It’s Game Awards season, y’all. That special time of the year when we gather together to celebrate video games and the people who make them… by watching expensive commercials briefly punctuated by the odd awards speech or musical performance. For better or worse, The Game Awards is the biggest night on the video game event calendar. But with the way things have been going, lately it’s been more “worse” than it has been “better.”
Technology
How to ensure your passwords don’t die with you
As technology becomes more integrated into our lives, we need to consider how it affects our legacy and our loved ones. There are some uncomfortable but necessary end-of-life conversations we should all have with our loved ones, but passwords usually aren’t one of them.
Yet with so much of our professional, personal and financial life online, it is more important now to include how to handle your digital life in those conversations.
That’s what Ashley is tackling right now as it relates to her husband, and this is the question she has for us.
“My spouse still writes his passwords down so I can access them in case of his death. I’m reading today about password managers and thinking we should do that, but if one of us passes, can the other access it? Thank you. What other ways can we prep for an unexpected death?” — Ashley, Fairhope, AL
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER
A couple discussing digital life (Kurt “CyberGuy” Knutsson)
This is not an easy topic to discuss, but it is a necessary one. Having access to necessary accounts can be one less hurdle to face should you bear the loss of a loved one. While it may not be the most joyful conversation to have, we’re really glad you brought this issue up, Ashley.
Figuring out a strategy for what happens to your passwords can be helpful not just when someone passes, but also if you’re unable to access your accounts because of medical procedures or long-term travel. Below are several strategies to continue to protect your information while sharing it effectively and safely.
MORE: THE VERY WORST AND WEAKEST PASSWORDS OF 2023
How to use password managers to plan for death and emergencies
Password managers are useful tools that generate and store unique passwords for your online accounts, making them more secure than using the same password or writing them down. They also have features that allow you to share your passwords with trusted people in case of an emergency or death.
You can choose who will inherit your password manager account and what passwords they can access. You can also set temporary access for situations like medical procedures or travel, which will expire after a certain time. This way, you can ensure that your digital assets are protected and accessible by the right people.
AI CAN GUESS YOUR PASSWORD WITH UNPRECEDENTED ACCURACY BY ‘LISTENING’ TO KEYSTROKES
Note: Having access to someone’s banking account login and passwords is not the same thing as having the right to access another person’s money. You would need to get in touch with the financial institution and follow the appropriate protocol for handling any transfers and account terminations. Often, one would need to be listed as a joint account holder or beneficiary of the account.
ARE YOUR PASSWORDS SAFE?
When creating passwords, come up with strong and unique ones
It’s always a good reminder to create strong passwords for your accounts and devices and avoid using the same password for multiple online accounts. A password manager will securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess.
Second, it also keeps track of all your passwords in one place and fills passwords in for you when you’re logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts.
What qualities should I look for in a password manager?
When it comes to choosing the best password manager for you, here are some of my top tips.
- Deploys secure
- Works seamlessly across all of your devices
- Creates unique complicated passwords that are different for every account
- Automatically populates login and password fields for apps and sites you revisit
- Has a browser extension for all browsers you use to automatically insert passwords for you
- Allows a fail-safe in case the primary password is ever lost or forgotten
- Checks that your existing passwords remain safe and alerts you if ever compromised
- Uses two-factor authentication security
Get more details about my best expert-reviewed password managers with digital inheritance features of 2024.
Samsung device showing login screen (Kurt “CyberGuy” Knutsson)
Create a digital inheritance plan with password managers and other tools
In addition to utilizing a password manager for everyday life as well as in case of emergency, there is something to be said about creating a concrete digital inheritance plan. If you’re using a password manager, you should discuss and leave clear instructions on how to gain access to the account, as there are many fail-safe measures in place that would make gaining access to the account after passing challenging.
Regardless of whether you are using a third-party service or not, you should leave a specific outline of what to do with your online accounts and digital assets like photos and videos, in the event of your passing.
