Connect with us

Technology

Stranger Things is ending, and so is Netflix’s reliance on tentpole shows

Published

on

Stranger Things is ending, and so is Netflix’s reliance on tentpole shows

When Stranger Things first premiered in 2016, Netflix was still courting new subscribers with splashy original projects that were meant to have broad audience appeal. The company had solidified itself as a major player in the streaming wars with massive hits like House of Cards, Orange Is the New Black, and a collection of live-action Marvel series. The shows were all very different, but they each felt like part of an ambitious plan to establish Netflix as the gravitational center of a new pop cultural era.

Those big, watercooler tentpole projects made Netflix feel like a platform worth subscribing to because of how large they loomed in the public consciousness. Especially in its early seasons, Stranger Things was thrilling to watch as a new sci-fi / horror series steeped in nostalgia. But it was also fascinating to see the show become a global phenomenon that dominated online discourse and inspired other studios to tell more stories set in the ’80s.

Though Netflix has had a number of other massive hits since Stranger Things, it has often felt like the company is thinking differently about its path to continued success. It’s no longer reporting its quarterly subscriber numbers, and a combination of price hikes and new ad-supported tiers have become key parts of its economic growth. Even as Netflix starts rolling out Stranger Things’ final season this week, a three-part event spread out over the rest of the year, it feels like tentpoles — moments that are supposed to capture and sustain everyone’s attention — aren’t as critical to the streamer’s big-picture strategy anymore.

As big as Stranger Things has been in the past, the hype around the show’s fifth and final season has been relatively subdued for a handful of reasons. For one, the competition is fiercer; more streaming platforms have come into existence and they have had ample time to capture audiences’ imaginations with new genre series of their own. Though Stranger Things’ first two seasons came out in quick succession, Netflix began releasing subsequent episodes at much, much slower pace. The series will have been airing for almost a decade when the first part of season 5 drops on November 26th, and many viewers will probably find themselves a little hazy on how the Duffer Brothers’ story got to this point.

Netflix might have been concerned about Stranger Things losing momentum between seasons back when the company was more focused on dropping entire seasons of a show in one fell swoop. But through its shift toward more staggered releases, particularly for its most notable series, Netflix has signaled that it’s aiming for a different kind of success.

Advertisement

Netflix knows that people are still going to watch Stranger Things 5 and stick around for at least a couple of months to see how things shake out for the Hawkins gang. There’s also going to be an animated spinoff series for folks who aren’t ready to leave Stranger Things behind. But Netflix has also cultivated more IP with fandoms of their own outside of Stranger Things, and the streamer understands that those eyeballs can be kept long after the Duffer Brothers have gone.

Though every streamer wants to make bona fide hits that drive subscriber sign-ups, Netflix has gotten heavily into the business of launching franchises that can coexist without seeming to overlap all that much. That’s exactly the vibe you get from the company’s annual Tudum showcase, which frames all of its shows from Bridgerton to Wednesday to Emily in Paris as equally important parts of its future plans.

Rather than launching massive tentpole originals designed to get everyone watching the same thing, Netflix has invested more of its energy into projects that feel more targeted to specific audiences, like fans of anime and live sports. That might be part of why the company spent so much time dabbling in mobile gaming before its recent shift to prioritize TV-focused party gaming. Those dabblings don’t mean that Netflix isn’t thinking about which of its many upcoming series might be “the next Stranger Things.” But they do suggest that the company sees tentpole shows as just one of many irons it needs to keep in the fire.

Netflix’s head content officer Bela Bajaria said as much earlier this year during a presentation where she noted that the platform now has somewhere north of 700 million subscribers. With that many viewers, the company can’t bank on individual shows or movies landing with everyone, and it makes much more sense to cater to specific niches. As long as you’re paying, Netflix doesn’t really care whether you’ve signed up for the English-language Squid Game remake, a Little House on the Prairie reboot, or WWE. All of the programming serves the same bottom line, and the main goal is to keep viewers watching.

