Connect with us

Technology

Is someone (or something) snooping on your computer?

Published

on

Is someone (or something) snooping on your computer?

Join Fox News for access to this content

Plus get unlimited access to thousands of articles, videos and more with your free account!

Please enter a valid email address.

By entering your email, you are agreeing to Fox News Terms of Service and Privacy Policy, which includes our Notice of Financial Incentive. To access the content, check your email and follow the instructions provided.

By now, you know that online privacy is a thing of the past. Sure, there are things you can do to remove your info from the web or stop companies from tracking you.

But what if the culprit is someone you know? I hear from folks all the time who suspect someone knows a little too much for a very sinister reason. Here’s a check to see if a copy of everything you do on your PC or Mac is being gathered and sent to who knows who.

Advertisement

We’re giving away a $1,000 computer — Mac or Windows, your choice! Enter to win here. Good luck!

CHARGING AND TRAVEL: 5 MALWARE MISTAKES MOST PEOPLE MAKE

1. Check the Task Manager or Activity Monitor

I don’t mean some creep is logging into your computer daily, though that’s certainly possible. More likely, the person planted malware that does all the work behind the scenes. That could be a hacker, a jealous ex, a relative or even your boss.

Malware comes in various forms that all behave a bit differently. Some are impossible to miss — like ransomware —and others keep a low profile.

A participant uses a laptop computer as he takes part in the SECCON 2017 final competition on February 18, 2018 in Tokyo, Japan. (Photo by Tomohiro Ohsumi/Getty Images)

Advertisement

Spyware is subtle. It hides in your system, keeping track of every password you type, every video call you make and every email you send. The good news is even sneaky software can leave behind breadcrumbs.

Your first stop is the spot that gives you an overview of everything happening on your machine.

On a Windows PC:

  • Open the Task Manager by hitting Ctrl + Shift + Esc. Under the Processes tab, you’ll see the apps and background processes running on your PC.
  • Look through the list. If you see a name you don’t recognize, do a search online to see what turns up. Sometimes, these programs and background processes are legitimate and of no concern, even if you don’t know the name at first glance.
  • To close out an app or process, right-click and hit End task.

On a Mac:

  • To open the Activity Monitor, hit Command + Spacebar to open Spotlight Search.
  • Type Activity Monitor and press Enter. Check over the list for anything you don’t recognize.
  • To close out a program or process, double-click, then hit Quit.

2. Spot the red flags that something is up

One telltale sign of a malware infection? Processes start on their own. Don’t write it off if an app launches itself out of the blue.

FIVE SMART, SIMPLE TECH CHANGES TO MAKE 2024 BETTER

Say you only have a couple of apps that open when you start up your computer. If a different window briefly appears before flicking out of existence, it could be a spyware program loading. They’re designed to disappear.

Keep tabs on what should happen when you start your computer so you know if anything strange is happening.

Advertisement

A hand on the keyboard is seen with binary code displayed on a laptop screen in this illustration photo taken in Krakow, Poland on August 17, 2021. (Photo by Jakub Porzycki/NurPhoto via Getty Images)

How to check or change startup apps on a PC:

  • Click the Start menu.
  • Select Settings (cog icon) and click Apps.
  • In the left menu, click Startup at the bottom.

The Startup panel displays the apps installed on your machine. If Windows has measured the impact of that app on your PC, you will see a rating next to it. Options include No impact, Low impact, Medium impact, and High impact.

An app with a high impact can slow down your startup time. Go through the list and determine which apps you don’t need immediately after startup. Toggle each slider next to the app to turn it on or off.

How to change startup apps on a Mac:

  • Click on the Apple menu, then System Preferences.
  • Click Users & Groups.
  • Select your User Account, then click Login Items on the top right.

Here you’ll see a list of the applications that open automatically when you log in.

To prevent an app from running automatically, click Remove a login item. Then select the app’s name you want to block and click the Remove button below the list.

HAVE ANY NEW TECH? TAKE STEPS NOW TO SECURE YOUR PRIVACY

You can use the checkbox to hide items you would like to launch. Hit the plus symbol under the list and find it on your computer to add a new item.

