And just like that, Mother’s Day is tomorrow, May 10th, which is too soon for most online purchases to arrive in time. That said, you aren’t alone if you waited too long to pick up a gift this year, and you definitely aren’t alone in feeling guilty for considering digital gifts instead of something your mom can unwrap. But here’s the thing: digital gifts can still unlock memorable experiences, be it movies, games, or music. They can also let your mom choose exactly what she wants, making them both convenient and versatile.
Technology
Microsoft crosses privacy line few expected
NEWYou can now listen to Fox News articles!
For years, we’ve been told that encryption is the gold standard for digital privacy. If data is encrypted, it is supposed to be locked away from hackers, companies and governments alike. That assumption just took a hit.
In a federal investigation tied to alleged COVID-19 unemployment fraud in Guam, a U.S. territory where federal law applies, Microsoft confirmed it provided law enforcement with BitLocker recovery keys. Those keys allowed investigators to unlock encrypted data on multiple laptops.
This is one of the clearest public examples to date of Microsoft providing BitLocker recovery keys to authorities as part of a criminal investigation. While the warrant itself may have been lawful, the implications stretch far beyond one investigation. For everyday Americans, this is a clear signal that “encrypted” does not always mean “inaccessible.”
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
HACKERS ABUSE GOOGLE CLOUD TO SEND TRUSTED PHISHING EMAILS
In the Guam investigation, Microsoft provided BitLocker recovery keys that allowed law enforcement to unlock encrypted laptops. (David Paul Morris/Bloomberg via Getty Images)
What happened in the Guam BitLocker case?
Federal investigators believed three Windows laptops held evidence tied to an alleged scheme involving pandemic unemployment funds. The devices were protected with BitLocker, Microsoft’s built-in disk encryption tool enabled by default on many modern Windows PCs. BitLocker works by scrambling all data on a hard drive so it cannot be read without a recovery key.
Users can store that key themselves, but Microsoft also encourages backing it up to a Microsoft account for convenience. In this case, that convenience mattered. When served with a valid search warrant, Microsoft provided the recovery keys to investigators. That allowed full access to the data stored on the devices. Microsoft says it receives roughly 20 such requests per year and can only comply when users have chosen to store their keys in the cloud.
We reached out to Microsoft for comment, but did not hear back before our deadline.
How Microsoft was able to unlock encrypted data
According to John Ackerly, CEO and co-founder of Virtru and a former White House technology advisor, the problem is not encryption itself. The real issue is who controls the keys. He begins by explaining how convenience can quietly shift control. “Microsoft commonly recommends that users back up BitLocker recovery keys to a Microsoft account for convenience. That choice means Microsoft may retain the technical ability to unlock a customer’s device. When a third party holds both encrypted data and the keys required to decrypt it, control is no longer exclusive.”
Once a provider has the ability to unlock data, that power rarely stays theoretical. “When systems are built so that providers can be compelled to unlock customer data, lawful access becomes a standing feature. It is important to remember that encryption does not distinguish between authorized and unauthorized access. Any system designed to be unlocked on demand will eventually be unlocked by unintended parties.”
Ackerly then points out that this outcome is not inevitable. Other companies have made different architectural choices. “Other large technology companies have demonstrated that a different approach is possible. Apple has designed systems that limit its own ability to access customer data, even when doing so would ease compliance with government demands. Google offers client-side encryption models that allow users to retain exclusive control of encryption keys. These companies still comply with the law, but when they do not hold the keys, they cannot unlock the data. That is not obstruction. It is a design choice.”
Finally, he argues that Microsoft still has room to change course. “Microsoft has an opportunity to address this by making customer-controlled keys the default and by designing recovery mechanisms that do not place decryption authority in Microsoft’s hands. True personal data sovereignty requires systems that make compelled access technically impossible, not merely contractually discouraged.”
In short, Microsoft could comply because it had the technical ability to do so. That single design decision is what turned encrypted data into accessible data.
“With BitLocker, customers can choose to store their encryption keys locally, in a location inaccessible to Microsoft, or in Microsoft’s consumer cloud services,” a Microsoft spokesperson told CyberGuy in a statement. “We recognize that some customers prefer Microsoft’s cloud storage, so we can help recover their encryption key if needed. While key recovery offers convenience, it also carries a risk of unwanted access, so Microsoft believes customers are in the best position to decide whether to use key escrow and how to manage their keys.”
