Technology
Why your Android TV box may secretly be a part of a botnet
NEWYou can now listen to Fox News articles!
Android TV streaming boxes that promise “everything for one price” are everywhere right now.
You’ll see them on big retail sites, in influencer videos, and even recommended by friends who swear they’ve cut the cord for good. And to be fair, they look irresistible on paper, offering thousands of channels for a one-time payment. But security researchers are warning that some of these boxes may come with a hidden cost.
In several cases, devices sold as simple media streamers appear to quietly turn your home internet connection into part of larger networks used for shady online activity. And many buyers have no idea it’s happening.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
WHY JANUARY IS THE BEST TIME TO REMOVE PERSONAL DATA ONLINE
Android TV streaming boxes promising unlimited channels for a one-time fee may quietly turn home internet connections into proxy networks, according to security researchers. (Photo By Paul Chinn/The San Francisco Chronicle via Getty Images)
What’s inside these streaming boxes
According to an investigation by Krebs on Security, media streaming devices don’t behave like ordinary media streamers once they’re connected to your network. Researchers closely examine SuperBox, which is an Android-based streaming box sold through third-party sellers on major retail platforms. On paper, SuperBox markets itself as just hardware. The company claims it doesn’t pre-install pirated apps and insists users are responsible for what they install. That sounds reassuring until you look at how the device actually works.
To unlock the thousands of channels SuperBox advertises, you must first remove Google’s official app ecosystem and replace it with an unofficial app store. That step alone should raise eyebrows. Once those custom apps are installed, the device doesn’t just stream video but also begins routing internet traffic through third-party proxy networks.
What this means is that your home internet connection may be used to relay traffic for other people. That traffic can include ad fraud, credential stuffing attempts and large-scale web scraping.
During testing by Censys, a cyber intelligence company that tracks internet-connected devices, SuperBox models immediately contacted servers tied to Tencent’s QQ messaging service, run by Tencent, as well as a residential proxy service called Grass.
Grass describes itself as an opt-in network that lets you earn rewards by sharing unused internet bandwidth. This suggests that SuperBox devices may be using SDKs or tooling that hijack bandwidth without clear user consent, effectively turning the box into a node inside a proxy network.
Why SuperBox activity resembles botnet behavior
In simple terms, a botnet is a large group of compromised devices that work together to route traffic or perform online tasks without the owners realizing it.
Researchers discovered SuperBox devices contained advanced networking and remote access tools that have no business being on a streaming box. These included utilities like Tcpdump and Netcat, which are commonly used for network monitoring and traffic interception.
The devices performed DNS hijacking and ARP poisoning on local networks, techniques used to redirect traffic and impersonate other devices on the same network. Some models even contained directories labeled “secondstage,” suggesting additional payloads or functionality beyond streaming.
SuperBox is just one brand in a crowded market of no-name Android streaming devices. Many of them promise free content and quick setup, but often come preloaded with malware or require unofficial app stores that expose users to serious risk.
In July 2025, Google filed a lawsuit against operators behind what it called the BADBOX 2.0 botnet, a network of more than ten million compromised Android devices. These devices were used for advertising fraud and proxy services, and many were infected before consumers even bought them.
Around the same time, the Feds warned that compromised streaming and IoT devices were being used to gain unauthorized access to home networks and funnel traffic into criminal proxy services.
We reached out to SuperBox for comment but did not receive a response before our deadline.
8 steps you can take to protect yourself
If you already own one of these streaming boxes or are thinking about buying one, these steps can help reduce your risk significantly.
1) Avoid devices that require unofficial app stores
If a streaming box asks you to remove Google Play or install apps from an unknown marketplace, stop right there. This bypasses Android’s built-in security checks and opens the door to malicious software. Legitimate Android TV devices don’t require this.
2) Use strong antivirus software on your devices
Even if the box itself is compromised, strong antivirus software on your computers and phones can detect suspicious network behavior, malicious connections or follow-on attacks like credential stuffing. Strong antivirus software monitors behavior, not just files, which matters when malware operates quietly in the background. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.
3) Put streaming devices on a separate or guest network
If your router supports it, isolate smart TVs and streaming boxes from your main network. This prevents a compromised device from seeing your laptops, phones or work systems. It’s one of the simplest ways to limit damage if something goes wrong.
