Connect with us

Technology

Protect your data before holiday shopping scams strike

Published

on

Protect your data before holiday shopping scams strike

NEWYou can now listen to Fox News articles!

The holiday season is the happiest and riskiest time of year to be online. As millions of us gear up for Black Friday and Cyber Monday deals, scammers do the same.

Every year, they target holiday shoppers with fake websites, “too-good-to-be-true” deals and scam emails that look identical to legitimate retailers. But here’s the part most people miss: scammers don’t just rely on luck. They already have your personal data before you even click “add to cart.”

From leaked email addresses to exposed phone numbers and home addresses, your personal information is being bought and sold by data brokers, companies that collect and resell detailed profiles about you. Those profiles are exactly what scammers use to send realistic “order confirmations,” fake delivery alerts and “urgent payment” texts during this holiday period and beyond.

Let’s unpack how this works and what you can do now to stay safe before the holiday chaos begins.

Advertisement

RETIREES LOSE MILLIONS TO FAKE HOLIDAY CHARITIES AS SCAMMERS EXPLOIT SEASONAL GENEROSITY

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Scammers ramp up fake websites and emails during the holiday shopping rush. (iStock)

Why scammers love the holiday season

November through December is a goldmine for cybercriminals. According to the CISA, reports of online shopping scams spike during this time of year and vary in their approaches. The reason? We let our guard down when we’re rushed, distracted or excited by a deal. Staying alert during the holiday season can help you avoid data exposure and financial losses. Here are some of the most common scams you should be aware of. 

Phantom stores

The surge of promotions during the holiday season is the perfect time for “phantom stores” to thrive. It’s a fraudulent store that mimics the interface and products of a well-known brand. Once you purchase from such a website, you’ll never receive your order as the store doesn’t actually exist.

Advertisement

Real-world example: Fake IKEA websites appeared with URLs spelled “ikeaa-sale.com” and “ikea-blackfriday.shop,” mimicking the official ikea.com interface with copied product images, logos and discount banners.

They lured shoppers with huge discounts and clearance offers to steal credit card data. Eventually, they were reported and taken down, but the damage has been done.

What to do? Always check the URL of the store you shop at and only click links from the store’s official website or social media.

Delivery scams

According to recent research, some of the most popular shopping apps are selling your location data to third parties. It’s no surprise that you might receive fake delivery texts.

Your leaked data fuels realistic “order” and “delivery” scams online. (iStock)

Advertisement

MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH

Real-world example: Temu is a popular app for scammers to mimic. They can easily find your contact information and order details to text “Your order couldn’t be delivered.” Each text contains a phishing link that can install malware on your device or steal your personal information.

What to do? Make sure the texts you receive come from a legit courier service and double-check it on the store’s website.

Fake order emails

Some scammers use sophisticated phishing tactics to lure victims. They engineer emails from well-known brands, use an urgent tone, place malicious links and urge you to click on your order status. In reality, there is no order status – they’re stealing your data.

Real-world example: Amazon is one of the biggest online retailers worldwide, and that makes the brand easy to mimic. Scammers send emails on behalf of Amazon to try to steal customers’ personal data because it’s highly likely that their victims have used Amazon, making it less suspicious. However, phishing emails have some telltale signs you can look out for.

Advertisement

What to do? Never click on any suspicious links and always check the sender’s contact information.

Unwanted data exposure

When you shop online, you should be aware of the data you share, including your contact information, shopping habits, credit card details and more. All stores collect some type of data about you. However, some companies collect more than you think.

Real-world example: The infamous Target controversy in 2012 revealed how big retailers use data analysis to predict your shopping behavior. The company collected shopping data and managed to produce a predictive model for soon-to-be mothers.

They sent out brochures with baby clothes, vouchers for baby formula and more before the customers even knew they were pregnant. Thankfully, modern shopping looks a bit different. You can opt out of certain data collection and exercise your right to remove personal information from websites that collect it.

What to do? Check what data the stores collect about you and request the removal of any private information you don’t want them to have.

