Technology
My iPhone says I have 14 viruses. What should I do next?
Although iPhones have robust security features, they are not entirely immune to threats. While they are generally safer from viruses and malware than Android devices, no device is completely invulnerable.
This point was reinforced by a strange experience that caught our attention when “Pam” of Mesa, Arizona, wrote to us, “My iPhone says I have 14 viruses. What program can I [install] to help with my phone? How can I [make] my phone safe?”
Well, Pam, we’re more than happy to explore why you are getting strange messages on your iPhone suggesting that there were 14 viruses on it. There are various reasons why you could be seeing these types of messages, and there are workarounds to make your phone safe again.
I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter the giveaway by signing up for my free newsletter.
Why am I getting virus or malware alerts?
The iPhone is less vulnerable to viruses and malware due to its closed-code design. This means that Apple doesn’t share all of its code information, which makes it harder for hackers to exploit vulnerabilities to take over a user’s apps or iPhone. It’s important to note that Apple will never send you an alert via pop-up, text or email that you have a virus on your device.
HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE
Watch out for these fake virus alerts on your iPhone
Below are several reasons why you could get notifications on your iPhone about viruses, which you may or may not actually have.
1) Pop-up ads: You may not actually have any viruses or malware on your iPhone. Instead, it can be an ad that pops up from your mobile browser stating that you have viruses or malware on your iPhone. These can scam you in a couple of ways:
- It causes you to click on the ad, which can cause you to download viruses or malware.
- It sends you to another website that asks you for private information, such as payment, so you can pay to get rid of the virus or malware.
2) Fake apps: Some scammers have fake apps that display fake alerts about viruses or malware to scare people to download their apps or purchase their services to get rid of these fake problems.
3) Phishing scams: This alert about viruses can be a scam email or text message claiming you have viruses or malware that need to be eradicated from your device. Do not click on any links or call any numbers as it will likely transfer you to the actual scammer, who will likely hard sell you to buy their services, part with private and financial information or give them access to your iPhone.
NEW CYBERATTACK TARGETS IPHONE AND APPLE IDS: HERE’S HOW TO STAY SAFE
How do I protect my iPhone?
Even though it is more difficult to penetrate the iPhone, it doesn’t mean it is impossible. In fact, some hackers watch for particular vulnerabilities in iOS to launch their attacks. If you see such warnings, it’s best to ignore them and avoid clicking on any links or downloading any suggested software. Below are several key steps you can take to secure your iPhone.
1) Keep your iPhone up to date: Occasionally, Apple releases new iOS updates to address known vulnerabilities. When possible, it is best to update the iOS so that your iPhone is safe from known vulnerabilities.
2) Install and run strong antivirus software: An antivirus software actively running on all of your devices can help keep them all safe, including your iPhone. With iPhones, strong antivirus software will prevent you from clicking on any malicious links that may then install malware onto your devices, which can potentially extract personal information from your device. Avoid clicking on suspicious links or downloading attachments from unknown sources. These can be phishing attempts designed to steal your personal information.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
3) Download apps only from the App Store: Stick to downloading apps from the official Apple App Store. Apps on the App Store are vetted by Apple for security, reducing the risk of downloading malicious software.
4) Enable two-factor authentication (2FA): Adding an extra layer of security to your Apple ID can help protect your personal information. With 2FA, even if someone gets your password, they won’t be able to access your account without the second factor.
5) Use strong passwords: Ensure that your passwords are strong and unique for different accounts. Consider using a password manager to keep track of them.
6) Monitor app permissions: Regularly check the permissions granted to your apps and revoke any that seem unnecessary. This can help prevent apps from accessing more information than they need.
AVOID IPHONE PRIVACY DISASTERS WITH THESE 10 SMART TIPS
Kurt’s key takeaways
While most iPhone users rest easy knowing that the iOS keeps most common viruses and malware at bay, they are still susceptible to scammers trying to work around the closed code and scaring people into making bad choices that endanger their phones and data. Because Apple never sends out alerts about viruses or malware on your iPhone, it should be the first clue of a scam. Even if it looks official, iPhone users do not get alerts from Apple about viruses or malware. If you do install a good antivirus program, that will be the only program notifying you that there is anything amiss with your iPhone. Understanding these scams can go a long way in keeping you calm and your phone safe.
Have you ever received what looks like an official alert from Apple notifying you about viruses on your iPhone? Have you received pop-ups and other alerts trying to get you to buy services or forward you to random websites? What steps did you take to figure out if it was legitimate or not? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter. Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Apple says Siri isn’t sending your conversations to advertisers
The section specifically responding to the rumors reads:
Apple has never used Siri data to build marketing profiles, never made it available for advertising, and never sold it to anyone for any purpose. We are constantly developing technologies to make Siri even more private, and will continue to do so.
After The Guardian’s report in 2019, Apple apologized and changed its policy, making the default setting not to retain audio recordings from Siri interactions and saying that for users who opt-in to sharing recordings, those recordings would not be shared with third-party contractors.
