Connect with us

Technology

How imposters are trying to exploit your grief and wallet in a new funeral scam

Published

on

How imposters are trying to exploit your grief and wallet in a new funeral scam

Join Fox News for access to this content

Plus special access to select articles and other premium content with your account – free of charge.

Please enter a valid email address.

By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. To access the content, check your email and follow the instructions provided.

Having trouble? Click here.

Just when you thought you’d seen the worst of humanity, scammers have managed to reach a new low. 

You thought the Facebook scam about how scammers are commandeering people’s Facebook profiles with fake bereavement posts was terrible? It gets worse.

Advertisement

A woman grieving and hugging a man  (Kurt “CyberGuy” Knutsson )

How the new bereavement scam works

While the Facebook post scam ran with fake bereavement posts to glean information about supportive friends, families and even strangers, this new scam targets actual surviving family members of those recently deceased. The scammers reach out to families pretending to be from funeral homes and demand more payment or threaten the cancellation of the funeral.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER 

It is easy to see how distraught loved ones might fall for such scams as they are already under immense stress from losing a loved one. While the Federal Trade Commission (FTC) has alerted those in the funeral industry, below are some key steps you can take to prevent you or anyone you care about from falling for this horrendous scam.

1. Pause before taking action

As with most scams, these charlatans are banking on the fact that any urgency they present you with will prevent you from thinking first. They are hoping that catching you in a vulnerable state and giving you an ultimatum will result in action taken before the victim or their family can think it through.

Advertisement

This scam is especially insidious because who would think of preying on family members of someone who is recently deceased? Forewarned is forearmed. So, hopefully, knowing this scam has been committed will give you pause if you should run into such a situation.

Man on the phone  (Kurt “CyberGuy” Knutsson)

2. Directly contact the funeral home

Anyone can change the name of their outgoing number (the phone number you are getting a call from) so it may even say in the caller ID that it is from the funeral home you have employed.

If you are uncertain, tell them you will call them right back and hang up the phone. Find the number on the estimate or invoice you received directly from the funeral home and call to verify what is going on. The funeral home’s contact information can be found on the general price list the funeral home provided.

SCAMMERS ARE USING FAKE NEWS, MALICIOUS LINKS TO TARGET YOU IN AN EMOTIONAL FACEBOOK PHISHING TRAP

Advertisement

3. Type of payment red flag

Scammers don’t make the urgent payment needed easy to give. They have a tendency to request odd things like a wire transfer, gift cards, cryptocurrency or even a check payback, where they send you a check claiming there was a clerical or mechanical error with their bank, have you deposit the check then have you send it back.

This is all to stop the money from being traced back to them or prevent you from recovering your money. The funeral home should have gone over the types of payments accepted when the general price list was provided. If there is a strong deviation from the most common forms of payment, hang up.

A person with a bitcoin  (Kurt “CyberGuy” Knutsson )

MORE: HOW TO STOP PHONE NUMBER SPOOFING AND PROTECT YOURSELF FROM SCAMMER 

4. No surprises with funerals

While life is full of surprises, funeral homes should not be. They are regulated by the FTC to provide explicit pricing and information to consumers. A full explanation of the FTC’s oversight in this arena can be found under the “funeral rule.”

Advertisement

As mentioned in No. 2 of this list, each funeral provider is required to provide a general price list, which should disclose fees for any services involved in a funeral and pricing for most aspects of the funeral. If a scammer calls claiming new fees for services or items, remember that all those factors would have been provided to you with the general price list and agreed upon when hiring the funeral home.

Friends and family members at a funeral  (Kurt “CyberGuy” Knutsson)

MORE: HOW TO PROTECT YOURSELF FROM THE VENMO, ZELLE AND CASH APP SCAM THAT CAN WIPE OUT YOUR SAVINGS IN SECONDS

5. Report scammer to the FTC

While it may seem worthwhile to give the scammer a tongue-lashing, it is not worth your time, energy and further violation of privacy. You do not know what information these scammers are gathering during the conversation, and it is best to hang up as soon as possible and report it to the FTC here.

