Technology
Instagram password reset surge: Protect your account
NEWYou can now listen to Fox News articles!
If your inbox suddenly shows an Instagram “Reset your password” email you never requested, you are not alone. A wave of unexpected reset messages is hitting people right now, and attackers are betting you will panic, click fast and make a mistake.
Here is the tricky part. Many of these emails are real. They can come directly from Instagram because someone triggered the legitimate password reset flow. That makes the alert feel extra convincing, even when you did nothing wrong.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
FACEBOOK, INSTAGRAM ARE USING YOUR DATA TO TRAIN AI: LEARN HOW TO PROTECT IT
Unexpected Instagram password reset emails can look completely legitimate, which is why so many users are caught off guard during this surge. (Cyverguy.com)
Why Instagram password reset emails are surging
This surge is happening because the reset emails themselves can be real, even when the intent behind them is not. Instead of building fake phishing pages or using malware, attackers take advantage of Instagram’s normal account recovery system.
The process is simple. An attacker enters your username or email into Instagram’s real password reset form. Instagram automatically sends a legitimate reset email to you. The attacker then waits to see how you react.
At this point, your account has not been hacked. The risk comes from what happens next. Attackers are counting on common mistakes, such as clicking the reset button and rushing through the process, reusing a weak password, getting redirected to a fake follow-up page or falling for a second scam email that arrives soon after.
That is why this tactic works as a stress test. It creates urgency and pressure, even though nothing has been compromised yet.
Why attackers love this tactic
This is classic social engineering. The attacker does not need to outsmart Instagram. They need to outsmart you in a stressed moment. A reset email creates urgency. It also feels official. That combination leads people to click first and think second, which is exactly the outcome attackers want. You can treat these surprise reset emails as an early warning system. If you get one:
- Someone may know your username or email
- Your account could be on a target list from a leak or scrape
- Your current security setup will decide whether this stays annoying or turns into a takeover
If an email pressures you to act immediately, threatens account deletion or asks for extra information, treat it as suspicious.
The BreachForums leak connection
The timing of this surge has raised fresh concerns. Reports point to data tied to roughly 17.5 million Instagram accounts being shared on BreachForums, an underground forum where cybercriminals trade and discuss stolen data. The alleged post appeared in early January 2026, which lines up with when many users began reporting a sudden wave of password reset emails, sometimes receiving several in a short period of time.
This timing alone does not prove a direct connection. However, leaked usernames or email addresses can make it much easier for attackers to target large numbers of accounts at once, which is exactly what this kind of reset spam depends on. We reached out to Meta for comment but did not receive a response before our deadline.
We reached out to Meta for comment, and a spokesperson for the company told CyberGuy, “We fixed an issue that allowed an external party to request password reset emails for some Instagram users. We want to reassure everyone there was no breach of our systems and people’s Instagram accounts remain secure. People can disregard these emails and we apologize for any confusion this may have caused.”
How to tell if the reset email is legitimate
A legitimate Instagram reset email can still be part of an attack attempt. So your goal is not “confirm it is real,” it is “avoid reacting in a risky way.” Instagram’s own guidance boils down to this:
- A reset email alone does not mean your account is compromised
- If you did not request it, do not use the link
- Use Instagram’s official paths in the app to review security and report suspicious messages
Also, if you get emails about changing your account email address, Instagram says those messages can include a way to reverse the change, which can help you recover if someone broke in.
These real-looking messages are designed to create urgency and push people to click before slowing down and checking their account security. (Cyverguy.com)
What a real Instagram password reset email looks like
A legitimate reset email usually has these elements:
- Sender: Comes from an official Instagram domain, such as security@mail.instagram.com
- Subject line: Often says “Reset your Instagram password” or “Password reset request”
- Instagram branding: Logo at the top with clean formatting
- Call to action button: A button like “Reset Password”
- Reassurance text: A line explaining that if you did not request this, you can ignore the email and nothing will change
- Safety option: Language telling you how to report the email if you did not initiate it
This is why the current surge is so effective. The emails look normal and arrive from real Instagram systems.
META ENDS FACT-CHECKING PROGRAM AS ZUCKERBERG VOWS TO RESTORE FREE EXPRESSION ON FACEBOOK, INSTAGRAM
What Instagram reset alerts can look like inside the app
You may also see security messages directly in Instagram, such as:
- Login attempt alerts
- Notifications about a password reset request
- Prompts asking you to confirm a login from a new device
These in-app alerts are generally safer to interact with than email links, especially during a surge.
