Connect with us

Technology

Your car is a target — don’t get hacked or duped

Published

on

Your car is a target — don’t get hacked or duped

Ever heard of wrapping your key fob in aluminum foil? It sounds out there, but it’s a smart move.

Join 509,000 people who give this free tech newsletter a 4.92/5 star rating.

Sign up now and don’t be left behind.

Your key fob’s signal is surprisingly easy for criminals to intercept. That lets them open your car without setting off any alarms. If you have a true keyless car model, they might be able to just drive away. Wrapping it in foil blocks the signals. 

It’s no surprise your car is a target. It’s probably one of the most valuable things you own. Let’s look at a few scams right now targeting car owners and those shopping for a new ride.

Advertisement

X, FORMERLY TWITTER, IS TURNING ON PORN — BUT YOU CAN BLOCK IT

Cloned VIN scam

A Boston woman paid around $40,000 for an SUV on Facebook Marketplace. The Carfax report looked legit, and Maril Bauter received a clean title from the licensing agency. It was smooth sailing for almost three years … until the police seized the vehicle. 

When she bought the 2019 Toyota 4Runner, it was stolen. Bauter was the victim of a VIN cloning scam.

It all starts with a stolen car or perhaps one totaled out by an insurance company. The scammer finds the same make, model and year and takes the VIN from that car. It’s as easy as snapping a picture through the windshield.

Advertisement

The scammer then changes the VIN plate on the stolen or totaled vehicle to match the one on the clean vehicle. Now, the scammer can create fake documents and complete the sale.

Unfortunately, it’s hard to spot these scams. If you’re in the market and buying from a private seller:

  • Use a site like Carfax or AutoCheck to look for anything strange with the VIN.
  • Compare the VIN on the car (near the windshield and in the door) with the title and all the other documents the seller provides.
  • Look for signs the VIN plate has been switched out. Run your finger over that area.
  • Consider paying a mechanic or car inspection service to look for major issues or red flags.

Bauter’s story had a happy ending: Her insurance company paid out her claim on the stolen vehicle. That said, not every victim is this lucky so be sure to do your due diligence if you’re in the market for a new vehicle.

HANDY HIDDEN FEATURES ON INSTAGRAM, X AND FACEBOOK

Check out a recent Kim Komando Podcast episode: Insurance companies use drones to look at your home

Advertisement

Not the only car scam on Facebook Marketplace

An 18-year-old was arrested in Fort Lauderdale for posting his neighbors’ cars for rent on FB Marketplace. The scammer collected deposits and then sent renters to the car owners’ real addresses. 

One neighbor said eight people showed up at her house over three weeks. Another got his car smashed by an angry would-be renter. 

  • Never, ever pay ahead for a rental through a community sales platform. Really, it’s best to stick with a legitimate rental company.

A throwback attack

Cybercriminals can also employ old-school denial-of-service attacks to overwhelm your vehicle and potentially shut down critical functions like airbags, anti-lock brakes and door locks.

(ISSOUF SANOGO/AFP via Getty Images)

Advertisement

This attack is feasible since some connected cars have built-in Wi-Fi hotspot capabilities. As with regular home Wi-Fi networks, they can even steal your data if they infiltrate your car’s local network.

Also, it’s a matter of physical safety. Remember, multiple computers and Engine Control Modules run modern cars. If hackers can shut these systems down, they can put you in grave danger.

  • Regularly changing your car’s onboard Wi-Fi network password is a must. Turning off your car’s Bluetooth and Wi-Fi is also a good idea when not in use, too.

The built-in monitoring is a security risk, too

Every newer car has an on-board diagnostics port. This interface allows mechanics to access your car’s data, read error codes and statistics and even program new keys.

Anyone can buy exploit kits that can utilize this port to replicate keys and program new ones to use them for stealing vehicles.

AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER

Advertisement
  • Always go to a reputable mechanic. A physical steering wheel lock can also give you extra peace of mind.

Mobile malware

Another old-school internet hack reaches connected cars, specifically models with internet connectivity and built-in web browsers.

A woman working on her laptop (Kurt “CyberGuy” Knutsson)

Crooks can send you emails and messages with malicious links and attachments that can install malware on your car’s system. Anything is possible once the malware is installed. Car systems don’t have built-in malware protections (yet), so this can be hard to spot.

  • Practice good computer and internet safety even when connected to your car. Never open emails and messages nor follow links from unknown sources.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Advertisement

Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

Technology

Super Bowl LX ads: all AI everything

Published

on

Super Bowl LX ads: all AI everything

Super Bowl LX is nearly here, with the Seattle Seahawks taking on the New England Patriots. While Bad Bunny will be the star of the halftime show, AI could be the star of the commercial breaks, much like crypto was a few years ago.

Super Bowl LX is set to kick off at 6:30PM ET/3:30PM PT on Sunday, February 8th at Levi’s Stadium in Santa Clara, California.

Continue Reading

Technology

How to protect a loved one’s identity after death

Published

on

How to protect a loved one’s identity after death

NEWYou can now listen to Fox News articles!

When someone you love dies, the to-do list can feel endless. There are legal steps, financial paperwork and emotional weight all happening at once. What many families do not realize is that identity protection rarely makes those lists, even though it should.

Scammers actively target the identities of people who have died. They rely on delays, data gaps and the assumption that someone else is handling it. Janet from Indiana recently reached out with a question many families quietly worry about but rarely ask.

My husband just passed away in December. There are lists upon lists of things to do to wrap up his estate, but nothing that tells me how to lock down his identity now that he’s gone so that fraudsters cannot use it. Maybe our government is efficient enough to report to all of the credit bureaus that he is deceased, but I don’t want to bet my financial security on it. We both have our credit frozen with all three agencies, but is there more that I should do? Thank you.

