Technology
The mystery behind those creepy 'Unknown' spam calls
Scammers are becoming more sophisticated in their attempts to steal your sensitive data. One particularly concerning trend is the rise of targeted phone scams, where callers possess just enough information to seem legitimate but are actually phishing for more details to exploit.
Recently, we received an email from James in LA detailing his unsettling experience with a series of suspicious phone calls. His story serves as a stark reminder of the importance of vigilance in protecting our personal information. Here’s what James shared with us:
“I have received multiple random unknown calls (in the past two months), and they always start with the person calling me on the phone (listed as unknown) and providing my full name. Absolutely Correct. Then, ask if I am that ‘name, in (insert city). Then, when I say no, you have the wrong guy, they provide a birthdate and ask if it is mine, which, of course, it is Not. Then, they politely apologize, say thank you, and hang up. At that point, you realize that they never told you who they are representing. Maybe I’m paranoid, but it just seems strange.”
James’ experience is not unique. Many people across the country are reporting similar incidents, where callers seem to have a partial set of personal information and are attempting to verify or expand upon it. This tactic, known as “social engineering,” is a common method used by scammers to gain trust and extract valuable data.
GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE
A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)
Where scammers get their information
The mystery behind these creepy ‘Unknown’ spam calls often begins with data breaches or information leaks. Scammers obtain partial information from various sources, including public records, social media profiles or purchased data from the dark web. They then use this incomplete data as a starting point for their phishing attempts, aiming to fill in the gaps and create a more complete profile of their targets.
A man talking on his cellphone. (Kurt “CyberGuy” Knutsson)
4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH
Understanding the scammer’s playbook
Let’s break down the tactics used in these calls:
Partial Knowledge: The scammer starts with some correct information, like a full name and city. This creates an illusion of legitimacy and can catch you off guard. However, they might be phishing for more details, like your birthdate.
Verification requests: By asking to confirm additional details like a birthdate, the scammer is attempting to gather more valuable personal information.
Vague identity: The caller never identifies themselves or their organization, making it difficult to verify their legitimacy or report them later.
Polite disengagement: The quick, polite end to the call is designed to leave the recipient feeling that nothing suspicious has occurred, reducing the likelihood of immediate suspicion or action.
These tactics are carefully crafted to exploit human psychology. The initial correct information builds trust, the request for verification seems reasonable and the polite exit leaves the recipient with a positive final impression.
A man talking on his cellphone. (Kurt “CyberGuy” Knutsson)
WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM
The dangers of information gathering
You might wonder, “What harm can come from confirming my birthdate?” Unfortunately, in the wrong hands, even small pieces of information can be dangerous. Scammers can use these details to:
- Build a more complete profile for identity theft
- Access accounts or reset passwords
- Impersonate you in other scams or fraudulent activities
- Sell your information on the dark web
Data is a valuable commodity these days, and every piece of personal information should be guarded carefully.
A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)
MASSIVE DELL DATA BREACH HITS 49 MILLION USERS — WHAT THIS MEANS FOR YOUR PRIVACY AND SECURITY
8 steps to protect your personal information
In light of the sophisticated tactics employed by scammers, it is important to protect your personal information. Here are some measures you can implement:
1. Avoid sharing information with unknown callers
It is essential to never provide personal information over the phone to unknown callers. Always use caller ID and refrain from answering calls from numbers you do not recognize. If you do answer a call, avoid confirming or denying any information the caller claims to have. Be particularly wary of callers who create a sense of urgency or use fear tactics to manipulate you.
A man talking on his cellphone. (Kurt “CyberGuy” Knutsson)
2. Verify caller identity
When you receive a suspicious call, ask for the caller’s name, the company they represent and a callback number. However, do not call back immediately; instead, take the time to research the company independently. Look up official contact information online and call that number to verify the legitimacy of the initial call.
A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)
3. Enable spam-blocking features
To further protect yourself, enable spam-blocking features on your phone. You may also consider using call blocking apps which can help screen calls and identify potential spam.
Additionally, regularly updating your phone’s operating system will ensure that you benefit from the latest security features and protections.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
4. Report suspicious activity
If you encounter suspicious calls, it is important to report them to your phone carrier. You should also file a complaint with the Federal Trade Commission (FTC). If you believe you have been a victim of fraud, consider reporting the incident to local law enforcement to help protect yourself and others in your community.
A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)
5. Remove your personal information from the internet
To reduce your online presence, consider using a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.
It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Additionally, make it a habit to regularly Google your name and phone number to see what information is publicly available about you.
6. Use an identity theft protection service
Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.
7. Secure your accounts
To enhance the security of your online accounts, use strong and unique passwords for each one. It is also wise to avoid using easily guessable information, such as birthdates, in your passwords. Consider using a password manager to generate and store complex passwords. Also, enabling two-factor authentication wherever possible on your devices adds an extra layer of security.