Advertisement

A person dressed as an internet hacker is seen with binary code displayed on a laptop screen in this illustration photo taken in Krakow, Poland on August 17, 2021. (Photo by Jakub Porzycki/NurPhoto via Getty Images)

3. Stay up to date

Updates pop up when you’re busy, and you don’t want to deal with bugs and other issues the latest version of Windows or macOS introduces. Still, keeping your system up to date is one of the best ways to keep up with the constant flood of junk looking to root its way into your computer. Just do it.

To update your PC:

  • Click the Start Menu and open Settings.
  • Click Update & Security > Windows Update.

You’ll see if updates are available for download. If an update is available, click Download and Install. If you don’t see an available update, click Check for Updates to force the process.

To update your Mac:

  • Click the Apple icon from the menu bar at the top of the screen.
  • Hit System Preferences > Software Update.

From here, you can also enable automatic updates by checking the box at the bottom of the window. For more options, click Advanced.

PODCAST PICK: Budget Ozempic, avoid return fees & online piracy amps up

Plus, we’re TikTok tips that pros warn are your plants’ worst nightmare. Andrew has a wild story about getting scammed on a dating app. It’s cold outside, so here are some top tricks for staying warm with your tech. And, as always, listener letters. You won’t believe what one guy called me.

Check out my podcast “Kim Komando Today” on Apple, Google Podcasts, Spotify, or your favorite podcast player.

Advertisement

Listen to the podcast here or wherever you get your podcasts. Just search for my last name, “Komando.”

CLICK HERE TO GET FOX NEWS APP

Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Listen on 425+ radio stations or get the podcast. And join over 400,000 people who get her free 5-minute daily email newsletter.

Copyright 2024, WestStar Multimedia Entertainment. All rights reserved.

Advertisement

Technology

January scams surge: Why fraud spikes at the start of the year

Published

on

January scams surge: Why fraud spikes at the start of the year

NEWYou can now listen to Fox News articles!

Every January, I hear from people who say the same thing: “I just got an email that looked official, and I almost fell for it.” That’s not a coincidence. January is one of the busiest months of the year for scammers. While most of us are focused on taxes, benefits, subscriptions, and getting our finances in order, criminals are doing their own kind of cleanup, refreshing scam lists and going after people with newly updated personal data. If you’ve ever received a message claiming your account needs to be “verified,” your benefits are at risk, or your tax information is incomplete, this article is for you.

Sign up for my FREE CyberGuy Report

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026

Advertisement

Scam messages often look urgent and official, pushing you to act before you have time to think. That pressure is exactly what criminals rely on. (Kurt “CyberGuy” Knutsson)

Why January is prime time for scammers

January is when scammers have everything they need. According to YouMail’s Robocall Index, U.S. consumers received just over 4.7 billion robocalls in January 2025, a roughly 9% increase from December 2024. This year, we can expect the same pattern from scammers.

They know:

But the biggest reason scams spike now? Your personal data is easier to find than you think. Data brokers quietly collect and update profiles year after year. By January, those profiles are often more complete than ever, and scammers know it.

The “account verification” scam you’ll see everywhere

One of the most common January scams looks harmless at first. You get a message saying:

Advertisement
  • “Your Social Security account needs verification”
  • “Your Medicare information has to be updated”
  • “Your benefits could be delayed without action”

The message sounds official. Sometimes it even uses your real name or location. That’s where people get tricked. Government agencies don’t ask for sensitive information through random emails or texts. Scammers rely on urgency and familiarity to push you into reacting before thinking.

My rule: If you didn’t initiate the request, don’t respond to it. Always go directly to the agency’s official website or phone number, never through a link sent to you.

MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA

January is a prime time for fraud because people are dealing with taxes, benefits and account updates. Scammers know these messages feel expected and familiar. (Kurt “CyberGuy” Knutsson)

Fake tax and benefits notices ramp up in January

Another favorite scam this time of year involves taxes and refunds.

