Technology
Iran-linked hackers target US medical tech company
NEWYou can now listen to Fox News articles!
When most people hear about cyberattacks tied to geopolitical conflict, it can seem far away. It sounds like something that happens to governments or giant corporations. Yet the latest cyber incident involving a U.S. medical technology company shows how fragile digital systems can be. Even more important, it raises a question you should all ask yourself: Are you protected against trouble, too?
A hacker group linked to Iran has claimed responsibility for a cyberattack on Stryker, a Michigan-based company that produces medical equipment and healthcare technology used worldwide. Stryker employs about 56,000 people and operates in more than 60 countries, making it one of the largest medical technology companies in the world.
Stryker disclosed the incident in a filing with the U.S. Securities and Exchange Commission, saying the disruption affected parts of its Microsoft environment and that investigators are working to determine the full scope.
The incident appears to be one of the most significant cyber incidents linked to the current conflict so far.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Laboratory assistants from the company BioNTech wear Stryker medical gear in a clean room at a production site in Marburg, Germany, in March 2021. (Boris Roessler/picture alliance via Getty Images)
What happened in the Stryker cyberattack
According to reports, the attack disrupted parts of Stryker’s global network environment. Reports indicate the outages began shortly after midnight on Wednesday on the East Coast. Employees suddenly discovered that their work-issued phones stopped functioning. Communication across teams stalled as devices became unusable.
ANDROID FIXES 129 SECURITY FLAWS IN MAJOR PHONE UPDATE
The hacker group Handala claimed responsibility on social media platforms, including Telegram and X. However, the claim has not been independently verified. Some employees also reported seeing the hacker group’s logo appear on company login pages during the disruption. In posts online, the group said the attack was retaliation for a bombing at a school in Minab, Iran, though those claims have not been independently verified.
Security experts believe the attackers may have gained access to the company’s Microsoft Intune management console. This platform allows companies to manage corporate devices such as smartphones and laptops remotely. Once inside that system, attackers appear to have triggered a powerful administrative feature. Reports suggest many company-connected phones and laptops were wiped back to factory settings.
Signage at the Stryker Corp. headquarters in Portage, Michigan, on Thursday, March 12, 2026. A cyberattack on Stryker Corp. has kept the medical technology company’s ordering and shipping systems offline as the firm continues to struggle to address a crippling hack claimed by a group linked to Iran. (Kristen Norman/Bloomberg via Getty Images)
How hackers may have used legitimate tools against the company
The attack did not rely on traditional ransomware or malware. Instead, the hackers appear to have used a legitimate system feature in a destructive way. Remote wipe tools exist for good reasons. Companies use them when a device is lost, stolen or retired. However, if attackers gain control of the management console, those same tools can become weapons. Some cybersecurity researchers believe attackers may have accessed the company’s Microsoft Intune device management system, though the exact method of the attack has not been publicly confirmed.
Once the attackers accessed the device management system, they likely triggered remote wipe commands across multiple employee devices. The result looked like a mass reset event that effectively shut down normal operations. Stryker later confirmed it experienced a cybersecurity incident affecting its Microsoft environment. The company said it saw no evidence of ransomware or malware and believes the incident is contained. Stryker said it has activated business continuity measures so it can continue supporting customers and partners while systems are restored.
Iran’s long history of destructive cyberattacks
This type of attack fits into a broader pattern. Iran-linked groups have previously launched some of the most damaging “wiper” cyberattacks on record. These attacks aim to destroy data rather than steal it.
Two notable examples include:
Since the start of the current conflict, cybersecurity companies such as Google and Proofpoint have mostly observed Iranian groups conducting espionage operations. However, the Stryker disruption may signal a shift toward more aggressive actions targeting corporate infrastructure. We contacted both Stryker and Microsoft for comment but did not hear back before our deadline.
Why this matters beyond one company
Large cyber incidents rarely stay isolated. When attackers demonstrate a new method, other groups often study and reuse it. That means techniques used against a corporation today can show up in smaller attacks tomorrow. Small businesses, hospitals and even individuals sometimes become targets when criminals adapt the same tactics. In other words, this story about a medical technology company also carries a warning for everyday digital life.
