Connect with us

Technology

Holiday travel privacy risks and how to stay safe

Published

on

Holiday travel privacy risks and how to stay safe

NEWYou can now listen to Fox News articles!

Holiday travel is stressful enough with crowded airports, expensive flights and last-minute itinerary changes. But there’s a hidden part of the travel industry most people don’t know about: your personal data is being harvested, packaged and sold every time you book a flight, reserve a hotel room or check a travel app.

Whether you’re traveling for a Christmas break or booking early for New Year’s, the companies you trust with your most sensitive details—full name, home address, passport info, travel dates and device data—are sharing and selling far more than you think.

And during the holiday rush, that data becomes a goldmine for scammers.

Let’s unpack how this works, which companies collect the most and what you can do before you travel to keep your personal information out of the wrong hands.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

PROTECT YOUR DATA BEFORE HOLIDAY SHOPPING SCAMS STRIKE

Holiday travel brings more than stress because every booking and check-in quietly generates personal data you may not realize you are giving away. (iStock)

Why holiday travel puts your data at risk

The holiday season is the peak period for travel-related data collection. Airlines, hotels, booking platforms, loyalty programs and travel apps all experience massive traffic spikes—millions of Americans are searching for deals, comparing prices, checking gate changes and re-booking delayed flights.

Every one of those actions creates trackable data points, including:

Advertisement
  • Email address
  • Phone number
  • Full name and DOB
  • Address history
  • Travel itineraries
  • Passport or ID data
  • Device fingerprint
  • IP address and location
  • Shopping habits and spending patterns.

You might assume this data stays with the airline or hotel. It doesn’t.

Most companies share it with advertisers, analytics firms, data brokers and dozens of unnamed “partners.” Some even use your data to profile you—how often you travel, how much you’ll likely spend and whether you’re a “high-value” target.

That information can easily leak into scammer databases, which is why holiday travelers suddenly see:

  • Fake “your flight is canceled” texts
  • Phishing emails that look identical to hotel confirmations
  • Bogus baggage fee requests
  • Fake TSA PreCheck renewal notices
  • “Urgent re-verification required” messages.

Scammers rely on the fact that you’re stressed, rushing and expecting travel updates. And because they already have your personal data, their attacks are frighteningly convincing.

STOP FOREIGN-OWNED APPS FROM HARVESTING YOUR PERSONAL DATA

Airlines, hotels, apps and booking platforms collect far more information than most travelers know and that data often gets shared with advertisers and data brokers. (AP Photo/Ryan Sun)

Examples of what major travel companies collect

Here are real-world examples of how holiday travel platforms collect and share your data:

Advertisement

1) Airlines (Delta, American, United, Southwest)

Major U.S. airlines collect not just your name, phone number and email, but also travel companions, payment details, geolocation data, device data and loyalty-program activity.

They share this with:

  • “Marketing partners”
  • Analytics platforms
  • Third-party advertisers
  • Data-enrichment firms.

Many of these partners, over time, become part of the data broker ecosystem.

2) Booking platforms (Expedia, Booking.com, Hotels.com)

Each booking platform details what it collects in its privacy policy. Oftentimes, these sites track:

  • Search history
  • Price views
  • Device fingerprint
  • Click behavior
  • IP-based location
  • Payment attempts—even abandoned carts.

This is used to build profiles that determine what deals you’re shown and how aggressively you’re targeted.

3) Hotel chains (Marriott, Hilton, IHG)

Marriott’s privacy policy and other privacy statements list over 60 categories of data it collects. Some chains were caught sharing guest data with:

  • Ad networks
  • Social media platforms
  • Third-party “guest experience” tools
  • Affiliate networks
  • Data brokers for cross-device tracking.

Cybercriminals have been using the information of over 500 million Marriott guests, exposed during a four-year-long breach that started in 2014, to craft and execute travel-themed scams to this day.