You may see:

Advertisement
  • Emails claiming you owe back taxes
  • Messages saying you’re due a refund
  • Notices asking you to “confirm” banking information.

These scams work because they arrive at exactly the moment people expect to hear from tax agencies or benefits programs.

Scammers don’t need much to sound convincing. A name, an email address or an old address is often enough. If you get a tax-related message out of the blue, slow down. Real agencies don’t pressure you to act immediately.

Subscription “problems” that aren’t real

January is also when subscription scams explode. Fake messages claim:

Scammers know most people have subscriptions, so they play the odds. Instead of clicking, open the app or website directly. If there’s a real problem, you’ll see it there.

Why these scams feel so personal

People often tell me, “But they used my name, how did they know?” Here’s the uncomfortable truth: They probably bought it. Data brokers compile massive profiles that include:

  • Address histories
  • Phone numbers and emails
  • Family connections
  • Shopping behavior.

That data is sold, shared and leaked. Once scammers have it, they can tailor messages that feel real, because they’re built on real information.

10 WAYS TO PROTECT SENIORS FROM EMAIL SCAMS

Advertisement

The more personal data scammers have, the more convincing their messages become. Removing your information from data broker sites can help reduce targeted scams over time. (Kurt “CyberGuy” Knutsson)

What you should do right now

Before January gets any busier, take these steps to reduce your exposure to scams and fraud:

1) Remove your personal data from broker sites

Deleting emails or blocking numbers helps, but it does not stop scams at the source. Scammers rely on data broker sites that quietly collect, update and sell your personal information. Removing your data from those sites reduces scam calls, phishing emails and targeted texts over time. It also makes it harder for criminals to personalize messages using your real name, address or family connections. You have two ways to do this:

Do it yourself:

You can visit individual data broker websites, search for your profile and submit opt-out requests.This method works, but it takes time. Each site has its own rules, identity verification steps, and response timelines. Many brokers also re-add data later, which means you have to repeat the process regularly.

Advertisement

Use a data removal service:

A data removal service automates the opt-out process by contacting hundreds of data brokers on your behalf and monitoring for re-listings. This option saves time and provides ongoing protection, especially if you want long-term results without constant follow-ups.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

Advertisement

2) Don’t click links in unexpected messages

If you did not initiate the request, do not click. Scam messages are designed to create urgency, especially around taxes, benefits and account issues. Instead, go directly to the official website by typing the address yourself or using a saved bookmark. This single habit prevents most phishing attacks.

3) Turn on two-factor authentication wherever possible

Two-factor authentication (2FA) adds a critical second layer of protection. Even if someone gets your password, they still cannot access your account without the second verification code. Start with email, financial accounts, social media and government services.

4) Check accounts only through official apps or websites

If you receive a warning about an account problem, do not trust the message itself. Open the official app or website, and check there. If something is wrong, you will see it immediately. If not, you just avoided a scam.

5) Watch for account alerts and login activity

Enable login alerts and security notifications on important accounts. These alerts can warn you if someone tries to sign in from a new device or location. Early warnings give you time to act before real damage occurs.

6) Use strong, unique passwords and a password manager

Reusing passwords makes it easy for scammers to take over multiple accounts at once. If one service is compromised, attackers try the same login on email, banking, and social media accounts. A password manager helps you create and store strong, unique passwords for every account without needing to remember them. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaways

January scams aren’t random. They’re targeted, timed and fueled by personal data that shouldn’t be public in the first place. The longer your information stays online, the easier it is for scammers to use it against you. If you want a quieter inbox, fewer scam calls and less risk this year, take action early, before criminals finish rebuilding their lists. Protect your data now, and you’ll be safer all year long.

Have you noticed more scam emails, texts or calls since the new year started? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report. Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Advertisement

Continue Reading

Technology

Casting is dead. Long live casting!

Published

on

Casting is dead. Long live casting!

This is Lowpass by Janko Roettgers, a newsletter on the ever-evolving intersection of tech and entertainment, syndicated just for The Verge subscribers once a week.

