Sammy Azdoufal claims he wasn’t trying to hack every robot vacuum in the world. He just wanted to remote control his brand-new DJI Romo vacuum with a PS5 gamepad, he tells The Verge, because it sounded fun.
Technology
Instagram password reset surge: Protect your account
NEWYou can now listen to Fox News articles!
If your inbox suddenly shows an Instagram “Reset your password” email you never requested, you are not alone. A wave of unexpected reset messages is hitting people right now, and attackers are betting you will panic, click fast and make a mistake.
Here is the tricky part. Many of these emails are real. They can come directly from Instagram because someone triggered the legitimate password reset flow. That makes the alert feel extra convincing, even when you did nothing wrong.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
FACEBOOK, INSTAGRAM ARE USING YOUR DATA TO TRAIN AI: LEARN HOW TO PROTECT IT
Unexpected Instagram password reset emails can look completely legitimate, which is why so many users are caught off guard during this surge. (Cyverguy.com)
Why Instagram password reset emails are surging
This surge is happening because the reset emails themselves can be real, even when the intent behind them is not. Instead of building fake phishing pages or using malware, attackers take advantage of Instagram’s normal account recovery system.
The process is simple. An attacker enters your username or email into Instagram’s real password reset form. Instagram automatically sends a legitimate reset email to you. The attacker then waits to see how you react.
At this point, your account has not been hacked. The risk comes from what happens next. Attackers are counting on common mistakes, such as clicking the reset button and rushing through the process, reusing a weak password, getting redirected to a fake follow-up page or falling for a second scam email that arrives soon after.
That is why this tactic works as a stress test. It creates urgency and pressure, even though nothing has been compromised yet.
Why attackers love this tactic
This is classic social engineering. The attacker does not need to outsmart Instagram. They need to outsmart you in a stressed moment. A reset email creates urgency. It also feels official. That combination leads people to click first and think second, which is exactly the outcome attackers want. You can treat these surprise reset emails as an early warning system. If you get one:
- Someone may know your username or email
- Your account could be on a target list from a leak or scrape
- Your current security setup will decide whether this stays annoying or turns into a takeover
If an email pressures you to act immediately, threatens account deletion or asks for extra information, treat it as suspicious.
The BreachForums leak connection
The timing of this surge has raised fresh concerns. Reports point to data tied to roughly 17.5 million Instagram accounts being shared on BreachForums, an underground forum where cybercriminals trade and discuss stolen data. The alleged post appeared in early January 2026, which lines up with when many users began reporting a sudden wave of password reset emails, sometimes receiving several in a short period of time.
This timing alone does not prove a direct connection. However, leaked usernames or email addresses can make it much easier for attackers to target large numbers of accounts at once, which is exactly what this kind of reset spam depends on. We reached out to Meta for comment but did not receive a response before our deadline.
We reached out to Meta for comment, and a spokesperson for the company told CyberGuy, “We fixed an issue that allowed an external party to request password reset emails for some Instagram users. We want to reassure everyone there was no breach of our systems and people’s Instagram accounts remain secure. People can disregard these emails and we apologize for any confusion this may have caused.”
How to tell if the reset email is legitimate
A legitimate Instagram reset email can still be part of an attack attempt. So your goal is not “confirm it is real,” it is “avoid reacting in a risky way.” Instagram’s own guidance boils down to this:
- A reset email alone does not mean your account is compromised
- If you did not request it, do not use the link
- Use Instagram’s official paths in the app to review security and report suspicious messages
Also, if you get emails about changing your account email address, Instagram says those messages can include a way to reverse the change, which can help you recover if someone broke in.
These real-looking messages are designed to create urgency and push people to click before slowing down and checking their account security. (Cyverguy.com)
What a real Instagram password reset email looks like
A legitimate reset email usually has these elements:
- Sender: Comes from an official Instagram domain, such as security@mail.instagram.com
- Subject line: Often says “Reset your Instagram password” or “Password reset request”
- Instagram branding: Logo at the top with clean formatting
- Call to action button: A button like “Reset Password”
- Reassurance text: A line explaining that if you did not request this, you can ignore the email and nothing will change
- Safety option: Language telling you how to report the email if you did not initiate it
This is why the current surge is so effective. The emails look normal and arrive from real Instagram systems.
