoft is proposing something more structured.

How Microsoft’s AI content verification system works

To understand Microsoft’s approach, picture the process of authenticating a famous painting. An owner would carefully document its history and record every change in possession. Experts might add a watermark that machines can detect, but viewers cannot see. They could also generate a mathematical signature based on the brush strokes.

Now Microsoft wants to bring that same discipline to digital content. The company’s research team evaluated 60 different tool combinations, including metadata tracking, invisible watermarks and cryptographic signatures. Researchers also stress-tested those systems against real-world scenarios such as stripped metadata, subtle pixel changes or deliberate tampering.

Advertisement

Rather than deciding what is true, the system focuses on origin and alteration. It is designed to show where the content started and whether someone changed it along the way.

What AI content verification can and cannot prove

Before relying on these tools, you need to understand their limits. Verification systems can flag whether someone altered content, but they cannot judge accuracy or interpret context. They also cannot determine meaning. For example, a label may indicate that a video contains AI-generated elements. It will not explain whether the broader narrative is misleading.

Even so, experts believe widespread adoption could reduce deception at scale. Highly skilled actors and some governments may still find ways around safeguards. However, consistent verification standards could reduce a significant share of manipulated posts. Over time, that shift could reshape the online environment in measurable ways.

Why AI labels create a business dilemma for social platforms

Here is where the tension becomes real. Platforms depend on engagement. Engagement often feeds on outrage or shock. And AI-generated content can drive both. If clear AI labels reduce clicks, shares or watch time, companies face a difficult choice. Transparency can clash with business incentives.

FAKE ERROR POPUPS ARE SPREADING MALWARE FAST

Advertisement

Invisible watermarks and cryptographic signatures could signal when images or videos have been altered. (Chona Kasinger/Bloomberg via Getty Images)

Audits of major platforms already show inconsistent labeling of AI-generated posts. Some receive tags. Many slip through without disclosure.

Now, U.S. regulations are stepping in. California’s AI Transparency Act is set to require clearer disclosure of AI-generated material, and other states are considering similar rules. Lawmakers want stronger safeguards.

Still, implementation matters. If companies rush verification tools or apply them inconsistently, public trust could erode even faster.

The risk of incorrect AI labels and false flags

Researchers also warn about sociotechnical attacks. Imagine someone takes a real photo of a tense political event and modifies only a small portion of it. A weak detection system flags the entire image as AI-manipulated.

Advertisement

Now, a genuine image is treated as suspect. Bad actors could exploit imperfect systems to discredit real evidence. That is why Microsoft’s research stresses combining provenance tracking with watermarking and cryptographic signatures. Precision matters. Overreach could undermine the entire effort.

How to protect yourself from AI-generated misinformation

While industry standards evolve, you still need personal safeguards.

1) Slow down before sharing

If a post triggers a strong emotional reaction, pause. Emotional manipulation is often intentional.

2) Check the original source

Look beyond reposts and screenshots. Find the first publication or account.

3) Cross-check major claims

Search for coverage from reputable outlets before accepting dramatic narratives.

Advertisement

4) Verify suspicious images and videos

Use reverse image search tools to see where a photo first appeared. If the earliest version looks different, someone may have altered it.

5) Be skeptical of shocking voice recordings

AI tools can clone voices using short samples. If a recording makes explosive claims, wait for confirmation from trusted outlets.

6) Avoid relying on a single feed

Algorithms show you more of what you already engage with. Broader sources reduce the risk of getting trapped in manipulated narratives.

7) Treat labels as signals, not verdicts

An AI-generated tag offers context. It does not automatically make content harmful or false.

8) Keep devices and software updated

Malicious AI content sometimes links to phishing sites or malware. Updated systems reduce exposure.

Advertisement

Strengthen account security

Use strong, unique passwords and a reputable password manager to generate and store complex logins for you. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com. Also, enable multi-factor authentication where available. No system is perfect. But layered awareness makes you a harder target.

Experts say stronger AI labeling standards may reduce deception, but they cannot determine what is true. (iStock)

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Microsoft’s AI content verification plan signals that the industry understands the urgency. The internet is shifting from a place where we question sources to a place where we question reality itself. Technical standards could reduce manipulation at scale. But they cannot fix human psychology. People often believe what aligns with their worldview, even when labels suggest caution. Verification may help restore some trust online. Yet trust is not built by code alone.

