Connect with us

Technology

Is that crypto email legit or just another scam?

Published

on

Is that crypto email legit or just another scam?

Blockchain scams are increasingly prevalent, and it’s essential to understand what they are and how to recognize them before they take a toll on your finances. 

For instance, John from Sunset Beach, North Carolina, recently reached out with a pressing question about some suspicious messages he’s been receiving in his inbox.

“I have been receiving messages from this site for a while. Can you tell me if this is a scam or real? I don’t want to pay good money to get scammed.”

Cryptocurrency scam email (Kurt “CyberGuy” Knutsson)

John’s experience is not unique; many individuals find themselves in similar situations when confronted with potential blockchain scams. These scams can take various forms, often disguised as legitimate offers or services that promise easy returns on investments. Let’s look at the common signs of these scams, why they are so prevalent and what steps you can take to protect yourself from becoming a victim.

Advertisement

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

What is a blockchain scam?

A blockchain scam refers to a deceptive scheme aimed at tricking you into losing your money or digital assets within the cryptocurrency space. As the popularity of cryptocurrencies continues to rise, so does the prevalence of these scams, which exploit the lack of regulation and the anonymity often associated with blockchain technology. In essence, blockchain scams come in various forms, each designed to mislead and defraud unsuspecting victims.

One of the most common types is the “Pump and Dump” scheme. In this scenario, scammers artificially inflate the price of a low-value cryptocurrency by spreading false information or hype. Once the price reaches a certain level, they sell off their holdings, causing the price to plummet and leaving other investors with significant losses.

Another notorious scam is the Initial Coin Offering scam. Here, fraudsters promote a new cryptocurrency project with promises of high returns and innovative technology. However, once they collect funds from investors, they often vanish without delivering any product or service, leaving investors with worthless tokens.

Phishing scams are also rampant in the blockchain world. Scammers impersonate legitimate cryptocurrency platforms or services to trick you into providing sensitive information such as private keys or login credentials. Once they gain access to a victim’s wallet, they can easily transfer funds to their own accounts.

Advertisement

Additionally, there are fraudulent giveaway schemes where scammers promise to double or triple an individual’s cryptocurrency holdings if they send a specific amount to a designated wallet. After sending their funds, victims find that the promised rewards never materialize.

Scammers may also create clone platforms, which mimic popular cryptocurrency exchanges or wallet services. Unsuspecting users believe they are using a legitimate platform and deposit their digital currencies, only to have them stolen by fraudsters.

A man holding cryptocurrency coins (Kurt “CyberGuy” Knutsson)

DON’T GET CAUGHT IN THE ‘APPLE ID SUSPENDED’ PHISHING SCAM

Identifying the red flags of cryptocurrency scams

Here are some of the common elements of such cryptocurrency scam emails.

Advertisement

Unsolicited contact: Legitimate crypto services don’t randomly reach out offering free money. If you receive an unexpected email claiming you’ve won cryptocurrency or are entitled to a payment, it’s a strong indicator that something is off.

Pressure to act: Scammers often create a sense of urgency to push you into making hasty decisions. Phrases like “Act now!” or “Limited time offer!” are red flags that should make you pause and think twice before responding.

Requests for payment: Any service asking for upfront fees to receive crypto is likely a scam. Genuine platforms will never require you to pay before delivering funds or services. So, be wary of any requests for payment in advance.

Suspicious links: Scammers often embed links in emails or messages that lead to phishing sites designed to steal your credentials. Always hover over links to see where they lead before clicking, and if anything looks suspicious, don’t engage. If you have any doubts about a link’s legitimacy, it’s best to avoid clicking on it altogether. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

A man holding a cryptocurrency coin (Kurt “CyberGuy” Knutsson)

Advertisement

YOUR EMAIL DIDN’T EXPIRE, IT’S JUST ANOTHER SNEAKY SCAM

Scammer tactics: How they get your info

Now, you might be wondering, “How did these scammers get my info in the first place?” Great question. Let’s take a quick look at how they manage to dig up your personal details – more than likely through the shady world of data harvesting.

Data breaches: Companies get hacked, and your info gets leaked faster than gossip at a high school reunion. Always monitor your accounts for unusual activity.

Public records: Scammers can piece together your life story from publicly available information, everything from property records to social media profiles.

Social media oversharing: That cute dog pic you posted? It might reveal more than you think about where you live or what you do for fun.

Advertisement

Phishing attacks: Clicking on that “You won’t believe what happened next!” link could lead to malware that steals your data faster than you can say “blockchain.” The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Cryptocurrency on an app on a smartphone (Kurt “CyberGuy” Knutsson)

IS JUST READING THAT SKETCHY SCAMMER’S EMAIL DANGEROUS, OR DO I HAVE TO CLICK ON A LINK TO GET IN TROUBLE? 

