Technology
How to stop phone number spoofing and protect yourself from scammers
Tired of getting random calls from strangers, wondering whether or not it’s something to be concerned about?
What about when a person calls saying they’ve got a missed phone call from your number?
Or, how about when you see a phone number that looks familiar (perhaps has the same area code), but when you answer, it’s a telemarketer or someone trying to sell you something?
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER
Woman on her cellphone (Kurt “CyberGuy” Knutsson)
What is going on here?
Phone spoofing, also known as phone number spoofing, is a deceptive practice that scammers use to trick you into answering their calls. By using software or devices, they can make any number appear on the caller ID, even if it belongs to someone else. This can cause problems for both the owner of the spoofed number and the potential victims of the scam.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Here’s what you need to know about phone spoofing and how to stop it so that you can protect yourself (and others) from scammers.
Woman on a cellphone at a laptop (Kurt “CyberGuy” Knutsson)
MORE: HOW TO STAY INCOGNITO AND CONCEAL YOUR NUMBER WHEN CALLING SOMEONE
What is phone number spoofing?
Phone spoofing is when scammers get control of your phone number. They can then use your phone number to steal your data or use it to target other people. Instead of a strange phone number or company coming up in your caller ID, they can pass through scam detection by posing as a number you may recognize. This is known as “neighbor spoofing” because scammers will target people within the same — or nearby — area code, which people are less likely to ignore.
But phone number spoofing can be even more sophisticated. Sometimes scammers can spoof the phone numbers of banks, government agencies, police departments, corporations and more. And when most people see those names come up on their caller ID, they generally feel like it’s important or at least an organization they trust, prompting them to answer and not even think twice about who may be on the other line.
Man frustrated by caller (Kurt “CyberGuy” Knutsson)
MORE: HOW SCAMMERS USE GOOGLE VERIFICATION CODES TO STEAL YOUR IDENTITY AND MONEY
What are scammers doing with my phone number?
Once scammers get their hands on your phone number, they can do all sorts of things. In one scenario, they may target you and say you owe a bill for something, prompting you to give up sensitive data about yourself.
In more serious scenarios, they can call your phone and tell you they have your friend or family member who’s in danger and that they need you to send money right away. And with AI voice technology that can replicate voices, this is becoming an even scarier reality. Other times, they use your spoofed number against you, committing identity theft as they’ll have access to your number to get through to your accounts.
Woman stressed out on the phone (Kurt “CyberGuy” Knutsson)
MORE: TIPS TO FOLLOW FROM ONE INCREDIBLY COSTLY CONVERSATION WITH CYBERCROOKS
How to stop phone number spoofing: When your phone number is spoofed to harm others
If you have a feeling that your phone number has been spoofed, there are some things you can do to stop the situation from getting out of hand.
Step 1: Determine if your phone number has been spoofed
One of the best ways to know that your number has been spoofed is if you’re getting lots of calls from people who tell you they’ve received a missed call or phone call from your number. If you don’t know them and you check your call history to see you’ve never called their number, there’s a good chance that your number has been spoofed and was used to try and trick them.
Step 2: Find out how these scammers hijacked your phone number in the first place
Your number may have been leaked in a data breach. Or you may have your number public somewhere online. You may have answered a spam call accidentally in the past. Or you may have permitted a company to sell your phone number (this is more common with telemarketers). At the same time, data brokers could be intentionally looking for this information, and they’re good at finding it. Next, they hijack your number. They physically do this by:
Port-out method: Once hijackers get your phone number via one of the methods above (in addition to other personal information), they contact your mobile carrier and pose as the account holder, aka you. Once they get in, they request a “port-out” of the phone number, which is when they ask the carrier to transfer your phone number to a new carrier or account. Generally, phone companies should see this as a red flag and ask follow-up questions, but savvy scammers can get around this. Once the port-out is approved, the phone number is activated on their new SIM card and they have total control.
SIM-swap method: This is when a phone spoofer convinces the mobile service provider to issue a new SIM card with your phone number. All they need to do is pop the SIM card into their device to get the same access as the port-out method.
Stealing your physical phone: One of the most straightforward ways to hijack your number is one of the most simple: stealing your mobile device and gaining access to it.
Remember, once they have control of your phone number, they may use it to commit identity theft against you, not just as a phone spoof to harm others.
Woman on a phone call (Kurt “CyberGuy” Knutsson)
CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER
Step 3: Follow these steps if your phone number has already been spoofed
Even if your phone has been “hijacked,” you can still do something about it. Here’s how:
Apologize to the victims: If people start calling you to let you know they’ve received a scam call from your number, apologize to them right away and let them know that your phone number has been spoofed and that it’s being used to target them. This can help them decide what to do next (which we’ll cover later).