6. Use an identity theft protection service

Consider using an identity theft protection service to shield yourself from potential scams, especially those related to funeral fraud. This is more for you than the deceased’s personal and financial information.

Advertisement

Identity theft companies can monitor personal information like your Social Security Number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

MORE: THIS FACEBOOK MESSENGER PHISHING SCAM IS STEALING MILLIONS OF PASSWORDS

Navigating the aftermath: Protecting your loved one’s legacy

Consider these essential precautions to safeguard your family’s privacy and financial well-being from scammers after a loved one has died.

Craft obituaries mindfully: When writing an obituary, omit sensitive details that could be exploited for identity theft. Avoid including the deceased’s date and place of birth, middle name, maiden name, mother’s maiden name and home address. Additionally, refrain from mentioning the date and time of the funeral to prevent potential burglaries during the service.

Promptly report to Social Security: If a loved one has died, immediately notify the Social Security Administration by calling 800-772-1213. This step ensures benefits are appropriately handled.

Advertisement

Inform the IRS: Send a copy of the death certificate to the IRS. This allows officials to flag the deceased’s tax account, preventing any fraudulent activity.

Notify financial institutions: Reach out to banks and other financial institutions where the late loved one had accounts. If you decide to close these accounts, request that they be marked as “Closed: Account holder is deceased.”

Alert credit bureaus: Contact the major credit bureaus — Equifax, Experian and TransUnion — to have them place a death notice in the deceased’s credit file. This step helps prevent unauthorized credit applications.

Monitor credit reports: Obtain a copy of the deceased’s credit report shortly after death and again a few months later. Regular checks can help detect any fraudulent activity.

Advertisement

Dealing with debts: Don’t let debt collectors intimidate you into paying financial obligations for a late spouse, parent or sibling. Generally, the estate is responsible for debts, not the survivors. However, there are exceptions for cosigned loans and jointly held financial accounts. For specific guidance, consult the U.S. Consumer Financial Protection Bureau.

Exercise caution with contacts: Be cautious if you receive communication from “long-lost” relatives or friends of the deceased, especially on social media. Verify their identity by asking family and old friends if they recognize the person.

Kurt’s key takeaways

Scammers have a knack for finding new ways to prey on the vulnerable. While fending off scammers is the last thing on one’s mind while grieving the loss of a loved one, it is important to stay informed and empowered so that your time and energy are spent on what really matters — remembering our lost loved ones.

What do you think should be done to stop these heartless scammers from exploiting people’s grief? Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com.  All rights reserved.

Advertisement

Technology

China’s ultrasound brain tech race heats up

Published

on

China’s ultrasound brain tech race heats up

NEWYou can now listen to Fox News articles!

When you hear “brain-computer interface,” you probably picture surgery, wires and a chip in your head. Now picture something quieter. No implant. No incision. Just sound waves directed at the brain.

That is the approach behind a new wave of ultrasound brain-computer interface companies in China. One of the newest is Gestala, founded in Chengdu with offices in Shanghai and Hong Kong. The company says it is developing technology that can stimulate and eventually study brain activity using focused ultrasound.

Yes, the same basic technology is used in medical imaging. But this time, it targets neural circuits.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Brain imaging highlights the regions researchers study as companies explore noninvasive ultrasound brain-computer interface technology. (Kurt “CyberGuy” Knutsson)

What is an ultrasound brain computer interface?

Most brain-computer interface systems rely on electrodes that detect electrical signals from neurons. Neuralink is the most visible example. It places tiny threads inside the brain to record activity. Ultrasound works differently.

Instead of measuring electrical signals directly, it uses high-frequency sound waves. Depending on intensity and focus, those waves can:

  • Create images of internal tissue
  • Destroy abnormal tissue such as tumors
  • Modulate neural activity without open surgery.

Focused ultrasound treatments are already approved for Parkinson’s disease, uterine fibroids and certain tumors. That clinical history gives companies like Gestala a foundation to build on. However, studying or interpreting brain signals with ultrasound is far more complex than delivering targeted stimulation.

