Connect with us

Technology

Spyware can hijack your phone in seconds

Published

on

Spyware can hijack your phone in seconds

NEWYou can now listen to Fox News articles!

You already know malware is out there. You hear about phishing emails, fake apps and data breaches almost every week. But every so often, something comes along that feels more personal. ZeroDayRAT spyware is one of those threats.

If your device gets infected, attackers can see almost everything happening on your phone. That includes your messages, notifications, location and even live camera feeds. Let that sink in for a second.

This is not some clunky virus from years ago. Security researchers at iVerify, a mobile security and digital forensics company, describe it as a complete mobile compromise toolkit. And it works on both iPhone and Android devices.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

ZeroDayRAT spyware can secretly access messages, camera feeds and banking apps on infected iPhone and Android devices. (Stefan Sauer/picture alliance via Getty Images)

What makes ZeroDayRAT spyware so dangerous?

Many types of malware focus on one goal. Some steal passwords. Others spy on text messages. ZeroDayRAT spyware goes much further.

Once installed, the infected device starts transmitting data back to a central dashboard controlled by the attacker. From there, they get:

  • A full stream of incoming notifications
  • A searchable inbox of text messages
  • Device model and operating system details
  • Battery level and lock status
  • Network activity and app usage

In other words, they can build a detailed profile of your daily life. Reports say the dashboard even shows a live activity timeline. That timeline reveals who you talk to most, which apps you use and when you are most active online. For anyone who values privacy, that is chilling.

It can watch and listen in real time

Here is where things get even more disturbing.

ZeroDayRAT spyware includes keylogging and live surveillance tools. That means attackers can:

Advertisement
  • Capture every keystroke with context
  • See which app you opened
  • Track how long you spent inside it
  • Record gestures and inputs
  • Access your microphone
  • Activate your front or rear camera
  • View your screen in real time

Imagine someone watching your screen as you log into your bank account. Or listening while you have a private conversation. This is not a hypothetical capability. According to reporting, those features are built directly into the platform.

Your banking and crypto apps are targets too

Many people assume mobile malware only steals passwords. ZeroDayRAT spyware goes after money directly. It reportedly includes tools designed to target digital payment and banking apps such as Apple Pay and PayPal. It can also intercept banking notifications and use clipboard injection to redirect cryptocurrency transfers to the attacker’s wallet.

Even without full remote control of your phone, that level of access is enough to drain accounts and steal digital assets. And here is another troubling detail. Reports indicate the platform is openly sold on Telegram, which lowers the barrier for would-be cybercriminals. You do not need advanced hacking skills to use it. That combination of power and accessibility makes this threat especially concerning.

Why Apple and Google are tightening app rules

There is a reason Apple strongly discourages installing apps outside the App Store. Google is also exploring changes to how sideloading works on Android. When apps bypass official stores, security screening becomes weaker. That opens the door for spyware like ZeroDayRAT to sneak in. While no system is perfect, sticking to trusted app marketplaces dramatically lowers your risk.

How to tell if ZeroDayRAT spyware is on your phone

Advanced spyware is designed to stay hidden. You may not see a flashing warning that something is wrong. Still, your phone often gives subtle clues when something is off. Watch for these warning signs.

Unusual battery drain

Spyware that streams data, records audio or tracks location runs constantly in the background. If your battery suddenly drains much faster than normal, especially after no major app changes, that can be a red flag.

Advertisement

Phone overheating without heavy use

If your device feels hot even when you are not gaming or streaming video, background surveillance activity could be consuming resources.

Strange data usage spikes

Check your mobile data usage in settings. A sudden jump may indicate that your phone is transmitting large amounts of information to an external server.

Unknown apps or configuration changes

Look for apps you do not remember installing. On iPhone, check for unknown configuration profiles under Settings. On Android, review installed apps and device administrator permissions.

Unexpected login alerts

If you receive password reset emails or login alerts you did not trigger, assume your credentials may be compromised.

Microphone or camera indicators are activating randomly

Both iPhone and Android show visual indicators when the camera or microphone is in use. If those indicators appear when you are not actively using them, investigate immediately.

Advertisement

If you suspect spyware, do not ignore it. Back up essential data, perform a factory reset and restore only trusted apps. In severe cases, consult a mobile security professional.

149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK

Security researchers warn ZeroDayRAT functions as a full mobile surveillance toolkit sold openly online. (Photographer: Angel Garcia/Bloomberg via Getty Images)

How to remove ZeroDayRAT spyware from your phone

If you believe your phone may be infected, act quickly. Do not keep using it normally while you figure things out. Follow these steps.