Create a voicemail message: If you’re getting a lot of these calls nonstop, you might want to change your voicemail message to let them know what’s happening. This essentially automates the process, and you don’t need to spend your day answering the phone either.
Notify your mobile carrier: Call your mobile carrier to let them know that you’re confident your phone number has been spoofed. They can help you take the next steps to stop it in its tracks.
Change your phone number: Whether or not your mobile carrier advises you to do so, it might be a good idea to consider changing your phone number. It may not stop scammers from using it to victimize others, but it will help you to stop getting notifications.
Step 4: Prevent scammers from spoofing your phone number in the future
If you end up changing your phone number, you’ll want to be sure that you can prevent scammers from taking your number in the future. Here are a few things you can do:
Don’t publicize your phone number online: Don’t ever provide your phone number to strangers or make it easy for them to get your phone number via a verification scam. Additionally, if you’re creating an account for a new website, and they ask about your phone number, try to avoid giving it. It may be difficult with a bank, for instance, which may use your phone number to verify your identity. But if you can avoid giving your phone number, then you should.
Use a data removal service: There are so many websites that can potentially have your data because you may have unknowingly permitted them to do so. By using a data removal service, you can get your number offline.
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for personal data removal services here.
Update passwords on your phone: It may go without saying, but make sure your phone’s passwords are updated. You’ll want to create a strong password for your phone and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Also, enable a PIN or biometrics to get into your phone. This is so that if someone steals your phone, they can’t get access to your information.
Man on a phone call (Kurt “CyberGuy” Knutsson)
Stay calm and steer clear: If you have any hunch that you are being scammed, stay calm, don’t panic and immediately hang up the phone. You can also try another tactic, which is asking the spammer a lot of questions to catch them off guard. Sometimes they’ll realize you’ve set them in a trap and will hang up the phone themselves.
Ultimately — no matter how convincing or familiar the story or phone number is — you want to be sure that you aren’t giving any sensitive data or money to these people. If someone is saying you owe a bill, tell them you will call your bank and get back to them. Even if they already know some of your personal information, do not comply. If it’s legitimate, they’ll understand that you need to double-check.
Alert the appropriate parties: Even if you recognize it’s a scam, sometimes these people are relentless. So, if they continue to call you and harass you nonstop (and it’s from the same number), you have some options:
- Notify your mobile carrier: Let them know that you’re confident your phone number has been spoofed. They can help you take the next steps to stop it in its tracks.
- Notify the FCC: The Federal Communications Commission is the relevant party you’ll want to contact if you continue to get scam calls, whether they are from phone spoofers or robocalls and telemarketers. You can file a complaint here.
- Notify the FTC: If you’ve already, unfortunately, fallen victim to a scam, you can report it to the Federal Trade Commission, here.
Don’t get spammed again: You’ve probably noticed that when you get a call on your phone, it will say “scam likely” in red, prompting you to ignore it. Cellphones these days are pretty good at detecting calls from scammers. This makes it more challenging for scammers to do their dirty work. So, they need another strategy to get around it, which is why they phone spoof. But you can outsmart them, even when they use a familiar-looking number:
- Use a spam blocker to keep scammers at bay: To keep spammers and scammers away, install a spam blocker on your phone. Many phone carriers already have this service on the phone (as mentioned above), but there are additional apps you can put on your phone as an extra layer of security, like Truecaller.
- Block the number on your phone: Depending on what type of phone you have, you can block the actual number from contacting you again. However, keep in mind that phone number spoofers are savvy and are difficult to keep up with. This method is better if it’s a specific number that keeps trying to contact you.
- Block robocalls with apps: Sometimes spammers are robots utilized by telemarketers. Some of those scam-blocking apps work against robocalls. But you can also register your number on the national “Do Not Call Registry” to stop them. You can do this by calling 1-888-382-1222 or visiting www.donotcall.gov/.
- Utilize data removal services: If you want robots and other spammers/scammers to stop calling your phone number altogether, some apps and services can help you find and remove your data wherever it is on the Internet. These can also be used to protect yourself against phone spoofing.
MORE: HOW TO BLOCK THOSE UNWANTED AND ANNOYING SPAM EMAILS
Kurt’s key takeaways
While phones may have gotten better at blocking spam calls, scammers will stop at nothing to try and trick you. This is why phone spoofing is a good idea for them; they have a much better chance of getting through spam blockers and connecting with you because you may think it’s safe to answer the phone.