WHAT TRUMP’S ‘RATEPAYER PROTECTION PLEDGE’ MEANS FOR YOU

Unlike implant-based systems such as Neuralink, ultrasound brain computer interface research focuses on stimulating the brain without surgery. (Neuralink)

Advertisement

 

How Gestala plans to treat chronic pain with focused ultrasound

Gestala’s first product is focused on chronic pain. The company plans to target the anterior cingulate cortex, a brain region linked to the emotional experience of pain. Early pilot studies suggest that stimulating this area can reduce pain intensity for up to a week in some patients. The first-generation device will be a stationary system used in clinics. Patients would visit a hospital for treatment sessions. Later, the company plans to develop a wearable helmet designed for supervised use at home. Over time, Gestala says it wants to expand into depression, other mental health conditions, stroke rehabilitation, Alzheimer’s disease and sleep disorders. That is an ambitious roadmap. Each condition involves different brain networks and clinical hurdles.

Can ultrasound read brain activity without implants?

Like other brain tech startups, Gestala is also exploring whether ultrasound could help interpret brain activity. The long-term concept is straightforward in theory. A device could detect patterns linked to chronic pain or depression, then deliver stimulation to specific regions in response.

Unlike traditional brain implants, which capture electrical signals from limited areas, an ultrasound-based system may have the potential to access broader regions of the brain. That possibility is one reason researchers are paying attention. Still, translating that concept into reliable data is a major engineering challenge.

The global race to build noninvasive brain interfaces

China is not alone in exploring ultrasound brain-computer interface systems. Earlier this month, OpenAI announced a significant investment in Merge Labs, a startup cofounded by Sam Altman along with researchers linked to Forest Neurotech.

Advertisement

Public materials from Merge Labs mention restoring lost abilities, supporting healthier brain states and deepening human connection with advanced AI. That language signals long-term ambitions. Yet experts caution that real-world applications are still years away.

GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK

Researchers use MRI guidance to precisely target the anterior cingulate cortex with focused ultrasound during chronic pain studies. (Gestala)

The technical limits of ultrasound brain interfaces

Ultrasound faces technical limits. First, the skull weakens and distorts sound waves. That makes it harder to obtain precise signals. In research settings, detailed readouts of neural activity have required special implants that allow ultrasound to pass more clearly than bone.

Second, ultrasound measures changes in blood flow. Blood flow shifts more slowly than electrical firing in neurons. That delay may limit applications that require fast, detailed signal decoding, such as real-time speech translation. In short, stimulation is one challenge. Accurate readout is another level entirely.

Advertisement

What this means to you

Right now, this technology is experimental. You are not about to buy a brain helmet at your local electronics store. Still, the direction matters. If noninvasive ultrasound devices can reduce chronic pain or support mental health treatment, more patients may consider therapy without facing brain surgery.

At the same time, devices that analyze brain states introduce new privacy questions. Brain-related data is deeply personal. Regulators, hospitals and companies will need clear rules about how that data is stored, shared and protected. Finally, the link between AI companies and brain interface startups shows how closely digital intelligence and neuroscience are becoming intertwined. That connection could reshape medicine, wellness, and even how we interact with technology.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Kurt’s key takeaways

Brain-computer interfaces used to feel far off and experimental. Now they are a serious focus of global research and investment. China’s push to develop an ultrasound-based brain-computer interface adds momentum to a field already shaped by companies like Neuralink and new ventures backed by OpenAI. Progress is steady but measured. The potential is significant. The technical hurdles are real. What happens next will depend on whether researchers can turn promising lab results into safe, reliable treatments people can actually use.

If sound waves could one day interpret your mental state, who should decide how that information is used? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com.  All rights reserved.  

Advertisement

Related Article

New York halts robotaxi expansion plan
Continue Reading

Technology

This Windows gaming handheld has a screen that folds in half

Published

on

This Windows gaming handheld has a screen that folds in half

Lenovo put a foldable display on a gaming handheld. The Legion Go Fold Concept is a Windows-based handheld with a flexible POLED display, detachable Joy-Con-like controllers, and a folio case to turn the whole thing into a mini laptop.

