Technology
How to spot and stop AI phishing scams
Cyber expert shares tips to avoid AI phishing scams
Kurt ‘The CyberGuy’ Knutsson shares practical ways to avoid falling victim to AI-generated phishing scams and discusses a report that North Korean agents are posing as I.T. workers to funnel money into the country’s nuclear program.
NEWYou can now listen to Fox News articles!
Artificial intelligence can do a lot for us. Need to draft an email? AI has you covered. Looking for a better job? AI can help with that, too. It can even boost our health and fitness. Some tools, like AI-powered exoskeletons, can lighten heavy loads and improve performance.
But it’s not all sunshine and progress. Hackers are also turning to AI, and they’re using it to make phishing scams smarter and harder to spot. These scams are designed to trick people into handing over personal details or money. One woman recently lost $850,000 after a scammer, posing as Brad Pitt with the help of AI, convinced her to send money. Scary, right?
The good news is that you can learn to recognize the warning signs. Before we dive into how to protect yourself, let’s break down what AI phishing scams really are.
HOW AI BROWSERS OPEN THE DOOR TO NEW SCAMS
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.
A single click on a fake link could expose your personal information. (Kurt “CyberGuy” Knutsson)
What are AI phishing scams?
AI phishing scams are when hackers use AI to make their scams more convincing. AI helps them create super-realistic emails, messages, voices and even videos. This makes it harder for people to tell what’s real and what’s fake. Old-school phishing emails were easy to spot because of typos and bad grammar. However, thanks to AI tools like ChatGPT, hackers can now create flawless, professional-sounding emails that are much harder to detect. AI-generated phishing emails aren’t the only threat. Hackers are also using AI to pull off scams like:
- Voice clone scams: They use AI to copy the voice of someone you know, like a friend or family member, to trick you.
- Deepfake video scams: They create super-realistic videos of someone you trust, like a loved one or a celebrity, to manipulate you.
Here’s how you can spot these AI-driven scams before they fool you.
1) Spot common phishing email red flags
Though hackers can use AI tools to write grammatically perfect email copy, AI phishing emails still have some classical red flags. Here are some telltale signs that it is an AI-driven phishing email:
- Suspicious sender’s address that doesn’t match the company’s domain.
- Generic greetings like “Dear Customer” instead of your name.
- Urgent requests pressuring you to act immediately.
- Unsolicited attachments and links requiring you to take action
The biggest red flag is the sender’s email address. There is often a slight change in the spelling of the email address, or it is an entirely different domain name. For example, a hacker might use an email like xyz@PayPall.com or a personal address from Gmail.com, such as the email below, or Outlook.com while pretending to be from PayPal.
Hackers are using AI to create scams that look frighteningly real. (Kurt “CyberGuy” Knutsson)
2) Analyze the language for AI-generated patterns
It used to be easier to spot phishing emails by noticing silly typos. Thanks to AI, hackers can now craft flawless emails. But you can still sense a phishing email if you analyze the language of the email body copy carefully. The most prominent sign of AI-generated email copy is that it looks highly formal with a dash of failed attempts to be personal. You might not notice it at first, but looking at it closely is likely to give a red flag. The language of such emails is often robotic.
3) Watch for AI voice clone scam warning signs
With AI, it is possible to clone voices. So, there is no surprise that there is a steep rise in voice phishing, which is also known as vishing. Recently, a father lost $4 billion in Bitcoin to vishing. Though AI voice cloning has improved, it’s still flawed. You can spot inconsistencies by verifying the speaker’s identity. Ask specific questions that only the real person would know. This can reveal gaps in the scammer’s script. The voice, also, at times may sound robotic due to imperfections in voice cloning technology. So the next time, whenever you receive a call that creates a sense of urgency, ask as many questions as you can to verify the identity of the person. You may also consider verifying the claims through the second channel. If the person on the other side of the phone says something, you can get it confirmed by the official email to be on the safer side.
