Connect with us

Technology

Stop these V-day scams before they break your heart and your bank account

Published

on

Stop these V-day scams before they break your heart and your bank account

valen

As Valentine’s Day approaches, many people have love on the brain. Online romance, however, has complicated courtships and coupling dynamics by adding a layer of potential deception to every connection. While we do want to keep romance alive, it’s important to enter the world of online dating with open eyes and ears as much as open hearts. It’s vital to stay vigilant this Valentine’s Day so you don’t become a victim of a scamming Casanova.

One of the most common risks of online dating is falling for a catfish, someone who pretends to be someone else online. This is why Patricia’s email to us felt particularly relevant.

“I need your help. I have met a guy online and have been chatting for months. At first I was able to chat through his email and also by phone. Recently, some things have been said that are making me feel uneasy. I have used Truthfinder, People Finder, and Been Verified and can’t get any information on this guy. When I asked him about that, he told me has been hacked several times, so he doesn’t put anything on the internet.

Someone suggested that it’s possible he is using a VPN. Could this be possible, and if you think it is, can you please tell me how I can get the information I am seeking about this guy? Until recently, I was beginning to think that we may have a lot of things in common, but now, I am not sure.”

Advertisement

—Patricia, Mt. Pleasant, WI

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER 

Someone holding a mobile phone showing an online dating match. (Kurt “CyberGuy” Knutsson )

The high stakes of romance scams

Patricia, you aren’t the only one who has concerns over a developing online relationship. According to the Federal Trade Commission (FTC), in the most recent data, about 70,000 people have reported being victims of a romantic scam with reported losses of up to $1.3 billion; there are high stakes involved beyond just experiencing potential heartbreak.

MORE: BEST VALENTINES DAY GIFTS 2024

Advertisement

Behind the virtual veil

It is certainly possible that the person you’ve been chatting with online could be using a virtual private network (VPN), which is a tool that encrypts your internet connection and routes it through a remote server. While the use of a VPN can make it hard to connect the online activity to a physical location, it would not be able to keep his information from being online.

There are, however, data removal services such as the ones we’ve covered here that can be used to limit his information online. Either he’s being proactive about his privacy and safety, or he’s a scammer with a well-thought-out strategy to scam you out of your money, personal information and identity.

MORE: DON’T EVER DO THIS ON A DATING APP

5 warning signs of online heart-breaking scammers

1) Quickly tell you they love you or try to create a strong emotional connection with you

2) Always have an excuse for not meeting you in person or video chatting with you

Advertisement

3) Ask you for money, gift cards or other favors, often for urgent or personal reasons

4) Send you links or attachments that may contain malware or phishing sites

5) Have inconsistent or vague details about themselves, their location or their work 

Woman in front of laptop making a heart symbol with hands.

MORE: HOW TO PROTECT YOURSELF FROM SOCIAL MEDIA SCAMMERS

Advertisement

Top scams to look out for this Valentine’s Day

With a special eye toward Valentine’s Day, here are some top scams that are particularly rampant during this holiday.

Don’t click that Valentine: Scammers are sending out automated Valentine’s Day cards (usually through chatbots) made to look like they’re from friends and family, but once opened or link clicked (to retrieve the e-card), malicious software can be installed or your device hacked.

Be careful where you look for love: There has been an increase in new domains registered with romantic words around this time of year. Many of these websites have been flagged as potentially dangerous. Stick to established online dating services that include security measures. You can always do a separate search with the name of the dating site you want to check out with words like “scam” or “fake” to see if there has been any negative feedback or experiences.

Do practice good judgment about what you share: Sextortion is a technique where romantic scammers get you to send compromising photos or videos of yourself and then blackmail you for more compromising materials or money.

Sometimes, random scammers will bluff and claim they have a pornographic video of you that will be sent to all your contacts on your phone or computer if you don’t pay them, usually in Bitcoin. While this is an empty threat, shocked recipients of these types of emails have fallen victim to sending over money.

Advertisement

MORE: HOW TO PROTECT YOURSELF FROM & ‘VISHING’ SCAMS

3 steps to avoid romance scammers and stay safe

1) Go slow: Don’t rush into any action, whether it is giving away your personal information or paying for anything. Trust takes time, so it’s okay to build this relationship one interaction at a time. You wouldn’t give a stranger at the grocery store your Social Security number or hand over all your money in your wallet in exchange for a check with your fitness instructor.

2) Trust your instinct: If something doesn’t feel right, it’s OK to end the connection with or without “evidence.” Don’t do anything that feels unsafe or wrong.

