Technology
The dangerous intersection of people search sites and scams
It’s no secret cybercriminals thrive on personal information to pull off scams, commit bank fraud and engage in identity theft. But did you know that a lot of the information they need is readily available on people search sites? It might surprise you to learn that these companies gather and sell your personal data — everything from your contact details to information about your family — often without you even realizing it.
What’s more, this data can become even more vulnerable to breaches simply by being stored on these sites. For instance, I recently discussed an alarming incident where 2.7 billion records were stolen from a background search site called National Public Data and then shared for free on a cybercrime forum.
Having your personal information floating around on these people search sites and data broker databases significantly increases your risk of falling victim to scams. But don’t worry. I’ll dive into the details of how this happens and, more importantly, what you can do to protect yourself and stop it.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
Cybercriminals exploit people search sites for personal data
People search sites like Whitepages, Spokeo and BeenVerified are designed to help users find and connect with others, but they’ve become a goldmine for cybercriminals. Despite warnings against using the data for stalking, harassment or harm, these sites offer a wealth of information that can be exploited by malicious actors.
Scammers can access a wide range of personal details, including addresses, phone numbers, email addresses, birthdates, family information, employment history and even religious beliefs or political affiliations. They can also find property records, court and police records and information about hobbies and interests.
This comprehensive data allows cybercriminals to build detailed profiles of potential victims, making it easier to craft convincing scams or carry out identity theft. The abundance of personal information available through these sites poses a significant risk to individuals’ privacy and security.
3 ways scammers use people search sites
Let’s talk about how scammers are using people search sites to find their next victims. It’s pretty alarming, but understanding how this works can help us stay one step ahead.
1. Finding victims
Cybercriminals can easily browse people search sites to dig up information about random individuals. They can look up names and uncover a treasure trove of details — like email addresses, phone numbers and other contact info. This is where things start to get a bit dicey.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
2. Profiling victims
Once they have access to this information, scammers can create detailed profiles of their targets. They might find out about someone’s job history, whether they have kids or even if they’re single and looking for love. They can also determine if someone is elderly, which can make them more susceptible to confusing tech jargon. Research indicates that a staggering 60% of cybercrimes against seniors — who are particularly vulnerable — are at least partly fueled by the personal information available online, often through data brokers and people search sites.
3. Putting the plan into action
With all this information in hand, scammers can launch targeted phishing attacks to trick victims into revealing sensitive information. They can create scams designed to steal money or even commit identity theft. There are countless stories of individuals falling prey to these scams and losing their identities.
In many cases, the scammers likely sourced their information from people search sites. In some shocking instances, certain data brokers — like Epsilon, Macromark and KBM — have been caught red-handed selling personal information directly to scammers, giving them the tools they need to exploit vulnerable individuals.
MOST TARGETED CITIES FOR TRAVEL BOOKING SCAMS
4 ways to keep your personal information off people search sites (and away from scammers)
With the threat data aggregators like people search sites pose, it’s definitely a good idea to keep your information off their databases. While it won’t put a definitive stop to scammers, it will make it harder for them to find the information necessary to target you. It will also limit the number of places your data can be found online, thereby reducing the chances of it ending up in a data breach. That said, removing your information from people’s search sites can be easier said than done. It’s not impossible, though. Here’s what to do.
1. Track down and opt out from people search sites that sell your data
The first and most obvious step is to track down people search sites that sell your personal information and make them remove it. Fair warning: This requires a time commitment and ongoing maintenance.
You’ll first have to look up your own name, phone number, email address or home address on any popular search engine. You’ll likely see a bunch of people search sites in the search results. From there, you go through the results pages, visit each website that shows up and send individual opt-out requests to each one.
Since they refresh their databases often, most people search sites will add your personal information again after some time, though. So if you want to keep your data offline, you’ll have to check back every few months and remove it again.
If you have a few bucks to spare, I recommend using an automated personal information removal service. These services remove your data from people search sites and tons of other data broker types. Check out my top picks for data removal services here.
2. Limit the number of online tools and services you use
You should also exercise some good digital hygiene practices. Like being more discerning about the online tools and services you use. Many of them actually harvest your personal information and sell it to third parties, including people search sites and data brokers.
Even something as seemingly benign and widely used as extensions can be leaking your data online. A study conducted by researchers over at Incogni revealed 44% of Chrome extensions collect your personally identifiable information (PII). Even if they don’t sell it, this increases the risk of data breaches and malicious activity if the extension goes rogue.
You should reevaluate the apps, extensions and online accounts you use. Remove anything you don’t really need. For those that you do need, check the privacy policies for their data collection and sharing practices. You can always find more privacy-conscious alternatives.
