Technology
Protecting your daughter from deepfakes and online abuse

Most of us have at least one young woman in our lives that we cherish — a daughter, niece or goddaughter, for example. Well, this International Women’s Day, I learned something that should be concerning to us all. Fully 96% of all deepfakes — artificial intelligence-generated images and videos that use someone’s likeness — are pornographic and target women without their consent.
One well-known case involved an Australian law student who discovered that manipulated pornographic images of her were being shared online when she was just 18. But this isn’t an isolated incident. According to a recent survey of women in the U.S., AI deepfakes are among the types of online abuse that a significant number of women face despite being a relatively new technology.
But this isn’t the only type of online abuse women face.
According to the same survey, one in four women in the U.S. say they’ve experienced online abuse, including cyberbullying, doxxing, sexual harassment, trolling and AI deepfakes. And young women between the ages of 18 and 34 appear to experience much higher rates of online abuse than older generations.
STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW
A woman with her daughter working on a laptop (Kurt “CyberGuy” Knutsson)
Why are younger women at higher risk?
It probably has a lot to do with how much time younger people spend online. Research shows, to no one’s surprise, that younger generations use social media twice as much as older generations (80% versus 42%, respectively). However, it also indicates that women use it more than men.
Data privacy also plays a role. A recent study showed younger generations are generally less concerned about keeping their personal information private compared to older generations. Growing up in a digital-first world, many younger people appear to be desensitized to data collection and are more willing to share personal information online. That, in turn, puts them at higher risk of cybercrimes and abuse.
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS
So, what can you do to help?
If you are concerned about this, and you should be, there are several steps you can take to protect your female loved ones from online abuse and empower them to navigate the digital world safely.

A woman working on her laptop (Kurt “CyberGuy” Knutsson)
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
1. Talk to them about online privacy
We live in a world where people constantly share thoughts, pictures and videos. Telling a 22-year-old to stop posting online altogether probably won’t get you far, but encouraging them to limit who can see their information is a reasonable compromise. Here are some things you can discuss:
- Setting social media profiles to “private” so photos, videos and personal details aren’t easily accessible to strangers.
- Being selective about who they accept as friends and followers.
- How social media platforms are designed to be addictive. The constant validation from likes and comments — especially from strangers — can make young women more vulnerable to online predators and cyberbullies. (“The Social Dilemma” documentary provides an in-depth look at how platforms exploit these behaviors.)
2. Remove personal information from the internet (especially people search sites)
In the survey exploring the experiences of women in the U.S. with online abuse, 65% of respondents said they’ve been negatively affected by having their personal information online. Why? Because online bullies, stalkers and scammers use publicly available information to target victims. But women can reduce the risk of online abuse by removing personal data from the internet:
- Searching their name on Google and identifying which sites have their personal data.
- Opting out of people search websites, which often list names, addresses, phone numbers and even relatives.
- Using a personal data removal service to automate the process and keep their information off these databases in the long term. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
FBI WARNS OF DANGEROUS NEW ‘SMISHING’ SCAM TARGETING YOUR PHONE
3. Make sure they have support and resources
Even with the best precautions, online abuse can still happen. If you have four young female relatives or friends aged 7-21, statistically, it’s likely that three of them have faced some form of online harm in the past year. One of the most powerful things you can do is let them know they have someone to turn to. Online abuse, particularly deepfake pornography and revenge porn, is often designed to humiliate, isolate and silence victims. Knowing they have support can help them regain control and fight back. If someone you love is dealing with online abuse, here are some critical resources:
- Cyber Civil Rights Initiative (for victims of deepfake and revenge porn): The Cyber Civil Rights Initiative provides legal and emotional support to victims of deepfake and revenge porn, helping them navigate the complex process of removing unauthorized images and seeking justice.
- Crisis Text Line: By texting HOME to 741741, individuals can connect with trained crisis counselors who offer immediate emotional support and guidance during moments of crisis, helping them manage overwhelming emotions and find calm.
- National Suicide Prevention Lifeline: Calling or texting 988 connects individuals with trained crisis counselors who provide immediate support for suicidal thoughts, mental health crises or other forms of emotional distress, offering a lifeline to those in urgent need.

