Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Energy-saving scam uses Elon Musk’s name – Here’s the truth

2 February 2025 at 10:00

Elon Musk, known for leading companies like Tesla, SpaceX, Neuralink and xAI and buying and rebranding Twitter as X, often finds his name linked to innovation and futuristic ideas. But his reputation also makes him a prime target for scammers.

In the past, fraudsters have used Musk’s name in cryptocurrency schemes. Now, a new scam is making the rounds. This time, scammers are promoting bogus "energy-saving" devices, falsely associating Musk with these products to gain credibility. These devices, which don’t work as advertised, are being marketed as revolutionary solutions, duping people into spending money on what is essentially a scam.

We received this email from Rick in Wilkesboro, North Carolina: "I’ve been receiving emails offering an energy-saving device developed by Elon Musk. It claims the device can reduce energy bills by 50%. I never attempted to contact anyone associated with Elon Musk, nor have I done any internet searches for such a device. Are these emails legit or another attempt by scammers hoping I click on their links?"

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Rick, it sounds like those emails are likely scams. There have been numerous reports of scammers using Elon Musk's name to promote fake energy-saving devices. These scams often claim that the device can drastically reduce energy bills, but there is no evidence that Elon Musk or any of his companies are involved in such products.

Let's dive into how this scam works and share some ways you can stay safe.

The Elon Musk energy-saving scam works by using flashy online ads, unsolicited emails and other deceptive tactics to lure victims. Scammers promote so-called "revolutionary" devices through social media, pop-ups, emails and even search engine ads, claiming the products are backed by Musk.

These ads often include fake customer reviews, exaggerated claims of slashing electricity bills by 50% or more and time-limited discounts to create urgency. Names of devices advertised in these scams include the Power Pro Save, Heunwa Power Save, Stop Watt, Miracle Watt, True Watt, Real Watt, Watt Rescue, Esaver Watt, Pro Power Save, Voltmod and more. 

Clicking on these ads leads you to sales websites designed to look legitimate. They feature fake logos, doctored before-and-after photos and bogus celebrity endorsements to build trust. The sites throw around pseudo-scientific jargon like "stabilizing electrical currents" or "rebalancing loads" to sound convincing. They also use tactics like showing inflated "regular" prices crossed out to make the current offer seem like a huge bargain.

If you look closely, though, the red flags are clear. These sites lack basic details like a company address, contact number or business registration information. Instead, they push you to place an order through an online form, demanding full payment upfront via credit card or PayPal.

After paying, customers might receive a cheap, non-functional plastic device, or sometimes nothing at all. These devices don’t reduce electricity usage. They might even waste more power. But by the time you realize it, the scammers have already pocketed your money.

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

Over the years, plenty of power-saving scams have promised to cut down or even eliminate your electricity bill by simply plugging in their devices. The reality is that there’s no device you can plug in that will actually reduce your electricity usage or lower your household bill.

These products often claim to "stabilize voltage" or "reduce power waste." While voltage stabilization can be useful in industrial settings, it doesn’t make much difference for typical home appliances. Most household appliances are already designed to run efficiently without the issues these devices claim to fix.

If you’re serious about saving on electricity, focus on practical solutions like upgrading to energy-efficient appliances, using smart home devices or adjusting your energy usage schedule.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME

Too good to be true: Claims of reducing energy bills by 50% or more are often exaggerated and unrealistic.

Unsolicited emails: Receiving emails out of the blue, especially when you haven't shown interest in such products, is a common tactic used by scammers.

Use of celebrity names: Scammers frequently use well-known names like Elon Musk to lend credibility to their schemes.

Suspicious links: Be cautious of clicking on links in unsolicited emails. They can lead to phishing sites designed to steal your personal information. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

1. Verify the email: Phishing emails are a common tool scammers use to trick people into buying fake products or giving away personal information. These emails often look like they’re from legitimate sources, but they contain links that lead to fraudulent websites or prompt you to download malicious attachments. Always check the sender's email address and look for signs of a fake message, like poor grammar or urgent calls to action. 