So here is the question. If every post in your feed came with a digital fingerprint and an AI label, would that actually change what you believe?  Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

Why the Microsoft 365 Copilot bug matters for data security
Continue Reading

Technology

Did Live Nation punish a venue by taking Billie Eilish away?

Published

on

Did Live Nation punish a venue by taking Billie Eilish away?

John Abbamondi had orders to let the CEO of Ticketmaster down easy.

In April 2021, Abbamondi was the CEO of BSE Global, the company that ran Brooklyn arena the Barclays Center. BSE Global’s existing Ticketmaster contract would expire at the end of September, and Abbamondi and his team had evaluated proposals from SeatGeek, AXS, and Ticketmaster. The economics of Ticketmaster offer, according to Abbamondi, “was nowhere near as good as the other two.” SeatGeek’s technology was “superior” to Ticketmaster’s on balance, on top of better financial terms including an equity stake in the company, the arena decided. It clinched their decision to go with a newer, smaller player in the field.

When Abbamondi called to break the news to Michael Rapino, the Live Nation Entertainment CEO, the meeting became tense — and a recording of it came back to haunt Rapino in this month’s Live Nation-Ticketmaster monopoly trial. Abbamondi was one of two witnesses who took the stand Wednesday, alongside Mitch Helgerson, the chief revenue officer for the Minnesota Wild hockey team. Both men said that when they considered switching their venues’ ticketing platform from Ticketmaster, executives there threatened them with the loss of vital Live Nation-promoted concerts. It’s the behavior, the Justice Department and 40 state and district attorneys general say, of a monopolist — a charge Live Nation-Ticketmaster denies.

Abbamondi, identifying the voices on the 2021 call to a Manhattan jury Wednesday, said that “the nervous guy was me and the angry guy was Michael.” The few minutes played in court captures an exchange that went “sideways,” as Abbamondi put it, when he tried to thread a delicate needle: rejecting Ticketmaster’s services while trying to hold its parent company Live Nation to a separate contract promising to fill Barclays Center with concerts. At one point, Rapino dropped an F-bomb while discussing his frustration over a contractual dispute. He told Abbamondi he believed they were never planning to renew with Ticketmaster in the first place.

Rapino reminded Abbamondi about the new UBS Arena in Queens, which could draw more Live Nation-promoted shows away from Barclays. Though Ticketmaster theoretically operates separately from Live Nation, Abbamondi took this as a “not-so-veiled” threat — cut off the left arm, and the right arm would swing back. Abbamondi hung up feeling like he’d failed to “do my job there, which was to land the plane smoothly.”

Advertisement

The venue “saw a dramatic decline in Live Nation shows that were booked at the arena”

Abbamondi still signed the deal with SeatGeek, which began in October 2021. Then, he testified, the venue “saw a dramatic decline in Live Nation shows that were booked at the arena.” Artists were just beginning to fill stadiums again after the start of the covid pandemic, including Billie Eilish, who’d had to cancel shows in New York venues including Barclays in 2020. Normally, Abbamondi would have expected Live Nation to rebook her show there next time she was on tour. But when she began touring again in 2021, she booked at the new venue Rapino had warned about — the UBS Arena. When Barclays asked about it, they were told it was the “artist’s decision.” Other promoters, he said, hadn’t reduced their bookings at Barclays by nearly as much.

In 2022, mere months into the SeatGeek contract, Abbamondi was fired. Less than a year later, Barclays announced it was going back to Ticketmaster.

Ticketmaster, in the witnesses’ telling, wasn’t the best option for a ticketing vendor, but Live Nation’s power as a concert promoter forced their hand. In the case of the Minnesota Wild, which played at the then-Xcel Energy Center in St. Paul, Helgerson said the fear of losing Live Nation shows was a large driver behind its decision to stick with Ticketmaster — even though it found it would make $1 million a year more switching to SeatGeek.

The arena was already engaged in tight competition for concerts with the Target Center across the river in Minneapolis, a similarly-sized venue. So when the Wild kicked off negotiations over renewing its contract with Ticketmaster in 2018, the ticketing service knew how to hit them where it would hurt. When the Wild staff mentioned they were planning to consider a proposal from SeatGeek too, a Ticketmaster executive told them that Live Nation could move all of their shows to the Target Center if they switched ticketing vendors, Helgerson testified. “We took it as a credible threat,” he said. “Losing those shows would be almost catastrophic to our organization.”