WHY CLICKING THE WRONG COPILOT LINK COULD PUT YOUR DATA AT RISK
When companies hold encryption keys, lawful requests can unlock far more data than most people expect. (Kurt “CyberGuy” Knutsson)
Why this matters for data privacy
This case has reignited a long-running debate over lawful access versus systemic risk. Ackerly warns that centralized control has a long and troubling history. “We have seen the consequences of this design pattern for more than two decades. From the Equifax breach, which exposed the financial identities of nearly half the U.S. population, to repeated leaks of sensitive communications and health data during the COVID era, the pattern is consistent: centralized systems that retain control over customer data become systemic points of failure. These incidents are not anomalies. They reflect a persistent architectural flaw.”
When companies hold the keys, they become targets. That includes hackers, foreign governments and legal demands from agencies like the FBI. Once a capability exists, it rarely goes unused.
How other tech giants handle encryption differently
Apple has designed systems, such as Advanced Data Protection, where it cannot access certain encrypted user data even when served with government requests. Google offers client-side encryption for some services, primarily in enterprise environments, where encryption keys remain under the customer’s control. These companies still comply with the law, but in those cases, they do not possess the technical means to unlock the data. That distinction matters. As encryption experts often note, you cannot hand over what you do not have.
What we can do to protect our privacy
The good news is that personal privacy is not gone. The bad news is that it now requires intention. Small choices matter more than most people realize. Ackerly says the starting point is understanding control. “The main takeaway for everyday users is simple: if you don’t control your encryption keys, you don’t fully control your data.”
That control begins with knowing where your keys are stored. “The first step is understanding where your encryption keys live. If they’re stored in the cloud with your provider, your data can be accessed without your knowledge.”
Once keys live outside your control, access becomes possible without your consent. That is why the way data is encrypted matters just as much as whether it is encrypted. “Consumers should look for tools and services that encrypt data before it reaches the cloud — that way, it is impossible for your provider to hand over your data. They don’t have the keys.” Defaults are another hidden risk. Many people never change them. “Users should also look to avoid default settings designed for convenience. Default settings matter, and when convenience is the default, most individuals will unknowingly trade control for ease of use.”
When encryption is designed so that even the provider cannot access the data, the balance shifts back to the individual. “When data is encrypted in a way that even the provider can’t access, it stays private — even if a third party comes asking. By holding your own encryption keys, you’re eliminating the possibility of the provider sharing your data.” Ackerly says the lesson is simple but often ignored. “The lesson is straightforward: you cannot outsource responsibility for your sensitive data and assume that third parties will always act in your best interest. Encryption only fulfills its purpose when the data owner is the sole party capable of unlocking it.” Privacy still exists. It just no longer comes by default.
700CREDIT DATA BREACH EXPOSES SSNS OF 5.8M CONSUMERS
Reviewing default security and backup settings can help you keep control of your private data. (Kurt “CyberGuy” Knutsson)
Practical steps you can take today
You do not need to be a security expert to protect your data. A few practical checks can go a long way.
1) Start by checking where your encryption keys live
Many people do not realize that their devices quietly back up recovery keys to the cloud. On a Windows PC, sign in to your Microsoft account and look under device security or recovery key settings. Seeing a BitLocker recovery key listed online means it is stored with Microsoft.
For other encrypted services, such as Apple iCloud backups or Google Drive, open your account security dashboard and review encryption or recovery options. Focus on settings tied to recovery keys, backup encryption, or account-based access. When those keys are linked to an online account, your provider may be able to access them. The goal is simple. Know whether your keys live with you or with a company.
2) Avoid cloud-based key backups unless you truly need them
Cloud backups are designed for convenience, not privacy. If possible, store recovery keys offline. That can mean saving them to a USB drive, printing them and storing them in a safe place, or using encrypted hardware you control. The exact method matters less than who has access. If a company does not have your keys, it cannot be forced to turn them over.
3) Choose services that encrypt data before it reaches the cloud
Not all encryption works the same way, even if companies use similar language. Look for services that advertise end-to-end or client-side encryption, such as Signal for messages, or Apple’s Advanced Data Protection option for iCloud backups. These services encrypt your data on your device before it is uploaded, which means the provider cannot read it or unlock it later. Here is a simple rule of thumb. If a service can reset your password and restore all your data without your involvement, it likely holds the encryption keys. That also means it could be forced to hand over access. When encryption happens on your device first, providers cannot unlock your data because they never had the keys to begin with. That design choice blocks third-party access by default.
