Connect with us

Technology

How to protect yourself from the Venmo, Zelle and Cash App scam that can wipe out your savings in seconds

Published

on

How to protect yourself from the Venmo, Zelle and Cash App scam that can wipe out your savings in seconds

paymen

Imagine walking down the sidewalk and being confronted at gunpoint by a crook.  

Open the payment app on your phone and transfer out your hard-earned cash, or take a bullet in the head. That’s one phone cash ripoff scenario of many playing out in real-life America. 

Other cash app crimes are happening due to the vulnerability of an unlocked iPhone without the new Stolen Device Protection turned on in iOS. These are examples of how mobile payment apps can put your money and your life at risk. 

Do you use mobile payment apps like Venmo, Zelle or Cash App to send and receive money? If so, you’re not alone. These peer-to-peer payment services now handle an estimated $1 trillion in payments. And with that much money involved, there are also now a lot of fraud and scams going on, according to Alvin Bragg, the Manhattan district attorney. He says these apps are exposing many people to scammers and thieves and are costing them a lot of their hard-earned cash.

Advertisement

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

Manhattan District Attorney Alvin Bragg (manhattanda.org)

In response, Bragg has written letters to the companies that own these apps, demanding they improve their security and protect their users from scams and thefts. His specific request is that they impose limits on transactions, require secondary verification of up to a day and better monitor unusual activity. He says he is requesting meetings with the companies to discuss these issues.

Venmo, Cash App and Zelle apps  (Kurt “Cyberguy” Knutsson)

How an unlocked device can lead to financial disaster and personal harm

Bragg’s letters describe how these financial apps enable criminals to access unlocked devices and exploit them for financial gain and identity theft, saying,

Advertisement

“These crimes involve an unauthorized user gaining access to unlocked devices and then draining bank accounts of significant sums of money, making purchases with mobile financial applications, and using financial information from the applications to open new accounts.

“Offenders also take over the phone’s security by changing passwords, recovery accounts, and application settings. The ease with which offenders can collect five- and even six-figure windfalls in a matter of minutes is incentivizing a large number of individuals to commit these crimes, which are creating serious financial, and in some cases physical, harm to our residents.”

MANHATTAN DA ALVIN BRAGG CALLS FOR CASH APPS TO CRACK DOWN ON FRAUDSTERS

What are the mobile payment apps doing to prevent fraud?

The companies that own these apps have responded to Bragg’s comments and said that they are doing their best to provide a safe and reliable service to their customers. We reached out to all three companies. Here are their responses to us.

“PayPal and Venmo take the safety and security of our customers and their information very seriously. In addition to proactively leveraging sophisticated fraud detection tools, manual investigations, and partnering closely with law enforcement agencies to protect our customers against common scams, we have several options in place to enable enhanced layers of security and protection directly within our apps.” — PayPal and Venmo spokesperson

Advertisement

“Cash App continues to be committed to building trust with our customers and investing in areas that help build a safe and secure platform. We work proactively and diligently to safeguard our customer’s money and mitigate against the risk of fraud on our platform through a combination of preventative controls like multi-factor authentication, account transaction limits, fraud detection, and consumer education. We also partner with law enforcement agencies to detect and combat criminal activity.” — Cash App spokesperson

“We are aware of isolated criminal incidents described in the Manhattan District Attorney’s letter. Providing a safe and reliable service to consumers is the top priority of Early Warning Services, LLC, the network operator of Zelle®, and our 2,100 participating banks and credit unions.  As a result of our continued efforts to build on Zelle’s strong foundation of security, less than one tenth of one percent of transactions are reported as fraud or scams, and that percentage keeps getting smaller. Our efforts include implementing industry-leading fraud and scam prevention measures for consumers like in-app safety notifications, and send limits and restrictions.” — Spokesperson for Early Warning Services, LLC, the network operator of Zelle 

What’s the problem with mobile payment apps?

Bragg says that he is seeing a lot of cases where people have lost money or had their personal information stolen by using these apps. He said that this is happening because of the way these apps work on your phone or tablet. Here are three ways that crooks can cheat you or steal from you using these apps.

1) Phishing: This is when someone pretends to be someone else and sends you a message or email asking you to send money or give them your account details. For example, you might get a message from someone who says they are your friend, family member or a charity and they need your help urgently. Or you might get an email from someone who says they are your bank, the IRS or a mobile payment app and they need you to verify your account or update your information.

2) Spoofing: This is when someone creates a fake profile or account that looks like a real one and tries to fool you into sending money or accepting a payment. For example, you might get a payment request from someone who says they are selling something online, but their name, photo, or username is slightly different from the real seller. Or you might get a payment from someone who says they are a buyer, but they are actually using a fake check or a stolen credit card.