MORE: HOW TO UNLOCK AN ANDROID AND WINDOWS PC WHEN THE OWNER PASSES AWAY
How to memorialize or delete your social media accounts when you’re gone
In the setting section of most social media accounts, you have the option to select memorialization. If you use Meta to manage your Instagram and Facebook accounts, you can find it under Account Ownership and Control. You can choose a person to manage your memorialized profile or permanently delete your profile after you pass.
Facebook account login (Kurt “CyberGuy” Knutsson)
MORE: HOW TO BE REMEMBERED FOREVER ON FACEBOOK
Kurt’s key takeaways
Password managers can make this lifetime and the life of those you leave behind much easier by providing a way to easily transfer access to important online accounts to your trusted contacts. It’s uncomfortable for most to begin, but surprisingly easy once you’re prepared. Having clear and detailed discussions, as well as leaving written instructions of how you’d like your digital life to be handled in the worst-case scenario, will give you and your family the peace of mind everyone deserves.
How do you plan to handle your digital life after death? Have you considered using a password manager or other tools to share your passwords and online accounts with your loved ones? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Answers to the most asked CyberGuy questions:
Ideas for using those Holiday Gift cards
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
The Game Awards 2025: all the news and announcements
The Game Awards are back once again to showcase a metric ton of commercials, provide the gaming public with their monthly dose of Muppets, and validate gamers’ opinions on which title should be named the Game of the Year. I don’t wanna say it’s a foregone conclusion what this year’s GOTY will be — Silksong may surprise us — but it’s pretty obvious that Clair Obscur: Expedition 33 is the frontrunner and for good reason. It’s netted 12 nominations, the most out of this year’s contenders, including all five craft awards (Direction, Art, Music and Score, Narrative, and Audio Design).
On the announcements side, Crystal Dynamics and Amazon Games are planning something related to the Tomb Raider series. Keighley also probably had plans to reveal big news about Resident Evil: Requiem, but unfortunately it got spoiled early thanks to some leaked key art on the PlayStation Store. Here’s all the news, announcements, and trailers from The Game Awards 2025.
Technology
Malicious browser extensions hit 4.3M users
NEWYou can now listen to Fox News articles!
A long-running malware campaign quietly evolved over several years and turned trusted Chrome and Edge extensions into spyware. A detailed report from Koi Security reveals that the ShadyPanda operation affected 4.3 million users who downloaded extensions later updated with hidden malicious code.
These extensions began as simple wallpaper or productivity tools that looked harmless. Years later, silent updates added surveillance functions that most users could not detect.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
THIS CHROME VPN EXTENSION SECRETLY SPIES ON YOU
Malicious extensions spread through trusted browsers and quietly collected user data for years. (Kurt “CyberGuy” Knutsson)
How the ShadyPanda campaign unfolded
The operation included 20 malicious Chrome extensions and 125 on the Microsoft Edge Add-ons store. Many first appeared in 2018 with no obvious warning signs. Five years later, the extensions began receiving staged updates that changed their behavior.
Koi Security found that these updates rolled out through each browser’s trusted auto-update system. Users did not need to click anything. No phishing. No fake alerts. Just quiet version bumps that slowly turned safe extensions into powerful tracking tools.
NEW EMAIL SCAM USES HIDDEN CHARACTERS TO SLIP PAST FILTERS
WeTab functions as a sophisticated surveillance platform disguised as a productivity tool. (Koi)
What the extensions were doing behind the scenes
Once activated, the extensions injected tracking code into real links to earn revenue from user purchases. They also hijacked searches, redirected queries and logged data for sale and manipulation. ShadyPanda gathered an unusually broad range of personal information, including browsing history, search terms, cookies, keystrokes, fingerprint data, local storage, and even mouse movement coordinates. As the extensions gained credibility in the stores, the attackers pushed a backdoor update that allowed hourly remote code execution. That gave them full browser control, letting them monitor websites visited and exfiltrate persistent identifiers.
Researchers also discovered that the extensions could launch adversary-in-the-middle attacks. This allowed credential theft, session hijacking and code injection on any website. If users opened developer tools, the extensions switched into harmless mode to avoid detection. Google removed the malicious extensions from the Chrome Web Store. We reached out to the company, and a spokesperson confirmed that none of the extensions listed are currently live on the platform.