3. Use throwaway emails and burner numbers wherever possible
Living in the digital age, I know it’s not really possible to go without any online tools. To sign up for most, you need to share at least an email or phone number. Unfortunately, those details are often shared with third parties, end up with people search sites and data brokers, circulate the web and ultimately result in increased spam and malicious attacks.
It’s a lot safer to use burner numbers and masked or throwaway accounts. This allows you to sign up, receive communication and maintain control of your online accounts while keeping all of the associated data and activity from being linked to your real identity.
4. Use private browsers and search engines
Browsers and search engines are another big source of data. Most of them track and share at least some of your online activity. Thankfully, there are plenty of browsers and search engines designed with privacy in mind.
I’ve previously recommended a few privacy-conscious search engine alternatives. They come with their own benefits and drawbacks but they all keep your search history private. The same goes for the browser itself.
Kurt’s key takeaways
It’s clear that while people search sites can be useful for reconnecting with friends or finding information, they also pose significant risks to our privacy and security. By taking proactive steps to protect our personal data, we can make it much harder for cybercriminals to exploit our information.
In your opinion, what should be the responsibility of companies that collect and sell personal data regarding user privacy? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
First 15 things to do or try first when you get a new iPhone
Apple announces new iPhones every year, and I often wonder if that’s truly necessary. A launch every two years seems more reasonable, especially since the new iPhones are often only marginally better than the ones released the year before. This has been the case since the iPhone 12.
However, in 2024, Apple introduced a range of interesting features with the iPhone 16. While these features don’t necessarily justify an upgrade if you already own the iPhone 15 or even the iPhone 14, they make the iPhone 16 a worthy purchase if you’re using an older model or an Android phone.
If you’ve already made the purchase, or if you’ve bought another iPhone, here are the first things you should do and try when you fire up your new phone. (First things to do if you got a new Android)
I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my free newsletter.
1) How to update your software to iOS 18.2 or later
First things first, let’s update your software to iOS 18.2 or later:
- Open Settings
- Tap General
- Select Software Update
- Tap Update Now
- Enter your passcode and agree to terms
- Wait for the installation to complete
HOW TO PROTECT YOUR IPHONE, IPAD FROM MALWARE
2) How to add a passcode or biometric authentication
To add a passcode or biometric authentication to your new iPhone after updating to iOS 18.2 or later, follow these steps:
Setting up a passcode
- Open Settings on your iPhone
- Tap on Face ID & Passcode (for iPhone X and later) or Touch ID & Passcode (for earlier models)
- Tap Turn Passcode On
- Enter a six-digit passcode. If you prefer, tap Passcode Options to choose a four-digit numeric code, a custom numeric code or a custom alphanumeric code.
- Re-enter your passcode to confirm it and activate it
Setting up biometric authentication
For Face ID:
- Go to Settings
- Tap on Face ID & Passcode
- Enter your passcode, if prompted
- Tap on Set Up Face ID
- Hold your device in portrait orientation and position your face in front of the device, then tap Get Started.
- Follow the on-screen instructions to complete the setup
IS IT TIME FOR ME TO UPGRADE TO NEW IPHONE?
3) Setting up Apple ID and iCloud
Create or sign in to Apple ID:
- Open the Settings app
- Tap on Sign in to your iPhone at the top
- If you don’t have an Apple ID, select Don’t have an Apple ID or forgot it? and follow the prompts to create one.
- If you have an Apple ID, enter your credentials and sign in.
Enable iCloud:
- After signing in, go back to Settings
- Tap on your name at the top, then select iCloud
- Choose which services you want to enable (e.g., Photos, Contacts, Calendars)
- Tap iCloud Backup and toggle it on to automatically back up your data.
MUST TURN-OFF PRIVACY SETTINGS ON YOUR IPHONE
4) Personalizing settings on iPhone
Customize Display:
- Open Settings
- Then go to Display & Brightness
- Tap Light or Dark for the background you’d like
- You can tap on Text Size to adjust text size
- Then use the slider to adjust the brightness you prefer.
Customize sound preferences:
- Tap on Sounds & Haptics
- Adjust the slider where it says Ringtone and alerts to customize from quieter to louder.
- Scroll down and tap the following to adjust the sounds for each: Ringtone, Text Tone, New Voicemail, New Mail, Sent Mail, Calendar Alerts and Reminder Alerts.
5) Configuring privacy settings
Manage Privacy Settings:
- Go to Settings
- Scroll down and click apps
- Select the app you want to review the privacy settings for
- Adjust the permissions as needed for location services, camera, microphone, allow tracking and other settings. Adjust as necessary for individual apps.
