Technology
Homeland Security warns federal agencies of hackers targeting Google Chrome, Excel spreadsheets
The Cybersecurity and Infrastructure Security Agency, or CISA, is issuing a new warning: your Google Chrome browser and Excel spreadsheets could be at risk of an attack. The agency identified two new exploits that could give hackers easy access to your computer.
Federal agencies have until January 23 to make sure they’re protected. Here are some ways to make sure you’re protected too.
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
Microsoft logo on keyboard (Kurt “CyberGuy” Knutsson)
Microsoft Excel’s new exploit
Hackers are targeting Microsoft Excel using a huge vulnerability in a library that reads Excel files. The bug is in a library called Spreadsheet::ParseExcel. It allows hackers to run malware remotely. Specifically, hackers can utilize a string in the library to run programs on your computer.
This exploit has popped up before. Security firm Barracuda noticed Chinese hackers using the exploit last month. They would create custom Excel attachments to exploit the bug and run any program they wanted to.
While Barracuda addressed this with a patch, they say open-source libraries could still be at risk. The company also issued a warning to anyone who uses Spreadsheet::ParseExcel, recommending they review the bug and take any necessary action.
Google Chrome browser on laptop (Kurt “CyberGuy” Knutsson)
MORE: THE 7 SIGNS YOU’VE BEEN HACKED
Google Chrome’s bug
Google’s eighth day zero attack comes in the form of an attack on an open-source project. WebRTC allows web browsers and mobile applications to communicate in real-time. However, hackers are using it to overload your browser and either cause it to crash or give them permission to do whatever they want. This exploit doesn’t just affect Google Chrome. It also affects other open-source web browsers using WebRTC to communicate. Google issued an emergency fix just last month, but there’s more you can do to protect yourself.
Four essential tips to secure your devices and data from hackers and scammers
To protect yourself from malicious hackers and scammers, we recommend you do the following four things.
1) Be cautious about using open-source applications
When you use open-source applications or programs, it’s always wise to remember that anyone has the ability to change the application or program’s code. They have the ability to do something malicious if they want to. Only use open-source applications that you trust, and be careful about what you download.
2) Update your applications regularly
One of the easiest ways to protect yourself from hackers and scammers is to keep your applications up to date. Hackers often exploit vulnerabilities in outdated software to gain access to your devices or data. By updating your applications regularly, you can patch these security holes and prevent hackers from exploiting them.
3) Avoid opening suspicious attachments or links
Another common way that hackers and scammers try to infect your devices or steal your information is by sending you malicious attachments or links. These can be disguised as legitimate emails, messages, or websites, but they can contain malware, phishing or ransomware. To avoid falling for these traps, you should always check the sender, the subject, and the content of any attachment or link before opening it. If you are not sure, do not open it or click on it.
4) Use antivirus protection
Antivirus protection is essential for keeping your computer and data safe from malicious attacks. The recent exploits allow hackers to run malware remotely by sending custom Excel attachments and allow hackers to overload your browser and gain access to your system.
So, the best way to protect yourself is to have antivirus protection installed and actively running on all your devices. It will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked. Find my review of Best Antivirus Protection here.
The best way to protect yourself is to have antivirus protection installed and actively running on all your devices. (Kurt “CyberGuy” Knutsson)
MORE: THE NEW IPHONE SECURITY THREAT THAT ALLOWS HACKERS TO SPY ON YOUR PHONE
What to do if you’ve been hacked
If it has already happened and you’ve been hacked, then you should take immediate action to minimize the damage and secure your device. Here are some steps that you can follow:
Change your passwords
If hackers have recorded your passwords using a keylogger, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn’t’ recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.
Monitor your accounts and transactions
You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, report it to the service provider or the authorities as soon as possible. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.
Use identity theft protection
Identity Theft protection companies can monitor personal information like your home title, Social Security Number (SSN), phone number, and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.
Contact your bank and credit card companies
If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should contact your bank and credit card companies and inform them of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges, and issue new cards for you.
Alert your contacts
If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.
Restore your device to factory settings
If you want to make sure that your device is completely free of any malware or spyware, you can restore it to factory settings. This will erase all your data and settings and reinstall the original iOS version. But, you should back up your important data before doing this, and only restore it from a trusted source.
MORE: GOT A CREDIT CARD FRAUD ALERT? HOW CROOKS SWIPE YOUR PAYMENT CARD DETAILS
Kurt’s key takeaways
The recent exploits targeting Google Chrome and Microsoft Excel are a reminder of how vulnerable our devices and data can be to cyberattacks. Hackers are always looking for new ways to exploit the software we use every day, and we need to be vigilant and proactive in protecting ourselves. By following the steps we outlined above, you can reduce the risk of falling victim to these attacks and keep your computer and data safe. Remember, prevention is better than cure, and the best defense is a good offense.
