Xiaomi has just given a global launch to two of its latest flagship phones, the Xiaomi 17 and 17 Ultra, along with a Leica-branded Leitzphone edition of the Ultra. There’s no sign, however, of the 17 Pro, which launched in China with an additional display mounted next to the rear cameras.
Technology
Top 5 mistakes that could expose your financial data to cybercriminals
How secure is your financial information? Let’s do a little test: Do you currently have a budgeting app installed on your phone? Statistically speaking, there’s a good chance you do.
Seventy-five percent of smartphone owners have tried at least one. It seems like a smart move to take control of your finances, right? Unfortunately, what many people don’t realize is that apps like these could be exposing your sensitive financial data.
That’s just one example. There are other common habits and oversights that could leave your financial data wide open to cybercriminals.
Mistakes like these don’t just jeopardize your bank account, they can lead to devastating consequences like identity theft, mounting debt and even shattered retirement plans. I’ll walk you through the five biggest mistakes that could be putting your financial future at risk, and, more importantly, how to avoid them.
GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE
A couple working on their budget (Kurt “CyberGuy” Knutsson)
The 5 biggest mistakes you should avoid
Navigating the digital world can be tricky, especially when avoiding common pitfalls that compromise your privacy and security. Here are the five biggest mistakes you should avoid:
1. Neglecting security measures
This is one of the biggest pitfalls many of us fall into. There are so many things we have to do these days to keep our online security up to par. It’s easy to grow complacent, essentially leaving the door wide open for cybercriminals to walk through. Here are the basics you should never forget to follow:
Enable two-factor authentication (2FA) everywhere you can, especially online accounts that hold your financial information.
Keep your software updated. Hackers exploit known weaknesses in old versions of apps, operating systems and even browsers. So, be sure to regularly update your software on all your devices.
Avoid using public, unsecured networks, especially when accessing sensitive accounts like online banking or even e-commerce. If you have no other choice, use a trusted VPN to encrypt your online activity, including financial information. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices
A woman scrolling on her phone (Kurt “CyberGuy” Knutsson)
DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX
2. Reusing passwords
Though technically a security measure, this one’s so bad, it deserves its own spot on the list. A recent survey revealed that more than half of Americans reuse passwords on at least some of their accounts. Make sure you’re not one of them.
When hackers compromise one account, they don’t stop there. They use a technique called credential stuffing, by which stolen login details are tested on other platforms. So, if you’ve reused the same password for your bank account, email and favorite shopping site, one data breach can take them all down in one fell swoop.
If you don’t have a perfect memory, capable of memorizing every password you’ll ever need, I recommend using a trusted password manager. They can generate and store complex, unique passwords for all your accounts so you don’t have to remember them yourself.
A woman working on her budget (Kurt “CyberGuy” Knutsson)
SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME
3. Using budgeting apps
Budgeting apps can be a convenient tool for managing your finances, but they also come with potential risks that many users overlook. These apps often share user data with third parties and may request extensive permissions, including access to sensitive personal information. This can raise concerns about privacy and data security, especially if the app lacks robust safeguards. Before using a budgeting app, it’s crucial to carefully review its permissions and data-sharing policies to protect your financial and personal information.
Instead of relying on a budgeting app, consider utilizing your bank’s online tools. Many banks offer built-in budgeting and expense-tracking features within their secure online banking platforms. These are typically more privacy-focused than third-party apps. Here are some examples:
Bank of America: Offers interactive charts that break down spending trends, highlight budget categories and show total monthly spending with customizable categories.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
Wells Fargo: Features a package called My Money Map, which includes spending reports, personalized budget creation, goal setting and visual analysis of spending compared to budget limits.
Capital One: Provides automated budgeting tools through its 360 Checking account, allowing customers to track and categorize expenses automatically. It also features Eno, a virtual assistant for transaction inquiries.
Chase: Offers built-in budgeting tools that seamlessly integrate with your accounts. This includes features like automatic expense categorization, spending insights and personalized budget tracking. With Chase, you can also set savings goals and monitor your progress directly through their mobile app or online banking platform.
