Connect with us

Technology

How to protect your data from IRS scammers this tax season

Published

on

How to protect your data from IRS scammers this tax season

Scammers try to impersonate everything and everyone. They email you pretending to be your boss and ask for money, call you claiming your Microsoft account has been hacked or send phishing links for fake package deliveries. 

However, the most common type of impersonation scam occurs when bad actors pose as government agencies, especially the IRS.

The Treasury Inspector General for Tax Administration (TIGTA) is aware of this and has issued a new warning for 2025 about text messages impersonating the Internal Revenue Service. I will discuss everything you need to know to avoid this new tax scam and protect your personal information.

STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

A person working on their taxes (Kurt “CyberGuy” Knutsson)

Advertisement

The new IRS scam alert

To understand the new IRS scam, let’s first examine what it’s based on. The IRS has been sending out COVID-19 stimulus payments worth up to $1,400 to around 1 million tax filers who missed them. Initially, these payments were self-claimed, but now the IRS is automatically issuing them to ensure eligible taxpayers get what they’re owed.

This provision, known as the Recovery Rebate Credit, allows people to claim missed stimulus payments from 2021. If you were eligible but didn’t receive the funds, you can still claim them by filing a tax return by April 15, 2025. Payments will be deposited directly using the banking information listed on the taxpayer’s 2023 return or sent as a paper check.

However, TIGTA is warning that scammers are targeting taxpayers with fraudulent text messages, as reported by TaxAct. These fake texts claim that recipients will receive an Economic Impact Payment from the IRS and often ask for sensitive personal information, like bank account details or your Social Security number. Scammers use this information to steal your identity or financial data.

The IRS has made it clear that eligible taxpayers who didn’t claim the Recovery Rebate Credit on their 2021 tax return will receive their payments automatically; no action is required.

A woman working on her taxes (Kurt “CyberGuy” Knutsson)

Advertisement

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS

Spotting phishing scams is more important than ever

Most phones and PCs today have enough protections to keep bad actors at bay, so in almost every case, the only way anyone can access your device and data is if you give it to them. Hackers often send phishing links that impersonate a government agency, someone you know or a trusted brand, tricking you into clicking. Once you do, malware is installed on your device to quietly collect useful data and send it to the hackers. That’s why the most important part of staying safe online is knowing how to distinguish between legitimate and scam messages emails or calls. For example, you can easily tell if a communication is from the IRS or a scam by focusing on the following key factors.

  • Type of communication: The IRS will never contact you via text for things like economic impact payments or financial information requests; they will send a letter or notice through mail or fax.
  • Suspicious links: Government websites always end in “.gov,” while scam texts may contain links ending in “.com” or “.net.”
  • Demands or threats: Be cautious of messages that create urgency or threats and look for any oddities or misspellings in the link as well.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Illustration of items used to prepare taxes (Kurt “CyberGuy” Knutsson)

THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

10 ways to stay safe from scammers impersonating government agencies

1. Install strong antivirus software: As scammers increasingly impersonate government agencies like the IRS through phishing links and fake messages, installing strong antivirus software is crucial to protect yourself from these threats. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Antivirus software can detect and block suspicious links, warn you about potentially harmful websites and prevent malware from being installed on your device. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

2. Always verify the authenticity of unsolicited communications: If you receive an unexpected email, text or phone call claiming to be from a government agency, it’s essential to confirm its authenticity. Scammers often create a sense of urgency to trick you into taking immediate action. To verify, always use official contact details from government websites. Avoid clicking any links in the message and reach out to the agency directly to confirm whether the communication is legitimate.

3. Reach out directly if you’re unsure: When you’re unsure about the legitimacy of a message or request, contact the government agency directly using verified contact details. Never respond to the message or click on any links within it. By calling or visiting the agency’s official website, you can ensure you’re communicating with authorized representatives and avoid scammers impersonating government officials.

4. Use strong, unique passwords to protect your accounts: One of the best ways to protect your sensitive information from scammers is by using strong, unique passwords for each of your accounts. Avoid using easily guessable passwords like “password123” or “qwerty.” Instead, create complex passwords that include a mix of uppercase and lowercase letters, numbers and special characters. 

Also, consider using a password manager to keep track of your credentials and ensure you’re using different passwords for each account. Get more details about my best expert-reviewed password managers of 2025 here.

Advertisement

5. Monitor your tax account: Regularly check your IRS account at www.irs.gov to confirm the status of your tax return, verify that no unauthorized tax filings have occurred and update personal and contact information as needed.

6. Report suspicious tax-related activities immediately: If you suspect a scam or fraudulent activity, it’s crucial to report it to the relevant authorities right away. Whether you’ve received a suspicious message or believe your information has been compromised, reporting it helps prevent further harm. The IRS and other agencies have dedicated channels for reporting fraud, so take action as soon as you can to protect yourself and others from these schemes.