We won’t even be able to stop these scammers 100%. But by knowing what to do if your phone number has been hijacked or you’re being targeted by someone else’s phone number who has been spoofed, you can do your part in making sure these people know we’re onto them.
Have you ever had your phone number spoofed? Or have you ever picked up the phone because you recognized the area code, only to realize it was a potential scam? How did you handle it? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Answers to the most asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Tim Cook will still be Apple’s Trump whisperer
Though Tim Cook is shedding his CEO title for the role of Apple’s executive chairman, it appears he’ll keep one of his most important duties: that of the company’s Trump whisperer.
“As executive chairman, Cook will assist with certain aspects of the company, including engaging with policymakers around the world,” Apple writes in a press release. Translation: he’s sticking around to deal with thorny political relationships — in particular the one with President Donald Trump.
Throughout his tenure, Cook has navigated Apple through tricky political terrain. He’s had to balance the company’s massive business interest in China with US policymakers’ concerns, and he’s worked to appease Trump for favorable regulatory decisions, without alienating too many Apple employees and customers in the process.
Cook has navigated Apple through tricky political terrain
The task of wooing Trump has repeatedly placed Cook in embarrassing situations: Cook showed the president around a factory in Texas in 2019, where Trump wrongly boasted that because of his policies, Apple was building a new manufacturing plant in the US. Last year, he presented Trump with a symbolic gift of “Made in the USA” glass from Apple supplier Corning set in 24-karat gold.
Recently, Cook took criticism from Trump critics for attending a movie night at the White House, for a screening of the documentary Melania, the same day that Alex Pretti was killed by federal agents on the streets of Minneapolis during a protest against Immigration and Customs Enforcement. Cook later vaguely referred to the “events in Minneapolis,” and referenced a “good conversation with the president.”
As Apple’s senior vice president of hardware engineering John Ternus takes over as CEO, the company will need to overcome significant policy challenges, including global efforts to regulate AI, and a push for app stores to verify user ages. Lucky for Ternus, Cook will still be there to take on that job.
Technology
6 crypto scam scripts criminals use to steal your money
NEWYou can now listen to Fox News articles!
Just about every day, we receive emails from readers who have encountered new scams. Many involve cryptocurrency. The pattern keeps repeating. Someone receives a message that feels urgent, emotional or exciting. The person on the other end sounds confident and persuasive. Before long, the victim is being asked to send money through cryptocurrency. Once the money is sent, it often disappears forever.
Cryptocurrency appeals to scammers for a simple reason. Transactions move quickly, often cross international borders and usually cannot be reversed once completed. That combination makes crypto payments especially attractive to criminals.
Kate recently wrote to us with a great question.
“Could you do an article that illustrates the scripts used by scammers to lure people to send money using cryptocurrency. Those scripts must be very convincing to get so many reasonably intelligent people to send money. Maybe five or six examples of the scripts, so people, especially seniors, will know what to watch out for.”
Kate is absolutely right. These scripts are convincing because scammers practice them constantly. They use psychology, urgency and emotion to push people toward quick decisions.
FAKE GOOGLE GEMINI AI PUSHES ‘GOOGLE COIN’ CRYPTO SCAM
Crypto scammers use polished scripts built on urgency, trust and emotion to pressure victims into sending irreversible payments. (gpointstudio/Getty Images)
Let’s break down some of the most common crypto scam scripts, so you know what they sound like before they reach your inbox or phone.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
The investment opportunity script
This script often begins with a friendly introduction through social media, email or even a text message.
Example script:
“Hi, I work with a private investment group that trades cryptocurrency. We’ve helped many people earn steady returns. If you invest $500 today, you could earn $5,000 within weeks. I can show you proof of other investors’ success.”
The scammer may send fake screenshots of profits. Some will even allow a small withdrawal early on to build trust. Eventually, they push the victim to send larger deposits. Once the larger transfer is sent, the account suddenly stops responding.
The romance crypto script
This scam often starts with a simple message on a dating app, Facebook or Instagram. The first contact is friendly and low-pressure.
Example initial script:
“Hi, insert name here, I hope you don’t mind me saying hello. Your profile caught my attention, and you seem like a very kind person. How has your day been?”
After a few days of conversation, the scammer begins sharing details about their life. They often claim to work overseas as an engineer, doctor or business owner. Eventually, they mention cryptocurrency trading as something they do on the side.
Later message in the script:
“I have been doing some short-term crypto trading after work. It has helped me save a lot faster. If you are interested, I can show you the platform I use. It is very easy to start with a small amount.”