8. Be cautious on social media
When using social media, review and tighten your privacy settings to limit who can see your personal information. Be mindful of the details you share publicly, as scammers often use social media to gather information. Additionally, avoid accepting friend requests or messages from unknown individuals to reduce the risk of falling victim to scams.
By implementing these comprehensive steps, you will significantly reduce your risk of falling victim to phone scams and identity theft. Remember that protecting your personal information is an ongoing process that requires vigilance and regular attention.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaways
Scammers are constantly evolving their tactics, making it crucial for us to stay one step ahead. James’ experience serves as a wake-up call for all of us. It’s not just about being cautious; it’s about being proactively defensive with our personal data.
Remember, every piece of information you share, no matter how small, can be a puzzle piece for scammers. Your birthdate, your city, even your social media posts — they’re all potential tools in a scammer’s arsenal. But don’t let this paralyze you with fear. Instead, let it empower you to take control of your digital footprint.
By implementing the steps we’ve discussed — from being alert on phone calls to using data removal and identity protection services — you’re not just protecting yourself. You’re also making it harder for scammers to operate, potentially saving others from falling victim.
What’s the most unusual or clever scam attempt you’ve encountered, and how did you handle it? Your experiences could help others recognize and avoid similar scams in the future. Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
OpenAI keeps shuffling its executives in bid to win AI agent battle
OpenAI announced yet another reorganization Friday, consolidating certain areas and making company president Greg Brockman the official lead of all things product.
In a memo viewed by The Verge, Brockman wrote that since OpenAI’s product strategy for this year is to go all-in on AI agents, the company is combining its products to “invest in a single agentic platform and to merge ChatGPT and Codex into one unified agentic experience for all.”
To do this, the company is making a suite of org chart changes, although it’s still operating under some of the same ones from last month. That’s when AGI boss Fidji Simo went on medical leave and OpenAI announced that Brockman would be in charge of product strategy and CSO Jason Kwon, CFO Sarah Friar, and CRO Denise Dresser would take control of business operations.
It’s all part of OpenAI’s recent strategic shift to focus on key revenue drivers like coding and enterprise and stop pouring resources into “side quests” ahead of its potential IPO later this year and amid investor pressure to turn a profit.
In Simo’s continued absence, Brockman’s role leading product strategy is now official, as well as the company’s “scaling” arm. Under Brockman will be four different pillars. The first is core product and platform, led by Thibault Sottiaux, who has been OpenAI’s engineering lead for Codex, and the second is critical enterprise industries, led by ChatGPT head Nick Turley. Third is the consumer pillar, such as health, commerce, and personal finance, which will be led by Ashley Alexander, who has been its healthcare products VP. The fourth pillar — core infrastructure, ads, data science, and growth — will be led by Vijaye Raji, who has been OpenAI’s CTO of applications.
Brockman wrote in the memo that OpenAI’s goal is now to “bring agents to ChatGPT scale, in order to give individuals and organizations significantly more value and utility from our products.”
Technology
Is that traffic ticket text a scam or real?
NEWYou can now listen to Fox News articles!
You’re going about your day when your phone buzzes. A text hits your phone. It looks official. It sounds urgent. And suddenly, you are being told you owe money for a traffic violation. That is exactly what Todd from Texas experienced. He emailed us and said:
“I received this text message today. It was so baffling because I haven’t lived in California for nearly a decade. I didn’t click on anything or respond. How can I tell if this is for real or if this is a scam?”
If you’ve gotten a message like this, you are not alone. This type of scam is spreading fast, and it is designed to pressure you into acting before you think. Let’s break down what is really going on.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
FAKE AGENT PHONE SCAMS ARE SPREADING FAST ACROSS THE US
This message may look official, but several red flags show it is likely a scam designed to pressure you into paying quickly. (Kurt “CyberGuy” Knutsson)
What the traffic ticket scam text looks like
At first, the message seems convincing. It claims to be a “final reminder” from the California DMV, and it warns of penalties like license suspension and added fees. It even includes a link that appears somewhat official. However, once you slow down and take a closer look, the red flags quickly start to pile up.
The biggest red flags in this message
Here are the key warning signs to watch for in messages like this.
9 WAYS SCAMMERS CAN USE YOUR PHONE NUMBER TO TRY TO TRICK YOU
1) The phone number makes no sense
The message comes from a number with a +63 country code. That is the Philippines, not California. Government agencies in the U.S. do not send official legal notices from international numbers. That alone is a major warning sign.
2) No name, just “Dear Driver”
Legitimate notices from a DMV or court almost always include your full name or at least some identifying information. “Dear Driver” is vague on purpose. It allows scammers to send the same message to thousands of people.