What scammers rely on
Attackers are counting on one thing: panic. When users see a reset email they did not request, many rush to click before reading the fine print. That fast reaction is what turns a harmless reset request into a real account takeover.
What to do right now if you get a reset email you did not request
So, what should you do if one of these password reset emails lands in your inbox? Take a breath first. Then do this.
1) Do not click the button in the email and use strong antivirus software
Even if the message looks real, treat it like a hot surface. If you want to change your password, do it from the Instagram app or by typing Instagram’s address into your browser yourself. Strong antivirus software adds another layer of protection here. It can help block malicious links, fake login pages and follow-up scams that often appear during a reset email surge.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
2) Check your Instagram security activity in the app
Open Instagram and look for signs someone tried to log in:
- Unknown devices
- Login alerts you do not recognize
- Changes to email, phone number or linked accounts
If anything looks off, remove the device and update your credentials.
3) Turn on two-factor authentication (2FA) and keep it on
Two-factor authentication (2FA) is the biggest roadblock for account takeover. Even if someone knows your password, they still need your code to get in from an unfamiliar device. Instagram has pushed 2FA heavily for higher-risk accounts and urges users to enable it. Use an authenticator app if you can. It is often safer than SMS.
4) Change your password if you feel unsure
If you suspect someone guessed your password, or you reused it elsewhere, change it. Make it long and unique. A password manager can help you generate and store strong passwords without reusing them. Then update the password on your email account too. Your email inbox controls most password resets, so make sure it also uses a strong, unique password.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
5) Use a data removal service to reduce targeting
Password reset surges often follow data leaks. When your email address and personal details appear on data broker sites, attackers can target you more easily. A data removal service helps limit where your information shows up online. By shrinking your digital footprint, you reduce the chances of being singled out during large-scale reset email attacks.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
The safest response is to avoid email links, open the Instagram app directly and review login activity and security settings instead. (Kurt “CyberGuy” Knutsson)
6) Watch for follow-up scams
After a reset surge, criminals often switch tactics. Next, you may see:
- Fake “Instagram Support” emails
- DMs claiming your account will be deleted
- Login approval prompts you did not trigger
Slow down and verify everything inside the app.
Kurt’s key takeaways
A spike in Instagram password reset emails feels scary because it looks like someone is already inside your account. Often, they are not. Still, the surge is a reminder to tighten your basics. Use the app to check security. Turn on two-factor authentication. Change the passwords you reused. Most importantly, do not let an unexpected email rush you into the one click that hands over access.
Have you received an unexpected Instagram password reset email recently, and how did you handle it? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
AO3 is finally out of beta after 17 years
Archive of Our Own (AO3) is officially exiting beta. The Organization for Transformative Works — the nonprofit behind the fanfiction site — announced the update on Thursday, which comes 17 years after AO3’s launch in 2009.
“Since 2009, AO3 has grown and changed a lot,” the announcement says. “We’ve introduced many features over the years through the efforts of our volunteers and coding contributors, as well as the contractors we’ve been able to hire thanks to generous donations from our users.”
The post highlights some of the features that AO3 has since its launch, including a tagging system, fanworks downloads, privacy settings that allow creators to limit access to their work, and more. Just because AO3 is exiting beta, doesn’t mean the updates will stop flowing:
As the AO3 software has been stable for a long time, the change is mostly cosmetic and does not indicate that everything is finalized or perfectly working. Exiting beta doesn’t mean we’ll stop continuing to improve AO3—our volunteer coders and community contributors will still be working to add to and improve AO3 every day.
One of the most significant changes to the site is the absence of the tiny “beta” label inside the AO3 logo displayed at the top of the platform. (AO3 briefly changed the beta to “omega” for April Fools’ Day this year).
You can keep tabs on the updates coming to AO3 by viewing its projects on Jira
Technology
US targets Chinese robots over security fears
NEWYou can now listen to Fox News articles!
A bipartisan group of lawmakers wants to draw a clear line on where certain robots may operate in the United States. Senators Tom Cotton (R-Ark.) and Chuck Schumer (D-N.Y.) recently introduced legislation that would ban the federal government from using robots made by foreign adversaries, a category that includes China but can also apply to other designated countries.