Advertisement

3) Device theft: This is when someone takes your phone or tablet and uses your mobile payment apps to take your money or make purchases without your permission. For example, someone might grab your phone while you are using it in public, or break into your car or home and take your device. Or someone might ask to use your phone for a legitimate reason, but then use it to access your mobile payment apps behind your back.

Woman on iPhone. (Kurt “Cyberguy” Knutsson)

MORE: STOLEN DEVICE PROTECTION IN LATEST IOS 17.3 UPDATE PROTECTS YOUR IPHONE EVEN MORE FROM CROOKS — THIS THIS ON ASAP

How can you protect yourself from mobile payment fraud?

Mobile payment apps have some security features to help protect you, but they are not enough, and you should not rely on them alone. You should also do these 10 things.

1) You should always access the payment app from the official app or website, and not from any third-party platforms or services.

Advertisement

2) Look at the security settings that the payment app offers and make sure they’re all set to the highest and most protective settings.

3) You should create a strong, unique, and complex password for each of your mobile payment apps and change it often. Consider using a password manager to generate and store complex passwords.

4) Enable two-factor authentication, which means that you need to enter a code or use your fingerprint or face to unlock your account to prevent unauthorized access. This way, even if someone knows your password, they can’t log in without your device or confirmation.

5) Lock your device and log out of your apps. You should always lock your phone with a password, PIN, pattern, fingerprint or face. Never share your password, PIN or security code with anyone. You should also log out of your mobile payment apps after each use and turn off the auto-login feature. This way, even if someone takes or borrows your device, they can’t access your mobile payment apps without your approval.

Advertisement

6) Verify the identity and legitimacy of the sender or receiver. You should always check the name, photo, username and contact information of the person or organization you are sending money to or receiving money from before accepting or sending any payment requests. You should also confirm the reason and amount of the transaction before you agree to it. If you are not sure or have any doubts, you should contact the person or organization directly through another way, such as a phone call, text message or email, but only if you know for sure that those forms of communication are legitimate. You should never send money or give your account details to anyone you don’t know or trust, or anyone who asks you to do so out of the blue.

7) Link your Venmo, Cash App and PayPal account to a credit card as opposed to a debit card, so you can dispute a charge from scammers more easily. Zelle does not allow credit card payments. However, keep in mind that linking a credit card to your payment app can provide additional protection in the event of fraud, but this can come with extra costs in terms of transaction fees. 

8) Try not to keep a balance in your money-transferring apps. You have a much better chance of being helped by your bank or credit card company when it comes to fraud than you do from a money-transferring app.

9) Never click on links from unknown sources, especially when an email or text appears to have come from the payment App. Protect yourself from accidentally clicking malicious links by running antivirus software on your device. Get my picks for best antivirus software here.

10) Monitor your account activity and report any suspicious or unauthorized transactions. You should set up notifications from your payment app and your bank via text or email, and check your account activity regularly. Look for any signs of fraud, such as payments you didn’t make or receive, or changes to your account settings or information.

Advertisement

MORE: WATCH OUT FOR THIS ZELLE IMPOSTER SCAM ON FACEBOOK MARKETPLACE 

What to do if you believe you have been scammed on Zelle, Cash App or Venmo

1) If you notice any suspicious or unauthorized transactions, report them to the payment app as soon as possible. You can contact their customer support team or use the report feature on the app or website to report any scams, phishing attempts or unauthorized transactions. You can also block or unfriend any users who are involved in scams. 

2) Second, if you used your bank account or credit card to fund the transaction, contact your bank or credit card issuer to report the fraud and dispute the charge.

3) The third step is to change your password immediately to prevent further unauthorized transactions. Consider using a password manager to generate and store complex passwords.

4) Also, if you believe you have been scammed, you can file a complaint with the Federal Trade Commission (FTC) to report the fraudulent activity.

5) If you feel your personal data has been stolen, and you want a service that will walk you through every step of the reporting and recovery process, one of the best things you can do to protect yourself from this type of fraud is to subscribe to an identity theft protection company.  

Advertisement

This service will monitor personal information like your home title, Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. It can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. Get my review of best identity theft protection software here.

6) Lastly, always report the scammer. If you have any information about the scammer, such as their name, phone number or email address, report it to the app company and the authorities.

Kurt’s key takeaways

Mobile payment apps are convenient and useful, but they also come with some risks that you are now aware of. By following these tips, you can protect yourself from mobile payment fraud and enjoy the benefits of these apps safely and securely.