Advertisement

“We took it as a credible threat”

To ease the risk, SeatGeek offered what it called “Live Nation retaliation insurance” — a promise to compensate the arena for concerts booked at the Target Center on dates Xcel had open. SeatGeek offered the arena a higher upfront bonus and fee share that overall would make the venue an additional $1 million a year compared to Ticketmaster’s offer. But even retaliation insurance couldn’t make up for the loss of the “vibrance of the venue” and the impact on its own employees should Live Nation pull its shows. Ticketmaster’s alleged threat created an “insurmountable challenge.” The venue signed another contract with Ticketmaster.

There were complicating factors in both these cases, which Live Nation pointed out on cross-examination. It was both risky and a lot of work to move to a new ticketing platform. Like switching any enterprise software, it would take a while for staff to get up to speed, and Abbamondi admitted that while SeatGeek’s technology gave them more options over things like how to price individual seats, it was less user-friendly. An executive whom Helgerson worked with worried that SeatGeek’s lack of an interface for concert promoters at the time would be an obstacle to getting them to bring shows to the arena. Abbamondi also said he’s personal friends with SeatGeek’s co-founder, and he testified he wasn’t fired because of the SeatGeek deal — he was given two other reasons.

SeatGeek offered what it called “Live Nation retaliation insurance”

There was also a separate legal dispute between the Barclays Center and Ticketmaster, which appeared to be at least part of the reason that the call between Abbamondi and Rapino broke down. Barclays believed their contract with Ticketmaster would expire at the end of September 2021, as originally stated. But Ticketmaster believed that because the Covid pandemic shortened the regular NBA season, a clause in the contract had been triggered to extend that contract another year. On top of that, in an earlier, unrecorded call between Abbamondi and Rapino, the Ticketmaster CEO suggested that they should be given the chance to counter any offer Barclays received. Abbamondi said he tried his best to respond in a “noncommittal” way, but the implication was that Rapino might have seen it differently.

Advertisement

The jury will have to decide whether the threats Abbamondi and Helgerson described were really as menacing as they believe, one of many factors that will determine whether Live Nation-Ticketmaster should face penalties — including the possibility of a breakup.

In one text exchange, Live Nation executive Patti Kim, a friend of Abbamondi’s, wrote that he should “think about the bigger relationship” with Live Nation, not just who’s writing the bigger check. She added a winky face. “That was my friend saying, ‘you know what I mean,’” Abbamondi said. This week, the jury is expected to get the chance to hear from the rival allegedly offering those bigger checks: SeatGeek CEO Jack Groetzinger.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Technology

Scams that aren’t illegal (but should be)

Published

on

Scams that aren’t illegal (but should be)

NEWYou can now listen to Fox News articles!

Every year during National Consumer Protection Week, you hear warnings about phishing emails, fake IRS calls and identity theft. Those threats are real, but there is another risk that gets far less attention, and it is completely legal.

Right now, hundreds of companies collect, package and sell personal information, including your home address, phone number, family members, income estimates and even your daily habits. They are not targeting you because you did anything wrong. Instead, they profit simply because your data is valuable.

Unlike traditional scams, this does not happen in the shadows. It happens out in the open, every single day. As a result, most people only realize it is happening after someone uses their personal information against them.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Data brokers build detailed profiles using information pulled from public records, apps and online activity.  (Kurt “CyberGuy” Knutsson)

Your personal information is a product

Data brokers are companies most people have never heard of, but they know a surprising amount about you. They collect information from public records, online activity, retail purchases, app usage and hundreds of other sources.

Then they build detailed profiles and sell them to advertisers, marketers and anyone else willing to pay. A typical profile may include:

  • Full names, ages and phone numbers
  • Home addresses
  • Names of relatives and household members
  • Estimated income, home value and net worth
  • Shopping habits and interests
  • Political, health and lifestyle indicators

This information often appears on people-search sites, where anyone can look you up in seconds. Scammers use these same databases to find and target victims. But even legitimate companies use them in ways most consumers never knowingly agreed to.

People-search sites expose more data than you realize

Search your own name online, and you may find pages listing your address, relatives’ names and contact details. These sites present themselves as “background check tools” or “public records directories.” But their business model depends on making personal information easy to find.

  • That creates real-world risks. Criminals use these sites to:
  • Impersonate banks, government agencies, or delivery services
  • Convince victims they already “know” them
  • Locate elderly or vulnerable individuals
  • Target family members using shared address history.