The logo of Stryker medical technology is seen on their plant in the IDA (Industrial Development Agency) estate, in Carrigtwohill, County Cork, Ireland on March 28, 2025. (Reuters/Clodagh Kilcoyne)
How to protect yourself from cyberattacks and device wipe threats
Cyberattacks against corporations reveal weaknesses that can affect anyone who uses connected devices. A few proactive steps can reduce your risk.
1) Use strong and unique passwords
Never reuse passwords across accounts. If attackers obtain one password, they often test it across many services. Consider using a password manager to generate and securely store complex passwords, so you do not need to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com
2) Enable two-factor authentication
Adding a second verification step, such as two-factor authentication (2FA), can stop attackers even if they obtain your password.
3) Consider a data removal service
Data broker sites collect and sell personal details that criminals may exploit. Removing that information can reduce your exposure. Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
4) Install strong antivirus software
Reliable antivirus protection helps detect suspicious activity, phishing attempts and malware before it can spread. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Back up important files regularly
If a device is wiped or compromised, backups allow you to restore critical data quickly.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Cyberattacks once focused mainly on stealing information. Today, many attackers try to disrupt systems, erase data or create chaos. The reported incident involving Stryker shows how hackers can turn everyday administrative tools into powerful weapons. If someone gains access to the right controls, they may not need traditional malware at all. For many people, cyber conflict between countries can seem far away. Yet the same technology involved in those attacks powers the devices and services we rely on every day. Your phone, laptop and cloud accounts all connect to systems that depend on trust and access permissions. That is why digital safety now requires layers of protection. Strong passwords help. Secure devices help. Staying aware of threats helps, too. Preparation can make the difference between a quick recovery and a major disruption. If something unexpected happens, the people who bounce back fastest are usually those who took a few steps to protect themselves in advance.
And that leads to an important question: If your phone, laptop or cloud account were suddenly wiped tomorrow, would you be ready to recover? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Snap, YouTube, and TikTok settle suit over harm to students
Snap, YouTube, and TikTok have settled the first lawsuit of its kind, alleging that social media addiction has cost public schools massive amounts of money, according to Bloomberg. The suit, filed by the Breathitt County School District in Kentucky, claims that social media has disrupted learning and created a mental health crisis, straining budgets. The terms of the settlement have not been revealed yet, and Meta is still facing a trial in the same suit, which is viewed as a bellwether for over 1,000 similar lawsuits across the country
This follows an earlier case, settled by Snap and TikTok, in which a 19-year-old plaintiff claimed significant personal injury due to addictive social media apps. Google and Meta did not agree to a settlement in that suit, and it eventually went to trial, where a jury awarded the plaintiff $6 million. Meta also recently lost a suit brought by New Mexico’s Attorney General, to the tune of $375 million.
Beyond monetary awards, many, including New Mexico, are pushing for significant changes to social media apps to limit their harm to minors. And this is just the start of what’s shaping up to be a busy year for social media lawsuits. According to Bloomberg, lawyers representing school districts said their “focus remains on pursuing justice for the remaining 1,200 school districts who have filed cases.”
Technology
Missed voicemails with no calls? It could be a scam
NEWYou can now listen to Fox News articles!
It starts quietly. Your phone buzzes. You see a voicemail notification. But your phone never rang. Then it happens again. And again. Before long, your voicemail inbox looks like it’s under attack.
That’s exactly what Mike from Westport, CT, is dealing with right now. He wrote to us saying,
“I am so upset. Every 20 to 30 minutes, I am getting voicemails, but what’s weird is my phone never rings. After blocking the number, it just rolls over to a new source number. When I go to play the message, there is no audio. Is this a scammer just trying to get me to call them back? Not sure what the endgame is here. What can I do to stop this from happening? I really appreciate your help.”
What he is describing is something we’re seeing more often. It may feel random, but there’s a clear pattern behind this voicemail scam and here’s what you need to know to stay safe.
RECEIVING UNEXPECTED INTERNATIONAL CALLS? WHAT YOU NEED TO KNOW
Silent voicemail scams can flood a phone with blank messages even when the device never rings. (Getty Images)
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
What the silent voicemail scam actually is
This tactic is often called a silent voicemail scam or ringless voicemail spam. Here’s how it works in plain terms:
- Scammers drop voicemail messages directly into your inbox
- Your phone never rings, so it feels strange and urgent
- The message is blank, garbled or extremely short
- The number changes constantly to avoid blocks
At first glance, it looks like a glitch. That confusion is the point.