Netflix is absolutely going to be paying attention to the ways its subscriber numbers fluctuate in the coming weeks as Stranger Things 5 arrives in waves. A sharp decline once the season is through in the new year might sound some internal alarms. But whether or not Stranger Things 5 is as big as Netflix is building it up to be, its conclusion marks the end of an era for the streamer — and what’s next looks very different. But what’s much more likely is that the show comes and goes with a moderate amount of fanfare, and then Netflix sits back to think about what to do when one of its upcoming projects sticks.

Advertisement
Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Technology

How Android malware lets thieves access your ATM cash

Published

on

How Android malware lets thieves access your ATM cash

NEWYou can now listen to Fox News articles!

Smartphone banking has made life easier, but it has also opened new opportunities for cybercriminals.

Over the past few years, we have seen Android malware steal passwords, intercept OTPs and even take remote control of phones to drain accounts. Some scams focus on fake banking apps, while others rely on phishing messages that trick you into entering sensitive details.

Security researchers have now discovered a new threat that goes a step further. Instead of simply stealing login information, this malware gives thieves the ability to walk up to an ATM and withdraw your money in real time.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Advertisement

Android malware like NGate tricks users into downloading fake banking apps that steal sensitive data. (Kurt “CyberGuy” Knutsson)

How the NGate malware works

The Polish Computer Emergency Response Team (CERT Polska) discovered a new Android malware called NGate that uses NFC activity to access a victim’s bank account. This malware monitors contactless payment actions on the victim’s phone and forwards all transaction data, including the PIN, directly to a server controlled by attackers. It does not just copy card details. Instead, it waits until the victim taps to pay or performs a verification step, then captures the fresh, one-time authentication codes that modern Visa and Mastercard chips generate.

To pull this off, attackers need to infect the phone first. They typically send phishing messages claiming there is a security problem with the victim’s bank account. These messages often push people to download a fake banking app from a non-official source. Once the victim installs it, the app walks them through fake verification prompts and requests permissions that allow it to read NFC activity. As soon as the victim taps their phone or enters their PIN, the malware captures everything the ATM needs to validate a withdrawal.

MANAGE ANDROID APPS WITH THE NEW ‘UNINSTALL’ BUTTON

Once installed, the malware captures NFC tap-to-pay codes and PINs the moment the victim uses their phone. (Kurt “CyberGuy” Knutsson)

Advertisement

What attackers do with the stolen data at the ATM

The attackers rely on speed. The one-time codes generated during an NFC transaction are valid for only a short period. As soon as the infected phone captures the data, the information is uploaded to the attacker’s server. An accomplice waits near an ATM, holding a device capable of emulating a contactless card. This could be another phone, a smartwatch or custom NFC hardware.

When the data arrives, the accomplice presents the card-emulating device at the ATM. Since the information contains fresh, valid authentication codes and the correct PIN, the machine treats it like a real card. The ATM authorizes the withdrawal because everything appears to match a legitimate transaction. All of this happens without the criminal ever touching the victim’s physical card. Everything depends on timing, planning and getting the victim to unknowingly complete the transaction on their own phone.

Criminals use the stolen, time-limited codes at an ATM to make real withdrawals without the victim’s card. (Kurt “CyberGuy” Knutsson)

7 steps you can take to stay safe from Android NGate malware

As attacks like NGate become more sophisticated, staying safe comes down to a mix of good digital habits and a few simple tools that protect your phone and your financial data.

1) Download apps only from the Play Store

Most malicious banking apps spread through direct links sent in texts or emails. These links lead to APK files hosted on random servers. When you install apps only from the Play Store, you get Google’s built-in security checks. Play Protect regularly scans apps for malware and removes harmful ones from your device. However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Even if attackers send convincing messages, avoid installing anything from outside the official store. If your bank wants you to update an app, you will always find it on the Play Store.

