Connect with us

Technology

Why clicking the wrong Copilot link could put your data at risk

Published

on

Why clicking the wrong Copilot link could put your data at risk

NEWYou can now listen to Fox News articles!

AI assistants are supposed to make life easier. Tools like Microsoft Copilot can help you write emails, summarize documents, and answer questions using information from your own account. But security researchers are now warning that a single bad link could quietly turn that convenience into a privacy risk. 

A newly discovered attack method shows how attackers could hijack a Copilot session and siphon data without you seeing anything suspicious on screen.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.     

Because Copilot stays tied to your logged-in Microsoft account, attackers can quietly use your active session to access data in the background. (Photo by Donato Fasano/Getty Images)

Advertisement

What researchers discovered about Copilot links

ILLINOIS DHS DATA BREACH EXPOSES 700K RESIDENTS’ RECORDS

Security researchers at Varonis uncovered a technique they call “Reprompt.” In simple terms, it shows how attackers could sneak instructions into a normal-looking Copilot link and make the AI do things on their behalf.

Here’s the part that matters to you. Microsoft Copilot is connected to your Microsoft account. Depending on how you use it, Copilot can see your past conversations, things you’ve asked it and certain personal data tied to your account. Normally, Copilot has guardrails to prevent sensitive information from leaking. Reprompt showed a way around some of those protections.

The attack starts with just one click. If you open a specially crafted Copilot link sent through email or a message, Copilot can automatically process hidden instructions embedded inside the link. You don’t need to install anything, and there are no pop-ups or warnings. After that single click, Copilot can keep responding to instructions in the background using your already logged-in session. Even closing the Copilot tab does not immediately stop the attack, because the session stays active for a while.

How Reprompt works

Varonis found that Copilot accepts questions through a parameter inside its web address. Attackers can hide instructions inside that address and make Copilot execute them as soon as the page loads.

Advertisement

That alone would not be enough, because Copilot tries to block data leaks. The researchers combined several tricks to get around this. First, they injected instructions directly into Copilot through the link itself. This allowed Copilot to read information it normally shouldn’t share.

Second, they used a “try twice” trick. Copilot applies stricter checks the first time it answers a request. By telling Copilot to repeat the action and double-check itself, the researchers found that those protections could fail on the second attempt.

Third, they showed that Copilot could keep receiving follow-up instructions from a remote server controlled by the attacker. Each response from Copilot helped generate the next request, allowing data to be quietly sent out piece by piece. The result is an invisible back-and-forth where Copilot keeps working for the attacker using your session. From your perspective, nothing looks wrong.

MICROSOFT SOUNDS ALARM AS HACKERS TURN TEAMS PLATFORM INTO ‘REAL-WORLD DANGERS’ FOR USERS

Varonis responsibly reported the issue to Microsoft, and the company fixed it in the January 2026 Patch Tuesday updates. There is no evidence that Reprompt was used in real-world attacks before the fix. Still, this research is important because it shows a bigger problem. AI assistants have access, memory and the ability to act on your behalf. That combination makes them powerful, but also risky if protections fail. As researchers put it, the danger increases when autonomy and access come together.

Advertisement

It’s also worth noting that this issue only affected Copilot Personal. Microsoft 365 Copilot, which businesses use, has extra security layers like auditing, data loss prevention and admin controls.

“We appreciate Varonis Threat Labs for responsibly reporting this issue,” a Microsoft spokesperson told CyberGuy. “We have rolled out protections that address the scenario described and are implementing additional measures to strengthen safeguards against similar techniques as part of our defense-in-depth approach.”

8 steps you can take to stay safe from AI attacks

Even with the fix in place, these habits will help protect your data as AI tools become more common.

1) Install Windows and browser updates immediately

Security fixes only protect you if they’re installed. Attacks like Reprompt rely on flaws that already have patches available. Turn on automatic updates for Windows, Edge, and other browsers so you don’t delay critical fixes. Waiting weeks or months leaves a window where attackers can still exploit known weaknesses.

2) Treat Copilot and AI links like login links

If you wouldn’t click a random password reset link, don’t click unexpected Copilot links either. Even links that look official can be weaponized. If someone sends you a Copilot link, pause and ask yourself whether you were expecting it. When in doubt, open Copilot manually instead.