Last month, Netflix made the surprising decision to kill off a key feature: With no prior warning, the company removed the ability to cast videos from its mobile apps to a wide range of smart TVs and streaming devices. Casting is now only supported on older Chromecast streaming adapters that didn’t ship with a remote, Nest Hub smart displays, and select Vizio and Compal smart TVs.

That’s a stunning departure for the company. Prior to those changes, Netflix allowed casting to a wide range of devices that officially supported Google’s casting technology, including Android TVs made by companies like Philips, Polaroid, Sharp, Skyworth, Soniq, Sony, Toshiba, and Vizio, according to an archived version of Netflix’s website.

But the streaming service didn’t stop there. Prior to last month’s changes, Netflix also offered what the company called “Netflix 2nd Screen” casting functionality on a wide range of additional devices, including Sony’s PlayStation, TVs made by LG and Samsung, Roku TVs and streaming adapters, and many other devices. Basically, if a smart TV or streaming device was running the Netflix app, it most likely also supported casting.

That’s because Netflix actually laid the groundwork for this technology 15 years ago. Back in 2011, some of the company’s engineers were exploring ways to more tightly integrate people’s phones with their TVs. “At about the same time, we learned that the YouTube team was interested in much the same thing — they had already started to do some work on [second] screen use cases,” said Scott Mirer, director of product management at Netflix at the time, in 2013.

Advertisement

The two companies started to collaborate and enlist help from TV makers like Sony and Samsung. The result was DIAL (short for “Discovery and Launch”) — an open second-screen protocol that formalized casting.

In 2012, Netflix was the first major streaming service to add a casting feature to its mobile app, which at the time allowed PlayStation 3 owners to launch video playback from their phones. A year later, Google launched its very first Chromecast dongle, which took ideas from DIAL and incorporated them into Google’s own proprietary casting technology.

For a while, casting was extremely popular. Google sold over 100 million Chromecast adapters, and Vizio even built a whole TV around casting, which shipped with a tablet instead of a remote. (It flopped. Turns out people still love physical remotes.)

But as smart TVs became more capable, and streaming services invested more heavily into native apps on those TVs, the need for casting gradually decreased. At CES, a streaming service operator told me that casting used to be absolutely essential for his service. Nowadays, even among the service’s Android users, only about 10 percent are casting.

As for Netflix, it’s unlikely the company will change its tune on casting. Netflix declined to comment when asked about discontinuing the feature. My best guess is that casting was sacrificed in favor of new features like cloud gaming and interactive voting. Gaming in particular already involves multidevice connectivity, as Netflix uses phones as game controllers. Adding casting to that mix simply might have proven too complex.

Advertisement

However, not everyone has given up on casting. In fact, the technology is still gaining new supporters. Last month, Apple added Google Cast support to its Apple TV app on Android for the first time. And over the past two years, both Samsung and LG incorporated Google’s casting tech into some of their TV sets.

“Google Cast continues to be a key experience that we’re invested in — bringing the convenience of seamless content sharing from phones to TVs, whether you’re at home or staying in a hotel,” says Google’s Android platform PM Neha Dixit. “Stay tuned for more to come this year.”

Google’s efforts are getting some competition from the Connectivity Standards Alliance, the group behind the Matter smart home standard, which developed its own Matter Casting protocol. Matter Casting promises to be a more open approach toward casting and in theory allows streaming services and device makers to bring second-screen use cases to their apps and devices without having to strike deals with Google.

“We are a longtime advocate of using open technology standards to give customers more choice when it comes to using their devices and services,” says Amazon Device Software & Services VP Tapas Roy, whose company is a major backer of Matter and its casting tech. “We welcome and support media developers that want to build to an open standard with the implementation of Matter Casting.”

Thus far, support has been limited though. Fire TVs and Echo Show displays remain the only devices to support Matter Casting, and Amazon’s own apps were long the only ones to make use of the feature. Last month, Tubi jumped on board as well by incorporating Matter Casting into its mobile apps.

Advertisement

Connectivity Standards Alliance technology strategist Christopher LaPré acknowledges that Matter Casting has yet to turn into a breakthrough hit. “To be honest, I have Fire TVs, and I’ve never used it,” he says.