3) Saying goodbye: If you don’t feel safe, it is okay to end the connection without a conversation, especially if you feel like you’ll be manipulated into further conversation. It is okay to cut off contact and sometimes even block this person online.

MORE: HOW TO AVOID THE WORST DATING APP SCAMMERS 

Advertisement

What to do if you suspect someone is scamming you online?

Do not send money or personal information: If you receive unsolicited requests for money, bank account details or other personal information, do not comply. Scammers often use urgency and emotional manipulation to pressure victims into sharing sensitive data or making payments.

Stay skeptical: Be cautious when dealing with unknown individuals online. If something seems too good to be true (such as winning a lottery you never entered), it probably is. Trust your instincts and verify any claims independently.

Verify the source: Before taking any action, verify the legitimacy of the person or organization contacting you. Search for their name, email address or phone number online. Look for reviews, complaints or warnings related to their activities.

Check for red flags: Scammers often create a sense of urgency to rush victims into making decisions. Offers that promise huge rewards for minimal effort are often scams. Be cautious if someone asks for your Social Security number, credit card details or passwords. Scammers may ask for payment via gift cards, wire transfers or cryptocurrency.

Install good antivirus software on all your devices because while you may be swayed by sweet nothings, your antivirus software won’t be. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links which may install malware on your devices, allowing hackers to gain access to your personal information. Find my review of Best Antivirus Protection here.

Advertisement

SCAMS ARE THE POLICY PROBLEM NO ONE IS TALKING ABOUT

Hands holding an iPhone with breakup texts. (Kurt “CyberGuy” Knutsson)

MORE: HOW CUNNING ROMANCE SCAMMERS DUPED FLORIDA MAN OF NEARLY A HALF MILLION DOLLARS

What to do if you suspect you’re a victim of a romantic scammer?

If, like Patricia, you suspect you may have fallen prey to a romantic scammer, check out some of the resources and action steps to take.

1. Log out of accounts

First, log out of all your accounts on every web browser on your computer. Once you’ve done that, you should clear your browser history.

Advertisement

2. Scan your device

Use a trusted antivirus program to run a comprehensive scan to detect and remove any lingering traces of malware. The best way to protect yourself from having your data breached by romance scammers is to have antivirus protection installed on all your devices. Find my review of Best Antivirus Protection here.

3. Change your passwords

If romance scammers expose your passwords, be sure to change them immediately. Be sure to create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. 

4. Use 2-factor authentication

Implementing 2-factor authentication is just an extra shield that will prevent a romance scammer from getting into your accounts. This way, even if someone steals your password or if you gave your password to a scammer, they will not be able to access your account without the second factor, such as a code sent to your phone or email.

5. Report the romance scammer

If you encounter a suspicious profile or communication on social media, online marketplaces or dating apps, report it to the platform. Also, report scams to your local police and file a complaint with the FTC at ftc.gov/complaint or to the Internet Crimes Complaint Center.

Advertisement

6. Search BBB’s scam tracker

Another tool to use is the BBB’s Scam Tracker. You can use it to search keywords or by category to see if your specific scenario or person is being mentioned in any scams posted.

7. Contact your financial institutions

Contact your bank, credit card company or other financial institutions if you suspect any fraudulent activity on your accounts.

8. Monitor credit reports

Monitor your credit reports and scores for any signs of identity theft or unauthorized inquiries.

9. Invest in Identity theft software

You’ll also want to invest in identity theft software to protect your identity and financial accounts. Theft protection companies can monitor personal information like your home title, Social Security number (SSN), phone number and email address and alert you if it is being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

Kurt’s key takeaways

New scams, romantic or otherwise, seem to multiply, especially during the holidays, as these scammers prey on tender heartstrings. There are many dos and don’ts when it comes to online dating and cyber safety, but nothing replaces your instinct and common sense.

Advertisement

What’s the worst romantic scam you or someone you know has experienced? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most-asked CyberGuy questions:

Advertisement

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Samsung’s Digital Home Key lets you use your phone as your key

Published

on

Samsung’s Digital Home Key lets you use your phone as your key

Just days after showing off the Galaxy S26, Samsung is finally rolling out the ability for users to unlock their home with a tap of their phone or by simply approaching their door. The new feature, called Digital Home Key, will live inside Samsung Wallet and is powered by the Aliro smart home standard.

Samsung first teased its Digital Home Key feature in 2024 and said the feature would be available in 2025. That didn’t pan out, as the CSA’s Aliro standard — which will let users unlock smart locks with any phone — only arrived in February of this year. The new standard uses near-field communication (NFC) for its tap-to-unlock technology. It also supports ultra-wideband (UWB), giving users the ability to unlock their door as they approach and without pulling out their phone.

