Technology
How SIM swapping led to a $1.8M cyber fraud case

A San Fernando Valley, California, man has been sentenced to more than five years in federal prison after orchestrating a massive fraud operation that targeted dozens of victims, many of them elderly.
Oren David Sela, 36, stole mail, hijacked phone numbers through SIM swapping, and used victims’ identities to drain bank accounts, stealing over $1.8 million.
Here is how the scheme worked and what you can do to avoid becoming a victim of a similar attack.
Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!
A SIM card. (Kurt “CyberGuy” Knutsson)
What is SIM swapping?
SIM swapping is a form of identity theft where a scammer tricks a mobile carrier into transferring your phone number to a new SIM card they control. Once they hijack your number, they can intercept text messages, including verification codes, and gain access to your bank accounts, emails and more.
There are two common ways scammers pull off SIM swaps:
- Social engineering: They impersonate you and contact your phone carrier’s customer support, claiming their phone was lost or stolen. They then convince the carrier to activate a new SIM card with your number.
- Insider threats: In some cases, scammers bribe or trick employees at mobile carriers into switching the number without following proper verification steps.
Once they control your phone number, they can:
- Receive all your incoming calls and texts
- Reset passwords on your email, bank, and social media accounts
- Bypass security alerts sent to your phone
- Lock you out of your own accounts
SIM swapping turns your phone number into a master key for stealing your identity and money.
HOW TO AVOID MALICIOUS SIM SWAPPING SCAM
Inside the $1.8M fraud scheme
Between November 2021 and October 2023, Sela stole mail from homes in Beverly Hills, California, and nearby neighborhoods. He collected personal information, including:
- Debit and credit card details
- Bank account numbers
- Social Security numbers
- Driver’s licenses
Using this information, Sela carried out SIM swapping attacks to bypass two-factor authentication (2FA) protections. This allowed him to:
- Break into victims’ online banking and financial accounts
- Open new fraudulent accounts in the victims’ names
- Transfer money into intermediary accounts he controlled
- Order new debit and credit cards linked to the victim accounts
Sela made hundreds of fraudulent withdrawals and transfers. He attempted to steal nearly $2.6 million and successfully stole at least $1.8 million.
The lavish lifestyle and his downfall
Sela often spent the stolen money on luxury goods, including a nearly $17,000 watch. In 2022, he was arrested in Beverly Hills and found with nearly $25,000 in cash, various pieces of expensive jewelry, and numerous fraudulent debit and credit cards belonging to elderly victims. Despite this arrest, Sela continued committing fraud. During two subsequent searches of his properties in 2022 and 2023, law enforcement discovered more than $70,000 in cash, stolen mail, fraudulent identification documents, and banking information linked to dozens of victims.
In October 2024, Sela pleaded guilty to bank fraud and aggravated identity theft. On April 22, 2025, he was sentenced to 61 months in federal prison and ordered to pay $1,818,369 in restitution.