Meanwhile, a Microsoft spokesperson told CyberGuy, “We have removed all the extensions identified as malicious on the Edge Add-on store. When we become aware of instances that violate our policies, we take appropriate action that includes, but is not limited to, the removal of prohibited content or termination of our publishing agreement.”
Most of you will not need the full technical IDs used in the ShadyPanda campaign. These indicators of compromise are primarily for security researchers and IT teams. Regular users should focus on checking your installed extensions using the steps in the guide below.
You can review the full list of affected Chrome and Edge extensions to see every ID tied to the ShadyPanda campaign by clicking here and scrolling down to the bottom of the page.
How to check whether your browser contains these extension IDs
Here is an easy, step-by-step way for you to verify if any malicious extension IDs are installed.
For Google Chrome
Open Chrome.
Type chrome://extensions into the address bar.
Press Enter.
Look for each extension’s ID.
Click Details under any extension.
Scroll down to the Extension ID section.
Compare the ID with the lists above.
If you find a match, remove the extension immediately.
For Microsoft Edge
Open Edge.
Type edge://extensions into the address bar.
Press Enter.
Click Details under each extension.
Scroll to find the Extension ID.
If an ID appears in the lists, remove the extension and restart the browser.
183 MILLION EMAIL PASSWORDS LEAKED: CHECK YOURS NOW
Simple security steps can block hidden threats and help keep your browsing safer. (Kurt “CyberGuy” Knutsson)
How to protect your browser from malicious extensions
You can take a few quick actions that help lock down your browser and protect your data.
1) Remove suspicious extensions
Before removing anything, check your installed extensions against the IDs listed in the section above. Most of the malicious extensions were wallpaper or productivity tools. Three of the most mentioned are Clean Master, WeTab and Infinity V Plus. If you installed any of these or anything that looks similar, delete them now.
2) Reset your passwords
These extensions have access to sensitive data. Resetting your passwords protects you from possible misuse. A password manager makes the process easier and creates strong passwords for each account.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
3) Use a data removal service to reduce tracking
ShadyPanda collected browsing activity, identifiers and behavioral signals that can be matched with data already held by brokers. A data removal service helps you reclaim your privacy by scanning people-search sites and broker databases to locate your exposed information and remove it. This limits how much of your digital footprint can be linked, sold or used for targeted scams.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
4) Install strong antivirus software
An antivirus may not have caught this specific threat due to the way it operated. Still, it can block other malware, scan for spyware and flag unsafe sites. Many antivirus tools include cloud backup and VPN options to add more protection.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
5) Limit your extensions
Each extension adds risk. Stick with known developers and search for recent reviews. If an extension asks for permissions it should not need, walk away.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
ShadyPanda ran for years without raising alarms and proved how creative attackers can be. A trusted extension can shift into spyware through a silent update, which makes it even more important to stay alert to changes in browser behavior. You protect yourself by installing fewer extensions, checking them from time to time and watching for anything that feels out of place. Small steps help lower your exposure and reduce the chances that hidden code can track what you do online.
Have you ever found an extension on your browser that you didn’t remember installing or one that started acting in strange ways? How did you handle it? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alert, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
The Game Awards are losing their luster
Between host and industry hypeman Geoff Keighley’s two video game vanity projects, The Game Awards is older and ostensibly more mature than Summer Game Fest. Conceived in 2014 as a way to celebrate both the people who make and play games, the show has always been part awards ceremony, part commercial product. That idea has been executed with varying degrees of success. (Remember the Schick Hydrobot?) But for the last few years, it’s felt like the awards part was increasingly getting in the way of the commercial part.
That was felt most acutely during the 2023 Game Awards. Developers accepting statues were often drowned out by music or cut off by teleprompters asking them to “please wrap it up” after their roughly 30 seconds of allotted time. Muppets and Death Stranding director Hideo Kojima, though, had no such time limits enforced on them, with Aftermath calculating that 13 acceptance speeches could have fit inside the five minutes Kojima took to explain his game / not-game OD.