4) Use a password manager
If your internet connection is being abused, stolen credentials often come next. A password manager ensures every account uses a unique password, so one leak doesn’t unlock everything. Many password managers also refuse to autofill on suspicious or fake websites, which can alert you before you make a mistake.
MAKE 2026 YOUR MOST PRIVATE YEAR YET BY REMOVING BROKER DATA
Investigators warn some Android-based streaming boxes route user bandwidth through third-party servers linked to ad fraud and cybercrime. (Photo Illustration by Thomas Fuller/SOPA Images/LightRocket via Getty Images)
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.
5) Consider using a VPN for sensitive activity
A VPN won’t magically fix a compromised device, but it can reduce exposure by encrypting your traffic when browsing, banking or working online. This makes it harder for third parties to inspect or misuse your data if your network is being relayed.
For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.
6) Watch your internet usage and router activity
Unexpected spikes in bandwidth, slower speeds or strange outbound connections can be warning signs. Many routers show connected devices and traffic patterns.
If you notice suspicious traffic or behavior, unplug the streaming box immediately and perform a factory reset on your router. In some cases, the safest option is to stop using the device altogether.
Also, make sure your router firmware is up to date and that you’ve changed the default admin password. Compromised devices often try to exploit weak router settings to persist on a network.
7) Be wary of “free everything” streaming promises
Unlimited premium channels for a one-time fee usually mean you’re paying in some other way, often with your data, bandwidth or legal exposure. If a deal sounds too good to be true, it usually is.
8) Consider a data removal service
If your internet connection or accounts have been abused, your personal details may already be circulating among data brokers. A data removal service can help opt you out of people-search sites and reduce the amount of personal information criminals can exploit for follow-up scams or identity theft. While it won’t fix a compromised device, it can limit long-term exposure.
10 SIMPLE CYBERSECURITY RESOLUTIONS FOR A SAFER 2026
Cyber experts say certain low-cost streaming devices behave more like botnet nodes than legitimate media players once connected to home networks. (Photo by Alessandro Di Ciommo/NurPhoto via Getty Images)
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
Kurt’s key takeaway
Streaming boxes like SuperBox thrive on frustration. As subscriptions pile up, people look for shortcuts. But when a device promises everything for nothing, it’s worth asking what it’s really doing behind the scenes. Research shows that some of these boxes don’t just stream TV. They quietly turn your home network into a resource for others, sometimes for criminal activity. Cutting the cord shouldn’t mean giving up control of your internet connection. Before plugging in that “too good to be true” box, it’s worth slowing down and looking a little closer.
Would you still use a streaming box if it meant sharing your internet with strangers? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Anthropic’s Mythos AI found over 2,000 unknown software vulnerabilities in just seven weeks of testing
NEWYou can now listen to Fox News articles!
There is a new AI model called Mythos. Anthropic built it for defensive cybersecurity research. It is so effective at finding software vulnerabilities that Anthropic decided the general public cannot have it.
Instead, it is letting a small circle of trusted partners like Microsoft and Google experiment with it first under controlled conditions, while researchers figure out what guardrails need to exist.
That decision alone should tell you something. When the company that built a tool decides the world is not ready for it, you pay attention. And when you understand what Mythos actually did during testing, that caution starts to make complete sense.
WINDOWS PCS AT RISK AS NEW TOOL DISARMS BUILT-IN SECURITY
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com — trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Anthropic’s Mythos AI uncovered more than 2,000 unknown software vulnerabilities in just seven weeks, showing how fast AI can now expose hidden weaknesses. (Gabby Jones/Bloomberg via Getty Images)
How Anthropic’s Mythos AI found 2,000 vulnerabilities in seven weeks
Seven weeks. One AI model. One team. More than 2,000 previously unknown software vulnerabilities were found. If you need a moment with that, take it. John Ackerly, CEO and co-founder of Virtru, a data security company, put that figure into perspective in a way that is hard to shake.
“Mythos is absolutely a turning point for cybersecurity. Think about it. Mythos didn’t pick a lock; it found thousands of locks that were never locked in the first place (that no one even knew existed) in software that the best human security researchers had studied for decades.
The math is staggering. One AI model, and one team, in seven weeks, found more than 2,000 zero-day vulnerabilities. That is 30% of the world’s entire annual output prior to AI. When thousands of researchers get access to AI models like Mythos, a single year will surface exponentially more zero-days than the 360,000 recorded in all of software history.
