Connect with us

Technology

Your phone shares data at night: Here’s how to stop it

Published

on

Your phone shares data at night: Here’s how to stop it

NEWYou can now listen to Fox News articles!

If your smartphone stays on your bedside table overnight, it stays busy long after you fall asleep. 

Even while it appears idle, your phone continues to send and receive data in the background. Some of that activity is expected. Your device checks for security patches, syncs system settings and keeps essential services running. Other data transfers are far less obvious and far less necessary.

Experts warn that smartphones routinely transmit tracking and advertising signals without you fully realizing it. In many cases, that data includes information that should only be shared with clear and informed consent.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

SUPER BOWL SCAMS SURGE IN FEBRUARY AND TARGET YOUR DATA

Even while you sleep, a nearby smartphone can continue sending and receiving data in the background. (Getty Images/monkeybusinessimages)

What data your phone sends while you sleep

Your phone is not just charging overnight. It operates in a continuous data loop that generally falls into two categories.

Legitimate system data

This includes updates, crash reports and basic diagnostics. Operating systems rely on this information to fix bugs, improve stability and protect against security threats. In most cases, this data collection is disclosed and configurable.

Advertisement

Tracking and advertising data

This is where concerns grow. Smartphones also transmit location signals, device identifiers, advertising IDs, usage patterns and app behavior data. Companies combine this information to build detailed user profiles and deliver targeted ads that promise higher engagement. The problem is that the line between necessary diagnostics and commercial tracking is often blurry. Many of us never realize how much data flows out of our phones overnight.

TIKTOK AFTER THE US SALE: WHAT CHANGED AND HOW TO USE IT SAFELY

Phones often stay active overnight, syncing apps, checking networks and refreshing data unless you limit background activity. (Kurt “CyberGuy” Knutsson)

What we know about phone tracking today

Independent academic investigations found that some Android devices transmitted data linked to tracking behaviors involving major companies like Meta and Yandex. The research, conducted by teams from IMDEA Networks Institute and European universities, showed that certain apps and services continued communicating with external servers even after users attempted to limit tracking. The researchers observed data flows that could link web activity with app identifiers, raising concerns about how effectively privacy controls were enforced at the system level.

Advertisement

There is also long-standing concern around smartphones appearing to “listen” to conversations. While no public evidence shows that phones actively record private speech for advertising, many users report ads that closely mirror recent conversations. At a minimum, aggressive data collection combined with location, app usage and search history can make these moments feel unsettling.

Despite years of scrutiny, most smartphones still operate this way today. The good news is that you can reduce how much data leaves your device.

How to protect yourself from overnight data sharing

You do not need to give up your smartphone to regain control. Small settings changes can make a real difference.

1) Review app permissions

Start with your installed apps. Focus on those with access to your location, microphone, camera and tracking data. Only allow sensitive permissions while the app is in use. Be especially cautious with apps that run continuously in the background.

How to review app permissions on iPhone 

Advertisement
  • Open Settings
  • Tap Privacy & Security
  • Tap Location ServicesMicrophoneCamera or Tracking
  • Select an app from the list
  • Choose While Using the App or Never when available

For tracking controls:

  • Go to Settings
  • Click Privacy & Security
  • Tap Tracking
  • Turn off Allow Apps to Request to Track

This prevents apps from accessing your advertising identifier and sharing activity across apps and websites.

AI WEARABLE HELPS STROKE SURVIVORS SPEAK AGAIN

Turning off app tracking on your iPhone blocks apps from linking your activity across other apps and websites. (Kurt “CyberGuy” Knutsson)

How to review app permissions on Android

Settings may vary depending on your Android phone’s manufacturer.

  • Open Settings
  • Tap Privacy & Security or Security and privacy 
  • Click More privacy settings 
  • Tap Permission Manager
  • Select LocationMicrophoneCamera or Sensors
  • Tap an app and choose Allow only while using the app or Don’t allow

To review background access:

  • Go to Settings
  • Click Apps
  • Select an app
  • Tap Mobile data & Wi-Fi
  • Turn off Background data if the app does not need constant access

This limits silent data transfers when the app is not actively open.

2) Limit background activity

Disabling background activity reduces how often apps sync data when you are not using them. This also limits automatic cloud activity. Keep in mind that this may affect real-time backups or notifications. Weigh the convenience against the privacy trade-off.

