Technology
How debit card fraud can happen without using the card
NEWYou can now listen to Fox News articles!
Every so often, we receive an email that stops us cold. Not because it is dramatic. Not because it is careless. Because it feels impossible.
Sheri M. from Georgia recently wrote to us with this question:
“Yesterday I learned that someone had stolen my debit card information. I was alerted by my bank about 10:00 p.m. last night that someone tried to use my card in Brazil. I am in the Southern United States and have never traveled outside the country. What I have trouble understanding is that this particular debit card has never been used and has never been out of a locked vault. It has been activated, and once activated, I locked it up. No one had access to it, no questions about that. It is just not possible. So how could someone have my card information? I asked this question at my bank, and after speaking to several people, they are at a loss as to what to tell me. I hope you can shed some light on this.”
GHOST-TAPPING SCAM TARGETS TAP-TO-PAY USERS
Debit card numbers can be compromised digitally through system breaches or automated number-guessing attacks. (fizkes/Getty Images)
Sheri, first, we are glad your bank flagged it. That alert tells you fraud monitoring worked. Now let’s address the part that feels unreal. How can someone use a debit card that has never left a locked vault?
If you have asked that same question, you are not alone. This type of debit card fraud happens more often than most people realize. And it almost never involves someone physically touching your card.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
How debit card fraud happens without using the card
When a card is compromised without being used, the issue is typically digital. Here are the most likely explanations.
1) The number was exposed before you received it
Debit cards move through multiple systems before they reach your mailbox. Third-party vendors manufacture, encode and ship them. That means the card number exists in databases long before you open the envelope. If one of those systems is breached, criminals can obtain card numbers in bulk. They never need the physical card. They never need your home. In that case, it has nothing to do with your vault.
2) A BIN attack may be responsible
Every debit card starts with a bank identification number. Criminals use software to generate the remaining digits at high speed. They test thousands of combinations using small transactions or foreign authorizations to see which numbers work. This is known as a BIN attack. They are not stealing your specific card. They are guessing valid numbers mathematically. If your card was activated, even if it was never used, it becomes part of the pool that can be tested. A foreign attempt, like one in Brazil, is often a test authorization. It feels personal. In reality, it is automated.
WEB SKIMMING ATTACKS TARGET MAJOR PAYMENT NETWORKS
A customer completes a transaction at Pike Place Market in Seattle, Washington, on May 28, 2025. Financial security specialists recommend canceling compromised cards and monitoring accounts immediately after a fraud alert. (M. Scott Brauer/Bloomberg via Getty Images)
3) A processor or network weak point
Sometimes the exposure does not originate at the bank itself. The weak link can involve:
- A payment processor
- A card network
- A digital wallet backend
- A servicing vendor
Frontline bank employees often do not have visibility into these system-level issues. Patterns can take time to surface internally. That is why you may not receive a clear explanation right away.
4) Backend systems assign numbers early
Many banks pre-assign card numbers or connect them to digital systems before you ever swipe the card. If that backend data is exposed, the physical card remaining locked away does not matter. That is why debit card fraud without using the card can still occur.
Why did the transaction show up overseas?
You may wonder why the attempt came from Brazil. Foreign authorizations are often used as test transactions. Criminal groups run small or unusual location charges to see which numbers are active. If the charge clears, they escalate. The good news is your bank blocked it.
What you should do right now
If this happens to you, act quickly.
- Cancel the card completely. Do not just lock it. Make sure the number is permanently closed.
- Request a new card number. Confirm it is not a reissue of the same digits.
- Monitor your checking account daily for at least 30 days.
- Freeze your credit with all three credit bureaus.
- Add identity monitoring to detect broader misuse.
That final step is often overlooked.
WHY SCAMMERS OPEN BANK ACCOUNTS IN YOUR NAME
Experts say debit card fraud often occurs without the physical card ever being used or stolen. (Nikos Pekiaridis/NurPhoto via Getty Images)
Why identity monitoring matters
Debit card fraud can be isolated. It can also signal a larger data exposure.
If your card number surfaced through a breach or vendor leak, other personal details may be circulating too. Email addresses, phone numbers and Social Security numbers often appear together in stolen datasets. That is where early detection becomes critical.
Our top Identity Theft Protection recommendation monitors credit activity, financial accounts and dark web marketplaces for signs your identity is being misused. You receive fast alerts so you can respond before small incidents turn into larger problems.
Instead of waiting for a late-night fraud alert, you gain earlier visibility.
See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.
Ways to stay safe from invisible debit card fraud
You cannot control global criminal networks. You can reduce your exposure.
- Keep debit cards locked in your banking app when not in use
- Turn on real-time transaction alerts
- Use credit cards for online purchases when possible
- Freeze your credit as a preventative step
- Avoid storing debit card details across multiple retail sites
- Use identity monitoring for broader protection
Layered security gives you more control.
