Technology
Think you can delete your data yourself? Here’s why you’re probably wrong
None of us signed up for our personal info to be bought and sold online. Between data brokers, people-search sites and all the other places our details end up, it happens constantly and usually without us even realizing it.
If you’ve ever Googled yourself and found your phone number or home address floating around on some shady-looking website, you know the feeling.
If that’s you, you probably started looking for ways to remedy the situation and may be wondering if it’s better to remove your personal information from the web yourself or use a data removal service. I’ve tried both, and here’s what I’ve learned.
Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!
A woman working on her laptop (Kurt “CyberGuy” Knutsson)
Doing it yourself sounds doable, at first
When the data broker problem first got on my radar (granted, it was because data removal services started to emerge), I figured I could just opt out on my own. After all, most of them have opt-out pages with a process. Whitepages, one of the most popular people-search sites, for example, has the following process.
- Search for your name and address on Whitepages, find the correct listing and copy the URL of your profile.
- Go to the Whitepages suppression page, paste the URL into the field and send the removal request. This includes several sub-steps, like verifying your data, stating the reason for your request and providing a contact phone number.
- Whitepages will call you soon after to verify your identity. If you miss the call, you’ll have to start the process again.
This is just one example, but other search sites have similar opt-out processes, give or take a few steps.
A man working on a laptop (Kurt “CyberGuy” Knutsson)
INSURANCE DATA BREACH EXPOSES SENSITIVE INFO OF 1.6 MILLION PEOPLE
The reality check: Why manual removal becomes overwhelming fast
If you want to remove your information from all (or most) of the data brokers that have it, here’s what you’ll have to do.
- Find the brokers that have your data. There are hundreds out there. You can find the public-facing data brokers, or people-search sites, by doing a quick Google search. However, private data brokers that sell datasets B2B (business-to-business) require a little more digging. You may have to just figure out which ones operate in your area and send removal requests to them all.
- Submit opt-out requests to each one. Read through their opt-out instructions (some of which are intentionally vague or buried) and go through the process one by one.
- Repeat the process periodically. Data brokers often re-collect your info unless you keep checking in and submitting new requests. It’s not a one-and-done situation. If you’re committed to keeping your data private, you’ll need to keep monitoring and removing it.
It’s definitely doable, but not painless. Some sites make it easier, but others require you to upload your ID (not recommended), ask you to send snail mail or outright reject your request unless you use a specific email domain, not to mention all the CAPTCHAs that feel like they were designed to break your spirit.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
A woman working on her laptop (Kurt “CyberGuy” Knutsson)
HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES
Data removal services automate this process
I’ve since tried using a data removal service that automates the opt-out process, handling the complexities on your behalf. See below for what this gives you.
- Comprehensive coverage: They maintain updated lists of data brokers and their opt-out procedures, so your information is removed from more sources than you’d manage on your own.
- Time efficiency: Because most of them use automation, you don’t really have to do anything beyond signing up and monitoring the progress. This saves you significant time and effort.
- Ongoing removals: As long as you’re subscribed, these services continue to monitor and remove your information from data broker sites, so you know it won’t pop up again.
I didn’t have to babysit the process, and I didn’t have to guess whether it was working. I just got updates when the removals were confirmed.
Let’s break it down
If you’re still weighing your options, here’s how the two approaches stack up.
Manual opt-outs demand a significant time investment, requiring you to personally navigate each data broker’s unique removal process. While free, this approach offers variable coverage depending on how diligently you track down brokers, and consistency is challenging; you’ll need to repeat the process regularly to keep your data private. Success also depends heavily on your ability to decipher vague opt-out instructions and adapt to each broker’s requirements.
In contrast, data removal services save time by handling the legwork for you. They provide broad coverage by targeting numerous brokers simultaneously and maintain consistency through ongoing monitoring. While these services come with subscription fees, they eliminate the need for personal expertise, offering a hands-off solution to data privacy.
