Connect with us

Technology

Why clicking the wrong Copilot link could put your data at risk

Published

on

Why clicking the wrong Copilot link could put your data at risk

NEWYou can now listen to Fox News articles!

AI assistants are supposed to make life easier. Tools like Microsoft Copilot can help you write emails, summarize documents, and answer questions using information from your own account. But security researchers are now warning that a single bad link could quietly turn that convenience into a privacy risk. 

A newly discovered attack method shows how attackers could hijack a Copilot session and siphon data without you seeing anything suspicious on screen.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.     

Because Copilot stays tied to your logged-in Microsoft account, attackers can quietly use your active session to access data in the background. (Photo by Donato Fasano/Getty Images)

Advertisement

What researchers discovered about Copilot links

ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

Security researchers at Varonis uncovered a technique they call “Reprompt.” In simple terms, it shows how attackers could sneak instructions into a normal-looking Copilot link and make the AI do things on their behalf.

Here’s the part that matters to you. Microsoft Copilot is connected to your Microsoft account. Depending on how you use it, Copilot can see your past conversations, things you’ve asked it and certain personal data tied to your account. Normally, Copilot has guardrails to prevent sensitive information from leaking. Reprompt showed a way around some of those protections.

The attack starts with just one click. If you open a specially crafted Copilot link sent through email or a message, Copilot can automatically process hidden instructions embedded inside the link. You don’t need to install anything, and there are no pop-ups or warnings. After that single click, Copilot can keep responding to instructions in the background using your already logged-in session. Even closing the Copilot tab does not immediately stop the attack, because the session stays active for a while.

How Reprompt works

Varonis found that Copilot accepts questions through a parameter inside its web address. Attackers can hide instructions inside that address and make Copilot execute them as soon as the page loads.

Advertisement

That alone would not be enough, because Copilot tries to block data leaks. The researchers combined several tricks to get around this. First, they injected instructions directly into Copilot through the link itself. This allowed Copilot to read information it normally shouldn’t share.

Second, they used a “try twice” trick. Copilot applies stricter checks the first time it answers a request. By telling Copilot to repeat the action and double-check itself, the researchers found that those protections could fail on the second attempt.

Third, they showed that Copilot could keep receiving follow-up instructions from a remote server controlled by the attacker. Each response from Copilot helped generate the next request, allowing data to be quietly sent out piece by piece. The result is an invisible back-and-forth where Copilot keeps working for the attacker using your session. From your perspective, nothing looks wrong.

MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

Varonis responsibly reported the issue to Microsoft, and the company fixed it in the January 2026 Patch Tuesday updates. There is no evidence that Reprompt was used in real-world attacks before the fix. Still, this research is important because it shows a bigger problem. AI assistants have access, memory and the ability to act on your behalf. That combination makes them powerful, but also risky if protections fail. As researchers put it, the danger increases when autonomy and access come together.

Advertisement

It’s also worth noting that this issue only affected Copilot Personal. Microsoft 365 Copilot, which businesses use, has extra security layers like auditing, data loss prevention and admin controls.

“We appreciate Varonis Threat Labs for responsibly reporting this issue,” a Microsoft spokesperson told CyberGuy. “We have rolled out protections that address the scenario described and are implementing additional measures to strengthen safeguards against similar techniques as part of our defense-in-depth approach.”

8 steps you can take to stay safe from AI attacks

Even with the fix in place, these habits will help protect your data as AI tools become more common.

1) Install Windows and browser updates immediately

Security fixes only protect you if they’re installed. Attacks like Reprompt rely on flaws that already have patches available. Turn on automatic updates for Windows, Edge, and other browsers so you don’t delay critical fixes. Waiting weeks or months leaves a window where attackers can still exploit known weaknesses.

2) Treat Copilot and AI links like login links

If you wouldn’t click a random password reset link, don’t click unexpected Copilot links either. Even links that look official can be weaponized. If someone sends you a Copilot link, pause and ask yourself whether you were expecting it. When in doubt, open Copilot manually instead.

Advertisement

Even after Microsoft fixed the flaw, the research highlights why limiting data exposure and monitoring account activity still matters as AI tools evolve. (Photographer: Prakash Singh/Bloomberg via Getty Images)

3) Use a password manager to protect your accounts

A password manager creates and stores strong, unique passwords for every service you use. If attackers manage to access session data or steal credentials indirectly, unique passwords prevent one breach from unlocking your entire digital life. Many password managers also warn you if a site looks suspicious or fake.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

4) Enable two-factor authentication on your Microsoft account

Two-factor authentication (2FA) adds a second layer of protection, even if attackers gain partial access to your session. It forces an extra verification step, usually through an app or device, making it much harder for someone else to act as you inside Copilot or other Microsoft services.