However, reports about the settlement noted that in earlier filings like this one from 2021, some of the plaintiffs claimed that after they mentioned brand names like “Olive Garden,” “Easton bats,” “Pit Viper sunglasses,” and “Air Jordans,” they were served ads for corresponding products, which they attributed to Siri data.
Apple’s statement tonight says it “does not retain audio recordings of Siri interactions unless users explicitly opt in to help improve Siri, and even then, the recordings are used solely for that purpose. Users can easily opt-out at any time.”
Facebook responded to similar theories in 2014 and 2016 before Mark Zuckerberg addressed it directly, saying “no” to the question while being grilled by Congress over the Cambridge Analytica scandal in 2018.
So, if Apple (and Facebook, Google, etc.) is telling the truth, then why would you see an ad later for something you only talked about?
There are other explanations, and attempts to check the rumors out include an investigation in 2018 that didn’t find evidence of microphone spying but did discover that some apps secretly recorded on-screen user activity that they shipped to third parties.
Technology
Preventing this insidious email forwarding scam that will drain your bank account
With our lives so intertwined with digital communication these days, the threat of email fraud is something we all need to take seriously. Recently, Teresa W. shared a scary experience that underscores the dangers of business email compromise (BEC).
“I almost lost many thousands of dollars through an internet fraud scam. I got a call from our personal banker who said she saw nearly all the money in our business account being withdrawn. She said she got an email from me along with the money wiring directions. I told her I didn’t send that and she said my email came from me directly to her. I said to stop everything and I will get to the bottom of it.
“Apparently the thieves got hold of a wiring instruction paper from my email, which they hacked into. They created a rule in Outlook to bypass me if anything came from them and go straight to the banker. They changed the wiring instructions to go into their account but thank goodness our banker alerted me so I could get to the bottom of it. Too close for comfort!”
This incident highlights a sophisticated scam where cybercriminals gain access to legitimate email accounts and use them to deceive others into transferring funds. Teresa’s quick action, combined with her banker’s vigilance, prevented a significant financial loss, but it serves as a wake-up call for many businesses.
I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my free newsletter.
What is business email compromise (BEC)?
Business email compromise (BEC) is a form of cybercrime that targets companies engaged in wire transfer payments and other financial transactions. The FBI reports that BEC scams have caused billions in losses globally. These scams exploit human psychology rather than technical vulnerabilities, making them particularly insidious.
HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS
How the scam works
Email hacking: Scammers often gain access to email accounts through phishing attacks, where they trick users into revealing their login credentials or by deploying malware that captures sensitive information.
Email rule creation: Once inside the account, scammers can create rules in email clients like Outlook that redirect or hide specific emails. This means that any communication related to fraudulent activities may go unnoticed by the victim.
Impersonation: The scammer impersonates the victim and sends emails to contacts, such as banks or vendors, requesting urgent wire transfers or sensitive information.
Execution: The scammer provides convincing details and urgency in their requests, making it appear as though the email is genuinely from the victim. They may use specific language or references only known to the victim and their contacts.
BEWARE OF ENCRYPTED PDFs AS THE LATEST TRICK TO DELIVER MALWARE TO YOU
Real-life implications
The consequences of BEC scams can be devastating for businesses. In addition to direct financial losses, companies may face reputational damage, loss of customer trust and potential legal ramifications. For small businesses like Teresa’s, which may not have extensive cybersecurity measures in place, the impact can be particularly severe.
WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED
Proactive steps to avoid being a victim of BEC scams
To combat BEC and similar scams, businesses must adopt a proactive approach to cybersecurity.
1) Have strong antivirus software: Use reputable, up-to-date, strong antivirus software to check your system. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
2) Use strong passwords: Ensure passwords are complex (a mix of letters, numbers and symbols) and unique for each account. Make sure to create strong, unique passwords. Consider using a password manager to generate and store complex passwords.
3) Enable two-factor authentication: Where possible, enable multifactor authentication. This adds an extra layer of security to your accounts.
4) Monitor your accounts: Keep an eye on your financial accounts, email accounts and social media for any unusual activity. If you think scammers have stolen your identity, consider identity theft protection here.
Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.
5) Invest in personal data removal services: Using a data removal service can be an effective additional step to protect your personal information after a potential BEC scam. These services locate and remove your information from various online platforms, databases and data brokers. By eliminating unnecessary or outdated information, data removal services minimize your online presence, making it harder for scammers to find and exploit your data.
While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
6) Regularly update security questions: Change security questions and answers periodically to enhance protection.
7) Regularly review email rules: Check for unauthorized changes in email settings that could indicate compromise.
8) Disable auto-forwarding: Unless absolutely necessary, turn off auto-forwarding features to prevent sensitive information from being sent elsewhere without your knowledge.
9) Verify requests: Always verify any financial requests through a secondary communication method (e.g., a phone call) before proceeding with transactions.