Kurt’s key takeaways
Sheri’s experience feels impossible because she did everything right. The card never left the vault. It was never used. No one had access. Yet the number was still tested from across the world. That is the reality of today’s financial crime. It is automated, remote and system-driven.
If this can happen to a card locked in a vault, what does that say about how secure our financial system really is? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Native Instruments Komplete 26 adds weird new synths and experimental piano sounds
The latest version of Native Instruments’ Komplete music production bundle is here with 62 new additions, including the wonderfully weird Absynth 6. Komplete 26 comes in several flavors, starting with three $99 Select bundles: Beats, Band, and Electronic. Prices jump pretty steeply from there, with Standard costing $549, Ultimate costing $1,249, and the Collector’s Edition priced at an eye-watering $1,949. You save some money if you’re upgrading from Komplete 15 (and yes, they switched from sequential numbers to years for 2026), but upgrading the Collector’s Edition will still set you back $399.
Komplete 26 Standard should satisfy all but the most demanding producers. Absynth 6 and Massive X cover most of your synth needs. Kontakt 8 is the industry standard for sample-based instruments covering orchestras, drums, choirs, and more. It also has tools for sequencing and building chord progressions if you need a little creative inspiration. There’s also Guitar Rig 7 Pro for effects and amp simulations. Plus, Komplete comes with mixing and mastering plugins from iZotope, including Ozone 12, Neutron 5, and Nectar 4.
Upgrading from the Standard Bundle to the Ultimate or Collectors does get you new additions like Claire and Claire: Avant, a pair of sampled Steinway D grand piano instruments that cover both traditional acoustic tones and experimental textures. There’s also a host of additions, like LCO Producer Strings and Moments: Vocal Clouds, that are targeted at score work. Of course, all those additional sampled instruments and expansion packs add to the download size, with the Collector’s Edition weighing in at 1.6 TB.
Technology
SIM swap scam drained Florida woman’s bank account in minutes
NEWYou can now listen to Fox News articles!
You’re at home, scrolling through your phone like any other night. Suddenly, nothing works. Texts stop, calls fail and alerts disappear. That’s how it started for Florida woman Patricia Escriva.
She didn’t lose her phone. She lost control of her phone number. And within minutes, someone else was using it to break into her accounts.
“I realized that I had nothing,” Escriva said. “Either you get a text message, a WhatsApp message, an email or a phone call. I had nothing.” That silence was the first warning.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
IS YOUR PHONE HACKED? HOW TO TELL AND WHAT TO DO
SIM swap scams target a victim’s phone number, allowing hackers to intercept verification codes and move quickly through linked accounts. (Kurt “CyberGuy” Knutsson)
How a normal night turned into chaos
Escriva shared her experience on my Beyond Connected podcast at getbeyondconnected.com, where she walked through how quickly everything unraveled.
Escriva was babysitting when her phone suddenly went quiet. No notifications. No signal. It felt off right away.
She connected to Wi-Fi to check what was going on. That’s when everything hit at once. “The first one was, you added a new device to your account,” she said. “And then two seconds later, you just changed your password.”
Then came the financial alerts. “Let me tell you, my heart stopped,” she said. “I start getting emails like $1,500, $800.”
Within minutes, someone had taken control of her accounts and started spending. That speed is what makes this type of attack so dangerous.
What is a SIM swap scam?
What happened to Patricia is known as a SIM swap scam. A SIM swap scam is a type of identity theft that targets your phone number. This can happen with both physical SIM cards and eSIMs, since the attack focuses on your number, not your device.
Here’s how it usually works:
- A scammer gathers your personal data online
- They contact your mobile carrier and pretend to be you
- They convince the carrier to move your number to their device
- Once your number is transferred, they receive your security codes
That last step is the key. Many accounts rely on text message codes for login security. Once a hacker controls your number, they can reset passwords and take over accounts fast. In some cases, accounts are drained within hours.
Why do these SIM swap scams move so fast?
Once your number is in the wrong hands, everything connected to it becomes vulnerable. Email accounts. Bank logins. Payment apps. Hackers don’t waste time. They move quickly before you even realize what’s happening.
In Escriva’s case, the damage started immediately. “They were using my money… from their checking account to pay the credit cards to keep using the credit card,” she said. Even after reporting the issue, it took days to regain control of her number. “They took three days in order to get my phone number…back,” she said.
FBI WARNS OF DANGEROUS NEW ‘SMISHING’ SCAM TARGETING YOUR PHONE
Patricia Escriva recalls the moment her phone went silent and her accounts were taken over in a SIM swap scam. (Kurt “CyberGuy” Knutsson)
SIM swap scam warning signs you should never ignore
SIM swap scams don’t always start with obvious red flags. The first sign can feel small.