4) Travel apps (Airbnb, Hopper, KAYAK, TripIt)

These are some of the most aggressive data collectors because they run nonstop on your phone. Many collect:

Advertisement
  • Real-time location
  • Contacts
  • Clipboard data
  • Behavioral analytics
  • Device ID
  • In-app browsing.

Some of these firms then “share information with partners for marketing enhancement,” which is typically code for data selling.

YOUR DISCARDED LUGGAGE TAGS ARE WORTH MONEY TO SCAMMERS

Scammers use leaked travel details to send fake flight alerts, hotel messages and urgent payment notices that look real because they already have your personal information. (iStock)

How scammers use your travel data

Once your information enters the ecosystem, scammers build travel-themed attacks designed to hit you at the worst possible time. Some common examples include:

  • Fake airline notifications: (e.g., “Your flight has been canceled, click here to rebook”)
  • Urgent hotel “payment failure” emails: Scammers use leaked address and booking data to send emails that look exactly like they’re from the Hilton or Marriott
  • Fake baggage fees: (e.g., “Pay $24.90 to release your checked bag”)
  • TSA and Global Entry renewal scams.

This isn’t guesswork. They already have your name, flight, hotel, location and travel dates—because the travel industry’s data partners sold or leaked them.

How to protect yourself before you travel

Here are my top steps to staying private this holiday season:

Advertisement

1) Check what data the travel companies already have

Hotels, airlines and booking sites all have data removal options—though they’re buried in their privacy settings.

2) Stop apps from tracking your location

Turn off location permissions for apps like:

  • Hopper
  • Airbnb
  • Expedia
  • HotelTonight.

Many track you even when not in use. Here’s how to do it for iPhone and Android:

On iPhone: Open Settings, tap Privacy & Security, then tap Location Services, scroll down to the app and tap each app, and set location access to “While Using the App” or “Never,” and turn off “Share My Location” if you don’t want them to see your exact spot.

On Android: Open Settings, tap Location, then choose App location permissions or App permissions, find the app and tap it, and change each one to “Allow only while using the app” or “Don’t allow” so they can’t track you in the background. (Settings may vary depending on your Android phone’s manufacturer.)

3) Remove your personal data from data broker sites

This is the most important step. Even if you stop airlines and hotels from collecting new data, your existing data is already circulating through dozens of data brokers, and that’s what scammers use to target travelers.

Advertisement

Data brokers hold:

  • Your travel patterns
  • Address history
  • Email and phone details
  • Income level
  • Household info
  • Your family members’ names.

You can manually request removal from hundreds of sites, but it takes months. That’s why I recommend a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

4) Use an email alias for bookings

An alias email reduces the amount of spam and phishing attempts you’ll receive. By creating email aliases, you can also protect your information. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches. 

For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

Advertisement

5) Avoid airport Wi-Fi for anything involving payments

Scammers often run fake hotspots. So, avoid airport public Wi-Fi when accessing financial information.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

The holiday season is here, and many of us are getting ready to travel to see family and friends. As travel picks up, personal data collection and sharing also increases. Airlines, hotels and travel apps often share your information with unknown third parties, which scammers can use to target you during your trip. Before you pack your bags, take a few minutes to remove your personal data from online brokers. Doing this helps protect your identity and lets you travel with peace of mind.

How do you protect your personal information when you travel during the holidays? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.

Technology

Texas sues Netflix for advertising ‘bait and switch’ and spying

Published

on

Texas sues Netflix for advertising ‘bait and switch’ and spying

Texas Attorney General Ken Paxton has filed a lawsuit against Netflix, accusing the company of turning its back on its promise to remain ad-free and safe for kids. The lawsuit, filed on Monday, claims Netflix has “opened Texans’ data for inspection by the same Big Ad Tech community it once criticized for exploiting users in this same way.”

In the lawsuit, Paxton claims Netflix drove up subscriptions by promoting its platform as an “escape from Big Tech surveillance.” But at the same time, Paxton alleges the streamer “built a behavior-surveillance program” in the background with addictive features, like autoplay, which automatically plays the next episode after one is finished.