10) Limit access: Restrict access to financial information and transactions only to those who need it within your organization.
11) Contact professionals: If you’re unsure about any steps or if the situation seems severe, consider reaching out to a professional IT service.
12) Report the incident: Report the scam to your local authorities and the Federal Trade Commission in the U.S.
13) Create alias email addresses: My top recommendation to avoid being inundated with spam emails is to use an alias email address. An alias email address is an additional email address that can be used to receive emails in the same mailbox as the primary email address. It acts as a forwarding address, directing emails to the primary email address.
In addition to creating throwaway email accounts for online sign-ups and other circumstances where you would not want to disclose your primary email address, alias email addresses are helpful for handling and organizing incoming communications.
Sometimes, it’s best to create various email aliases so that you don’t have to worry about getting tons of spam mail and having your email eventually stolen in a data breach. An alias email address is a great way for you to stop receiving constant spam mail by simply deleting the email alias address. See my review of the best secure and private email services here. SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
The story shared by Teresa W. serves as a crucial reminder of the vulnerabilities inherent in our digital communications. The rise of BEC scams not only threatens financial security but also erodes trust in electronic transactions. By implementing robust security measures and maintaining vigilance at all levels of an organization, individuals and businesses can protect themselves from these insidious attacks.
What additional measures do you think businesses and government agencies should implement to effectively combat the rising threat of email scams? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover. Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Kurt’s key takeaways
Technology
Is this the Nintendo Switch 2?
Nintendo isn’t officially at CES, but it might have stolen the show anyway: accessories-maker Genki brought a 3D-printed mockup of what it says is Nintendo’s Switch successor, and we got to hold it and take some high-resolution pictures.
Based on the mockup of what we’ll call the Switch 2, Nintendo’s next console appears to be wider than the original, with slightly larger Joy-Con controllers that seem like they’ll be more comfortable to hold. Compared to a Steam Deck OLED, the Switch 2 mockup still feels noticeably smaller, in part because the Joy-Cons are not as pronounced and ergonomic as the Deck’s grips. But the mockup still feels closer in size to Valve’s handheld than the original Switch.
As previous rumors have indicated, the Switch 2’s Joy-Cons will attach to the console via magnets instead of a sliding rail, Genki cofounder and CEO Eddie Tsai tells The Verge. To detach a Joy-Con from the Switch 2, you press a big button at the top of the backside of each controller, Tsai says, and that button apparently pushes out a pin that nudges against the chassis of the console, disconnecting the magnets.
You can remove the Joy-Cons with brute force if you really wanted to, according to Tsai, but he says, overall, they feel secure for regular use and that the big release button detaches the Joy-Cons with ease. Tsai declined to share where he’d learned details of the new console.
Tsai also tells The Verge that housed within the mounting channel of the Joy-Cons is an optical sensor, and by using another attachment the new Joy-Cons may offer mouse-like functionality. It sounds a bit like what Lenovo does with its Legion Go handheld.
Nintendo has promised that it will announce the Switch’s successor before April 2025, and as that deadline creeps closer, there have been waves of leaks and rumors about the new hardware. In December, YouTube channel SwitchUp posted a video showing a 3D-printed, non-functional Switch 2 mockup provided by a Chinese case manufacturer. That mockup basically looked like the current Switch but bigger, and it revealed a few other potential changes like a new USB-C port on the top of the device and a mysterious new square button under the Home button on the right Joy-Con.
Days later, accessories-maker Dbrand announced its “Killswitch 2” case, and CEO Adam Ijaz told The Verge that it was designed based on “actual dimensions” based on a “3D scan of the real hardware.” Ijaz also said that it was his “understanding” that the console’s Joy-Cons are magnetically attached. And Dbrand’s imagery showed that the new square button had a “C” printed on it, though Ijaz didn’t know what it was. Days after that, our colleague Sean Hollister spoke with a Redditor who shared apparent photos of the Switch 2’s dock and the inside of what appears to be a Switch 2 Joy-Con.
With that April 2025 deadline inching closer every day, it seems like it won’t be long until Nintendo officially, finally reveals the Switch 2. But until that happens, at least we have these pictures to look at.
Photography by Antonio G. Di Benedetto / The Verge
-
Business1 week ago
These are the top 7 issues facing the struggling restaurant industry in 2025
-
Culture1 week ago
The 25 worst losses in college football history, including Baylor’s 2024 entry at Colorado
-
Sports1 week ago
The top out-of-contract players available as free transfers: Kimmich, De Bruyne, Van Dijk…
-
Politics6 days ago
New Orleans attacker had 'remote detonator' for explosives in French Quarter, Biden says
-
Politics6 days ago
Carter's judicial picks reshaped the federal bench across the country
-
Politics4 days ago
Who Are the Recipients of the Presidential Medal of Freedom?
-
Health3 days ago
Ozempic ‘microdosing’ is the new weight-loss trend: Should you try it?
-
World1 week ago
Ivory Coast says French troops to leave country after decades