Advertisement

How to limit background activity on iPhone

Turn off Background App Refresh

  • Open Settings
  • Tap General
  • Tap Background App Refresh
  • Tap Background App Refresh at the top
  • Select Off or Wi-Fi

To disable it for specific apps:

  • Stay on the Background App Refresh screen
  • Toggle off apps that do not need to update in the background

This prevents apps from quietly syncing data when they are not open.

How to limit background activity on Android 

Settings may vary depending on your Android phone’s manufacturer.

Restrict background data

Advertisement
  • Open Settings
  • Tap Apps
  • Select an app
  • Tap Mobile data & Wi-Fi
  • Turn off Background data

Restrict background battery usage

  • From the app’s settings screen, tap Battery
  • Select Restricted or Limit background usage

This reduces background syncing and prevents apps from running silently when you are not actively using them.

3) Turn off personalized advertising

Personalized ads rely on device identifiers and activity data collected across apps. Turning this off limits how your behavior is used for ad targeting, even when your phone is idle.

How to turn off personalized ads on iPhone

  • Open Settings
  • Tap Privacy & Security
  • Tap Tracking
  • Turn off Allow Apps to Request to Track

To limit Apple ads:

  • Go to Settings
  • Click Privacy & Security
  • Tap Apple Advertising
  • Turn off Personalized Ads

This reduces ad targeting based on your activity within Apple services.

TAX SEASON SCAMS SURGE AS FILING CONFUSION GROWS

Disabling personalized ads reduces how your behavior is used to target ads, even when your phone is idle. (Kurt “CyberGuy” Knutsson)

How to turn off personalized ads on Android

Advertisement

Settings may vary depending on your Android phone’s manufacturer.

  • Open Settings
  • Tap Privacy & Security or Security and privacy
  • Click More privacy settings
  • Tap Ads or Advertising
  • Tap Delete advertising ID or Opt out of Ads Personalization
  • Click Delete advertising ID

You can also reset your advertising ID from this menu to break the link between past activity and future ads.

This limits how apps and advertisers track behavior across apps and websites.

4) Consider a VPN

A reputable VPN can help obscure your IP address and reduce certain forms of network-based tracking. It does not stop all data collection, but it adds a layer of protection, especially on shared or public networks.

For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Remove your data from broker sites

Even if you lock down your phone, much of your personal information already exists online. Data brokers collect and sell details like your name, address, phone number and browsing behavior.

Advertisement

Using a reputable data removal service can help locate and remove your information from these sites. This reduces how easily advertisers and third parties can link your phone activity to your real identity.

For ongoing protection, these services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Use airplane mode or power off at night

If overnight data sharing concerns you, the simplest option is also the most effective. Turning your phone off or using airplane mode cuts off wireless communication while still allowing alarms to work.

Advertisement

How to turn on airplane mode on iPhone

  • Open Control Center by swiping down from the top right corner
  • Tap the airplane icon so it turns orange
  • Confirm that cellular, Wi Fi and Bluetooth turned off

How to turn on airplane mode on Android

Settings may vary depending on your Android phone’s manufacturer.

  • Swipe down from the top of the screen to open Quick Settings
  • Tap the airplane mode icon
  • Check that mobile data, Wi Fi and Bluetooth are disabled

If you still want Bluetooth for a watch or headphones, you can turn it back on manually after enabling airplane mode. This keeps most background data transfers blocked while you sleep.

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Your smartphone works around the clock, even when you do not. Some background data sharing keeps your device secure and functional. Other data collection exists primarily to fuel tracking and advertising. The key is awareness and control. By tightening permissions, limiting background activity and disabling ad personalization, you reduce how much of your personal data leaves your phone while you sleep. Privacy is not about fear. It is about informed choices.

Advertisement

Do you leave your phone fully on overnight, or will tonight be the night you finally switch it off? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Copyright 2026 CyberGuy.com. All rights reserved.  

Advertisement

Technology

Dyson’s powerful 360 Vis Nav robovac is down to $279.99 for a limited time

Published

on

Dyson’s powerful 360 Vis Nav robovac is down to 9.99 for a limited time

If you’re tired of running your vacuum multiple times just to get the dirt and debris out of the carpets in your living room, Dyson’s 360 Vis Nav is worth a look. It’s one of the more powerful robot vacuums currently available, and now through May 11th (or while supplies last), it’s on sale at Woot for an all-time low of $279.99 ($919 off) with a full two-year warranty.