1) Disconnect immediately

Turn off Wi-Fi and cellular data. This stops the spyware from sending more data to the attacker while you take action.

Advertisement

2) Change your passwords from a different device

Do not use the potentially infected phone to change passwords. Use a trusted computer or another secure device. Update passwords for email, banking, social media and payment apps first. Enable two-factor authentication (2FA) on every account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.  Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

3) Run a trusted mobile security scan

Install and run strong antivirus software on your phone. Let it scan your device for malicious apps, suspicious configuration profiles or hidden spyware components. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

4) Remove suspicious apps and profiles

On iPhone, check SettingsGeneralVPN & Device Management for unknown configuration profiles. Delete anything you do not recognize. On Android, review installed apps and remove anything unfamiliar. Also, check device administrator settings and revoke access from unknown apps.

5) Back up essential data carefully

If you plan to reset your phone, back up only photos, contacts and critical files. Avoid restoring full system backups that could reintroduce malicious software.

6) Perform a factory reset

A full factory reset on your iPhone or Android is often the most effective way to remove advanced spyware. This wipes the device and removes hidden malware components. After the reset, reinstall apps manually from the official app store instead of restoring everything automatically. Before performing a factory reset, back up important photos, contacts and files, as this process permanently deletes everything stored on the device.

Advertisement

7) Monitor your financial accounts

Because ZeroDayRAT targets banking and crypto apps, watch your accounts closely for unusual transactions. Contact your bank immediately if you see suspicious activity.

When to replace the device

In rare cases, if the phone was deeply compromised or jailbroken, replacing the device may be the safest option. While that sounds extreme, protecting your identity and finances is worth more than the cost of a new phone.

Ways to stay safe from ZeroDayRAT spyware

The good news is that you still have control over your digital safety. Start with these practical steps to reduce your risk of infection and limit the damage if spyware ever targets your phone.

1) Avoid sideloading apps

Only install apps from the App Store or Google Play Store. Official stores screen apps for malicious code and remove threats when discovered. Do not download apps from links in emails or text messages. If an app asks you to install it from outside the store, treat that as a red flag.

2) Think before you tap and use strong antivirus protection

Do not click links from unknown senders. Even one tap can trigger a malicious download or redirect you to a fake login page. Install strong antivirus software on your mobile device. Good mobile security apps scan for spyware, block malicious websites and warn you about suspicious behavior in real time. Some also alert you if your personal information appears in known data breaches, which adds another layer of protection. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

3) Keep your phone updated

Install operating system updates as soon as they become available. Security updates patch vulnerabilities that spyware platforms like ZeroDayRAT try to exploit. Turning on automatic updates helps ensure you do not miss critical fixes.

4) Review app permissions regularly

Check which apps have access to your camera, microphone and location. Remove permissions that do not make sense. If a simple game wants constant microphone access, that should raise questions. Limiting permissions reduces what spyware can capture.

5) Use strong authentication

Turn on two-factor authentication (2FA) for banking, email and social media accounts. Even if spyware captures a password, that second verification step can stop attackers from logging in. Use a reputable password manager to create strong, unique passwords for every account.

6) Use a data removal service to reduce your exposure

Spyware operators often profile targets using personal data that is already available online. Data broker websites collect your phone number, address, relatives and more. A reputable data removal service can help remove your personal details from many of these sites. The less information criminals can gather about you, the harder it becomes to target you with convincing phishing attacks or social engineering.  Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com. Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

7) Do not bypass your phone’s built-in security protections

Some people modify their phones to remove manufacturer restrictions so they can install unofficial apps or customize the system. On an iPhone, this is called jailbreaking. On Android, it is known as rooting. While that may sound harmless, it removes important security safeguards that are designed to block spyware and malicious software. Once those protections are gone, threats like ZeroDayRAT have a much easier time installing and hiding on your device. Keeping your phone in its original security state adds a powerful layer of protection that most people never see but benefit from every day.

Advertisement

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

Experts say the spyware can activate a phone’s microphone and camera without a user’s knowledge. (Karl-Josef Hildenbrand/picture alliance via Getty Images)

Kurt’s key takeaways

ZeroDayRAT spyware feels unsettling because it attacks something we rely on every day. Your phone holds your conversations, photos, financial apps and personal routines. When a single piece of malware can see your screen, hear your voice and track your location, the stakes get higher. The silver lining is this. Most infections still depend on user action. A bad link was clicked. A suspicious app was installed. A warning ignored. Staying cautious may not sound exciting, but it remains one of the strongest defenses you have.