Here are signals you should never ignore:
- Your phone suddenly loses service
- You can’t send or receive calls or texts
- You get alerts about new devices or password changes
- You stop receiving verification codes
Escriva now urges people to act fast when something feels off. “If you see you have nothing going on on your phone, make a phone call,” she said. “If that phone call doesn’t go through… you’re being hacked.”
While Patricia lost thousands of dollars to the scammer, her bank ultimately restored all of her money.
What to do if you’re hit by a SIM swap scam
If your phone suddenly stops working without warning, act quickly:
- Call your mobile carrier from another phone and lock your number
- Ask for a SIM lock or port-out freeze immediately
- Contact your bank and stop any transactions
- Change passwords for your email and financial accounts
- Turn on alerts for suspicious activity
- Report the incident to your carrier and local police
Ways to stay safe from a SIM swap scam
You can’t control every data breach or leak. But you can make it much harder for someone to take over your number.
1) Lock down your mobile account
Call your carrier and ask for a SIM lock or port-out PIN. This adds a layer of protection before your number can be moved.
2) Stop relying on text codes
Switch important accounts to an authenticator app or security key. Text messages are the weak link in SIM swap attacks.
3) Use strong, unique passwords
Every account should have its own password. A password manager can help you generate and store them securely. Check out the best expert-reviewed password managers of 2026 at CyberGuy.com.
4) Turn on account alerts
Enable notifications for logins, password changes and transactions. The faster you spot suspicious activity, the better.
IF SOMEONE GETS INTO YOUR EMAIL, THEY OWN EVERY ACCOUNT YOU HAVE. THESE 3 MOVES LOCK THEM OUT FOR GOOD
A SIM swap scam can give criminals access to text message codes used to reset passwords and take over financial accounts. (Felix Zahn/Photothek)
5) Limit your data exposure
Your personal information is often available on data broker sites. Removing it with a data removal service reduces what scammers can use against you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.
6) Watch for phishing and malicious links
Scammers often gather the information they need through fake emails or texts. Using strong antivirus software can help detect malicious links, fake websites and suspicious downloads before they compromise your data. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.
7) Consider identity theft protection
These services can monitor your personal data, alert you to suspicious activity and help you recover more quickly if your information is misused. They can also flag when your data appears in known breaches. See my tips and best picks on Best Identity Theft Protection at CyberGuy.com.
8) Act immediately if your phone goes silent
Don’t wait. Use another phone and call your carrier and bank right away. Lock everything down as fast as possible.
Kurt’s key takeaways
Patricia Escriva’s story is a reminder of how quickly things can spiral out of control. One moment, everything feels normal. Next, your digital life is out of your hands. Her experience also shows something else. Speed matters. Awareness matters. The sooner you act, the more you can limit the damage. Scammers are getting better at impersonation. That means protecting your phone number is now just as important as protecting your passwords. You can hear Patricia walk through her entire story step by step on my Beyond Connected podcast at getbeyondconnected.com, including what she wishes she had known before it happened.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
If your phone suddenly lost service right now, would you know exactly what to do next? Let us know by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Google Home’s Gemini AI can handle more complicated requests
Google Home users can now ask Gemini to complete more complex, multi-step tasks and combine multiple tasks in a single command. Google has updated Gemini for Home to Gemini 3.1, which it says will improve the smart home assistant’s ability to interpret and act on requests. The upgrade will also make Gemini for Home better at handling recurring and all-day events and allow users to “move around” upcoming events.
In addition to the Gemini upgrade, Google also announced improvements to the camera experience, new automation capabilities, and two public previews: Ask Home on Web and a new notification feature. Ask Home on Web will allow Google Home users to manage their smart home from a computer, including searching camera history with natural language, checking on devices, and creating automations. Google is also releasing a public preview for “improved and expanded notifications” that include “quick action” buttons that can be used for device control directly in the notification.
-
Detroit, MI2 minutes agoDetroit Grand Prix returns downtown: Speed, sound, and racing action set for May 29–31
-
San Francisco, CA14 minutes agoSan Francisco Giants honor Willie Mays with highway designation on what would have been his 95th birthday
-
Dallas, TX20 minutes agoBattery case against Dallas Wings guard Arike Ogunbowale closed
-
Miami, FL26 minutes agoMiami woman allegedly lured man to luxury condo via Instagram, then robbed him with 2 accomplices
-
Boston, MA32 minutes agoDespite progress, Neely and Sweeney say Bruins have a long way to go
-
Denver, CO38 minutes agoDenver leaders pitch city as host for 2028 Democratic National Convention
-
Seattle, WA44 minutes agoBryan Woo returns to dominance in Seattle Mariners win – Seattle Sports
-
San Diego, CA50 minutes agoPadres win late again, take series from Giants