Connect with us

Technology

New iPhone scam tricks owners into giving phones away

Published

on

New iPhone scam tricks owners into giving phones away

NEWYou can now listen to Fox News articles!

Getting a brand-new iPhone should be a moment you enjoy. You open the box. You power it on. Everything feels secure. Unfortunately, scammers know that moment too. 

Over the past few weeks, we’ve heard from a number of people who received unexpected phone calls shortly after activating a new iPhone. The callers claimed to be from a major carrier. They said a shipping mistake was made. They insisted the phone needed to be returned right away. One message stood out because it shows exactly how convincing and aggressive this scam can be.

“Somebody called me (the call said it was from Spectrum) and told me they sent the wrong iPhone and needed to replace it. I was to rip off the label on the box, tape it up and set it on my porch steps. FedEx was going to pick it up and they’d put a label on it. And just for my trouble, he’d send me a $100 gift card! However, the guy was just too anxious. He called me again at 7 am to make sure I would follow his instructions. Right after that, I picked up my box on the steps and called Spectrum, who confirmed it was a scam. There are no such things as refurbished i17 phones because they’re brand new. I called the guy back, said a few choice words and hung up on him. Since then, they have called at least twice for the same thing. Spectrum should be warning its customers!”

— Kris L, Columbus, Montana

That second early morning call was the giveaway. Pressure is the scammer’s favorite tool.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

Scammers often strike right after a new iPhone purchase, using urgency and fake carrier calls to catch you off guard before you have time to verify. (Kurt “CyberGuy” Knutsson)

How the new iPhone replacement scam works

This scam relies on timing and pressure. First, criminals focus on people who recently bought a new iPhone. That information often comes from data-broker sites, leaked purchase data or marketing lists sold online. Next, scammers spoof a carrier phone number. As a result, the call appears legitimate. They sound confident and informed because they already know the device model you ordered.

Once the call begins, the story moves quickly. The scammer claims a shipping mistake occurred. Then they insist the phone must be returned right away. To reinforce urgency, they say a courier is already scheduled. If you follow the instructions, you hand over a brand-new iPhone. At that point, the device is gone. The scammer either resells it or strips it for parts. By the time you realize something is wrong, recovery is unlikely.

Advertisement

Why this scam feels so believable

This scam copies real customer service processes. Carriers do ship replacement phones. FedEx does handle returns. Gift cards are often used as apologies. Scammers blend those facts together and add urgency. They count on you acting before you verify. They also rely on one risky assumption, that a phone call that looks real must be real.

REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

By spoofing trusted phone numbers and knowing details about your device, criminals make these calls feel real enough to push you into acting fast. (Kurt “CyberGuy” Knutsson)

Red flags that give this scam away

Once you know what to watch for, the warning signs are clear.

• Unsolicited calls about returns you did not request

Advertisement

• Pressure to act fast

• Instructions to leave a phone outside

• Promises of gift cards for cooperation

• Follow-up calls to rush you

Legitimate carriers do not handle returns this way.

Advertisement

THE FAKE REFUND SCAM: WHY SCAMMERS LOVE HOLIDAY SHOPPERS

Once a phone is handed over, it is usually resold or stripped for parts, leaving victims with no device and little chance of recovery. (Kurt “CyberGuy” Knutsson)

Ways to stay safe from iPhone return scams

Protecting yourself starts with slowing things down. Scammers rely on speed and confusion. You win by pausing and verifying.

1) Never return a device based on a phone call alone

Hang up and contact the carrier using the number on your bill or the official website. If the issue is real, they will confirm it.

2) Do not leave electronics outside for pickup

Legitimate returns use tracked shipping labels tied to your account. Carriers do not ask you to leave phones on porches or doorsteps.

Advertisement

3) Be skeptical of urgency

Scammers rush you on purpose. Pressure shuts down careful thinking. Any demand for immediate action should raise concern.