META ENDS FACT-CHECKING PROGRAM AS ZUCKERBERG VOWS TO RESTORE FREE EXPRESSION ON FACEBOOK, INSTAGRAM
What Instagram reset alerts can look like inside the app
You may also see security messages directly in Instagram, such as:
- Login attempt alerts
- Notifications about a password reset request
- Prompts asking you to confirm a login from a new device
These in-app alerts are generally safer to interact with than email links, especially during a surge.
What scammers rely on
Attackers are counting on one thing: panic. When users see a reset email they did not request, many rush to click before reading the fine print. That fast reaction is what turns a harmless reset request into a real account takeover.
What to do right now if you get a reset email you did not request
So, what should you do if one of these password reset emails lands in your inbox? Take a breath first. Then do this.
1) Do not click the button in the email and use strong antivirus software
Even if the message looks real, treat it like a hot surface. If you want to change your password, do it from the Instagram app or by typing Instagram’s address into your browser yourself. Strong antivirus software adds another layer of protection here. It can help block malicious links, fake login pages and follow-up scams that often appear during a reset email surge.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.
2) Check your Instagram security activity in the app
Open Instagram and look for signs someone tried to log in:
- Unknown devices
- Login alerts you do not recognize
- Changes to email, phone number or linked accounts
If anything looks off, remove the device and update your credentials.
3) Turn on two-factor authentication (2FA) and keep it on
Two-factor authentication (2FA) is the biggest roadblock for account takeover. Even if someone knows your password, they still need your code to get in from an unfamiliar device. Instagram has pushed 2FA heavily for higher-risk accounts and urges users to enable it. Use an authenticator app if you can. It is often safer than SMS.
4) Change your password if you feel unsure
If you suspect someone guessed your password, or you reused it elsewhere, change it. Make it long and unique. A password manager can help you generate and store strong passwords without reusing them. Then update the password on your email account too. Your email inbox controls most password resets, so make sure it also uses a strong, unique password.
Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
5) Use a data removal service to reduce targeting
Password reset surges often follow data leaks. When your email address and personal details appear on data broker sites, attackers can target you more easily. A data removal service helps limit where your information shows up online. By shrinking your digital footprint, you reduce the chances of being singled out during large-scale reset email attacks.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
The safest response is to avoid email links, open the Instagram app directly and review login activity and security settings instead. (Kurt “CyberGuy” Knutsson)
6) Watch for follow-up scams
After a reset surge, criminals often switch tactics. Next, you may see:
- Fake “Instagram Support” emails
- DMs claiming your account will be deleted
- Login approval prompts you did not trigger
Slow down and verify everything inside the app.
Kurt’s key takeaways
A spike in Instagram password reset emails feels scary because it looks like someone is already inside your account. Often, they are not. Still, the surge is a reminder to tighten your basics. Use the app to check security. Turn on two-factor authentication. Change the passwords you reused. Most importantly, do not let an unexpected email rush you into the one click that hands over access.
Have you received an unexpected Instagram password reset email recently, and how did you handle it? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The DJI Romo robovac had security so poor, this man remotely accessed thousands of them
But when his homegrown remote control app started talking to DJI’s servers, it wasn’t just one vacuum cleaner that replied. Roughly 7,000 of them, all around the world, began treating Azdoufal like their boss.
He could remotely control them, and look and listen through their live camera feeds, he tells me, saying he tested that out with a friend. He could watch them map out each room of a house, generating a complete 2D floor plan. He could use any robot’s IP address to find its rough location.
“I found my device was just one in an ocean of devices,” he says.
On Tuesday, when he showed me his level of access in a live demo, I couldn’t believe my eyes. Ten, hundreds, thousands of robots reporting for duty, each phoning home MQTT data packets every three seconds to say: their serial number, which rooms they’re cleaning, what they’ve seen, how far they’ve traveled, when they’re returning to the charger, and the obstacles they encountered along the way.
I watched each of these robots slowly pop into existence on a map of the world. Nine minutes after we began, Azdoufal’s laptop had already cataloged 6,700 DJI devices across 24 different countries and collected over 100,000 of their messages. If you add the company’s DJI Power portable power stations, which also phone home to these same servers, Azdoufal had access to over 10,000 devices.

When I say I couldn’t believe my eyes at first, I mean that literally. Azdoufal leads AI strategy at a vacation rental home company; when he told me he reverse engineered DJI’s protocols using Claude Code, I had to wonder whether AI was hallucinating these robots. So I asked my colleague Thomas Ricker, who just finished reviewing the DJI Romo, to pass us its serial number.