The last-gen 360 Vis Nav offers a whopping 65 air watts of suction, allowing it to pull dirt, dust, and pet hair from carpets impressively well. In her brief time testing the robovac, my colleague Jennifer Pattison Tuohy said the Dyson “demolished a pile of dry oatmeal in seconds,” adding that she briefly worried it might even suck up the tassels on her large rug (it didn’t). By comparison, many robot vacuums — including Dyson’s new $1,200 Spot + Scrub AI — require multiple passes to fully eradicate the same kind of mess on your floor.

What’s more, the robovac’s small, D-shaped design and the location of its ultra-fluffy brush allow it to dig into edges and corners more effectively than many of the more roundish robot vacuums, while its lower profile lets it easily get under most beds and sofas. The roomy 500ml dustbin also means you likely won’t need to empty it too often, while Dyson’s built-in handle and terrific quick-release button make removing said bin a relatively simple task when it’s time to do so.

While it is undeniably powerful, it’s worth noting that the 360 Vis Nav lacks a few features found on some of its more modern rivals. Although its navigation worked well enough during our testing, it lacks AI-powered obstacle avoidance and doesn’t come with a self-emptying dock. Battery life is also relatively short at around 65 minutes per charge. Nonetheless, if your top priority is quickly removing dust, dirt, and pet hair from carpets without multiple passes, the Dyson remains an option worth considering, especially at this discounted price.

Continue Reading

Technology

Global scam crackdown leads to 276 arrests

Published

on

Global scam crackdown leads to 276 arrests

NEWYou can now listen to Fox News articles!

We’ve often warned you about romance scams and crypto “investment” opportunities that feel too good to pass up. Now, there’s a major update that shows just how organized these operations have become.

The Department of Justice and Federal Bureau of Investigation announced a sweeping international operation that led to at least 276 arrests and the shutdown of multiple scam centers tied to cryptocurrency fraud. These networks targeted Americans and drained millions of dollars from victims.

The operation spanned continents and involved coordinated efforts by law enforcement and tech companies.

Sign up for my FREE CyberGuy Report

Advertisement
  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

TOP 5 SCAMS SPREADING RIGHT NOW

The Department of Justice and FBI say international scam networks used romance and fake crypto investment schemes to steal millions from victims. (Helena Dolderer/Picture Alliance)

How the cryptocurrency scam crackdown unfolded

Authorities worked with partners around the world, including the Dubai Police and law enforcement agencies in Thailand and beyond. Together, they dismantled at least nine scam centers linked to large-scale crypto fraud.

Several suspects now face federal charges in the United States, including wire fraud and money laundering. Investigators say these operations functioned like businesses, with recruitment, management layers and structured systems designed to deceive victims.

Officials made it clear that this effort sends a message. Fraud crosses borders, and enforcement is now doing the same.

How crypto investment scams target victims

These schemes often follow a pattern known as “pig-butchering.” It is a slow, calculated tactic that builds trust before any money is involved.

Advertisement

A scammer may reach out through social media or a messaging app and start a casual conversation. Over time, that interaction turns more personal. In some cases, it feels like a real relationship. Once trust is established, the topic shifts toward investing, often framed as a unique crypto opportunity.

Victims are guided through setting up accounts and transferring funds to platforms that appear legitimate. The dashboards may even show fake gains to build confidence. At that point, control of the money is already gone. Funds are quickly moved through multiple accounts and eventually end up with the scammers.

Many victims are encouraged to keep going, sometimes borrowing money or taking out loans to invest more. By the time the truth becomes clear, the losses can be devastating.

How Meta Platforms, Inc. helped track scam networks

Meta Platforms, Inc. played a key role in the investigation by providing data that helped law enforcement identify and track these networks.

The company says it has taken aggressive action across its platforms. In 2025 alone, Meta removed more than 159 million scam ads and shut down 10.9 million accounts linked to scam centers. More recently, it disabled over 150,000 accounts connected to these networks as part of a coordinated enforcement effort.

Advertisement

“Meta is committed to combatting online fraud and scams, and we are proud to partner with law enforcement in these efforts,” Chris Sonderby, Meta’s vice president and deputy general counsel, said. “We applaud the DOJ and FBI for their leadership in holding criminal scammers accountable and protecting American consumers.”

FROM FRIENDLY TEXT TO FINANCIAL TRAP: THE NEW SCAM TREND

Federal authorities announced a sweeping international crackdown that led to at least 276 arrests tied to cryptocurrency scam centers targeting Americans. (Kurt “CyberGuy” Knutsson)

New tools to stop cryptocurrency scams in real time

Meta is also rolling out new protections across its apps to help users spot scams before they get pulled in.