“Netflix’s endgame is simple and lucrative: get children and families glued to the screen, harvest their data while they are stuck there, and then monetize the data for a handsome profit,” Paxton’s lawsuit claims, citing the streaming service’s annual revenue, which jumped from $15 billion in 2018 to an estimated $50 billion in 2026.

“Netflix has built a surveillance program designed to illegally collect and profit from Texans’ personal data without their consent, and my office will do everything in our power to stop it,” Paxton says in the press release. “Netflix is not the ad-free and kid-friendly platform it claims to be. Instead, it has misled consumers while exploiting their private data to make billions.”

Paxton accuses Netflix of violating the Texas Deceptive Trade Practices Act, and asks the court to block the streamer’s “unlawful collection and disclosure” of user data, as well as to disable autoplay by default on kids’ profiles. Netflix didn’t immediately respond to a request for comment.

Advertisement
Continue Reading

Technology

School app Canvas breach hits during finals

Published

on

School app Canvas breach hits during finals

NEWYou can now listen to Fox News articles!

Finals week is stressful enough without your school’s main classroom app suddenly going dark.

That is what many students faced when Canvas, the school platform used by colleges, universities and K-12 schools, went down for several hours. The outage came after Instructure, the company behind Canvas, detected unauthorized activity tied to a cybersecurity incident on the platform.

For students and teachers, this was more than a tech glitch. Canvas is where many schools post assignments, messages, grades, class updates and exam instructions. So when access disappeared, it created confusion at the worst possible time.

Sign up for my FREE CyberGuy Report

Advertisement
  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

WHY LAST YEAR’S BREACH IS THIS YEAR’S IDENTITY FRAUD

Canvas outage during finals week leaves students locked out after cybersecurity incident triggers shutdown of key classroom platform. (Matthew Horwood/Getty Images)

What happened in the Canvas data breach?

Instructure says it detected unauthorized activity in Canvas on April 29, 2026. The company said it immediately revoked the unauthorized party’s access, started an investigation and brought in outside forensic experts.

Then, on May 7, Instructure said it identified additional unauthorized activity tied to the same incident. The company said the unauthorized actor made changes to pages that appeared when some students and teachers were logged in through Canvas.

Out of caution, Instructure temporarily took Canvas offline into maintenance mode to contain the activity, investigate and apply additional safeguards.

How Free-For-Teacher accounts fit into the Canvas breach

Instructure said it later confirmed that the unauthorized actor exploited an issue related to its Free-For-Teacher accounts. The company said this was the same issue that led to the unauthorized access the prior week.

Advertisement

In a statement to CyberGuy, Instructure said, “Instructure discovered the unauthorized actor involved in our ongoing security incident made changes to the pages that appeared when some students and teachers were logged in. Out of an abundance of caution, we immediately took Canvas offline to contain access and further investigate. We have confirmed that the unauthorized actor exploited an issue related to our Free-For-Teacher accounts. As a result, we have made the difficult decision to temporarily shut down our Free-For-Teacher accounts. This gives us the confidence to restore access to Canvas, which is now fully back online and available for use. We regret the inconvenience and concern this may have caused.”

That detail is important because it explains how the company says the attacker gained access. It also shows why Instructure took a more aggressive step after the May 7 activity.

Canvas outage disrupted students during finals

The timing made the outage especially frustrating. Students across the country are preparing for finals or already taking them.

Several schools reported problems with Canvas access. Student newspapers at Harvard, the University of Pennsylvania, Duke, UCLA and the University of Nebraska were reportedly blocked from using Canvas and saw a message from the hacking group ShinyHunters.

Think about how that feels if you are a student. You may need to submit a paper, check exam details or message a professor. Then the system you rely on suddenly stops working.

Advertisement

That is the real-life problem with school tech. When one major platform goes down, the disruption spreads fast.

Hackers claimed responsibility for the Canvas breach

A hacking group called ShinyHunters claimed responsibility for the attack. The group reportedly threatened to leak school data unless it heard from affected schools by May 12, 2026.