Illustration of two-factor authentication. (Kurt “CyberGuy” Knutsson)
FBI WARNS ABOUT NEW EXTORTION SCAM TARGETING SENSITIVE DATA
Why SIM swapping is so dangerous
Two-factor authentication provides an extra layer of security, but it is only effective if the attacker cannot access your phone. When scammers hijack your phone number, they can intercept 2FA codes sent by text and quickly take control of your accounts. Once inside your email or banking app, they can:
- Reset passwords
- Move money
- Lock you out
- Open new lines of credit in your name
They do not even need your password if they can control your number.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Illustration of security on smart device. (Kurt “CyberGuy” Knutsson)
WHAT EXACTLY IS A DATA BREACH AND WHY SHOULD I CARE?
How to protect yourself from SIM swapping and identity theft
Take these important steps to secure your information:
1. Monitor your accounts: Regularly review your bank statements, credit card statements, and financial accounts for unauthorized activity. Report any suspicious transactions immediately.
2. Lock your SIM card: Set a PIN on your SIM card through your mobile carrier. Without it, your number cannot be moved without your permission.
3. Be cautious about sharing personal information: Limit the amount of personal information you share online, especially on social media. Scammers often use small details like birthdays, pet names, or locations to guess security questions or impersonate you.
4. Place a fraud alert: Contact one of the three major credit bureaus (Equifax, Experian, or TransUnion) and request a fraud alert. This makes it harder for identity thieves to open new accounts in your name.
5. Check your credit reports: Obtain free copies of your credit reports and review them carefully for suspicious activity. If you find errors or signs of fraud, report them right away.
6. Freeze your credit: A credit freeze prevents new accounts from being opened in your name without your consent. It is free to set up and does not affect your credit score.
7. Use an authenticator app, not SMS for two-factor authentication: Use apps like Microsoft Authenticator or Google Authenticator instead of relying on text message codes, which can be intercepted if your phone number is stolen.
8. Strengthen your passwords: Create strong, unique passwords for each account. Consider using a password manager to generate and store complex passwords securely. Get more details about my best expert-reviewed Password Managers of 2025 here.
9. Invest in identity theft protection: Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.
10. Be cautious of phishing attempts and use strong antivirus software: Watch out for emails, texts, or calls asking for personal information. Always verify the source before providing sensitive details. Installing antivirus software on all your devices can help protect you by blocking malicious links, detecting phishing attempts, and stopping malware before it can steal your private information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
Kurt’s key takeaways
If scammers can steal your phone number, they can steal your money, your accounts, and even your identity. SIM swapping is a serious threat because it gives criminals a shortcut around your strongest defenses. Take action today to protect your phone, your accounts, and your personal information. A few small steps can make the difference between staying safe and facing a devastating financial loss.
Have you ever been targeted by a SIM swapping scam or identity theft? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
Google is shutting down Android Instant Apps over ‘low’ usage

Google has confirmed that it plans to shut down Android’s Instant Apps later this year, attributing the decision to “low” usage of the functionality.
Instant Apps were introduced in 2017, and allow developers to create mini versions of Android apps that load, well, instantly. Users can try apps and demo games from the click of a link, without having to fully install them. That makes the experience easier for users to navigate and provides developers with more ways to find new audiences.
Android Authority first reported that Google is moving on from the feature, which came to light after developer Leon Omelan spotted a warning about the change in Android Studio:
“Instant Apps support will be removed by Google Play in December 2025. Publishing and all Google Play Instant APIs will no longer work. Tooling support will be removed in Android Studio Otter Feature Drop.”
Google spokesperson Nia Carter confirmed the decision to The Verge, explaining that Instant Apps simply haven’t been popular enough to continue supporting.
“Usage and engagement of Instant Apps have been low, and developers are leveraging other tools for app discovery such as AI-powered app highlights and simultaneous app installs,” Carter says. “This change allows us to invest more in the tools that are working well for developers, and help direct users to full app downloads to foster deeper engagement.”
Technology
11 easy ways to protect your online privacy in 2025

NEWYou can now listen to Fox News articles!
Privacy is getting harder to protect in a world where everything is connected.
Whether you’re chatting with an AI, checking your email or using your smartphone, your personal information is constantly being collected, tracked and sometimes even sold.
But protecting your privacy in 2025 doesn’t have to be overwhelming. With a few practical steps, you can take back control of your data and make your online life safer. This guide walks you through 11 easy ways to get started.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Scrabble pieces form the word “SCAM.” (Kurt “CyberGuy” Knutsson)
1. Don’t overshare: Even with AI tools like ChatGPT
AI chatbots like ChatGPT are useful, but they’re not private journals. The platform owners may have privacy policies and use the latest security measures, but that doesn’t mean you should let your guard down. When using these tools, refrain from sharing any personal information, such as your name, address, birthdate, passwords, financial details or sensitive conversations. Remember that AI systems store and process your inputs, and despite security promises, data breaches can occur.
SCAMMERS CAN EXPLOIT YOUR DATA FROM JUST 1 CHATGPT SEARCH
Tip: Treat all online forms of AI interaction like public forums. Keep your examples generic and use caution with anything that could identify you.
If you’re going to input your personal information while using these AI tools, ensure there is an option to prevent them from sharing it. On ChatGPT, for instance, do the following:
- Go to Settings.
- Click Data controls.
- Tap Improve the model for everyone.