Now here is the question worth asking. If spyware can already access your camera, messages and money in one package, are tech companies and app stores doing enough to protect you? Let us know your thoughts by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

Android malware hidden in fake antivirus app
Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

The man behind the legendary MPC, Roger Linn, stays focused with a single browser tab

Published

on

The man behind the legendary MPC, Roger Linn, stays focused with a single browser tab

Roger Linn is a legend in the world of musical instruments. He’s been at the cutting edge of music technology for decades. He created the LM-1, the first drum machine to use samples, and its successor, the LinnDrum, is one of the most iconic drum machines of all time. They were used on countless records in the 1980s, including hits by Tom Petty, Queen, and Tears for Fears. But the most notable fan was probably Prince, who used them extensively on Purple Rain and 1999.

Somehow, those are not his greatest contributions to the music world. That would, undoubtedly, be the MPC. Linn partnered with Akai to create one of the most popular and important samplers ever. The MPC60 and its successors became the tool of choice for countless hip-hop and house producers. J Dilla’s MPC 3000 even sits in the Smithsonian.

Roger Linn was also an early adopter of MPE, or MIDI polyphonic expression. It’s a key feature of his LinnStrument, an expressive 3D controller released in 2014 — three years before the Association of Musical Electronics Industry (AMEI) officially released the MPE standard. Turns out the man stays so innovative by keeping things simple and focused.

What is your most indispensable tool?
My MacBook Pro.

Which is the most underappreciated?
My Vision Pro. I called it the most amazing product I rarely use.

Advertisement

What is the first app you install on a new phone or computer?
On a computer, Rhino3D.

What is one thing you wish you could change about your phone?
Apple Mail’s bugs.

What sites do you have pinned to your tab bar?
New York Times.

How many tabs do you have open right now?
One. This document.

Which social media platform do you use the most (if any)?
I don’t use social media except to announce my monthly “All Things LinnStrument” email newsletter.

Advertisement

What is your happy place online?
A VR app for the Meta Quest called Walkabout Mini Golf. It was a large number of artistically created open VR worlds that offer a surprising level of beauty from the Quest 3’s limited power. I go there to play a game of mini golf, fly around, or meet friends in a private instance of a particular world.

What is your favorite gadget you’ve ever owned?
I don’t know about “ever”, but these days it’s VR headsets, currently the Meta Quest 3 or Apple Vision Pro.

Which was the most disappointing?
In general, I’m disappointed by products that are designed by engineers who assume their customers are engineers.

What game do you have the fondest memories of?
Myst.

Which tech trend do you wish would go away?
Spam.

Advertisement

What creation are you most proud of?
LinnStrument.

What’s the best piece of advice you’ve ever received?
Keep it simple.

What is your current obsession?
VR.

What do you do when you need to focus?
Breathe. Calm down.

What do you do when you’re feeling stuck?
I try to shift my perspective.

Advertisement

When was the last time you went somewhere without your phone?
I never go anywhere without my phone. Maybe swimming.

What’s the last piece of physical media you bought?
That would be a long time ago. I’ve only bought books, music, films, etc. in digital form for a long time.

What do you think is worth splurging on?
If someone made a VR headset with retina resolution, very high power, lots of beautiful open worlds, but it was expensive, I’d probably buy it.

What would the tagline for your biopic be?
“He created tools that allowed musicians to make better music.”

What’s the last GIF or meme you used?

Advertisement

This isn’t a GIF, but maybe it’s a meme:
( ͡° ͜ʖ ͡°)

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Technology

Robot mower flaw could open your home network

Published

on

Robot mower flaw could open your home network

NEWYou can now listen to Fox News articles!

A robot mower sounds like the kind of yard tool that should make life easier. It cuts the grass, saves you time and quietly handles a chore most people would rather avoid.

But a new independent security report raises a bigger concern about what may be happening behind the scenes. Security researcher Andreas Makris says Yarbo robots, which include autonomous lawn mowers and snow blowers, contained serious flaws that could expose owners to remote access, live camera viewing and Wi-Fi credential theft. The report says roughly 6,000 robots are currently affected.

Yarbo has since responded through its Security Center, saying the core technical findings are accurate and that it has started rolling out security fixes. Still, the report raises important questions about how much access smart yard devices should have inside your home network.