From there, the scammer guides the victim to a fake trading site or asks them to transfer cryptocurrency to a wallet they control. At first, the account may show fake profits. The victim believes the investment is working and sends more money. Eventually, the victim cannot withdraw any money.
MALICIOUS MAC EXTENSIONS STEAL CRYPTO WALLETS AND PASSWORDS
From romance schemes to fake government threats, scammers often follow repeatable crypto scripts designed to sound convincing. Knowing the pattern can help you stop the fraud early. (Nhac NGUYEN / AFP via Getty Images)
The government impersonation script
Scammers often pretend to represent government agencies or law enforcement.
Example script:
“This is an urgent notice regarding your tax account. Your Social Security number has been linked to suspicious activity. To prevent legal action, you must verify your identity and pay the outstanding balance today using cryptocurrency.”
Government agencies do not demand payment through cryptocurrency. The goal is to scare you into acting quickly without checking the facts.
The tech support emergency script
This scam often begins with a pop-up warning or an unexpected phone call.
Example script:
“Your computer has been compromised by hackers. Your bank information may be at risk. To secure your system, we need you to transfer funds temporarily into a protected cryptocurrency wallet.“
The scammer claims the funds will be returned once the system is secure. In reality, the transfer moves the money directly to the criminal.
The crypto giveaway script
This scam frequently appears on social media or video platforms.
Example script:
“We are celebrating a new crypto launch. Send 0.1 Bitcoin to this wallet, and we will immediately send back double the amount.”
The message may appear to come from a well-known company or public figure. The wallet address belongs to the scammer. Anyone who sends funds receives nothing in return.
The fake recovery service script
This scam targets people who have already lost money.
Example script:
“We specialize in recovering stolen cryptocurrency. Our investigators located the wallet that received your funds. To begin the recovery process, we require a small crypto payment to unlock the legal tracing tools.”
The victim believes they are hiring professionals to recover their money. Instead, they are being scammed again.
Why these scripts work so well
These scams succeed because they exploit human behavior. First, they create urgency. Victims feel pressured to act quickly.
Second, they create trust. The scammer may sound friendly or sympathetic.
Third, they promise rewards. Investment scams offer profits that feel life-changing.
Finally, cryptocurrency adds confusion. Many people are still learning how it works. Criminals take advantage of that uncertainty.
Understanding these scripts is the first step to protecting yourself. Once you recognize the patterns scammers use, it becomes much easier to stop the conversation before money is involved.
How to protect yourself from crypto scams
Crypto scammers rely on urgency, trust and confusion to pressure victims into sending money. These practical steps can help you recognize warning signs and avoid costly mistakes.
1 CLICK COST A FATHER $4 MILLION IN BITCOIN TO VISHING SCAMMERS
Criminals favor cryptocurrency because transactions move fast, cross borders easily and usually cannot be reversed. That makes crypto a powerful tool for scammers. (Mario Tama/Getty Images)
1) Slow down when money is involved
Scammers depend on urgency to push victims into fast decisions. If someone pressures you to send money immediately, treat it as a warning sign. Pause the conversation and verify the situation independently. Contact the company, agency or person through a known phone number or official website. Taking even a few minutes to step back can stop a scam before money leaves your account.
2) Never send cryptocurrency to someone you do not know
Cryptocurrency transactions work very differently from credit cards or bank transfers. Once funds are sent, they usually cannot be reversed. Scammers prefer crypto because it moves quickly and often crosses international borders. If someone asks for payment through Bitcoin, Ethereum or another digital currency, assume the request is suspicious until proven otherwise.
3) Verify investment opportunities independently
Many crypto scams promise fast profits or guaranteed returns. Legitimate investments never guarantee profits. Before investing, search the company name, website and contact information online. Look for warnings from regulators or consumer protection agencies. If you cannot find reliable information about the company, that is a major red flag.
4) Use strong antivirus software on your devices
Scammers frequently use phishing links, fake websites and malicious downloads to trick victims. Strong antivirus software can help detect these threats before they cause damage. Strong antivirus software can warn you about suspicious websites, block malicious downloads and help stop phishing attempts that try to steal your financial information. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Reduce the personal information scammers can find online
Scammers often research their targets before sending messages. They may gather details from public records, social media or data broker websites. Limiting the amount of personal information available online can make it harder for criminals to craft convincing messages. Removing your data from people search sites with a data removal service can reduce the chances of becoming a target. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
6) Be cautious with online relationships
Romance scams often begin with friendly messages on dating apps or social media. Over time, the scammer builds trust and eventually introduces a crypto investment opportunity. If someone you have never met begins discussing cryptocurrency investments or asks you to move money, take a step back. Real relationships do not require financial transfers to strangers.
