Connect with us

Technology

Winter storms can knock out your tech fast: Prepare now

Published

on

Winter storms can knock out your tech fast: Prepare now

NEWYou can now listen to Fox News articles!

Weather forecasters are warning that a major winter storm is expected to impact large portions of the United States starting Friday. Forecasts call for snow, freezing rain and ice stretching from Texas and the Southern Plains through the Southeast, Mid-Atlantic and into the Northeast. This system is concerning because it combines ice accumulation, gusty winds and plunging temperatures. In many regions, especially across the South and parts of the Mid-Atlantic, infrastructure is not designed to handle prolonged ice events.

Advertisement

That increases the risk of extended power outages and disrupted cell service. When the grid goes down, everyday tech becomes critical. Phones, alerts, vehicles and apps may be your only connection to updates and emergency help. Preparing now matters far more than reacting later.

 Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

RUSSIAN WINTER STRIKE LEAVES NEARLY 800K HOMES WITHOUT POWER AND HEAT IN UKRAINE’S DNIPRO REGION

Ice storms can take down power lines fast, leaving homes without electricity and cell service for hours or even days.  (AP Photo/Charles Krupa)

Why ice storms are especially disruptive

Ice storms cause more damage than most people expect. Unlike snow, ice sticks to everything and adds significant weight. Ice builds up on trees and power lines, causing branches to snap and lines to fall. Utility crews often cannot begin repairs until conditions improve, which delays restoration. Forecasters at Fox Weather warn that freezing rain across the South and interior Southeast could be particularly damaging, while snow and wind farther north may slow emergency response. 

Advertisement

Even if cell towers remain standing, networks often overload during severe weather. When thousands of people try to call at once, connections fail. Texts and alerts usually have a better chance of getting through. That is why you should assume you may be offline longer than expected.

Immediate tech actions to take before the storm hits

These steps are simple, but timing matters. Do them before the weather conditions worsen.

Charge devices and prepare backup power

  • Charge all phones, laptops, tablets and battery packs
  • Fully charge wearable devices like smartwatches
  • Turn on Low Power Mode on phones now
  • Lower screen brightness to extend battery life, and check out these other tips to keep your phone battery charged longer
  • Make sure you have a reliable portable charger on hand, like those highlighted in our 5 best portable chargers for emergencies on Cyberguy.com
  • For outages that could last days in this winter storm, a good generator can keep your home powered the longest and safest
  • Reliable lighting matters during storms and blackouts. Invest in a high-output flashlight and hats with built-in lights that can be especially useful when visibility is poor
  • Keep a battery-powered weather radio on hand so you can receive emergency updates even if power and cell service go out

A fully charged phone, smart power settings and a reliable portable charger can keep you connected early in an outage while longer-term home power solutions carry you through the days ahead.

A woman walks with an umbrella in the rain in the Manhattan borough of New York, Feb. 5, 2014.  (REUTERS/Carlo Allegri)

Plan for offline communication and limited cell service

  • Download offline maps for your area.
  • Save emergency contacts locally on your device.
  • Write down key phone numbers on paper.
  • Plan to text instead of calling if networks are congested. Text messages use less bandwidth and often go through when calls fail.
  • Cold weather can also make phones harder to use. Touchscreen-compatible winter gloves let you stay connected without exposing your hands to the cold.

Set up a family check-in plan before the storm

  • Agree on specific check-in times
  • Choose one out-of-area contact everyone can message
  • Avoid constant calling, which can overload networks

Clear expectations reduce panic and unnecessary phone use

Make sure emergency alerts are enabled

Emergency alerts can reach your phone even when apps and social media cannot. They are designed to cut through network congestion and deliver critical warnings.