Advertisement

Even after Microsoft fixed the flaw, the research highlights why limiting data exposure and monitoring account activity still matters as AI tools evolve. (Photographer: Prakash Singh/Bloomberg via Getty Images)

3) Use a password manager to protect your accounts

A password manager creates and stores strong, unique passwords for every service you use. If attackers manage to access session data or steal credentials indirectly, unique passwords prevent one breach from unlocking your entire digital life. Many password managers also warn you if a site looks suspicious or fake.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

4) Enable two-factor authentication on your Microsoft account

Two-factor authentication (2FA) adds a second layer of protection, even if attackers gain partial access to your session. It forces an extra verification step, usually through an app or device, making it much harder for someone else to act as you inside Copilot or other Microsoft services.

Advertisement

5) Reduce how much personal data exists online

Data broker sites collect and resell personal details like your email address, phone number, home address and even work history. If an AI tool or account session is abused, that publicly available data can make the damage worse. Using a data-removal service helps delete this information from broker databases, shrinking your digital footprint and limiting what attackers can piece together.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Run strong antivirus software on your device

Modern antivirus tools do more than scan files. They help detect phishing links, malicious scripts and suspicious behavior tied to browser activity. Since Reprompt-style attacks start with a single click, having real-time protection can stop you before damage happens, especially when attacks look legitimate.

Advertisement

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

7) Regularly review your account activity and settings

Check your Microsoft account activity for unfamiliar logins, locations, or actions. Review what services Copilot can access, and revoke anything you no longer need. These checks don’t take long, but they can reveal issues early, before attackers have time to do serious damage. Here’s how:

Go to account.microsoft.com and sign in to your Microsoft account.

Select Security, then choose View my sign-in activity and verify your identity if prompted.

Advertisement

Review each login for unfamiliar locations, devices, or failed sign-in attempts.

If you see anything suspicious, select This wasn’t me or Secure your account, then change your password immediately and enable two-step verification.

Visit account.microsoft.com/devices and remove any devices you no longer recognize or use.

In Microsoft Edge, open Settings > Appearance > Copilot and Sidebar > Copilot and turn off Allow Microsoft to access page content if you want to limit Copilot’s access.

Review apps connected to your Microsoft account and revoke permissions you no longer need.

Advertisement

A single Copilot link can carry hidden instructions that run the moment you click, without any warning or pop-ups.  (iStock)

8) Be specific about what you ask AI tools to do

Avoid giving AI assistants broad authority like “handle whatever is needed.” Wide permissions make it easier for hidden instructions to influence outcomes. Keep requests narrow and task-focused. The less freedom an AI has, the harder it is for malicious prompts to steer it silently.

Kurt’s key takeaway

Reprompt doesn’t mean Copilot is unsafe to use, but it does show how much trust these tools require. When an AI assistant can think, remember and act for you, even a single bad click can matter. Keeping your system updated and being selective about what you click remains just as important in the age of AI as it was before.

Do you feel comfortable letting AI assistants access your personal data, or does this make you more cautious? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved. 

Advertisement
Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Snap, YouTube, and TikTok settle suit over harm to students

Published

on

Snap, YouTube, and TikTok settle suit over harm to students

Snap, YouTube, and TikTok have settled the first lawsuit of its kind, alleging that social media addiction has cost public schools massive amounts of money, according to Bloomberg. The suit, filed by the Breathitt County School District in Kentucky, claims that social media has disrupted learning and created a mental health crisis, straining budgets. The terms of the settlement have not been revealed yet, and Meta is still facing a trial in the same suit, which is viewed as a bellwether for over 1,000 similar lawsuits across the country

This follows an earlier case, settled by Snap and TikTok, in which a 19-year-old plaintiff claimed significant personal injury due to addictive social media apps. Google and Meta did not agree to a settlement in that suit, and it eventually went to trial, where a jury awarded the plaintiff $6 million. Meta also recently lost a suit brought by New Mexico’s Attorney General, to the tune of $375 million.

Beyond monetary awards, many, including New Mexico, are pushing for significant changes to social media apps to limit their harm to minors. And this is just the start of what’s shaping up to be a busy year for social media lawsuits. According to Bloomberg, lawyers representing school districts said their “focus remains on pursuing justice for the remaining 1,200 school districts who have filed cases.”

Continue Reading

Technology

Missed voicemails with no calls? It could be a scam

Published

on

Missed voicemails with no calls? It could be a scam

NEWYou can now listen to Fox News articles!

It starts quietly. Your phone buzzes. You see a voicemail notification. But your phone never rang. Then it happens again. And again. Before long, your voicemail inbox looks like it’s under attack.

