Technology
Top 20 apps tracking you every day

If something is free, you’re the product being sold. This is especially true for most online services we use. For example, Google’s primary source of revenue is ads. They make money by collecting data about you and me and selling targeted advertising to companies, which then show us products relevant to our interests.
You might have noticed that the moment you search for a product on Google, you start seeing ads for it on Facebook. The same applies to apps like Instagram, Threads and LinkedIn. In fact, research shows that the apps collecting the most data about you are also among the most widely used.
Let’s look at the top 20 of them and explore how you can take control of your personal information.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
A man scrolling through his apps on his phone (Kurt “CyberGuy” Knutsson)
The most invasive apps you’re probably using
Apps collect all sorts of data about you, but let’s get one thing straight. Not all data collection is bad. Some apps genuinely need access to certain information to function properly. For example, Uber stores your location data to help you find a ride faster, while WhatsApp requires access to your contacts so you can send messages.
The real issue is data collection that serves no purpose other than showing you ads or selling your information to third parties. According to Marin Marinčić, head of IT Infrastructure at Nsoft, the top 20 most invasive apps collect data that is not necessary for their core functions.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Leading the list is Meta with all four of its major apps. Facebook, Messenger, Instagram and Threads share 68% of collected data with third parties while also using it for targeted ads. LinkedIn follows, sharing around 37% of user data, with Amazon in third place, followed by YouTube.
What makes this concerning is how deeply embedded these apps are in our daily lives, making it nearly impossible to find alternatives or avoid data collection altogether.
The list also includes Elon Musk’s X at No. 5, followed by Uber Eats, PayPal, Uber, Google and Amazon Prime Video. TikTok, despite ongoing scrutiny over its data policies, ranks 14th. While many of these names were expected, one surprising entry is the mobile game Candy Crush, which uses 28% of collected data for ads. You can find the full list in the image below.

The top 20 most invasive applications (Nsoft)
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
Looking for alternatives is the only solution
Avoiding data collection is nearly impossible if you use the apps above. The only way to dodge these invasive apps is to switch to apps that respect your privacy. While it may seem impossible to replace some of the biggest platforms, there are alternatives that collect little to no unnecessary data.
- For messaging, Signal is one of the best options. Unlike WhatsApp, it does not store metadata or share information with third parties. If you need a search engine that does not track your activity, check out these options instead of Google.
- When it comes to social media, Mastodon and Bluesky offer decentralized alternatives to Twitter.
- For those looking to replace YouTube, PeerTube and Nebula are worth exploring.
- If you shop frequently on Amazon, consider smaller online retailers or direct brand websites that may be less likely to track your every move.
- Instead of Google Drive, consider these solutions which offer cloud storage with strong encryption.
Switching to these alternatives may require some effort, but it is the best way to limit how much of your personal data is being collected. Taking control of your privacy starts with making conscious choices about the apps you use.

