Technology
How Android malware lets thieves access your ATM cash
NEWYou can now listen to Fox News articles!
Smartphone banking has made life easier, but it has also opened new opportunities for cybercriminals.
Over the past few years, we have seen Android malware steal passwords, intercept OTPs and even take remote control of phones to drain accounts. Some scams focus on fake banking apps, while others rely on phishing messages that trick you into entering sensitive details.
Security researchers have now discovered a new threat that goes a step further. Instead of simply stealing login information, this malware gives thieves the ability to walk up to an ATM and withdraw your money in real time.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Android malware like NGate tricks users into downloading fake banking apps that steal sensitive data. (Kurt “CyberGuy” Knutsson)
How the NGate malware works
The Polish Computer Emergency Response Team (CERT Polska) discovered a new Android malware called NGate that uses NFC activity to access a victim’s bank account. This malware monitors contactless payment actions on the victim’s phone and forwards all transaction data, including the PIN, directly to a server controlled by attackers. It does not just copy card details. Instead, it waits until the victim taps to pay or performs a verification step, then captures the fresh, one-time authentication codes that modern Visa and Mastercard chips generate.
To pull this off, attackers need to infect the phone first. They typically send phishing messages claiming there is a security problem with the victim’s bank account. These messages often push people to download a fake banking app from a non-official source. Once the victim installs it, the app walks them through fake verification prompts and requests permissions that allow it to read NFC activity. As soon as the victim taps their phone or enters their PIN, the malware captures everything the ATM needs to validate a withdrawal.
MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON
Once installed, the malware captures NFC tap-to-pay codes and PINs the moment the victim uses their phone. (Kurt “CyberGuy” Knutsson)
What attackers do with the stolen data at the ATM
The attackers rely on speed. The one-time codes generated during an NFC transaction are valid for only a short period. As soon as the infected phone captures the data, the information is uploaded to the attacker’s server. An accomplice waits near an ATM, holding a device capable of emulating a contactless card. This could be another phone, a smartwatch or custom NFC hardware.
When the data arrives, the accomplice presents the card-emulating device at the ATM. Since the information contains fresh, valid authentication codes and the correct PIN, the machine treats it like a real card. The ATM authorizes the withdrawal because everything appears to match a legitimate transaction. All of this happens without the criminal ever touching the victim’s physical card. Everything depends on timing, planning and getting the victim to unknowingly complete the transaction on their own phone.
Criminals use the stolen, time-limited codes at an ATM to make real withdrawals without the victim’s card. (Kurt “CyberGuy” Knutsson)
7 steps you can take to stay safe from Android NGate malware
As attacks like NGate become more sophisticated, staying safe comes down to a mix of good digital habits and a few simple tools that protect your phone and your financial data.
1) Download apps only from the Play Store
Most malicious banking apps spread through direct links sent in texts or emails. These links lead to APK files hosted on random servers. When you install apps only from the Play Store, you get Google’s built-in security checks. Play Protect regularly scans apps for malware and removes harmful ones from your device. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Even if attackers send convincing messages, avoid installing anything from outside the official store. If your bank wants you to update an app, you will always find it on the Play Store.
2) Use strong antivirus software
One careless tap on a fake bank alert can hand criminals everything they need. Strong antivirus software can stop most threats before they cause damage. It scans new downloads, blocks unsafe links and alerts you when an app behaves in ways that could expose your financial data. Many threats like NGate rely on fake banking apps, so having real-time scanning turned on gives you an early warning if something suspicious tries to install itself.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
ATM ‘JACKPOTTING’ CRIME WAVE GROWS AFTER THIEVES WALK AWAY WITH HUNDREDS OF THOUSANDS IN CASH
3) Keep your device and apps updated
Security patches fix vulnerabilities that attackers use to hijack permission settings or read sensitive data. Updates also improve how Android monitors NFC and payment activity. Turn on automatic updates for both the operating system and apps, especially banking and payment apps. A fully updated device closes many of the holes that malware tries to exploit.
4) Use a password manager to avoid phishing traps
Phishing attacks often direct you to fake websites or fake app login pages that look identical to the real thing. A password manager saves your credentials and fills them in only when the website or app is authentic. If it refuses to autofill, it is a clear sign that you are on a fake page. Consider using a password manager to generate and store complex passwords.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
5) Turn on two-factor authentication for all financial services
Two-factor authentication gives you a second layer of protection, even if your password is compromised. App-based authenticators are more secure than SMS codes because they cannot be intercepted as easily. For banking apps, enabling 2FA adds friction for attackers trying to perform unauthorized actions. Combined with strong passwords from a password manager, it significantly reduces the chance of account takeover.