Advertisement

THE TRUTH BEHIND THOSE MYSTERIOUS SHIPMENT EMAILS IN YOUR INBOX

How scammers find you

Imagine you’re browsing for gifts online. Within minutes, your activity generates data points – device info, IP address, browsing habits that feed into online databases. At the same time, data brokers already have your full profile: age, income, address history, family members and even shopping behavior. These profiles are sold to marketers and often leak into criminal databases.

That’s why scam calls, texts and emails often feel so “real.” They use your name, the right retailer, even your city. They’re not guessing. They’ve bought your digital footprint.

The “holiday cleanup” your data needs

Most people clear their browser cookies or delete old emails to “stay private.” But that’s like locking your front door while leaving all your personal documents on the lawn.

If you want to stop scammers from targeting you this holiday season, you need to remove your personal data from the source, the data broker databases that feed these scams.

Advertisement

That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Practical steps before you shop

To make sure your online shopping season stays stress-free and scam-free, here’s what CyberGuy recommends doing this week:

INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU

Advertisement

1) Run a privacy scan with a data removal service

Before the holiday rush, remove your exposed data from data brokers. You’ll reduce the number of scam calls, emails and texts you get this season and protect your financial info before it’s too late.

Take control by removing personal data from broker databases before you shop. (iStock)

2) Secure your email

Use strong, unique passwords for each online store or service. Consider a password manager to simplify this.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

Advertisement

3) Check for fake stores

Before clicking a social media ad or email, hover over the link. Legit retailers use secure “https://” URLs and their exact brand name – no extra words or letters.

4) Avoid public Wi-Fi

Don’t shop or enter payment info over public Wi-Fi in an airport, café or mall, for example. Scammers can easily intercept unencrypted traffic.

5) Use credit cards or PayPal – not debit cards

HACKERS TARGET ONLINE STORES WITH NEW ATTACK

Credit cards have stronger fraud protection and make it easier to dispute unauthorized charges.

6) Enable two-factor authentication (2FA)

Turn on 2FA for your email, bank and shopping accounts. Even if scammers get your password, they can’t log in without your second verification step.

Advertisement

7) Keep your software and apps updated

Cybercriminals often exploit outdated browsers or apps. Update your phone, computer and shopping apps before the holiday rush to close those security holes.

8) Monitor your bank and credit statements

Check your accounts daily during the shopping season. The faster you spot a suspicious charge, the easier it is to reverse and protect your funds.

Kurt’s key takeaways

Black Friday through Cyber Monday is the peak time for data harvesting. Every purchase, coupon code and sign-up adds to the profile that marketers and data brokers hold on you. That information can linger online for years, long after the sales end. The good news? It’s easier than ever to reclaim your privacy. By taking just a few minutes today, you can enjoy the holidays knowing your personal data is no longer on the open market.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

How confident are you that your personal data isn’t already fueling a scam this holiday season? Let us know by writing to us at Cyberguy.com.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com. All rights reserved.  

Advertisement

Technology

Amazon adds controversial AI facial recognition to Ring

Published

on

Amazon adds controversial AI facial recognition to Ring

NEWYou can now listen to Fox News articles!

Amazon’s Ring video doorbells are getting a major artificial intelligence (AI) upgrade, and it is already stirring controversy.

The company has started rolling out a new feature called Familiar Faces to Ring owners across the United States. Once enabled, the feature uses AI-powered facial recognition to identify people who regularly appear at your door. Instead of a generic alert saying a person is at your door, you might see something far more personal, like “Mom at Front Door.” On the surface, that sounds convenient.