Women working on their laptops (Kurt “CyberGuy” Knutsson)
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
4. Teach digital literacy and critical thinking
Encourage young women in your life to question what they see online and develop a healthy skepticism. Teach them how to spot misinformation, recognize potential scams and understand the importance of fact-checking.
5. Discuss the importance of strong, unique passwords
Explain the risks of using weak or repeated passwords across multiple accounts. Encourage the use of password managers and two-factor authentication for added security. Get more details about my best expert-reviewed Password Managers of 2025 here.
6. Promote a healthy balance between online and offline activities
Encourage them to engage in offline hobbies and social activities. This can help reduce screen time and lessen the impact of potential online negativity.
7. Stay informed about current online trends and threats
Keep yourself updated on the latest social media platforms, apps and online trends popular among young people. This knowledge will help you have more informed conversations with your granddaughters about online safety. One great way to do this is to subscribe to sign up for Kurt’s The CyberGuy Report now.
8. Encourage open communication about online experiences
Create a judgment-free environment where they feel comfortable discussing their online experiences, both positive and negative. This open dialogue can help you identify potential issues early on.
9. Have them consider a strong antivirus software
With all the clicking young women do online, it’s crucial to protect their devices from malware, viruses and other cyber threats. Strong antivirus software acts as a digital shield, safeguarding against potential infections that could compromise personal data or device security.
The best way to safeguard against malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
Kurt’s key takeaways
Online abuse is a serious issue that disproportionately affects young women. By taking proactive steps to educate, protect and empower the women in our lives, we can create a safer digital environment for them. Let’s work together to foster a culture of online safety, ensuring that young women can thrive online without fear of harassment and abuse. Remember, a safer internet for women means a safer internet for everyone.
What are your biggest fears or concerns about the digital world as it relates to the safety and well-being of the young women in your life? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Alert: Malware steals bank cards and passwords from millions of devices
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
Netflix’s ad tier is growing really fast — and that means more ads

Amy Reinhard, Netflix’s president of advertising, said the streaming service has “the most engaged audience anywhere,” with subscribers on its ad-supported tier spending an average of 41 hours per month on the service.
The new ad formats are part of Netflix’s in-house advertising platform, which is now live in the US after arriving in Canada. It plans to bring the platform to all 12 countries with ad-supported plans by June. “The foundations of our ads business are in place,” Reinhard said. “And going forward, the pace of progress will be even faster.”
Technology
Fake PayPal email let hackers access computer and bank account

Online scams are becoming more dangerous and convincing every day. Cybercriminals are finding new ways to gain not just your login credentials but full control of your computer and your bank accounts.
Take John from King George, Virginia, for example. He recently shared his alarming experience with us. His story is a powerful warning about how quickly things can escalate if you respond to suspicious emails.
Here is what happened to John in his own words: “I mistakenly responded to a false PayPal email notifying me of a laptop purchase. The message looked real, and I called the number listed. The person on the phone gave me a strange number to enter into my browser, which installed an app that took control of my PC. A warning popped up saying ‘software updating – do not turn off PC,’ and I could see my entire file system being scanned. The scammer accessed my bank account and transferred money between accounts. He told me to leave my PC running and go to the bank, keeping him on the phone without telling anyone what was happening. I shut everything down, contacted my bank, and changed my passwords.”
John’s quick thinking in shutting down his computer and alerting his bank helped minimize the damage. However, not everyone is as lucky.
Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!
Fake PayPal scam email (Kurt “CyberGuy” Knutsson)
How this scam works
This type of scam is known as a remote access scam. It often begins with a fake email that appears to come from a trusted company like PayPal. The message claims there is an issue, such as an unauthorized charge, and urges the victim to call a phone number or click a link.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Once the scammer makes contact, they guide the victim to enter a code into their browser or install a program, claiming it will fix the problem. In reality, this grants the scammer full control of the victim’s computer.
Once inside, scammers often search for sensitive files, access banking websites, steal login credentials or install malware to maintain long-term access. Even if the immediate scam is stopped, hidden malware can allow scammers to reenter the system later.