With nothing more than that 14-digit number, Azdoufal could not only pull up our robot, he could correctly see it was cleaning the living room and had 80 percent battery life remaining. Within minutes, I watched the robot generate and transmit an accurate floor plan of my colleague’s house, with the correct shape and size of each room, just by typing some digits into a laptop located in a different country.


Separately, Azdoufal pulled up his own DJI Romo’s live video feed, completely bypassing its security PIN, then walked into his living room and waved to the camera while I watched. He also says he shared a limited read-only version of his app with Gonzague Dambricourt, CTO at an IT consulting firm in France; Dambricourt tells me the app let him remotely watch his own DJI Romo’s camera feed before he even paired it.
Azdoufal was able to enable all of this without hacking into DJI’s servers, he claims. “I didn’t infringe any rules, I didn’t bypass, I didn’t crack, brute force, whatever.” He says he simply extracted his own DJI Romo’s private token — the key that tells DJI’s servers that you should have access to your own data — and those servers gave him the data of thousands of other people as well. He shows me that he can access DJI’s pre-production server, as well as the live servers for the US, China, and the EU.

Here’s the good news: On Tuesday, Azdoufal was not able to take our DJI Romo on a joyride through my colleague’s house, see through its camera, or listen through its microphone. DJI had already restricted that form of access after both Azdoufal and I told the company about the vulnerabilities.
And by Wednesday morning, Azdoufal’s scanner no longer had access to any robots, not even his own. It appears that DJI has plugged the gaping hole.
But this incident raises serious questions about DJI’s security and data practices. It will no doubt be used to help retroactively justify fears that led to the Chinese dronemaker getting largely forced out of the US. If Azdoufal could find these robots without even looking for them, will it protect them against people with intent to do harm? If Claude Code can spit out an app that lets you see into someone’s house, what keeps a DJI employee from doing so? And should a robot vacuum cleaner have a microphone? “It’s so weird to have a microphone on a freaking vacuum,” says Azdoufal.
It doesn’t help that when Azdoufal and The Verge contacted DJI about the issue, the company claimed it had fixed the vulnerability when it was actually only partially resolved.
“DJI can confirm the issue was resolved last week and remediation was already underway prior to public disclosure,” reads part of the original statement provided by DJI spokesperson Daisy Kong. We received that statement on Tuesday morning at 12:28PM ET — about half an hour before Azdoufal showed me thousands of robots, including our review unit, reporting for duty.

To be clear, it’s not surprising that a robot vacuum cleaner with a smartphone app would phone home to the cloud. For better or for worse, users currently expect those apps to work outside of their own homes. Unless you’ve built a tunnel into your own home network, that means relaying the data through cloud servers first.
But people who put a camera into their home expect that data to be protected, both in transit and once it reaches the server. Security professionals should know that — but as soon as Azdoufal connected to DJI’s MQTT servers, everything was visible in cleartext. If DJI has merely cut off one particular way into those servers, that may not be enough to protect them if hackers find another way in.
Unfortunately, DJI is far from the only smart home company that’s let people down on security. Hackers took over Ecovacs robot vacuums to chase pets and yell racist slurs in 2024. In 2025, South Korean government agencies reported that Dreame’s X50 Ultra had a flaw that could let hackers view its camera feed in real time, and that another Ecovacs and a Narwal robovac could let hackers view and steal photos from the devices. (Korea’s own Samsung and LG vacuums received high marks, and a Roborock did fine.)
It’s not just vacuums, of course. I still won’t buy a Wyze camera, despite its new security ideas, because that company tried to sweep a remote access vulnerability under the rug instead of warning its customers. I would find it hard to trust Anker’s Eufy after it lied to us about its security, too. But Anker came clean, and sunlight is a good disinfectant.
DJI is not being exceptionally transparent about what happened here, but it did answer almost all our questions. In a new statement to The Verge via spokesperson Daisy Kong, the company now admits “a backend permission validation issue” that could have theoretically let hackers see live video from its vacuums, and it admits that it didn’t fully patch that issue until after we confirmed that issues were still present.
Here’s that whole statement:
DJI identified a vulnerability affecting DJI Home through internal review in late January and initiated remediation immediately. The issue was addressed through two updates, with an initial patch deployed on February 8 and a follow-up update completed on February 10. The fix was deployed automatically, and no user action is required.
The vulnerability involved a backend permission validation issue affecting MQTT-based communication between the device and the server. While this issue created a theoretical potential for unauthorized access to live video of ROMO device, our investigation confirms that actual occurrences were extremely rare. Nearly all identified activity was linked to independent security researchers testing their own devices for reporting purposes, with only a handful of potential exceptions.