GOOGLE AI EMAIL SUMMARIES CAN BE HACKED TO HIDE PHISHING ATTACKS
4) Identify visual glitches and oddities in video calls
Deepfake videos are getting pretty convincing, but they’re not flawless yet. They have visual inconsistencies and oddities, which can make the voice or video appear fake. So watch the video carefully and try to catch the signs of unnatural eye movements, lip-sync issues, weird lighting, shadows and voice inconsistencies. You can also use a deepfake video detection tool to spot a fake video.
5) Set up and use a shared secret
A shared secret is something only you and your loved ones know. If someone claiming to be a friend or family member contacts you, ask for the shared secret. If they can’t answer, you’ll know it’s a scam.
Hackers are turning to artificial intelligence to make phishing scams smarter and harder to spot. (miniseries/Getty Images)
How to protect yourself from AI phishing scams
AI phishing scams rely on tricking people into trusting what looks and sounds real. By staying alert and practicing safe habits, you can lower your risk. Here’s how to stay ahead of scammers:
1) Stay cautious with unsolicited messages
Never trust unexpected emails, texts or calls that ask for money, personal details or account access. Scammers use urgency to pressure you into acting fast. Slow down and double-check before clicking or responding. If something feels off, it probably is.
2) Use a data removal service
Protect your devices with a trusted data removal service to reduce the amount of personal info exposed online. Fewer exposed details make it harder for scammers to target you. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.
Get a free scan to find out if your personal information is already out on the web: CyberGuy.com.
3) Check links before you click and install strong antivirus software
Hackers often hide malicious links behind convincing text. Hover your cursor over a link to see the actual URL before you click. If the address looks odd, misspelled or unrelated to the company, skip it. Clicking blindly can download malware or expose your login details. Also, install strong antivirus software on all of your devices that blocks phishing links and scans for malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.
4) Turn on two-factor authentication
Even if a scammer steals your password, two-factor authentication (2FA) can keep them locked out. Enable 2FA on your email, banking and social media accounts. Choose app-based codes or a hardware key over text messages for stronger protection.
5) Limit what you share online
The more personal details you share, the easier it is for hackers to make AI scams believable. Avoid posting sensitive information like travel plans, birthdays or financial updates on social media. Scammers piece these details together to build convincing attacks.
6) Verify requests through another channel
If you get a message asking for money or urgent action, confirm it in another way. Call the person directly using a number you know, or reach out through official company channels. Don’t rely on the same email, text or call that raised suspicion in the first place.
Kurt’s key takeaways
AI is making scams more convincing and harder to detect, but you can stay ahead by recognizing the warning signs. You should watch out for suspicious email addresses, unnatural language, robotic voices and visual glitches in videos, and always verify information through a second channel. You should also establish a shared secret with loved ones to protect yourself from AI-driven voice and video scams.
Have you experienced any AI-driven phishing scams yet, and what do you think is the best way to spot such a scam? Let us know by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CyberGuy.com newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Siri Shortcuts now works with Samsung SmartThings routines
Samsung’s latest SmartThings update adds support for Siri Shortcuts. In a press release, Samsung announced that you can now use Siri to run SmartThings routines, allowing you to use Apple’s voice assistant to control your smart home.
Siri Shortcuts is a feature in iOS that lets you run automations by asking Siri. These can either be created by the user in the Shortcuts app or by the manufacturers in their app.
This update should make it easier to control your SmartThings home using your iPhone, HomePod, or other Apple device. For example, you can now call on Siri to trigger your “Good morning” routine through SmartThings that automatically adjusts the lights, turns on your coffee maker, and opens your blinds when you wake up.
Samsung is also enhancing its SmartThings app for Apple devices. On the Apple Watch, you can now see a full list of your devices, send commands, and carry out routines, while the SmartThings app for iOS gives you the ability to view and control up to five of your most recently used devices from your lock screen with Live Activities.
Technology
The #1 Google search scam everyone falls for
NEWYou can now listen to Fox News articles!