You can use it as a standard Steam Deck-esque handheld with the display folded down to 7.7 inches and controllers attached at its sides, or you can unfold it for a bigger experience. When unfolded, the controllers can be repositioned to all four sides, allowing you to play with the screen in vertical or horizontal orientations.

In vertical splitscreen mode, you can put your game on one half of the screen and a second window (like your chat or game guide) on the other half. Horizontal fullscreen mode gives your game the full 11.6 inches of real estate in a 16:10 aspect ratio. To go into laptop mode, you remove the controllers and mount the handheld into a folio case with a stand, built-in keyboard, and trackpad. The controllers can be put into a separate grip mount to unify them as one gamepad.

There are a lot of ways you can use this folding handheld, including turning one of its controllers into a vertical mouse like on other Legion Go handhelds, but there’s one thing it doesn’t do: fold down to close and protect its screen. The Go Fold only folds outwards, so don’t expect a Nintendo DS or GameBoy Advance-like clamshell that closes for portability. Instead, it’s all about getting bigger than your average gaming handheld and offering more. (Though we’ve tried bigger before.)

The Legion Go Fold has some formidable specs: an Intel Core Ultra 7 258V Lunar Lake processor, 32GB of RAM, 1TB of storage, and a 48Whr battery. The plastic-covered OLED has a resolution of 2435 x 1712 and 165Hz refresh rate. And there’s even a second, circular toushscreen on the right controller, under the face buttons. It doubles as a touchpad and can be a support display, allowing you to swipe between extracted UI elements from a game (which I wouldn’t expect to be widely supported), a clock, system monitoring, or an animated GIF (just for fun).

Advertisement

During my brief in-person demo I didn’t get to play any graphically-intense games — just Balatro, which can practically play on a potato. The screen looked plenty sharp, but like any foldable there’s a crease down the middle; it’s very visible, but you learn to look past it and ignore it after just a bit. The build and feel of the whole thing felt a little fragile, and detaching and reattaching the controllers was definitely janky. Build quality will hopefully be improved if this device ever actually makes it to market.

The laptop mode was a pleasant surprise for me though. I did not expect a gaming handheld to double as a conventional computer you could get work done on. The Legion Go Fold’s case took quite a bit of fumbling before I set it up correctly, but it shouldn’t take too long to get used to if you actually lived with it.

Then again, I don’t know if anyone is going to be able to live with this thing — ever. I’d love for the Legion Go Fold to go from concept to real product like other out-there Lenovo ideas, but I shudder to think what it might cost. The Legion Go 2 is already priced well over $1,000. And with the ongoing RAMageddon crisis we’re living through, there’s no telling how much more expensive an actual Legion Go Fold would be if it came out in a year or more.

But even if it’s not the kind of foldable I expected, and even though it may never come out, it’s certainly cool. Now somebody please make a folding PC handheld that goes from kinda-big to really small. I think that’d be the one for me.

Photography by Antonio G. Di Benedetto / The Verge

Advertisement
Continue Reading

Technology

Iran networks suffer losses amid airstrikes, showing digital evolution of conflicts

Published

on

Iran networks suffer losses amid airstrikes, showing digital evolution of conflicts

NEWYou can now listen to Fox News articles!

When missiles fly, we expect explosions. We expect smoke, sirens and satellite images. What we do not expect is silence. 

On February 28, 2026, as fighter jets and cruise missiles struck Iranian Revolutionary Guard command centers during Operation Roar of the Lion, a parallel assault reportedly unfolded in cyberspace. 

Official news sites and key media platforms went offline, government digital services and local apps failed across major cities, and security communications systems reportedly stopped functioning, plunging Iran into a near-total digital blackout.

According to NetBlocks, a global internet monitoring organization that tracks connectivity disruptions, nationwide internet traffic in Iran plunged to just 4 percent of normal levels. 