4) Use a data removal service

Scammers often know what phone you bought because your personal data is widely available online. Data removal services help reduce your exposure by removing your information from data broker sites that criminals rely on. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

5) Install strong antivirus software

Strong antivirus software adds another layer of protection. Many antivirus tools help block scam calls, warn about phishing links and alert you to suspicious activity before damage is done.

Advertisement

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android, & iOS devices at Cyberguy.com.

6) Save messages and call details

Keep voicemails, phone numbers and timestamps. This information helps carriers warn other customers and spot repeat scams.

7) Share this scam with others

Criminals reuse the same script again and again. A quick warning to friends or family could stop the next victim.

Kurt’s key takeaways

Scams aimed at new iPhone owners are getting more targeted and more aggressive. Criminals are timing their calls carefully and copying real carrier language. The simplest defense still works best. Verify before you act. If a call pressures you to rush or hand over a device, pause and contact the company directly. That one step can save you hundreds of dollars and a major headache.

Advertisement

If a carrier called you tomorrow claiming a mistake with your new phone, would you verify first or would urgency take over? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Tired of websites blocking your VPN? A dedicated IP fixes that

Published

on

Tired of websites blocking your VPN? A dedicated IP fixes that

NEWYou can now listen to Fox News articles!

If you have ever turned on your VPN and suddenly could not log in to your bank, email, streaming service or work portal, you are not imagining things. In fact, this is one of the most common frustrations VPN users face today.

However, the issue is not that VPNs stopped working. Instead, websites have become far more aggressive about blocking traffic that looks suspicious.

As a result, the way your VPN is built now matters just as much as whether you use one at all.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter    

Advertisement

Shared VPN IPs often trigger red flags, which is why banks, email providers and streaming sites sometimes block access. (Kurt “CyberGuy” Knutsson)

Why websites block many VPN connections

Most VPNs give you a shared IP address. As a result, hundreds or even thousands of people can appear online from the same address at the same time. From a website’s perspective, that traffic pattern raises red flags. When platforms detect too many logins, rapid location changes or unusual activity tied to one IP, they step in quickly. In many cases, they respond by:

  • Blocking access
  • Triggering captchas
  • Requiring extra verification codes
  • Temporarily locking accounts

Meanwhile, you did nothing wrong. Instead, you end up dealing with restrictions caused by other users sharing that same IP address.

What a dedicated IP does differently

With a dedicated IP, you get an address that belongs only to you. Unlike shared VPN connections, no one else uses it.

Each time you connect, you use the same IP address. As a result, you avoid sharing traffic, rotating locations or competing with random users whose activity could trigger blocks.

Because of that consistency, your connection looks much more like a typical home or office internet setup. And that simple difference can dramatically reduce website suspicion and login headaches.

Advertisement

NEW YORK HALTS ROBOTAXI EXPANSION PLAN

A dedicated IP gives you a consistent address that looks more like a normal home connection, reducing captchas and login alerts. (Kurt “CyberGuy” Knutsson)

What a dedicated IP can do that shared VPN IPs usually can’t

That consistency does more than reduce suspicion; it improves how smoothly you access the sites and services you use every day.

Access more websites without blocks

Banks, government portals, healthcare sites, and streaming services are far less likely to block a dedicated IP because it does not show heavy or erratic traffic patterns.

Reduce captchas and security challenges

Those endless “prove you’re human” messages are usually triggered by shared IP abuse. A dedicated IP dramatically reduces them.

Advertisement

Make banking and email logins smoother

Financial institutions and email providers often flag constantly changing IP addresses as suspicious. A dedicated IP stays consistent, so login alerts and lockouts happen far less often.

Support remote work and secure systems

Some employers only allow access from approved IP addresses. Shared VPN IPs cannot be approved. Dedicated IPs can.

Improve streaming reliability

Shared VPN IPs are often the first to get blocked when streaming services crack down. Dedicated IPs are less likely to be flagged because traffic looks normal and predictable.

What a dedicated IP does not do

A dedicated IP:

  • Does not remove encryption
  • Does not expose your identity
  • Does not weaken your privacy

Your traffic remains encrypted, and your real location stays hidden. You simply get a connection that websites trust more.

