In this new era of console… inclusivity? driven by Sony and mostly Microsoft bringing their exclusives to other platforms, it’s getting harder to highlight games that make a singular console shine. Indeed, the top-performing games year after year on both PlayStation and Xbox are multiplatform releases, and often the best games of the year, like 2025 GOTY winner Clair Obscur: Expedition 33, similarly launch on most everything. (Once again, like in all things, Nintendo is the exception.)
Technology
How hackers can send text messages from your phone without you knowing
There is enough to worry about in life without the additional stress and terror of finding out your friends, family or complete strangers have been receiving a text message from “you” without your knowledge. How did they do that? How did they send a text message from your phone without you knowing?
This is a real threat that many people face every day. That’s why we felt it was so important to answer this question sent in from John.
“I just found a text written to me, which was a response to a text I sent. Problem is, I didn’t send the text? I’m 65 years old, and not as spry as I once was, but I do not remember sending the text. My wife is trying to convince me I’m going crazy. She says it’s impossible for someone to send a text (impersonating me) without having possession of my phone. Is that true? Can someone hack your phone and send text??” – John, Fort Myers, FL
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER
What is SMS spoofing?
We’re sorry to hear that you’re going through this, John. It is possible for someone to send a text message impersonating you without having possession of your phone. This is known as SMS spoofing, and it is a technique used by cybercriminals to send fraudulent text messages.
How does SMS spoofing work?
SMS spoofing works by manipulating the sender ID of a text message to make it appear as if it was sent from a different phone number. This can be done using various online services that allow users to send text messages with a fake sender ID. Cybercriminals will change the sender ID to impersonate friends, family, or a legitimate company.
Example of text message screenshot of hacker pretending to be a bank (Kurt “CyberGuy” Knutsson)
It is important to note that SMS spoofing is illegal and can be used for malicious purposes such as phishing scams, identity theft, and fraud. Scammers bank on the combination of familiarity and urgency to get you to interact with their text either by clicking on a link, downloading a file, or responding with personal information.
How to spot and avoid SMS spoofing scams
Here are the top 3 reasons why scammers often send text messages under a fake sender ID with some urgent request:
1. Trick you into clicking on a malicious link that leads you to a malicious website to rob you of your personal or financial information or even unleash malware or viruses to your phone.
Screenshot of text SMS spoof trying to trick you to click a malicious link (Kurt “CyberGuy” Knutsson)
2. Lure you into paying a fake bill under the guise of a reputable or familiar company.
Screenshot of text spoof trying to trick you to pay fake bill (Kurt “CyberGuy” Knutsson)
3. Damages your reputation or relationship with friends, family, and others by sending harmful messages.
Screenshot of text spoof trying to damage your reputation (Kurt “CyberGuy” Knutsson)
iMessage Vulnerabilities
SMS spoof on Apple device from hacker posing as financial institution (Kurt “CyberGuy” Knutsson)
In the past, many Apple devices were considered to be virtually immune to viruses and malware. Unfortunately, due to bugs in iOS, hackers can take over someone’s device just like any other device on the market. While Apple patches these vulnerabilities on a consistent basis, this leaves iPhone users vulnerable to SMS spoofing, too.
A hacker can use “interaction-less” bugs to send a specially crafted SMS message and the iMessage server can send user-specific data, including images or SMS messages, back to them. The user doesn’t even have to open the messages to activate this bug. Additionally, hackers can send malicious codes through texts, embedding them onto the user’s phone. These vulnerabilities are unique to Apple devices.
Aside from the specific vulnerabilities, hackers generally need the user to interact with the text message before the malicious code gets unleashed onto the device.
MORE: CHECK AND DETECT IF SOMEONE YOU KNOW IS SNOOPING ON YOUR IPHONE
7 Actions to take if you suspect SMS spoofing
If you suspect that your phone has been hacked or that someone is impersonating you, it is important to take immediate action. Here are some steps you can take:
1) Have good antivirus software on your phone: Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links that may install malware on your devices, allowing hackers to gain access to your personal information. Find my review of Best Antivirus Protection here.
2) Keep your phone software updated: Both iPhone and Android users should keep their phone’s OS and apps updated regularly as Apple and Google release patches to vulnerabilities as they are discovered. Updating your phones can prevent hackers from exploiting security flaws and sending text messages from your phone without you knowing.
3) Change your passwords: Change the passwords for all your online accounts, including your email, social media, and banking accounts. Do not use easy-to-guess information such as your birthday or address. Use strong, unique passwords that are difficult to guess; preferably ones that are alphanumeric and, if applicable, include special symbols. Be sure to do this on another device in case there is malware on your phone monitoring you. Consider using a password manager to generate and store complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.
4) Enable two-factor authentication: Enabling two-factor authentication on all your online accounts will add an extra layer of security to your accounts and make it more difficult for hackers to gain access.