How to turn on emergency alerts on iPhone

  • Open Settings
  • Tap Notifications
  • Scroll to Government Alerts
  • Turn on Emergency Alerts
  • Enable Always Play Sound
  • Turn on Imminent Threat Alerts under Enhanced Safety Alerts

US POWER CRUNCH LOOMS AS OKLO CEO SAYS GRID CAN’T KEEP UP WITHOUT NEW INVESTMENT

Ice storms add heavy weight to trees and power lines, causing widespread damage and outages that can overwhelm repair crews and communication networks for longer than expected. (AP/Craig Ruttle)

Advertisement

How to turn on emergency alerts on Android

Settings may vary, depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Safety and emergency or Notifications
  • Select Wireless emergency alerts
  • Turn on Severe threats and Extreme threats
  • Enable Allow alerts and Alert sound

On some phones, you may also see options for Public safety messages or Emergency alerts, which should be turned on. These alerts may include evacuation notices, shelter updates and severe weather warnings.

Both iPhone and Android let you preview alert sounds and settings in these menus, so take a moment to test them now and make sure alerts are loud enough before severe weather hits.

Know how to use Emergency SOS on your phone

If you need help during a winter storm, Emergency SOS can contact emergency services even when you cannot unlock your phone or make a normal call. Set this up now. Do not wait until you are stressed, cold or without power.

How to set up and use Emergency SOS on iPhone

  • Open Settings
  • Tap Emergency SOS
  • Turn on Call with Hold and Release or Call with 5 Button Presses
  • Scroll down and add emergency contacts

To activate Emergency SOS during an emergency, press and hold the side button and a volume button, or quickly press the side button five times, depending on your settings.

How to set up and use Emergency SOS on Android

Settings may vary, depending on your Android phone’s manufacturer

  • Open Settings
  • Tap Safety and emergency or Privacy and safety
  • Select Emergency SOS
  • Turn on Use Emergency SOS 
  • Choose how SOS is triggered, such as Require to swipe to call
  • Add emergency contacts and medical information by clicking Emergency sharing settings 

On many Android phones, pressing the power button five times will trigger Emergency SOS. Emergency SOS can call for help, share your location and alert emergency contacts when conditions are dangerous.

If cell towers go down during this storm, features like Emergency SOS can still help you reach emergency services. Our guide explains in more detail how these lifesaving settings work.

Advertisement

Apps you should have installed ahead of time

The right apps can deliver critical updates when power is out, cell networks are strained and social media is unreliable. Install and set these up before the storm arrives.

Weather and severe alert apps

  • Fox Weather app: A trusted option for real-time forecasts, winter storm alerts, radar tracking and location-based notifications. Make sure local alerts are turned on.
  • MyRadar Weather Radar: A highly rated radar app that shows storm movement in real time and sends push alerts when severe weather is approaching your area.
  • Storm Shield Severe Weather App: Delivers National Weather Service alerts based on your exact location, similar to NOAA weather radio warnings, with clear push notifications for winter storms and ice events.
  • NOAA Weather Radio apps (iPhone and Android): These apps stream official NOAA Weather Radio broadcasts, providing continuous updates, watches and warnings directly from the National Weather Service. Weather radio streams often remain available even during major outages.

Using more than one weather app can give you redundancy if one service is delayed or overloaded.

Utility and outage tracking apps

  • Your local power utility app: Most utilities offer apps that allow you to report outages, view outage maps and track restoration progress in real time.
  • FEMA App: Provides official weather alerts, disaster resources, shelter locations and safety guidance during severe weather events.

These apps can confirm outages, provide restoration updates and reduce unnecessary calls to utilities when systems are overwhelmed.

Do not overlook vehicle tech and preparedness

Your vehicle may become a critical resource during extended outages.

Prep your car before conditions worsen

  • Fill your gas tank early. A full tank allows you to run the engine briefly for heat or charging if needed.
  • Keep a phone charger in the car.
  • Store a fully charged portable power bank in the glove box or center console. This gives you emergency phone power if your car battery dies or you cannot run the engine.
  • Download weather and road condition alerts.
  • Also, consider buying a Snow brush and ice scraper, jumper cables, a set of 6 LED Road Flares Emergency Lights and a First Aid Trauma Pack with QuikCloth, so you will not be caught off guard in an emergency.
  • There are also portable tech solutions designed to help you stay warm and powered during outages or roadside delays, including heated gear worth purchasing in advance.