Steps to prevent ChatGPT from sharing your personal information (Kurt “CyberGuy” Knutsson)
- Toggle off Improve the model for everyone.
- Click Done.

Steps to prevent ChatGPT from sharing your personal information (Kurt “CyberGuy” Knutsson)
Why it matters: AI tools may seem personal, but they’re not secure vaults. Guarding what you share helps prevent misuse, identity theft or data leaks from breaches.
CLEAN UP YOUR PHONE: SPEED, STORAGE AND PRIVACY BOOST IN MINUTES
2. Use alias email addresses
Your email is often the key to your online identity and a common target for spam. By creating disposable email aliases that forward messages to your main inbox, you can keep your real address hidden from websites and services. These unique aliases act as shields, so if one starts getting spammed or is involved in a data breach, you can simply deactivate it without affecting your main email account.
My top recommendation to avoid being inundated with spam emails is to use an alias email address. An alias email address is an additional email address that can be used to receive emails in the same mailbox as the primary email address. It acts as a forwarding address, directing emails to the primary email address.
In addition to creating throwaway email accounts for online sign-ups and other circumstances where you would not want to disclose your primary email address, alias email addresses are helpful for handling and organizing incoming communications.
Sometimes, it’s best to create various email aliases so that you don’t have to worry about getting tons of spam mail or having your information taken in a data breach. An alias email address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address. See my review of the best secure and private email services here.
Why it matters: You stay anonymous, avoid data leaks and never have to change your main email address again.
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS
3. Take advantage of Facebook’s privacy checkup
Meta frequently updates its privacy settings, so it’s best to check regularly to see how you can improve your privacy. Use Facebook’s Privacy Checkup tool to review and adjust crucial settings, including post visibility, app permissions, search visibility and friend-request settings. This comprehensive tool helps ensure your profile remains as private as you want it to be. You can find the tool by following these steps:
- Log in to your Facebook app on your phone.
- Then click the menu icon in the bottom right.
- Tap Settings.
- Click Privacy Checkup.
Once you open the Privacy Checkup, you’ll be guided through several key areas to customize your privacy preferences and better control your information.
- Who can see what you share: Adjust who can view your posts, photos and profile details to limit access to only people you trust.
- How people can find you on Facebook: Manage who can send you friend requests, look you up using your email or phone number, and decide whether your profile appears in search engines.
- Your data settings on Facebook: Review which apps and websites have access to your Facebook data and remove any you no longer use or trust.
- How to keep your account secure: Set up two-factor authentication, update your password and monitor login alerts to protect your account from unauthorized access.
- Your ad preferences on Facebook: Control how Facebook uses your activity to show you personalized ads and opt out of categories that feel too intrusive.
Quick tip: Set a reminder to run a privacy checkup every few months, especially after major Facebook updates. This way, you’ll always be in control of your information.
Why it matters: Social media platforms thrive on your personal data. Adjusting your settings regularly puts you back in control of what others and Facebook can see and use.