Who benefits most from a dedicated IP

A dedicated IP is especially helpful if you:

Advertisement
  • Use online banking regularly
  • Travel and access sites from different locations
  • Work remotely
  • Stream often
  • Get tired of captchas and blocked pages
  • Want a VPN that feels normal to use

GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK

With fewer blocks and smoother logins, a dedicated IP helps your VPN work quietly in the background instead of getting in your way. (Kurt “CyberGuy” Knutsson)

How to choose a VPN that offers a dedicated IP

If you want these benefits, look for a VPN provider that offers a dedicated IP option built directly into its service. Some providers include it in premium plans, while others offer it as an add-on. Either way, the process should be simple. You should be able to select your dedicated IP inside the app without advanced setup or manual configuration. Before signing up, check that the provider also offers strong speeds, reliable uptime and clear privacy policies. A dedicated IP improves access, but overall performance still matters.

 What to look for beyond a dedicated IP

A dedicated IP reduces blocks. However, a quality VPN should also deliver strong security and smooth performance.

Fast, stable connections: Speed matters for streaming, video calls and everyday browsing. Look for providers known for consistent performance.

Wide server coverage: More server locations give you flexibility when traveling and help reduce location errors.

Advertisement

Clear privacy practices: Choose a VPN with a strict no-logs policy and independent audits when possible.

Secure server technology: Modern VPNs often use RAM-based servers that automatically wipe data on reboot.

Easy-to-use apps: Protection should feel simple, not technical. Clean apps across major devices make daily use effortless.

For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com

Kurt’s key takeaway

If your VPN keeps getting blocked, the problem may not be the VPN itself. It may be the shared IP address behind it. Websites are increasingly aggressive about suspicious traffic. When hundreds of users share the same IP, banks, email providers and streaming platforms take notice. That is when the captchas, verification codes and account lockouts start. A dedicated IP changes that experience. You still get encryption. You still protect your real location. But your connection looks stable and predictable, which helps you avoid constant interruptions.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Should protecting your privacy really mean fighting with your bank, email, and streaming apps? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter  

Copyright 2026 CyberGuy.com.  All rights reserved.  

Advertisement

Related Article

What Trump's 'ratepayer protection pledge' means for you
Continue Reading

Technology

Polymarket defends its decision to allow betting on war as ‘invaluable’

Published

on

Polymarket defends its decision to allow betting on war as ‘invaluable’
It might be World War III, but at least I won $20. | Image: Polymarket / The Verge

Polymarket has been allowing people to bet on when the US would strike Iran next. Obviously, now that it’s actually happened and people have died, the prediction betting market is feeling some pressure. The site has been at the center of controversy before, including suspicions of insider trading on the Super Bowl halftime show and the capture of Venezuelan President Nicolás Maduro.

In a statement posted on its site, Polymarket defended its decision to allow betting on the potential start of a war, saying that it was an “invaluable” source of news and answers, before taking shots at traditional media and Elon Musk’s X. The statement reads:

Read the full story at The Verge.

Continue Reading

Technology

Google dropped dark web monitoring: Should you care?

Published

on

Google dropped dark web monitoring: Should you care?

NEWYou can now listen to Fox News articles!

Google has officially discontinued its Dark Web Report feature, a free tool that once scanned known dark web breach dumps for personal information tied to a user’s Google account. The service delivered notifications when email addresses and other identifiers appeared in leaked datasets.

According to Google’s support page, the system ceased scanning for new dark web data Jan. 15, 2026, and the reporting function was removed entirely on Feb. 16, 2026, meaning users can no longer access the feature.

The company said the decision reflects a shift toward security tools it believes provide clearer guidance after exposure, rather than standalone scan alerts.

If you previously relied on the free dark web scan as an early warning signal for leaked data, this change removes one of your sources.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Google officially ended its Dark Web Report tool, removing free breach alerts tied to user accounts. (Kurt “CyberGuy” Knutsson)

So what did users really lose?