Advertisement

Do you think these payment apps are doing enough to protect you from scammers?  Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most-asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Anthropic upgrades Claude’s memory to attract AI switchers

Published

on

Anthropic upgrades Claude’s memory to attract AI switchers

Anthropic is making it easier to switch to its Claude AI from other chatbots with an update that brings Claude’s memory feature to users on the free plan, along with a new prompt and dedicated tool for importing data from other chatbots. These upgrades could allow users who have been using rivals like OpenAI’s ChatGPT or Google’s Gemini to quickly copy the data their preferred AI has collected on them and bring it over to Anthropic’s chatbot. That way, they don’t have to “start over” teaching Claude the context and history their previous chatbot already knows.

The option to import and export memories from Claude has been available since October, when Anthropic also rolled out the option for users to turn on Claude’s memory. Up until now, the memory feature was only available to users on paid Claude subscriptions, but now all Claude users can turn it on by going into “settings” then “capabilities.” This menu is also where users can find the new memory importing tool, which has users copy a pre-written prompt into their previous AI then copy the output from that prompt back into Claude’s importing tool.

Anthropic is introducing the upgraded memory importing tool as Claude is seeing a rise in popularity, driven by tools like Claude Code and Claude Cowork. Last month, Anthropic launched its new Opus 4.6 and Sonnet 4.6 models, which the company says are better at coding and completing complex tasks like working through a spreadsheet or filling out forms.

Anthropic has also been experiencing a spike in attention recently after pushing back against demands from the Pentagon to loosen the guardrails on its AI models, with the company stating publicly that they drew “red lines” around mass surveillance and fully autonomous lethal weapons.

Continue Reading

Technology

Why the Microsoft 365 Copilot bug matters for data security

Published

on

Why the Microsoft 365 Copilot bug matters for data security

NEWYou can now listen to Fox News articles!

You trust your email security settings for a reason. So when an AI assistant quietly reads and summarizes messages marked confidential, that trust takes a hit.

Microsoft says a bug in Microsoft 365 Copilot allowed its AI chat feature to process sensitive emails since late January.

The issue bypassed Data Loss Prevention policies that organizations rely on to protect private information. Put simply, emails that were supposed to stay locked down were being summarized anyway.

Sign up for my FREE CyberGuy Report 

Advertisement

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter    

Microsoft 365 Copilot’s work chat interface sits at the center of the issue after a bug allowed it to summarize confidential emails. (Microsoft)

Microsoft 365 Copilot bug summarized confidential emails

Microsoft says a coding error impacted Microsoft 365 Copilot Chat, specifically the “work tab” feature. The AI assistant helps business users summarize content, draft responses and analyze information across Word, Excel, PowerPoint, Outlook and OneNote.

Beginning Jan. 21, an internal bug labeled CW1226324 caused Copilot to read and summarize emails stored in Sent Items and Drafts folders.

The real concern runs deeper. Several of those messages carried confidentiality or sensitivity labels.

Advertisement

Companies apply those labels along with DLP policies to block automated systems from accessing restricted content. Despite those safeguards, Copilot still generated summaries. 

We reached out to Microsoft, and a spokesperson provided CyberGuy with the following statement:

“We identified and addressed an issue where Microsoft 365 Copilot Chat could return content from emails labeled confidential authored by a user and stored within their Draft and Sent Items in Outlook desktop. This did not provide anyone access to information they weren’t already authorized to see. While our access controls and data protection policies remained intact, this behavior did not meet our intended Copilot experience, which is designed to exclude protected content from Copilot access. A configuration update has been deployed worldwide for enterprise customers.” 

Why the Microsoft 365 Copilot bug matters for data security

AI tools feel helpful. They save time and reduce busy work. But they also rely on deep access to your data. When safeguards fail, even temporarily, sensitive content can move in ways you did not expect.

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

Advertisement

For businesses, that could mean:

Legal discussions summarized outside intended controls

Financial projections processed despite restrictions

HR communications are exposed to automated analysis

Even if no data leaves the organization, the bypass itself raises concerns about how AI integrates with enterprise security systems.

Advertisement

Business users rely on Copilot to streamline work, but a recent bug raised concerns about how it handles sensitive email content. (Microsoft)

How Microsoft is fixing the Microsoft 365 Copilot bug

Microsoft says it began rolling out a fix in early February. The company continues to monitor deployment and is contacting some affected users to verify the fix works.

However, Microsoft has not provided a final timeline for full remediation. It has also not disclosed how many organizations were affected.

The issue is tagged as an advisory, which usually signals limited scope or impact. Still, many security professionals will want deeper clarity before feeling comfortable.