5) Contact your mobile carrier: Contact your mobile carrier and report the incident. They may be able to help you identify the source of the text message and take appropriate action.
6) File a police report: If you believe that you have been a victim of identity theft or fraud, file a police report with your local law enforcement agency.
Fraud detection text message alert on iPhone (Kurt “CyberGuy” Knutsson)
7) Watch your connections: When possible, do not connect to unprotected or public Wi-Fi hotspots or Bluetooth connections. Turn off the Bluetooth connection when not in use. On most iPhones, you can choose who to receive files or photos via AirDrop (a Bluetooth feature) from by selecting to receive from “no one,” people in your Contacts, or Everyone. We suggest you set it to “no one” and only turn it on when you are with the person you are sending or receiving a file or photo from.
MORE: GUARD YOUR PASSWORDS: CHERRYBLOS; FAKETRADE MALWARE THREATEN ANDROIDS
I’ve been scammed by SMS spoofing. What to do next?
Below are some next steps if you find you or your loved one is a victim of identity theft from an SMS spoofing attack.
1) Change your passwords. If you suspect that your phone has been hacked or that someone is impersonating you, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn’t’ recording you setting up your new password on your hacked device. Use strong and unique passwords that are hard to guess or crack. You can also consider using a password manager to generate and store your passwords securely.
2) Look through bank statements and check account transactions to see where outlier activity started.
3) Use a fraud protection service. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
Some of the best parts of using an identity theft protection service include identity theft insurance to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.
4) Report any breaches to official government agencies like the Federal Communications Commission.
5) You may wish to get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft, and if being a victim of criminal identity theft leaves you unable to secure employment or housing
6) Alert all three major credit bureaus and possibly place a fraud alert on your credit report.
7) Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.
8) Alert your contacts. If hackers have accessed your device through SMS spoofing, they could use it to send spam or phishing messages to your contacts. They could impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.
9) Restore your device to factory settings. If you want to make sure that your device is completely free of any malware or spyware, you can restore it to factory settings. This will erase all your data and settings and reinstall the original version. You should back up your important data BEFORE doing this, and only restore it from a trusted source.
If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.
MORE: HOW TO TELL IF SOMEONE HAS READ YOUR TEXT MESSAGE
Kurt’s key takeaways
It’s possible for someone who doesn’t have physical possession of your phone to spoof your information for SMS spoofing. Though you might not have control over who gets your number, there are steps you can take to protect yourself.
Have you ever received a convincing text spoof message? What were the telltale signs that it was a spoofed message? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Ideas for using those Holiday Gift cards
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
LG announces new UltraGear evo gaming monitors with AI upscaling
LG unveiled a whole new line of gaming monitors ahead of CES on Friday. The UltraGear evo line are all high-end monitors covering a range of technologies, but united by 5K resolution and AI upscaling.
The three flagships under the new branding are the 39GX950B, the 27GM950B, and the 52G930B. The first number in the model name indicates the size. The rest of the letters and numbers, well, I’m sure they mean something to someone.
The 39-inch GX9 is an ultrawide 21:9 5K2K dual-mode OLED screen. It can run at its full resolution at 165Hz, or jump to 330Hz for fast-twitch games at WFHD. The 27-inch GM9 uses “New” MiniLEDs, which promise to deliver brighter images compared to OLED, without the blooming often associated with MiniLEDs. Lastly, the 52-inch G9 is an absolutely massive curved display that delivers a 12:9 panoramic view at 240Hz in its native 5K2K resolution.
The GM9 model is particularly interesting since LG makes the panels for Apple’s Pro Display XDR, and word is that the monitor is finally getting a long-overdue update in the near future.
All three monitors will be on display at CES next month, but there’s no word on pricing or availability just yet.
Technology
Pornhub hit by massive user data leak exposing 200 million records
NEWYou can now listen to Fox News articles!
Pornhub is dealing with fresh fallout after the hacking group ShinyHunters claimed responsibility for a massive user data leak. The group says it stole 94GB of data tied to more than 200 million records and is now attempting to extort the company for a Bitcoin ransom.
According to reporting from BleepingComputer, the hackers say they will publish the data if their demands are not met. Pornhub has acknowledged the situation but maintains its core systems were not breached.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
DATA BREACH EXPOSES 400K BANK CUSTOMERS’ INFO
Pornhub is facing new fallout after hackers claimed to steal millions of user records tied to Premium accounts. The group is threatening to release sensitive activity data unless paid in Bitcoin. (Philip Dulian/picture alliance via Getty Images)
What data ShinyHunters claims to have stolen
ShinyHunters says the exposed data focuses on Pornhub Premium users. While no financial information was included, the dataset still contains highly sensitive activity details.