The first patch addressed this vulnerability but had not been applied universally across all service nodes. The second patch re-enabled and restarted the remaining service nodes. This has now been fully resolved, and there is no evidence of broader impact. This was not a transmission encryption issue. ROMO device-to-server communication was not transmitted in cleartext and has always been encrypted using TLS. Data associated with ROMO devices, such as those in Europe, is stored on U.S.-based AWS cloud infrastructure.
DJI maintains strong standards for data privacy and security and has established processes for identifying and addressing potential vulnerabilities. The company has invested in industry-standard encryption and operates a longstanding bug bounty program. We have reviewed the findings and recommendations shared by the independent security researchers who contacted us through that program as part of our standard post-remediation process. DJI will continue to implement additional security enhancements as part of its ongoing efforts.
Azdoufal says that even now, DJI hasn’t fixed all the vulnerabilities he’s found. One of them is the ability to view your own DJI Romo video stream without needing its security pin. Another one is so bad I won’t describe it until DJI has more time to fix it. DJI did not immediately promise to do so.
And both Azdoufal and security researcher Kevin Finisterre tell me it’s not enough for the Romo to send encrypted data to a US server, if anyone inside that server can easily read it afterward. “A server being based in the US in no way, shape, or form prevents .cn DJI employees from access,” Finisterre tells me. That seems evident, as Azdoufal lives in Barcelona and was able to see devices in entirely different regions.
“Once you’re an authenticated client on the MQTT broker, if there are no proper topic-level access controls (ACLs), you can subscribe to wildcard topics (e.g., #) and see all messages from all devices in plaintext at the application layer,” says Azdoufal. “TLS does nothing to prevent this — it only protects the pipe, not what’s inside the pipe from other authorized participants.”
When I tell Azdoufal that some may judge him for not giving DJI much time to resolve the issues before going public, he notes that he didn’t hack anything, didn’t expose sensitive data, and isn’t a security professional. He says he was simply livetweeting everything that happened while trying to control his robot with a PS5 gamepad.
“Yes, I don’t follow the rules, but people stick to the bug bounty program for money. I fucking don’t care, I just want this fixed,” he says. “Following the rules to the end would probably make this breach happen for a way longer time, I think.”
He doesn’t believe that DJI truly discovered these issues by itself back in January, and he’s annoyed the company only ever responded to him robotically in DMs on X, instead of answering his emails.
But he is happy about one thing: He can indeed control his Romo with a PlayStation or Xbox gamepad.
Technology
World’s fastest humanoid robot runs 22 MPH
NEWYou can now listen to Fox News articles!
A full-size humanoid robot just ran faster than most people will ever sprint.
Chinese robotics firm MirrorMe Technology has unveiled Bolt, a humanoid robot that reached a top speed of 22 miles per hour during real-world testing. This was not CGI or a computer simulation. The footage, shared by the company on X, shows a real humanoid robot running at full speed inside a controlled testing facility.
That milestone makes Bolt the fastest running humanoid robot of its size ever demonstrated outside computer simulations. For robotics, this is a line-crossing moment.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
WARM-SKINNED AI ROBOT WITH CAMERA EYES IS SERIOUSLY CREEPY
MirrorMe Technology’s humanoid robot Bolt reaches 22 mph during a real-world sprint test inside a controlled facility. (Zhang Xiangyi/China News Service/VCG via Getty Images)
What allows the world’s fastest humanoid robot to run at 22 mph
In the promotional video, the run is shown using a split-screen view. On one side of the screen, Wang Hongtao, the founder of MirrorMe Technology, runs on a treadmill. On the other side, Bolt runs under the same conditions. The comparison makes the difference clear. As the pace increases, Wang struggles to keep up and eventually gives up, while Bolt continues running smoothly, maintaining balance as its stride rate increases.
Bolt takes shorter strides than a human runner but makes up for it with a much faster stride rhythm. That faster rhythm helps the robot stay stable as it accelerates. Engineers say this performance reflects major progress in humanoid locomotion control, dynamic balance and high-performance drive systems. Speed is impressive. Speed with control is the real achievement.
The humanoid robot design choices behind Bolt’s speed
Bolt stands about 5 feet, 7 inches tall and weighs roughly 165 pounds, putting it close to the size and mass of an average adult human. MirrorMe says that similarity is intentional. The company describes this as the ideal humanoid form.