Protecting yourself from blockchain scams

Given the decentralized and often anonymous nature of cryptocurrencies, scams pose significant challenges in terms of tracing and recovering lost funds. Therefore, it’s essential for anyone participating in the crypto space to stay informed about these scams, exercise caution when engaging in transactions and follow the steps below.

Advertisement

1. Verify independently: Always log in to your accounts directly, not through email links. Scammers often create fake websites that look almost identical to legitimate ones, so it’s crucial to enter URLs manually or use bookmarks for trusted sites. This simple practice can prevent you from falling victim to phishing attempts.

2. Use strong authentication: Enable two-factor authentication on all your crypto accounts. This adds an extra layer of security by requiring not just your password but also a second form of verification, such as a text message code or an authentication app. Even if someone manages to steal your password, they won’t be able to access your account without this additional verification.

3. Be skeptical: If it sounds too good to be true, it probably is. Scammers often lure victims with promises of guaranteed returns or exclusive investment opportunities. Always approach such offers with skepticism and conduct thorough research before making any commitments.

4. Check email addresses: Scammers frequently use domains that look similar to legitimate ones, so always double-check the email address from which a message originates. A small typo or a different domain can indicate a scam. If you’re unsure, reach out directly to the company using contact information from their official website.

Advertisement

5. Keep software updated: Ensure your devices and antivirus software are up to date. Regular updates often include security patches that protect against vulnerabilities that scammers might exploit. Keeping your software current is a critical step in safeguarding your digital assets.

6. Consider using a data removal service: Personal data removal services can help scrub your personal information from the web, making it harder for scammers to target you with personalized phishing attempts. By reducing your digital footprint, you can significantly decrease the chances of being targeted by malicious actors.

While no service can guarantee the complete removal of your personal data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.

Kurt’s key takeaways

Remember, in the world of crypto, vigilance is your best friend. If you’re ever unsure about an email or offer, it’s always better to err on the side of caution. Don’t hesitate to reach out to official support channels. Stay safe out there, and may your crypto wallets always be full (and scam-free).

Advertisement

Do you believe that cryptocurrency companies are doing enough to protect investors from scams and security threats, or do you think more stringent regulations and measures are needed? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

How Last Samurai Standing adds kinetic action to the Battle Royale formula

Published

on

How Last Samurai Standing adds kinetic action to the Battle Royale formula

Last Samurai Standing begins with a familiar premise. Desperate samurai dispossessed by the restoration of the emperor enter into a deadly game for a life-changing cash prize — all for the entertainment of anonymous elites. Unlike its inspirations Battle Royale and Squid Game, however, Last Samurai Standing’s violence is chaotic, fast-paced, and kinetic, though it hides a careful choreography that makes the series a more electric proposition than its predecessors.

Viewers have Junichi Okada to thank for that. As well as starring in and producing Last Samurai Standing, he serves as the series’ action planner. Many will be familiar with the results of an action planner’s work — sometimes called an action director, elsewhere a “coordinator,” and even “choreographer” — though perhaps not what the role entails. In the case of Last Samurai Standing, it’s a role that touches on nearly every aspect of the production, from the story to the action itself.

“I was involved from the script stage, thinking about what kind of action we wanted and how we would present it in the context of this story,” Okada tells The Verge. “If the director [Michihito Fujii] said, ‘I want to shoot this kind of battle scene,’ I would then think through the content and concept, design the scene, and ultimately translate that into script pages.”

The close relationship between the writer and director extends to other departments, too. Though an action planner’s role starts with managing fight scenes and stunt performers, they also liaise with camera, wardrobe, makeup, and even editorial departments to ensure fight scenes cohere with the rest of the production.

Image: Netflix

Advertisement

It’s a role which might appear a natural progression for Okada, who is certified to teach Kali and Jeet Kune Do — a martial art conceived by Bruce Lee — and holds multiple black belts in jiujitsu. Though the roots of his progression into action planning can be traced back further, to 1995 when he became the youngest member of J-pop group V6.

“Dance experience connects directly to creating action,” he says. “[In both] rhythm and control of the body are extremely important.” Joining V6 at the age of 15, that experience has made Okada conscious of how he moves in relation to a camera during choreography, how he is seen within the structure of a shot, and, critical to action planning, how to navigate all of that safely from a young age.

That J-pop stardom also offered avenues into acting, initially in roles you might expect for a young pop star: comic heartthrobs and sitcom sons. But he was steadily able to broaden his output. A starring turn in Hirokazu Kore-eda’s Hana followed, as did voice acting in Studio Ghibli’s Tales From Earthsea and From Up on Poppy Hill. A more telling departure was a starring role in 2007’s SP, in which he played a rookie in a police bodyguard unit, for which he trained for several years under shootfighting instructor Yorinaga Nakamura.