2. Verify claims: If you're curious about a product, do some research from reputable sources before taking any action.

3. Do not click links: Avoid clicking on any links or downloading attachments from these emails. Instead, hover over the link to see its true destination. This can help you identify if it leads to a legitimate site or a malicious one.

4. Have strong antivirus software actively running on your devices: Ensure you have reliable antivirus software installed on your devices. Antivirus software helps protect your devices from malware, viruses and other security threats. Regularly update the software to ensure it can detect and remove the latest threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5. Examine the website carefully: Scammers often create websites that look professional, but they’re easy to spot with a few simple checks. Look for missing or suspicious information, like the absence of a business address, phone number or business registration details. If there are fake testimonials or celebrity endorsements, that’s a red flag.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Don’t fall for "too good to be true" deals: Scammers rely on offering deals that seem too good to pass up, like massive discounts or a "limited time offer." If an ad claims you can save 50% or more on a product, be skeptical. Real, quality products usually don’t come with such extreme savings, and high-tech devices like those promoted by scammers rarely live up to the hype. If it feels like too good a deal, it probably is.

7. Watch out for unusual payment methods: One of the easiest ways to spot a scam is by how the scammers ask you to pay. If a website asks for payment upfront via credit card or PayPal with no option to verify or ship the product first, it's a major red flag. Scammers take your money upfront and have no intention of sending you anything of value. Stick to reputable payment methods that offer buyer protection and avoid sites that ask for payment without proper verification.

8. Mark spam email as junk or spam: Most email providers have a feature that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.

9. Do not share your email address publicly or with unknown sources: This can reduce the chances of your email address being collected by spammers. You can also use a disposable email or email alias for signing up for online services that you do not trust or need.

10. Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

YOUR EMAIL DIDN'T EXPIRE, IT'S JUST ANOTHER SNEAKY SCAM

Impersonation scams are a common way scammers steal your money. They often use well-known names like Elon Musk or big companies like Microsoft and Walmart to make you trust them, then trick you into giving away your financial details. To stay safe, avoid unsolicited emails or texts that promote products or offers. If you need to buy something, stick to trusted sellers like Amazon, Best Buy or other reputable platforms. Always double-check the legitimacy of any offer before making a purchase, especially if it comes from an unfamiliar source.

Have you ever encountered a scam using a well-known name or brand? What happened? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Scammers find sneaky way to bypass your iPhone's safety features

27 January 2025 at 06:00

In an alarming development, cybercriminals have devised a new method to circumvent Apple's built-in phishing protection for iMessage, potentially exposing you to malicious links and scams. This sophisticated tactic exploits a security feature designed to protect you, turning it into a vulnerability that could lead to significant personal and financial risks.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Enter the giveaway by signing up for my free newsletter.

Apple's iMessage automatically disables links in messages from unknown senders as a security measure. However, cybercriminals have found a way to exploit this protection. By instructing you to reply to the message, often with a simple "Y," the attackers can re-enable previously disabled links. This seemingly innocuous action not only activates the links but also signals to the scammers that they've found an engaged target for future attacks.

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Apple defines social engineering as a targeted attack that employs impersonation, deception, and manipulation to gain access to personal data. Scammers often pose as representatives of trusted companies, using sophisticated tactics to persuade individuals to disclose sensitive information, such as passwords and financial details. Here are some of those sneaky tactics:

The messages typically end with instructions like: "(Please reply Y, then exit the SMS, re-open the SMS activation link, or copy the link to open in Safari)."

THE ONE SIMPLE TRICK TO HELP KEEP OUT CYBER CREEPS ON IPHONE

This new tactic is part of a broader trend of smishing (SMS phishing) attacks targeting mobile users. With the increasing reliance on smartphones for various activities, including financial transactions and personal communications, these attacks pose a significant threat to users' security and privacy.

DOES MY IPHONE NEED ANTIVIRUS PROTECTION?

To safeguard against these sophisticated phishing attempts, consider the following steps.