Sign up for my FREE CyberGuy Report

Advertisement
  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

SMART HOME HACKING FEARS: WHAT’S REAL AND WHAT’S HYPE

A robot mower connected to home Wi-Fi can create security risks if remote access controls are weak or unclear. (Yarbo)

Yarbo robot security risk: What the report claims

Makris says Yarbo robots ship with a persistent remote access setup that uses a tunnel to reach the robot over the internet. According to the report, the robots also include a hardcoded root password shared across the fleet and a remote connection method tied to the robot’s serial number. That is important because “root” access gives someone deep control over the device. In simple terms, it can mean administrator-level access to the system inside the robot. The report also says the remote tunnel runs automatically, can restart itself if stopped and may return if removed. That raises a major concern for owners because they may not have a simple switch in the app to shut it off.

Why a robot mower could put your home network at risk

Smart devices often need internet access to work. App controls, software updates, diagnostics and support all depend on that connection. However, Makris claims Yarbo’s setup creates a much riskier situation. He says remote access appears to be built into every robot, rather than turned on only when an owner asks for help. The report says an attacker with the right information could potentially reach a robot remotely, access internal functions and use it as a foothold on the owner’s network. So while a robot mower may seem harmless as it cuts grass, rolls through the yard or parks near the garage, that same machine can also connect to your Wi-Fi, carry cameras and sit close to your home every day.

5 WORRISOME PRIVACY CLAUSES HIDDEN IN SMART HOME DEVICES

The Yarbo report raises concerns about remote access, live camera feeds and saved Wi-Fi credentials on connected yard robots. (Yarbo)

Advertisement

Yarbo camera access concerns for homeowners

According to the report, Yarbo robots can have multiple camera feeds. Makris says that if someone gained root access through the remote tunnel, they could potentially view the robot’s surroundings remotely. That could include a driveway, backyard, entryway, garage area or outdoor space where your family spends time. For homeowners, this concern goes beyond a glitch. A camera-equipped device outside your home deserves the same scrutiny as a camera inside your home.

How saved Wi-Fi passwords could be exposed

The report also says an attacker with root access could retrieve saved Wi-Fi credentials from the robot’s system. That would be a serious issue because many homes use one main Wi-Fi network for phones, laptops, tablets, smart TVs, security devices and more. Once someone has your Wi-Fi password, the risk can spread. They may try to reach other connected devices or look for weak spots that were never meant to face the internet. This is why connected outdoor equipment should never get a free pass. A lawn robot may be housed outside or in the garage, but its network access can reach inside.

What Yarbo says now

After Makris published his report, Yarbo posted a response to its Security Center page on its website. The company said the report identified serious vulnerabilities in its remote diagnostic, credential management and data-handling systems. Yarbo co-founder Kenneth Kohlmann also said the “core technical findings are accurate” and acknowledged that the company’s initial response did not reflect the seriousness of the issues.

Yarbo says the problems primarily involved historical design choices in parts of its remote diagnostic, access management and data-handling systems. The company also said some legacy support tools did not give users enough visibility or control. Yarbo said some authentication and credential systems did not meet its current security expectations.

A NEW SECURITY SEAL OF APPROVAL IS COMING TO YOUR SMART HOME GADGETS

Advertisement

Security experts recommend keeping smart yard devices on a guest network instead of your main home Wi-Fi. (Yarbo)

What Yarbo says it has fixed

Yarbo says it has taken several remediation steps since the report was published. According to the company, it has retired historical fleet-level root credentials, revoked shared FRP remote-access credentials and disabled related FRP server-side connection paths.

The company also says updated versions of the Yarbo mobile app no longer contain static credentials or embedded access mechanisms capable of directly authenticating against backend services. Yarbo says it has removed reporting scripts, legacy dependencies and non-essential network configurations that no longer served a necessary product function.

However, Yarbo says more work remains. The company says it is rebuilding its credential management system so any remaining shared-credential models can be replaced with individually scoped, per-device credentials. Each credential would support independent rotation and revocation.

Why Yarbo data connections raise privacy questions

The report also points to connections involving Hanyangtech, Yarbo’s Shenzhen-based parent company, along with ByteDance Feishu, Tencent TDMQ and Chinese DNS resolvers. Makris says some robot telemetry can be sent to ByteDance’s Feishu platform and that certain infrastructure choices are built into the firmware.

Advertisement

Yarbo now says it has removed reporting scripts, legacy dependencies and non-essential network configurations that no longer served a necessary operational or product function. The company also says historical servers and legacy access channels will continue to be phased out as part of its remediation work.

The core issue is transparency. Owners should know where their devices send data, which companies can access it and whether those connections are essential for normal use. That level of clarity matters even more for devices with cameras, location data and access to home networks.