Huntington National Bank: Offers several in-app budgeting tools, including Spend Analysis for expense tracking, Spend Setter for setting category limits and Look Ahead Calendar for visualizing upcoming payments.
Regions Bank: Provides a suite of budgeting tools called My GreenInsights, accessible via mobile app and desktop, allowing customers to track expenses, set spending targets and receive suggestions for reducing expenses.
These bank-provided tools offer the advantage of being integrated directly with your accounts, potentially providing more accurate and up-to-date information while maintaining a higher level of privacy compared to third-party apps.
If you decide to stick to a budgeting app, though, make sure to check its privacy section on the App Store or Google Play, where you can see what data it collects and shares. Then, read the app’s privacy policy carefully, as tedious and often deliberately overcomplicated as that can be.
A man using his phone and laptop to work on his budget (Kurt “CyberGuy” Knutsson)
YOUR EMAIL DIDN’T EXPIRE, IT’S JUST ANOTHER SNEAKY SCAM
4. Shopping anywhere online
Online shopping is convenient and tempting, especially during major sales events like Black Friday. But diving headfirst into deals without knowing the retailer could cost you more than you bargained for.
When you shop on unfamiliar websites, you’re sharing sensitive information like your financial data, address and contact details. If the retailer doesn’t have strong privacy or security measures in place, this data could end up in the hands of cybercriminals or be sold to data brokers.
Even popular retailers aren’t always safe. For instance, platforms like Temu, which attract millions of shoppers, have faced scrutiny for questionable data practices. Popularity doesn’t guarantee good privacy or security standards. To protect yourself, shop only on websites with a solid reputation for security and privacy. Here’s how you can verify a site before making a purchase:
- Check their privacy policy to understand how they collect, use and share your data.
- Read consumer reviews to spot red flags, like poor customer service or complaints of data misuse.
- Whenever possible, use a virtual credit card or payment service like PayPal to add an extra layer of protection for your financial information.
A man using his phone for budgeting purposes (Kurt “CyberGuy” Knutsson)
5. Allowing data brokers to keep and sell your information
Unless you go completely off the grid digitally — no internet, online accounts or smartphones — it’s nearly impossible to avoid leaving a digital footprint. Most companies collect and share your personal information, which ends up in the hands of data brokers and people-search websites that aggregate and sell it to even more third parties.
Data brokerage is a $245.8 billion industry that profits off your personal information at the expense of your privacy and security. Some data brokers have even been caught intentionally selling information to scammers. People-search sites also provide an accessible way for anyone, including fraudsters, to get their hands on your personal information.
To mitigate these risks, it’s crucial to periodically remove your information from these databases. While it’s not a perfect solution, consistent removal can significantly reduce your exposure and safeguard both your financial data and personal safety. Check out my top picks for data removal services here.
Kurt’s key takeaways
From my experience, it’s easy to overlook these risks in our fast-paced, convenience-driven world. But taking just a few minutes to review your security practices can save you from a world of trouble. Don’t wait until it’s too late to protect yourself and your loved ones. Neglecting basic security like two-factor authentication, reusing passwords or shopping on untrustworthy websites can leave you exposed. Using finance apps that share your data, like allowing data brokers to profit off your personal information, also increases your risks of experiencing fraud and identity theft. By staying vigilant, you can protect both your finances and your loved ones.
Have you made any of the mistakes on this list, or do you have others you’d add? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Polymarket defends its decision to allow betting on war as ‘invaluable’
Polymarket has been allowing people to bet on when the US would strike Iran next. Obviously, now that it’s actually happened and people have died, the prediction betting market is feeling some pressure. The site has been at the center of controversy before, including suspicions of insider trading on the Super Bowl halftime show and the capture of Venezuelan President Nicolás Maduro.
In a statement posted on its site, Polymarket defended its decision to allow betting on the potential start of a war, saying that it was an “invaluable” source of news and answers, before taking shots at traditional media and Elon Musk’s X. The statement reads:
…
Read the full story at The Verge.
Technology
Google dropped dark web monitoring: Should you care?
NEWYou can now listen to Fox News articles!