7. Invest in personal data removal services: Use a personal data removal service to remove your personal information from data broker and people-finder sites, which scammers often use to find phone numbers and email addresses. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

8. Use direct deposit for refunds: This is the safest way to receive your tax refund, reducing the risk of mail theft, forgery or fraudulent check cashing.

9. Be wary of spoofed websites: Type the address of your actual tax prep site rather than clicking on a link from an email or advertisement. Investigate the domain before entering any confidential information.

Advertisement

10. Use an identity theft protection service: An identity theft protection service provides personal and financial monitoring and will try to help you if your identity is ever compromised. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

THE TAXING TRUTH: A STATE-BY-STATE ANALYSIS OF TAX TIME TRICKERY 

Kurt’s key takeaway

Tax season is here, and with it comes an increase in scams impersonating the IRS and targeting taxpayers. The good news is these scams are often easy to spot. If you receive a text message from the IRS asking you to provide personal information, it’s a red flag; it’s not from them. Be especially cautious of any links included in the message. A legitimate URL will always end in “.gov.” However, scammers may try to trick you by altering the link slightly, so look closely for any misspellings or strange characters. If in doubt, always verify through official channels.

Do you think AI is making it easier for scammers to impersonate legitimate organizations like the IRS? Let us know by writing us aCyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Alert: Malware steals bank cards and passwords from millions of devices.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement

Technology

Malicious Mac extensions steal crypto wallets and passwords

Published

on

Malicious Mac extensions steal crypto wallets and passwords

NEWYou can now listen to Fox News articles!

Mac users often assume they’re safer than everyone else, especially when they stick to official app stores and trusted tools.

That sense of security is exactly what attackers like to exploit. Security researchers have now uncovered a fresh wave of malicious Mac extensions that don’t just spy on you, but can also steal cryptocurrency wallet data, passwords and even Keychain credentials. What makes this campaign especially concerning is where the malware was found, inside legitimate extension marketplaces that many people trust by default.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Once active, GlassWorm targets passwords, crypto wallets, and even your macOS Keychain without obvious warning signs. (Cyberguy.com)

Advertisement

How malicious Mac extensions slipped into trusted stores

Security researchers at Koi Security uncovered a new wave of the GlassWorm malware hiding inside extensions for code editors like Visual Studio Code (via Bleeping Computer). If you’re not familiar with code editors, they’re tools developers use to write and edit code, similar to how you might use Google Docs or Microsoft Word to edit text. These malicious extensions appeared on both the Microsoft Visual Studio Marketplace and OpenVSX, platforms widely used by developers and power users.

FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

At first glance, the extensions looked harmless. They promised popular features like code formatting, themes or productivity tools. Once installed, though, they quietly ran malicious code in the background. Earlier versions of GlassWorm relied on hidden text tricks to stay invisible. The latest wave goes further by encrypting its malicious code and delaying execution, making it harder for automated security checks to catch.

Even though this campaign is described as targeting developers, you don’t need to write code to be at risk. If you use a Mac, install extensions or store passwords or cryptocurrency on your system, this threat still applies to you.

What GlassWorm does once it’s on your Mac

Once active, GlassWorm goes after some of the most sensitive data on your device. It attempts to steal login credentials tied to platforms like GitHub and npm, but it doesn’t stop there. The malware also targets browser-based cryptocurrency wallets and now tries to access your macOS Keychain, where many saved passwords are stored.

Advertisement

Researchers also found that GlassWorm checks whether hardware wallet apps like Ledger Live or Trezor Suite are installed. If they are, the malware attempts to replace them with a compromised version designed to steal crypto. That part of the attack isn’t fully working yet, but the functionality is already in place.

To maintain access, the malware sets itself up to run automatically after a reboot. It can also allow remote access to your system and route internet traffic through your Mac without you realizing it, turning your device into a quiet relay for someone else.

Some of the malicious extensions showed tens of thousands of downloads. Those numbers can be manipulated, but they still create a false sense of trust that makes people more likely to install them.

7 steps you can take to stay safe from malicious Mac extensions

Malicious extensions don’t look dangerous. That’s what makes them effective. These steps can help you reduce the risk, even when threats slip into trusted marketplaces.

1) Only install extensions you actually need

Every extension you install increases risk. If you’re not actively using one, remove it. Be especially cautious of extensions that promise big productivity gains, premium features for free or imitate popular tools with slightly altered names.

Advertisement

2) Verify the publisher before installing anything

Check who made the extension. Established developers usually have a clear website, documentation and update history. New publishers, vague descriptions or cloned names should raise red flags.