What this Microsoft 365 Copilot issue reveals about AI security

This incident highlights something many companies are wrestling with right now. AI assistants sit inside productivity platforms. They need access to email, documents and collaboration tools to work well.

Advertisement

TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

At the same time, those platforms contain your most sensitive information. When AI features expand quickly, security policies must evolve just as fast. Otherwise, even a small code mistake can create unexpected exposure.

The Copilot chat feature was designed to boost productivity, yet a code error let it process emails labeled confidential. (Microsoft)

Ways to stay safe after the Microsoft 365 Copilot bug

If your organization uses Microsoft 365 Copilot, here are practical steps to reduce risk:

1) Review Copilot access settings

Work with your IT team to confirm which folders and data sources Copilot can access.

Advertisement

2) Revalidate DLP policies

Test sensitivity labels and DLP (Data Loss Prevention)  rules to ensure they block AI processing as intended.

3) Monitor advisory updates

Stay current on Microsoft service alerts and verify that the fix is fully deployed in your tenant.

4) Limit AI scope during investigations

If you have concerns, consider temporarily restricting Copilot features until verification is complete.

5) Train employees on AI boundaries

Remind staff that AI assistants can process drafts and send messages. Encourage careful handling of sensitive content.

6) Audit Copilot activity logs

Review audit logs to see whether Copilot accessed or summarized labeled emails. This helps determine actual exposure rather than assumed risk.

Advertisement

7) Review sensitivity label configuration

Confirm that confidential labels are configured to block AI processing where required. Misconfigured labels can create gaps even after a bug is fixed.

8) Reassess retention and draft policies

Because the issue involved Sent Items and Drafts, evaluate whether sensitive drafts should be stored long-term or deleted after sending.

9) Limit Copilot to specific user groups

Instead of enabling Copilot organization-wide, consider a phased deployment to departments with lower sensitivity exposure.

10) Conduct a post-incident security review

Use this moment to reassess how AI tools integrate with compliance controls. Treat it as a learning opportunity rather than a one-time glitch.

Pro Tip: This Copilot bug centers on enterprise controls. Even so, AI tools operate on your devices and accounts, so keeping software up to date and using strong antivirus software adds an important layer of defense. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

Advertisement

Considering a more private email provider

Enterprise AI bugs raise a bigger question: how much access should email platforms have to your data in the first place? If you want an added layer of privacy beyond mainstream providers, privacy-focused email services are worth exploring.

Some offer end-to-end encryption, support for PGP encryption and a strict no-ads business model that avoids scanning messages for marketing purposes.

AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

Many also allow you to create disposable email aliases, which can reduce spam and limit exposure if one address is compromised.

While no provider is immune to software bugs, choosing an email service built around privacy rather than data monetization can limit how much of your information is accessible to automated systems in the first place.

Advertisement

For individuals, journalists and small businesses especially, that added control can make a meaningful difference.

For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

Kurt’s key takeaways

AI assistants are becoming part of daily work life. They promise speed, efficiency and smarter workflows. But convenience should never outrun security.

This Copilot bug may have a limited impact. Still, it serves as a reminder that AI tools are only as strong as the guardrails behind them.

When those guardrails slip, even briefly, sensitive information can move in unexpected ways. As AI becomes more embedded in business software, trust will depend on transparency, fast fixes and clear communication.

Advertisement

Here is the real question: If your AI assistant can see everything you write, are you fully confident it respects every boundary you set? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved.  

Advertisement

Related Article

149 million passwords exposed in massive credential leak
Continue Reading

Technology

Samsung’s Digital Home Key lets you use your phone as your key

Published

on

Samsung’s Digital Home Key lets you use your phone as your key

Just days after showing off the Galaxy S26, Samsung is finally rolling out the ability for users to unlock their home with a tap of their phone or by simply approaching their door. The new feature, called Digital Home Key, will live inside Samsung Wallet and is powered by the Aliro smart home standard.

Samsung first teased its Digital Home Key feature in 2024 and said the feature would be available in 2025. That didn’t pan out, as the CSA’s Aliro standard — which will let users unlock smart locks with any phone — only arrived in February of this year. The new standard uses near-field communication (NFC) for its tap-to-unlock technology. It also supports ultra-wideband (UWB), giving users the ability to unlock their door as they approach and without pulling out their phone.

To add a Digital Home Key to your wallet, you’ll need to set up a compatible smart lock through SmartThings using Matter. Only some Galaxy smartphones support both NFC and UWB, including the Galaxy Z Fold 4 and up, as well as the Galaxy S22 Ultra and up. You can view the full list of compatible devices on Samsung’s website.

Continue Reading

Trending