Privacy advocates, however, say this shift comes with real risks.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Advertisement

GOOGLE NEST STILL SENDS DATA AFTER REMOTE CONTROL CUTOFF, RESEARCHER FINDS

Ring’s new Familiar Faces feature uses AI facial recognition to identify people who regularly appear at your door and personalize alerts. (Chip Somodevilla/Getty Images)

How Ring’s Familiar Faces feature works

Ring says Familiar Faces helps you manage alerts by recognizing people you know. Here is how it works in practice. You can create a catalog of up to 50 faces. These may include family members, friends, neighbors, delivery drivers, household staff or other frequent visitors. After labeling a face in the Ring app, the camera will recognize that person as they approach. Anyone who regularly passes in front of your Ring camera can be labeled by the device owner if they choose to do so, even if that person is unaware they are being identified.

From there, Ring sends personalized notifications tied to that face. You can also fine-tune alerts on a per-face basis, which means fewer pings for your own comings and goings. Importantly, the feature is not enabled by default. You must turn it on manually in the Ring app settings. Faces can be named directly from Event History or from the Familiar Faces library. You can edit names, merge duplicates or delete faces at any time.

Amazon says unnamed faces are automatically removed after 30 days. Once a face is labeled, however, that data remains stored until the user deletes it.

Advertisement

Why privacy groups are pushing back

Despite Amazon’s assurances, consumer protection groups and lawmakers are raising alarms. Ring has a long history of working with law enforcement. In the past, police and fire departments were able to request footage through the Ring Neighbors app. More recently, Amazon partnered with Flock, a company that makes AI-powered surveillance cameras widely used by police and federal agencies. Ring has also struggled with internal security. In 2023, the FTC fined Ring $5.8 million after finding that employees and contractors had unrestricted access to customer videos for years. The Neighbors app previously exposed precise home locations, and Ring account credentials have repeatedly surfaced online. Because of these issues, critics argue that adding facial recognition expands the risk rather than reducing it.

Electronic Frontier Foundation (EFF) staff attorney Mario Trujillo tells CyberGuy, “When you step in front of one of these cameras, your faceprint is taken and stored on Amazon’s servers, whether you consent or not. Today’s feature to recognize your friend at your front door can easily be repurposed tomorrow for mass surveillance. It is important for state regulators to investigate.” The Electronic Frontier Foundation is a well-known nonprofit organization that focuses on digital privacy, civil liberties and consumer rights in the tech space. 

WASHINGTON COURT SAYS FLOCK CAMERA IMAGES ARE PUBLIC RECORDS

Once a face is labeled by the device owner, Ring can replace generic notifications with named alerts tied to that individual. (CyberGuy.com)

Where the feature is blocked and why that matters

Legal pressure is already limiting where Familiar Faces can launch. According to the EFF, privacy laws are preventing Amazon from offering the feature in Illinois, Texas and Portland, Oregon. These jurisdictions have stricter biometric privacy protections, which suggests regulators see facial recognition in the home as a higher-risk technology. U.S. Senator Ed Markey has also called on Amazon to abandon the feature altogether, citing concerns about surveillance creep and biometric data misuse.

Advertisement

Amazon says biometric data is processed in the cloud and not used to train AI models. The company also claims it cannot identify all locations where a face appears, even if law enforcement asks. Still, critics point out the similarity to Ring’s Search Party feature, which already scans neighborhoods to locate lost pets.

We reached out to Amazon for comment but did not receive a response before our deadline.

Ring’s other AI feature feels very different

Not all of Ring’s AI updates raise the same level of concern. Ring recently introduced Video Descriptions, a generative AI feature that summarizes motion activity in plain text. Instead of guessing what triggered an alert, you might see messages like “A person is walking up the steps with a black dog” or “Two people are peering into a white car in the driveway.”

HOW RESTAURANT RESERVATION PLATFORM OPENTABLE TRACKS CUSTOMER DINING HABITS

Ring’s Video Descriptions feature takes a different approach by summarizing activity without identifying people by name. (Amazon)

Advertisement

How Video Descriptions decides what matters

This AI focuses on actions rather than identities. It helps you quickly decide whether an alert is urgent or routine. Over time, Ring says the system can recognize activity patterns around a home and only notify you when something unusual happens. However, as with any AI system, accuracy can vary depending on lighting, camera angle, distance and environmental conditions. Video Descriptions is currently rolling out in beta to Ring Home Premium subscribers in the U.S. and Canada. Unlike facial recognition, this feature improves clarity without naming or tracking specific people. That contrast matters.