These malicious extensions looked like helpful tools but quietly ran hidden code once installed. (Cyberguy.com)

3) Use a password manager

A password manager keeps your logins encrypted and stored safely outside your browser or editor. It also ensures every account has a unique password, so if one set of credentials is stolen, attackers can’t reuse it elsewhere.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

Advertisement

HOW HACKERS ARE BREAKING INTO APPLE DEVICES THROUGH AIRPLAY

4) Run strong antivirus software on your Mac

Modern macOS malware doesn’t always drop obvious files. Antivirus tools today focus on behavior, looking for suspicious background activity, encrypted payloads and persistence mechanisms used by malicious extensions. This adds a critical safety net when something slips through official marketplaces.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Consider a personal data removal service

When your data leaks, it often spreads across data broker sites and breaches databases. Personal data removal services help reduce how much of your information is publicly available, making it harder for attackers to target you with follow-up scams or account takeovers.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Turn on two-factor authentication (2FA)

Enable 2FA wherever possible, especially for email, cloud services, developer platforms and crypto-related accounts. Even if a password is stolen, 2FA can stop attackers from logging in.

7) Keep macOS and your apps fully updated

Security updates close gaps that malware relies on. Turn on automatic updates so you’re protected even if you miss the headlines or forget to check manually.

Advertisement

Mac users often trust official app stores, but that trust is exactly what attackers are counting on. (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaway

GlassWorm shows that malware doesn’t always come from shady downloads or obvious scams. Sometimes it hides inside tools you already trust. Even official extension stores can host malicious software long enough to cause real harm. If you use a Mac and rely on extensions, a quick review of what’s installed could save you from losing passwords, crypto or access to important accounts.

When was the last time you checked the extensions running on your Mac? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved. 

Continue Reading

Technology

BMW says electric M3 will be a ‘new level’ of performance

Published

on

BMW says electric M3 will be a ‘new level’ of performance

BMW teased its forthcoming all-electric M-series performance sedan today, promising that the quad-motor M3 sports car would feature specs that are truly next level when it arrives in 2027.

The M3 will have four electric motors and simulated gear shifting, a feature that is quickly becoming a must-have for electrified sports cars. BMW says the setup unlocks the benefits of both rear and all-wheel drive, with the ability to decouple the front axle.

The electric M3 will also be built on BMW’s Neue Klasse platform that promises more efficient batteries, lightning fast charging, and higher powered computers. The architecture will be 800-volt, the regenerative braking will be highly efficient, and if the camouflaged pictures are any indication, it will be a real looker on the streets.

Speaking of computers, the M3 will have four of them, unified under its oddly named “Heart of Joy” component that aggregates all the traction, stability, and electric motor management functions of the vehicle. That means when software updates are made available, the vehicle’s brain will be able to receive them over-the-air faster than BMW’s current processors.

The M3’s simulated gear shifting will feature a “newly developed soundscape” that “channels pure emotion.” Like other automakers, BMW is loath to alienate its loyal M-series customers by giving them all the torque but none of the gearing feedback. And now a fake “soundscape” will accompany all that shifting. Porsche, Hyundai, and Dodge are also on board the fake EV gear shifting bandwagon.

Advertisement
Continue Reading

Technology

FCC cracks down on robocall reporting violations

Published

on

FCC cracks down on robocall reporting violations

NEWYou can now listen to Fox News articles!

If you are tired of scam calls slipping through the cracks, federal regulators just took a meaningful step. The Federal Communications Commission finalized new penalties aimed at telecom companies that submit false, inaccurate or late information to a key anti-robocall system. The changes go into effect Feb. 5. They strengthen oversight of the Robocall Mitigation Database, which plays a central role in tracking spoofed calls and holding providers accountable.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

What changed and why it matters

Under the new rules, voice service providers must recertify every year that their filings in the Robocall Mitigation Database are accurate and current. The FCC will now back that requirement with real financial consequences.

The FCC is cracking down on robocalls by tightening rules that govern how telecom providers verify and report call traffic. (iStock)

Advertisement

FCC SCRUBS OWN REFERENCE TO ‘INDEPENDENT’ AGENCY FROM WEBSITE AFTER DEM’S TESTY EXCHANGE WITH CHAIRMAN

Here is what the commission approved:

  • $10,000 fines for submitting false or inaccurate information
  • $1,000 fines for each database entry not updated within 10 business days
  • Annual recertification of all provider filings
  • The FCC also adopted a $100 filing fee for initial Robocall Mitigation Database submissions and for required annual recertifications.
  • Two-factor authentication to protect database access
  • A $100 application fee for initial filings and annual recertifications

The FCC also made clear that these violations are considered ongoing until corrected, meaning fines can accrue on a daily basis rather than being treated as one-time penalties.