The group claims the stolen records include:
- Email addresses
- Activity type
- Location
- Video URLs and video names
- Keywords linked to videos
- Timestamps showing when the activity occurred
Activity logs reportedly show whether a user watched or downloaded a video or viewed a channel. Search histories are also included, which raises serious privacy concerns if the data is released publicly.
How Mixpanel is connected to the breach
The alleged breach appears linked to a separate November security incident involving Mixpanel, a data analytics vendor that previously worked with Pornhub. That earlier breach occurred after a smishing attack gave threat actors access to Mixpanel systems. However, Mixpanel says it does not believe Pornhub data came from that incident. The company stated it found no evidence that the data was taken during its November 2025 breach. Pornhub has also clarified that it stopped working with Mixpanel in 2021. That means the stolen data would be several years old. Reuters contacted some Pornhub customers to verify the claims. Those users confirmed the data tied to their accounts was accurate but outdated, which aligns with the Mixpanel timeline.
What Pornhub says was not exposed
Pornhub moved quickly to reassure users following the reports. In a security notice, the company said:
“This was not a breach of Pornhub Premium’s systems. Passwords, payment details and financial information remain secure and were not exposed.”
That distinction reduces the immediate risk of financial fraud. However, exposure of viewing habits and search activity still carries long-term privacy risks. We reached out to Pornhub for a comment, but did not hear back before our deadline.
Why ShinyHunters remains a serious threat
ShinyHunters has been linked to some of the most disruptive data breaches this year. The group relies heavily on social engineering tactics such as phishing and smishing to gain access to corporate systems. Once inside, the group typically steals large datasets and uses extortion threats to pressure companies into paying ransoms. This strategy has affected businesses and users worldwide.
PASSWORD MANAGER FINED AFTER MAJOR DATA BREACH
A hacking group says it obtained years-old Pornhub Premium user data, including viewing activity and search history. Pornhub says its core systems were not breached. (Donato Fasano/Getty Images)
Pornhub warns Premium members about direct contact from hackers
Pornhub has updated its online statement to warn Premium members about possible direct contact from cybercriminals. In cases involving adult platforms, this type of outreach often escalates into sextortion attempts, where criminals threaten to expose private activity unless victims pay.
“We are aware that the individuals responsible for this incident have threatened to contact impacted Pornhub Premium users directly. You may therefore receive emails claiming they have your personal information. As a reminder, we will never ask for your password or payment information by email.”
Pornhub remains one of the world’s most visited adult video platforms. People can view content anonymously or create accounts to upload and interact with videos.
PETCO CONFIRMS MAJOR DATA BREACH INVOLVING CUSTOMER DATA
ShinyHunters claims responsibility for a massive Pornhub data leak involving alleged user activity records. The company says passwords and payment details remain secure. (Morteza Nikoubazl/NurPhoto via Getty Images)
Ways to stay safe after a data breach
Even if the data is several years old, users should take this opportunity to strengthen their digital security.
1) Change your passwords
Start by updating your Pornhub password. Next, change the password for any email or payment account linked to it. Using a password manager makes it easier to create and store strong, unique passwords.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com
2) Stay alert for phishing attempts and install strong antivirus software
Data breaches often lead to follow-up scams. Be cautious of emails, texts or phone calls that reference Pornhub or account issues. Avoid clicking links, downloading attachments or sharing personal information unless you can verify the source. Installing a strong antivirus program adds another layer of defense against malicious links and downloads.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
3) Use a data removal service to limit future exposure
Data removal services work to remove your personal information from data broker websites that collect and sell details such as email addresses, locations and online identifiers. If leaked data from this breach is shared, resold or cross-referenced with broker databases, removing your information can make it much harder for scammers to connect it to you.
This step is especially important after high-profile breaches involving activity data. Shrinking what is publicly available about you reduces the risk of targeted phishing, impersonation and long-term privacy harm.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com/Delete
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com/FreeScan
4) Consider identity theft protection
Identity Theft companies can monitor personal information such as your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or used to open an account. Early warnings can help limit damage if your data surfaces. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com
5) Add extra privacy protection with a VPN
A VPN helps protect your browsing activity by masking your IP address and encrypting your internet traffic. That is especially relevant in breaches like this one, where exposed activity data may include location signals or usage patterns. While a VPN cannot erase past exposure, it reduces how much new information is visible going forward and makes it harder to link future activity back to you. Using a VPN consistently can also limit tracking across sites, which helps lower your overall digital footprint after a breach.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
The Pornhub massive data leak highlights how long stored user information can remain a risk. While passwords and payment details were not exposed, activity data can still be damaging if released. ShinyHunters has shown it is willing to apply pressure through public threats. As a result, you should stay vigilant and proactive about your online security.
Should companies be allowed to store years of user activity data once it is no longer needed? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
The best PS5 games from 2025
But while lists like this will probably disappear as we get deeper into the era of everything being an Xbox, Sony still seems committed to high-quality exclusives. Here are its best of 2025.