“What I care about is whether audiences feel that ‘this man really lives here as a samurai.’”

In the years since, Okada has cemented himself as one of Japan’s most recognizable actors, hopping between action starring roles in The Fable to sweeping period epics like Sekigahara. Those two genres converge in his Last Samurai Standing role of Shujiro, a former Shogunate samurai now reduced to poverty, working through his PTSD and reckoning with his bloodthirsty past in the game. These days, it’s less of a concern that the character butts up against his past idol image, he suggests. “What I care about is whether audiences feel that ‘this man really lives here as a samurai.’”

Advertisement

For Okada’s work on Last Samurai Standing, as both producer and action planner, that involved lacing high-octane but believable action with the respect for history and character studies of the period dramas he loves. “Rather than being 100 percent faithful to historical accuracy,” he adds, “my goal was to focus on entertainment and story, while letting the ‘DNA’ and beauty of Japanese period drama gently float up in the background.”

A focus on what he defines as “‘dō’ — movement,” pure entertainment that “never lets the audience get bored” punctuated — with “‘ma,’” the active emptiness that connects those frenetic moments. Both can be conversations, even if one uses words and another communicates dialogue through sword blows. This is most apparent when Shujiro faces his former comrade Sakura (Yasushi Fuchikami) inside a claustrophobic bank vault that serves as a charnel house for the game’s less fortunate contestants.

“The whole battle is divided into three sequences,” Okada says. The first starts with a moment of almost perfect stillness, a deep breath, before the two launch into battle. “A fight where pride and mutual respect collide,” he says, “and where the speed of the techniques reaches a level that really surprises the audience.” It’s all captured in one, zooming take with fast, tightly choreographed action reminiscent of Donnie Yen and Wu Jing in Kill Zone.

So intense is their duel that both shatter multiple swords. The next phase sees them lash out in a more desperate and brutal manner with whatever weapons they find. Finally, having fought to a weary stalemate, the fight becomes, Okada concludes, “a kind of duel where their stubbornness and will are fully exposed” as they hack at each other with shattered blades and spear fragments.

A still image from the Netflix series Last Samurai Standing.

Image: Netflix

It’s a rhythm that many fights in Last Samurai Standing follow, driven by a string of physical and emotional considerations that form the basis of an action planner’s tool kit: how and why someone fights based on who they are and their environment. Here it is two former samurai in an elegant and terrifyingly fast-paced duel. Elsewhere we see skill matched against brutality, or inexperience against expertise.

Advertisement

“I define a clear concept for each sequence,” Okada says, before he opens those concepts up to the broader team. From there, he might add notes, but in Last Samurai Standing, action is a collaborative affair. “We keep refining,” he says. “It’s a back-and-forth process of shaping the sequence using both the ideas the team brings and the choreography I create myself.”

There is a third factor which Okada believes is the series’ most defining. “If we get to continue the story,” he says, “I’d love to explore how much more we can lean into ‘sei’ — stillness, and bring in even more of a classical period drama feel.”

As much of a triumph of action as Last Samurai Standing is, its quietest moments are the ones that stay with you. The charged looks between Shujiro and Iroha (Kaya Kiyohara) or their shuddering fright when confronted with specters of their past. Most of all, Shujiro watching his young ward, Futaba Katsuki (Yumia Fujisaki), dance before a waterlogged torii as mist hovers. These pauses are what elevate and invigorate the breathless action above spectacle.

The pauses are also emblematic of the balance that Last Samurai Standing strikes between its period setting and pushing the boundaries of action, all to inject new excitement into the genre. “Japan is a country that values tradition and everything it has built up over time. That’s why moments where you try to update things are always difficult,” Okada says. “But right now, we’re in the middle of that transformation.”

That is an evolution that Okada hopes to support through his work, both in front of and behind the camera. If he can create avenues for new generations of talent to carry Japanese media to a broader audience and his team to achieve greater success on a global stage, “that would make me very happy,” he says. “I want to keep doing whatever I can to help make that possible.”

Advertisement

The first season of Last Samurai Standing is streaming on Netflix now, and a second season was just confirmed.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Advertisement
Continue Reading

Technology

Free up iPhone storage by deleting large attachments

Published

on

Free up iPhone storage by deleting large attachments

NEWYou can now listen to Fox News articles!

If your iPhone keeps warning you about low storage, your Messages app may be part of the problem. Photos, videos and documents saved inside your text threads can stack up fast. The good news is that you can clear those big files without erasing entire conversations.

Below, you will find simple steps that work on the latest iOS 26.1. These steps help you clean up storage while keeping your messages right where you want them.

If you haven’t updated to iOS 26.1, go to Settings > General > Software Update to install the latest version.

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.      