Google’s Dark Web Report acted as a basic exposure scanner. It checked whether personal information linked to a Google account had surfaced in known breach collections circulating on the dark web.

When a match is found, users receive a notification identifying which type of data appeared in a leak. Depending on the data breach, that could include an email address, phone number, date of birth or other identifying details commonly harvested during large-scale hacks.

The report did not display stolen credentials or provide access to the leaked database itself. It also did not trace the origin of the compromise beyond referencing the breached service when available.

Advertisement

After an alert was issued, the next steps were left to the user. Google recommended actions such as changing passwords, enabling stronger authentication methods and reviewing account security settings. With the tool now removed, that automated breach check tied directly to a Google account is no longer available.

What you still have access to

Google directs users to its Security Checkup, a dashboard that scans your account for weak settings and unusual sign-in activity.

Its built-in Password Manager includes Password Checkup, which scans saved credentials against known breach databases and prompts you to change exposed passwords. Google also supports passkeys and two-factor verification to lock down account access.

The Results About You tool lets users search for personal information in Google Search and submit removal requests for certain publicly indexed details.

149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

Advertisement

Without the automatic scan, users must now check for leaked data using other security tools. (iStock)

Alerts don’t always mean protection

Once personal information is compromised, it often ends up far beyond the breach itself. Stolen credentials and identity data are regularly trafficked on underground platforms where buyers can search for information tied to real people.

The BidenCash dark web marketplace was taken down by U.S. authorities in June 2025, and the Justice Department confirmed that the platform peddled stolen personal information and credit card data.

These illicit markets operate with a level of organization not unlike legitimate online stores. Search tools and bulk data sets are up for grabs and can be used to target any online account. This makes credential stuffing easier, where attackers test leaked passwords across multiple services in hopes of barreling into your account.

A breach alert tied to a dark web scan points to a leak at one moment in time; it does not follow whether that information has been sold to third parties or used in subsequent fraud attempts. For everyday users, this means that just knowing your data appeared in a leak doesn’t help much.

Advertisement

THINK YOUR NEW YEAR’S PRIVACY RESET WORKED? THINK AGAIN

Stolen personal information can circulate for years, making ongoing monitoring more important than a one-time alert.  (Kurt “CyberGuy” Knutsson)

Identity monitoring may be a better option

With Google’s scan gone, some people may consider dedicated identity protection services instead. Many of these services offer continuous monitoring of your personally identifiable information and send alerts about changes to your credit reports from all three major U.S. credit bureaus. That can include notifications about new inquiries, newly opened accounts and monthly credit score updates. Some plans also monitor a broader range of personal identifiers, such as driver’s license numbers, passport numbers and email addresses.

Beyond credit monitoring, certain services track linked bank, credit card and investment accounts for unusual activity. They may also monitor public records for changes to addresses or property titles and alert you if your information appears in those filings.

Many providers include identity theft insurance to help cover eligible out-of-pocket recovery costs. Coverage limits vary by plan and provider. Additional features often include spam call and message protection, a password manager, a virtual private network (VPN) and antivirus software.

Advertisement

No service can prevent every form of identity theft. However, ongoing monitoring and recovery support can make it easier to respond quickly if your information is misused.

See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.

Kurt’s key takeaways

Google’s decision to drop its Dark Web Report may seem small. But it removes a tool many users relied on. For some, those alerts were the first warning that their data appeared in a breach. That automatic scan is now gone. Google still offers Security Checkup, Password Checkup, passkeys and two-step verification. However, none of them actively scan dark web breach dumps for you. Stolen data does not disappear. Criminals copy, sell and reuse it. One alert shows a single moment. Ongoing identity theft monitoring helps you stay aware over time.

Now that Google has dropped its dark web monitoring feature, will you actively check your data exposure or assume someone else is watching it for you? Let us know your thoughts by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

Substack data breach exposes emails and phone numbers
Advertisement
Continue Reading

Trending