4) Review default security settings on every new device
Default settings usually favor convenience. That can mean easier recovery, faster syncing and weaker privacy. Take five minutes after setup and lock down the basics.
iPhone: tighten iCloud and account recovery
Turn on Advanced Data Protection for iCloud (strongest iCloud protection)
- Open Settings
- Tap your name
- Tap iCloud
- Scroll down and tap Advanced Data Protection
- Tap Turn On Advanced Data Protection
- Follow the prompts to set up Account Recovery options, like a Recovery Contact or Recovery Key
Review iCloud Backup
- Open Settings
- Tap your name
- Tap iCloud
- Tap iCloud Backup
- Decide if you want it on or off, based on your privacy comfort level
Strengthen your Apple ID security
- Open Settings
- Tap your name
- Tap Sign-In & Security
- Make sure Two-Factor Authentication (2FA) is turned on and review trusted phone numbers and devices
- Review trusted phone numbers and devices
Android: lock your Google account and backups
Review and control device backup
Settings may vary depending on your Android phone’s manufacturer.
- Open Settings
- Tap Google
- Tap Backup (or All services then Backup)
- Tap Manage backup
- Choose what backs up and confirm which Google account stores it
NEW ANDROID MALWARE CAN EMPTY YOUR BANK ACCOUNT IN SECONDS
Strengthen your screen lock, since it protects the device itself
Settings may vary depending on your Android phone’s manufacturer.
- Open Settings
- Tap Security or Security & privacy
- Set a strong PIN or password
- Turn on biometrics if you want, but keep the PIN strong either way
Secure your Google account
Settings may vary depending on your Android phone’s manufacturer.
- Open Settings
- Tap Google
- Tap Manage your Google Account
- Go to Security
- Turn on 2-Step Verification and review recent security activity
Mac: enable FileVault and review iCloud settings
Turn on FileVault disk encryption
- Click the Apple menu
- Select System Settings
- Click Privacy & Security
- Scroll down and click FileVault
- Click Turn On
- Save your recovery method securely
Review iCloud syncing
- Open System Settings
- Click your name
- Click iCloud
- Review what apps and data types sync
- Turn off anything you do not want stored in the cloud
Windows PC: check BitLocker and where the recovery key is stored
Confirm BitLocker status and settings
- Open Settings
- Go to Privacy & security
- Tap Device encryption or BitLocker (wording varies by device)
Check whether your BitLocker recovery key is stored in your Microsoft account
- Go to your Microsoft account page
- Open Devices
- Select your PC
- Look for Manage recovery keys or a BitLocker recovery key entry
- If you see a key listed online, it means the key is stored with Microsoft. That is why Microsoft was able to provide keys in the Guam case.
If your account can recover everything with a few clicks, a third party might be able to recover it too. Convenience can be helpful, but it can also widen access.
5) Treat convenience features as privacy tradeoffs
Every shortcut comes with a cost. Before enabling a feature that promises easy recovery or quick access, pause and ask one question. If I lose control of this account, who else gains access? If the answer includes a company or third party, decide whether the convenience is worth it.
These steps are not extreme or technical. They are everyday habits. In a world where lawful access can quietly become routine access, small choices now can protect your privacy later.
Strengthen protection beyond encryption
Encryption controls who can access your data, but it does not stop every real-world threat. Once data is exposed, different protections matter.
Strong antivirus software adds device-level protection
Strong antivirus software helps block malware, spyware and credential-stealing attacks that can bypass privacy settings altogether. Even encrypted devices are vulnerable if malicious software gains control before encryption comes into play.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com
An identity theft protection service helps when exposure turns into fraud
If personal data is accessed, sold, or misused, identity protection services can monitor for suspicious activity, alert you early and help lock down accounts before damage spreads. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.
Kurt’s key takeaways
Microsoft’s decision to comply with the BitLocker warrant may have been legal. That doesn’t make it harmless. This case exposes a hard truth about modern encryption. Privacy depends less on the math and more on how systems are built. When companies hold the keys, the risk falls on the rest of us.
Do you trust tech companies to protect your encrypted data, or do you think that responsibility should fall entirely on you? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
These great digital gifts will arrive just in time for Mother’s Day
Below, we’ve curated a list of some of the best digital goodies that folks at The Verge have used or gifted. The list is curated by interests, too, so you can find the perfect present whether your mom is into the arts, exercise, or something else entirely. That way, you’ll at least be able to gift something more thoughtful than an Amazon or Walmart gift card — even if those are still totally viable options in our book.