Advertisement

‘CLOUD STORAGE FULL’ SCAM STEALS YOUR PHOTOS AND MONEY

An iPhone displays a low-storage alert as large photos, videos and documents saved in Messages fill device space, prompting users to remove files without deleting entire conversations. (Cyberguy.com)

Why clearing attachments helps your iPhone run better

Removing large attachments gives you quick breathing room on your iPhone. It can free up gigabytes in seconds, especially if you text lots of photos or videos. Clearing old files also keeps your message threads tidy and helps your device run more smoothly by reducing the amount of storage your system needs to manage. The best part is that you can clean up everything without losing a single conversation.

How to delete attachments but keep your conversations on iPhone 

These quick steps help you clear large files from Messages while keeping every conversation intact.

  • Launch the Messages app on your iPhone
  • Open the conversation thread that holds the attachments you want to delete.
  • Tap on the name of the contact(s) in the text thread.

To the right of Info, click on Photos or Documents; you may need to swipe over other tabs to see these. Photos will also contain videos and GIFs, while documents will contain Word documents, PDFs and other types of files.

  • Hold your finger and long-press on a photo, video or document until a menu appears.
  • Tap Delete to remove that single file.

Then confirm Delete when asked.

How to delete multiple files on your iPhone at once

To clear out several attachments at once, follow these quick steps on your iPhone.

Advertisement

Deleting attachments in Messages quickly frees space without losing your conversations. (Sean Gallup/Getty Images)

  • Go back to the Photos or Documents tab.
  • Tap Edit.
  • Click Select documents or Select Photos 
  • Tap on the photos or documents that you want to remove. You will see a blue checkmark appear in the bottom-right corner.
  • Tap the trash icon in the bottom right corner.

Confirm you want to delete the selected attachments by clicking Delete Photos.

These steps work almost the same way on an iPad. After you finish, you will often see an instant boost in available storage.

How to review large attachments in settings and delete them 

If you want to clear the biggest files on your device, you can check them from your iPhone’s storage screen and delete them:

  • Open Settings
  • Tap General
  • Choose iPhone Storage
  • Tap Messages
  • Click Review Large Attachments to see photos, videos and attachments taking up storage in Messages.
  • Click Edit.
  • Select items to delete by clicking the circle next to the attachment you want to delete. A blue checkmark will appear.

Then, tap the trash can icon in the upper right to delete it.

APPLE RELEASES IOS 26.1 WITH MAJOR SECURITY IMPROVEMENTS AND NEW FEATURES FOR IPHONE USERS

This method gives you a quick overview of what takes up the most space and lets you delete it quickly.

Advertisement

IPhone users can clear large photos, videos and files from Messages using built-in storage tools, helping free space, keep conversations intact and improve device performance. (Cyberguy.com)

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Freeing up storage doesn’t have to be confusing. A few quick taps can remove bulky files and keep your conversations intact. With these simple steps, your iPhone stays organized, runs smoothly and is ready for more photos, videos and apps.

What is the one type of attachment that takes up the most space on your iPhone? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter 

Copyright 2025 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading

Technology

The FCC’s foreign drone ban is here

Published

on

The FCC’s foreign drone ban is here

The Federal Communications Commission has banned new drones made in foreign countries from being imported into the US unless the Department of Defense or the Department of Homeland Security recommends them. Monday’s action added drones to the FCC’s Covered List, qualifying foreign-made drones and drone parts, like those from DJI, as communications equipment representing “unacceptable risks to the national security of the United States and to the safety and security of U.S. persons.”

DJI is “disappointed” by today’s action, Adam Welsh, DJI’s head of global policy, says in a statement. “While DJI was not singled out, no information has been released regarding what information was used by the Executive Branch in reaching its determination.” Welsh adds that DJI “remains committed to the U.S. market” and noted that existing products can continue operation as usual. Other items on the FCC’s list include Kaspersky anti-virus software (added in 2024) and telecommunications equipment from Huawei and ZTE (added in 2021).

The FCC says it received a National Security Determination on December 21st from an interagency body saying that “uncrewed aircraft systems” (UAS) and critical UAS components produced in a foreign country could “enable persistent surveillance, data exfiltration, and destructive operations over U.S. territory” and that “U.S. cybersecurity and critical‑infrastructure guidance has repeatedly highlighted how foreign‑manufactured UAS can be used to harvest sensitive data, used to enable remote unauthorized access, or disabled at will via software updates.”

If you already own a drone made outside the US, you will still be able to use it, according to the FCC’s fact sheet. Drones or drone components can be removed from the Covered List if the DoD or DHS “makes a specific determination to the FCC” that it does not pose unacceptable risks.

“Unmanned aircraft systems (UAS), also known as drones, offer the potential to enhance public safety as well as cement America’s leadership in global innovation,” FCC chairman Brendan Carr says.

Advertisement
Continue Reading

Trending