Even strangers can learn where you live, who your relatives are and how to contact you. No hacking required.

CRIMINALS ARE USING ZILLOW TO PLAN BREAK-INS. HERE’S HOW TO REMOVE YOUR HOME IN 10 MINUTES

Advertisement

People-search websites make your address, phone number and even family connections easy to find in seconds.  (Serene Lee/SOPA Images/LightRocket via Getty Images)

Your browsing history is being tracked and sold

Many websites and apps track what you click, read and buy. Incogni’s research found that popular apps like TikTok, Alibaba, Temu and Shein collect numerous personally identifiable data points and share them with third parties, like advertising networks and data brokers.

Even web extensions track what you do online. Popular Chrome extensions like the AI-powered Grammarly or Quillbotinvade your privacy, require extensive permissions and collect sensitive data.

Over time, this data collection builds a behavioral profile. It can reveal:

  • Financial stress or debt concerns
  • Health interests or medical conditions
  • Major life events like moving, retirement, or the loss of a spouse
  • Online purchases and brand preferences.

This is why you may suddenly receive highly specific emails, calls, or ads that feel uncomfortably personal. Someone already knew what to say.

AI is accelerating data collection

AI makes personal data more valuable and easier to collect than ever before. These systems scrape public websites, social media profiles, images and videos to pull identifying details. They also connect scattered pieces of information into a single, detailed identity profile, which can include:

Advertisement
  • Photos connected to your name
  • Voice recordings from public videos
  • Employment history
  • Locations you’ve lived at or visited.

Once collected, this information can circulate indefinitely. You can delete a social media post, but copies of that data may already exist elsewhere.

5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY

The more accessible your personal data is, the easier it becomes for scammers to target you with convincing, personalized attacks.  (Kurt “CyberGuy” Knutsson)

Most AI companies collect data by default, unless you opt out

Are you using ChatGPT, Gemini, or even LinkedIn? Then your data is automatically collected from your chatbot conversations, posts, and more. They collect user interactions like prompts, voice recordings, uploaded photos and behavioral data to improve the AI system.

In some cases, you have to manually disable this in settings, but it’s buried in countless opt-out guides or obscure labels. For example, to opt out of LinkedIn data collection, you need to:

  • Go to Settings and find the Privacy tab.
  • Find the toggle named ‘Data for Generative AI Improvement.’ 
  • Review other default data sharing options.
  • Disable everything from personal demographic information to social, economic and workplace research.

AI-powered apps and services continuously switch it up and make it harder for you to opt out. Why? Your data is fueling their business model. The more data points they have, the better they can train their AI and the more money they make.

Why this matters for your safety, not just your privacy

Most people think data collection is just about targeted ads. But the same information can be used to make scams far more convincing. Instead of sending generic phishing emails, scammers can reference your real address or recent activities.

Advertisement

For example: “Hi, Mr. Smith, this is your bank. We noticed unusual activity on your bank account, ending in 0123. Please confirm your information.”

Because the details are accurate, the message feels legitimate. This dramatically increases the chances someone will respond. In many cases, the information came from data broker databases that were legally purchased or accessed.

Consumer protection starts with reducing your digital footprint

National Consumer Protection Week is meant to empower people to protect themselves. That protection shouldn’t stop at obvious scams. It should include limiting how easily your personal information can be found in the first place.

A data removal service helps remove your personal data from data brokers and people-search sites that collect and sell it. Instead of submitting dozens or hundreds of manual requests yourself, they automate the process and continue removing your data as it reappears.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Advertisement

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Kurt’s key takeaways

When most people think about scams, they imagine criminals hiding in the shadows. But some of the biggest threats to your personal information are operating out in the open. Data brokers legally collect and sell detailed profiles about you. People-search sites make your address, phone number and even relatives easy to find in seconds. Your browsing activity is tracked, packaged and monetized. And now AI is speeding up how quickly that information can be gathered, connected and reused. This is not just about annoying ads. The more accessible your personal data is, the easier it becomes for scammers to sound convincing and target you with precision. Real consumer protection is not only about avoiding suspicious links. It is about limiting where your information lives and who can access it. The less strangers know about you, the harder it is to use your own data against you.

Have you ever searched for your name online and been surprised by what you found? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved.  

Related Article

5 myths about identity theft that put your data at risk
Continue Reading
Advertisement

Trending