Connect with us

Technology

TV host Andy Cohen swindled in costly bank scam: How to avoid becoming a victim yourself

Published

on

TV host Andy Cohen swindled in costly bank scam: How to avoid becoming a victim yourself

Andy Cohen, the host of Bravo’s “Watch What Happens Live with Andy Cohen,” recently revealed he was scammed out of a large sum of money by an imposter who pretended to be from his bank.

He shared his story on TV, social media and on his Sirius XM “Andy Cohen’s Daddy Diaries Podcast,” hoping to raise awareness and prevent others from falling into the same trap.

What is an imposter scam?

An imposter scam is when someone contacts you pretending to be someone you trust, such as a government official, a bank employee, a family member or a friend.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

They may use fake names, phone numbers, email addresses, or websites to trick you into giving them your money or personal information. They may also use threats, promises or emotional appeals to pressure you into acting quickly.

Advertisement

According to the Federal Trade Commission (FTC), imposter scams are the most common type of fraud reported by consumers in the U.S.

How did Andy Cohen get scammed?

Cohen said that his ordeal started when he lost his bank card and reported it lost. The next day, he received an email that looked like it was from his bank’s fraud alert system. The email asked him to click on a link and sign in to his bank account to verify some suspicious transactions. This is how it all went down from there.

CLICK HERE FOR MORE US NEWS

Andy Cohen (Getty Images for Sirius XM)

Advertisement

The fake email that started it all

Cohen said he clicked on the link and entered his username and password, thinking that the email was legitimate. However, he later realized that the link was fake and that he had given the scammers access to his bank account.

The Apple ID request that gave them access

The scammers then asked him to sign in to his Apple ID, which he said was a red flag. He said he closed the browser and ignored the request, but it was too late. The scammers had already gained control of his phone and his bank account.

Apple ID on iPhone (Apple)

The text and phone call that confirmed the scam

The next day, he received a text message from what appeared to be his bank, asking him if he was trying to use his card. He replied that it was not him, and then he received a phone call from someone who claimed to be from his bank’s fraud department.

The caller asked him to confirm some recent charges on his account, which he said were accurate because the scammers could see his transactions. The caller then said they would send him some codes to verify his identity and asked him to read them back.

Advertisement

The codes that were actually wire transfers

Cohen said he received three codes, which he later learned were actually wire transfers from two of his accounts to the scammers. He said he thought he was talking to his bank and that the codes were part of the security process.

The call-forwarding trick that blocked the real bank

The scammers then did something even more sneaky. They asked him to enter some numbers, which they gave him, on his phone’s keypad, which activated the call-forwarding feature. This meant that any incoming calls to his phone would be redirected to the scammers, including the calls from his real bank.

Call forwarding on iPhone (Kurt “CyberGuy” Knutsson)

Cohen said he tried calling his bank’s fraud number but never received a callback. He said his phone was silent all night, which he found strange. The next day, a visit to his bank revealed that a significant sum of money had been wired out of his account, the exact amount of which he did not reveal. Cohen highlighted the harsh reality that once money is wired out, it’s generally not recoverable.

The discovery of the loss and the report to the police

He said he reported the incident to the NYPD Cyber Security Unit and that the case was still under investigation. He said he wanted to share his experience to warn others.

Advertisement

MORE: PROTECT YOURSELF FROM TECH SUPPORT SCAMS

How can you avoid imposter scams?

Andy Cohen shared some tips on how to avoid imposter scams based on what he learned from his experience. Here is his advice, along with some additional suggestions.

1) Check the email address

If you receive an email that claims to be from your bank, your government, or any other organization, always check the sender’s email address. It may look official, but if you click on it, you may see that it is not from the domain you expect. For example, it may say “Bank of America,” but the email address may be something like “bankofamerica@gmail.com” or “bankofamerica@fraud.com.” Do not click on any links or attachments in the email, and do not reply to it. Instead, contact the organization directly using a phone number or a website that you know is genuine.

2) Avoid the sense of urgency

Many imposter scams rely on creating a sense of urgency or panic in the victim. They may tell you that your account has been hacked, that you owe money to the IRS, that your loved one is in trouble, or that you have won a prize. They may ask you to act quickly and send money, provide personal information, or buy gift cards. Do not let them rush you or pressure you. Take a breath and think twice before you respond. If you are not sure, talk to someone you trust, such as a friend, a family member, or a financial advisor. Remember, legitimate organizations will never ask you to pay them with gift cards, wire transfers, or cryptocurrency.