According to the FCC, many past submissions failed basic standards. Some lacked accurate contact details. Others included robocall mitigation plans that did not describe any real mitigation practices at all.

How the Robocall Mitigation Database works

The Robocall Mitigation Database requires providers to verify and certify the identities of callers that use their networks. Regulators and law enforcement rely on it to trace spoofed calls and illegal robocall campaigns. That task is harder than it sounds. America’s telecom system is vast and fragmented. Calls often pass through multiple networks owned by major carriers like Verizon and AT&T, as well as smaller regional providers and VoIP services. When calls hop between networks, verification can be missed or ignored. For years, the FCC did not closely verify or enforce the accuracy of these filings. That gap raised serious concerns.

Under the updated rules, providers that fail to recertify or correct deficient filings can be referred to enforcement and removed from the database, which can prevent other carriers from carrying their calls at all.

Advertisement

Why inaccurate robocall data hurts consumers

When robocall filings are wrong or outdated, scam calls are more likely to reach your phone. Providers may treat a call as trusted even when it should raise red flags. That gives robocallers more time to operate and makes it harder for regulators to shut them down quickly. The FCC says stronger penalties and tighter oversight are meant to close that gap before consumers pay the price.

New FCC penalties target inaccurate robocall filings that have allowed scam calls to slip through carrier networks.   (Kurt “CyberGuy” Knutsson)

Pushback and pressure on the FCC

When the FCC proposed penalties, it asked whether violations should be treated as minor paperwork mistakes or as serious misrepresentations. Telecom trade groups pushed back. They argued that fines should not apply unless providers first get a chance to fix errors or unless the FCC proves the filings were willfully inaccurate. 

State attorneys general and the robocall monitoring platform ZipDX urged a tougher stance. They warned that false filings undermine every effort to stop illegal robocalls. The FCC ultimately chose a middle path. It rejected treating violations as harmless paperwork errors. At the same time, it stopped short of imposing the maximum penalties allowed by law.

What this means to you

For everyday consumers, this move matters more than it may seem. Accurate robocall reporting makes it easier to trace scam calls, shut down bad actors and prevent spoofed numbers from reaching your phone. Stronger penalties give telecoms a reason to take these filings seriously instead of treating them as routine compliance chores. 

Advertisement

11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

The FCC also set a firm annual deadline. Providers must recertify their robocall mitigation filings each year by March 1, creating a predictable enforcement checkpoint. While this will not end robocalls overnight, it tightens a weak link that scammers have exploited for years.

Simple steps you can take right now to reduce robocalls

Even with tougher FCC enforcement, scam calls will not disappear overnight. Here are a few smart steps you can take today to reduce your risk.

  • Do not answer unknown calls. If it is important, a legitimate caller will leave a voicemail.
  • Never press buttons or say yes to robocall prompts. That confirms your number is active and can trigger more scam calls.
  • Report scam calls to your carrier. Most major carriers let you report robocalls directly through their call log or app.
  • Register your number with the National Do Not Call Registry at donotcall.gov/. It will not stop scammers, but it can reduce legitimate telemarketing calls.
  • Block repeat offenders. If the same number keeps calling, block it so your phone stops ringing altogether.
  • Be cautious with callback numbers. Scammers often spoof local area codes to look familiar.

The FCC says accurate robocall reporting by telecoms helps carriers identify and shut down scam traffic faster, but consumer habits still matter.

Pro tip: remove your personal data at the source

Robocalls do not come out of nowhere. Many start with your personal information being sold or shared by data brokers. These companies collect phone numbers, addresses, emails and even family details from public records, apps, purchases and online activity. Scammers and shady marketers buy that data to build call lists. Removing your data from data broker sites can reduce the number of robocalls you receive over time. You can try to do this manually by finding individual data broker websites and submitting removal requests one by one. The process is time-consuming and often needs to be repeated.

Some people choose to use a data removal service to automate this process and continuously monitor for re-posting. That can help limit how often your phone number circulates among marketers and scammers. Less exposed data means fewer opportunities for robocallers to target you. Cutting off robocalls often starts long before your phone rings.

Advertisement

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com     

By strengthening oversight and accountability, the FCC aims to shut down illegal robocalls before they ever reach your phone. (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

Robocalls thrive when accountability breaks down. By adding meaningful fines, stronger security, annual recertification and filing fees, the FCC is signaling that accuracy is no longer optional. Because penalties can continue to build until problems are fixed, telecoms now face real consequences for ignoring or delaying corrections. This rule forces providers to own their role in stopping illegal calls instead of passing the blame along the network chain. Real progress will depend on enforcement, but this is one of the clearest signs yet that regulators are closing gaps scammers rely on.

Advertisement

Do you think stricter penalties will finally push telecoms to take robocall prevention seriously, or will scammers just find the next loophole? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Advertisement

Trending