Gifts for film and TV buffs
Whether your mom is a movie buff or an avid sports fan, there are a number of subscriptions that’ll grant her access to a wide range of content. Below are some of the most popular, as well as a few catered toward anime diehards, horror lovers, and those looking for something more niche.

$25
You can buy Disney Plus gift cards in increments of $25 up to $500. They’re usable toward Disney Plus subscriptions and bundles that include access to Disney Plus and Hulu, which start at $12.99 a month. That way, the family can stream everything from Andor and Paradise to The Bear and Percy Jackson.
- A gift card to a major streaming service like Netflix (Amazon, Best Buy, Walmart), Peacock (Peacock), or Paramount Plus (Amazon, Best Buy, Walmart) is a good gift that’ll cater to all kinds of passions. With a Netflix account, your mom can binge Stranger Things and Bridgerton, while Peacock provides access to shows like The Paper, Parks and Recreation, and Downton Abbey. A Paramount Plus subscription, meanwhile, lets her dive into Survivor 50, Star Trek: Strange New Worlds, and the entire Taylor Sheridan universe — including newer series like Landman and The Madison.
- A Criterion Channel gift card grants access to more than a thousand classic and contemporary Hollywood, international, arthouse, and independent films. It also features programming that spotlights directors, stars, genres, and themes, including a “15-minute-a-month film school.”
- For the anime lovers in your life, a Crunchyroll gift card provides access to hundreds of anime shows and films shortly after they air in Japan, including Jujutsu Kaisen, Blue Lock, and Mobile Suit Gundam: The Witch from Mercury. They can even use the gift to purchase Crunchyroll’s extensive collection of anime figures, vinyl records, and clothes.
If you’re not sure which type of games your mom prefers, you can gift her an Xbox, PlayStation, or Nintendo subscription. Not only will these memberships grant them access to free digital games, but they also include perks such as online multiplayer and cloud saves, among other incentives.


$69
Giving the gift of Game Pass unlocks hundreds of great games to play, whether your recipient is a console or PC gamer. If you’re gaming on an Xbox, it also allows for online multiplayer.
- If your mom owns a PlayStation 5, a PlayStation Plus membership grants them access to free titles and discounts every month, lets her play games online, and allows her to access cloud-based backups. PlayStation Plus memberships start at $9.99 a month, and you can subscribe directly via PlayStation or buy a subscription with a PlayStation Plus gift card, which is available at Amazon, Best Buy, and Target in denominations starting at $10 and going up to $250.
- Nintendo Switch or Switch 2 lovers, meanwhile, might enjoy an annual subscription to Nintendo Switch Online, which starts at $19.99 a year (Amazon, Best Buy, GameStop). The membership lets your mom play more than 150 retro games released during the NES, SNES, and original Game Boy eras. She can also play online with friends, access cloud saves for games, and listen to her favorite Nintendo tunes via the Nintendo Music mobile app.
- If you’re willing to fork out extra money, you can also buy an annual Nintendo Switch Online + Expansion Pack subscription. In addition to offering all the same benefits as the Switch Online membership, it also grants access to Game Boy Advance, Sega Genesis, and Nintendo 64 games, as well as DLC content for select titles. One of the latest additions is that the Switch 2 Editions of The Legend of Zelda: Breath of the Wild and Tears of the Kingdom are included as free downloads for members. Individual annual plans cost $49.99 (Amazon, Best Buy, Walmart), while a family plan — which allows for up to eight accounts — is available via gift card at Amazon, Target, and Best Buy for $79.98.
- Alternatively, you could buy a gift card to a store like GameStop (GameStop), which is helpful if you don’t know which console your mom prefers, or if you want to give her the option of buying accessories and games.
Gifts for the adventurers and globe-trotters
Is your mom in dire need of a screen break? Fortunately, the internet is filled with travel-oriented gifts, ranging from the obvious — like airline gift cards — to national park passes.


$80
The America the Beautiful pass grants entry to all 63 national parks, from the Grand Canyon to Yosemite, along with over 2,000 recreation sites across the country.
- A GetYourGuide gift card provides an easy way to take advantage of guided tours and fun tourist attractions at various destinations around the world, allowing your mom to swim with sharks in Cape Verde or explore volcanoes like Italy’s Mount Etna (when it’s not erupting).