1) Never reply to suspicious messages: Avoid responding to texts from unknown senders, especially those asking you to reply to activate links. Additionally, make sure to delete suspicious text messages and block the sender to prevent further attempts. Since the sender is not in your contact list, you can click Report Junk at the bottom of the text. Then click Delete and Report Junk. This will report the conversation as junk by sending it to your wireless carrier and Apple using your phone number.

2) Verify sender identity: Contact organizations directly through official channels if you're unsure about a message's legitimacy.

3) Be skeptical of urgency: Scammers often use urgent language to prompt quick, thoughtless actions.

4) Enable message filtering: Use your device's built-in filtering options to sort messages from unknown senders. Here are the steps:

This feature allows you to automatically sort messages from unknown senders, easily filter unread messages and manage your message inbox more efficiently.

5) Use two-factor authentication (2FA): 2FA adds an extra layer of security to your accounts by requiring a second form of verification, such as a text message or authentication app, in addition to your password. This significantly reduces the risk of unauthorized access, even if your password is compromised.

6) Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

7) Invest in personal data removal services: By reducing your online footprint, you make it harder for cybercriminals to obtain your contact information, potentially preventing them from sending you these deceptive iMessage phishing texts in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

If you suspect you've fallen victim to a smishing attack:

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

This latest trick targeting iMessage users serves as a reminder that even seemingly secure systems can be vulnerable to social engineering. By remaining cautious and following best practices for digital security, you can significantly reduce your risk of falling victim to these sophisticated phishing attempts.

What other cybersecurity challenges have you encountered with your mobile devices, and what questions do you have for us? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Don’t let this credit card fraud nightmare happen to you

26 January 2025 at 10:00

Credit card fraud has been on the rise in recent years.

The Federal Trade Commission’s most recent database indicates that 416,582 cases of credit card fraud were reported in 2024, making it one of the most common forms of identity theft. You know you've been a victim of this fraud when you notice unauthorized transactions on your credit card bill. 

These transactions are usually below $100 to avoid detection. However, sometimes they can exceed $1,000. One such incident happened with Martin from Martinsville, Virginia, when he was randomly charged $1,095 in Hong Kong.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

"Hello, I recently received a fraud alert from my credit card company that said that there was a $1,095 charge on my credit card in Hong Kong. I use my iPad and Safari browser to buy online. Can you please explain how this could happen? By the way, my credit card company canceled my credit card and will send me a new Mastercard in the mail, and I’m not responsible for the charges on my credit card. What can I do in the future to prevent this from happening again?"

I'm sorry to hear about the fraudulent charge on your credit card, Martin. It’s good that your credit card company is handling it and that you’re not responsible for the charges. For future reference, I'll be discussing how this could have happened and how to stay safe.

Credit card fraud can happen in several ways, often without you even realizing it. One common method is when fraudsters get hold of your card information through data breaches at online stores or banks, which means your details get leaked without your knowledge. 

Another sneaky tactic is phishing, where scammers trick you into giving away your card info by posing as legitimate companies via emails or fake websites. 

There’s also the risk of "card skimming," where devices at ATMs or gas stations secretly capture your card details when you swipe it. In some cases, fraudsters might also exploit weak security on public Wi-Fi networks or compromised apps to access your information while you’re shopping online.

OUTSMART THE SCAMMERS: HOW THE SNEAKY CEO APPLE GIFT CARD SCAM ALMOST GOT ME  

A report from Security.org reveals that 52 million Americans experienced credit card fraud in 2023, a figure even higher than the one reported by the FTC. With four out of five American adults owning at least one credit card, the report found that three in five cardholders have faced unauthorized charges — an estimated 128 million victims. Even more concerning, 75% of these victims reported having their credit card information stolen more than once. 

The typical unauthorized transaction is around $100, which adds up to approximately $5 billion in criminal purchases each year. Interestingly, most unauthorized transactions involve credit cards that weren’t physically lost or stolen, highlighting the growing risks of online fraud and data breaches.

THE BEST BALANCE TRANSFER CREDIT CARDS 2025

Data breaches are one of the main ways credit card fraud happens. Hackers often get unauthorized access to sensitive information stored by businesses or institutions. When a retailer, financial institution or online store experiences a data breach, the hackers usually go after the payment systems where customer credit card details are kept.