To add a Digital Home Key to your wallet, you’ll need to set up a compatible smart lock through SmartThings using Matter. Only some Galaxy smartphones support both NFC and UWB, including the Galaxy Z Fold 4 and up, as well as the Galaxy S22 Ultra and up. You can view the full list of compatible devices on Samsung’s website.

Continue Reading

Technology

China’s ultrasound brain tech race heats up

Published

on

China’s ultrasound brain tech race heats up

NEWYou can now listen to Fox News articles!

When you hear “brain-computer interface,” you probably picture surgery, wires and a chip in your head. Now picture something quieter. No implant. No incision. Just sound waves directed at the brain.

That is the approach behind a new wave of ultrasound brain-computer interface companies in China. One of the newest is Gestala, founded in Chengdu with offices in Shanghai and Hong Kong. The company says it is developing technology that can stimulate and eventually study brain activity using focused ultrasound.

Yes, the same basic technology is used in medical imaging. But this time, it targets neural circuits.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

Brain imaging highlights the regions researchers study as companies explore noninvasive ultrasound brain-computer interface technology. (Kurt “CyberGuy” Knutsson)

What is an ultrasound brain computer interface?

Most brain-computer interface systems rely on electrodes that detect electrical signals from neurons. Neuralink is the most visible example. It places tiny threads inside the brain to record activity. Ultrasound works differently.

Instead of measuring electrical signals directly, it uses high-frequency sound waves. Depending on intensity and focus, those waves can:

  • Create images of internal tissue
  • Destroy abnormal tissue such as tumors
  • Modulate neural activity without open surgery.

Focused ultrasound treatments are already approved for Parkinson’s disease, uterine fibroids and certain tumors. That clinical history gives companies like Gestala a foundation to build on. However, studying or interpreting brain signals with ultrasound is far more complex than delivering targeted stimulation.

WHAT TRUMP’S ‘RATEPAYER PROTECTION PLEDGE’ MEANS FOR YOU

Unlike implant-based systems such as Neuralink, ultrasound brain computer interface research focuses on stimulating the brain without surgery. (Neuralink)

Advertisement

 

How Gestala plans to treat chronic pain with focused ultrasound

Gestala’s first product is focused on chronic pain. The company plans to target the anterior cingulate cortex, a brain region linked to the emotional experience of pain. Early pilot studies suggest that stimulating this area can reduce pain intensity for up to a week in some patients. The first-generation device will be a stationary system used in clinics. Patients would visit a hospital for treatment sessions. Later, the company plans to develop a wearable helmet designed for supervised use at home. Over time, Gestala says it wants to expand into depression, other mental health conditions, stroke rehabilitation, Alzheimer’s disease and sleep disorders. That is an ambitious roadmap. Each condition involves different brain networks and clinical hurdles.

Can ultrasound read brain activity without implants?

Like other brain tech startups, Gestala is also exploring whether ultrasound could help interpret brain activity. The long-term concept is straightforward in theory. A device could detect patterns linked to chronic pain or depression, then deliver stimulation to specific regions in response.

Unlike traditional brain implants, which capture electrical signals from limited areas, an ultrasound-based system may have the potential to access broader regions of the brain. That possibility is one reason researchers are paying attention. Still, translating that concept into reliable data is a major engineering challenge.

The global race to build noninvasive brain interfaces

China is not alone in exploring ultrasound brain-computer interface systems. Earlier this month, OpenAI announced a significant investment in Merge Labs, a startup cofounded by Sam Altman along with researchers linked to Forest Neurotech.

Advertisement

Public materials from Merge Labs mention restoring lost abilities, supporting healthier brain states and deepening human connection with advanced AI. That language signals long-term ambitions. Yet experts caution that real-world applications are still years away.

GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK

Researchers use MRI guidance to precisely target the anterior cingulate cortex with focused ultrasound during chronic pain studies. (Gestala)

The technical limits of ultrasound brain interfaces

Ultrasound faces technical limits. First, the skull weakens and distorts sound waves. That makes it harder to obtain precise signals. In research settings, detailed readouts of neural activity have required special implants that allow ultrasound to pass more clearly than bone.

Second, ultrasound measures changes in blood flow. Blood flow shifts more slowly than electrical firing in neurons. That delay may limit applications that require fast, detailed signal decoding, such as real-time speech translation. In short, stimulation is one challenge. Accurate readout is another level entirely.