Photo by Antonio G. Di Benedetto / The Verge
As software exclusivity goes the way of Sega’s console business, console makers have other ways to attract consumers to their part of the video game ecosystem. For Microsoft, it’s Game Pass; for Sony in 2025, it’s the PlayStation Portal. This year, Sony launched an update for the Portal that enables cloud streaming and making the device a must-have for PlayStation households. For $200, roughly half the price of a PS5, you essentially get a second one, able to play select games without the need to stream them from the console. The list of streamable games isn’t comprehensive, but there are over 2,000 of them, and the ability to play them on the go is a literal game changer.
Get into a discussion with true Final Fantasy sickos about the top 10 games in the franchise, and you better have a lot of time and earplugs on your hands as everyone debates entries two through 10 — because No. 1, invariably, is Final Fantasy Tactics. Having finally played the game for the first time, taking advantage of the remaster Square Enix released this year, I get it. The best video games are often timeless while also able to speak to a specific moment, and Tactics’ story is and does exactly that.
But more than narrative, Tactics’ brilliance is also in its expansive job system that grants players a facsimile of godhood that’s so much fun to wield. The arithmetician class has the ability to cast any learned spell in the game instantly and without requiring mana. To offset the class’s ruinously slow speed, pair it with white mage to create the most diabolical unit in the history of strategy RPGs. Ramza Beoulve is just a guy trying to save the world, and FFT made me believe he can because I made his ragtag band of misfits into walking nuclear weapons.
Sucker Punch’s sequel to Ghost of Tsushima plays things relatively safe. It doesn’t change things up dramatically but instead polishes the experience. Which means the experience isn’t all that different from its predecessor — that means lush landscapes to explore, lots of combat techniques to learn, and, uh, plenty of hot springs to bathe in — but everything feels more finely tuned this time around. That’s especially true of the game’s tale of revenge, which is both more gripping than the original and also gives the open-world experience some much-needed structure.
The original Death Stranding was so weird that half of the fun was just wrapping your head around the experience. I’m not sure I really understood it until I was almost done (if at all). The sequel is still plenty weird, but because it builds off of the previous game, it’s also much easier to understand from the get-go. It’s still a delivery simulator where you trek across a postapocalyptic landscape to get goods and people where they’re needed. But now the setting has shifted to Australia, which means there are new environmental elements to deal with — hello, sandstorms — along with a whole new cast of weirdo characters to meet, played by everyone from Elle Fanning to George Miller.
But don’t worry; the story is still as inscrutable as ever.
Bennett Foddy sure made you feel the “walking” part of this elaborate walking simulator. In Baby Steps, your job is to walk, and you do that by controlling every move involved in taking a step, down to the fine motor details. What results is a hilarious examination of human psychology, emotional maturity, and a newfound appreciation for just how hard it is to ambulate a body with nothing more than DualSense trigger buttons.
When Lumines Arise was first announced, I made the mistake of asking, “Oh, is it a series or something?”, unfamiliar with Lumines’ days as a PSP powerhouse. My elders have never let me live that down, so I thought I’d see for myself what the game is.
Lumines Arise is Evil Dr. Tetris Effect Mean Bean Machine. Mean Bean Machine in that the game is played by globbing together matching blocks in two-by-two configurations. It’s part Tetris Effect because the game has an incredible synth / pop-house soundtrack that’s synced to the action, creating a full-body puzzle-playing experience. And evil in that the game is hard as shit. My skills as a Tetris player, limited though they are, just do not transfer to Lumines Arise. But! There is a flow state I can reach. Throughout playing, the shapes of the blocks will change from blocks, to eggs, to clocks, whatever, and I’ve found some patterns are easier to group than others. It’s interesting and fun to figure out what shapes make the game easier for me and which ones are impossible to configure.
-
Entertainment3 days agoHow the Grinch went from a Yuletide bit player to a Christmas A-lister
-
Connecticut4 days agoSnow Accumulation Estimates Increase For CT: Here Are The County-By-County Projections
-
Entertainment4 days agoPat Finn, comedy actor known for roles in ‘The Middle’ and ‘Seinfeld,’ dies at 60
-
Milwaukee, WI5 days ago16 music and theater performances to see in Milwaukee in January 2026
-
World1 week agoPutin says Russia won’t launch new attacks on other countries ‘if you treat us with respect’
-
Indianapolis, IN1 day agoIndianapolis Colts playoffs: Updated elimination scenario, AFC standings, playoff picture for Week 17
-
Southeast2 days agoTwo attorneys vanish during Florida fishing trip as ‘heartbroken’ wife pleads for help finding them
-
World3 days agoSnoop Dogg, Lainey Wilson, Huntr/x and Andrea Bocelli Deliver Christmas-Themed Halftime Show for Netflix’s NFL Lions-Vikings Telecast