Video Descriptions turns motion alerts into short summaries, helping you understand what is happening without identifying who is involved. (Amazon)

Should you turn Familiar Faces on?

If you own a Ring doorbell, caution is wise. While Familiar Faces may reduce notification fatigue, labeling people by name creates a detailed record of who comes to your home and when. Given Ring’s past security lapses and close ties with law enforcement, many privacy experts recommend keeping the feature disabled. If you do use it, avoid full names and remove faces you no longer need. In many cases, simply checking the live video feed is safer than relying on AI labels. Not every smart home feature needs to know who someone is.

How to turn Familiar Faces on or off in the Ring app

If you want to review or change this setting, you can do so at any time in the Ring mobile app.

Advertisement

To enable Familiar Faces:

  • Open the Ring app
  • Tap the menu icon
  • Select Control Center
  • Tap Video and Snapshot Capture
  • Select Familiar Faces
  • Toggle the feature on and follow the on-screen prompts

To turn Familiar Faces off:

  • Open the Ring app
  • Go to Control Center
  • Tap Video and Snapshot Capture
  • Select Familiar Faces
  • Toggle the feature off

Turning the feature off stops facial recognition and prevents new faces from being identified. Any labeled faces can also be deleted manually from the Familiar Faces library if you want to remove stored data.

Alexa is now answering your door for you

Amazon is also rolling out a very different kind of AI feature for Ring doorbells, and it lives inside Alexa+. Called Greetings, this update gives Ring doorbells a conversational AI voice that can interact with people at your door when you are busy or not home. Instead of identifying who someone is, Greetings focuses on what they appear to be doing. Using Ring’s video descriptions, the system looks at apparel, actions, and objects to decide how to respond. 

For example, if someone in a delivery uniform drops off a package, Alexa can tell them exactly where to leave it based on your instructions. You can even set preferences to guide delivery drivers toward a specific spot, or let them know water or snacks are available. If a delivery requires a signature, Alexa can ask the driver when they plan to return and pass that message along to you. The feature can also handle sales representatives or service vendors. You might set a rule such as politely declining sales pitches without ever coming to the door yourself.

Greetings can also work for friends and family. If someone stops by while you are away, Alexa can greet them and ask them to leave a message for you. That interaction is saved so you can review it later. That said, the system is not perfect. Because it relies on visual context rather than identity, mistakes can happen. A friend who works in logistics could show up wearing a delivery uniform and be treated like a courier instead of being invited to leave a message. Amazon acknowledges that accuracy can vary. Importantly, Amazon says Greetings does not identify who a person is. It uses Ring’s video descriptions to determine the main subject in front of the camera and generate responses, without naming or recognizing individuals. That makes it fundamentally different from the Familiar Faces feature, even though both rely on AI.

Greetings is compatible with Ring Wired Doorbell Pro (3rd Gen) and Ring Wired Doorbell Plus (2nd Gen). It is available to Ring Premium Plan subscribers who have video descriptions enabled and is currently rolling out to Alexa+ Early Access users in the United States and Canada.

Thinking about a Ring doorbell?

If you are already in the Ring ecosystem or considering a video doorbell, Ring’s lineup includes models with motion alerts, HD video, night vision, and optional AI-powered features such as Video Descriptions. While Familiar Faces remains controversial and can be turned off, many homeowners still use Ring doorbells for basic security awareness and package monitoring. 

Advertisement

If you decide Ring is right for your home, you can check out the latest Ring Video Doorbell models or compare features and pricing with other options by visiting Cyberguy.com and searching “Top Video Doorbells.”

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Amazon Ring’s AI facial recognition feature shows how quickly convenience can collide with privacy. Familiar Faces may offer smarter alerts, but it also expands surveillance into deeply personal spaces. Meanwhile, features like Video Descriptions prove that AI can be useful without identifying people. As smart home tech evolves, the real question is not what AI can do but what it should do.