6) Pick your own lock screen shortcuts
By default in iOS 18, you get flashlight and camera shortcuts on the lock screen, but now you can finally customize them.
- Long-press on the Lock Screen
- Tap Customize
- Then choose Lock Screen
- You can tap on the existing shortcuts to change them to your preferred apps or features by selecting the desired app or feature from the list that appears.
- If you prefer, you can remove them entirely to keep your lock screen clean and simple by tapping the delete or remove option next to the shortcut.
7) Setting up Family Sharing
Here’s how to enable Family Sharing on your iPhone:
- Open your Settings app
- Tap your name
- Go to Family Sharing
- Set Up Your Family
- Press Continue
- Select family members that you want to invite
- To create an account for a child, select Create Child Account at the bottom and provide their name and birthday.
8) Download some useful apps
There are millions of apps available, such as Apple Maps, Google Maps and even apps to plan a party in the App Store. To download useful apps on your new iPhone, follow these straightforward steps:
- Locate the App Store icon on your home screen and tap to open it.
- You can explore various categories by tapping on Apps at the bottom of the screen or using the Search tab to find specific apps.
- Once you find an app you want, tap on it to view more details, including descriptions, ratings and screenshots.
- Tap the Get button (or the price if it’s a paid app) next to the app you wish to download.
- If prompted, authenticate your download using Face ID, Touch ID or your Apple ID password.
- The app will begin downloading and installing automatically. You can monitor its progress on your home screen.
- Once installed, the app will appear on your home screen.
- Tap its icon to open and start using it.
- You can press and hold any app icon until they start wiggling, allowing you to drag them into folders or rearrange their positions.
9) Activate spam filters for text messages
Having a strong spam filter on your iPhone is beneficial to protect yourself from unwanted text messages and scams. But beware that this may also filter out some legitimate messages from people who are not in your contacts list.
- Open Settings
- Scroll down and tap on Apps
- Then, scroll down and tap on Messages
- Toggle on Filter Unknown Senders to filter text messages from unknown contacts into a separate list
10) Use visual intelligence
On all iPhone 16 models, you can use Camera Control with visual intelligence to quickly learn more about the stuff around you. Just press and hold the Camera Control, which is a new button on the right side of the device, and you can do things like look up info about a restaurant or business, translate text, get a summary, have it read out loud and more.
You can even use it to find details about a business, like its hours, services and contact info. Depending on the place, you might also be able to check reviews, make a reservation or order for delivery.
To use this feature, point your iPhone camera at the business in front of you, then press and hold the Camera Control. Next, either tap the Camera Control again or select the business name at the top of the screen. Depending on the business, you can:
- View the hours of operation by tapping Schedule
- Place a delivery order by tapping Order
- Browse the menu or available services by tapping Menu
- Make a reservation by tapping Reserve
- To call the business, visit its website or access other options, tap the More button.
HOW TO SCHEDULE FREE SESSION WITH APPLE SUPPORT
11) Log how you’re feeling
Apple made several changes to the iPhones with its iOS 18 update, including updates to the Journal app. You don’t need the latest iPhone 16 to try the app’s mindfulness option for journal entries; any iPhone with iOS 18 will do. When you open the Journal app, tap the icon that looks like a tiny tree, and you’ll be able to log your mood for each day and see how it changes over time.
12) Give Action Button a try
The Action Button is part of the iOS 17 operating system for the iPhone 15 series and continues into iOS 18 for the iPhone 16 series. This customizable side button lets you choose a specific function to perform when pressed, such as turning on silent mode, focus, camera, flashlight, voice memo, recognize music, translate, magnifier, controls, shortcut and accessibility, depending on your settings. Essentially, it acts as a quick access key for a chosen action. Here are the steps to customize the Action button on supported iPhone models:
- Go to Settings
- Tap Action Button
- An image of the side of the iPhone will appear showing icons representing actions you can assign to the Action button.
- Swipe left or right to choose an action. The name of the action will appear below the dots.
- If additional options are available for the selected action, a button will appear below the action.
- Tap it to see the list of options.
- For Controls, Shortcut and Accessibility actions, you need to tap the button below the action and select a specific option. Otherwise, the Action button won’t do anything.
13) Try out the new Passwords app
I always stress the importance of using a password manager to store your passwords. Let’s be honest, we all have a ton of apps and services that require an account and password. If you use the same password everywhere, you risk having your important info stolen by cybercriminals. But it’s also impossible to come up with a unique password for every app and remember them all.