2023 was also the first full year into the now endemic video game labor crisis that saw developers laid off by the tens of thousands while studios of popular games got shut down. That crisis went by that year’s game awards with no acknowledgement, angering developers further. “I’m incredibly disappointed in Geoff Keighley for his silence on the state of the industry this year,” Monomi Park senior environment artist Dillon Sommerville told The Verge in 2023.
How to watch The Game Awards
On Thursday, December 11th at 5PM PT / 8PM ET the TGAs will be streamed on Twitch and YouTube. This year, Keighley has also signed a deal to beam the show live via Prime Video where it’ll be free to watch for Prime subscribers.
Keighley, perhaps responding to the bad optics, acknowledged the continuing labor issue in 2024. The Game Awards also introduced a new category, Game Changer, with its inaugural award going to Amir Satvat, a business development director at Tencent who created a resource to help laid-off developers find jobs.
But in the months since the 2024 awards, Keighley has once again been accused of poor treatment of the people he’s supposed to be celebrating. In 2020, The Game Awards announced a new initiative called The Future Class, designed to celebrate game makers, “who represent the bright, bold and inclusive future of video games.” Inductees are honored during the broadcast and provided with networking opportunities, mentorship programs, and other resources throughout the following year. However, there have been reports alleging that Keighley has ignored Future Class concerns and that resources from the program have been materially lacking.
In 2023, the Future Class wrote an open letter to The Game Awards and Keighley demanding recognition of the war in Gaza. This wasn’t without precedent. In 2022, the awards show acknowledged the war in Ukraine. But Keighley didn’t respond to the letter, nor has he mentioned the Future Class that much either. The Game Awards hasn’t named a Future Class in the last two years and won’t be naming anymore according to Future Class organizer Emily Weir. “At this time, we are not planning a new Future Class for this year and do not have any active programming plans for Future Class,” she said in a statement to Game Developer.

Like a lot of diversity and inclusion-minded programs, Future Class got started in the wake of George Floyd’s murder in 2020. But as diversity, equity, and inclusion (DEI) have become publicly verboten in the rise of the Trump Administration and the online right, many companies, including game publishers, have diminished or jettisoned their DEI programs. While there has been no explicitly stated reason for the seeming shut down of the Future Class, it seems like The Game Awards is just doing what it always does — whatever’s popular at the time.
For as much as The Game Awards has lost the veneer of respectability among some of the people whose work it’s meant to celebrate, rest assured, it ain’t going anywhere. The Game Awards broadcast nets millions of viewers with a record-breaking 154 million livestreams in 2024. That’s a lot of eyeballs that developers pay a lot of money to get in front of. And even for those who don’t buy airtime, having your game featured at all during the presentation can net a big boost in sales. After Balatro was nominated for and won multiple awards last year including best debut indie, its publisher PlayStack shouted out the awards specifically for contributing to a huge increase in players.
More generally, the awards also provide a nice focal point for the disparate online gaming communities to gather around… and bitch about. E3 is long gone, and the other big events (not also run by Keighley) are the publisher-specific direct livestreams. With everything so fractured now, yelling with your friends or colleagues about how Hades was robbed for game of the year (an event I will never get over) is fun and something TGAs are singularly suited to provide. It is not the Oscars of gaming — DICE, the BAFTAs, and the International Game Development Awards (IGDA) pretty well take care of that. But if you want popularity, production values, and Flute Guy, there’s nothing like The Game Awards — even though some of the shine is starting to wear off.
-
Alaska5 days agoHowling Mat-Su winds leave thousands without power
-
Politics1 week agoTrump rips Somali community as federal agents reportedly eye Minnesota enforcement sweep
-
Ohio1 week ago
Who do the Ohio State Buckeyes hire as the next offensive coordinator?
-
Texas6 days agoTexas Tech football vs BYU live updates, start time, TV channel for Big 12 title
-
News1 week agoTrump threatens strikes on any country he claims makes drugs for US
-
World1 week agoHonduras election council member accuses colleague of ‘intimidation’
-
Washington2 days agoLIVE UPDATES: Mudslide, road closures across Western Washington
-
Iowa4 days agoMatt Campbell reportedly bringing longtime Iowa State staffer to Penn State as 1st hire