Would you trade fewer notifications for a system that recognizes and names everyone who comes to your door? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Anker’s beefy Laptop Power Bank has returned to its Black Friday low

Published

on

Anker’s beefy Laptop Power Bank has returned to its Black Friday low

As you might expect, things have been relatively quiet on the deals front since Black Friday, particularly when it comes to discounts on charging accessories. Thankfully, Anker’s aptly titled Laptop Power Bank is once again on sale at Amazon and Walmart for $87.99 ($47 off), which matches the record-low price we last saw at the end of November.

Unless you’ve been living under a proverbial rock for the past several years, you’re probably aware that Anker makes an ungodly amount of charging accessories. The portable A1695 “InstaCord” has quickly become a favorite among Verge staffers, however, owing to the fact that it comes with a retractable USB-C cable and a second that doubles as a handle, both of which are bidirectional and allow for passthrough charging. The 25,000mAh / 90Wh power bank also sports a USB-A port and an additional USB-C port, allowing you to charge your phone, a MacBook Pro, and up to two other devices simultaneously.

In terms of output distribution, Anker’s 600-gram Laptop Power Bank can deliver up to 165W when two devices are plugged in, or up to 130W when charging three or four gadgets. It’s carry-on compliant, too, meaning you shouldn’t have any trouble getting it through TSA while traveling, which isn’t the case if your charger is above the agency’s 100 watt-hours threshold for carry-on devices. It even features a built-in LCD display, allowing you to quickly view the remaining charge, overall power output, battery temperature, and other info at a glance.

Continue Reading

Technology

New malware can read your chats and steal your money

Published

on

New malware can read your chats and steal your money

NEWYou can now listen to Fox News articles!

A new Android banking trojan called Sturnus is shaping up to be one of the most capable threats we have seen in a while. It is still in early development, but it already behaves like a fully mature operation. 

Once it infects a device, it can take over your screen, steal your banking credentials and even read encrypted chats from apps you trust. The worrying part is how quietly it works in the background. You think your messages are safe because they are end-to-end encrypted, but this malware simply waits for the phone to decrypt them before grabbing everything. 

It’s important to note, however, that Sturnus does not break encryption; it only captures messages after your apps decrypt them on your device.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Advertisement

Sturnus malware uses deceptive screens that mimic real banking apps to steal your credentials in seconds. (Kurt “CyberGuy” Knutsson )

A closer look at the malware’s capabilities

Sturnus combines several attack layers that give the operator nearly full visibility into the device, as reported by cybersecurity research firm ThreatFabric. It uses HTML overlays that mimic real banking apps to trick you into typing your credentials. Everything you enter goes straight to the attacker through a WebView that forwards the data instantly. It also runs an aggressive keylogging system through the Android Accessibility Service. This lets it capture text as you type, follow which app is open, and map every UI element on the screen. Even when apps block screenshots, the malware keeps tracking the UI tree in real time, which is enough to reconstruct what you are doing.

NEW ANDROID MALWARE CAN EMPTY YOUR BANK ACCOUNT IN SECONDS

On top of overlays and keylogging, the malware monitors WhatsApp, Telegram, Signal and other messaging apps. It waits for these apps to decrypt messages locally, then captures the text right from the screen. This means your chats may remain encrypted over the network, but once the message appears on your display, Sturnus sees the entire conversation. It also includes a full remote control feature with live screen streaming and a more efficient mode that sends only interface data. This allows precise taps, text injection, scrolling and permission approvals without showing any activity to the victim.

How Sturnus stays hidden and steals money

The malware protects itself by grabbing Device Administrator privileges and blocking any attempt to remove it. If you open the settings page that could disable those permissions, Sturnus detects it immediately and moves you away from the screen before you can act. It also monitors battery state, SIM changes, developer mode, network conditions and even signs of forensic investigation to decide how to behave. All this data goes back to the command-and-control server through a mix of WebSocket and HTTP channels protected with RSA and AES encryption.