Advertisement

What this means to you

Right now, this technology is experimental. You are not about to buy a brain helmet at your local electronics store. Still, the direction matters. If noninvasive ultrasound devices can reduce chronic pain or support mental health treatment, more patients may consider therapy without facing brain surgery.

At the same time, devices that analyze brain states introduce new privacy questions. Brain-related data is deeply personal. Regulators, hospitals and companies will need clear rules about how that data is stored, shared and protected. Finally, the link between AI companies and brain interface startups shows how closely digital intelligence and neuroscience are becoming intertwined. That connection could reshape medicine, wellness, and even how we interact with technology.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Kurt’s key takeaways

Brain-computer interfaces used to feel far off and experimental. Now they are a serious focus of global research and investment. China’s push to develop an ultrasound-based brain-computer interface adds momentum to a field already shaped by companies like Neuralink and new ventures backed by OpenAI. Progress is steady but measured. The potential is significant. The technical hurdles are real. What happens next will depend on whether researchers can turn promising lab results into safe, reliable treatments people can actually use.

If sound waves could one day interpret your mental state, who should decide how that information is used? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com.  All rights reserved.  

Advertisement

Related Article

New York halts robotaxi expansion plan
Continue Reading

Technology

This Windows gaming handheld has a screen that folds in half

Published

on

This Windows gaming handheld has a screen that folds in half

Lenovo put a foldable display on a gaming handheld. The Legion Go Fold Concept is a Windows-based handheld with a flexible POLED display, detachable Joy-Con-like controllers, and a folio case to turn the whole thing into a mini laptop.

You can use it as a standard Steam Deck-esque handheld with the display folded down to 7.7 inches and controllers attached at its sides, or you can unfold it for a bigger experience. When unfolded, the controllers can be repositioned to all four sides, allowing you to play with the screen in vertical or horizontal orientations.

In vertical splitscreen mode, you can put your game on one half of the screen and a second window (like your chat or game guide) on the other half. Horizontal fullscreen mode gives your game the full 11.6 inches of real estate in a 16:10 aspect ratio. To go into laptop mode, you remove the controllers and mount the handheld into a folio case with a stand, built-in keyboard, and trackpad. The controllers can be put into a separate grip mount to unify them as one gamepad.

There are a lot of ways you can use this folding handheld, including turning one of its controllers into a vertical mouse like on other Legion Go handhelds, but there’s one thing it doesn’t do: fold down to close and protect its screen. The Go Fold only folds outwards, so don’t expect a Nintendo DS or GameBoy Advance-like clamshell that closes for portability. Instead, it’s all about getting bigger than your average gaming handheld and offering more. (Though we’ve tried bigger before.)

The Legion Go Fold has some formidable specs: an Intel Core Ultra 7 258V Lunar Lake processor, 32GB of RAM, 1TB of storage, and a 48Whr battery. The plastic-covered OLED has a resolution of 2435 x 1712 and 165Hz refresh rate. And there’s even a second, circular toushscreen on the right controller, under the face buttons. It doubles as a touchpad and can be a support display, allowing you to swipe between extracted UI elements from a game (which I wouldn’t expect to be widely supported), a clock, system monitoring, or an animated GIF (just for fun).

Advertisement

During my brief in-person demo I didn’t get to play any graphically-intense games — just Balatro, which can practically play on a potato. The screen looked plenty sharp, but like any foldable there’s a crease down the middle; it’s very visible, but you learn to look past it and ignore it after just a bit. The build and feel of the whole thing felt a little fragile, and detaching and reattaching the controllers was definitely janky. Build quality will hopefully be improved if this device ever actually makes it to market.

The laptop mode was a pleasant surprise for me though. I did not expect a gaming handheld to double as a conventional computer you could get work done on. The Legion Go Fold’s case took quite a bit of fumbling before I set it up correctly, but it shouldn’t take too long to get used to if you actually lived with it.

Then again, I don’t know if anyone is going to be able to live with this thing — ever. I’d love for the Legion Go Fold to go from concept to real product like other out-there Lenovo ideas, but I shudder to think what it might cost. The Legion Go 2 is already priced well over $1,000. And with the ongoing RAMageddon crisis we’re living through, there’s no telling how much more expensive an actual Legion Go Fold would be if it came out in a year or more.

But even if it’s not the kind of foldable I expected, and even though it may never come out, it’s certainly cool. Now somebody please make a folding PC handheld that goes from kinda-big to really small. I think that’d be the one for me.

Photography by Antonio G. Di Benedetto / The Verge

Advertisement
Continue Reading

Trending