- For aspiring polyglots, a Rosetta Stone membership makes it easy to learn French, Arabic, Japanese, and other languages from the comfort of home. In addition to lessons, memberships come with helpful extras, including speech recognition tech to get the accent just right.
- Finally, a gift card to a rideshare service like Lyft (Amazon, Best Buy, Target) or Uber (Amazon, Best Buy, Target) — the latter of which is also good toward Uber Eats — will come in handy if she ever needs a ride to the airport and you’re (gasp!) unavailable to take her.
Gifts for health and wellness fans
For health and wellness enthusiasts, many services offer a wealth of streamable fitness classes to help them get fit at home. Other gifts can help your giftee practice self-care and lighten their load with meditation or massage. Below, we’ve listed out a range of options that’ll help your mom take care of both her body and mind.


$13
Peloton’s monthly subscription offers thousands of streamable fitness classes revolving around a variety of different workouts, ranging from strength training to stretching. It’s a service that’s available to everybody, so you don’t need to own a Peloton device to use it.
- A gift card for Headspace, a popular mindfulness app, offers members access to hundreds of expert-taught meditations, each designed to help her relax, sleep better, and improve her mental health. A gift subscription will run you $38.99 for three months, or you can save by getting 12 months for $68.99.
- If your mom prefers in-person classes to virtual ones, a gift card toward a ClassPass subscription will let her try thousands of gyms and fitness studios in her local area, not to mention nearby salons and spas.
- If your mom is too busy to prepare healthy meals every day, a gift card to Blue Apron, HelloFresh, or any meal prep service that offers a healthy selection of meal kits will be very welcome.
Whether mom is a diehard foodie, a wine connoisseur, or a caffeine addict, the internet is filled with subscriptions and gift cards for all types. Below are just a few of our favorites.


$90
With a subscription to Eater’s Wine Club, your giftee will automatically receive either two, four, or six bottles of wine carefully chosen by an Eater expert every month. Past boxes have showcased wines from all over the world.
- A Sur La Table gift card (Sur La Table, Kroger, Staples) is a great gift for the beloved chef in your life. Your mom can use it to buy whatever she needs for the kitchen, as well as to take online cooking classes in which live instructors help students make everything from chicken piccata to tiramisu. Classes start at $39 per household and last 90 to 120 minutes.
- If your mom has a sweet tooth, Goldbelly’s monthly ice cream subscription allows her to enjoy up to six pints of ice cream or 24 ice cream sandwiches a month, all of which are sourced from small creameries all over the country. It’s a pricey subscription, however, with a three-month plan going for an eye-watering $298.95. You can explore other subscription types, too, from BBQ to New York City staples, or get a gift card so your mom can order whatever she’d like.
- Counter Culture roasts delicious bags of coffee sourced from all around the globe. If you’re lucky enough to find them in local stores, well, lucky you! For coffee lovers looking to try their next great bag of beans, grab a gift card that can pay for a one-off order, or enroll in the company’s subscription service that sends coffee to you as frequently as you’d like.
- Sometimes, it’s better to leave the cooking to somebody else. If your mom is a foodie, a gift card to a food delivery service like DoorDash (Amazon, Best Buy, Target) lets her nab some crab rangoons from her favorite Chinese restaurant without leaving home.
Whether your mom is a musician or just loves to unwind with music, there are plenty of digital gifts catered toward her interests. We all know about Spotify gift cards (Best Buy), but there are also other streaming services that you can gift as a subscription, some of which we’ve highlighted below.


$25
Apple Music is a great gift for casual listeners, offering more than 100 million ad-free songs alongside support for spatial audio and Dolby Atmos. There’s no designated gift card for Apple Music, so you’ll have to buy a regular Apple gift card, but that’s not a bad thing, as it means they can also use the card to buy the latest set of AirPods.
- If you think that your mom might want to learn how to play the guitar, a Fender Play subscription can help them do so thanks to a continuously updated catalog of hundreds of instructor-led video lessons. You can gift them six months for $49.99 or 12 months for $149.99.
- Lastly, a Ticketmaster or StubHub (Amazon, Best Buy, Staples) gift card is a present that lets your mom buy a ticket to see her favorite musicians perform live.
Obviously, you could just gift a bibliophile a book, and they’d probably be happy. But what if you want to give them more than one option? In that case, a gift card to her favorite bookstore or a subscription to something like Kindle Unlimited — which grants members access to millions of ebooks and select audiobooks — is a good idea. That said, we’ve rounded up some of our favorite alternatives below.