A hacker at work (Kurt “CyberGuy” Knutsson)
THE URGENT PAYPAL EMAIL SCAM YOU CAN’T AFFORD TO IGNORE
Key takeaways from John’s experience
John’s close call highlights several important lessons.
Fake emails are harder to spot than ever: Scammers create emails that look almost identical to real ones from trusted companies like PayPal. They copy logos, formatting and even fake customer support numbers. Always double-check the sender’s email address and verify communications by visiting the official website or app directly instead of clicking links inside emails.
Remote access scams can escalate fast: Once scammers gain control of your device, they can steal sensitive data, move funds between accounts and install hidden malware that stays behind even after the scammer disconnects. It often takes only minutes for serious damage to be done, making fast recognition critical.
Psychological pressure plays a big role: Scammers rely on creating a sense of urgency and fear. By keeping you on the phone and urging secrecy, they isolate you from help and rush you into making bad decisions. Recognizing when you are being pressured is key to breaking the scammer’s control.
Fast action can make all the difference: By quickly disconnecting his computer and contacting his bank, John limited the scammer’s access to his accounts. Acting within minutes rather than hours can stop further theft, block fraudulent transactions and protect your sensitive information from being fully compromised.

A warning on a laptop home screen (Kurt “CyberGuy” Knutsson)
DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX
How to protect yourself from remote access scams
Taking simple but strong security steps can protect you from falling victim.
1. Never call a number listed in a suspicious email: Scammers often set up fake phone numbers that sound professional but are designed to manipulate you into handing over control or information. Always find verified contact information through a company’s official website or app, not links/numbers provided in suspicious messages.
2. Be skeptical of unusual instructions: No legitimate company will ask you to install software or enter strange codes to protect your account. If anything seems unusual, trust your instincts and stop the communication immediately.
3. Install strong antivirus software on all devices: Antivirus programs can detect suspicious downloads, block remote access attempts and help prevent hackers from taking over your system. Having strong antivirus protection installed across all your devices is the best way to safeguard yourself from malicious links that install malware and attempt to access your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
4. Use identity theft protection: These services monitor financial accounts, credit reports and online activity for signs of fraud, alerting you to suspicious transactions. See my tips and best picks on how to protect yourself from identity theft.
5. React immediately if you suspect a scam: Disconnect your device from the internet, contact your bank or credit card company immediately and change your passwords, especially for banking and email accounts. Monitor your accounts closely for unauthorized activity and report the scam to the Federal Trade Commission as well as the company that was impersonated. Acting quickly can prevent further access and limit the damage scammers can cause.
6. Use multifactor authentication (MFA): MFA adds a critical layer of security beyond passwords, blocking unauthorized logins even if credentials are stolen. Enable MFA on all accounts, especially banking, email and payment platforms, to stop scammers from bypassing stolen passwords.
7. Update devices and software immediately: Regular updates patch security flaws that scammers exploit to install malware or hijack systems. Turn on automatic updates wherever possible to ensure you’re always protected against newly discovered vulnerabilities.
8. Employ a password manager with strong, unique passwords: Avoid password reuse and use complex passphrases to minimize credential-stuffing attacks. A password manager generates and stores uncrackable passwords, eliminating the risk of weak or repeated credentials. Get more details about my best expert-reviewed password managers of 2025 here.
9. Never share screen access or grant remote control: Scammers exploit screen-sharing tools to steal passwords and manipulate transactions in real time. Legitimate tech support will never demand unsolicited screen access; terminate the call immediately if pressured.
10. Invest in personal data removal services: These services automate requests to delete your personal information from data brokers and people-search sites, reducing publicly available details scammers could exploit for phishing or impersonation. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
PROTECT YOURSELF FROM TECH SUPPORT SCAMS
Kurt’s key takeaways
John’s story is a reminder that online scams are evolving quickly and becoming more aggressive. Staying skeptical, verifying all suspicious messages and acting quickly if something feels wrong can make the difference between staying safe and losing sensitive information. Protect your devices, trust your instincts and remember it is always better to be cautious than to take a risk with your security.
Have you or someone you know been targeted by a scam like this? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Meta’s beef with the press flares at its antitrust trial