Storms also bring scams and fraud attempts

Severe weather creates ideal conditions for scams. Power outages, delayed responses and anxiety make people more likely to trust messages that appear urgent or official.

Fake utility and restoration scams

Scammers often impersonate electric, gas or water utilities.

  • Texts or calls claiming your power will be restored sooner if you pay
  • Messages warning service will be shut off unless you act immediately
  • Spoofed phone numbers that look like your local utility

What to know: Utilities do not charge fees to restore power and do not demand payment by text, gift cards or apps.

Emergency aid and disaster relief scams

These scams spike right after storms hit.

  • Messages promising emergency funds, fuel vouchers or hotel assistance
  • Fake charity links claiming to help storm victims
  • Social media posts asking for donations using stolen images

What to know: Legitimate aid is announced through official government or well-known nonprofit channels, not unsolicited messages.

Fake delivery, fuel and repair service scams

Storms disrupt normal services, which scammers exploit.

Advertisement
  • Links claiming fuel delivery is available in your area
  • Messages about delayed packages that require confirmation
  • Ads for emergency home repairs that ask for upfront payment

What to know: Do not click links or pay deposits without verifying the company independently.

Charging your devices and lining up backup power now can make the difference between staying informed during an outage and being cut off once the storm hits. (Kurt “CyberGuy” Knutsson)

Account takeover and identity theft attempts

Storm chaos makes it easier for attackers to slip through unnoticed.

  • Password reset emails pretending to be from banks or retailers
  • Login alerts asking you to “secure” your account immediately
  • Calls claiming suspicious activity that push you to share codes

What to know: Never share one-time codes or login details, even if the message looks legitimate.

How to protect yourself before and during the storm

Taking a few precautions now can help you avoid costly mistakes when outages, delays and scam messages start piling up.

1) Slow down and verify every urgent message

Scammers rely on panic. If a message pressures you to act fast, stop and verify it through a trusted source.

2) Avoid clicking links in unsolicited messages and use strong antivirus software 

Go directly to official websites or apps instead of tapping links in texts or emails. Keep your operating system up to date, and use strong antivirus software to block malicious links and fake websites.

Advertisement

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

3) Lock down accounts before outages hit

Enable two-factor authentication (2FA) on email, banking, and utility accounts so stolen passwords cannot be used alone.

4) Reduce your exposure with a data removal service

Many storm scams work because criminals already have your phone number, address or email. Using a data removal service to opt out of data broker sites can reduce how easily scammers target you during emergencies.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Advertisement

Check out my top picks for data removal services, and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

5) Never pay to restore power or receive aid

Utilities and government agencies do not charge fees to restore service or release emergency assistance.

When power and internet access are limited, it is harder to verify messages quickly. That makes preparation just as important as awareness. A little skepticism now can prevent financial loss and identity theft when help is hardest to reach.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Advertisement

Kurt’s key takeaways

Winter storms can turn small tech decisions into critical ones. Ice, power outages and overloaded cell networks can leave people cut off faster than expected, especially in regions not built for prolonged winter weather. Preparing your devices, alerts, vehicles and accounts ahead of time gives you more control when conditions worsen. It also reduces panic and limits your exposure to scams that thrive during emergencies. A little planning now can make a big difference when help is harder to reach.

Have you taken steps to prepare your tech for this winter storm, or did this checklist highlight something you still need to do? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.  

Advertisement

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Data broker opt-out steps widows should take in 90 days

Published

on

Data broker opt-out steps widows should take in 90 days

NEWYou can now listen to Fox News articles!

Three weeks after her husband’s funeral, Carol’s phone rings. The caller knows her husband’s name, their address and their daughter’s name, even mentioning that she lives across town.

He says he’s calling from a life insurance company and that there’s a policy ready to be paid out. He just needs Carol’s Social Security number and bank routing details to process it.

This scenario draws from real scams reported by fraud investigators and elder abuse advocates across the country. The details change, but the playbook stays the same.

The reason these attacks work so well comes down to something most grieving families never think to check.