$15
An Audible Premium Plus subscription grants instant access to thousands of audiobooks and podcasts, as well as one premium audiobook a month.
- For fans of Marvel and DC comics, as well as manga like Fairy Tale, a Comixology Unlimited subscription is perfect. For $5.99 a month, your mom will be able to enjoy over 45,000 comics and graphic novels, not to mention more than 2,400 manga titles from her phone or tablet. Subscribers also get discounts on select digital books.
- You can also gift your mom a Book of the Month membership, which currently starts at $59.99 for a three-book plan. The company curates a small selection of five to seven bestsellers and classics for members every month, making it easy to choose something to read quickly.
- If your mom prefers to pick up books from a brick-and-mortar bookstore, a gift card to Barnes & Noble (Barnes & Noble, Amazon, Best Buy) might be a good idea. For those who want to support local bookstores, there’s also a gift card for Bookshop.org.
- For those who prefer traditional newspapers and magazines, you can gift a subscription to The New York Times or The Washington Post, or publications catered to specific interests, like Cosmopolitan and National Geographic.
Movie buffs and bibliophiles are easy to shop for, but what do you get the creative mom? It’s actually not that hard — just buy her something to help her create, whether that’s an online course or access to a new tool. Below are a few subscriptions and gift cards that creators will love, all of which you can buy at the last minute.


$69
A subscription to Skillshare grants subscribers access to over 34,000 online classes related to graphic design, painting, photography, film, music, coding, and more.
- A MasterClass membership — which normally starts at $10 a month but is currently 50 percent off for all tiers — provides access to classes taught by world leaders and other subject matter experts, including screenwriters, musicians, and business experts. Going for a Masterclass Plus or Premium subscription allows concurrent viewing on two or six devices, respectively, and also unlocks offline viewing.
- An Adobe Creative Cloud subscription ($69.99 a month) is a great gift for aspiring and experienced creative professionals alike, one that provides access to popular tools such as Adobe Photoshop, Illustrator, Premiere Pro, and InDesign. Adobe doesn’t support gifting subscriptions, so you’ll need to create a new account or log in to an existing account your mom may have. You can also purchase digitally redeemable Creative Cloud subscription codes from partner retailers like Best Buy, which is currently selling a 12-month plan for $406.99 (about $373 off) right now.
- If you think your mom might be interested in coding, a subscription to the coding educational platform Codecademy ($29.99 a month) can help her build her portfolio with online courses, a community, fun events, cheat sheets, and other resources. There’s even a $39.99-a-month plan for those looking to change career paths, which offers all the above, plus technical interview help.
- For giftees into arts and crafts, a Craftsy membership (normally $123 a year) grants access to more than 2,000 live and on-demand classes led by experts covering everything from baking and cake decorating to woodworking and painting. Members also get to connect with other crafters in the Craftsy community and attend live events.
Gift cards for pretty much anyone


$25
Amazon gift cards start at $25 and can be used toward purchases across a variety of departments. They’re also good for various Amazon services, including Amazon Prime Video, Audible, and Amazon Music Unlimited.
- Sometimes the best gift card is one that’ll give your mom a ton of options, especially if you’re having a hard time figuring out what she wants. Gift cards from major retailers like Amazon, Best Buy, Walmart, and Target are perfect in these situations, namely because they’ll let your mom choose whatever she likes from a wide range of departments.
Technology
Five data broker opt-out myths that leave retirees exposed
NEWYou can now listen to Fox News articles!
Have you already tried removing your personal information from data broker sites? Maybe you Googled your name, didn’t like what you saw and spent the afternoon filling out opt-out forms on sites like Spokeo, Whitepages and BeenVerified.
That took real effort, and it wasn’t wasted. Still, it doesn’t mean you’re fully protected. The problem comes down to how data brokers operate. Their system isn’t intuitive, and common misconceptions leave people exposed without realizing it.
For retirees with decades of public records, property ownership and family connections, the gap between feeling safe and actually being safe can cost tens of thousands of dollars.
After years of covering scams, one pattern keeps showing up. The most targeted victims are not people who ignored the risks. They are people who took action and believed it was enough. Let’s fix that right now.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES
Data broker listings often include sensitive details like your address, phone number and relatives, making removal a critical first step. (Kurt “CyberGuy” Knutsson)
Myth #1: “I already opted out, so my data is gone”
This is the most dangerous myth of all. And it’s the one I hear most often from retirees who’ve already taken steps to protect themselves.