What’s really happening behind the scenes
This pattern almost always points to automated robocall systems using caller ID spoofing, not real people manually calling you.
Here’s what’s likely happening:
- Automated dialing systems are repeatedly hitting your number
- They use spoofed or constantly changing caller IDs, which is why blocking one number doesn’t stop it
- Some calls connect briefly, then drop, leaving behind a silent or very short voicemail
- In some cases, the system is “pinging” your number to confirm it’s active
Once a number is confirmed as active, it can be shared across spam networks and used in future campaigns.
Why scammers leave empty voicemails
It seems pointless, but there’s a strategy behind it.
1) They want you to call back
Curiosity does the work for them. Many people return the call just to figure out what happened. When you call back, you may:
- Reach a premium-rate number that charges per minute
- Get routed into a scam call center
- Confirm your number is active and monitored
2) They test if your number is real
Even if you never call back, your voicemail confirms your number is in use. That makes it more valuable for future scams.
3) They try to bypass spam filters
Because your phone never rings, traditional call filters may not catch it. That lets more of these messages slip through.
Why do the numbers keep changing
You block one number, and another appears minutes later. That’s usually a sign of caller ID spoofing and number cycling. Scammers use software to falsify the number that shows up on your phone and rotate through large batches of numbers to stay ahead of blocks and spam filters. Some of those numbers may be completely fabricated, while others may belong to real people whose caller ID information is being misused. Many of those numbers are:
- Fake
- Reassigned or temporarily used
- Tied to real people who have no idea their number is being spoofed
Blocking a single number can still be worth doing, but it usually will not stop the campaign by itself because the caller can keep switching numbers.
GOOGLE SEARCH LED TO A COSTLY SCAM CALL
Scammers may use ringless voicemail spam and caller ID spoofing to test whether a phone number is active. (Getty Images)
Is your phone being hacked?
This is one of the first things many people worry about. In most cases, no. These silent voicemails are more likely to be part of a scam call or robocall campaign than a sign that your phone has been hacked. Scammers can use tactics such as caller ID spoofing and ringless voicemail to reach you without making the call feel normal.
The bigger risk isn’t your phone itself. It’s how the scam tries to get you to respond. Calling back, pressing prompts or engaging with the message can confirm that your number is active and may expose you to more scam attempts. The FTC specifically advises people to hang up or delete the voicemail and not call back unknown numbers.
How to stop silent voicemail scams
You don’t have to just put up with it. There are ways to reduce or stop these messages.
1) Do not call back unknown numbers
Even if it feels harmless, skip it. If it’s important, the caller will leave a real message.
2) Enable spam call filtering
On iPhone and Android, turn on built-in call filtering and silence unknown callers. This helps reduce future attempts.
How to enable spam call filtering
On iPhone (latest iOS)
Apple now gives you two strong options: Silence Unknown Callers and Call Screening.
Option 1: Silence unknown callers
- Open Settings
- Tap Apps
- Tap Phone
- Scroll down and turn on Unknown Callers
This sends calls from numbers not in your contacts straight to voicemail without ringing.
Option 2: Turn on Call Screening (recommended)
- Open Settings
- Tap Apps
- Tap Phone
- Scroll down and under Screen Unknown Callers, select Ask Reason for Calling
This feature prompts unknown callers to say who they are before your phone rings, which filters out many spam calls automatically.
Optional: Enable spam identification
- Go to Settings
- Tap Apps
- Tap Phone
- Tap Call Blocking & Identification
- Tap Business Call Identification
- Make sure it is set to ON
This allows your iPhone to show verified business names and logos for legitimate callers when available.
On Samsung
Samsung combines spam protection with AI call screening.
Settings and feature names may vary depending on your Samsung model, carrier and software version.
Option 1: Turn on spam protection
- Open the Phone app
- Tap the three-dot menu (top right)
- Tap Settings
- Tap Caller ID and spam protection
- Toggle it ON
This flags suspected spam calls before you answer.
Option 2: Block unknown callers
- Open the Phone app
- Tap the three-dot menu (top right)
- Tap Settings
- Tap Block numbers
- Turn on Block calls from unknown numbers
This stops hidden or unidentified numbers from ringing your phone.