The proposal, called the American Security Robotics Act, targets unmanned ground systems. That includes humanoid robots and remote-controlled surveillance machines. The concern is not just what these robots can do. It is what they could be doing behind the scenes. Lawmakers say these systems are already being marketed to U.S. research labs, universities, law enforcement agencies and even consumers.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
WHITE HOUSE UNVEILS ITS FIRST FEDERAL AI FRAMEWORK, PUSHES CONGRESS TO ACT ‘THIS YEAR’
Advanced humanoid robots like this from Unitree Robotics highlight how quickly the technology is evolving and why officials are raising data security concerns. (Unitree)
Why lawmakers say these robots pose a risk
According to statements from the lawmakers involved, the core issue is security. Schumer warned that Chinese robotics companies could embed hidden access points inside their systems. These so-called backdoors could allow unauthorized access to sensitive data or even enable remote control. Lawmakers warn that these systems could include hidden access points or be vulnerable to remote control. Schumer said, “The Chinese Communist Party has shown that they are willing to lie and cheat to get ahead at the expense of the American people and our national security. They are running their standard playbook, this time in robotics, trying to flood the U.S. market with their technology, which presents real security risks and threats to Americans’ privacy and American research and industry.”
He said the Chinese government has a track record of prioritizing its own strategic goals over transparency, raising concerns about how that approach could extend into robotics.
TOP AI FIRM ALLEGES CHINESE LABS USED 24K FAKE ACCOUNTS TO SIPHON US TECH
A humanoid robot from Unitree Robotics, similar to the systems lawmakers are scrutinizing over potential security risks in government use. (Unitree)
What the bill would actually do
The American Security Robotics Act focuses specifically on federal use. The bill targets countries designated as foreign adversaries, including Communist China, according to the lawmakers.
The legislation targets “unmanned ground vehicle systems,” including humanoid robots and autonomous patrol technologies used by federal agencies. If passed, it would block U.S. government agencies from purchasing or operating unmanned ground vehicles built by companies tied to foreign adversaries. That includes:
- Humanoid robots used in public-facing roles
- Remote surveillance robots
- Other automated ground systems used in government operations
It also blocks federal agencies from using these systems through contractors or funding their use through grants or agreements. Cotton said, “Robots made by Communist China threaten Americans’ privacy and our national security. Our bill will ban the federal government from buying and operating these devices made in countries that wish us harm.”
The operational ban would take effect one year after the law is enacted. The bill includes exceptions for national security, research, testing and certain law enforcement or intelligence activities under strict conditions.
The bill does not ban these products outright for consumers or private companies. Instead, it draws a boundary around government adoption where sensitive data and infrastructure are involved. Meanwhile, Rep. Elise Stefanik (R-N.Y.) is introducing a companion bill in the House, signaling coordinated support across both chambers of Congress.
The timing matters as robotics competition heats up
This legislation comes at a moment when China is rapidly advancing in robotics. Recent demonstrations in Beijing showcased a new generation of highly capable robots, highlighting how quickly the technology is evolving. That momentum has raised alarms in Washington about falling behind while also importing potential risks. Stefanik said, “We must continue to promote and propel America’s robotics superiority while safeguarding our privacy and national security from adversaries.“
At the same time, U.S. companies are pushing forward. One example came when a humanoid robot from Figure AI recently appeared at a White House education summit alongside First Lady Melania Trump. She suggested robots like these could eventually play a role in education, hinting at how deeply this technology could integrate into everyday life.
DEMOCRATS WARN TRUMP GREEN-LIGHTING NVIDIA AI CHIP SALES COULD BOOST CHINA’S MILITARY EDGE
Multiple humanoid robots developed by Unitree Robotics show the growing capabilities of foreign-made systems now entering global markets. (Unitree)
What this means for you
If you are not working inside the federal government, this bill will not directly affect what you can buy or use. Still, it signals something bigger. It does raise questions about how much access foreign-made devices could have to data inside your home or workplace. First, it shows that robotics is no longer just about convenience or innovation. It is now part of national security conversations. Second, it highlights growing concern about where your data goes when you interact with connected devices. That applies whether it is a robot, a smart home device or a surveillance system. Finally, it suggests that future restrictions could expand beyond government use if risks are confirmed or public concern grows.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
Kurt’s key takeaways
This is not just about robots walking through offices or classrooms. It is about trust. Lawmakers are drawing attention to a question that has followed other technologies before. Who built it, and who might still have access to it after it is deployed? As robotics becomes more common in public spaces, homes and workplaces, those questions will only get louder. The technology is moving fast. Policy is trying to catch up.
Would you feel comfortable interacting with a humanoid robot if you did not know who ultimately controlled its data? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The best AirPods deals you can get right now
If you know where to look, you can often score deals on Apple’s ever-expanding AirPods lineup. Both the AirPods Pro 3 and the AirPods 4 (with and without ANC) now consistently receive discounts, as do the AirPods Pro 3. And while major shopping events like Black Friday and Amazon Prime Day have delivered some of the biggest price drops, there are still good deals to be found on every model — including the recently released AirPods Max 2.