The bottom line: Why personal data removal services win the privacy battle
After testing both manual opt-outs and automated services, using a personal data removal service emerges as the clear solution for reclaiming your data. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
Kurt’s key takeaways
If you’ve got the time and patience, you can absolutely take the DIY route. But if you’re looking for a way to protect your privacy without sinking hours into research, filling out forms and monitoring, a data removal service makes things a lot quicker and more convenient. For most people, this is likely the better option. Many states have privacy laws that give you the right to request that data brokers remove your personal information, but the system seems to be rigged to make exercising those rights unreasonably difficult. While it shouldn’t be necessary, data removal services offer a way to cheat that system.
Do you think stronger protections are needed to shield you from the challenges and risks posed by data brokers and their handling of your personal information? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
X claims it has stopped Grok from undressing people, but of course it hasn’t
Updates to [@]Grok Account
We have implemented technological measures to prevent the Grok account from allowing the editing of images of real people in revealing clothing such as bikinis. This restriction applies to all users, including paid subscribers.
Additionally, image creation and the ability to edit images via the Grok account on the X platform are now only available to paid subscribers. This adds an extra layer of protection by helping to ensure that individuals who attempt to abuse the Grok account to violate the law or our policies can be held accountable.
Geoblock update
We now geoblock the ability of all users to generate images of real people in bikinis, underwear, and similar attire via the Grok account and in Grok in X in those jurisdictions where it’s illegal.
Technology
Malicious Mac extensions steal crypto wallets and passwords
NEWYou can now listen to Fox News articles!
Mac users often assume they’re safer than everyone else, especially when they stick to official app stores and trusted tools.
That sense of security is exactly what attackers like to exploit. Security researchers have now uncovered a fresh wave of malicious Mac extensions that don’t just spy on you, but can also steal cryptocurrency wallet data, passwords and even Keychain credentials. What makes this campaign especially concerning is where the malware was found, inside legitimate extension marketplaces that many people trust by default.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Once active, GlassWorm targets passwords, crypto wallets, and even your macOS Keychain without obvious warning signs. (Cyberguy.com)
How malicious Mac extensions slipped into trusted stores
Security researchers at Koi Security uncovered a new wave of the GlassWorm malware hiding inside extensions for code editors like Visual Studio Code (via Bleeping Computer). If you’re not familiar with code editors, they’re tools developers use to write and edit code, similar to how you might use Google Docs or Microsoft Word to edit text. These malicious extensions appeared on both the Microsoft Visual Studio Marketplace and OpenVSX, platforms widely used by developers and power users.
FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE
At first glance, the extensions looked harmless. They promised popular features like code formatting, themes or productivity tools. Once installed, though, they quietly ran malicious code in the background. Earlier versions of GlassWorm relied on hidden text tricks to stay invisible. The latest wave goes further by encrypting its malicious code and delaying execution, making it harder for automated security checks to catch.
Even though this campaign is described as targeting developers, you don’t need to write code to be at risk. If you use a Mac, install extensions or store passwords or cryptocurrency on your system, this threat still applies to you.
What GlassWorm does once it’s on your Mac
Once active, GlassWorm goes after some of the most sensitive data on your device. It attempts to steal login credentials tied to platforms like GitHub and npm, but it doesn’t stop there. The malware also targets browser-based cryptocurrency wallets and now tries to access your macOS Keychain, where many saved passwords are stored.
Researchers also found that GlassWorm checks whether hardware wallet apps like Ledger Live or Trezor Suite are installed. If they are, the malware attempts to replace them with a compromised version designed to steal crypto. That part of the attack isn’t fully working yet, but the functionality is already in place.
To maintain access, the malware sets itself up to run automatically after a reboot. It can also allow remote access to your system and route internet traffic through your Mac without you realizing it, turning your device into a quiet relay for someone else.
Some of the malicious extensions showed tens of thousands of downloads. Those numbers can be manipulated, but they still create a false sense of trust that makes people more likely to install them.
7 steps you can take to stay safe from malicious Mac extensions
Malicious extensions don’t look dangerous. That’s what makes them effective. These steps can help you reduce the risk, even when threats slip into trusted marketplaces.
1) Only install extensions you actually need
Every extension you install increases risk. If you’re not actively using one, remove it. Be especially cautious of extensions that promise big productivity gains, premium features for free or imitate popular tools with slightly altered names.