On Facebook, users may see alerts tied to suspicious friend requests, especially when an account shows unusual behavior such as limited connections or inconsistent location details. 

Advertisement

On WhatsApp, new warnings are designed to prevent scammers from linking their own devices to someone else’s account, giving users a chance to pause before approving a risky request.

Messenger is also expanding its scam detection tools. When a conversation shows patterns linked to common fraud tactics, users may receive prompts that explain the risk and suggest actions like blocking or reporting the account.

Why this cryptocurrency scam crackdown matters to you

This operation highlights how organized these scam networks have become. These are not random messages from a single person. They are coordinated groups running structured operations designed to build trust, create urgency and move money quickly.

Even with hundreds of arrests, the threat remains. New networks continue to emerge, often using the same playbook with slight changes. That means staying informed is still one of the most effective ways to protect yourself. 

Ways to stay safe from cryptocurrency scams

Scammers follow familiar patterns, which means there are clear warning signs you can watch for and simple steps you can take to protect yourself. 

Advertisement

1) Slow down unexpected connections

If someone you do not know reaches out and quickly builds a personal connection, slow things down and question the situation. Scammers rely on momentum, so taking a pause can help you spot inconsistencies. 

2) Verify investment platforms before sending money

Before sending money to any investment platform, take time to verify that it is legitimate. A professional-looking website or app does not guarantee it is real. Look for independent reviews and official registration details.

3) Avoid sending crypto to unknown sources

Avoid sending cryptocurrency to individuals or platforms you cannot confirm. Once those transactions go through, they are extremely difficult to recover.

4) Watch for pressure and urgency

Be aware of pressure. If someone pushes you to act quickly or invest more, that urgency is often a warning sign.

5) Use strong antivirus protection

Strong antivirus software can help block malicious links, fake investment sites and other threats before they reach you, adding another layer of defense against scam attempts. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Advertisement

THE ONE THING SCAMMERS CHECK BEFORE TARGETING YOU ONLINE

Meta said it removed more than 159 million scam ads in 2025 and helped investigators track networks tied to cryptocurrency fraud. (Halfpoint/Getty Images)

6) Limit your personal data exposure

Scammers often rely on publicly available information to build trust. Reducing how much of your personal data appears online by using a data removal service can make it harder for them to target you in the first place. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.

7) Strengthen your account security

It also helps to strengthen your digital security. Enable two-factor authentication (2FA) on your accounts and use trusted security tools to reduce exposure to malicious links and messages.

8) Report scams as soon as possible

If you believe you have been targeted or defrauded, report it to the FBI’s Internet Crime Complaint Center at ic3.gov as soon as possible.

Advertisement

Kurt’s key takeaways

This global crackdown is a meaningful step forward. It shows what can happen when law enforcement, tech companies and international partners work together. At the same time, these scams are not going away. The tactics will continue to evolve, and new networks will take the place of those that were shut down. Awareness and caution remain your strongest defenses.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

We report a lot about scams but not so much about scammers getting caught. Does this make you feel like real progress is being made in stopping them? Let us know by writing to us at CyberGuy.com.

Sign up for my FREE CyberGuy Report

  • Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
  • For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com trusted by millions who watch CyberGuy on TV daily.
  • Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.

Copyright 2026 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Asus chases Elgato with its own secondary touchscreen display

Published

on

Asus chases Elgato with its own secondary touchscreen display

Asus’s latest gaming monitor is a little smaller than usual. The ROG Strix XG129C, announced on Friday, is a 12.3-inch touchscreen IPS display that’s intended to be a sidekick for a larger main monitor, similar to the 14.1-inch secondary display in the 2020 Asus ROG Zephyrus Duo 15. It’s a slightly smaller competitor to Corsair’s Xeneon Edge, which has a 14.5-inch display, but the same 720p resolution.

Asus says the XG129C covers 125 percent of the sRGB color gamut and 90 percent of the DCI-P3 color gamut. It also comes with a one-year subscription for the hardware monitoring tool AIDA64 Extreme, which would usually cost $65. Besides acting as a performance monitor for your PC, sidekick displays like this can also be handy as an extension for streaming or editing setups, much like Elgato’s Stream Deck.

Along with the little XG129C, Asus also announced the ROG Strix OLED XG34WCDMS, a 34-inch RGB Tandem QD-OLED gaming monitor. It features a 280Hz refresh rate and a 3440 x 1440p resolution, and, according to Asus, covers 99 percent of the DCI-P3 color gamut. Asus has not yet officially announced pricing for either display.

Continue Reading
Advertisement

Trending