Here’s the reality: there are hundreds of data broker companies operating in the United States. When you submit an opt-out request to Spokeo, you’ve removed yourself from one of them.
The others? They never heard from you. They’re still listing your name, your address, your phone number, your relatives and your estimated net worth — right now, as you read this.
And even the site you opted out of? It will likely relist your information within weeks or months. Data brokers pull from public records — property filings, voter rolls, court documents — that are constantly updated. Every time those records refresh, your profile can quietly reappear.
Unless you repeat them regularly, manual opt-outs don’t protect you in the long term. They buy you a temporary gap in coverage on a limited number of data broker websites.
You can use Incogni’s free scanner to check the biggest data broker sites for your information. You may be surprised by how much is still out there.
Myth #2: “My family members’ data doesn’t affect me — or vice-versa”
This one is painful because it involves the people you love most. Data broker profiles don’t just list you. They list your household. They list your relatives. And they map the connections between all of you.
When your daughter opted out of data broker sites, she removed her own profile. But your profile still lists her as a relative, with her current city, her approximate age, and her connection to you. That’s enough.
A scammer calls you: “Grandpa, it’s me. I’m in the hospital. Please don’t tell Mom-she’ll worry. Can you wire me $1,200?”
Scammers may already have your granddaughter’s name and understand your exact relationship to her. They know she’s your granddaughter, not your daughter, and that detail makes the call feel real. That level of accuracy is what triggers panic and lowers your guard. In some cases, they can even clone her voice using AI.
This is called the grandparent scam. It has evolved from a clumsy, random cold call into a precision-targeted operation built on data broker research. According to the FBI’s Annual IC3 Report, both the losses and number of victims of elder fraud have been climbing steeply over the last three years, with average losses in 2025 reaching $38,500.
10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE
Taking simple steps early, like removing your data and freezing your credit, can reduce your risk during the most vulnerable time. (Kurt “CyberGuy” Knutsson)
Myth #3: “My information isn’t interesting enough to target”
I understand why this feels true. You’re (probably) not a celebrity, don’t have a massive social media following, and have lived a private life.
But here’s what a scammer sees when they pull up your data broker profile:
A paid-off home (public property records show no mortgage). A Social Security income estimate. An address you’ve held for more than 20 years. The names of your adult children and their addresses. A spouse or late spouse. And those specific details that answer every security question your bank still uses: mother’s maiden name, previous address and the city you were born in.
To a criminal, that profile is a goldmine. In fact, personal information is implicated in 72% of elder fraud cases.
Retirees represent the single most targeted group for financial fraud in the United States. Not because older Americans are more naive. It’s because their data broker profiles are richer than anyone else’s, built over 60 or 70 years of public records.
Myth #4: “If I haven’t been targeted yet, I must be safe”
Let me offer a different perspective. You haven’t been targeted yet. Or, more likely, you have been targeted, and the attempt simply didn’t land. A phishing email went to spam. A suspicious call got hung up on. A text message felt off in some way and you ignored it. Does any of that sound familiar? Here’s what hasn’t changed: your profile is still there, still searchable, and regularly being updated.
Data brokers don’t delete inactive profiles. They maintain them, refresh them, and sell access to them repeatedly. The question isn’t whether your information is available to scammers. It is. The question is whether the right scammer has found it yet-and whether they’ve decided the payoff is worth the attempt.
Some data brokers have been caught red-handed packaging large datasets and selling them directly to scammers for elder fraud.
Retirees with home equity, retirement accounts, or Medicare benefits are especially attractive targets. A scammer doesn’t need to reach 100 people. They need to reach one person at the right moment after a loss, during a health scare, when the grandchildren are mentioned and their research pays off.
THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY
Removing personal data from data broker sites can reduce exposure to scammers and help protect finances and privacy. (Phil Barker/Future Publishing)
Myth #5: “This is a tech problem for younger people to worry about”
Your grandchildren grew up online. Maybe you didn’t, but that doesn’t mean digital threats can’t touch you. But data brokers don’t care when you were born. They care what you own, what you’ve signed and what public records document about your life. And for most retirees, those records go back further and run deeper than anyone else’s:
- Property deeds filed when you bought your first home in 1978
- Divorce proceedings from three decades ago
- Probate records from when you inherited property
- Business registrations
- Political donor records
- Decades of address changes.