The group also claimed it had data tied to nearly 9,000 schools and about 275 million people. Those numbers come from the hackers’ claims. Instructure has not publicly verified that full scale.

That is worth keeping in mind. Cybercriminals often use big numbers to create panic and pressure victims. However, the confirmed incident is serious enough for schools and families to pay attention.

What student and teacher data may be at risk?

Based on Instructure’s investigation so far, the data taken in the April 29 incident includes certain personal information of users at affected organizations. That includes names, email addresses, student ID numbers and messages among Canvas users. Instructure said it has found no evidence that passwords, dates of birth, government identifiers or financial information were involved.

Advertisement

The company also said that, based on its investigation to date, it has not found evidence that data was taken during the May 7 activity. Still, Instructure said the investigation is ongoing.

Even so, this kind of information can still create problems. A scammer could use a student’s school email and Canvas details to send a fake message that looks official.

For example, a student may get an email that says a final exam file failed to upload. Another message may claim the student needs to verify a Canvas account. A fake IT alert could ask for a login code. That is how a data breach can turn into a phishing attack. 

Is Canvas back online after the breach?

Yes. Instructure says Canvas is fully back online and available for use. However, Free-For-Teacher accounts remain temporarily shut down while the company works through the issue.

The company also says its outside forensic partner reviewed the known indicators and found no evidence that the threat actor currently has access to the platform.

Advertisement

Instructure says it has revoked privileged credentials and access tokens tied to affected systems. It also says it deployed additional platform protections, rotated certain internal keys, restricted token creation pathways and added monitoring across its platforms.

Why the Canvas breach matters for families

Many parents may not know how much school life now runs through platforms like Canvas. Students use Canvas to track deadlines, get teacher updates, submit work and read class messages. Teachers use it to manage assignments and communicate with students.

That makes Canvas a tempting target. If criminals can disrupt access or steal user information, they can create chaos quickly. The bigger lesson here is that school accounts deserve the same protection as bank accounts or email accounts. They hold personal details, private messages and information tied to a student’s daily life.

HACKERS THREATEN TO LEAK DATA FROM 275M USERS AFTER BREACHING MAJOR COLLEGE PLATFORM USED NATIONWIDE

Instructure takes Canvas offline after detecting unauthorized activity tied to breach affecting schools nationwide. (Photo by Carmen Jaspersen/picture alliance via Getty Images)

Advertisement

Ways to stay safe after the Canvas data breach

Even if passwords and financial details were not part of the breach, students and teachers should still stay alert. Scammers can use names, school emails, student ID numbers and message details to make fake alerts look convincing.

1) Watch for fake Canvas emails

Be careful with any message that claims to come from Canvas, Instructure or your school’s IT department. Scammers may use urgent language. They may say your account will be locked, your exam file is missing, or your final grade is at risk. That pressure is the trick. Go directly to your school’s official website or Canvas login page instead of clicking links in surprise emails.

2 Change your password if your school recommends it

Instructure said it found no evidence that passwords were involved. Even so, follow your school’s instructions. If your school tells you to reset your password, do it right away. Choose a strong password you do not use anywhere else. A password manager can help you create and store unique logins for each account. Check out the best expert-reviewed password managers of 2026 at CyberGuy.com.

3) Turn on multifactor authentication

If your school offers multifactor authentication, turn it on. MFA adds another step when someone tries to log in. That extra step can stop a scammer who has your password. An authenticator app or passkey is stronger than a text code. Still, any MFA is better than leaving your account wide open.

4) Never share login codes

No real school IT worker should ask for your password or login code. If someone asks for that information, treat it as a red flag. End the conversation and contact your school through an official help desk number or website.

Advertisement

5) Review your Canvas messages

Since Canvas messages may have been involved, think about what you shared there. Did you send personal details? Did you mention another account? Did you share private information with a teacher or classmate? You do not need to panic. But you should stay alert for messages that reference details from your Canvas account.