Google has officially discontinued its Dark Web Report feature, a free tool that once scanned known dark web breach dumps for personal information tied to a user’s Google account. The service delivered notifications when email addresses and other identifiers appeared in leaked datasets.
According to Google’s support page, the system ceased scanning for new dark web data Jan. 15, 2026, and the reporting function was removed entirely on Feb. 16, 2026, meaning users can no longer access the feature.
The company said the decision reflects a shift toward security tools it believes provide clearer guidance after exposure, rather than standalone scan alerts.
If you previously relied on the free dark web scan as an early warning signal for leaked data, this change removes one of your sources.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Google officially ended its Dark Web Report tool, removing free breach alerts tied to user accounts. (Kurt “CyberGuy” Knutsson)
So what did users really lose?
Google’s Dark Web Report acted as a basic exposure scanner. It checked whether personal information linked to a Google account had surfaced in known breach collections circulating on the dark web.
When a match is found, users receive a notification identifying which type of data appeared in a leak. Depending on the data breach, that could include an email address, phone number, date of birth or other identifying details commonly harvested during large-scale hacks.
The report did not display stolen credentials or provide access to the leaked database itself. It also did not trace the origin of the compromise beyond referencing the breached service when available.
After an alert was issued, the next steps were left to the user. Google recommended actions such as changing passwords, enabling stronger authentication methods and reviewing account security settings. With the tool now removed, that automated breach check tied directly to a Google account is no longer available.
What you still have access to
Google directs users to its Security Checkup, a dashboard that scans your account for weak settings and unusual sign-in activity.
Its built-in Password Manager includes Password Checkup, which scans saved credentials against known breach databases and prompts you to change exposed passwords. Google also supports passkeys and two-factor verification to lock down account access.
The Results About You tool lets users search for personal information in Google Search and submit removal requests for certain publicly indexed details.
149 MILLION PASSWORDS EXPOSED IN MASSIVE CREDENTIAL LEAK
Without the automatic scan, users must now check for leaked data using other security tools. (iStock)
Alerts don’t always mean protection
Once personal information is compromised, it often ends up far beyond the breach itself. Stolen credentials and identity data are regularly trafficked on underground platforms where buyers can search for information tied to real people.
The BidenCash dark web marketplace was taken down by U.S. authorities in June 2025, and the Justice Department confirmed that the platform peddled stolen personal information and credit card data.
These illicit markets operate with a level of organization not unlike legitimate online stores. Search tools and bulk data sets are up for grabs and can be used to target any online account. This makes credential stuffing easier, where attackers test leaked passwords across multiple services in hopes of barreling into your account.
A breach alert tied to a dark web scan points to a leak at one moment in time; it does not follow whether that information has been sold to third parties or used in subsequent fraud attempts. For everyday users, this means that just knowing your data appeared in a leak doesn’t help much.
THINK YOUR NEW YEAR’S PRIVACY RESET WORKED? THINK AGAIN
Stolen personal information can circulate for years, making ongoing monitoring more important than a one-time alert. (Kurt “CyberGuy” Knutsson)
Identity monitoring may be a better option
With Google’s scan gone, some people may consider dedicated identity protection services instead. Many of these services offer continuous monitoring of your personally identifiable information and send alerts about changes to your credit reports from all three major U.S. credit bureaus. That can include notifications about new inquiries, newly opened accounts and monthly credit score updates. Some plans also monitor a broader range of personal identifiers, such as driver’s license numbers, passport numbers and email addresses.
Beyond credit monitoring, certain services track linked bank, credit card and investment accounts for unusual activity. They may also monitor public records for changes to addresses or property titles and alert you if your information appears in those filings.
Many providers include identity theft insurance to help cover eligible out-of-pocket recovery costs. Coverage limits vary by plan and provider. Additional features often include spam call and message protection, a password manager, a virtual private network (VPN) and antivirus software.
No service can prevent every form of identity theft. However, ongoing monitoring and recovery support can make it easier to respond quickly if your information is misused.
See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.
