Technology
Is your home being targeted? Uncover subtle signs burglars don't want you to see
Could your home be a target for burglary? While you might assume that crimes are random acts, it’s surprising to learn that some burglaries are actually premeditated. In 2022 alone, there were 673,261 burglary incidents reported nationwide, according to the FBI. Because burglaries can occur swiftly and authorities may not always respond in time, prevention is the most effective strategy.
Practicing basic security measures and being aware of warning signs can help prevent your home from becoming a target. Below are four top signs that your home might be targeted by burglars.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
A man trying to break into a residence (Kurt “CyberGuy” Knutsson)
Top 4 signs your home may be targeted for a burglary
While burglaries may seem random, criminals usually look for opportunities to commit their crimes. It might be a surprise to learn that burglaries spend time assessing their victims and vulnerabilities before striking. In order to find their next victim, they often watch and learn the habits of their next target. Below are signs that burglars may be targeting you:
1) Watch out for suspicious vehicles
Instead of paying attention to the make and model of cars that may be suspicious, pay attention to the behaviors and circumstances surrounding unknown vehicles frequenting your neighborhood.
Who’s in the car?
Unless someone is working nearby or waiting for someone to pick up or see in the area, most people park their cars and leave them. It can be a red flag if someone who has no reason to be in the area is simply sitting in the vehicle. It likely means this person is casing the neighborhood to see who they can target or how to best commit the crime.
Are they equipped?
Is the person in the vehicle using surveillance devices such as cameras or binoculars? Then it may be a sign that they are actively scoping out who will be their next victim and when and how to best commit their crime.
Is there a rotation of people or multiple people involved?
If you start noticing a pattern around different people showing up in the same car on varying days or if multiple people are hanging out in the same car, it might be a sign that you or your neighbors are being targeted.
A criminal looking into a window of someone’s house (Kurt “CyberGuy” Knutsson)
BEST HOME SECURITY SYSTEMS
2) Strangers knocking on your door
While it might appear unwise for criminals to confront their victims before committing a crime, they often do visit potential victims’ doorsteps for four specific reasons.
1) Establish schedules: Burglars might come to your door to confirm when or if someone is home.
2) Observe more details: Getting you to open the door gives them an opportunity to observe additional details about your home. They can observe any additional occupants if there are pets that can deter their crimes or any additional obstacles to committing their crimes, such as security systems or cameras.
3) Commit the crime: Some criminals are ready to strike should the opportunity arise. They usually use a false circumstance, especially with a sense of urgency, to get you to open the door. They may see this as an opportunity to enter your home and rob you then and there.
4) Vandalism: While it may seem counterintuitive, burglars will sometimes commit small, random acts of vandalism to test to see if their victims are paying attention or the targeted homes are occupied. These random acts may include but not be limited to:
- Lights: Are your motion-sensing lights working? Are any outdoor lights broken or unscrewed? If so, it may mean that burglars are preparing to commit their crimes.
- Cameras: If you have outdoor security cameras, are they working properly? Have any cameras been moved slightly or obscured? Burglars might be shifting these devices so that their crime isn’t caught on camera.
- Property damage: A burglar might break a window or lawn ornament to see if anyone is actually home. If no one has noticed the damage or fixed it, they might see it as a sign that the home is free and clear to rob.
- Empty tank: Burglars will go to great lengths to buy themselves extra time in committing their crime, going as far as to siphon gas from their car’s gas tank. Because your gas tank has been emptied without your knowledge, you likely won’t have enough gas to get home on your normal schedule, which gives these criminals more time to burgle your home.
- Targeting pets: Some burglars will go as far as kidnapping or releasing your beloved pets from your property to prevent any additional obstacles or noise while they burgle your home.
A burglar breaking into someone’s residence (Kurt “CyberGuy” Knutsson)
3) Unusual markings or items left around your property
Burglars sometimes leave subtle signs or markings around a property to indicate it as a target. These can include:
- Chalk marks: Simple symbols or lines drawn on walls, fences or sidewalks can be a way for burglars to communicate with each other.
- Stickers or fliers: Unusual stickers or fliers left on your door or mailbox can be a way to mark your home.
- Objects out of place: Items like rocks, sticks or even trash placed in specific spots can be a signal to other burglars.
4) Tampering with your security systems
Burglars may attempt to disable or test your security systems before committing a crime. Look out for:
- Cut wires: If you notice any cut wires around your security cameras or alarm systems, it could be a sign that someone is trying to disable them.
- False alarms: Frequent false alarms can be a tactic used by burglars to desensitize you to the alarm going off.
- Unusual activity: If your security cameras or alarms show unusual activity, such as being triggered without a clear cause, it might be a sign that someone is testing your security measures.
BEST TECH FOR PERSONAL PROTECTION IN 2024
Protect your home with these best home security solutions
Now that you’re aware of the four signs that indicate your home may be a target for burglars, it’s crucial to take proactive steps to enhance your security. If you’re unsure about which security cameras or systems to invest in, you’ll want to check out our article on the best home security systems.