3) Verify the caller’s identity

If you receive a phone call from someone who claims to be from your bank, your government, or any other organization, do not trust them blindly. They may use fake names, phone numbers, or caller ID information to fool you. They may also have some information about you, such as your name, your address, or your account number, to make you think they are real. However, this does not mean they are who they say they are. They may have obtained this information from public sources, data breaches, or previous scams. Do not give them any more information, such as your password, your PIN, your social security number, or your credit card number. Do not agree to any requests, such as sending money, buying gift cards, or entering codes. Instead, hang up and call the organization directly using a phone number that you know is genuine. You can also check the organization’s website for any alerts or warnings about scams.

Advertisement

4) Protect your devices: Have good antivirus software on all your devices

Imposter scammers may try to access your devices, such as your computer, your phone, or your tablet, to steal your information or money. They may send you fake emails, texts, or pop-ups that ask you to click on a link, download a file, or install software. Do not do it. 

They may also ask you to sign in to your online accounts, such as your email, your bank, or your Apple ID. Do not fall for these tricks. They may infect your devices with malware, spyware, or ransomware, or they may lock you out of your accounts.

The best way to protect yourself from these types of cyberthreats or having your data breached is to have antivirus protection installed on all your devices. Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

5) Use strong and unique passwords 

Create strong passwords for your accounts and devices, and avoid using the same password for multiple online accounts. Consider using a password manager to securely store and generate complex passwords. It will help you to create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills passwords in for you when you’re logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts. 

Advertisement

6) Perform regular software updates

Developers frequently release updates to patch vulnerabilities and improve overall security. Both Apple and Android issue updates regularly, so check for and install them often.

Scam alert illustration (Kurt “CyberGuy” Knutsson)

MORE: THE ‘UNSUBSCRIBE’ EMAIL SCAM IS TARGETING AMERICANS

I’ve been scammed like Andy. What to do next?

Below are some next steps if you find you or your loved one is a victim of identity theft from an imposter scam.

1) Change your passwords. If you suspect that your phone has been hacked or that someone is impersonating you, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so the hacker isn’t’ recording you setting up your new password on your hacked device. Use strong and unique passwords that are hard to guess or crack. You can also consider using a password manager to generate and store your passwords securely.

Advertisement

2) Look through bank statements and check account transactions to see where outlier activity started.

3) Use a fraud protection service. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

Some of the best parts of using an identity theft protection service include identity theft insurance to cover losses and legal fees and a white glove fraud resolution team where a US-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

4) Report any breaches to official government agencies like the Federal Communications Commission.

Advertisement

5) You may wish to get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft and if being a victim of criminal identity theft leaves you unable to secure employment or housing

6) Alert all three major credit bureaus and possibly place a fraud alert on your credit report.

7) Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal. 

8) Alert your contacts. If hackers have accessed your device through SMS spoofing, they could use them to send spam or phishing messages to your contacts. They could impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

9) Restore your device to factory settings. If you want to make sure that your device is completely free of any malware or spyware, you can restore it to factory settings. This will erase all your data and settings and reinstall the original version. You should back up your important data BEFORE doing this, and only restore it from a trusted source.

Advertisement

If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.

MORE: ALL NEW TRICKY THREAT OF THE FAKE BROWSER UPDATE SCAM

Kurt’s key takeaways

Imposter scams are a serious threat that can cost you a lot of money and stress. Andy Cohen learned this the hard way, but he decided to share his story to help others avoid the same mistake.

By following his tips and the FTC’s advice, you can protect yourself and your loved ones from imposter scammers. Remember, if something sounds too good to be true, or too bad to be true, it probably is. Be smart, be vigilant, and be safe.

How do you think the authorities and the banks should handle imposter scams and help the victims recover their losses? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Anthropic upgrades Claude’s memory to attract AI switchers

Published

on

Anthropic upgrades Claude’s memory to attract AI switchers

Anthropic is making it easier to switch to its Claude AI from other chatbots with an update that brings Claude’s memory feature to users on the free plan, along with a new prompt and dedicated tool for importing data from other chatbots. These upgrades could allow users who have been using rivals like OpenAI’s ChatGPT or Google’s Gemini to quickly copy the data their preferred AI has collected on them and bring it over to Anthropic’s chatbot. That way, they don’t have to “start over” teaching Claude the context and history their previous chatbot already knows.