Option 3: Enable Call Screen (best option)
- Open the Phone app
- Tap the three-dot menu (top right)
- Tap Settings
- Tap Bixby Text Call or just Text Call
- Toggle it ON
This lets your phone answer unknown calls with AI and show you what the caller says in real time.
One important reality check: Even with these turned on, some calls may still go to voicemail. That’s because voicemail is controlled by your carrier, not your phone.
HOW TO STOP SPAM MAIL, POLITICAL TEXTS AND EMAIL SPAM FOR GOOD
Unknown voicemail messages that contain no audio may be part of an automated robocall campaign. (Kurt “CyberGuy” Knutsson)
3) Use a call-blocking app
Apps can spot patterns faster than manual blocking and stop repeat offenders. Many of these apps can also identify known scam numbers and automatically block high-risk calls, helping reduce how often your phone gets hit.
4) Contact your carrier
Many carriers offer network-level spam blocking. Ask about tools that block ringless voicemail or robocalls.
5) Use a data removal service
If your number keeps getting hit, it may already be circulating on marketing lists or data broker sites. These data removal services scan for your personal information and help remove it from databases that scammers often tap into. Cutting down where your number appears can reduce how often you get targeted over time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
6) Report the activity
You can report unwanted calls and voicemails to the Federal Trade Commission at reportfraud.ftc.gov or by calling 1-877-FTC-HELP (1-877-382-4357). Reports help track and shut down large scam campaigns.
7) Protect your number going forward
Avoid posting your phone number publicly. The less exposure it has, the harder it is for scammers to target you.
8) Register your phone number on the National Do Not Call Registry at donotcall.gov/
This can help reduce telemarketing calls from legitimate businesses, but it unfortunately won’t stop scammers, illegal robocalls, or exempt organizations (like charities and political groups) from calling you. Scammers often ignore the registry and use tactics like number spoofing to bypass it. Want to know more about why your phone still won’t stop ringing and what you can do about it? Check out our article on the ‘Do Not Call’ list loophole.
Kurt’s key takeaways
Silent voicemails are designed to mess with your instincts. They rely on curiosity and confusion, not sophisticated hacking. The best move is simple. Don’t engage. Let them hit a dead end. Over time, that tells the system your number isn’t worth the effort.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
So here’s the real question: If scammers are counting on curiosity to hook you, how often do you think that instinct is working on other people right now? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Xbox is now XBOX
Xbox just allcapsmaxxed: Meet XBOX. This isn’t a joke; Microsoft appears to be actually rebranding Xbox to XBOX. Asha Sharma, Xbox CEO, ran a poll on X earlier this week, asking fans whether Microsoft should use Xbox or XBOX. The results were in favor of XBOX, and the company has now renamed its X account.
Curiously, the Threads and Bluesky accounts for Xbox haven’t been renamed yet, but if Microsoft is going ahead with a rebranding then I expect those will change soon. I asked Microsoft to comment on this potential Xbox rebranding and the company simply referred me to Sharma’s post.
The use of all caps for Xbox is a return to original form, though. Microsoft’s first Xbox logo for its console was all caps, and the company has favored using similar capped versions for the Xbox 360, Xbox One, and Xbox Series X / S console logos.
The apparent rebranding comes just a few weeks after Sharma scrapped Microsoft Gaming and renamed Microsoft’s gaming division back to Xbox. It’s part of Sharma’s continued promise of a “return of Xbox,” which has involved fan-focused console updates, a new Xbox logo, Game Pass pricing changes, and lots more in recent weeks.
-
Ohio2 minutes agoOhio Highway Patrol investigating fatal head-on crash on U.S. Route 62
-
Oklahoma8 minutes agoOklahoma ‘Getting Gritty’ After SEC Tournament Loss
-
Oregon14 minutes agoRecall issued for organic ice cream sold in Oregon over metal concerns
-
Pennsylvania21 minutes agoSen. McCormick tours NSF-funded AI-powered biotech labs at Penn
-
Rhode Island26 minutes agoWhat to expect at Roger Wheeler and Misquamicut beaches this summer
-
South-Carolina32 minutes agoSouth Carolina lands commitment from big transfer portal offensive lineman
-
South Dakota39 minutes agoFact brief: Was an east-west split of Dakota Territory considered?
-
Tennessee45 minutes agoTennessee man arrested after kidnapping his two grandchildren