Mythos and other AI models like it can now find and exploit software flaws at a speed and scale that is beyond containment. This means that the old approach of building stronger walls around systems and hoping they hold is becoming much less reliable. It also means that the manual “find a vulnerability, patch the vulnerability” process is not going to keep pace with a threat landscape bolstered by the speed and scale of AI.
The threat surface is now expanding faster than any wall can contain it. The only answer to this new dynamic is to protect the data itself, rather than prop up perimeter protection around it.
Thirty percent of the world’s annual output in seven weeks changes the game entirely.
What makes Mythos AI different from other AI security tools
Cybersecurity teams have used AI tools for years. So, what makes this different?
Ackerly explains it this way: “What makes this different is the level of autonomy and speed it enables. Mythos is being described as a system that can discover vulnerabilities and even generate working exploits much faster than traditional human-led workflows. This model could make it easy for a bad actor to identify and exploit vulnerabilities in software, even if that bad actor isn’t knowledgeable or trained.”
That last part matters most. Before a tool like this, exploiting a serious software vulnerability required real technical skill. Mythos AI lowers that barrier significantly. A person with bad intentions and no technical background could potentially use a model like this to cause serious damage. The expertise gap that once offered some natural protection is closing.
FAKE PAYPAL EMAIL LET HACKERS ACCESS COMPUTER AND BANK ACCOUNT
Security experts warn that tools like Mythos could shrink the time it takes to find and exploit flaws from weeks down to minutes. (Patrick Sison/AP Photo)
Why Anthropic’s Mythos AI is breaking down perimeter security
Most cybersecurity spending, the overwhelming majority of it, goes toward what experts call perimeter defense. Think firewalls, network monitoring, endpoint security and intrusion detection. The entire strategy is built on one core idea of keeping the bad actors out, and the data inside stays safe.
Ackerly describes how that model is now breaking down.
“The perimeter is the digital wall around your systems and the information you possess. For decades, cyber strategies have primarily focused on the idea that if you protected the perimeter well enough — if you built a strong enough wall — the sensitive data on the inside would stay safe,” Ackerly said.
“The industry has poured hundreds of billions of dollars into firewalls, endpoint detection, network security, application security and other perimeter defenses. Traditional security architecture by itself cannot keep pace in this new world.
“The Mythos development from Anthropic is making a hard truth very apparent: Time is running out for companies to prepare for this new reality. Shifting focus from ‘protecting the perimeter’ to ‘protecting the data’ is critically important to mitigate data loss or compromise.”
Hundreds of billions of dollars. And now the model those dollars were built on is becoming unreliable. It forces a full rethink.
Does Anthropic’s Mythos AI give attackers the advantage?
This is the question everyone wants a straight answer to. Ackerly offers one that is more nuanced than a simple yes or no.
“I wouldn’t frame it as attackers automatically having an advantage. But, over time, it does mean that ‘bad guys’ and ‘good guys’ will have access to essentially the same tools. As a result, I do think defenders absolutely need a different strategy. If you assume the outer wall may fail, then the smarter move is to protect the data itself so it stays controlled even after a breach.”
The playing field is leveling. And that may sound fair until you remember attackers only need to succeed once, while defenders have to succeed every time.
How fast is Mythos AI changing the cybersecurity threat landscape?
Speed is what makes Mythos AI genuinely alarming. Traditional cyberattacks move through a lifecycle. Reconnaissance takes time. Finding the right vulnerability takes more time. Building an exploit takes more time on top of that.
Ackerly explains what happens when AI compresses all of that.
“AI is accelerating the threat. A model that can find and exploit vulnerabilities autonomously compresses the attack lifecycle from weeks to hours, or even minutes. Every layer of the traditional security stack now has to operate at machine speed. Manual security architectures cannot keep up.
“But AI also makes data-centric security more powerful, not less so. When every piece of sensitive data is protected at the object-level, AI agents can enforce governance at scale by checking entitlements, applying attribute-based access controls, and auditing data flows in real time. The same capabilities that make Mythos a dangerous tool in the hands of ‘bad guys’ make it a valuable tool in the hands of ‘good guys.’”
The question organizations should be asking shifts from “how do I build higher walls?” to “when the walls fail, is my data still protected?” That is the question worth sitting with.