Besides a lack of available content, LaPré also believes Matter Casting is a victim of brand confusion. The problem: TV makers have begun to incorporate Matter into their devices to let consumers control smart lights and thermostats from the couch. Because of that, a TV that dons the Matter logo doesn’t necessarily support Matter Casting.

However, LaPré also believes that Matter Casting could get a boost from two new developments: Matter recently added support for cameras, which adds a new kind of homegrown content people may want to cast. And the consortium is also still working on taking casting beyond screens.

“Audio casting is something that we’re working on,” LaPré confirms. “A lot of speaker companies are interested in that.” The plan is to launch Matter audio casting later this year, at which point device makers, publishers, and consumers could also give video casting another look.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.
Advertisement

Continue Reading

Technology

Instagram password reset surge: Protect your account

Published

on

Instagram password reset surge: Protect your account

NEWYou can now listen to Fox News articles!

If your inbox suddenly shows an Instagram “Reset your password” email you never requested, you are not alone. A wave of unexpected reset messages is hitting people right now, and attackers are betting you will panic, click fast and make a mistake.

Here is the tricky part. Many of these emails are real. They can come directly from Instagram because someone triggered the legitimate password reset flow. That makes the alert feel extra convincing, even when you did nothing wrong.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

FACEBOOK, INSTAGRAM ARE USING YOUR DATA TO TRAIN AI: LEARN HOW TO PROTECT IT

Advertisement

Unexpected Instagram password reset emails can look completely legitimate, which is why so many users are caught off guard during this surge. (Cyverguy.com)

Why Instagram password reset emails are surging

This surge is happening because the reset emails themselves can be real, even when the intent behind them is not. Instead of building fake phishing pages or using malware, attackers take advantage of Instagram’s normal account recovery system.

The process is simple. An attacker enters your username or email into Instagram’s real password reset form. Instagram automatically sends a legitimate reset email to you. The attacker then waits to see how you react.

At this point, your account has not been hacked. The risk comes from what happens next. Attackers are counting on common mistakes, such as clicking the reset button and rushing through the process, reusing a weak password, getting redirected to a fake follow-up page or falling for a second scam email that arrives soon after.

That is why this tactic works as a stress test. It creates urgency and pressure, even though nothing has been compromised yet.

Advertisement

Why attackers love this tactic

This is classic social engineering. The attacker does not need to outsmart Instagram. They need to outsmart you in a stressed moment. A reset email creates urgency. It also feels official. That combination leads people to click first and think second, which is exactly the outcome attackers want. You can treat these surprise reset emails as an early warning system. If you get one:

  • Someone may know your username or email
  • Your account could be on a target list from a leak or scrape
  • Your current security setup will decide whether this stays annoying or turns into a takeover

If an email pressures you to act immediately, threatens account deletion or asks for extra information, treat it as suspicious.

The BreachForums leak connection

The timing of this surge has raised fresh concerns. Reports point to data tied to roughly 17.5 million Instagram accounts being shared on BreachForums, an underground forum where cybercriminals trade and discuss stolen data. The alleged post appeared in early January 2026, which lines up with when many users began reporting a sudden wave of password reset emails, sometimes receiving several in a short period of time.

This timing alone does not prove a direct connection. However, leaked usernames or email addresses can make it much easier for attackers to target large numbers of accounts at once, which is exactly what this kind of reset spam depends on. We reached out to Meta for comment but did not receive a response before our deadline. 

We reached out to Meta for comment, and a spokesperson for the company told CyberGuy, “We fixed an issue that allowed an external party to request password reset emails for some Instagram users. We want to reassure everyone there was no breach of our systems and people’s Instagram accounts remain secure. People can disregard these emails and we apologize for any confusion this may have caused.” 

How to tell if the reset email is legitimate

A legitimate Instagram reset email can still be part of an attack attempt. So your goal is not “confirm it is real,” it is “avoid reacting in a risky way.” Instagram’s own guidance boils down to this:

Advertisement
  • A reset email alone does not mean your account is compromised
  • If you did not request it, do not use the link
  • Use Instagram’s official paths in the app to review security and report suspicious messages

Also, if you get emails about changing your account email address, Instagram says those messages can include a way to reverse the change, which can help you recover if someone broke in.