Advertisement

HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA

Scammers build detailed profiles using obituaries, public records and data broker sites often within days of a loss. (Kurt “CyberGuy” Knutsson)

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Why scammers target widows and how they find you so fast

Losing a spouse creates a perfect storm for scammers. Grief can leave you overwhelmed, and at the same time, you are handling financial decisions, paperwork and major life changes. That combination makes it easier for someone to catch you off guard.

THE ONE THING SCAMMERS CHECK BEFORE TARGETING YOU ONLINE

Meanwhile, your personal information becomes easier to find. Obituaries often include names, relationships and locations. Death records get filed with the Social Security Administration and added to the Death Master File. Probate filings can reveal property transfers, beneficiaries and account details.

Advertisement

Data brokers collect all of this and turn it into detailed profiles that almost anyone can access. According to research from a data privacy company analyzing five years of FBI Internet Crime Complaint Center data, about 52.5% of crimes reported by Americans over 60 in 2023 were either enabled or worsened by personal data available online. Widows, especially those managing estates alone, sit high on that target list.

Here’s what you should do in the first 90 days

Despite being in a high-risk group, taking these protective steps should keep scammers at bay. I know how overwhelming this time can be, so I recommend asking a trusted family member or friend for assistance setting things up. Though you should always refrain from sharing sensitive details like account numbers and your Social Security number.

THE DATA BROKER OPT-OUT STEPS EVERY RETIREE SHOULD TAKE TODAY

Days 1-30: Limit what enters the system

The first month is when the most damaging data gets published. So your first job is damage control.

1) Be strategic about the obituary

Obituaries are the single most accessible data source scammers use after a death. A traditional obituary lists full names, survivor relationships, hometowns and sometimes even ages. That’s a complete family map, and in the wrong hands, it can be a powerful weapon.

Advertisement

You don’t have to skip the obituary. But consider removing or abbreviating the exact home city (use the region instead), names of minor grandchildren and the surviving spouse’s first and last name combined with their address. “Carol of Cleveland” is safer than “Carol Patterson of 114 Birchwood Lane, Cleveland.”

HOW TO REMOVE YOUR PERSONAL INFO FROM PEOPLE-SEARCH SITES

2) Search your name on people-finder sites

Before you can remove anything, you need to see what’s already there.

Go to Spokeo, Whitepages, BeenVerified and Intelius. Search your name and your spouse’s name. What you find will likely include your address, phone number, email addresses, relatives’ names and property records.

This snapshot is your starting point. Take screenshots. You’ll need them.

Advertisement

10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE

3) Set up a Google Alert for your name and address

It takes two minutes, and it’s free. Go to google.com/alerts and create alerts for:

  • Your full name
  • Your spouse’s full name
  • Your street address.

If your information gets published anywhere new, you’ll get an email notification. This is your early warning system.

REMOVE YOUR PERSONAL INFO FROM THE WEB — STOP IT FROM COMING BACK

Days 31-60: Start removing and automating what you can’t do manually

People-search sites can expose your address, relatives and contact details, making it easier for scammers to target you. (Kurt “CyberGuy” Knutsson)

By now, your information has had weeks to spread. Manual opt-outs are worth doing, but here’s the reality: there are hundreds of data broker sites. Each one has its own removal process. Many require you to submit ID, wait days for confirmation and then re-submit when your data reappears, because it will.

Advertisement

1) Opt out of people-search sites

Prioritize manual opt-outs from the sites that appear in your Google search results. These carry the most weight because scammers often start with whatever Google surfaces first.

You can find these exposures quickly and easily with Incogni’s free scanner. This tool will scan the web for your personal information and email you a report with a list of results you can start with.

HOW TO HAND OFF DATA PRIVACY RESPONSIBILITIES FOR OLDER ADULTS TO A TRUSTED LOVED ONE

If you’d rather go about it on your own, some of the most common sites include:

  • Spokeo: spokeo.com/opt_out/new
  • Whitepages: whitepages.com/suppression_requests
  • BeenVerified: beenverified.com/opt-out
  • Intelius: intelius.com/opt-out.