Apps on the home screen of an Android phone (Kurt “CyberGuy” Knutsson)
HOW TO GET RID OF ROBOCALLS WITH APPS AND DATA REMOVAL SERVICES
5 ways to reduce data sharing
If you’re not able to delete the apps listed above, follow the simple steps below to minimize how much information is being collected and shared.
1. Review app permissions: Most apps request access to data they do not actually need. Go to your phone settings and check app permissions on your iPhone and Android. Disable access to location, microphone, contacts and other sensitive data unless absolutely necessary.
2. Turn off ad personalization: Many companies track your online activity to show targeted ads. You can limit this by disabling ad personalization in Google, Facebook, and other accounts. This reduces the amount of data collected about your interests and behavior.
3. Limit social media tracking: Social media platforms track your activity even when you are not using them. Adjust privacy settings to restrict data collection.
4. Avoid signing in with Google or Facebook: Many websites offer login options using Google or Facebook. While convenient, this shares even more data with these platforms. Instead, create separate accounts using email whenever possible.
5. Use a Virtual Private Network (VPN) and private browsing mode: A VPN hides your IP address, helping to obscure your location and online activity, making it harder for websites to track you. Combined with private browsing or incognito mode, this reduces the amount of data companies can collect about your online activity. Using a VPN service can also enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi.
While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices
6. Regular app cleanup: Uninstall apps you no longer use to reduce passive data collection.
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
App-specific suggestions to safeguard your digital footprint
Protect your personal information across the popular platforms mentioned above with these essential privacy adjustments.
Facebook/Instagram/Threads:
- Disable activity tracking by going to Settings > Privacy > Activity Tracking.
- Turn off “Apps, Websites and Games” to limit third-party data sharing.
LinkedIn:
- Turn off ad targeting in Settings > Advertising preferences.
- Disable profile viewing history.
Amazon/Prime Video:
- Opt-out of personalized ads in your account settings.
- Limit sharing by disabling Alexa voice data storage (if applicable).
YouTube/Google Products (e.g., Gmail, Google Maps):
- Disable ad personalization under Google Account > Data & Personalization > Ad Settings.
- Turn off location history and web/app activity tracking.
Uber/Uber Eats:
- Use the app only when needed, and avoid storing payment methods if possible.
- Disable tracking after rides/deliveries are complete.
PayPal:
- Restrict sharing under Settings > Privacy & Security by opting out of data sharing for marketing purposes.
Snapchat:
- Disable location sharing via Snap Map and turn off ad personalization under Ad Preferences.
TikTok:
- Restrict personalized content recommendations in Privacy > Personalization and Data.
- Avoid posting unnecessary personal information.
Spotify:
- Adjust data sharing preferences in Account Settings > Privacy Settings.
- Opt out of tailored ads.
Roblox:
- Set strict privacy controls in the account settings, especially for children.
- Use a separate, disposable email for account registration.
SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES
Kurt’s key takeaway
The best way to reduce companies from collecting your data is to remove invasive apps from your phone. Many apps request unnecessary permissions that can track your activity, so deleting them limits exposure. Instead of downloading standalone apps, try using the browser versions of popular social media platforms, as they typically have fewer permissions.
However, web tracking still exists through cookies and fingerprinting, so using a privacy-focused browser like Brave, Firefox with enhanced tracking protection, or Safari with Intelligent Tracking Prevention (ITP) can further reduce data collection. However, some apps are so deeply integrated that replacing them is difficult. For example, if you use an Android phone, avoiding Google’s ecosystem is nearly impossible. Apple, on the other hand, offers more privacy controls, giving users better options to limit data collection.
Do you check app permissions before installing? How do you decide which permissions are acceptable? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
A new Alien: Earth teaser includes the miracle of alien birth

It’s been a busy week for Alien: Earth’s marketing team, having released three new teasers over the last few days. The longest of them — titled “Gestation Complete” — spends two whole minutes on the gestation and birth of an alien creature. Another, “Crate,” gives hints that Earth could be facing more than just a xenomorph, the franchise’s shiny, acid-spitting ancient aliens. Both teasers were released today, following a goofy nature documentary-themed Earth Day teaser earlier this week.
“Gestation Complete” is worth sitting through if you were a fan of the look of the 1979 Alien movie that kicked off the franchise. After the creepy alien birth, you’re treated to shots of the inside of the Weyland-Yutani ship that’s carrying the alien, complete with the retro-future CRT-style displays and blinking buttons from the ship’s Mother’s chamber — the room housing the ship’s AI computer system interface. On one of the displays, an ominous message reads: “NEW SPECIES DETECTED.“
The other, shorter trailer hints at what else the series might have in store, with a narrator speaking over footage of shadowy aliens behind foggy yellow containment module windows:
This ship collected five different life forms from the darkest corners of the universe. Each one, a unique, deadly species. Monsters.
The ship in question is headed for a crash-landing on Earth. Here’s the show’s synopsis, from the videos’ descriptions:
When a mysterious space vessel crash-lands on Earth, a young woman (Sydney Chandler) and a ragtag group of tactical soldiers make a fateful discovery that puts them face-to-face with the planet’s greatest threat in FX’s highly anticipated TV series Alien: Earth from creator Noah Hawley.
The rest of the cast includes Alex Lawther, Timothy Olyphant, Essie Davis, Samuel Blenkin, Babou Ceesay, David Rysdahl, Adrian Edmondson, Adarsh Gourav, Jonathan Ajayi, Erana James, Lily Newmark, Diem Camille, and Moe Bar-El. Alien: Earth is set to release this summer on FX and Hulu.
Technology
How secure is my password? Use this test to find out

The RockYou2024 leak, which exposed almost 10 billion passwords in July of last year, might seem like old news, but its impact is still felt today.
It’s considered the largest password compilation ever released. With such a vast collection of breached credentials circulating, the risk of credential stuffing, identity theft and unauthorized access to online accounts and systems remains high. For anyone still reusing passwords, the dangers are real — and growing.
That’s why password security has never been more critical, and the big question remains, how secure is my password?
Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my free Ultimate Scam Survival Guide when you sign up!
Username and password on tablet (Kurt “CyberGuy” Knutsson)
Why does password strength matter?
Think of weak passwords as an open door for hackers. Recent reports show that many common passwords can be cracked in literally seconds. Simple or reused passwords are especially vulnerable to automated attacks, and once one account is breached, others are often quickly compromised.
If a company you’re signed up with experiences a data breach and your login info is leaked, attackers can try that same password on other platforms, potentially unlocking a lot more than just one account.
Strong passwords act as your first line of defense. They’re long, complex and unique, making it significantly harder for attackers to guess or force their way in. When every account has its own strong password, even if one gets leaked, the rest stay safe.
Think of it this way. A weak password is like using the same key for your house, car and office and leaving it under the doormat. A strong password? It’s like a unique, high-security key for every door in your digital life.