6) Use strong antivirus software

A breach like this can lead to phishing emails with malicious links or attachments. Strong antivirus software can help block malware, warn you about dangerous websites and protect your devices if you accidentally click the wrong link. Keep it updated on your phone, tablet and computer. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.

7) Consider a data removal service

Student and teacher information can end up on people-search sites and data broker databases. A data removal service can help reduce how much personal information is floating around online. That can make it harder for scammers to connect your school email, home address, phone number and other personal details. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

8) Use identity theft protection if your data was exposed

If your school confirms that your personal information was involved, identity theft protection can help you spot suspicious activity faster. These services can monitor your personal information, alert you to possible misuse and help you respond if someone tries to use your identity. See my tips and best picks on Best Identity Theft Protection at CyberGuy.com.

9) Parents should talk to students about phishing

Younger students may not recognize a fake school message. Parents should keep the warning simple. Tell students not to click unexpected links, share codes or respond to scary messages without checking first. A quick conversation now can prevent a bigger mess later.

Advertisement

What schools and Canvas users should do next?

Instructure says it notified impacted organizations on May 5, 2026. If a school or institution was affected, Instructure says it will contact that organization’s primary contacts directly.

For students, parents and employees, Instructure says the school or institution should be the first point of contact. It also recommends being cautious of unexpected emails or messages about the incident, avoiding suspicious links and reporting anything unusual to the school’s IT or security team.

Schools should also warn students and staff about follow-up scams. A breach does not end when the platform comes back online. For students and teachers, the risk can continue through fake emails, fake login pages and scam messages.

ADT DATA BREACH EXPOSES CUSTOMER INFORMATION

Students scramble as Canvas outage disrupts exams, assignments and communication during critical finals period. (Katherine Frey/The Washington Post via Getty Images)

Advertisement

Kurt’s key takeaways 

The Canvas breach shows how much school now depends on a few digital platforms. When one of them goes down, students feel it right away. The good news is that Instructure says it has found no evidence that passwords, financial data, birthdays or government IDs were involved. The tougher reality is that names, school emails, student IDs and private messages still have value to scammers. So the best move is to stay calm and stay skeptical. Use official school links. Turn on stronger login protection where possible and treat urgent messages with caution.

Should schools and tech companies do more to protect student and teacher data before a breach puts their privacy at risk? Let us know by writing to us at CyberGuy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

The Bastl Kalimba is a wild synth that thinks it’s a thumb piano

Published

on

The Bastl Kalimba is a wild synth that thinks it’s a thumb piano

Make no mistake, the Bastl Kalimba is a synthesizer, you just play it like a kalimba. Its tines don’t really make much sound. There is an internal mic that you can blend in for a little acoustic spice, but it’s mostly driven by the synth engine that combines physical modeling and FM. The tines are actually touch and velocity-sensitive triggers. And, while it can sound somewhat like a real kalimba, it’s a lot more sonically versatile and offers features you can only find on a synth.

Beyond the synth sounds that range from pluck to pads, there are also built-in effects covering basic spatial effects like delay and reverb, as well as distortion, bit crushing, and even tape emulation. There’s also a multi-mode high- and low-pass filter, a simple arpeggiator.

More interesting, though, are the looper and touch points that add unique effects. The looper has time-stretching features, can be reversed, and rerecorded through the effects for destructive processing. A series of touchpads on the front enable note glides and alter the timbre using effects that Bastl calls Soil and Wind. Those effects unlock the Kalimba’s accelerometer for further timbral manipulation. There are also two programmable touch points on the top that can be assigned to almost any parameter, from simple pitch bends to the size of the reverb.

Bastl is currently running a Kickstarter campaign for the first batch of Kalimbas. Normally, this is where you get the caveats about crowdfunded products. But Bastl Instruments is a well-established company with a long track record of delivering oddball music gear at scale. The company called it “one of the most challenging” products it has ever created, and it spent more than three years in development, so it’s possible that Bastl is gauging interest before committing to mass production. We’ve reached out to Bastl for comment and will update if we hear back.

Continue Reading
Advertisement

Trending