These real-looking messages are designed to create urgency and push people to click before slowing down and checking their account security. (Cyverguy.com)

What a real Instagram password reset email looks like

A legitimate reset email usually has these elements:

  • Sender: Comes from an official Instagram domain, such as security@mail.instagram.com
  • Subject line: Often says “Reset your Instagram password” or “Password reset request”
  • Instagram branding: Logo at the top with clean formatting
  • Call to action button: A button like “Reset Password”
  • Reassurance text: A line explaining that if you did not request this, you can ignore the email and nothing will change
  • Safety option: Language telling you how to report the email if you did not initiate it

This is why the current surge is so effective. The emails look normal and arrive from real Instagram systems. 

META ENDS FACT-CHECKING PROGRAM AS ZUCKERBERG VOWS TO RESTORE FREE EXPRESSION ON FACEBOOK, INSTAGRAM

What Instagram reset alerts can look like inside the app

You may also see security messages directly in Instagram, such as:

  • Login attempt alerts
  • Notifications about a password reset request
  • Prompts asking you to confirm a login from a new device

These in-app alerts are generally safer to interact with than email links, especially during a surge.

What scammers rely on

Attackers are counting on one thing: panic. When users see a reset email they did not request, many rush to click before reading the fine print. That fast reaction is what turns a harmless reset request into a real account takeover.

Advertisement

What to do right now if you get a reset email you did not request

So, what should you do if one of these password reset emails lands in your inbox? Take a breath first. Then do this.

1) Do not click the button in the email and use strong antivirus software 

Even if the message looks real, treat it like a hot surface. If you want to change your password, do it from the Instagram app or by typing Instagram’s address into your browser yourself. Strong antivirus software adds another layer of protection here. It can help block malicious links, fake login pages and follow-up scams that often appear during a reset email surge.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

2) Check your Instagram security activity in the app

Open Instagram and look for signs someone tried to log in:

Advertisement
  • Unknown devices
  • Login alerts you do not recognize
  • Changes to email, phone number or linked accounts

If anything looks off, remove the device and update your credentials.

3) Turn on two-factor authentication (2FA) and keep it on

Two-factor authentication (2FA) is the biggest roadblock for account takeover. Even if someone knows your password, they still need your code to get in from an unfamiliar device. Instagram has pushed 2FA heavily for higher-risk accounts and urges users to enable it. Use an authenticator app if you can. It is often safer than SMS.

4) Change your password if you feel unsure

If you suspect someone guessed your password, or you reused it elsewhere, change it. Make it long and unique. A password manager can help you generate and store strong passwords without reusing them. Then update the password on your email account too. Your email inbox controls most password resets, so make sure it also uses a strong, unique password.

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com/Passwords) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

5) Use a data removal service to reduce targeting

Password reset surges often follow data leaks. When your email address and personal details appear on data broker sites, attackers can target you more easily. A data removal service helps limit where your information shows up online. By shrinking your digital footprint, you reduce the chances of being singled out during large-scale reset email attacks.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

The safest response is to avoid email links, open the Instagram app directly and review login activity and security settings instead. (Kurt “CyberGuy” Knutsson)

6) Watch for follow-up scams

After a reset surge, criminals often switch tactics. Next, you may see:

Advertisement
  • Fake “Instagram Support” emails
  • DMs claiming your account will be deleted
  • Login approval prompts you did not trigger

Slow down and verify everything inside the app.

Kurt’s key takeaways

A spike in Instagram password reset emails feels scary because it looks like someone is already inside your account. Often, they are not. Still, the surge is a reminder to tighten your basics. Use the app to check security. Turn on two-factor authentication. Change the passwords you reused. Most importantly, do not let an unexpected email rush you into the one click that hands over access.

Have you received an unexpected Instagram password reset email recently, and how did you handle it? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved. 

Advertisement

Continue Reading
Advertisement

Trending