Facebook’s privacy checkup (Kurt “CyberGuy” Knutsson)
HOW TO PROTECT YOUR ONLINE PRIVACY AND SECURITY ON YOUR NEXT CRUISE VACATION
4. Scrub yourself off the internet automatically
Your name, phone number and home address may already be listed on people-search sites like Spokeo, Whitepages and BeenVerified. These data brokers collect and sell your personal information without you even knowing it. Fortunately, personal data removal services are available to protect your privacy. They automatically send legal removal requests to hundreds of data brokers. They also go above and beyond by continuously monitoring them in case these third parties happen to get your information again.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.
Get a free scan to find out if your personal information is already out on the web.
Why it matters: The less personal information available about you online, the harder it is for scammers and identity thieves to target you and the more peace of mind you’ll have.
10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE’S SECURITY AND PRIVACY
5. Use a privacy-focused messaging app
If you’re still using standard texting apps or platforms like Facebook Messenger, it’s time to upgrade to a more secure option. Apps like Signal and Session offer end-to-end encryption, no ads and no metadata tracking, meaning they can’t see who you’re talking to or what you’re saying. Both apps support disappearing messages, giving you more control over how long your conversations stick around.
Why it matters: Your messages stay private and can’t be accessed by hackers, advertisers or the app developers themselves.
6. Stop Google from tracking your every move
Google collects a massive amount of data from your searches, YouTube views, Gmail activity and location history, all of which fuels targeted advertising. You can stop much of this tracking by turning off Ad Personalization and deleting your activity history. Here’s what to do:
- Go to Google’s My Ad Center.
- Find the Ad Personalization section.
- Toggle the switch to turn off ad personalization. This stops Google from using your activity to tailor ads.
Manage activity history
- In My Ad Center or via your Google Account, go to Data & Privacy.
- Under History Settings, review and pause or delete: Web & App Activity, YouTube History and Location History (if applicable).
Delete existing activity data
- Select Manage all Web & App Activity, Manage all YouTube History, etc.
- Delete past activity by choosing a time range (e.g., “All time”) and confirming deletion for each category.
Opt out of third-party ad personalization
- Scroll to Ad settings and look for third-party ad personalization options.
- Opt out of partner sites’ ad personalization if available.
- If you have multiple Google accounts, repeat these steps for each account.
Why it matters: Cutting down on ad tracking reduces how much of your online behavior is used to build a profile on you, often without your knowledge.
7. Turn off location tracking on your smartphone
Apps don’t need to know your every move. Disabling or limiting location tracking is one of the simplest ways to protect your physical privacy. Here’s what to do:
iPhone:
- Go to Settings.
- Tap Privacy & Security.
- Click Location Services.
- Scroll down and tap the app you want to manage.
- Choose your preferred setting: Never to block location access completely; Ask Next Time Or When I Share to allow location only with your permission; While Using the App to allow location only when the app is open.
For apps like Maps, toggle Precise Location off to prevent pinpoint tracking.
To disable location tracking entirely, toggle Location Services off at the top of the Location Services page (this will stop all apps from using your location).
Android:
Settings may vary depending on your Android phone’s manufacturer.
- Go to Settings.
- Tap Location.
- Tap App permissions or App location permissions.
- You will see a list of apps grouped by their location access: Allowed all the time; Allowed only while in use; Ask every time; Not allowed.
- Tap any app to change its location permission. Choose from: Allow all the time; Allow only while using the app; Ask every time; Don’t allow.
For apps that have location access, you can also turn Precise location on or off if you want to limit accuracy. Repeat for each app you want to manage.
Tip: If you want to stop all apps from accessing your location, you can turn off Location at the top of the Location settings page.
Why it matters: Prevents apps, advertisers and even your OS from building a detailed map of your daily routines.