Which aspect of the cyberthreats discussed in the article concerns you the most, and why? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Red Rooms makes online poker as thrilling as its serial killer
It’s rare for a movie to get technology right. And it’s even rarer for that movie to be a thriller or horror, where realism takes a backseat to scares and tension. But Red Rooms mostly gets it. Nothing takes me out of a film quicker than a tech MacGuffin that might as well be literal magic. Yes, the phrase “dark web” will always sound a bit silly, but at no point during its 118 minutes does the tech become a distraction.
It’s not the tech that makes Red Rooms great, though. It’s just something that could have easily tanked an otherwise excellent movie. What carries the film is the expert tension building by director Pascal Plante. The perfect slow-burn pacing. And the incredible performances by Juliette Gariépy as Kelly-Anne and Laurie Babin as Clementine.
The film centers mostly on Kelly-Anne, a model / hacker / professional gambler who attends the trial of serial killer Ludovic Chevalier. She befriends Clementine, a fan of Chevalier who insists that he is being framed.
Clementine neurotically and loudly defends Chevalier, calling into TV shows and shouting at reporters outside the courtroom. She makes a spectacle of herself. But Kelly-Anne remains more mysterious, her motives unclear. Even at the end of the film, there is ambiguity about what she was trying to accomplish and why.
The ambiguity is part of what makes Red Rooms so enthralling. The movie feels unpredictable. None of the characters seem trustworthy or relatable. The world they inhabit is familiar, yet uncanny.
The movie lingers in that discomfort for long periods of time, making you squirm. Giving you the opportunity to play through all the possible scenarios that could play out in your head. Is Chevalier really the killer? Is Kelly-Anne the killer? Was one of the victim’s mothers an accomplice? Is the prosecutor keeping a secret?
The movie inches along, drawing out a tale of kidnapping, live-streamed torture, and snuff films before erupting into a climax that unexpectedly mines online poker and Bitcoin for legitimate drama. It’s ultimately less about the murders themselves than it is about obsession, internet bubbles, and the media. It almost feels like a grimier companion piece to David Fincher’s Gone Girl.
Technology
FBI email hack shows why you must lock down your tech
NEWYou can now listen to Fox News articles!
Here’s the uncomfortable truth. If someone can break into the personal email of the head of the Federal Bureau of Investigation, your inbox is not off limits.
Malicious actors targeted the personal email account of FBI Director Kash Patel, according to the FBI, and a group known as the Handala Hack Team in Iran has claimed responsibility for posting photos and documents online.
No classified systems were breached. But that is not the point. The real story is this: the front lines of cyber warfare now run straight through personal accounts like yours.
FBI SAYS ‘MALICIOUS ACTORS’ TARGETED PATEL’S PERSONAL EMAIL, IRAN-BASED HACKING GROUP CLAIMS RESPONSIBILITY
Hackers didn’t breach FBI systems; they accessed a personal email account, showing how everyday accounts can become targets. (Donato Fasano/Getty Images)
Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
What happened in the FBI director’s email hack
Hackers gained access to Patel’s personal email account, not any official FBI systems. The stolen material included photos, travel details and older messages that spanned more than a decade, with emails dating from around 2011 through 2022.
The FBI said “malicious actors” targeted Patel’s personal email account but did not attribute the attack to a specific country. A group known as the Handala Hack Team, which operates out of Iran, has claimed responsibility for the breach.
The Federal Bureau of Investigation says no government or classified data was compromised. The U.S. State Department is offering up to a $10 million reward for information leading to the identification of members of the Handala Hack Team. CyberGuy reached out to the FBI for comment, but did not receive a response before our deadline.
A cybersecurity expert described the exposed material as a “personal junk drawer.” That detail is what makes this incident hit close to home. Most people have one too.
The threat is real and it is getting more sophisticated
This does not appear to be random. U.S. officials have warned for years that foreign government-linked hackers, including groups associated with Iran, have targeted Americans, especially those connected to government or politics. These campaigns often ramp up during periods of geopolitical tension. Similar actors have previously targeted individuals tied to the Trump administration, including:
- Donald Trump Jr.
- Todd Blanche
- Lindsey Halligan
These groups also hit private companies. In one recent case, hackers claimed responsibility for disrupting operations at a U.S. medical device company and spreading propaganda tied to geopolitical events. This is coordinated. It is persistent. And it is not slowing down.
Why your everyday tech is now part of the battlefield
Cyber warfare used to target government systems. Now it targets you. Why? Because personal accounts are easier to break into. They are often protected by reused passwords, old emails and weak security habits.
Once hackers get in, they can:
- Map out your life through old messages
- Steal personal photos or financial details
- Impersonate you in scams
- Use your contacts to spread attacks
FBI Director Kash Patel speaks during a press briefing at the White House in Washington, D.C., on Nov. 12, 2025. (AP Photo/Evan Vucci)
In simple terms, your digital life can be used against you or someone you know.
IF SOMEONE GETS INTO YOUR EMAIL, THEY OWN EVERY ACCOUNT YOU HAVE. THESE 3 MOVES LOCK THEM OUT FOR GOOD
What you need to do right now to lock down your tech
I know it can sound intimidating, but it really comes down to this. You don’t need special skills, just a few smarter habits starting today.