6) Ignore suspicious texts, emails and calls
Attackers rely on urgency to trick you. They often claim that your card is blocked, your account is frozen or a payment needs verification. These messages push you to act fast and install a fake app. Always pause and check your bank’s official channels. Contact the bank through verified customer care numbers or the official app. Never click links or open attachments in unsolicited messages, even if they look legitimate.
7) Review app permissions
Most people install apps and forget about them. Over time, unused apps pile up with unnecessary permissions that increase risk. Open your phone’s permission settings and check what each app can access. If a simple tool asks for access to NFC, messages or accessibility features, uninstall it. Attackers exploit these excessive permissions to monitor your activity or capture data without your knowledge.
Kurt’s key takeaway
Cybercriminals are now combining social engineering with the secure hardware features inside modern payment systems. The malware does not break NFC security. Instead, it tricks you into performing a real transaction and steals the one-time codes at that moment. This makes the attack difficult to spot and even harder to reverse once the withdrawal goes through. The best defense is simple awareness. If a bank ever urges you to download an app from outside the Play Store, treat it as an immediate warning sign. Keeping your phone clean is now as important as keeping your physical card safe.
Have you ever downloaded an app from outside the Play Store? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Iran-linked hackers target US medical tech company
NEWYou can now listen to Fox News articles!
When most people hear about cyberattacks tied to geopolitical conflict, it can seem far away. It sounds like something that happens to governments or giant corporations. Yet the latest cyber incident involving a U.S. medical technology company shows how fragile digital systems can be. Even more important, it raises a question you should all ask yourself: Are you protected against trouble, too?
A hacker group linked to Iran has claimed responsibility for a cyberattack on Stryker, a Michigan-based company that produces medical equipment and healthcare technology used worldwide. Stryker employs about 56,000 people and operates in more than 60 countries, making it one of the largest medical technology companies in the world.
Stryker disclosed the incident in a filing with the U.S. Securities and Exchange Commission, saying the disruption affected parts of its Microsoft environment and that investigators are working to determine the full scope.
The incident appears to be one of the most significant cyber incidents linked to the current conflict so far.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Laboratory assistants from the company BioNTech wear Stryker medical gear in a clean room at a production site in Marburg, Germany, in March 2021. (Boris Roessler/picture alliance via Getty Images)
What happened in the Stryker cyberattack
According to reports, the attack disrupted parts of Stryker’s global network environment. Reports indicate the outages began shortly after midnight on Wednesday on the East Coast. Employees suddenly discovered that their work-issued phones stopped functioning. Communication across teams stalled as devices became unusable.
ANDROID FIXES 129 SECURITY FLAWS IN MAJOR PHONE UPDATE
The hacker group Handala claimed responsibility on social media platforms, including Telegram and X. However, the claim has not been independently verified. Some employees also reported seeing the hacker group’s logo appear on company login pages during the disruption. In posts online, the group said the attack was retaliation for a bombing at a school in Minab, Iran, though those claims have not been independently verified.
Security experts believe the attackers may have gained access to the company’s Microsoft Intune management console. This platform allows companies to manage corporate devices such as smartphones and laptops remotely. Once inside that system, attackers appear to have triggered a powerful administrative feature. Reports suggest many company-connected phones and laptops were wiped back to factory settings.
Signage at the Stryker Corp. headquarters in Portage, Michigan, on Thursday, March 12, 2026. A cyberattack on Stryker Corp. has kept the medical technology company’s ordering and shipping systems offline as the firm continues to struggle to address a crippling hack claimed by a group linked to Iran. (Kristen Norman/Bloomberg via Getty Images)
How hackers may have used legitimate tools against the company
The attack did not rely on traditional ransomware or malware. Instead, the hackers appear to have used a legitimate system feature in a destructive way. Remote wipe tools exist for good reasons. Companies use them when a device is lost, stolen or retired. However, if attackers gain control of the management console, those same tools can become weapons. Some cybersecurity researchers believe attackers may have accessed the company’s Microsoft Intune device management system, though the exact method of the attack has not been publicly confirmed.