The option to import and export memories from Claude has been available since October, when Anthropic also rolled out the option for users to turn on Claude’s memory. Up until now, the memory feature was only available to users on paid Claude subscriptions, but now all Claude users can turn it on by going into “settings” then “capabilities.” This menu is also where users can find the new memory importing tool, which has users copy a pre-written prompt into their previous AI then copy the output from that prompt back into Claude’s importing tool.

Anthropic is introducing the upgraded memory importing tool as Claude is seeing a rise in popularity, driven by tools like Claude Code and Claude Cowork. Last month, Anthropic launched its new Opus 4.6 and Sonnet 4.6 models, which the company says are better at coding and completing complex tasks like working through a spreadsheet or filling out forms.

Anthropic has also been experiencing a spike in attention recently after pushing back against demands from the Pentagon to loosen the guardrails on its AI models, with the company stating publicly that they drew “red lines” around mass surveillance and fully autonomous lethal weapons.

Continue Reading

Technology

Why the Microsoft 365 Copilot bug matters for data security

Published

on

Why the Microsoft 365 Copilot bug matters for data security

NEWYou can now listen to Fox News articles!

You trust your email security settings for a reason. So when an AI assistant quietly reads and summarizes messages marked confidential, that trust takes a hit.

Microsoft says a bug in Microsoft 365 Copilot allowed its AI chat feature to process sensitive emails since late January.

The issue bypassed Data Loss Prevention policies that organizations rely on to protect private information. Put simply, emails that were supposed to stay locked down were being summarized anyway.

Sign up for my FREE CyberGuy Report 

Advertisement

Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter    

Microsoft 365 Copilot’s work chat interface sits at the center of the issue after a bug allowed it to summarize confidential emails. (Microsoft)

Microsoft 365 Copilot bug summarized confidential emails

Microsoft says a coding error impacted Microsoft 365 Copilot Chat, specifically the “work tab” feature. The AI assistant helps business users summarize content, draft responses and analyze information across Word, Excel, PowerPoint, Outlook and OneNote.

Beginning Jan. 21, an internal bug labeled CW1226324 caused Copilot to read and summarize emails stored in Sent Items and Drafts folders.

The real concern runs deeper. Several of those messages carried confidentiality or sensitivity labels.

Advertisement

Companies apply those labels along with DLP policies to block automated systems from accessing restricted content. Despite those safeguards, Copilot still generated summaries. 

We reached out to Microsoft, and a spokesperson provided CyberGuy with the following statement:

“We identified and addressed an issue where Microsoft 365 Copilot Chat could return content from emails labeled confidential authored by a user and stored within their Draft and Sent Items in Outlook desktop. This did not provide anyone access to information they weren’t already authorized to see. While our access controls and data protection policies remained intact, this behavior did not meet our intended Copilot experience, which is designed to exclude protected content from Copilot access. A configuration update has been deployed worldwide for enterprise customers.” 

Why the Microsoft 365 Copilot bug matters for data security

AI tools feel helpful. They save time and reduce busy work. But they also rely on deep access to your data. When safeguards fail, even temporarily, sensitive content can move in ways you did not expect.

YOUR PHONE SHARES DATA AT NIGHT: HERE’S HOW TO STOP IT

Advertisement

For businesses, that could mean:

Legal discussions summarized outside intended controls

Financial projections processed despite restrictions

HR communications are exposed to automated analysis

Even if no data leaves the organization, the bypass itself raises concerns about how AI integrates with enterprise security systems.

Advertisement

Business users rely on Copilot to streamline work, but a recent bug raised concerns about how it handles sensitive email content. (Microsoft)

How Microsoft is fixing the Microsoft 365 Copilot bug

Microsoft says it began rolling out a fix in early February. The company continues to monitor deployment and is contacting some affected users to verify the fix works.

However, Microsoft has not provided a final timeline for full remediation. It has also not disclosed how many organizations were affected.

The issue is tagged as an advisory, which usually signals limited scope or impact. Still, many security professionals will want deeper clarity before feeling comfortable.

What this Microsoft 365 Copilot issue reveals about AI security

This incident highlights something many companies are wrestling with right now. AI assistants sit inside productivity platforms. They need access to email, documents and collaboration tools to work well.