Advertisement

5) Reduce how much personal data exists online

Data broker sites collect and resell personal details like your email address, phone number, home address and even work history. If an AI tool or account session is abused, that publicly available data can make the damage worse. Using a data-removal service helps delete this information from broker databases, shrinking your digital footprint and limiting what attackers can piece together.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Run strong antivirus software on your device

Modern antivirus tools do more than scan files. They help detect phishing links, malicious scripts and suspicious behavior tied to browser activity. Since Reprompt-style attacks start with a single click, having real-time protection can stop you before damage happens, especially when attacks look legitimate.

Advertisement

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

7) Regularly review your account activity and settings

Check your Microsoft account activity for unfamiliar logins, locations, or actions. Review what services Copilot can access, and revoke anything you no longer need. These checks don’t take long, but they can reveal issues early, before attackers have time to do serious damage. Here’s how:

Go to account.microsoft.com and sign in to your Microsoft account.

Select Security, then choose View my sign-in activity and verify your identity if prompted.

Advertisement

Review each login for unfamiliar locations, devices, or failed sign-in attempts.

If you see anything suspicious, select This wasn’t me or Secure your account, then change your password immediately and enable two-step verification.

Visit account.microsoft.com/devices and remove any devices you no longer recognize or use.

In Microsoft Edge, open Settings > Appearance > Copilot and Sidebar > Copilot and turn off Allow Microsoft to access page content if you want to limit Copilot’s access.

Review apps connected to your Microsoft account and revoke permissions you no longer need.

Advertisement

A single Copilot link can carry hidden instructions that run the moment you click, without any warning or pop-ups.  (iStock)

8) Be specific about what you ask AI tools to do

Avoid giving AI assistants broad authority like “handle whatever is needed.” Wide permissions make it easier for hidden instructions to influence outcomes. Keep requests narrow and task-focused. The less freedom an AI has, the harder it is for malicious prompts to steer it silently.

Kurt’s key takeaway

Reprompt doesn’t mean Copilot is unsafe to use, but it does show how much trust these tools require. When an AI assistant can think, remember and act for you, even a single bad click can matter. Keeping your system updated and being selective about what you click remains just as important in the age of AI as it was before.

Do you feel comfortable letting AI assistants access your personal data, or does this make you more cautious? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved. 

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Anthropic essentially bans OpenClaw from Claude by making subscribers pay extra

Published

on

Anthropic essentially bans OpenClaw from Claude by making subscribers pay extra

Starting tomorrow at 12pm PT, Claude subscriptions will no longer cover usage on third-party tools like OpenClaw.

You can still use these tools with your Claude login via extra usage bundles (now available at a discount), or with a Claude API key.

We’ve been working hard to meet the increase in demand for Claude, and our subscriptions weren’t built for the usage patterns of these third-party tools. Capacity is a resource we manage thoughtfully and we are prioritizing our customers using our products and API.

Subscribers get a one-time credit equal to your monthly plan cost. If you need more, you can now buy discounted usage bundles. To request a full refund, look for a link in your email tomorrow.

We want to be intentional in managing our growth to continue to serve our customers sustainably long-term. This change is a step toward that.

Advertisement
Continue Reading

Technology

NYC schools track bathroom time with digital hall passes

Published

on

NYC schools track bathroom time with digital hall passes

NEWYou can now listen to Fox News articles!

Leaving class for a quick bathroom break now comes with a timer for many students in New York City.

A digital hall pass system called SmartPass is rolling out across public schools. It replaces the old paper pass with a digital one. Students sign out on a classroom iPad. Then the system tracks how long they are gone.

On paper, it sounds efficient. In practice, it is stirring strong reactions.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.   

Advertisement

95% OF FACULTY SAY AI MAKING STUDENTS DANGEROUSLY DEPENDENT ON TECHNOLOGY FOR LEARNING: SURVEY
 

New York City students now use SmartPass, a digital hall pass system that tracks when they leave class, where they go and how long they are gone. (Alejandra Villa Loarca/Newsday RM via Getty Images)

How the SmartPass digital hall pass works

SmartPass logs when a student leaves class and tracks how long they are out and where they go. Teachers can view that information in real time, which gives them a live snapshot of student movement during the school day. SmartPass says the system is designed to improve safety, reduce disruptions and give staff better visibility into student movement.

The system keeps a running total of time spent outside the classroom. It can also limit how many students are allowed in the hallway at once. In some cases, it can flag or block overlapping passes between students. Schools can also restrict when passes are allowed, depending on the schedule or specific rules set by staff.

Supporters say this helps reduce disruptions and keeps students accountable. They also argue it improves safety during emergencies because staff can quickly see who is out of class. However, that is only one side of the story.

Advertisement

Students say SmartPass feels like surveillance

Many students are not buying the “efficiency” argument. Some say the system makes them feel rushed during basic needs. Others worry about being constantly monitored.

One student described it as uncomfortable, like someone is always watching. Another said it turns something simple into a stressful countdown.

There are also reports of strict time limits. In some cases, students say teachers set very short timers for bathroom use. That can create awkward situations fast.