Once the attackers accessed the device management system, they likely triggered remote wipe commands across multiple employee devices. The result looked like a mass reset event that effectively shut down normal operations. Stryker later confirmed it experienced a cybersecurity incident affecting its Microsoft environment. The company said it saw no evidence of ransomware or malware and believes the incident is contained. Stryker said it has activated business continuity measures so it can continue supporting customers and partners while systems are restored.
Iran’s long history of destructive cyberattacks
This type of attack fits into a broader pattern. Iran-linked groups have previously launched some of the most damaging “wiper” cyberattacks on record. These attacks aim to destroy data rather than steal it.
Two notable examples include:
Since the start of the current conflict, cybersecurity companies such as Google and Proofpoint have mostly observed Iranian groups conducting espionage operations. However, the Stryker disruption may signal a shift toward more aggressive actions targeting corporate infrastructure. We contacted both Stryker and Microsoft for comment but did not hear back before our deadline.
Why this matters beyond one company
Large cyber incidents rarely stay isolated. When attackers demonstrate a new method, other groups often study and reuse it. That means techniques used against a corporation today can show up in smaller attacks tomorrow. Small businesses, hospitals and even individuals sometimes become targets when criminals adapt the same tactics. In other words, this story about a medical technology company also carries a warning for everyday digital life.
The logo of Stryker medical technology is seen on their plant in the IDA (Industrial Development Agency) estate, in Carrigtwohill, County Cork, Ireland on March 28, 2025. (Reuters/Clodagh Kilcoyne)
How to protect yourself from cyberattacks and device wipe threats
Cyberattacks against corporations reveal weaknesses that can affect anyone who uses connected devices. A few proactive steps can reduce your risk.
1) Use strong and unique passwords
Never reuse passwords across accounts. If attackers obtain one password, they often test it across many services. Consider using a password manager to generate and securely store complex passwords, so you do not need to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
2) Enable two-factor authentication
Adding a second verification step, such as two-factor authentication (2FA), can stop attackers even if they obtain your password.
3) Consider a data removal service
Data broker sites collect and sell personal details that criminals may exploit. Removing that information can reduce your exposure. Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
4) Install strong antivirus software
Reliable antivirus protection helps detect suspicious activity, phishing attempts and malware before it can spread. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Back up important files regularly
If a device is wiped or compromised, backups allow you to restore critical data quickly.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Cyberattacks once focused mainly on stealing information. Today, many attackers try to disrupt systems, erase data or create chaos. The reported incident involving Stryker shows how hackers can turn everyday administrative tools into powerful weapons. If someone gains access to the right controls, they may not need traditional malware at all. For many people, cyber conflict between countries can seem far away. Yet the same technology involved in those attacks powers the devices and services we rely on every day. Your phone, laptop and cloud accounts all connect to systems that depend on trust and access permissions. That is why digital safety now requires layers of protection. Strong passwords help. Secure devices help. Staying aware of threats helps, too. Preparation can make the difference between a quick recovery and a major disruption. If something unexpected happens, the people who bounce back fastest are usually those who took a few steps to protect themselves in advance.
And that leads to an important question: If your phone, laptop or cloud account were suddenly wiped tomorrow, would you be ready to recover? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Hulu, Disney Plus, and the Pixel Watch 4 are among this week’s best deals
Happy Saturday, all! This week, we found a number of deals that should help you unwind and relax over the next few days (and beyond). If you’re planning to stream the Oscars on Sunday, there’s still time to take advantage of a great deal on Hulu and Disney Plus, as well as Google’s latest 4K streaming device. Speaking of Google, you can also currently save $60 on the Pixel Watch 4; there are also savings to be had on microSD Express cards, ice cream makers, and a host of other great tech this weekend. So, without further ado, let’s get to it.
Hulu and Disney Plus recently launched a terrific promo that drops the price of the ad-supported bundle for new and returning subscribers to just $4.99 a month ($8 off) through 11:59AM ET on March 24th. That’s the best deal we’ve seen on the bundle since Black Friday and Cyber Monday, and a great way to stream the 98th Academy Awards without paying full price when they air tomorrow, March 15th, at 7PM ET.
In addition to the aforementioned awards show, Disney’s discounted bundle lets you catch up on 2026 nominees like The Secret Agent, It Was Just An Accident, and Elio. You also get access to the rest of Hulu and Disney’s massive catalog of movies and TV shows, which includes everything from Predator: Badlands and Anora to both seasons of Andor and the upcoming second season of Daredevil: Born Again.