What Mythos AI means for regular people’s personal data
Most of the Mythos coverage has focused on corporate risk. But your bank account and medical records sit in those same vulnerable systems.
“For everyday people, the first change is that breaches and scams could become more frequent, more targeted, and harder to spot. If AI makes it easier to uncover weak points in the systems we all rely on, that can translate into more pressure on the services that hold our personal data, from email and cloud storage to health, banking, and retail platforms.
Consumers shouldn’t assume a company is doing the right thing with their data. Now, they really can’t assume a company’s outer defenses are enough to protect their information.
This also highlights the importance of basic cyber hygiene like unique passwords and MFA, so that when breaches happen, the scope of impact on your own personal data is contained.”
Your bank account, your medical records, your tax documents, your private messages. All of it already lives across dozens of platforms you trust to protect it. If those platforms’ outer defenses are no longer reliable, what exactly is standing between your data and someone who wants it?
Ackerly goes further on where the exposure actually lives. “Data now travels across clouds, devices, partners, and borders. The risk isn’t just one hacked server in one building anymore. It’s all the places your data passes through or gets copied to along the way.
Was Anthropic right to keep Mythos AI restricted?
Anthropic made a choice that is rare in the AI industry. They built something powerful and then decided not to release it widely.
On that decision, Ackerly is direct. “Anthropic’s decision to withhold Mythos from general release is unprecedented and, frankly, responsible. Time will tell what these partners are able to do with regard to safety, but releasing it to the general public would certainly have been ill-advised and dangerous.”
Unprecedented. That word deserves weight here. In an industry that races to release new tech, Anthropic stopped. That speaks volumes.
We reached out to Anthropic for a comment, but did not hear back before our deadline.
THIRD-PARTY BREACH EXPOSES CHATGPT ACCOUNT DETAILS
As AI accelerates cyberattacks, the focus is shifting from protecting networks to protecting the data itself. (Kury “CyberGuy” Knutsson)
How to stay safe as cybersecurity shifts
The perimeter model is deteriorating, but that does not mean you are helpless. Individual behavior still matters, and it matters more now than it did before.
Ackerly’s recommendation is this: “Stop assuming the app, platform, or company perimeter can always protect your information, or that they will do the right thing with your data. People should be much more deliberate about what data they share, where they store it, and who can access it. Protection needs to travel with the data, not just sit at the edge of a network. For you, that means choosing services that give you stronger control over your information and being more cautious about oversharing sensitive data in the first place. The data owner should always have governance over said data.” So where do you start?
1) Use unique passwords for every account
A password manager makes this realistic. If one platform gets breached, unique passwords keep the damage isolated to that one account.
2) Turn on multi-factor authentication wherever it is available
Multi-factor authentication (MFA) adds a layer that survives even when a password is compromised. It is one of the highest-impact steps an individual can take.
3) Run strong antivirus software and keep devices updated
Outdated software is one of the most common entry points attackers use. Strong antivirus software catches threats your instincts might miss, and keeping apps and operating systems current closes the gaps that models like Mythos are built to find. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
4) Be selective about what you share and where
Every app that holds your data is a potential exposure point. The less you overshare, the smaller your footprint becomes.
5) Use a data removal service
Data brokers collect and sell your personal information, often without you ever knowing. Data removal services find where your data is listed and request its removal. You cannot control every place your information travels, but you can shrink the trail it leaves behind. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
6) Choose services that offer real data control
Not all platforms treat your data the same way. Look for services that let you see, manage and limit how your information is used and where it goes.
7) Monitor your accounts and credit
Catching a breach early limits the damage significantly. Set up account alerts wherever your bank or financial platform allows it. A credit freeze costs nothing and stops new accounts from being opened in your name without your knowledge.
8) Stay skeptical of phishing attempts
Ackerly warned that scams will get more targeted and harder to spot as AI lowers the barrier for bad actors. Scrutinize every link before you click it and treat unexpected emails or texts asking for login information as suspicious by default. If something feels off, it probably is.
9) Assume breaches will happen
The goal is to limit how much damage they can do. When you operate with that assumption, your decisions about data hygiene get sharper, and your exposure gets smaller.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
Mythos did not create the vulnerability problem. It made the scale of it visible in a way that is no longer ignorable. The foundation of modern cybersecurity, the idea that strong enough walls will keep data safe, is being tested in real time by a technology that moves faster than any human team can. That is a consumer story as much as it is a corporate one. Your data lives in systems built on that old model.