And then there are loopholes. Students have figured out ways to sign out under someone else’s name. That can block another student from leaving class at all.

NEW AI COALITION TARGETS WASHINGTON, BIG TECH AS GROUP WARNS CHILD SAFETY RISKS OUTPACING SAFEGUARDS
 

Advertisement

A digital hall pass system in New York City schools is raising questions about privacy, student trust and whether tracking tools belong in everyday school life. (Melina Mara/The Washington Post via Getty Images)

SmartPass raises growing privacy concerns

Privacy advocates are raising bigger concerns. Critics say tools like SmartPass go too far.

“Hyper invasive, error-prone AI surveillance technologies have no place in school bathrooms,” said Charlotte Pope, Equal Justice Works Fellow at the NYCLU. “Third-party surveillance products, like the electronic hall passes, put students’ sensitive, personal data at the whims of for-profit corporations, unnecessarily put even more punitive discipline into students’ lives, and add more fuel to the school-to-prison pipeline. For generations, students went to the bathroom without big brother watching just fine – the difference is that now, companies are making money off it.”

The fear is not only about today. It is about what happens to that data later. School officials say the system meets strict privacy rules. They also say schools are not required to use it. Still, critics argue that once data is collected, the risk never fully disappears.

How much NYC is spending on SmartPass

There is also a financial angle. New York City reportedly spent hundreds of thousands of dollars on SmartPass contracts in recent years. That breaks down to a few thousand dollars per school.

Advertisement

At the same time, the city faces major budget gaps. That raises a fair question. Should schools invest in tracking tools or focus on staffing and facilities? Students are asking that question too.

Why this conversation is not going away

Technology in schools is not new. But the level of tracking is changing. What used to be a simple hall pass is now a data point. Multiply that across a school day, and you start to see a pattern forming.

Some people see that as progress. Others see it as overreach. Either way, tools like SmartPass are likely just the beginning.

TIM TEBOW URGES SUPREME COURT TO MAKE BIG TECH ‘PROTECT KIDS OVER PROFIT’ IN CSAM CASE
 

SmartPass is rolling out in New York City public schools, replacing paper hall passes with a digital system that logs student movement in real time. (Deb Cohn-Orbach/UCG/Universal Images Group via Getty Images)

Advertisement

What this means to you

Even if you are not a student in New York, this trend still matters. Digital monitoring tools are becoming part of everyday life. You can now find them in schools, workplaces and public spaces.

As a result, data collection is starting to feel normal in places where it never used to exist. Even simple systems can build detailed profiles over time. That information can reveal patterns about behavior without people realizing it.

At the same time, convenience often comes with tradeoffs. Tools that make things easier can also reduce privacy. Once these systems are in place, they rarely stay limited. They tend to expand and track more over time.

If you have kids, it is worth asking how their school collects and stores data. If you are a student, you have a right to understand what is being tracked and why it matters.

Take my quiz: How safe is your online security?

Advertisement

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

There is a real balance to strike here. Schools want safety and structure. Students want trust and privacy. Those goals do not always line up. SmartPass sits right in the middle of that tension. It promises control and visibility. It also raises questions about how much monitoring is too much. The bigger issue may not be this one system. It is the direction things are heading.

If tracking tools become standard in schools, where should the line be drawn between safety and personal space? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily. Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Advertisement

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

NASA did eventually solve Artemis II’s Outlook glitch

Published

on

NASA did eventually solve Artemis II’s Outlook glitch

On Thursday, during Artemis II’s journey to the Moon, commander Reid Wiseman ran into a tech issue some of us back on Earth can relate to: Microsoft Outlook wasn’t working. In a conversation captured in NASA’s Artemis livestream and shared on Bluesky, Wiseman reported to Mission Control: “I also see that I have two Microsoft Outlooks and neither one of those are working.”

To take care of the issue, Mission Control had to remotely access Wiseman’s personal computing device (PCD), a Microsoft Surface Pro. During a press conference on Thursday, Artemis flight director Judd Frieling said NASA had fixed the issue, stating, “This is not uncommon. We have this on-station all the time. You know, sometimes Outlook has issues getting configured, especially when you don’t have a network that’s directly connected. And so essentially we just had to reload his files on Outlook to get it working.”

NASA uses a combination of its Near Space Network and Deep Space Network to stay in touch with Artemis II, relying on a mix of antennas around the world and satellites in orbit. Mission Control at the Johnson Space Center in Houston, Texas has to shift communications between these networks as Artemis II gets further away from Earth.

Aside from the Microsoft Surface Pro, the Artemis II crew’s gear list also includes Nikon D5 DSLR cameras, a ZCube video encoder, and handheld GoPro cameras for filming content for a Disney/National Geographic documentary. The crew was also allowed to bring their phones with them — you can even see their phones being stowed away in their spacesuit pockets in NASA’s livestream.

Continue Reading
Advertisement

Trending