Advertisement

TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

At the same time, those platforms contain your most sensitive information. When AI features expand quickly, security policies must evolve just as fast. Otherwise, even a small code mistake can create unexpected exposure.

The Copilot chat feature was designed to boost productivity, yet a code error let it process emails labeled confidential. (Microsoft)

Ways to stay safe after the Microsoft 365 Copilot bug

If your organization uses Microsoft 365 Copilot, here are practical steps to reduce risk:

1) Review Copilot access settings

Work with your IT team to confirm which folders and data sources Copilot can access.

Advertisement

2) Revalidate DLP policies

Test sensitivity labels and DLP (Data Loss Prevention)  rules to ensure they block AI processing as intended.

3) Monitor advisory updates

Stay current on Microsoft service alerts and verify that the fix is fully deployed in your tenant.

4) Limit AI scope during investigations

If you have concerns, consider temporarily restricting Copilot features until verification is complete.

5) Train employees on AI boundaries

Remind staff that AI assistants can process drafts and send messages. Encourage careful handling of sensitive content.

6) Audit Copilot activity logs

Review audit logs to see whether Copilot accessed or summarized labeled emails. This helps determine actual exposure rather than assumed risk.

Advertisement

7) Review sensitivity label configuration

Confirm that confidential labels are configured to block AI processing where required. Misconfigured labels can create gaps even after a bug is fixed.

8) Reassess retention and draft policies

Because the issue involved Sent Items and Drafts, evaluate whether sensitive drafts should be stored long-term or deleted after sending.

9) Limit Copilot to specific user groups

Instead of enabling Copilot organization-wide, consider a phased deployment to departments with lower sensitivity exposure.

10) Conduct a post-incident security review

Use this moment to reassess how AI tools integrate with compliance controls. Treat it as a learning opportunity rather than a one-time glitch.

Pro Tip: This Copilot bug centers on enterprise controls. Even so, AI tools operate on your devices and accounts, so keeping software up to date and using strong antivirus software adds an important layer of defense. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com

Advertisement

Considering a more private email provider

Enterprise AI bugs raise a bigger question: how much access should email platforms have to your data in the first place? If you want an added layer of privacy beyond mainstream providers, privacy-focused email services are worth exploring.

Some offer end-to-end encryption, support for PGP encryption and a strict no-ads business model that avoids scanning messages for marketing purposes.

AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

Many also allow you to create disposable email aliases, which can reduce spam and limit exposure if one address is compromised.

While no provider is immune to software bugs, choosing an email service built around privacy rather than data monetization can limit how much of your information is accessible to automated systems in the first place.

Advertisement

For individuals, journalists and small businesses especially, that added control can make a meaningful difference.

For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com

Kurt’s key takeaways

AI assistants are becoming part of daily work life. They promise speed, efficiency and smarter workflows. But convenience should never outrun security.

This Copilot bug may have a limited impact. Still, it serves as a reminder that AI tools are only as strong as the guardrails behind them.

When those guardrails slip, even briefly, sensitive information can move in unexpected ways. As AI becomes more embedded in business software, trust will depend on transparency, fast fixes and clear communication.

Advertisement

Here is the real question: If your AI assistant can see everything you write, are you fully confident it respects every boundary you set? Let us know by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved.  

Advertisement

Related Article

149 million passwords exposed in massive credential leak
Continue Reading

Technology

Samsung’s Digital Home Key lets you use your phone as your key

Published

on

Samsung’s Digital Home Key lets you use your phone as your key

Just days after showing off the Galaxy S26, Samsung is finally rolling out the ability for users to unlock their home with a tap of their phone or by simply approaching their door. The new feature, called Digital Home Key, will live inside Samsung Wallet and is powered by the Aliro smart home standard.

Samsung first teased its Digital Home Key feature in 2024 and said the feature would be available in 2025. That didn’t pan out, as the CSA’s Aliro standard — which will let users unlock smart locks with any phone — only arrived in February of this year. The new standard uses near-field communication (NFC) for its tap-to-unlock technology. It also supports ultra-wideband (UWB), giving users the ability to unlock their door as they approach and without pulling out their phone.

To add a Digital Home Key to your wallet, you’ll need to set up a compatible smart lock through SmartThings using Matter. Only some Galaxy smartphones support both NFC and UWB, including the Galaxy Z Fold 4 and up, as well as the Galaxy S22 Ultra and up. You can view the full list of compatible devices on Samsung’s website.

Continue Reading

Trending