Advertisement

That level of collapse suggests either a deliberate state-ordered shutdown or a large-scale cyberattack designed to paralyze critical infrastructure. Western intelligence sources later indicated the digital offensive aimed to disrupt IRGC command and control systems and limit coordination of counterattacks. 

For the United States and its allies, the episode offers a stark reminder that modern conflict now blends airstrikes with digital warfare in ways that can ripple far beyond the battlefield.

In a matter of hours, modern conflict looked less like tanks and more like a blinking cursor.

Sign up for my FREE CyberGuy Report 

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter    

Advertisement

Iran’s national symbols stand in contrast to reports of a sweeping digital blackout that reportedly disrupted communications and critical systems across the country. (Kurt “CyberGuy” Knutsson)

Iran internet shutdown: A country offline in real time

Reports described widespread outages across Iran. Official news sites stopped functioning. IRNA, Iran’s state-run news agency, went offline. 

Tasnim, a semi-official news outlet closely aligned with the Islamic Revolutionary Guard Corps, reportedly displayed subversive messages targeting Supreme Leader Ali Khamenei. 

THINK YOUR NEW YEAR’S PRIVACY RESET WORKED? THINK AGAIN

The IRGC, Iran’s powerful military and intelligence force, plays a central role in national security and regional operations. At the same time, local apps and government digital services failed in cities like Tehran, Isfahan and Shiraz.

Advertisement

This was not one website defaced for headlines. It appeared systemic. Electronic warfare reportedly disrupted navigation and communications systems. 

Distributed denial of service attacks, often called DDoS attacks, flooded networks with traffic to overwhelm and disable them. 

Deep intrusions targeted energy and aviation systems. Even Iran’s isolated national internet struggled under pressure. 

CHINA VS SPACEX IN RACE FOR SPACE AI DATA CENTERS

For a regime that tightly controls information, losing digital command creates both operational and political risk.

Advertisement

Why cyber warfare matters in the Iran conflict

Cyber operations offer something missiles cannot. They disrupt without always killing. They send a signal without immediately triggering full-scale war. That matters in a region where escalation can spiral fast. 

History shows Iran understands this logic. Between 2012 and 2014, Iranian actors targeted U.S. financial institutions in Operation Ababil. Saudi Aramco also suffered a major cyberattack. 

ARTIFICIAL INTELLIGENCE HELPS FUEL NEW ENERGY SOURCES

After Israeli strikes in 2025, cyberattacks targeting Israel surged dramatically within days.

Cyber retaliation lets leaders respond while limiting direct military confrontation. It buys leverage in negotiations. It creates pressure without necessarily crossing a red line.

Advertisement

But there is a catch. Every cyber strike risks miscalculation. And digital damage can spill into the real world fast if critical infrastructure is hit.

As military strikes targeted IRGC command centers, internet traffic inside Iran reportedly plunged to just 4 percent of normal levels.  (Kurt “CyberGuy” Knutsson)

If the blackout and strikes mark a turning point, Tehran has options. None are simple.

1) Cyberattacks against U.S. or allied infrastructure

Cyber retaliation remains one of Iran’s most flexible tools. It can range from disruptive attacks and influence campaigns to more targeted intrusions that pressure critical services. Recent expert commentary warns that U.S. cyber defenses and the private sector could face sustained testing.

2) Targeting U.S. drones and unmanned systems

Iran has used drones and electronic interference as signals before. Analysts continue to flag jamming, spoofing and harassment of unmanned systems as a way to raise costs without immediately striking large numbers of personnel.

Advertisement

3) Maritime attacks in the Strait of Hormuz

This risk is rising fast. An EU naval mission official reportedly said IRGC radio transmissions warned ships that passage through Hormuz was “not allowed”. Greece has also urged ships to avoid high-risk routes and warned about electronic interference that can disrupt navigation. Insurers are already repricing the danger, with reports of war-risk policies being canceled or sharply increased.

4) Support for allied or informal armed groups

Iran has long worked with allied forces and militias in the region, and some of those groups could step up attacks on U.S. interests or allied partners in retaliation, widening the clash without direct state-to-state engagement.