When something goes wrong with your bank account or delivery, your first instinct might be to type the company name into Google and call the first customer service number you see. But that simple search has become one of the biggest traps for scammers, and it’s costing people money, privacy and even control over their phones.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
A simple Google search for a company’s customer service number can lead straight to a scam. The first result isn’t always the safest one. (Kurt “CyberGuy” Knutsson)
He Googled his bank’s number and lost control of his phone
Here’s how one man’s quick search for help turned into a nightmare he never expected. Gabriel wrote to us in distress, asking,
“I called my bank to check on some charges I didn’t authorize. I called the number on the bank statement, but they told me to go online. I googled the company and dialed the first number that popped up. Some foreign guy got on the phone, and I explained about the charges. Somehow, he took control of my phone, where I didn’t have any control. I tried to shut it down and hang up, but I couldn’t. He ended up sending an explicit text message to my 16-year-old daughter. How do I prove I didn’t send that message? Please help.”
Gabriel’s story is frightening, and unfortunately, it’s not rare. This type of attack is called a remote access support scam. Scammers pretend to be bank or tech support, then trick you into installing a program that gives them control of your device. Once inside, they can steal passwords, send messages or lock you out completely.
WHATSAPP BANS 6.8M SCAM ACCOUNTS, LAUNCHES SAFETY TOOL
Gabriel thought he was calling his bank, but the number was fake. Within minutes, a scammer took control of his phone and invaded his privacy. (Kurt “CyberGuy” Knutsson)
Why this scam works
Search engines reward paid ads. Scammers take advantage of this by buying ad space to appear above legitimate customer service numbers. The fake pages look professional, complete with company logos and 800 numbers that seem real.
Once you call, the fake “agent” sounds knowledgeable and polite. They build trust, then convince you to install remote access software such as AnyDesk or TeamViewer. From that point, they can control everything on your phone.
What to do if this happens to you
Gabriel, what you went through is incredibly upsetting, and you’re right to take it seriously. Here’s what to do right away:
1) Disconnect and secure your phone
Turn off your phone immediately. Restart it in Airplane Mode and don’t connect to Wi-Fi yet. Run a full antivirus scan with strong antivirus software.
2) Change all your passwords
Use a secure device that has not been compromised to reset the passwords for your key accounts, including email, cloud storage, phone carrier and banking logins. Create strong, unique passwords for each account and enable two-factor authentication (2FA) for added protection on all your devices and platforms.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com
3) Contact your carrier and your bank
Let your phone provider know that your device was taken over. Ask them to check for unauthorized remote management apps or SIM-swap activity. Notify your bank’s fraud department and report the fake number you found on Google.
4) Report the explicit message
Take screenshots and save everything. Contact local police and explain that the message was sent from your number while your phone was under remote control. If a minor is involved, the case may be referred to the FBI’s Internet Crime Complaint Center (IC3.gov).
5) Factory reset your phone
Once your data is backed up, perform a factory reset on your iPhone or Android to remove any hidden software. Reinstall only apps you recognize from the official app store.
HOW TO STOP IMPOSTOR BANK SCAMS BEFORE THEY DRAIN YOUR WALLET
Scammers use fake customer service numbers to sound convincing and gain remote access to your devices, turning a simple call for help into a digital takeover. (Kurt “CyberGuy” Knutsson)
Tips to stay safe from fake customer service scams
Falling for a fake customer service number can happen to anyone, especially when you’re in a rush or worried about your account. Here’s how to make sure you never get tricked by the same kind of scam that hijacked Gabriel’s phone.
Go directly to the company’s official website
Always type the company’s web address yourself or use the contact number printed on your card or statement. Scammers often create fake numbers that appear in search results, hoping you’ll call them instead of your real bank.
Don’t trust the first search result on Google
Search engines sell ad space to anyone, including criminals posing as real businesses. Those top “sponsored” listings can lead straight to scammers. Instead, scroll down until you find the official domain ending in .com, .org or .gov.
Never allow remote access to your phone or computer
No legitimate company needs to control your device to verify charges or fix an account issue. If someone asks you to install software like AnyDesk or TeamViewer, hang up immediately. These tools give strangers complete control of your screen and data.
