Connect with us

Technology

Why your holiday shopping data needs a cleanup now

Published

on

Why your holiday shopping data needs a cleanup now

NEWYou can now listen to Fox News articles!

If the ads you see in December feel a little too accurate, you are not imagining it. 

The holiday shopping season is the busiest time of the year for retailers and for data brokers. These companies quietly track, collect and sell your personal information. Every search, click, cart add and purchase feeds a digital shopping profile tied to your name, phone number, email and address.

If you do not clean it up before the year ends, that profile will follow you into 2026. It fuels more scam calls, targeted ads, identity theft attempts and privacy risks you never agreed to. Here is how your profile forms, why data brokers want it and how to erase it fast.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Advertisement

FBI WARNS EMAIL USERS AS HOLIDAY SCAMS SURGE

Your digital shopping profile forms every time you browse, click or buy during the holiday season. (iStock)

Your digital shopping profile forms the moment you shop online

Your profile starts forming the second you browse Amazon, Target, Sephora, Walmart or any online store. Every interaction adds new data points, including:

  • Items you viewed
  • Items you added to your cart
  • Purchases and near-purchases
  • Shipping and billing addresses
  • Total spending
  • Preferred brands
  • Device type and browser
  • IP address and physical location

Activity spikes in November and December. You are searching for gifts, deals, decorations and electronics. Data brokers watch this surge and collect more aggressively.

How data brokers get your information

Data brokers gather your personal information from several places at once. Here are the most common sources.

1) Retailers send your shopping data to third parties

Most retailers use analytics, advertising or measurement partners. These partners are often data brokers. The more companies that handle your information, the higher the risk of exposure.

Advertisement

Marketing tools may analyze personal details such as age, race, gender, location and shopping habits. Even without clear consent, partners often receive:

  • Full purchase histories
  • Timestamps
  • Product categories
  • Loyalty account details

Some stores even share in-store behavior when you scan a loyalty card.

2) Shopping apps track far more than what you buy

Apps from Amazon, Temu, Walmart, SheinTarget and others track everything you do. They often collect:

  • Real-time location
  • Device data
  • Contact lists if allowed
  • Swipe patterns
  • Time spent viewing specific items

This behavioral data becomes extremely valuable to data brokers. It also helps scammers understand how to target you.

Data brokers collect this activity from retailers, apps and tools to build a detailed record of your habits. (iStock)

3) Price-comparison tools copy your browsing habits

Browser plugins that offer price drops or deal matching often collect far more than you expect. An FTC investigation revealed that they can capture details from location and demographics to mouse movements.

Data points like these get packaged, sold and added to your digital shopping profile. Scammers can then build highly targeted attacks.

Advertisement

What scammers can do with your digital shopping profile

Scammers use these profiles to run more convincing attacks during the holiday season. With access to your data, they can:

  • Send fake order confirmations
  • Launch refund scams
  • Send fraudulent delivery texts
  • Commit identity theft
  • Resell your information to other criminals

If you interact with a scam even once, your profile may be marked as verified. That makes you a priority target for future attacks.

PROTECT YOUR DATA BEFORE HOLIDAY SHOPPING SCAMS STRIKE

Why December is the best month to delete your data

Each January brings a surge in scams, including refund scams, account update scams, IRS scams, Medicare scams and subscription renewal scams. Many of these attacks rely on the holiday shopping data collected in the weeks before.

If you delete your data now, you reduce:

  • Scam calls
  • Spam emails
  • Targeted phishing attempts
  • The number of companies holding your personal information

Data brokers must delete your information once you request it. Acting now limits how much of your 2025 activity they can store and resell.

WHAT REALLY HAPPENS ON THE DARK WEB, AND HOW TO STAY SAFE

Advertisement

However, removing your data manually is nearly impossible. You would need to contact and send opt-out requests to:

  • People-search sites
  • Marketing data brokers
  • Retail data aggregators
  • Ad-targeting vendors
  • Shopping analytics platforms
  • Credit-linked identity brokers

One at a time.