5) Limited ballistic missile strikes

Missile strikes remain a high-impact option, but they raise the odds of rapid escalation. Recent expert analysis continues to frame them as a tool Iran may use for signaling, especially if leadership feels cornered.

Tehran’s skyline, including the Azadi Tower, became the backdrop to a crisis shaped as much by cyber disruption as by missiles in the sky.  (Kurt “CyberGuy” Knutsson)

The escalation risk between the U.S. and Iran

Here is the uncomfortable truth. Neither Washington nor Tehran likely wants a full-scale regional war. In moments like this, military strikes rarely stand alone. 

Advertisement

They often move alongside diplomacy. Leaders send signals. They apply pressure. At the same time, they try to leave room for talks.

But escalation has momentum. Each missile changes the equation. Each casualty raises the stakes. The more damage done, the harder it becomes to step back. 

5 SIMPLE TECH TIPS TO IMPROVE DIGITAL PRIVACY

Fear plays a role. So does pride. Domestic audiences demand strength. Leaders feel pressure to respond in kind. That is how limited strikes can spiral into something much larger.

What the Iran cyberattack blackout means for global cybersecurity

This episode highlights something bigger than regional tension. Nation-states now pair kinetic strikes with digital offensives. 

Advertisement

Cyberattacks can blind communications, freeze infrastructure and disrupt financial systems before the world even processes the first explosion.

TRUMP TELLS IRANIANS THE ‘HOUR OF YOUR FREEDOM IS AT HAND’ AS US-ISRAEL LAUNCH STRIKES AGAINST IRAN

For businesses and individuals, that reality matters. Modern conflict no longer stays confined to battlefields. 

Supply chains, energy grids and online platforms can feel the ripple effects. The blackout in Iran serves as a reminder that digital resilience is now a national security issue. 

How to stay safe during rising cyber tensions

When a country’s internet can plunge to just 4 percent of normal traffic in hours, it is a reminder that cyber conflict can escalate quickly. 

Advertisement

Even if the disruption happens overseas, global networks are interconnected. Financial systems, supply chains and online platforms can feel the ripple effects.

You cannot control geopolitics. You can control your digital hygiene. Here are practical steps to reduce your personal risk during periods of heightened cyber activity:

Install strong antivirus software to guard against state-linked phishing and malware campaigns that often spike during geopolitical conflicts. 

Nation-state actors frequently exploit breaking news and global instability to spread malicious links and ransomware. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

Keep devices updated so security patches close vulnerabilities that attackers often exploit during global cyber spikes.

Advertisement

WORLD LEADERS SPLIT OVER MILITARY ACTION AS US-ISRAEL STRIKE IRAN IN COORDINATED OPERATION

Use strong, unique passwords stored in a reputable password manager to protect your accounts if cyber retaliation campaigns expand beyond government targets. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

Enable two-factor authentication (2FA) on financial, email and social accounts to safeguard access in case stolen credentials circulate during heightened cyber conflict.

Be cautious with urgent headlines or alerts about international conflict, since attackers frequently mimic breaking news.

Monitor financial accounts for unusual activity in case broader disruptions spill into banking systems.

Advertisement

When tensions rise, phishing campaigns often rise with them. Threat actors exploit fear and confusion. Staying disciplined with basic security habits makes you a harder target if malicious traffic increases.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com        

Kurt’s key takeaways

The reported cyber blackout inside Iran may signal a new chapter in modern conflict. Jets and missiles still matter. But so do servers, satellites and code. Leaders may try to contain the damage while showing strength. 

Still, history shows how quickly careful plans can unravel once pressure builds. War today runs on electricity and bandwidth as much as fuel and ammunition. 

Advertisement

When networks go dark, the impact does not stay on a battlefield. It spills into banking systems, airports, hospitals and the phones in our pockets. That is what makes this moment different.

If an entire nation’s digital systems can be disrupted in hours, how prepared is your community if something similar ever hits closer to home?  Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved. 

Advertisement

Related Article

149 million passwords exposed in massive credential leak
Continue Reading

Trending