What this means for you

If you own a Yarbo robot, this report means you should treat it like any other connected device with cameras, location data and access to your home Wi-Fi. Yarbo says it is pushing security updates automatically to connected devices. That means owners should connect their Yarbo long enough to receive the latest security update. After that, consider moving it back to a guest network or an isolated smart-device network.

CyberGuy reached out to Yarbo, and a representative said the company encouraged readers to refer to the Security Center at yarbo.com/pages/yarbo-security-center for the latest verified information and ongoing updates.

How Yarbo owners can reduce the risk

You may not be able to control everything happening inside the robot, but you can take a few practical steps to limit what it can reach on your home network.

Advertisement

1) Put the robot on a guest network

Do not keep your robot mower on the same network as your laptop, phone or security cameras. Use a guest network or a separate smart-device network if your router supports it.

2) Change your main Wi-Fi password if you are concerned

If your robot has connected to your main Wi-Fi and you are worried about exposure, change the Wi-Fi password. Use a strong, unique password and store it in a trusted password manager so you do not have to reuse or remember it. Then reconnect only trusted devices. Check out the best expert-reviewed password managers of 2026 at Cyberguy.com

3) Check your router for unknown devices

Open your router app or admin page and review connected devices. Look for anything unfamiliar. Remove devices you do not recognize.

4) Limit what the robot can access

Some routers let you isolate guest devices. Turn that on when available. This can keep the robot from seeing other devices on your network.

5) Ask Yarbo for specific answers

Owners should ask what remote diagnostic access remains, whether credentials are now unique per robot and whether the company will provide a true off switch for remote diagnostics.

Advertisement

6) Keep the robot updated, but stay cautious

Yarbo says security updates are delivered automatically once devices connect to the internet. Connect the robot through a guest network or an isolated smart-device network so it can receive the latest update without giving it access to your main devices.

Join CyberGuy Live: Lock Down Your Phone in 30 Minutes (Saturday, June 13, 10 am ET)

Your phone holds your email, passwords, photos, banking apps and personal data. In this free, live online class, Kurt the CyberGuy will walk you step by step through simple phone security fixes you can do in real time. You’ll learn how to improve your privacy settings, spot the latest phone scams, use trusted security tools and walk away with a simple checklist to stay protected. Register here: CyberGuyLive.com

Kurt’s key takeaways

The Yarbo report is a reminder that convenience can come with hidden access. A robot mower may seem like a helpful yard tool, but under the hood, it can act like a connected computer with cameras, location data and a path into your network. The biggest concern is control. Owners need to know who can reach their devices, when remote access turns on and whether they can shut it off. A company should not expect you to trust a black box sitting on your Wi-Fi. If you own one of these robots, isolate it from your main network and push Yarbo for clear answers. If you are shopping for any smart yard device, ask about security before you ask about battery life.

Would you let a smart yard robot onto your Wi-Fi if the company could not clearly explain who can access it and when? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Google’s AI search is so broken it can ‘disregard’ what you’re looking for

Published

on

Google’s AI search is so broken it can ‘disregard’ what you’re looking for

Google’s AI Overviews are running into an interesting problem right now. Earlier on Friday, if you searched for the term “disregard,” the AI Overview section would include a response like what you’d see from a more traditional AI chatbot instead of the typical AI summary, as spotted on X. As you can see in the image at the top of this story, I got an AI Overview response that said, “Got it. If you need anything else or have a new question later, just let me know!”

As of Friday afternoon, however, Google isn’t showing an AI Overview for the term “disregard” at all — instead, it shows a list of news stories about the issue first. Google hasn’t replied to our requests for comment. In a statement to Android Authority, a spokesperson said that “We’re aware that AI Overviews are misinterpreting some action-related queries, and we’re working on a fix, which will roll out soon.”

AI Overviews haven’t just been tripping up over the word “disregard.” When searching for “ignore,” Google’s AI Overview section showed the following message to a Verge colleague:

Message received! I’m here and ready to help. What would you like to focus on today? Just let me know if there’s a specific topic, task, or question you’d like to explore.

When they searched “skip,” the AI Overview section said:

It looks like your message was just a test or a typo! Feel free to ask a question, share a prompt, or let me know how I can help you with your tasks today. I’m ready whenever you are!

As of Friday afternoon, Google is still showing me AI Overviews with broken responses when I search for “ignore” and “skip.”

Advertisement

As funny as this all is, it’s almost certainly just some kind of bug — I expect Google will fix it soon enough. Maybe Google Search itself is tired after everything that happened at Google I/O.

Updates, May 22nd: Google now isn’t showing AI Overviews for “disregard.” Also added a Google statement.

Continue Reading
Advertisement

Trending