Password managers make life easier by storing your passwords and filling them in when you log into apps. But they usually charge a monthly or yearly fee. That’s where Apple’s Passwords app comes in. It works just like a password manager but without the extra cost. Open the app from the App Library, and it’ll keep your login details encrypted and synced across all your devices.
While Apple’s new Passwords app in iOS 18 offers a convenient and cost-free solution for password management, it’s important to consider its limitations. These include its exclusivity to the Apple ecosystem, lack of compatibility with Android or Linux devices and limited functionality outside of Safari and Apple apps. For those seeking a more comprehensive password management solution that works across various browsers and apps, check out my best expert-reviewed password managers of 2025 here.
14) Use ChatGPT and writing tools
Apple introduced Apple Intelligence for iPhone 15 Pro and newer models running iOS 18.2, bringing a range of AI tools and ChatGPT support. ChatGPT is now built into various parts of iOS, and if you have an iPhone 15 Pro or above, you can take full advantage of this integration.
You can use Apple’s enhanced Writing Tools to access ChatGPT directly in apps like Notes, Mail and any other text input field. Whether you need help spicing up your notes or generating complex programming scripts, ChatGPT is up for the task. Here’s how to get started; you’ll need to enable ChatGPT integration.
- Head to Settings
- Click Apple Intelligence & Siri
- Tap ChatGPT and toggle on next to where it says Use ChatGPT.
- From there, you can scroll down and Sign In to your own ChatGPT account or even upgrade to ChatGPT Plus.
15) Install strong antivirus protection
Antivirus software can help protect your new iPhone from malware, phishing and other threats. The best way to protect yourself from having your data breached is to install antivirus protection on all your devices. Having strong antivirus software on your devices will alert you of any known malware that is targeting you, warn you against clicking on any known malicious links in phishing emails and ultimately help protect you from being hacked. Get my picks for the best 2025 antivirus protection winners for your iPhone, Mac, Windows and Android devices.
Pro tip: Prioritize regular backups to safeguard your data
Making data backups a regular part of your iPhone maintenance is crucial. This way, you can protect yourself against uncertainties. Whether it’s a hardware malfunction or a security breach, having a recent backup will let you recover quickly.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaways
When you get your new iPhone, there are several essential steps to take to ensure you’re getting the most out of your device. Start by updating to iOS 18.2 or later to access the latest features. Next, security measures like a passcode or biometric authentication should be set up for added protection. Personalize your settings by customizing your display and sound preferences, and don’t forget to enable Family Sharing if you want to connect with loved ones. Also, explore the App Store to download useful apps. Additionally, make sure to give the Action Button a test run for quick access to your favorite functions. With these tips, you’ll be well on your way to maximizing your new iPhone’s capabilities.
How do you feel about the annual iPhone releases? Do you think they provide enough value each year? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover. Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
North Korea linked to crypto heists of over $650 million in 2024 alone
Hackers in North Korea stole a total of $659 million in crypto across several heists in 2024, according to a joint statement issued today by the US, Japan, and South Korea. The report specified five such incidents, like the $235 million theft from the Indian crypto exchange WazirX that is being newly attributed to the Lazarus Group. That organization is estimated to have stolen billions across previous attacks over the last decade, including $625 million stolen from Axie Infinity in 2022.
As recently as September 2024, the United States government observed aggressive targeting of the cryptocurrency industry by the DPRK with well-disguised social engineering attacks that ultimately deploy malware, such as TraderTraitor, AppleJeus and others. The Republic of Korea and Japan have observed similar trends and tactics used by the DPRK.
A warning issued by the FBI last September noted that their methods to gain access for delivering these payloads include “individualized fake scenarios,” such as enticing victims with prospective jobs and business opportunities. All three countries advised businesses in the industry to check out the latest warning to reduce their risk of “inadvertently hiring DPRK IT workers,” as described in this recent report by CoinDesk.
They’ve also used long-time common phishing tactics against employees of crypto firms, such as convincing impersonations of trusted contacts or prominent people of interest in related industries, with realistic photos and information likely lifted from public social media accounts of known connections.
Technology
Hackers claim massive breach of company that tracks and sells Americans' location data
When we talk about data privacy, tech giants like Google and Facebook are often blamed for using personal data to show ads and recommendations. Less discussed are the businesses whose entire business model revolves around collecting your data and selling it to other companies and governments. These companies often operate in legal gray areas, with the consent required to collect user data buried deep in the fine print.
What’s even more concerning is that these data brokers fail to adequately protect the data they collect. Last year, National Public Data made headlines for failing to secure 2.7 billion records of individuals whose data it had harvested. Now, hackers have reportedly stolen data from Gravy Analytics, the parent company of Venntel, which has sold vast amounts of smartphone location data to the U.S. government.