Each one will ask you to verify your email. Follow through on every confirmation; unconfirmed requests don’t get processed.

Keep in mind that removing your information takes time and persistence. There are hundreds of data broker sites, and many of them re-list your information after it has been removed, especially when new public records become available.

Advertisement

Because of that, some people choose to use automated data removal services that send ongoing opt-out requests on their behalf. These services can help reduce the workload by continuously monitoring and removing listings as they reappear.

No matter which approach you take, consistency matters. Checking your information regularly and following up on removals helps limit what scammers can find.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

2) Update security questions on all financial accounts

This step is urgent, and most people skip it entirely.

Data broker profiles almost always contain the exact answers to your bank’s security questions. Mother’s maiden name. Previous address. City where you were born. Scammers use these to impersonate you and access your accounts.

Advertisement

WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE

Call your bank, brokerage and insurance companies. Ask to update your knowledge-based authentication questions. Use answers that are completely made up, something only you know and store them in a password manager. Don’t use any answer that appears anywhere in a data broker profile.

Days 61-90: Lock down the perimeter

By now, the most urgent exposure has been addressed. These final steps close the remaining gaps and protect you in the long term.

1) Place a credit freeze on your account and your spouse’s

A credit freeze prevents new credit accounts from being opened in your name. It’s free at all three major bureaus: Equifax, Experian and TransUnion.

HOW TO SAFEGUARD YOUR CREDIT SCORE IN RETIREMENT AS FRAUD AND IDENTITY THEFT RISE AMONG SENIORS

Advertisement

Critically: freeze your spouse’s credit too. After a death, identity thieves frequently open new accounts in the deceased person’s name before the credit bureaus are updated. This is called ghosting, and it can haunt an estate for years.

To freeze a deceased spouse’s credit, contact each bureau individually and provide the death certificate. It’s a few phone calls. It’s worth every minute.

2) Request removal from the Social Security Death Master File

Families can submit a request to limit access to a deceased person’s Social Security data in certain contexts. Visit ssa.gov for current guidance. This won’t scrub the record entirely, but limiting access to the Death Master File reduces the pool of parties who can use it to enrich your data broker profile.

3) Review all joint account access and update beneficiary information

This isn’t directly a data privacy step, but it protects you from a related threat. Scammers who know about an estate sometimes pose as financial advisors, attorneys or government representatives to intercept beneficiary changes. Confirm all account changes directly through institutions you contact yourself, never through a number someone else gives you.

4) Set up simple safeguards to stop scams early

By this stage, your data is more controlled. Now the focus shifts to stopping scams before they escalate. Start by setting clear expectations with your family. Let them know you will never ask for money through an unexpected call, text or email. Creating a simple code word or check-in rule can stop panic-driven decisions, which is exactly what scammers rely on.

Advertisement

Next, slow down any urgent financial request. Scammers create pressure to force quick action. If someone claims there is a payout, problem or deadline, pause and verify it using a phone number or website you trust, not one they provide. It also helps to keep a short list of your financial institutions and their official contact details in one place. That way, you always know how to reach them directly without relying on incoming calls or messages.

Taking simple steps early, like removing your data and freezing your credit, can reduce your risk during the most vulnerable time. (Kurt “CyberGuy” Knutsson)

INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU

Finally, be cautious in real-time conversations. Scammers often build trust by collecting small details over multiple interactions. Keeping answers brief and avoiding unnecessary personal details makes it that much harder.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com

Advertisement

Get a free scan to find out if your personal information is already out on the web: CyberGuy.com

Kurt’s key takeaways

The first few months after losing a spouse bring enough decisions without adding fraud risks on top. Yet that is when your personal information spreads the fastest. Public records and data broker sites can quietly build a profile that scammers use against you. Early action makes a real difference. Limiting what gets published, removing existing data and securing your accounts all reduce your exposure. Even small steps, like updating security questions or freezing credit, can stop a scam before it starts. You do not need to handle everything at once. Start with a simple search of your name and review what appears. From there, take control at your own pace and protect what matters most.