And the moment to think differently about how it is protected is now, not after the next major breach makes the headlines. Anthropic made a responsible call by limiting access to Mythos. But the model exists. The capability is real. Other versions of it are being developed. The question for every organization and every individual becomes the same one Ackerly keeps returning to.
When the walls fail, and experts are telling us they will, what is actually protecting your data on the other side? Let us know your thoughts by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Trump fires the entire National Science Board
Multiple sources are reporting that the Trump administration has dismissed the entire National Science Board (NSB). The NSB advises the president and Congress on the National Science Foundation (NSF), which has already been funding research at historically low levels and has seen significant delays in doling out that funding. The NSF has been fundamental in helping develop technology used in MRIs, cellphones, and it even helped get Duolingo get off the ground.
In a statement, Zoe Lofgren, the ranking Democrat on the House Science, Space, and Technology Committee, said:
“This is the latest stupid move made by a president who continues to harm science and American innovation. The NSB is apolitical. It advises the president on the future of NSF. It unfortunately is no surprise a president who has attacked NSF from day one would seek to destroy the board that helps guide the Foundation. Will the president fill the NSB with MAGA loyalists who won’t stand up to him as he hands over our leadership in science to our adversaries? A real bozo the clown move.”
Technology
How scammers build a profile on you using data brokers
NEWYou can now listen to Fox News articles!
Go to any people finder site right now and type in your name. What comes back might shock you: your age, home address, phone number, the names of your relatives, where you used to live and even what your property is worth.
You didn’t put that there, and you never consented to it. Still, it’s out there, and anyone with an internet connection can see it.
Scammers figured this out a long time ago. Since then, they’ve turned it into a system for targeting you, your parents and your kids.
So how does it actually work, and more importantly, what can you do to stop it?
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com, trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE SEARCH SITES
A single person search result can reveal your address, relatives and years of personal history in seconds. (Kury “CyberGuy” Knutsson)
How scammers find your personal data online
Before a criminal sends a phishing email or makes a call, they do their homework. Importantly, they don’t need to hack anything. Instead, they use the same public websites that anyone can access.
In less than 10 minutes, a scammer can build a detailed profile on you using data broker sites like Spokeo, Whitepages, BeenVerified and Intelius. Here’s what that profile looks like and how they build it step by step.
Step 1: How scammers search your name on people finder sites
It starts simply. A scammer types your name into a search site. Within seconds, they see results like:
John M. Patterson | Age: 61 | Cleveland, OH
- Also known as: John Michael Patterson
- Current address: [your street address]
- Previous addresses: 4 records found
- Phone numbers: 2 found
- Email addresses: 3 found
- Relatives: 5 found
That is the starting point. Many sites show partial data for free. That is often enough to confirm identity. Full reports cost only a few dollars, so access is easy. Scammers can repeat this process hundreds of times a day, building detailed profiles with very little effort.
Step 2: How scammers map your family and relatives
Next, this is where things get personal. Data broker profiles show more than your name. They reveal your family network.
That often includes:
- Spouse or partner
- Children
- Parents
- Siblings
- Roommates
As a result, scammers can target more than one person. For example, they may learn that your elderly parent lives alone or your child just moved. Because of that, scams like the grandparent scam feel real instead of random.
Step 3: How scammers use your address history
At this point, your address history becomes critical. It is not just about where you live. Instead, scammers use it to:
- Verify identity
- Find relatives
- Build trust
For example, referencing a past address makes a caller sound legitimate. That detail alone can lower suspicion.
Step 4: How scammers use your financial data
More importantly, data brokers also reveal financial clues. These may include:
- Estimated income
- Home value
- Ownership status
- Length of residence
This information comes from public records, not hacking. Because of this, scammers tailor their approach. Higher-income targets may see investment scams.
Others may get job or rental scams instead.
GOOGLE SEARCH LED TO A COSTLY SCAM CALL
Scammers use data broker profiles to map your family and build more convincing, targeted attacks. (Kurt “CyberGuy” Knutsson)
Step 5: How scammers verify and cross-check your data
Before launching a scam, criminals often double-check everything. They don’t rely on just one site. Instead, they compare multiple data broker profiles, social media accounts and public records to confirm details are accurate.