The fastest way to delete your digital shopping profile

This is why I recommend using an automated data removal service. They remove your exposed data from hundreds of data broker sites and continue to monitor new threats.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Clearing your data in December reduces scams, cuts targeted tracking and protects your privacy heading into the new year. (iStock )

Advertisement

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Kurt’s key takeaways

Your digital shopping profile may feel invisible, but it shapes the ads you see, the scams you receive and how exposed your personal information becomes. The holiday season gives data brokers more information in two months than they collect during the rest of the year. Use December to clean it up. With a few smart steps and an automated data removal service, you can enter 2025 with fewer scams, fewer trackers and more control over your privacy.

What part of your digital shopping profile surprised you most after learning how data brokers track you? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2025 CyberGuy.com.  All rights reserved.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Google has finally killed the Stadia Bluetooth tool — but this person rescued it

Published

on

Google has finally killed the Stadia Bluetooth tool — but this person rescued it

Christopher Klay, who previously developed the Stadia Enhanced browser extension, is one of many who saved a copy of the tool to a personal GitHub page. What’s more, they’re hosting a working copy of that Google website right here to make it even easier.

Continue Reading

Technology

Illinois DHS data breach exposes 700K residents’ records

Published

on

Illinois DHS data breach exposes 700K residents’ records

NEWYou can now listen to Fox News articles!

Illinois residents are once again being reminded how fragile government data systems can be. The Illinois Department of Human Services has confirmed a data breach that exposed sensitive records belonging to roughly 700,000 people.

The breach is believed to have exposed two distinct sets of records. One is personal and program-related data tied to more than 672,000 Medicaid and Medicare Savings Program recipients, including addresses, case numbers, demographic details and medical assistance plan names, and another 32,000 Division of Rehabilitation Services customers whose names, addresses, case details and referral information were also exposed over multiple years.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS

Advertisement

The Illinois Department of Human Services confirmed a data breach that exposed sensitive records tied to roughly 700,000 residents, including Medicaid and disability services recipients. (Jakub Porzycki/NurPhoto via Getty Images)

What happened in the Illinois DHS data breach

As spotted by Bleeping Computer, the Illinois Department of Human Services disclosed that unauthorized access to one of its systems led to the exposure of records tied to approximately 700,000 Illinois residents. The affected data was connected to individuals who interacted with DHS programs, which can include benefits, assistance services and support programs across the state.

According to the agency, the breach involved personally identifiable information. While officials have not publicly released every technical detail, DHS confirmed that sensitive records were accessed, prompting notifications to impacted individuals. As is typical in cases like this, the investigation is ongoing, and the full scope of how the intrusion occurred is still being reviewed.

For residents, the key issue is not just that data was accessed, but the type of data DHS holds. Government agencies like DHS often store names, addresses, dates of birth, case numbers and, in some instances, Social Security numbers or benefits-related information. Once that data escapes, it can be misused in ways that last for years.

Why breaches like this are especially risky

When a private company is breached, you can often change a password or close an account. Government data is different. You can’t change your Social Security number easily. You can’t erase past interactions with public assistance programs. That makes breaches involving state agencies particularly dangerous.

Advertisement

Exposed records can be used for identity theft, fraudulent benefit claims, phishing scams and long-term impersonation. Criminals often combine government data with information from other breaches to build detailed profiles that make scams far more convincing. Even if there’s no immediate misuse, stolen data frequently resurfaces months or years later.

As with many large breaches, DHS has stated that it is taking steps to secure its systems and prevent similar incidents in the future. That’s an expected response. But for affected residents, the burden of protection now shifts largely to you.

We reached out to the Illinois Department of Human Services for comment, but did not receive a response before our deadline.

JANUARY SCAMS SURGE: WHY FRAUD SPIKES AT THE START OF THE YEAR

Personal information from Illinois DHS programs was accessed without authorization, raising concerns about long-term identity theft and fraud risks. (Philip Dulian/picture alliance via Getty Images)

Advertisement

7 steps you can take to stay safe after the Illinois DHS breach

If you received a notification from Illinois DHS, or if you’ve ever interacted with DHS programs, these steps can help reduce your risk.