Advertisement

2) Use strong antivirus software

One careless tap on a fake bank alert can hand criminals everything they need. Strong antivirus software can stop most threats before they cause damage. It scans new downloads, blocks unsafe links and alerts you when an app behaves in ways that could expose your financial data. Many threats like NGate rely on fake banking apps, so having real-time scanning turned on gives you an early warning if something suspicious tries to install itself.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

ATM ‘JACKPOTTING’ CRIME WAVE GROWS AFTER THIEVES WALK AWAY WITH HUNDREDS OF THOUSANDS IN CASH

3) Keep your device and apps updated

Security patches fix vulnerabilities that attackers use to hijack permission settings or read sensitive data. Updates also improve how Android monitors NFC and payment activity. Turn on automatic updates for both the operating system and apps, especially banking and payment apps. A fully updated device closes many of the holes that malware tries to exploit.

4) Use a password manager to avoid phishing traps

Phishing attacks often direct you to fake websites or fake app login pages that look identical to the real thing. A password manager saves your credentials and fills them in only when the website or app is authentic. If it refuses to autofill, it is a clear sign that you are on a fake page. Consider using a password manager to generate and store complex passwords.

Advertisement

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

5) Turn on two-factor authentication for all financial services

Two-factor authentication gives you a second layer of protection, even if your password is compromised. App-based authenticators are more secure than SMS codes because they cannot be intercepted as easily. For banking apps, enabling 2FA adds friction for attackers trying to perform unauthorized actions. Combined with strong passwords from a password manager, it significantly reduces the chance of account takeover.

6) Ignore suspicious texts, emails and calls

Attackers rely on urgency to trick you. They often claim that your card is blocked, your account is frozen or a payment needs verification. These messages push you to act fast and install a fake app. Always pause and check your bank’s official channels. Contact the bank through verified customer care numbers or the official app. Never click links or open attachments in unsolicited messages, even if they look legitimate.

7) Review app permissions

Most people install apps and forget about them. Over time, unused apps pile up with unnecessary permissions that increase risk. Open your phone’s permission settings and check what each app can access. If a simple tool asks for access to NFC, messages or accessibility features, uninstall it. Attackers exploit these excessive permissions to monitor your activity or capture data without your knowledge.

Advertisement

Kurt’s key takeaway

Cybercriminals are now combining social engineering with the secure hardware features inside modern payment systems. The malware does not break NFC security. Instead, it tricks you into performing a real transaction and steals the one-time codes at that moment. This makes the attack difficult to spot and even harder to reverse once the withdrawal goes through. The best defense is simple awareness. If a bank ever urges you to download an app from outside the Play Store, treat it as an immediate warning sign. Keeping your phone clean is now as important as keeping your physical card safe.

Have you ever downloaded an app from outside the Play Store? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.  

Advertisement

Continue Reading

Technology

Nvidia’s ‘I’m Not Enron’ memo has people asking a lot of questions already answered by that memo

Published

on

Nvidia’s ‘I’m Not Enron’ memo has people asking a lot of questions already answered by that memo

“There is no neocloud that exists without [Nvidia CEO] Jensen [Huang],” says Saari. That makes neoclouds, in effect, extensions of Nvidia, he says. And none of them make money, so to expand, they must take on debt.

If we look at these as being, metaphorically, Nvidia’s special purpose vehicles, then it doesn’t really matter if the companies are any good or will survive in the long term. Their job is to boost Nvidia’s sales. Even OpenAI, also an Nvidia investment, kind of falls into this category — because the massive data center buildout that OpenAI wants the government to backstop sure involves an awful lot of Nvidia chips.

If you are old enough, or possessed of a certain kind of disposition, you may be thinking, Wait a minute, aren’t you describing Enron? And uh, in some sense, yes! Enron’s whole thing was special purpose vehicles with extremely speculative valuations that were used to take on debt, Luria notes. But Enron lied about what it was doing, and that’s fraud and illegal. (It also got up to other illegal stuff besides.) Nvidia’s relationship with CoreWeave is all happening in plain sight. So are all the relationships with the other neocloud companies. It kind of seems like the tech company version of the GameStop open pump-and-dump.

“It’s not good behavior, and it’s not healthy behavior,” Luria says. “But it’s legal. Any investor can see this. Many are just choosing not to.”

Continue Reading

Technology

DoorDash breach exposes contact info for customers and workers

Published

on

DoorDash breach exposes contact info for customers and workers

NEWYou can now listen to Fox News articles!