For example, they may:
- Match your address across different sites
- Check Facebook or LinkedIn to confirm family relationships
- Look for recent moves, job changes or life events
Because of this, the profile becomes more reliable. That extra step is what turns a guess into something that feels real.
Step 6: How scammers create targeted scams
At that point, they have everything they need. They know your name, family, address and financial details. Now the scam becomes highly specific.
By the time you hear from them, they already know enough to sound like someone you trust.
- They may call your parent pretending to be you
- They may bypass bank security questions
- They may send texts that look like your child
- They may send emails that reference your life
As a result, the scam feels believable.
Data broker scams are already being prosecuted
This has already landed in court. The U.S. Department of Justice has prosecuted companies like Epsilon, Macromark Inc. and KBM Group for selling data to scammers. Epsilon alone paid $150 million to victims.
At the same time, data tied to the FBI Internet Crime Complaint Center shows more than half of fraud cases involving older Americans were linked to exposed personal data. That shows how serious this problem has become.
Why is your personal data on data broker sites
You do not need to sign up for these sites. Instead, your data comes from many sources, including:
- Voter records
- Property records
- Court filings
- Social media
- Marketing surveys
- Loyalty programs
- Phone directories
- Other data brokers
Because of this, your information spreads quickly.
Why your data keeps reappearing online
Even after removal, your data often comes back. Data brokers constantly update their databases. They buy and resell fresh records. Because of that, one-time removal is not enough.
By the time a scam reaches you or your family, it is often built on real data pulled from multiple public sources. (Wei Leng Tay/Bloomberg)
How to disrupt a scammer’s research before they reach your family
The goal isn’t to disappear completely. It’s to make the profile messy enough, incomplete enough and hard enough to find that scammers move on to easier targets.
Here’s what you can do:
- Search for yourself first. Go to Spokeo, Whitepages, BeenVerified or any other people search site, and look up your own name. See exactly what’s there before a scammer does. That snapshot is your starting point.
- Submit opt-out requests manually. Every major data broker is required to honor removal requests. The catch: There are hundreds of them, each with its own process, and they relist your information regularly. It’s a full-time job.
- Use an automated removal service. This is where I strongly recommend a data removal service. Instead of spending hours submitting individual opt-out forms, a data removal service sends removal requests to 420-plus data brokers on your behalf and keeps sending them when your data reappears. Because it will reappear.
- Set up family alerts. Tell your elderly relatives that you will never ask for money via text from an unknown number. Establish a code word. Scams work because they create panic. A simple family protocol breaks the spell.
- Change your security questions. If your bank still uses “mother’s maiden name” or “city you were born in” as verification, that information is likely already on a data broker site. Switch to nonsense answers that only you know and store them in a password manager.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt’s key takeaways
This kind of scam works because it feels personal. When someone knows your name, your family and even where you used to live, your guard drops. That is exactly what criminals are counting on.
The uncomfortable truth is that your information is already out there, often in more places than you realize. You do not need to panic, but you do need to be proactive. The more you limit what is easily accessible, the harder it becomes for someone to build a convincing story around you. Start with a simple search of your own name. That one step can completely change how you think about your digital footprint. From there, take action to remove what you can and protect what you cannot.
If a stranger can build a detailed profile on your family in minutes, what does that say about how much of your life is already exposed online? Let us know by writing to us at Cyberguy.com
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
-
Health2 minutes agoPatients taking weight-loss drugs often make 5 critical mistakes, doctor warns
-
Sports8 minutes agoUFC fighter Tim Means arrested on child abuse charge in New Mexico
-
Technology14 minutes agoAnthropic’s Mythos AI found over 2,000 unknown software vulnerabilities in just seven weeks of testing
-
Business20 minutes agoCommentary: A judge labels RFK Jr.’s attack on transgender care ‘unlawful’ and an act of ‘cruelty’
-
Entertainment26 minutes agoStagecoach 2026: How to watch Sunday’s livestream with Post Malone, Hootie & the Blowfish, Brooks & Dunn
-
Lifestyle32 minutes agoHis wild, theme park-style home in L.A. is full of joy. It even has a Disneyland room
-
Politics38 minutes agoNational parks brace for summer surge as Trump administration proposes more staff cuts
-
Sports50 minutes agoLoyola High’s Tripp King looks to become West Coast trendsetter in lacrosse