Rather than oversized limbs or exaggerated mechanics, Bolt relies on newly designed joints paired with a fully optimized power system. The goal is to replicate natural human motion while staying stable at extreme speeds. That combination is what sets Bolt apart.
HUMANOID ROBOTS ARE GETTING SMALLER, SAFER AND CLOSER
MirrorMe says Bolt’s 22 mph run highlights stability and control, not just raw speed. ( Cui Jun/Beijing Youth Daily/VCG via Getty Images)
Why Bolt’s sprint reflects years of robotics development
Bolt did not appear overnight. MirrorMe has focused on robotic speed as a long-term priority since 2016. Last year, its Black Panther II robot stunned viewers by sprinting 328 feet in 13.17 seconds during a live television broadcast in China. Reports suggested the performance exceeded comparable tests involving Boston Dynamics machines.
In 2025, the company also set a record with a four-legged robot that surpassed 22 mph, reinforcing its focus on acceleration, agility and sustained high-speed motion. China’s interest in robotic athletics continues to grow. Beijing even hosted the first World Humanoid Robot Games, where humanoid robots competed in sprint races on a track.
Why MirrorMe says speed is not the end goal
Running at 22 mph grabs attention, but MirrorMe says speed alone is not the point. The engineers behind Bolt care more about what happens at that speed. Balance, reaction time and control matter more than a headline number. Those skills are what let a humanoid robot move like a trained runner instead of a machine on the verge of tipping over.
That is where the athlete angle comes in. MirrorMe envisions Bolt as a training partner that can run alongside elite athletes, hold a steady pace and push limits without getting tired. By matching and slightly exceeding human performance, the robot could help runners fine-tune form, pacing and endurance while collecting precise motion data. In that context, the sprint is not a stunt. It shows how humanoid robots could move beyond demos and into real training and performance settings.
What this means to you
Humanoid robots that can run at highway speeds are no longer something you only see in demos or concept videos. As these machines get faster and more stable, they start to fit into real-world roles. That includes athletic training, emergency response and physically demanding jobs where speed and endurance make a real difference. At the same time, faster robots bring real concerns. Safety, oversight and clear rules matter even more when machines can move this quickly around people. When robots run this fast, the limits need to be clear.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
HUMANOID ROBOT MAKES ARCHITECTURAL HISTORY BY DESIGNING A BUILDING
Engineers say Bolt’s high-speed sprint reflects advances in locomotion control, balance and drive systems. (Photo by Kevin Frayer/Getty Images)
Kurt’s key takeaways
Bolt running at 22 mph is eye-catching, but the speed is not the main takeaway. What matters is what it shows. Robots are starting to move more like people. They can run, adjust and stay upright at speeds that used to knock machines over. That opens the door to real uses, but it also raises real questions. How fast is too fast around people? Who sets the rules? And who is responsible when something goes wrong? The technology is moving quickly. The conversation around it needs to move just as fast.
If humanoid robots can soon outrun and outtrain humans, where should limits be set on how and where they are allowed to operate? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
4chan’s creator says ‘Epstein had nothing to do’ with creating infamous far-right board /pol/
Epstein had nothing to do with the reintroduction of a politics board to 4chan, nor anything else related to the site. The decision to add the board was made weeks beforehand, and the board was added almost 24 hours prior to a first, chance encounter at a social event. His assistant reached out to me afterward, and I met with him one time for an unmemorable lunch meeting. This happened at a time when I was meeting hundreds of people a month while speaking and networking at tech events.
I did not meet him again nor maintain contact. I regret having ever encountered him at all, and have deep sympathy for all of his victims.
-
Politics1 week agoWhite House says murder rate plummeted to lowest level since 1900 under Trump administration
-
Alabama1 week agoGeneva’s Kiera Howell, 16, auditions for ‘American Idol’ season 24
-
Ohio1 week agoOhio town launching treasure hunt for $10K worth of gold, jewelry
-
Culture1 week agoIs Emily Brontë’s ‘Wuthering Heights’ Actually the Greatest Love Story of All Time?
-
News1 week agoThe Long Goodbye: A California Couple Self-Deports to Mexico
-
Science1 week agoVideo: Rare Giant Phantom Jelly Spotted in Deep Waters Near Argentina
-
Culture1 week agoVideo: Farewell, Pocket Books
-
News1 week agoVideo: Investigators Say Doorbell Camera Was Disconnected Before Nancy Guthrie’s Kidnapping