I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2
Enter the giveaway by signing up for my free newsletter.
What you need to know about the breach
Hackers claim to have breached Gravy Analytics, a major location data broker and parent company of Venntel, a firm known for selling smartphone location data to U.S. government agencies. The compromise is massive, including sensitive location data that tracks precise smartphone movements, customer information and even internal infrastructure, according to a 404 Media report.
The hackers are threatening to make the stolen data public. The files contain precise latitude and longitude coordinates of the phone and the time at which the phone was there. Some even indicate what country the data has been collected from.
Hackers have claimed access to Gravy’s systems since 2018. If true, this represents a serious security lapse on the company’s part. It is baffling how companies that collect and sell user data (a practice that arguably shouldn’t be allowed in the first place) failed to protect it from being leaked.
404 Media also suggests that the hackers gained deep access to the company’s infrastructure, including Amazon S3 buckets and server root access. The exposed customer list reportedly includes major companies like Uber, Apple and Equifax as well as government contractors like Babel Street.
HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS
What this breach means for people
This data breach highlights the serious security flaws in the location data industry. Companies like Gravy Analytics and Venntel have been profiting from collecting and selling sensitive location data, often without proper user consent. They’ve prioritized profit over security, and now the privacy of millions is at risk. This data could end up on black markets, endangering individuals, especially those in vulnerable situations, by making them targets for harassment or worse.
The FTC’s recent crackdown on Gravy, announced in December, underscores their negligence. The proposed order will prohibit these companies from selling or using location data, except in specific cases like national security or law enforcement. The implications are worrying. Sensitive locations like schools and workplaces could become easy targets for those with malicious intent.
BEWARE OF ENCRYPTED PDFs AS THE LATEST TRICK TO DELIVER MALWARE TO YOU
5 ways to stay safe in the age of data breaches
The Gravy Analytics breach serves as a sobering reminder of the vulnerabilities in the digital age. While it’s impossible to control how every company handles data, you can take steps to minimize your exposure and protect your privacy. Here are five actionable tips to stay safe.
1) Limit app permissions: Many apps request access to location data, contacts and more, even when it’s not necessary for their functionality. Regularly review the permissions for apps on your smartphone and revoke access to anything that feels excessive. For instance, a weather app doesn’t need access to your microphone or camera.
2) Use a VPN: Virtual private networks (VPNs) can mask your IP address and encrypt your internet activity, making it harder for data brokers and hackers to track your online behavior. A good VPN adds an extra layer of security, especially when using public Wi-Fi networks. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.
3) Opt out of data sharing where possible: Some companies allow you to opt out of having your data collected or shared. Services like Your Ad Choices and privacy settings within platforms like Google can help you reduce the amount of data collected. Check for opt-out options with any apps or services you use frequently.
4) Avoid free apps that monetize data: Free apps often generate revenue by selling user data. Instead, consider paid versions of apps that explicitly prioritize privacy. Research the company behind the app to understand its data handling policies before downloading.
5) Invest in data removal services: Data removal services can help you regain some control over your personal information by identifying and removing it from people-search websites, data broker platforms and other online databases. Check out my top picks for data removal services here.
WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED
Kurt’s key takeaway
Companies that collect and sell user data pose a significant threat to privacy, and when they fail to protect this data, it often ends up in the hands of even worse actors. Cybercriminals, and even some governments, can exploit this information to target individuals. It is crucial to implement stringent repercussions for these companies when they fail in their duty to safeguard user data. A mere slap on the wrist is not enough. We need real accountability to deter negligence and protect individual privacy rights.
Should companies face stronger penalties for failing to protect personal data? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels: Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
-
Health1 week ago
Ozempic ‘microdosing’ is the new weight-loss trend: Should you try it?
-
Technology6 days ago
Meta is highlighting a splintering global approach to online speech
-
Science3 days ago
Metro will offer free rides in L.A. through Sunday due to fires
-
Technology7 days ago
Las Vegas police release ChatGPT logs from the suspect in the Cybertruck explosion
-
Movie Reviews1 week ago
‘How to Make Millions Before Grandma Dies’ Review: Thai Oscar Entry Is a Disarmingly Sentimental Tear-Jerker
-
Health1 week ago
Michael J. Fox honored with Presidential Medal of Freedom for Parkinson’s research efforts
-
Movie Reviews1 week ago
Movie Review: Millennials try to buy-in or opt-out of the “American Meltdown”
-
News7 days ago
Photos: Pacific Palisades Wildfire Engulfs Homes in an L.A. Neighborhood