1) Enroll in identity theft protection if it’s offered

If DHS provides free identity monitoring or credit protection, sign up. These services can alert you to suspicious activity involving your Social Security number or credit file before the damage spreads. Beyond basic monitoring, full identity theft services can help with recovery, paperwork and financial reimbursement if fraud occurs. This can be especially useful after large-scale government breaches.

Identity Theft companies can monitor personal information like your Social Security number, phone number and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

2) Use a password manager immediately

A password manager helps you create and store strong, unique passwords for every account. If your personal data is leaked, attackers often try the same credentials across multiple services. Unique passwords stop one breach from turning into many.

Advertisement

Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

3) Run strong antivirus software on your devices

Strong antivirus tools do more than scan files. They monitor suspicious behavior, phishing attempts and malicious links that often follow large data breaches. This matters because breach victims are frequently targeted with follow-up scams.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

4) Place a fraud alert or credit freeze on your credit file

A fraud alert tells lenders to verify your identity before opening new accounts. A credit freeze goes further by blocking new credit entirely unless you lift it. If Social Security numbers were exposed, a freeze is often the safest option.

5) Use a personal data removal service

Once your information leaks, it often spreads to data broker sites that sell personal details. Personal data removal services work to request takedowns and reduce how much of your information is publicly available. While they can’t erase everything, they significantly lower your exposure.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Advertisement

6) Watch for phishing and impersonation scams

After breaches involving government agencies, scammers often pretend to be state officials, benefits offices, or support hotlines. Don’t click links or share information unless you independently verify the source through official websites or phone numbers.

7) Review your credit reports regularly

You’re entitled to free credit reports from major credit bureaus. Check them for unfamiliar accounts, inquiries or address changes. Early detection makes identity theft far easier to contain.

COVENANT HEALTH DATA BREACH AFFECTS NEARLY 500,000 PATIENTS

State officials say the breach involved Medicaid, Medicare Savings Program and rehabilitation services records spanning multiple years. (Silas Stein/picture alliance via Getty Images)

Kurt’s key takeaway

Even government agencies are not immune to large-scale security failures. When nearly 700,000 residents are affected, the impact goes far beyond a single system or department. While DHS works through its investigation, protecting your identity now depends largely on the steps you take next. Acting early, layering protections and staying vigilant can make the difference between a breach being an inconvenience or a long-term nightmare.

Advertisement

Do you trust state agencies to protect your personal data? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Roland’s Go:Mixer Studio turns your phone into a mobile music studio

Published

on

Roland’s Go:Mixer Studio turns your phone into a mobile music studio

Roland now offers a more capable audio mixer for phones and tablets with the launch of the Go:Mixer Studio. The Go:Mixer audio interface lineup has always been a bit limited, better suited for scrappy live streams and capturing quick demos on their phones than professional recording. The Go:Mixer Studio is an attempt to actually reach that lofty goal, with more inputs and outputs, built-in effects, and up to 24-bit / 192kHz audio. There’s even an iOS app that allows you to capture video and multitrack audio simultaneously.

Streaming and social video are still the major use cases here. The Go:Mixer Studio can even be mounted on a mic stand so you can keep it in easy reach during a live session. The screen and knobs allow you to control all the parameters on the Go:Mixer Studio directly, but there’s also a desktop app for Windows and MacOS that gives you complete control of the mixer remotely.

There’s plenty of connectivity, including two XLR inputs on the back with phantom power, a 1/4-inch instrument input for directly connecting a guitar or bass, stereo 1/4-inch line-in jacks, and an aux input. There’s also 1/8-inch TRS MIDI in and out, two headphone jacks, and stereo line outs for connecting to studio monitors. Each audio input has a dedicated EQ and compressor on the channel. The XLR and instrument ins also have reverb available.

The Go:Mixer Studio is available now for $299.

Continue Reading

Trending