7) Never trust screenshots or profit dashboards
Crypto scammers often show screenshots of trading accounts that appear to generate large profits. These images are easy to fake or are displayed on fraudulent websites controlled by the scammer. Even if a platform shows profits, it does not mean the money exists. If you cannot withdraw funds easily through a verified exchange, the investment may be fake.
8) Watch for requests to move conversations off the platform
Many scams begin on social media, dating apps or messaging platforms. After the first contact, scammers often ask victims to continue the conversation on WhatsApp, Telegram or another private messaging app. Moving the conversation helps them avoid detection by the original platform. If someone quickly asks you to switch apps, treat it as a warning sign.
9) Talk to someone you trust before sending money
Scammers often isolate their victims and discourage them from discussing the situation with friends or family. Before sending cryptocurrency or making a large investment, pause and talk to someone you trust. A second opinion can often spot warning signs that are easy to miss when emotions are involved.
What to do if you already sent cryptocurrency to a scammer
If you believe you sent cryptocurrency to a scammer, act quickly. Contact the exchange or platform you used to send the funds and report the transaction immediately. Some exchanges may be able to flag the receiving wallet and help investigators track suspicious activity.
You should also report the scam to the FTC at reportfraud.ftc.gov and notify your local law enforcement agency. If the scam began on a social media site, dating app or messaging platform, report the account there as well so it can be investigated and removed.
While recovering funds can be difficult, reporting the incident can help authorities identify larger fraud networks and potentially prevent others from becoming victims.
Kurt’s key takeaways
Cryptocurrency scams continue to grow because the scripts are polished and carefully tested. The criminals behind them understand human psychology. They know when to apply pressure, when to build trust and when to promise rewards. Recognizing these patterns is one of the most powerful ways to stop them. When you know the script, the scam becomes much easier to spot.
Have you ever received a message that tried to convince you to send cryptocurrency, and did the script almost sound believable? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
This pasta sauce wants to record your family
As if there weren’t already enough devices listening in on everything being said in your home, Prego, the pasta and pizza sauce brand, is releasing a device designed to record everything said around the dinner table for posterity. The Connection Keeper, which looks like an oversized pasta jar lid, was created in collaboration with StoryCorps, the nonprofit organization focused on preserving the stories of Americans in a collection housed at the Library of Congress’ American Folklife Center. There’s no AI, Wi-Fi, or Bluetooth, but you can optionally upload recordings to StoryCorps’ website to make them easier to share with family.
Prego says the goal of the device is to encourage families to make memories through conversation during dinner instead of staring at their phones — but only for a small number of families. The company is only planning to make less than 100 of them. The Connection Keeper will be available for purchase online starting on April 27th for $20 as part of a bundle that includes the device, a jar of Prego sauce, spaghetti noodles, and a deck of cards featuring conversation prompts and ideas.
Using the device is as easy as plopping the Connection Keeper down in the middle of everyone at the table and pressing one button to start recording. Using a pair of microphones, it captures CD-quality audio to a 16GB microSD card for up to eight hours when fully charged.
When dinner’s over, the recordings can be transferred to a computer over USB-C and then uploaded to a dedicated microsite created by StoryCorps where they’re preserved and accessible only by the uploader, unless they choose to share them with other StoryCorps users or the general public. You even have the option to archive them within the Library of Congress, which makes them public automatically, so hopefully your family talks about more than just stealing brainrots.
The recordings can be accessed on a smartphone through the StoryCorps app, but Prego intentionally left phones out of the rest of the process to discourage their use at the table. It’s also why the Connection Keeper lacks a screen. The goal was to minimize interactions with the device so family members instead focused on talking with each other.
-
Ohio3 minutes agoOhio Secretary of State Democratic primary pits outsider vs. insider – Signal Ohio
-
Oklahoma9 minutes agoPutnam City West moves to virtual learning after student incident
-
Oregon15 minutes agoOregon Ducks Safety Target Elijah Butler Nearing Crucial Point in Recruitment
-
Pennsylvania21 minutes agoOfficials react to Pennsylvania abortion ruling, Medicaid ban struck down
-
Rhode Island27 minutes agoNothing Bundt Cakes opens first RI bakery
-
South-Carolina33 minutes agoSLED issues Blue Alert for armed, dangerous woman in Midlands
-
South Dakota39 minutes ago
SD Lottery Powerball, Lotto America winning numbers for April 20, 2026
-
Tennessee45 minutes agoTennessee Senate passes ‘CVS bill,’ reshapes pharmacy business as CVS threatens closures