Kurt’s key takeaways
Google’s decision to drop its Dark Web Report may seem small. But it removes a tool many users relied on. For some, those alerts were the first warning that their data appeared in a breach. That automatic scan is now gone. Google still offers Security Checkup, Password Checkup, passkeys and two-step verification. However, none of them actively scan dark web breach dumps for you. Stolen data does not disappear. Criminals copy, sell and reuse it. One alert shows a single moment. Ongoing identity theft monitoring helps you stay aware over time.
Now that Google has dropped its dark web monitoring feature, will you actively check your data exposure or assume someone else is watching it for you? Let us know your thoughts by writing to us at Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Xiaomi 17 is a small(ish) phone with a big(ish) battery
The 17 and 17 Ultra will apparently be available soon in the UK, Europe, and select other markets. The 17 — pitched as a rival to the likes of the iPhone 17 and Samsung Galaxy S26 — will cost £899 / €999 (about $1,200), while the larger and more capable Ultra starts from £1,299 / €1,499 ($1,750). The limited-edition Leitzphone will be substantially more expensive at £1,699 / €1,999 ($2,300), though it includes 16GB of RAM and 1TB of storage, along with a few extra accessories.


The 17 is an extremely capable small-ish flagship, with a 6.3-inch OLED display, Qualcomm Snapdragon 8 Elite Gen 5, and large 6,330mAh silicon-carbon battery (though sadly smaller than the 7,000mAh version launched in China). I won’t be writing a full review of the 17, but did spend a week using it as my main phone, and found that the battery cruised past the full-day mark, though wasn’t quite enough for two full days of my typical usage. That’s far better battery life than you’d find in similarly sized phones from Apple, Samsung, or Google.
The cameras impress too, with 50-megapixel sensors behind each of the four lenses, selfie included. Pound for pound, you won’t find many better camera systems in any phone this size.
1/10
The Ultra, unsurprisingly, takes things to another level. It’s much larger, with a 6.9-inch display, and weighs a hefty 218g. Despite that, the 6,000mAh is actually smaller, though I found it delivered pretty similar longevity.

The enormous camera is, as ever for Xiaomi’s Ultra phones, the highlight. There are 50-megapixel sensors for each of the main, ultrawide, and selfie cameras, with a large 1-inch-type sensor behind the primary lens. The periscope telephoto is even more impressive: 200-megapixel resolution, a large 1/1.4-inch sensor, and continuous optical zoom from 3.2x to 4.3x, the equivalent of 75-100mm. Xiaomi isn’t the first to pull off a true zoom phone — Sony’s Xperia 1 IV got there first in 2022 — but the telephoto camera here is far more capable than that phone’s, with natural bokeh and impressive performance even in low light.

The camera capabilities are supported by Xiaomi’s ongoing photography partner Leica, but it’s the pair’s Leitzphone that really emphasizes that. Slightly redesigned from the 17 Ultra Leica Edition that was released in China last December, this includes Leica branding across the hardware and software, a range of Leica filters and shooting styles, and a rotatable rear camera ring that can be used to control the zoom. It’s the first Leica Leitzphone produced by Xiaomi — after a trio of Japan-only Sharp models — and comes with additional branded accessories, including a case with a lens cap and a microfiber cleaning cloth.
Xiaomi has plenty of other announcements alongside the 17 series phones at MWC this year, including a super-slim magnetic power bank, the Pad 8 and Pad 8 Pro tablets, and a smart tag that supports both Google and Apple’s tech-tracking networks.
Photography by Dominic Preston / The Verge
-
World3 days agoExclusive: DeepSeek withholds latest AI model from US chipmakers including Nvidia, sources say
-
Massachusetts4 days agoMother and daughter injured in Taunton house explosion
-
Montana1 week ago2026 MHSA Montana Wrestling State Championship Brackets And Results – FloWrestling
-
Louisiana6 days agoWildfire near Gum Swamp Road in Livingston Parish now under control; more than 200 acres burned
-
Denver, CO4 days ago10 acres charred, 5 injured in Thornton grass fire, evacuation orders lifted
-
Technology1 week agoYouTube TV billing scam emails are hitting inboxes
-
Technology1 week agoStellantis is in a crisis of its own making
-
Politics1 week agoOpenAI didn’t contact police despite employees flagging mass shooter’s concerning chatbot interactions: REPORT