1) Turn on two-factor authentication everywhere
Two-factor authentication (2FA) is one of the strongest defenses you have. Even if someone steals your password, they cannot get in without the second code. Focus on your email first. That is the master key to everything else.
2) Stop reusing passwords
If you reuse one password across accounts, one breach can unlock your entire digital life. Use a password manager and create unique passwords for each account. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
3) Clean out your “digital junk drawer”
Remember that phrase from the FBI case? Old emails, documents and attachments can expose years of your life. Go back and delete anything you no longer need, especially files that contain personal, financial or travel details. For anything important, move it to a secure location instead of leaving it sitting in your inbox. You can also check out CyberGuy’s 5 digital clean-up tips you didn’t know you needed to reduce long-term clutter and limit what attackers could access if your account is ever compromised.
4) Watch for highly targeted phishing
These attacks are getting more convincing. Hackers can use stolen data to craft emails that look personal and real. Always double-check links and sender addresses before clicking. Use strong antivirus software that can detect suspicious links, block malicious downloads and warn you before you interact with a dangerous site. Think of it as an extra layer of defense you do not have to think about. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
5) Consider using a data removal service
Even if you clean up your inbox, your personal information may already be circulating online through data broker sites. These companies collect and sell details like your address, phone number and even past activity. A data removal service can help automatically request the removal of your information from hundreds of these sites, reducing what hackers can find and use against you.
6) Keep your devices updated Updates fix known security flaws. Delaying them gives attackers a window to exploit your device.
7) Separate your digital life
Use different email accounts for banking, shopping and personal communication. This limits the damage if one account is compromised. Consider using email aliases, which are alternate addresses that forward to your main inbox. For example, you can use one alias for online shopping and another for signups. If one alias gets exposed or starts receiving spam, you can disable it without affecting your primary email account. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com
Cyberattacks today often focus on personal data like emails and photos, which can be used to expose or manipulate victims. (Philip Dulian/picture alliance via Getty Images)
8) Use passkeys where available
Passkeys replace passwords with a secure login tied to your device or biometrics. They cannot be reused or phished, which makes them one of the safest ways to protect your accounts today.
Kurt’s key takeaways
The U.S. is facing capable cyber adversaries. Hacker groups have shown they can keep pushing, adapt quickly and target both institutions and individuals. At the same time, the most common entry point is still simple. A weak password. An old email account. A moment of inattention. That means the first line of defense is not just government agencies. It is you.
What’s one thing you’ve done or haven’t done to protect your accounts that still worries you? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The best deals we’ve found from Amazon’s Big Spring Sale (so far)
Amazon loves to manufacture an event. March is historically a dry spell for deals; however, with Amazon’s third annual Big Spring Sale, which runs through March 31st, the retail behemoth is hoping to lure in would-be shoppers with the promise of steep(ish) savings and discounts on more seasonal, spring-centric items to hold folks over until Prime Day surfaces at the onset of summer.
The bulk of the deals we’re seeing right now aren’t quite on par with Black Friday or Prime Day, and, as with most shopping events, not everything on sale is worth picking up. That said, Amazon’s latest sale is one of the first big opportunities we’ve seen this year to save — and bypass some tariff-induced pain — especially since some of our favorite gadgets are currently matching their lowest prices to date, including headphones, robot vacuums, and a slew of charging accessories.
To help you sift through it all, we’re focusing squarely on the gadgets that are actually worth picking up, many of which we’ve tested and recommend even at full price. You’re not limited to Amazon, either. Retailers like Best Buy and Walmart are offering the same deals in a lot of cases, meaning you don’t necessarily need to succumb to shopping at the so-called “Everything Store” just to save a buck (or 50).
Headphone and earbud deals
Streaming and soundbar deals
Fitness tracker and smartwatch deals
Other Verge-approved deals
Update, March 28th: Adjusted to reflect current pricing / availability and several new deals, including those for Apple’s latest entry-level iPad, the Breville Barista Express, and JBL’s Flip 7 speaker.
-
Sports1 week agoIOC addresses execution of 19-year-old Iranian wrestler Saleh Mohammadi
-
New Mexico1 week agoClovis shooting leaves one dead, four injured
-
Miami, FL4 days agoJannik Sinner’s Girlfriend Laila Hasanovic Stuns in Ab-Revealing Post Amid Miami Open
-
Tennessee6 days agoTennessee Police Investigating Alleged Assault Involving ‘Reacher’ Star Alan Ritchson
-
Minneapolis, MN4 days agoBoy who shielded classmate during school shooting receives Medal of Honor
-
Politics1 week agoSchumer gambit fails as DHS shutdown hits 36 days and airport lines grow
-
Science1 week agoRecord Heat Meets a Major Snow Drought Across the West
-
Technology1 week agoYouTube job scam text: How to spot it fast