If these systems aren’t properly secured, hackers can grab things like credit card numbers, expiration dates and sometimes even security codes. Once they have that info, they can either use it themselves or sell it to others.

But it’s not just credit card information at risk. Data breaches can also expose personal details like names, email addresses and phone numbers. Scammers can then use this stolen info to launch phishing attacks, pretending to be trusted companies and tricking you into giving away more sensitive information.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

This is why identity theft monitoring is so important. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of some identity theft protection services is that they have identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

HOW TO FIGHT BACK AGAINST DEBIT CARD HACKERS WHO ARE AFTER YOUR MONEY

1. Notify your credit card issuer immediately: If you notice fraudulent charges on your credit card, start by calling the number on the back of your credit card. From there, you should get more detailed information on what to do next.

2. Monitor your statements regularly: One of the best ways to catch credit card fraud early is to keep an eye on your statements. Review your transactions regularly to spot any unfamiliar charges. The sooner you notice something suspicious, the quicker you can report it to your credit card company and prevent further damage.

3. Regularly check your credit report: In addition to monitoring your credit card statements, periodically review your credit report to catch any unauthorized accounts opened in your name.

4. Use strong, unique passwords: Always use strong, unique passwords for your online accounts, especially those that store payment details. Avoid using easily guessable information, and consider using a password manager to store and generate secure passwords. This reduces the chances of fraudsters accessing your accounts.

5. Use credit card alerts: Set up transaction alerts with your credit card company. This way, you’ll receive a notification via email or text for every transaction made with your card. If you receive an alert for a purchase you didn’t make, you can take immediate action to report it and prevent further charges.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

6. Be Cautious with public Wi-Fi: Avoid making purchases or entering sensitive information when connected to public Wi-Fi networks because they’re often not secure. If you need to make an online purchase while on the go, consider using a VPN (Virtual Private Network) to encrypt your connection and keep your credit card details safe from hackers. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices 

7. Don't store credit card info on browsers and websites: Storing your credit card information on browsers or websites can make it convenient, but it also exposes you to a higher risk of fraud. If your browser or the website’s security gets compromised, hackers could gain access to your saved card details. To stay safe, avoid saving your credit card information and manually enter it each time you make a purchase. If a site offers to save your details for future use, think twice before accepting. It's better to take the extra step to enter your information each time, ensuring your data stays secure.

8. Use EMV chip technology: When making in-person purchases, always use the chip reader instead of swiping your card. Chip technology provides an extra layer of security against fraud.

9. Be wary of phishing attempts and have strong antivirus software: Be cautious of unsolicited emails, texts or phone calls asking for your credit card information. Legitimate companies typically don't request sensitive information through these channels. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

10. Keep your card in sight: When using your card in restaurants or stores, try to keep it within view. This reduces the risk of someone copying your card details.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

It's clear that credit card fraud is more prevalent than ever, affecting millions of Americans each year. The good news is that there are effective steps to protect yourself from becoming a victim. By staying vigilant and employing best practices — like monitoring your statements and using strong passwords — you can significantly reduce your risk. Remember, awareness and proactive measures are your best defenses against credit card fraud.

Have you or someone you know ever experienced credit card fraud, and how did it impact you? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Best home inventory apps to protect your property in case of emergency

22 January 2025 at 10:00

The recent disasters sweeping the nation, from the torrential floods in North Carolina to the fires still raging in Southern California, showed how vital it is to have an evacuation plan because you might only have mere seconds to determine which items to take with you as you evacuate. 

While caring for your loved ones during this extremely stressful time should be a top priority, it is unavoidable that you must rebuild your home and life, which can mean having to provide detailed accounts of what you lost to your insurance provider. 

Trying to figure out what to take when you are given seconds or minutes to evacuate or having to file detailed insurance claims afterward can be a painful and confusing process.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Home inventory and restoration apps can provide you with a tool to itemize and track every item in your home. Not only can these apps help you stay organized and fiscally responsible for everyday home projects, but they can also help you easily determine what you need to grab and where it would be when you have limited time to grab items to take with you when you evacuate. It is important to determine where and what to prioritize, especially if your home is at risk. 