ALERT: 4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH
Kurt’s key takeaways
Whether you’re leaving town for a vacation or noticing an upswing in crime in your neighborhood, it is important to pay attention to the four signs that you or your neighbors are being targeted by burglars. Separately, these small signs are easy to miss, but together, they paint a picture of a perfect target. While it may seem prudent to confront these suspicious individuals directly, it may be more dangerous for you. In addition to increasing your own security measures and raising the awareness of your neighbors, you can reach out to local authorities to alert them of suspicious activities. Sometimes, local authorities may increase patrol in your area, which may deter criminals from acting.
What experiences have you had with home security and how have they influenced your approach to protecting your home? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Anthropic upgrades Claude’s memory to attract AI switchers
Anthropic is making it easier to switch to its Claude AI from other chatbots with an update that brings Claude’s memory feature to users on the free plan, along with a new prompt and dedicated tool for importing data from other chatbots. These upgrades could allow users who have been using rivals like OpenAI’s ChatGPT or Google’s Gemini to quickly copy the data their preferred AI has collected on them and bring it over to Anthropic’s chatbot. That way, they don’t have to “start over” teaching Claude the context and history their previous chatbot already knows.
The option to import and export memories from Claude has been available since October, when Anthropic also rolled out the option for users to turn on Claude’s memory. Up until now, the memory feature was only available to users on paid Claude subscriptions, but now all Claude users can turn it on by going into “settings” then “capabilities.” This menu is also where users can find the new memory importing tool, which has users copy a pre-written prompt into their previous AI then copy the output from that prompt back into Claude’s importing tool.
Anthropic is introducing the upgraded memory importing tool as Claude is seeing a rise in popularity, driven by tools like Claude Code and Claude Cowork. Last month, Anthropic launched its new Opus 4.6 and Sonnet 4.6 models, which the company says are better at coding and completing complex tasks like working through a spreadsheet or filling out forms.
Anthropic has also been experiencing a spike in attention recently after pushing back against demands from the Pentagon to loosen the guardrails on its AI models, with the company stating publicly that they drew “red lines” around mass surveillance and fully autonomous lethal weapons.
Technology
Why the Microsoft 365 Copilot bug matters for data security
NEWYou can now listen to Fox News articles!
You trust your email security settings for a reason. So when an AI assistant quietly reads and summarizes messages marked confidential, that trust takes a hit.
Microsoft says a bug in Microsoft 365 Copilot allowed its AI chat feature to process sensitive emails since late January.
The issue bypassed Data Loss Prevention policies that organizations rely on to protect private information. Put simply, emails that were supposed to stay locked down were being summarized anyway.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
Microsoft 365 Copilot’s work chat interface sits at the center of the issue after a bug allowed it to summarize confidential emails. (Microsoft)
Microsoft 365 Copilot bug summarized confidential emails
Microsoft says a coding error impacted Microsoft 365 Copilot Chat, specifically the “work tab” feature. The AI assistant helps business users summarize content, draft responses and analyze information across Word, Excel, PowerPoint, Outlook and OneNote.
Beginning Jan. 21, an internal bug labeled CW1226324 caused Copilot to read and summarize emails stored in Sent Items and Drafts folders.
The real concern runs deeper. Several of those messages carried confidentiality or sensitivity labels.
Companies apply those labels along with DLP policies to block automated systems from accessing restricted content. Despite those safeguards, Copilot still generated summaries.
We reached out to Microsoft, and a spokesperson provided CyberGuy with the following statement:
“We identified and addressed an issue where Microsoft 365 Copilot Chat could return content from emails labeled confidential authored by a user and stored within their Draft and Sent Items in Outlook desktop. This did not provide anyone access to information they weren’t already authorized to see. While our access controls and data protection policies remained intact, this behavior did not meet our intended Copilot experience, which is designed to exclude protected content from Copilot access. A configuration update has been deployed worldwide for enterprise customers.”
Why the Microsoft 365 Copilot bug matters for data security
AI tools feel helpful. They save time and reduce busy work. But they also rely on deep access to your data. When safeguards fail, even temporarily, sensitive content can move in ways you did not expect.
YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT
For businesses, that could mean:
Legal discussions summarized outside intended controls
Financial projections processed despite restrictions
HR communications are exposed to automated analysis
Even if no data leaves the organization, the bypass itself raises concerns about how AI integrates with enterprise security systems.
Business users rely on Copilot to streamline work, but a recent bug raised concerns about how it handles sensitive email content. (Microsoft)
How Microsoft is fixing the Microsoft 365 Copilot bug
Microsoft says it began rolling out a fix in early February. The company continues to monitor deployment and is contacting some affected users to verify the fix works.
However, Microsoft has not provided a final timeline for full remediation. It has also not disclosed how many organizations were affected.
The issue is tagged as an advisory, which usually signals limited scope or impact. Still, many security professionals will want deeper clarity before feeling comfortable.
What this Microsoft 365 Copilot issue reveals about AI security
This incident highlights something many companies are wrestling with right now. AI assistants sit inside productivity platforms. They need access to email, documents and collaboration tools to work well.
TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY
At the same time, those platforms contain your most sensitive information. When AI features expand quickly, security policies must evolve just as fast. Otherwise, even a small code mistake can create unexpected exposure.
The Copilot chat feature was designed to boost productivity, yet a code error let it process emails labeled confidential. (Microsoft)
Ways to stay safe after the Microsoft 365 Copilot bug
If your organization uses Microsoft 365 Copilot, here are practical steps to reduce risk:
1) Review Copilot access settings
Work with your IT team to confirm which folders and data sources Copilot can access.
2) Revalidate DLP policies
Test sensitivity labels and DLP (Data Loss Prevention) rules to ensure they block AI processing as intended.
3) Monitor advisory updates
Stay current on Microsoft service alerts and verify that the fix is fully deployed in your tenant.
4) Limit AI scope during investigations
If you have concerns, consider temporarily restricting Copilot features until verification is complete.
5) Train employees on AI boundaries
Remind staff that AI assistants can process drafts and send messages. Encourage careful handling of sensitive content.
6) Audit Copilot activity logs
Review audit logs to see whether Copilot accessed or summarized labeled emails. This helps determine actual exposure rather than assumed risk.
7) Review sensitivity label configuration
Confirm that confidential labels are configured to block AI processing where required. Misconfigured labels can create gaps even after a bug is fixed.
8) Reassess retention and draft policies
Because the issue involved Sent Items and Drafts, evaluate whether sensitive drafts should be stored long-term or deleted after sending.
9) Limit Copilot to specific user groups
Instead of enabling Copilot organization-wide, consider a phased deployment to departments with lower sensitivity exposure.
10) Conduct a post-incident security review
Use this moment to reassess how AI tools integrate with compliance controls. Treat it as a learning opportunity rather than a one-time glitch.
Pro Tip: This Copilot bug centers on enterprise controls. Even so, AI tools operate on your devices and accounts, so keeping software up to date and using strong antivirus software adds an important layer of defense. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
Considering a more private email provider
Enterprise AI bugs raise a bigger question: how much access should email platforms have to your data in the first place? If you want an added layer of privacy beyond mainstream providers, privacy-focused email services are worth exploring.
Some offer end-to-end encryption, support for PGP encryption and a strict no-ads business model that avoids scanning messages for marketing purposes.
AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN
Many also allow you to create disposable email aliases, which can reduce spam and limit exposure if one address is compromised.
While no provider is immune to software bugs, choosing an email service built around privacy rather than data monetization can limit how much of your information is accessible to automated systems in the first place.
For individuals, journalists and small businesses especially, that added control can make a meaningful difference.
For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com
Kurt’s key takeaways
AI assistants are becoming part of daily work life. They promise speed, efficiency and smarter workflows. But convenience should never outrun security.
This Copilot bug may have a limited impact. Still, it serves as a reminder that AI tools are only as strong as the guardrails behind them.
When those guardrails slip, even briefly, sensitive information can move in unexpected ways. As AI becomes more embedded in business software, trust will depend on transparency, fast fixes and clear communication.
Here is the real question: If your AI assistant can see everything you write, are you fully confident it respects every boundary you set? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Samsung’s Digital Home Key lets you use your phone as your key
Just days after showing off the Galaxy S26, Samsung is finally rolling out the ability for users to unlock their home with a tap of their phone or by simply approaching their door. The new feature, called Digital Home Key, will live inside Samsung Wallet and is powered by the Aliro smart home standard.
Samsung first teased its Digital Home Key feature in 2024 and said the feature would be available in 2025. That didn’t pan out, as the CSA’s Aliro standard — which will let users unlock smart locks with any phone — only arrived in February of this year. The new standard uses near-field communication (NFC) for its tap-to-unlock technology. It also supports ultra-wideband (UWB), giving users the ability to unlock their door as they approach and without pulling out their phone.
To add a Digital Home Key to your wallet, you’ll need to set up a compatible smart lock through SmartThings using Matter. Only some Galaxy smartphones support both NFC and UWB, including the Galaxy Z Fold 4 and up, as well as the Galaxy S22 Ultra and up. You can view the full list of compatible devices on Samsung’s website.
-
World5 days agoExclusive: DeepSeek withholds latest AI model from US chipmakers including Nvidia, sources say
-
Massachusetts5 days agoMother and daughter injured in Taunton house explosion
-
Denver, CO5 days ago10 acres charred, 5 injured in Thornton grass fire, evacuation orders lifted
-
Louisiana1 week agoWildfire near Gum Swamp Road in Livingston Parish now under control; more than 200 acres burned
-
Technology1 week agoYouTube TV billing scam emails are hitting inboxes
-
Politics1 week agoOpenAI didn’t contact police despite employees flagging mass shooter’s concerning chatbot interactions: REPORT
-
Technology1 week agoStellantis is in a crisis of its own making
-
News1 week agoWorld reacts as US top court limits Trump’s tariff powers