If someone can piece together your personal life within days of a loss, how much of your information are you comfortable leaving online? Let us know by writing to us at CyberGuy.comCyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

Advertisement
  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com.  All rights reserved.

Continue Reading

Technology

Meta’s historic loss in court could cost a lot more than $375 million

Published

on

Meta’s historic loss in court could cost a lot more than 5 million

New Mexico Attorney General Raúl Torrez won a historic sum of $375 million in a landmark child safety case against Meta earlier this year. But the next stage of the fight could be even more consequential for Meta and the social media industry at large.

Beginning Monday, attorneys for Meta and New Mexico will return to a Santa Fe courthouse for a three-week public nuisance trial, where they’ll argue over the changes the AG wants the judge to order Meta make to Facebook, Instagram, and WhatsApp. Those changes include adding age verification for New Mexico users, prohibiting end-to-end encryption for users under 18 and capping their use to 90 hours per month, limiting engagement-boosting features like infinite scroll and autoplay, and requiring Meta to detect 99 percent of new child sexual abuse material (CSAM).

“From the outset, our goal was to try and change the way the company’s doing business,” Torrez told The Verge on a recent visit to Washington, DC, to advocate for new kids safety legislation. “I recognize that even at $375 million for a company this big and this profitable, it’s not enough in and of itself to change the way they’re doing business. In fact, there’s probably some folks in that company who think of it as the cost of doing business.”

“Even at $375 million for a company this big and this profitable, it’s not enough in and of itself to change the way they’re doing business”

While any changes ordered by the judge would only apply to Meta and its operations in New Mexico, the company could apply the changes in other states for the sake of simplicity. Or, as it’s threatened to do, it could simply go dark in the state. A court order could send a message to other tech companies that courts may be willing to alter their businesses if they’re found liable.

Advertisement

During the trial, New Mexico will argue Meta has become a public nuisance by creating a public health hazard in the state. The AG’s office expects to call on about 15 witnesses, including experts who will testify to the feasibility of their proposed remedies, and fact witnesses who will testify about Meta’s alleged harms. After Meta makes its defense, Judge Bryan Biedscheid will evaluate which proposals are relevant and feasible — a process that could take some time, compared to the speedy turnaround of the jury verdict in March.

A sweeping win for New Mexico could energize Torrez and thousands of other plaintiffs currently pursuing cases against tech companies. Conversely, a limited order could be a significant blow. The outcome won’t directly impact other cases, but it will almost certainly color negotiations over potential settlements.

Several of Torrez’s requests are hot-button tech policy issues. Age verification would almost certainly require Meta or a third-party provider to collect more personal information on adults and minors alike, which privacy advocates have consistently warned can make users less safe. Don McGowan, who previously served on the board of the National Center for Missing and Exploited Children (NCMEC), said that barring encrypted communications on platforms like Facebook “is a great way to make sure that nobody uses Facebook Messenger anymore and just moves their activity to other platforms that aren’t touched by this lawsuit.”

The mandate may do little to change the reality of certain parts of the business — Meta recently announced it was getting rid of end-to-end encrypted messaging on Instagram that it said “very few people” actually used.

Peter Chapman, associate director of the Knight-Georgetown Institute, which works to connect policymakers and others with independent tech policy research, said there could be “significant tradeoffs” to a prohibition on encryption, and other changes may be more effective. For example, evidence presented by the state showed that Meta’s own profile recommendations were connecting adults and minors, a feature that poses a clearer danger of harm without much benefit, and which Torrez is also asking the court to stop. “There’s an opportunity to intervene at that level and try to prevent more of these harmful interactions from taking place without having to tackle encryption,” said Chapman.

Advertisement

No single feature change is likely to solve the entire child and teen safety problem, said Chapman, which is why it’s notable that Torrez plans to ask for several layers of changes. Still, the overall effectiveness of any given remedy will also depend on how it’s implemented and monitored. For instance, what would be the methodology Meta uses to report a 99 percent detection rate of new CSAM? How does it count or surmise what it hasn’t caught? The same goes for the accuracy and reliability of any mandated age verification.