These apps can centralize all your home information so that you can stay within budget for home projects and maintenance work, and they can help you should you ever have to submit a claim after any disaster. It can also help you keep your home safer with routine maintenance. Additionally, creating a home inventory can help you determine if you have the appropriate amount of insurance coverage. Some apps allow you to upload important documentation for your home in general or specific items. This means if you ever deal with the worst-case scenario and cannot grab all the important home documents, your apps will have them stored for you and accessible by phone or computer.

Here are the top picks for apps that are best at keeping track of your home before or after a disaster.

TOP FIREPROOF BAGS, ORGANIZERS AND SAFES TO PROTECT YOUR VITAL DOCUMENTS

A comprehensive home management platform, HomeZada, helps homeowners manage all aspects of their home, including but not limited to: maintenance, finances, inventory and improvement projects. Because it acts as a central hub to organize and track important home-related information, it will help you track, locate, rescue important items and make filing insurance claims easier.

Key features of HomeZada

Pricing

HomeZada offers both free and premium plans. Premium plans features include providing additional tools for inventory management, financial tracking and project planning.

Website

For more information or to sign up, click here.

TOP PICKS TO AMP UP YOUR HOME SECURITY

While not as comprehensive as Homezada, Centriq has a strong focus on home management, which centralizes everything you need to organize, troubleshoot, operate and maintain your home.

Key features of Centriq

Pricing

Centriq offers both free and premium plans. Some of the extra features of the Premium plan include interactions between multiple properties and shared access for multi-users.

Website

For more information or to sign up, click here.

TECH TIPS TO AVOID CONTRACTOR SCAMS AFTER A STORM OR DISASTER

The National Association of Insurance Commissioners created the NAIC Home Inventory app to help you if you need to file a claim, as well as provide expert tips. The app showcases a simple, clean design of the inventory section with built-in room suggestions. Though a bit more generic than some of its competitors, this app helps you create an itemized list of your home should you need to file an insurance claim in the future.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Key features of NAIC home inventory app

Pricing

NAIC Home Inventory app is free.

Website

For more information or to sign up, click here.

BEST APPS TO TRACK AND MONITOR AIR QUALITY TO STAY SAFE

Unlike its namesake, Itemtopia actually goes beyond itemizing your belongings. Available in over 170 countries worldwide, the app allows you to manage services, warranties as well as medical records. A rich and interactive app helps you start with ease by incorporating AI intelligence.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Key features of Itemtopia

Pricing

Itemtopia offers both free and premium plans. Some of the extra features of the Premium plan include larger storage (up to 2 GB or approximately 3,000 items), the option to add more users and the ability to showcase items for sale with a shareable link.

Website

For more information or to sign up, click here.

THE ALARMING SURGE OF HOME TITLE THEFT AND HOW TO PROTECT YOUR PROPERTY

It’s easy to feel chaotic and overwhelmed when disaster strikes or when friends or family members are grappling with huge losses in home and security. There are, however, home apps that can help you create a plan before and after disaster strikes so you can have one less problem to manage while grieving your losses. While the hope is that disasters will not happen to you, these apps I mentioned will help you know, organize and restore your home should disaster strike. With some of the easiest and best ways to create a home inventory, it will give you peace of mind and a proactive way to respond during an emergency.

Are you prepared for possible evacuation in an emergency? Have you survived a disaster? What did you learn, and what would you do differently? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Best ways to give your old iPhone a second life

17 January 2025 at 10:00

Before tossing out your old iPhone, consider it a treasure trove of potential waiting to be unlocked. 

Your seemingly outdated device isn't just electronic waste. It's a versatile gadget ready for an exciting second life. From transforming into a smart home hub to becoming a dedicated digital companion, an old iPhone can be repurposed in countless creative ways that breathe new life into technology you may not have considered. 