DoorDash confirmed a data breach that exposed personal details for a mix of customers, delivery workers and merchants. The stolen information included names, email addresses, phone numbers and physical addresses. The company said it has no evidence of fraud tied to the breach so far, but the event still raises concerns for anyone who uses the service.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

DoorDash says an employee fell for a social engineering scam that let an unauthorized party access basic contact information. (DoorDash)

How the DoorDash breach happened

The company traced the incident back to a social engineering attack. An employee fell for a lure that gave hackers access to DoorDash systems. Once the company spotted the breach, it shut down access, launched an investigation and notified law enforcement. DoorDash also directly notified users where required.

Advertisement

The company confirmed the incident exposed names, email addresses, phone numbers and physical addresses for some people in its system. (DoorDash)

Who was affected by the DoorDash breach

DoorDash said the breach impacted a mix of users across its platform. That includes customers, delivery workers and merchants. CyberGuy reached out to DoorDash and a representative provided the following statement to us:

“DoorDash recently identified and shut down a cybersecurity incident in which an unauthorized third party gained access to and took basic contact information for some users whose data is maintained by DoorDash. No sensitive information, such as Social Security numbers or other government-issued identification numbers, driver’s license information, or bank or payment card information, was accessed. The information accessed varied by individual and was limited to names, phone numbers, email addresses, and physical addresses. We have deployed enhanced security measures, implemented additional employee training, and engaged an external cybersecurity firm to support our ongoing investigation. For more information, please visit our Help Center.”

LOOKING FOR A CHEAP CHEESEBURGER? 10 AMERICAN CITIES THAT DELIVER THE BEST MEAL DEALS

If you received an alert from the company, take steps to protect your information. If you use the app but did not get a notice, you should still follow the safety tips below because exposed contact information can lead to scams long after a breach.

Advertisement

DoorDash says no sensitive information was accessed and investigators found no signs of fraud or identity theft tied to the breach. (DoorDash)

How to protect yourself after the DoorDash breach

Even though payment data stayed protected, exposed contact details can still open the door to scams. You can lower your risk with a few smart steps that keep your information safer online.

1) Watch for phishing attempts

Scammers move fast after a breach. They often send fake alerts that look like real DoorDash messages. These emails or texts may claim you need to verify your account or update your payment details. Delete any message that asks for personal information or urges you to click a link. When in doubt, go straight to the official app instead of trusting a message.

2) Use a data removal service

Data brokers collect and resell personal details that scammers often exploit. A data removal service works to pull your information off those sites. This limits your exposure and makes it harder for criminals to target you. It is one of the easiest long-term steps you can take to protect your privacy.

IS YOUR PHONE HACKED? HOW TO TELL AND WHAT TO DO

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

3) Use strong passwords and a password manager

Stronger passwords give you better protection. Create unique passwords for every account so one breach cannot unlock your digital life. A password manager makes this easier by generating secure passwords and storing them safely. It also autofills them, so you spend less time typing.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Advertisement

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

4) Turn on multi-factor authentication

Multi-factor authentication (MFA) adds a simple barrier that blocks most break-in attempts. When you turn it on, you confirm each login with a code or app prompt. This keeps your account safe even if someone learns your password. Most major apps let you enable this setting in the Security section.

5) Use strong antivirus protection

Strong antivirus software shields you from malicious links and downloads. It scans files in real time and warns you when something looks dangerous. This gives you an extra layer of defense against phishing attempts that try to install malware.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

Advertisement

6) Review your account activity

It helps to check your DoorDash account for anything unusual. Look at your order history, saved addresses and payment methods. If something looks off, update your password and contact DoorDash support right away. Quick action can stop a small issue from turning into a bigger problem. 

Kurt’s key takeaways

A breach like this reminds us how quickly cybercriminals can exploit a single mistake. DoorDash moved fast to cut off access and confirm the damage, but exposed contact information can still create risks. Staying alert and using basic security habits can help you avoid trouble.

What concerns you most about companies holding your personal information, and how would you like them to handle incidents like this? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading

Trending