If you want a terrific Android smartwatch to keep tabs on your health and fitness goals, the Google Pixel Watch 4 is down to a new low price. You can currently pick up the Wi-Fi-enabled 41mm model for $289.99 ($60 off) at Amazon and Best Buy, or the larger 45mm variant for $339.99 (also $60 off) via the same retailers (Amazon / Best Buy).
Google’s latest wearable offers a wide range of helpful health and fitness tools, allowing you to track your activity, sleep, blood oxygen levels, and heart rate. It can automatically record certain cardio workouts, while dual-frequency GPS enables more accurate navigation in challenging environments, including cities. Being a Google device, the Watch 4 also integrates well with the company’s various services, with support for apps like Google Maps, Google Wallet, and Google Assistant. You can also make hands-free calls with Google Gemini using the raise-to-talk gesture, which is helpful when you’re out for a run.
While the watch works well with most Android phones, it pairs especially nicely with Pixel devices. Pixel phone owners, for example, can use it as a remote shutter for the Pixel camera and take advantage of features like Recorder, which can generate AI-powered summaries of recordings. As an added plus, the screen and battery are both repairable and replaceable, so you won’t necessarily need to buy a whole new watch if either gets damaged.
While many first-party Nintendo Switch 2 games don’t take up a huge amount of space, storage can fill up quickly if you keep adding to your digital library or buy a lot of third-party games, such as Cyberpunk 2077. That makes this a solid deal, as the Switch 2 is limited to 256GB of built-in storage and requires pricier microSD Express cards for storage expansion. Samsung’s card uses the newer microSD Express standard, which delivers superior read and write speeds to traditional microSD cards, helping reduce load times and speed up larger downloads.
More great deals from this week
Technology
Data brokers accused of hiding opt-out pages from Google
NEWYou can now listen to Fox News articles!
If you have ever tried to opt out of a data broker site, you know the drill. You search. You scroll. You click through layers of legal jargon. Then you wonder if they even want you to find the exit door. Now we know the answer.
A U.S. Senate investigation found that several major data brokers placed code on their opt-out pages that blocked search engines from indexing them. In practical terms, that meant you could not easily find the page where you ask them to stop selling your data.
After pressure from Sen. Maggie Hassan, four companies have now removed that code.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Which data brokers hid their opt-out pages?
The companies named in the report include:
- Comscore
- IQVIA Digital
- Telesign
- 6sense Insights
These firms collect and sell personal information for marketing, analytics or identity verification. That data can include browsing behavior, device details, location history and in some cases highly sensitive identifiers.
A U.S. Senate investigation found major data brokers used no index code to hide opt-out pages from Google, making it harder for people to stop the sale of their personal data. (Kurt “CyberGuy” Knutsson)
An earlier investigation by The Markup and CalMatters found that dozens of brokers used “no index” code to hide opt-out instructions from Google search results. Some removed the code after reporters reached out. However, Sen. Hassan’s office later found that the four companies above still had opt-out pages blocked from search engines. They have since removed the code.
MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA
One more company, Findem, has not removed the no-index code from its “Do not sell or share my personal information” page, according to the report. The company later said an email from the senator’s office did not reach its CEO due to spam filtering and that its privacy channels are actively monitored. The Committee report noted this lack of action raises serious concerns about responsiveness to privacy requests and about whether opt-out rights are being made truly accessible.
We reached out to all five companies for comment. A spokesperson for 6sense provided the following statement:
“6sense takes privacy transparency seriously and has always fully indexed our Privacy Center, where individuals may exercise their opt-out rights in compliance with applicable laws. For a period of time, we included a “no index” directive on the Privacy Policy page to reduce spam volume to privacy request email aliases and protect the integrity of request handling systems. Once the issue was raised by the Committee, that code was immediately removed. Our Privacy Center opt-out page has remained indexed, and our Privacy Policy has always been accessible and prominently visible on our web properties, as well as directly linked in our publicly available data broker registrations. We regularly review our security and privacy practices to meet evolving regulatory requirements, and our commitment has been independently validated annually through ISO/IEC 27001:2022, ISO/IEC 42001:2023, and SOC 2, Type II certifications.”