2) Verify the publisher before installing anything
Check who made the extension. Established developers usually have a clear website, documentation and update history. New publishers, vague descriptions or cloned names should raise red flags.
These malicious extensions looked like helpful tools but quietly ran hidden code once installed. (Cyberguy.com)
3) Use a password manager
A password manager keeps your logins encrypted and stored safely outside your browser or editor. It also ensures every account has a unique password, so if one set of credentials is stolen, attackers can’t reuse it elsewhere.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
HOW HACKERS ARE BREAKING INTO APPLE DEVICES THROUGH AIRPLAY
4) Run strong antivirus software on your Mac
Modern macOS malware doesn’t always drop obvious files. Antivirus tools today focus on behavior, looking for suspicious background activity, encrypted payloads and persistence mechanisms used by malicious extensions. This adds a critical safety net when something slips through official marketplaces.
The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
5) Consider a personal data removal service
When your data leaks, it often spreads across data broker sites and breaches databases. Personal data removal services help reduce how much of your information is publicly available, making it harder for attackers to target you with follow-up scams or account takeovers.
While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
6) Turn on two-factor authentication (2FA)
Enable 2FA wherever possible, especially for email, cloud services, developer platforms and crypto-related accounts. Even if a password is stolen, 2FA can stop attackers from logging in.
7) Keep macOS and your apps fully updated
Security updates close gaps that malware relies on. Turn on automatic updates so you’re protected even if you miss the headlines or forget to check manually.
Mac users often trust official app stores, but that trust is exactly what attackers are counting on. (Kurt “CyberGuy” Knutsson)
Kurt’s key takeaway
GlassWorm shows that malware doesn’t always come from shady downloads or obvious scams. Sometimes it hides inside tools you already trust. Even official extension stores can host malicious software long enough to cause real harm. If you use a Mac and rely on extensions, a quick review of what’s installed could save you from losing passwords, crypto or access to important accounts.
When was the last time you checked the extensions running on your Mac? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
BMW says electric M3 will be a ‘new level’ of performance
BMW teased its forthcoming all-electric M-series performance sedan today, promising that the quad-motor M3 sports car would feature specs that are truly next level when it arrives in 2027.
The M3 will have four electric motors and simulated gear shifting, a feature that is quickly becoming a must-have for electrified sports cars. BMW says the setup unlocks the benefits of both rear and all-wheel drive, with the ability to decouple the front axle.
The electric M3 will also be built on BMW’s Neue Klasse platform that promises more efficient batteries, lightning fast charging, and higher powered computers. The architecture will be 800-volt, the regenerative braking will be highly efficient, and if the camouflaged pictures are any indication, it will be a real looker on the streets.
Speaking of computers, the M3 will have four of them, unified under its oddly named “Heart of Joy” component that aggregates all the traction, stability, and electric motor management functions of the vehicle. That means when software updates are made available, the vehicle’s brain will be able to receive them over-the-air faster than BMW’s current processors.
The M3’s simulated gear shifting will feature a “newly developed soundscape” that “channels pure emotion.” Like other automakers, BMW is loath to alienate its loyal M-series customers by giving them all the torque but none of the gearing feedback. And now a fake “soundscape” will accompany all that shifting. Porsche, Hyundai, and Dodge are also on board the fake EV gear shifting bandwagon.
-
Montana5 days agoService door of Crans-Montana bar where 40 died in fire was locked from inside, owner says
-
Technology1 week agoPower bank feature creep is out of control
-
Delaware6 days agoMERR responds to dead humpback whale washed up near Bethany Beach
-
Dallas, TX7 days agoAnti-ICE protest outside Dallas City Hall follows deadly shooting in Minneapolis
-
Education1 week agoVideo: This Organizer Reclaims Counter Space
-
Virginia5 days agoVirginia Tech gains commitment from ACC transfer QB
-
Iowa1 week agoPat McAfee praises Audi Crooks, plays hype song for Iowa State star
-
Montana5 days ago‘It was apocalyptic’, woman tells Crans-Montana memorial service, as bar owner detained