That’s exactly what Mike from Westport, CT, is dealing with right now. He wrote to us saying,

“I am so upset. Every 20 to 30 minutes, I am getting voicemails, but what’s weird is my phone never rings. After blocking the number, it just rolls over to a new source number. When I go to play the message, there is no audio. Is this a scammer just trying to get me to call them back? Not sure what the endgame is here. What can I do to stop this from happening? I really appreciate your help.”

What he is describing is something we’re seeing more often. It may feel random, but there’s a clear pattern behind this voicemail scam and here’s what you need to know to stay safe.

Advertisement

RECEIVING UNEXPECTED INTERNATIONAL CALLS? WHAT YOU NEED TO KNOW

Silent voicemail scams can flood a phone with blank messages even when the device never rings. (Getty Images)

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

What the silent voicemail scam actually is

This tactic is often called a silent voicemail scam or ringless voicemail spam. Here’s how it works in plain terms:

  • Scammers drop voicemail messages directly into your inbox
  • Your phone never rings, so it feels strange and urgent
  • The message is blank, garbled or extremely short
  • The number changes constantly to avoid blocks

At first glance, it looks like a glitch. That confusion is the point.

What’s really happening behind the scenes

This pattern almost always points to automated robocall systems using caller ID spoofing, not real people manually calling you.

Here’s what’s likely happening:

Advertisement
  • Automated dialing systems are repeatedly hitting your number
  • They use spoofed or constantly changing caller IDs, which is why blocking one number doesn’t stop it
  • Some calls connect briefly, then drop, leaving behind a silent or very short voicemail
  • In some cases, the system is “pinging” your number to confirm it’s active

Once a number is confirmed as active, it can be shared across spam networks and used in future campaigns.

Why scammers leave empty voicemails

It seems pointless, but there’s a strategy behind it.

1) They want you to call back

Curiosity does the work for them. Many people return the call just to figure out what happened. When you call back, you may:

  • Reach a premium-rate number that charges per minute
  • Get routed into a scam call center
  • Confirm your number is active and monitored

2) They test if your number is real

Even if you never call back, your voicemail confirms your number is in use. That makes it more valuable for future scams.

3) They try to bypass spam filters

Because your phone never rings, traditional call filters may not catch it. That lets more of these messages slip through.

Why do the numbers keep changing

You block one number, and another appears minutes later. That’s usually a sign of caller ID spoofing and number cycling. Scammers use software to falsify the number that shows up on your phone and rotate through large batches of numbers to stay ahead of blocks and spam filters. Some of those numbers may be completely fabricated, while others may belong to real people whose caller ID information is being misused. Many of those numbers are:

  • Fake
  • Reassigned or temporarily used
  • Tied to real people who have no idea their number is being spoofed

Blocking a single number can still be worth doing, but it usually will not stop the campaign by itself because the caller can keep switching numbers. 

GOOGLE SEARCH LED TO A COSTLY SCAM CALL

Advertisement

Scammers may use ringless voicemail spam and caller ID spoofing to test whether a phone number is active. (Getty Images)

Is your phone being hacked?

This is one of the first things many people worry about. In most cases, no. These silent voicemails are more likely to be part of a scam call or robocall campaign than a sign that your phone has been hacked. Scammers can use tactics such as caller ID spoofing and ringless voicemail to reach you without making the call feel normal.

The bigger risk isn’t your phone itself. It’s how the scam tries to get you to respond. Calling back, pressing prompts or engaging with the message can confirm that your number is active and may expose you to more scam attempts. The FTC specifically advises people to hang up or delete the voicemail and not call back unknown numbers.

How to stop silent voicemail scams

You don’t have to just put up with it. There are ways to reduce or stop these messages. 

1) Do not call back unknown numbers

Even if it feels harmless, skip it. If it’s important, the caller will leave a real message.

Advertisement

2) Enable spam call filtering

On iPhone and Android, turn on built-in call filtering and silence unknown callers. This helps reduce future attempts.

How to enable spam call filtering 

On iPhone (latest iOS)

Apple now gives you two strong options: Silence Unknown Callers and Call Screening.

Option 1: Silence unknown callers

Advertisement
  • Open Settings
  • Tap Apps
  • Tap Phone
  • Scroll down and turn on Unknown Callers

This sends calls from numbers not in your contacts straight to voicemail without ringing.

Option 2: Turn on Call Screening (recommended)

  • Open Settings
  • Tap Apps
  • Tap Phone
  • Scroll down and under Screen Unknown Callers, select Ask Reason for Calling

This feature prompts unknown callers to say who they are before your phone rings, which filters out many spam calls automatically.