— Janet in Indiana

Janet’s instincts are exactly right. The system often does not work as cleanly as people expect.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

MICROSOFT CROSSES PRIVACY LINE FEW EXPECTED

Scammers often look for recently deceased names because they know systems do not update instantly and families are overwhelmed.   (Kurt “CyberGuy” Knutsson)

What the government and credit bureaus do and don’t do

When someone dies, Social Security is usually notified by the funeral home. That step helps, but it does not automatically secure a person’s financial identity.

Here is what often surprises families:

Advertisement
  • Credit bureaus are not synchronized in real time
  • A death notice does not instantly stop fraud attempts
  • Scammers specifically target recently deceased individuals
  • Gaps between systems create opportunities for misuse

In short, relying on automation alone leaves room for problems.

AI DEEPFAKE ROMANCE SCAM STEALS WOMAN’S HOME AND LIFE SAVINGS

Credit freezes and alerts help, but they do not stop every attempt to misuse personal information after a death.  (Kurt “CyberGuy” Knutsson)

What you’ve already done right

Before adding more steps, it matters to acknowledge what Janet already did correctly.

  • Credit freezes with all three bureaus
  • Early awareness of identity risks
  • Taking action before fraud appears

When speed matters, credit locks — different from freezes — give you instant on/off control. That combination puts someone well ahead of most families.

Steps to protect a loved one’s identity after death

Once the immediate paperwork is underway, these practical steps help close the gaps scammers look for. None of them is super complicated, but together they create a much stronger layer of protection.

1) Add a deceased flag to credit files

Even with a credit freeze in place, this step adds another layer of protection that lenders see immediately.

Advertisement

Contact Equifax, Experian and TransUnion and ask them to mark the credit file as deceased. Each bureau may request:

A copy of the death certificate

  • Proof that you are the surviving spouse or executor

Once the flag is added, fraudulent applications become much harder to process because lenders are alerted upfront. A credit lock provides the same blocking effect, but with real-time control; this can matter when you’re managing a deceased estate or responding quickly to lender requests.

2) Monitor identity activity while you manage everything else

This is where many checklists fall short. Credit freezes and deceased flags help, but identity misuse can still surface in other ways.

Fraud attempts may appear as:

  • Account takeovers
  • Unauthorized credit inquiries
  • Use of personal data outside traditional credit

That is why ongoing monitoring still matters.

Why identity theft protection helps at this stage

Advertisement

Identity theft protection focuses on identity protection rather than just credit scores, which makes it especially useful after a loss.

  • Monitors for misuse tied to your loved one’s information
  • Sends alerts if something suspicious appears
  • Includes fraud support if action is needed
  • Reduces the burden of constant manual checks

One of the best parts of my pick for top identity theft service is its all-in-one approach to safeguarding your personal and financial life. It includes identity theft insurance of up to $1 million per adult to cover eligible losses and legal fees, plus 24/7 U.S.-based fraud resolution support with dedicated case managers ready to help restore your identity fast. It also combines three-bureau credit monitoring with an instant credit lock that lets you quickly lock down your Experian file right from the app.

See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.

3) Secure sensitive documents during estate administration

Estate administration often requires sharing paperwork, which is where identity leaks can happen.

Lock down and limit access to:

  • Death certificate copies
  • Social Security numbers
  • Old tax returns
  • Insurance and pension records

Only share what is required and keep track of where documents go.

MILLIONS OF AI CHAT MESSAGES EXPOSED IN APP DATA LEAK
 

Advertisement

A man types on a laptop. (Kurt “CyberGuy” Knutsson)

4) Watch mail and phone calls for warning signs

Small signals often reveal fraud attempts early.

Pay close attention to:

  • Bills or collection notices in their name
  • Credit card or loan offers
  • Bank or government letters you did not expect
  • Calls asking to verify personal information

If something feels off, pause before responding and verify the source independently.

Kurt’s key takeaways

Protecting a loved one’s identity after death is one more responsibility no one prepares you for. It is not about mistrusting the system. It is about protecting yourself during a time when you are already carrying enough. Janet’s question reflects what many families experience quietly. Identity protection does not end when life does, and scammers know that grief creates gaps. Taking a few extra steps now can spare you months or even years of stress later. You are not being overly cautious. You are being careful at a moment when the system does not always move fast enough to keep up with real life.

If you have handled an estate or are planning ahead, have you taken steps to protect a loved one’s identity after death, or is this something you are just learning about now? Let us know by writing to us at Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.  

Continue Reading

Technology

Apple might let you use ChatGPT from CarPlay

Published

on

Apple might let you use ChatGPT from CarPlay

CarPlay users could soon be able to use their chatbot of choice instead of Siri. As Bloomberg reports, Apple is working to add support for CarPlay voice control apps from OpenAI, Anthropic, Google, and others. Previously, users who wanted to access third-party chatbots in the car would need to go through their iPhone, but soon they may be able to talk with ChatGPT, Claude, or Gemini directly in CarPlay.

However, Apple reportedly “won’t let users replace the Siri button on CarPlay or the wake word that summons the service.” So, users will need to manually open their preferred chatbot’s app. Developers will be able to set their apps to automatically start voice mode whenever they’re opened, though, which could help streamline the experience.

According to Bloomberg, the addition of third-party chatbots in CarPlay could roll out “within the coming months,” but hasn’t been officially announced yet. The rumored update follows Apple’s announcement last month that Google Gemini will power an updated version of Siri, which is slated to arrive sometime this year.

Continue Reading

Trending