Advertisement

When it comes to financial theft, the malware has several ways to take over your accounts. It can collect credentials through overlays, keylogging, UI-tree monitoring and direct text injection. If needed, it can black out your screen with a full-screen overlay while the attacker performs fraudulent transactions in the background. Since the screen is hidden, you have no idea anything is happening until it is too late.

7 ways you can stay safe from Android malware like Sturnus

If you want to protect yourself from threats like this, here are a few practical things you can start doing right away.

1) Install apps only from trusted and verified sources

Avoid downloading APKs from forwarded links, shady websites, Telegram groups or third-party app stores. Banking malware spreads most effectively through sideloaded installers disguised as updates, coupons or new features. If you need an app that isn’t in the Play Store, verify the developer’s official site, check hashes if provided and read recent reviews to make sure the app hasn’t been hijacked.

2) Check permission requests carefully before tapping allow

Most dangerous malware relies on accessibility permissions because they allow full visibility into your screen and interactions. Device administrator rights are even more powerful since they can block removal. If a simple utility app suddenly asks for these, stop immediately. These permissions should only be granted to apps that genuinely need them, such as password managers or accessibility tools you trust.

3) Keep your phone updated

Install system updates as soon as they arrive, since many Android banking trojans target older devices that lack the latest security patches. If your phone is no longer receiving updates, you are at a higher risk, especially when using financial apps. Avoid sideloading custom ROMs unless you know how they handle security patches and Google Play Protect.

Advertisement

HOW ANDROID MALWARE LETS THIEVES ACCESS YOUR ATM CASH

4) Use strong antivirus software

The malware quietly captures decrypted messages from apps like WhatsApp, Telegram and Signal right as they appear on your screen. (Kurt Knutsson)

Android phones come with Google Play Protect built in, which catches a large chunk of known malware families and warns you when apps behave suspiciously. But if you want greater security and control, choose a third-party antivirus app. These tools can alert you when an app starts logging your screen or trying to take over your phone.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.

Advertisement

5) Use a personal data removal service

A lot of these campaigns rely on data brokers, leaked databases and scraped profiles to build lists of people to target. If your phone number, email, address or social handles are floating around on dozens of broker sites, it becomes much easier for attackers to reach you with malware links or tailored scams. A personal data removal service helps clean up that footprint by deleting your info from data broker listings.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Treat unusual login screens and pop-ups as red flags

Trojan overlays often appear when you open your bank app or a popular service. If the screen layout looks different or asks for credentials in a way you don’t recognize, close the app completely. Reopen it from your app drawer and see if the prompt returns. If it doesn’t, you probably caught an overlay. Never type banking details into screens that appear suddenly or seem out of place.

Advertisement

With remote control tools that stream your screen and automate taps, attackers can move money behind the scenes without you noticing. (Felix Zahn/Photothek via Getty Images)

7) Be cautious with links and attachments you receive

Attackers frequently distribute malware through WhatsApp links, SMS messages and email attachments pretending to be invoices, refunds or delivery updates. If you receive a link you weren’t expecting, open your browser manually and search for the service instead. Avoid installing anything that comes from a message, even if it appears to be from someone you know. Compromised accounts are a common delivery method.

DATA BREACH EXPOSES 400,000 BANK CUSTOMERS’ INFO

Kurt’s key takeaway

Sturnus is still a young malware family, but it already stands out for how much control it gives attackers. It sidesteps encrypted messaging, steals banking credentials with multiple backup methods, and maintains a strong grip on the device through administrator privileges and constant environmental checks. Even if the current campaigns are limited, the level of sophistication here suggests a threat that is being refined for larger operations. If it reaches wide distribution, it could become one of the most damaging Android banking trojans in circulation.

Have scammers ever tried to trick you into installing an app or clicking a link? How did you handle it? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com. All rights reserved.

Continue Reading
Advertisement

Trending