Meta points to this potential issue in its argument against Torrez’s proposed remedies. “Regardless of where the accuracy threshold is set, Meta would never be able to prove that the system met that standard, because doing the calculation would require that Meta detect 100% of CSAM to use as the denominator,” the company wrote in a legal filing. Torrez’s chief deputy, James Grayson, said on a press call that the court and an appointed independent monitor would have some discretion over tracking; the office hasn’t yet identified who this monitor would be.

“The demands that are being made in New Mexico are ill-informed and provide massive additional exposure for other kinds of exploitation”

Meta and other groups that oppose the AG’s approach say the outcomes he’s seeking are counterproductive. “The demands that are being made in New Mexico are ill-informed and provide massive additional exposure for other kinds of exploitation,” said Maureen Flatley, president of Stop Child Predators, a group that advocates for more funding for enforcement of criminal laws against child predators, and has received funding from Meta-backed trade group NetChoice. “This notion that the platforms have to be responsible for pushing all these people out would be like saying to the US Bankers Association, ‘By the way, you are responsible for all the bank robberies from now on,’ which is ludicrous.”

“The New Mexico Attorney General’s focus on a single platform is a misguided strategy that ignores the hundreds of other apps teens use daily,” Meta spokesperson Chris Sgro said in a statement. “The state’s proposed mandates infringe on parental rights and stifle free expression for all New Mexicans. Regardless, we remain committed to providing safe, age-appropriate experiences and have already launched many of the protections the state seeks, including 13 safety measures this past year.”

Advertisement

But Torrez has taken aim at the broader tech industry, too. He recently visited Washington, DC, to advocate for new protections for kids online and an overhaul of Section 230, the law that protects tech platforms from being held liable for their users’ posts. “While we were able to prevail in our district court in Santa Fe, I still think the law as it currently exists creates a lot of ambiguity,” he told The Verge on that visit. “If Section 230 were not something that these companies could hide behind, then it increases the chances that they’re going to have to actually make their case to a jury.”

But Chapman said regulation through lawsuits isn’t an “uncommon sort of story” in the US. “Whether that’s tobacco, opioids, e-cigarettes, there is precedent for legal action moving a broader policy conversation.”

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Technology

DIY identity protection vs paid services: What works in 2026

Published

on

DIY identity protection vs paid services: What works in 2026

NEWYou can now listen to Fox News articles!

Earlier this year, more than 25 million Americans began receiving letters from a company most of them had never heard of. The sender was Conduent Business Services, a contractor that processes benefits records and human resources data for state Medicaid programs, employer health plans and government agencies. Between October 2024 and January 2025, ransomware operators pulled names, Social Security numbers, dates of birth, home addresses, medical diagnosis codes and health insurance claim numbers out of Conduent’s systems. In February 2026, Texas Attorney General Ken Paxton called it the largest data breach in U.S. history.

The letters ended the way most of these letters end, with an apology, a phone number and an offer of one year of free credit monitoring. Once your data is already out, can you realistically protect your identity on your own, or has it become something most people are better off outsourcing?

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.

FAKE SSA EMAIL ALERT: SPOT THIS SCAM FAST

Massive data breaches continue to expose sensitive personal information, leaving millions at risk of identity theft. (Daniel de la Hoz/Getty Images)

Advertisement

Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

What you can do for free today

Federal law and tools from the Federal Trade Commission cover more ground than many people realize. None of these cost anything. When used together, they close the most common entry points fraudsters target.

1) Freeze your credit

Start by freezing your credit at all three bureaus. A freeze blocks new accounts from being opened in your name. It has been free at Equifax, Experian and TransUnion since 2018. You can lift it temporarily when you need to apply for credit.

2) Get an IRS Identity Protection PIN

Next, get an Identity Protection PIN from the IRS at irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin. This six-digit code blocks fraudulent tax returns filed using your Social Security number. The IRS issues a new one each year.

3) Check your credit reports regularly

You should also check your credit reports regularly. Equifax, Experian and TransUnion now offer free weekly access through AnnualCreditReport.com. Checking once every few months can help you catch suspicious activity early.