Illustration of username and password (Kurt “CyberGuy” Knutsson)
APPLE FIXES PASSWORDS APP VULNERABILITY ENABLING WI-FI ATTACKS
What are the top 5 passwords to avoid?
The most commonly used and insecure passwords are:
- 123456
- 123456789
- 12345678
- password
- Qwerty123
These passwords are extremely easy to guess and should be avoided at all costs.

Illustration of password login on laptop (Kurt “CyberGuy” Knutsson)
MALWARE STEALS BANK CARDS AND PASSWORDS FROM MILLIONS OF DEVICES
Password strength test: 7-point self-evaluation checklist
How secure is your password, really? It’s time to put it to the test. Grab a pen (or just keep a mental tally) and score yourself based on this 7-point password strength test. Each “yes” earns you a point. So, let’s see how your password holds up in today’s threat landscape.
1. Is your password at least 12 characters long?
Length is your first line of defense. Short passwords — think six or eight characters — can be cracked in minutes by modern hacking tools. At 12 characters or more, you’re making it exponentially harder for attacks to succeed.
2. Does it include a mix of upper and lowercase letters?
Mixing uppercase and lowercase letters strengthens your password by increasing complexity. For example, instead of using something like “t8g5k9w2,” use “T8g5K9w2” — same characters, just more variety. Mix it up.
3. Does it include numbers?
Adding numbers makes your password harder to crack. Instead of sticking to just letters — like “Trkplmsh” — try something like “Tr8k5Plm2sh.” Randomly placed numbers increase complexity and make your password much more secure.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
4. Does it include special characters?
Symbols like !, @, #, and $ add another layer of security. For example, a password like “T8g5K9w2” becomes even stronger as “T8g5#K9w2!.” Special characters increase complexity and help defend against attacks.
5. Is it unique (not reused across accounts)?
Reusing passwords is like handing hackers a master key. If one account gets breached, and you’ve reused that password elsewhere, you’re toast. One password, one purpose. No exceptions.
6. Does it avoid personal info like your birthdate?
Your name, birthday or “Fluffy1990” (your dog’s name and birth year) might feel clever, but they’re goldmines for attackers who can scrape social media or breached data. Keep it impersonal and unpredictable.
7. Have you changed it in the last 90 days?
Even good passwords can go stale. It’s a smart move to update them every 90 days, or sooner if a site you use has a security issue.

Illustration of password login on laptop (Kurt “CyberGuy” Knutsson)
DANGEROUS CHROME EXTENSIONS MIMIC PASSWORD MANAGERS
How did you score?
Now, let’s take a look at your score:
- 0-2 points: Uh-oh. Your passwords are waving a welcome flag to hackers. Time for a serious upgrade.
- 3-4 points: Not terrible, but you’re still vulnerable. Patch those weak spots pronto.
- 5-6 points: Solid effort! You’re close to fortress-level security — tweak a bit more.
- 7 points: Nailed it. Your password is strong and secure — just remember to keep it updated.
This quick password strength test isn’t just a quiz, it’s a good reminder. Even one weak spot could be all it takes for someone to break in. In a world full of data leaks, a strong, unique password is one of the easiest ways to protect yourself. So, what’s your score? Think it’s time to level up?
What should I do if my password strength is low?
If your score didn’t quite hit that seven out of seven mark, no worries. The good news? You’ve already taken the first step by identifying the weak spots. Now, you’ve got two options:
Build a better password yourself
To keep your passwords secure, use ones that are at least 12 characters long with a mix of uppercase and lowercase letters, numbers and special characters. Avoid using personal information or common patterns. Always use a different password for each account, and enable two-factor authentication whenever it’s available.
While you can build a strong password on your own, let’s be real, it’s not always easy. Coming up with something that’s at least 12 characters long, includes uppercase and lowercase letters, numbers, special symbols and isn’t based on anything personal? That’s a tall order. And even if you do manage to craft the perfect one, you’ve still got to remember it, especially if you’re using a different strong password for every account (which you absolutely should be).
Let a password generator do the heavy lifting
This is the easier, faster and frankly smarter route. A password generator creates long, complex, completely random passwords for you — no guesswork or mental gymnastics required. These tools are designed to pump out passwords that check all the boxes, making them far harder to crack. If you want an easy and secure option, many password managers include built-in password generators that follow best practices for maximum strength.
Either way, the key takeaway is this: Don’t settle for weak or recycled passwords. Whether you go DIY or use a tool, upgrading your password strength is one of the simplest ways to protect yourself online.