Long-simmering tension between Silicon Valley and the press that covers it is surfacing during the Federal Trade Commission’s antitrust trial against Meta.
During a heated cross-examination of the FTC’s key economic expert, Scott Hemphill, Meta’s lead attorney, Mark Hansen, noted that Hemphill joined Facebook co-founder Chris Hughes and former Biden official Tim Wu in pitching regulators on an antitrust probe of the company back in 2019. The pitch deck for the probe that was shown in court included “public recognition” of the company’s aggressive acquisition strategy from two reporters: Kara Swisher, who currently hosts two podcasts for The Verge’s parent company, Vox Media, and Om Malik, the founder of the early tech blog GigaOm who is now a venture capitalist.
In an attempt to undercut Hemphill’s credibility, Hansen caught Swisher and Malik in the crossfire. He called Malik a “failed blogger” with an axe to grind against Meta. He then suggested that Swisher, whom he referred to as a Vanity Fair columnist (she last wrote for the site in 2015), was similarly biased against the company. In court, he projected a headline about her recently calling Mark Zuckerberg a “small little creature with a shriveled soul.”
The 2019 pitch deck shown at court by Hansen also cited a Post story to support that Facebook should be investigated as a monopoly. Meta’s Hansen asked if Hemphill agreed that “The New York Post is a scandal sheet,” to which he replied that he didn’t “have a view one way or another.” Hansen showed the infamous Post front page headline, “Headless Body in Topless Bar,” to make his point.
The exchange resurfaced years-old tensions between the press and tech titans. After experiencing relatively positive coverage during the early, aspirational days of Silicon Valley, Facebook and a handful of startups grew to become the largest platforms in the world. Along the way, they’ve chafed at increasingly critical coverage of their businesses.
Malik and Swisher have indeed both criticized Meta and its executives. In 2016, Malik critiqued Facebook’s intentions for offering free access to its apps and others in India, after board member Marc Andreesseen blamed local resistance to the program on “anti-colonialism” in a later-deleted tweet. “I am suspicious of any for-profit company arguing its good intentions and its free gifts,” Malik wrote at the time.
It was not the first time Meta has pointed a finger at the media while at trial
Tuesday’s exchange was not the first time that Meta has pointed a finger at the media while at trial. When discussing major scandals like Cambridge Analytica from the witness stand, company leaders have chalked up downswings in user sentiment to negative media attention and testified that Meta’s services haven’t seen comparable declines in engagement.
The FTC has argued that this fact is a sign of monopoly power because people can’t leave Facebook and Instagram without viable alternatives. A judge will ultimately decide if that is true or not. In the meantime, Meta’s grudges with the press are on full display.
-
Austin, TX4 days ago
Best Austin Salads – 15 Food Places For Good Greens!
-
Education1 week ago
In Alabama Commencement Speech, Trump Mixes In the Political
-
Technology1 week ago
Be careful what you read about an Elden Ring movie
-
Technology6 days ago
Netflix is removing Black Mirror: Bandersnatch
-
Culture1 week ago
Pulitzer Prizes 2025: A Guide to the Winning Books and Finalists
-
Education1 week ago
University of Michigan President, Santa Ono, Set to Lead University of Florida
-
World6 days ago
The Take: Can India and Pakistan avoid a fourth war over Kashmir?
-
News6 days ago
Reincarnated by A.I., Arizona Man Forgives His Killer at Sentencing