Advertisement

4) Use IdentityTheft.gov for recovery

It also helps to bookmark IdentityTheft.gov. The site creates a personalized recovery plan, generates the affidavit creditors require and provides prefilled dispute letters.

5) Opt out of prescreened credit offers

Another simple step is opting out of prescreened credit offers. This removes you from mailing lists lenders use for unsolicited credit and insurance offers. You can do this online at OptOutPrescreen at optoutprescreen.com, which is run by the major credit bureaus. The process takes just a few minutes. Choose a five-year opt-out for a quick fix, or print and mail the form for a permanent opt-out. Once processed, you should see fewer “pre-approved” offers in your mailbox. 

Free tools can help protect your identity, but they often require time, effort and ongoing attention. (Nastasic/Getty Images)

6) Turn on two-factor authentication

Finally, turn on two-factor authentication (2FA) for every financial, government and benefits account. Even if someone steals your password, they cannot access your account without the second factor.

For many people, these steps create a strong baseline.

Advertisement

When DIY identity monitoring falls short

The do-it-yourself approach works until something goes wrong. That is where the gap becomes clear.

According to the Identity Theft Resource Center’s 2025 Consumer Impact Report, the average victim spent more than 200 hours and $1,343 out of pocket recovering from identity theft. About one in five reported losses above $100,000. Many also reported significant emotional stress.

The financial impact adds up quickly at a national level. A February 2026 report from the U.S. Senate Joint Economic Committee estimates identity theft tied to major data broker breaches has cost Americans more than $20 billion over the past decade. That estimate includes incidents like Equifax, Exactis, National Public Data and TransUnion.

Free tools also have clear limits. They will not monitor the dark web for your data or remove your personal details from data broker sites. They also cannot contact creditors or dispute fraudulent accounts on your behalf.

Instead, you handle every step yourself. IdentityTheft.gov gives you a roadmap, but you still have to make the calls, file the paperwork and follow up repeatedly.

Advertisement

SSA IMPERSONATION SCAMS ARE GETTING MORE PERSONAL

What paid identity protection services add

For anyone whose data was exposed in a breach like Conduent or National Public Data, free tools alone leave real gaps. That is where paid identity protection services come in.

These services run continuous scans for your name, Social Security number, email and bank accounts on the dark web, as well as across data broker and people search sites that resell your home address and family ties. They submit opt-out requests on your behalf and repeat the process when your information shows up again. When fraud happens, many services assign a case manager who works with credit bureaus, banks and creditors to help resolve the issue.

Some plans also include identity theft insurance and dedicated fraud resolution support, which can help cover certain losses and reduce the time it takes to recover.

Paid services have limits. No service can prevent every breach, and even the best monitoring only helps shorten recovery time. The do-it-yourself approach can still work if you are comfortable managing your own checklist. However, for families, for anyone already exposed in past breaches and for those who want less hands-on involvement, adding a paid service on top of free protections can make the process easier to manage.

Advertisement

See my tips and best picks on Best Identity Theft Protection at CyberGuy.com

Paid identity protection services can monitor, alert and step in when fraud happens, helping reduce the burden on you. (Nikolas Kokovlis/NurPhoto)

Kurt’s key takeaways

Most people can handle the basics of identity protection on their own, at least at first. Free tools cover the biggest risks and help block common types of fraud. However, the situation changes once your data is exposed in a major breach. At that point, monitoring, cleanup and follow-up can turn into a long and frustrating process. That is where paid services can make a real difference. They reduce the workload, track exposure across more sources and step in when fraud happens. Still, no service eliminates risk completely. The decision comes down to how much time you want to invest and how much support you would need if something goes wrong. For many households, a layered approach works best. Start with the free protections, then decide if adding a paid service fits your situation.

If your identity were stolen tomorrow, would you have the time and patience to fix it yourself?  Let us know by writing to us at CyberGuy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Advertisement

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com.  All rights reserved. 

Continue Reading
Advertisement

Trending