Steps to turn off location tracking on your smartphone (Kurt “CyberGuy” Knutsson)
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
8. Change the default admin password on your router
Most routers ship with default admin usernames and passwords like “admin” or “1234,” and these are publicly available online. Hackers know this and often scan networks looking for unprotected routers. Here’s what to do:
- Log in to your router’s settings via its IP address (often 192.168.1.1 or 192.168.0.1).
- Change the admin username and password to something strong and unique.
- Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.
Why it matters: Prevents intruders from hijacking your home network and spying on your devices.
9. Enable WPA3 encryption on your Wi-Fi router
WPA3 is the newest wireless encryption protocol and offers much stronger protection than WPA2. If your router supports WPA3, enabling it is a no-brainer. How to check:
- Log into your router settings and look under Wireless Security.
- If WPA3 is available, enable it.
- If not, consider upgrading to a newer, security-focused router. Check out our top routers for best security 2025.
Why it matters: Stronger encryption means hackers can’t easily intercept or crack your Wi-Fi traffic.
10. Set up a guest network for visitors and smart devices
Your friends don’t need access to your entire home network and neither do your smart lights and doorbells. Creating a guest network adds a safety barrier between your personal devices and less trustworthy ones. Steps to take:
- Log into your router settings.
- Create a separate guest network with its own password.
- Connect smart devices, TVs and guests to this network only.
- Keep your main network just for personal computers and phones.
Why it matters: Even if a smart device gets compromised, the attacker won’t have access to your main network or sensitive devices.
11. Use a secure, private browser for sensitive browsing
Not all browsers treat your privacy equally. Switching to a browser designed for privacy like Brave, Firefox or DuckDuckGo’s browser can drastically cut down on the amount of data collected about you while you browse. Also, use incognito/private mode for sensitive searches.
Why it matters: Reduces digital fingerprints and helps stop advertisers and data brokers from building a profile on you based on your browsing behavior.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaways
Staying private online isn’t about being paranoid; it’s about making smart, intentional choices. With the right tools and a few small changes, you can take back control of your data in 2025. Digital privacy is always changing, so it’s a good idea to check your settings and habits every so often. The upside is that for every new privacy challenge, there’s usually a way to push back and keep your information safe.
If you’d like a printable checklist or want this content turned into a shareable infographic, just let me know.
What privacy tools and methods do you use to protect your data online? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Anker is recalling over 1.1 million power banks due to fire and burn risks

The recall covers about 1,158,000 units that were sold online through Amazon, Newegg, and eBay between June 2016 and December 2022. The affected batteries can be identified by the Anker logo engraved on the side with the model number A1263 printed on the bottom edge. However, Anker is only recalling units sold in the US with qualifying serial numbers. To check if yours is included, you’ll need to visit Anker’s website.
Anker is offering affected consumers their choice of either a $30 gift card (the recalled battery cost around $27) that can be used on Anker.com, or a free 10,000mAh Anker power bank as a replacement (model A1388) featuring upgrades including a charge level display and a USB-C charging cable lanyard.
To receive the gift card or the replacement, Anker requires a “photo of the power bank with the submission date and the word ‘recall’ or ‘recalled’ written clearly in permanent marker,” to be submitted, and a “photo showing the model number and serial number (SN) printed on the bottom of the device.” The company is also requesting a purchase receipt, but it’s not mandatory to participate in the recall.
After confirming that your power bank is one of the recalled units, Anker says it should be taken to a facility that can safely dispose of lithium-ion batteries due to the risk of fire. Those facilities can be found through the Environmental Protection Agency’s website or other organizations in the US that specialize in processing e-waste. Do not throw them in the trash, recycling bins, or used battery boxes provided at various retail locations.
The recall is also a reminder that power banks and backup batteries can potentially develop severe issues over time, as these particular units are almost a decade old. If you’ve been regularly using devices featuring lithium-ion batteries for a while, you’ll want to be mindful of issues like overheating or visible swelling and dispose of them properly if you think there’s a potential problem. And while the technology is currently more expensive than lithium-ion batteries, you can also consider upgrading to solid-state batteries which are more powerful, safer, and longer lasting than what we commonly use now to power our devices.
-
West7 days ago
Battle over Space Command HQ location heats up as lawmakers press new Air Force secretary
-
Technology1 week ago
iFixit says the Switch 2 is even harder to repair than the original
-
World1 week ago
EU-Ukraine trade reset: What comes after tariff-free access expires?
-
Technology1 week ago
The single best wireless controller I’ve ever used
-
Politics1 week ago
Hawley clashes with UPenn law professor over judicial injunctions
-
Business1 week ago
How Hard It Is to Make Trade Deals
-
Movie Reviews1 week ago
Predator: Killer of Killers (2025) Movie Review | FlickDirect
-
News1 week ago
Trump’s Higher Steel Tariffs Sour Mood at Deal-Making Table