All of that is legally collected and ends up in data broker databases. And all of it makes your profile more complete-and more dangerous-than your grandchildren’s. This isn’t a tech problem. It’s a paper-trail problem. And the paper trail you’ve left over a lifetime is the most detailed (and valuable) one in the household.
So what’s the solution?
The only real answer is regular, repeated data removal for you, and ideally, your entire family.
Submitting a few opt-out requests once is not enough. Your information keeps resurfacing as public records update, which means you have to stay on top of it. That can involve revisiting sites, sending new requests and checking where your data appears over time.
Some people choose to handle this manually, while others use automated services that send ongoing removal requests across hundreds of data broker sites. The key is consistency, because this system does not stop collecting or refreshing your information.
Think of it like a leak that keeps coming back. You can scoop water out now and then, or you can stay ahead of it with a system that keeps working in the background.
If you want a clearer picture of your exposure, you can run a scan to see where your personal information shows up online. That gives you a starting point and helps you understand how much work it really takes to stay protected.
See my tips and best picks on Best Identity Theft Protection at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
Protecting your personal data starts with action, but real protection takes more than a few opt-out forms. Submitting requests to a handful of data broker sites only limits exposure temporarily, and those same sites can relist your details as public records refresh. Retirees face a greater risk because their profiles hold decades of information that scammers can easily connect across family members. In many cases, scammers reach out but fail to succeed due to timing or suspicion, not because your data stays hidden. Staying protected requires consistent effort, since data brokers keep collecting and updating information behind the scenes.
If your personal data can resurface at any time, how confident are you that it is not already being used against you? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Dyson’s powerful 360 Vis Nav robovac is down to $279.99 for a limited time
If you’re tired of running your vacuum multiple times just to get the dirt and debris out of the carpets in your living room, Dyson’s 360 Vis Nav is worth a look. It’s one of the more powerful robot vacuums currently available, and now through May 11th (or while supplies last), it’s on sale at Woot for an all-time low of $279.99 ($919 off) with a full two-year warranty.
The last-gen 360 Vis Nav offers a whopping 65 air watts of suction, allowing it to pull dirt, dust, and pet hair from carpets impressively well. In her brief time testing the robovac, my colleague Jennifer Pattison Tuohy said the Dyson “demolished a pile of dry oatmeal in seconds,” adding that she briefly worried it might even suck up the tassels on her large rug (it didn’t). By comparison, many robot vacuums — including Dyson’s new $1,200 Spot + Scrub AI — require multiple passes to fully eradicate the same kind of mess on your floor.
What’s more, the robovac’s small, D-shaped design and the location of its ultra-fluffy brush allow it to dig into edges and corners more effectively than many of the more roundish robot vacuums, while its lower profile lets it easily get under most beds and sofas. The roomy 500ml dustbin also means you likely won’t need to empty it too often, while Dyson’s built-in handle and terrific quick-release button make removing said bin a relatively simple task when it’s time to do so.
While it is undeniably powerful, it’s worth noting that the 360 Vis Nav lacks a few features found on some of its more modern rivals. Although its navigation worked well enough during our testing, it lacks AI-powered obstacle avoidance and doesn’t come with a self-emptying dock. Battery life is also relatively short at around 65 minutes per charge. Nonetheless, if your top priority is quickly removing dust, dirt, and pet hair from carpets without multiple passes, the Dyson remains an option worth considering, especially at this discounted price.
-
Health4 minutes agoGuava for Weight Loss Is a Real Thing—Here’s the Juicy Truth
-
Culture16 minutes agoWhy Is Everyone Obsessed With Bogs?
-
Lifestyle22 minutes agoHow ‘Mile End Kicks’ Nailed the Indie Sleaze Look
-
Technology34 minutes agoThese great digital gifts will arrive just in time for Mother’s Day
-
World40 minutes agoNorth Korea updates constitution to require automatic nuclear strike if Kim Jong Un is assassinated: report
-
Politics46 minutes agoHarris accuses Trump allies of trying to ‘rig’ 2026 midterms after Virginia court tosses redistricting measure
-
Health52 minutes agoSingle workout cuts cravings, offering new hope for smokers trying to quit
-
Sports58 minutes agoWings rookie Azzi Fudd sets dubious WNBA record with lowest-scoring debut by top pick