Hang up if the caller pressures you to act fast
Scammers rely on panic. When someone insists you act “right now” or risk losing money, that’s a warning sign. Stay calm, hang up, and verify the problem through your bank’s official website or number.
Use strong antivirus protection
Install and regularly update a trusted antivirus app. Strong antivirus software can block remote-access tools and spyware before scammers gain access. Regular scans also detect hidden threats that may already be on your phone or computer.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
Consider using a data removal service
Many scammers find victims through data brokers that sell phone numbers and personal details. A data removal service helps erase your information from these sites. As a result, it’s harder for criminals to target you with fake customer service scams in the first place.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
Monitor your identity with a trusted protection service
Even a short breach can expose your private information. Identity-monitoring tools alert you when your name, email or Social Security number appears on the dark web. That gives you time to act before scammers can use it.
Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
The internet has made getting help easier than ever, but it has also made it easier for scammers to pretend to be helpful. The top way people are being scammed today isn’t through phishing emails or suspicious links; it’s by trusting fake phone numbers that look official. Take a few minutes to save the real customer service numbers for your bank, phone provider, and credit card company. One quick call to the wrong number could give a stranger access to your entire digital life.
With fake customer service numbers flooding search results, should Google be held responsible for protecting you from these scams? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Blue Origin scrubs second New Glenn launch
The second launch of Blue Origin’s partially reusable New Glenn rocket was scrubbed on Sunday due to adverse weather conditions, delaying NASA’s latest Mars mission. The Jeff Bezos-owned commercial space company announced that its next launch window from Cape Canaveral Space Force Station in Florida will be attempted “no earlier” than Wednesday, November 12th, between 2:50PM and 4:17PM ET.
This is a significant launch for the 320-foot-tall megarocket, which is tasked with sending NASA’s twin ESCAPADE (Escape and Plasma Acceleration and Dynamics Explorers) probes into space — the first Mars-bound mission since NASA launched its Perseverance and Ingenuity vehicles in 2020 to explore the red planet’s surface. The ESCAPADE satellites are projected to reach Mars orbit in 2027, where they will measure the planet’s magnetic field and atmosphere.
This will also be Blue Origin’s latest attempt to land New Glenn’s reusable first-stage booster, which, much like SpaceX’s Falcon rocket boosters, is designed to vertically touch down on a sea-based platform following launch. While Blue Origin successfully launched New Glenn for the first time in January after several delays, the booster was lost during its landing descent. A successful launch and landing would help Blue Origin to prove itself as a deep-space launch provider that’s capable of competing with established rivals like SpaceX and United Launch Alliance.
Blue Origin says it worked with the Federal Aviation Administration to select its latest launch window, having seemingly been given an exemption to new FAA rules that prohibit commercial rockets from being launched between 6AM and 10PM. This emergency order came into effect on November 10th to alleviate air traffic congestion during the ongoing government shutdown. If all goes to plan, the live webcast for New Glenn’s second flight will start 20 minutes prior to launch on Wednesday.
-
Austin, TX6 days agoHalf-naked woman was allegedly tortured and chained in Texas backyard for months by five ‘friends’ who didn’t ‘like her anymore’
-
Hawaii3 days agoMissing Kapolei man found in Waipio, attorney says
-
Southwest4 days agoTexas launches effort to install TPUSA in every high school and college
-
Seattle, WA1 week agoESPN scoop adds another intriguing name to Seahawks chatter before NFL trade deadline
-
New Jersey2 days agoPolice investigate car collision, shooting in Orange, New Jersey
-
World6 days agoIsrael’s focus on political drama rather than Palestinian rape victim
-
Seattle, WA2 days agoSoundgarden Enlist Jim Carrey and Seattle All-Stars for Rock Hall 2025 Ceremony
-
Southwest7 days agoArmy veteran-turned-MAGA rising star jumps into fiery GOP Senate primary as polls tighten