Optional: Enable spam identification

  • Go to Settings
  • Tap Apps
  • Tap Phone
  • Tap Call Blocking & Identification
  • Tap Business Call Identification
  • Make sure it is set to ON

This allows your iPhone to show verified business names and logos for legitimate callers when available.

On Samsung 

Samsung combines spam protection with AI call screening.

Settings and feature names may vary depending on your Samsung model, carrier and software version.

Advertisement

Option 1: Turn on spam protection

  • Open the Phone app
  • Tap the three-dot menu (top right)
  • Tap Settings
  • Tap Caller ID and spam protection
  • Toggle it ON

This flags suspected spam calls before you answer.

Option 2: Block unknown callers

  • Open the Phone app
  • Tap the three-dot menu (top right) 
  • Tap Settings
  • Tap Block numbers
  • Turn on Block calls from unknown numbers 

This stops hidden or unidentified numbers from ringing your phone.

Option 3: Enable Call Screen (best option)

  • Open the Phone app
  • Tap the three-dot menu (top right)
  • Tap Settings
  • Tap Bixby Text Call or just Text Call
  • Toggle it ON

This lets your phone answer unknown calls with AI and show you what the caller says in real time.

One important reality check: Even with these turned on, some calls may still go to voicemail. That’s because voicemail is controlled by your carrier, not your phone.

HOW TO STOP SPAM MAIL, POLITICAL TEXTS AND EMAIL SPAM FOR GOOD

Advertisement

Unknown voicemail messages that contain no audio may be part of an automated robocall campaign. (Kurt “CyberGuy” Knutsson)

3) Use a call-blocking app

Apps can spot patterns faster than manual blocking and stop repeat offenders. Many of these apps can also identify known scam numbers and automatically block high-risk calls, helping reduce how often your phone gets hit.

4) Contact your carrier

Many carriers offer network-level spam blocking. Ask about tools that block ringless voicemail or robocalls.

5)  Use a data removal service

If your number keeps getting hit, it may already be circulating on marketing lists or data broker sites. These data removal services scan for your personal information and help remove it from databases that scammers often tap into. Cutting down where your number appears can reduce how often you get targeted over time. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

6) Report the activity

You can report unwanted calls and voicemails to the Federal Trade Commission at reportfraud.ftc.gov or by calling 1-877-FTC-HELP (1-877-382-4357). Reports help track and shut down large scam campaigns.

Advertisement

7) Protect your number going forward

Avoid posting your phone number publicly. The less exposure it has, the harder it is for scammers to target you.

8) Register your phone number on the National Do Not Call Registry at donotcall.gov/

This can help reduce telemarketing calls from legitimate businesses, but it unfortunately won’t stop scammers, illegal robocalls, or exempt organizations (like charities and political groups) from calling you. Scammers often ignore the registry and use tactics like number spoofing to bypass it. Want to know more about why your phone still won’t stop ringing and what you can do about it?  Check out our article on the ‘Do Not Call’ list loophole.

Kurt’s key takeaways

Silent voicemails are designed to mess with your instincts. They rely on curiosity and confusion, not sophisticated hacking. The best move is simple. Don’t engage. Let them hit a dead end. Over time, that tells the system your number isn’t worth the effort.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

So here’s the real question: If scammers are counting on curiosity to hook you, how often do you think that instinct is working on other people right now? Let us know by writing to us at Cyberguy.com

Advertisement

 Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

Xbox is now XBOX

Published

on

Xbox is now XBOX

Xbox just allcapsmaxxed: Meet XBOX. This isn’t a joke; Microsoft appears to be actually rebranding Xbox to XBOX. Asha Sharma, Xbox CEO, ran a poll on X earlier this week, asking fans whether Microsoft should use Xbox or XBOX. The results were in favor of XBOX, and the company has now renamed its X account.

Curiously, the Threads and Bluesky accounts for Xbox haven’t been renamed yet, but if Microsoft is going ahead with a rebranding then I expect those will change soon. I asked Microsoft to comment on this potential Xbox rebranding and the company simply referred me to Sharma’s post.

The use of all caps for Xbox is a return to original form, though. Microsoft’s first Xbox logo for its console was all caps, and the company has favored using similar capped versions for the Xbox 360, Xbox One, and Xbox Series X / S console logos.

The apparent rebranding comes just a few weeks after Sharma scrapped Microsoft Gaming and renamed Microsoft’s gaming division back to Xbox. It’s part of Sharma’s continued promise of a “return of Xbox,” which has involved fan-focused console updates, a new Xbox logo, Game Pass pricing changes, and lots more in recent weeks.

Continue Reading
Advertisement

Trending