Below, we’ve rounded up the best deals currently available on each set of AirPods, including both iterations of the AirPods 4 and AirPods Max, as well as the third-gen AirPods Pro.
At the end of 2024, Apple introduced the AirPods 4, a pair of wireless earbuds available in two variations: a $129 standard model and a $179 noise-canceling model. Both versions represent significant upgrades over the third-gen AirPods, with a more comfortable design and improved audio performance. They’re also better for taking calls thanks to Apple’s Voice Isolation feature, which focuses the mics on your voice so you can be heard more clearly in noisy environments.
The $179 AirPods 4 with Active Noise Cancellation offer a surprisingly effective noise-canceling mode, a helpful transparency mode, and several other Pro-level features. The latest AirPods Pro do a better job of tuning out noise, but the AirPods 4 with ANC still do a good job of reducing sound. They also feature other perks formerly reserved for Apple’s top-of-the-line earbuds, including wireless charging and a case with a built-in speaker that allows you to easily track it down via Apple’s Find My app.
Given they’ve been out for over a year, we consistently see discounts for both iterations of the AirPods 4. During Black Friday, we saw the standard model drop to a new low of $74; however, right now, they’re only down to $119 ($10 off) at Amazon, Walmart, and B&H Photo. The AirPods 4 with ANC, meanwhile, are on sale for $154.99 ($24 off) at Amazon, Walmart, and Costco (for members), which is significantly more than their recent low of $99.
The best AirPods Pro 3 deals
At its “Awe Dropping” event in September, Apple introduced the AirPods Pro 3. In addition to improved ANC and sound, the third-gen earbuds include a built-in heart rate sensor that syncs with the iPhone Fitness app, allowing you to track your pulse and calories burned across more than 50 workout types. They’re also more comfortable and secure than their predecessor, thanks to a redesigned, angled fit and five ear tip sizes — including a new XXS option. Additionally, they carry a more robust IP57 rating and support Apple’s new live translation feature, which, in our testing, generally conveys the gist well but still can’t beat a human interpreter.
Given how recently they launched, we’ve been surprised by how often the AirPods Pro 3 have been discounted. In fact, last month we saw them drop to $199 ($50 off), which is $15 shy of their all-time low. Unfortunately, while they’re still on sale, they’ve since increased in price to $224 ($25 off) at retailers like Amazon and Walmart.
The best AirPods Max deals
The AirPods Max aren’t the iconic in-ears that have become synonymous with the AirPods name. Both the first-gen Max and the newer AirPods Max 2 are large and luxurious, comprised of aluminum, steel, and mesh fabric that remains comfortable during extended listening sessions. The original pair delivered clear, expansive sound, great noise cancellation, and lossless audio over USB-C; however, with the Max 2, Apple built upon that excellent foundation with improved ANC and a built-in amplifier for better sound. They also feature Apple’s newer H2 chip, enabling AI-powered live translation, adaptive audio, and other features once reserved for the AirPods Pro line. The over-ears aren’t the best noise-canceling headphones for everyone — blame the sticker price — but for iPhone users, they’re hard to beat.
The AirPods Max 2 retail for $549 — the same price as the original model — but you can currently save $20 on both the black and white versions at Amazon and Costco (if you’re a member), which is the first discount we’ve seen on the recently released headphones. If you’re okay with picking up the last-gen model, the original AirPods Max with USB-C are on sale in select colors for $399.99 ($150 off) at Woot through April 3rd, matching their best price to date. They’re also available in a wider range of hues at Amazon, Walmart, Target, and other retailers for $449.99 ($100 off), which is still a hefty discount.
Update, April 2nd: Updated to reflect current pricing and availability, as well as the recent release of the AirPods Max 2.
-
Culture1 week agoWil Wheaton Discusses ‘Stand By Me’ and Narrating ‘The Body’ Audiobook
-
South-Carolina5 days agoSouth Carolina vs TCU predictions for Elite Eight game in March Madness
-
Miami, FL1 week agoJannik Sinner’s Girlfriend Laila Hasanovic Stuns in Ab-Revealing Post Amid Miami Open
-
Culture1 week agoWhat Happens When We Die? This Wallace Stevens Poem Has Thoughts.
-
Minneapolis, MN1 week agoBoy who shielded classmate during school shooting receives Medal of Honor
-
Vermont5 days ago
Skier dies after fall at Sugarbush Resort
-
Education1 week agoVideo: Transgender Athletes Barred From Women’s Olympic Events
-
Politics5 days agoTrump’s Ballroom Design Has Barely Been Scrutinized