2026 VALENTINE’S ROMANCE SCAMS AND HOW TO AVOID THEM
6sense said it takes privacy transparency “seriously.” (iStock)
Why hidden data broker opt-out pages matter for your privacy
Opt-out pages are not a courtesy. In many states, they are required by law. When companies hide those pages from search engines, they make it harder for you to take control of your own information. And that matters. The more complicated the process feels, the more likely people are to give up halfway through. Meanwhile, data broker breaches have been expensive and damaging. Committee calculations estimate that identity theft tied to four major data broker breaches cost U.S. consumers more than $20 billion. That is not a minor privacy slip. That is real money, real consequences and real stress for families trying to clean up the mess.
Why scammers care about your data
When detailed personal information falls into the wrong hands, it fuels scams that feel alarmingly real. Criminal networks can use data like Social Security numbers, home addresses and phone numbers to create highly customized emails, texts and phone calls. The more accurate the details, the more convincing the scam. That is one reason data broker breaches are not just a privacy issue. They are a consumer protection issue.
Sen. Maggie Hassan’s investigation is part of her broader effort to combat scams, which now account for nearly half a trillion dollars in losses annually and have grown into one of the world’s largest illicit industries. She has also opened inquiries into the roles that satellite internet providers, online dating platforms, AI companies and federal agencies play in preventing fraud.
The investigation was led by Democratic Sen. Maggie Hassan of New Hampshire. (Sen. Maggie Hassan reelection campaign)
What this means for your personal data and privacy
Here is the uncomfortable truth. Your personal data likely sits in dozens, maybe hundreds of databases you have never heard of. You did not sign up. You did not click agree. But your information still travels through a vast marketplace. Even when opt-out forms exist, finding and completing them can feel like a part-time job. And since the U.S. still lacks a comprehensive federal privacy law like Europe’s GDPR, rules vary by state. So yes, the opt-out pages are now easier to find for these companies. But the bigger system remains largely intact.
How to opt out of data brokers and protect your information
You cannot erase yourself from the internet overnight. However, you can reduce your exposure.
1) Search your name regularly
Type your full name and city into Google. Look for data broker listings. Many include an opt-out link buried in the privacy policy.
2) Use state privacy tools if available
California residents can use a free state-run tool called DROP at privacy.ca.gov/drop/ to request deletion from more than 500 registered brokers. Other states are rolling out similar systems.
3) Submit opt-out requests directly
Visit the privacy or “Do not sell my information” page on broker sites. Follow instructions carefully and keep confirmation emails.
4) Consider a data removal service
Data removal services can automate opt-out requests across dozens of brokers. They are not perfect, but they save time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
5) Lock down core accounts
Use strong, unique passwords stored in a password manager. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com. Also, turn on two-factor authentication (2FA) for financial email and social accounts. That way, even if your data circulates, criminals have a harder time breaking in.
The larger problem with the data broker industry
The data broker industry is legal. It operates in plain sight. Yet most people have no idea how many companies trade in their information. Until Congress passes a national privacy law, oversight will remain patchwork. That leaves you to chase down your own records one company at a time. Transparency should not require a Senate investigation.
Kurt’s key takeaways
This story is about more than hidden code. It is about control. When companies quietly block search engines from indexing opt-out pages, they tilt the playing field. After public scrutiny, those pages are easier to find. That is a step forward. Still, your data continues to move through an ecosystem designed to profit from it. So the real question is not whether opt-out pages appear on Google.
How much of your personal life are you comfortable leaving in the hands of companies you have never heard of? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
-
Detroit, MI1 week agoU.S. Postal Service could run out of money within a year
-
Pennsylvania1 week agoPa. man found guilty of raping teen girl who he took to Mexico
-
Oklahoma6 days ago
OSSAA unveils Class 6A-2A basketball state tournament brackets, schedule
-
Michigan5 days agoOperation BBQ Relief helping with Southwest Michigan tornado recovery
-
Southeast5 days ago‘90 Day Fiancé’ alum’s boyfriend on trial for attempted murder over wild ‘Boca Bash’ accusations
-
Health7 days agoAncient herb known as ‘nature’s Valium’ touted for improving sleep and anxiety
-
Nebraska2 days agoWildfire forces immediate evacuation order for Farnam residents
-
Tennessee1 week ago
Lady Vols fall to Alabama in SEC Tournament for seventh loss in row