3) The link isn’t a real DMV website
The message includes this link:
ca.mnvtl.life/dmv
That isn’t a government domain. Official DMV websites in California use “.ca.gov” or similar trusted domains. Scammers often create lookalike links to trick you into clicking.
4) Urgency and threats
The message pushes you to act quickly with a deadline. It lists consequences like license suspension and extra charges. Scammers rely on fear. When you feel rushed, you are more likely to click without thinking.
FBI WARNS OF DANGEROUS NEW ‘SMISHING’ SCAM TARGETING YOUR PHONE
5) Asking you to reply to proceed
The text says to reply with “Y” to get instructions. That is another trap. Responding confirms your number is active, which can lead to more scam messages.
6) Generic language and odd phrasing
Parts of the message feel slightly off. The tone is formal but not quite right. That subtle awkwardness is common in scam messages sent to large groups of people.
7) Overloaded threats designed to scare you
The message piles on consequences like license suspension, added fees, court action and even credit damage. In this case, it even mentions a license suspension and a $160 late payment charge. That combination is meant to overwhelm you and push you to act fast. Real agencies usually provide clear, specific notices, not a long list of escalating threats in a single text.
INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU
Scam texts like this often arrive out of nowhere and try to create urgency before you have time to question them. (Kurt “CyberGuy” Knutsson)
What this means for you
Even if you have never driven in California, you could still receive this message. Scammers cast a wide net and hope someone takes the bait. If you click the link, you could be taken to a fake payment page. That page may ask for your credit card details, personal information or login credentials. In some cases, it can also install malware on your device or redirect you to credential-stealing pages. This isn’t about a ticket. It is about getting your data. State DMVs typically do not send final legal notices or payment demands by text message.
Why these scams keep working
These messages work because they tap into something most people fear. Legal trouble, fines and losing driving privileges. They also look just real enough to pass a quick glance. That is all scammers need. As more services move online, these scams will continue to evolve.
Unlike typical DMV scams, this message impersonates a court and escalates the threats to make the situation feel more serious (Kurt “CyberGuy” Knutsson)
Ways to stay safe from traffic ticket text scams
Start with a simple rule. Never trust a payment request that shows up out of nowhere. Here are practical steps you can take:
1) Do not click the link
If you are unsure, do not tap anything in the message. That includes links and reply options.
2) Use strong antivirus software
If you accidentally click a link, strong antivirus software can help detect malware and protect your data. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
3) Verify directly with the DMV
Go to your state’s official DMV website by typing it yourself into your browser. Do not use the link in the text.
4) Check the sender carefully
Look at the phone number. International numbers or random strings are a clear warning sign.
5) Ignore generic greetings
Real notices will usually include your name or case details. Vague language is a red flag.
6) Consider a data removal service
Scammers often get your number from data broker sites. Removing your personal info from those databases with a data removal service can reduce these messages. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
7) Block and report the number
On your phone, block the sender and report it as spam. This helps reduce future attempts.
8) Turn on spam filtering
Enable spam filtering on your phone or through your carrier to catch more of these messages before they reach you.
Kurt’s key takeaways
Todd did the right thing. He paused, questioned the message and did not click. That one decision likely saved him from handing over personal information. When it comes to messages like this, skepticism is your best defense. If something feels off, trust that instinct.
Should phone carriers and tech companies be doing more to block scams like this before you ever see them? Let us know by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Honda’s hybrid future starts with new Accord and RDX prototypes
Honda revealed prototypes of two new hybrid models, an Accord sedan and the Acura RDX SUV, during its annual business briefing this week, built on a platform that it says will begin launching next year. The RDX was announced earlier this year as Honda’s first SUV to feature the next-gen version of its two-motor hybrid system.
In March, Honda announced it would take a writedown of up to 2.5 trillion yen ($15.7 billion) on its EV investments. Now Honda says its EV-related losses will be “resolved” by 2029, and that it will reevaluate its EV plans in 2030.
-
Kentucky1 minute agoKentucky Newsmakers 5/17: Congressional candidate Erin Petrey; Visit Lex President Mary Quinn Ramer
-
Louisiana7 minutes agoLive Results: Louisiana midterm state and congressional primaries
-
Maine13 minutes agoMaineHealth Maine Medical conference highlights trauma care challenges
-
Maryland19 minutes agoMargie’s Intention Repeats Maryland Magic in DuPont
-
Michigan25 minutes agoPolice release 911 calls and video connected to fatal shooting of Michigan State student
-
Massachusetts31 minutes agoPublic asked to attend funeral services for Massachusetts World War II veteran with no known family
-
Minnesota37 minutes agoMinnesota honors 314 fallen officers in solemn St. Paul ceremony
-
Missouri49 minutes agoCrews safely remove individual from house fire Friday in Kansas City, Missouri