Illustration of online banking login on laptop (Kurt “CyberGuy” Knutsson)
What is the best password manager?
Password security can seem like a tough thing to maintain manually. The good news is that password managers take the hassle out of it by generating, storing and autofilling strong, unique passwords for you.
We recommend a password manager that is secure, user-friendly and includes features like a password health tool, data breach monitoring and a built-in password generator to help you create strong, unique passwords. Essentially, they are a digital safe designed to encrypt and store your login credentials, passkeys, credit card details, personal information and even sensitive files. It remembers everything for you, organizes your credentials neatly and fills in login forms with a single click. When you sign up for a new site, it autosaves the password with no effort required.
The best part? A password manager puts an end to password reuse. Instead of leaning on that tired old “Fluffy1990” for every account, it generates strong, unique passwords tailored to each site, boosting security for both your personal and professional life. So, with a password manager, you’ll no longer have to ask yourself, how secure is my password?
Get more details about my best expert-reviewed Password Managers of 2025 here.
Kurt’s key takeaways
With data breaches becoming increasingly common, it’s clear that password security isn’t a “set it and forget it” task. It’s an ongoing process. By prioritizing strong passwords and using tools to help you manage them effectively, you can significantly reduce your risk and enjoy greater peace of mind online.
Do you feel that the companies you interact with online are doing enough to protect your data and passwords? What more could they be doing? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
GPU prices are out of control again

Every so often, Central Computers — one of the last remaining dedicated Silicon Valley computer stores — lets subscribers know it’s managed to obtain a small shipment of AMD graphics cards. Today, it informed me that I could now purchase a $600 Radeon RX 9070 XT for $850 — a $250 markup.
It’s not alone. I just checked every major US retailer and street prices on eBay, and I regret to inform you: the great GPU shortage has returned. Many AMD cards are being marked up $100, $200, $250, even $280. The street price of an Nvidia RTX 5080 is now over $1,500, a full $500 higher than MSRP. And an RTX 5090, the most powerful consumer GPU? You can’t even get the $2,000 card for $3,000 today.
Here, I’ve built tables to show you:
You shouldn’t just blame tariffs for these price hikes. In early March, we found retailers were already scalping their supposedly entry-level MSRP models of the new AMD graphics cards. Nor is this likely to just be high demand, given how few cards are changing hands on eBay: only around 1,100 new Nvidia GPUs, and around 266 new AMD GPUs were listed there over the past 30 days.
Here’s a deeper dive on the “MSRP” models of the AMD cards, which were all originally listed at $549 or $599:
I’ve focused this table on Newegg and Micro Center since they carry more models than any other retailer, though I also spotted “MSRP” 9070 XT cards at $800 and $850 at Amazon today, and an $830 card at Best Buy. Otherwise, these are the new sticker prices, not necessarily attainable prices, as most were out of stock.
From December 2020 to July 2022, I periodically tracked the prices of game consoles and GPUs during the covid-19 pandemic, when they were incredibly expensive to obtain. At one point, some GPUs were worth triple their MSRP. I’d love to hear from Verge subscribers in particular: is this a valuable service we should continue in the tariff era? Or do you just want to know when it’s safe to enter the water again?
-
Education1 week ago
Read the Letter From Kristi Noem to Harvard
-
Education1 week ago
Video: Shooting at Florida State University Leaves 2 Dead and 6 Injured
-
News1 week ago
Harvard would be smart to follow Hillsdale’s playbook. Trump should avoid Biden’s. | Opinion
-
Business1 week ago
Porto's Bakery moving forward in Downtown Disney, replacing Earl of Sandwich
-
Politics1 week ago
Supreme Court blocks new deportations of Venezuelans in Texas under 18th century Alien Enemies Act
-
Politics1 week ago
Trump admin imposes sanctions against Bank of Yemen for supporting Houthis
-
News1 week ago
The NHL Stanley Cup Playoffs begin Saturday. Here's what to watch for
-
Politics6 days ago
Pope Francis and US presidents: A look back at his legacy with the nation's leaders