Here are some of the best ways to use your old iPhone.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Smartphones are incredibly powerful, but they can also be overwhelming. The constant notifications and social media updates can make it hard to focus or enjoy the present moment. If you’re finding that your iPhone is more of a time-waster than a tool for productivity, why not transform it into a "dumb phone"? A "dumb phone" is a basic mobile device that focuses on essential communication functions like calling and texting, while minimizing digital distractions through limited internet access and app capabilities, helping you reduce screen time and stay more present.

Disable notifications:

Delete unwanted apps:

Factory reset (Optional):

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Eventually, you may want to give your child their own smartphone. While a new phone can be expensive, handing down your old iPhone is a great way to introduce them to technology while also being mindful of your budget. 

By using Family Sharing and parental controls, you can carefully monitor what apps and content your child accesses. Plus, it’s an excellent way to bring them into the Apple ecosystem. 

Set up Family Sharing:

Enable Parental Controls:

This process will help you manage your child's device usage effectively while ensuring they have access to appropriate content.

24 MOST AMAZING GIFTS FOR KIDS

In recent years, Apple’s Continuity Camera feature has made it easy to use an iPhone as a webcam for your Mac or Apple TV. While newer models work well for this purpose, older iPhones can still serve as excellent webcams, especially for online meetings and video calls. 

Instead of purchasing an external webcam, your old iPhone can deliver superior video quality. iOS 18 even allows older iPhones to work as dedicated continuity cameras for Apple TV, which is ideal for FaceTime or Zoom calls with family and friends.

Instead of purchasing an external webcam, your old iPhone can deliver superior video quality.

Why use your main iPhone for music when you can repurpose your old one as a dedicated MP3 player? With your old iPhone set up as a music player, you can enjoy your favorite tunes or podcasts without the distractions of text messages or social media notifications. It’s a perfect solution for workouts, long drives or when you just want to zone out with music.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

If you own an Apple TV, you already know that your iPhone can function as a remote control. However, keeping your main phone tied up with the remote can be inconvenient. By making your old iPhone a dedicated Apple TV remote, you can still enjoy controlling your TV without using your primary phone. 

Set up Apple TV remote feature:

Manage smart home devices:

Your old iPhone can even be a hub for all your smart home devices, from adjusting lights and thermostats to checking security cameras.

10 SMART HOME DEVICES WE LOVE

Smartphones have transformed mobile gaming, and your old iPhone could be an ideal portable gaming console. Many classic and modern games run smoothly on older iPhone models, and with subscription services like Apple Arcade, you can access a huge library of high-quality games. This is a fun, low-cost way to enjoy mobile gaming without draining your main iPhone’s battery life.

For book lovers, using an old iPhone as a dedicated e-reader is a great option. You can install apps like Kindle or Apple Books from the App Store. The iPhone's display is perfect for reading books and graphic novels, and since you’re not using your main iPhone, there are no distractions like notifications to interrupt your reading. 

You can disable all apps and notifications on the old device, making it a peaceful reading experience. Plus, you can still connect your AirPods to listen to audiobooks while on the go.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Just because you’ve upgraded to a new iPhone doesn’t mean your old one has to be discarded. There are countless ways to repurpose it, from boosting your productivity to controlling your smart home. This way, you can extend its lifespan and maximize the value of your purchase. 

What other devices would you like tips on breathing new life into? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Malicious apps posing as VPNs can turn your device into a tool for cyberattacks

5 January 2025 at 08:00

Virtual private networks (VPNs) are important if you care about your data and privacy. They create a secure, encrypted connection between your device and the internet, hiding your IP address and protecting your online activity. 

There are tons of apps out there that claim to offer VPN services, but not all of them are legit. Some are fakes trying to steal your data. 

In the third quarter of 2024, security researchers found that the number of users encountering fake VPN apps jumped 2½ times compared to the second quarter globally. These apps were either malware or programs that could be used by malicious actors.

I’m diving into the rise of fake VPN apps and how you can stay safe.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

According to Kaspersky, cybercriminals are taking advantage of people who want to use free VPN services. In May 2024, law enforcement shut down a botnet, a network of hijacked devices, called 911 S5. Several free VPN services, including MaskVPN, DewVPN, PaladinVPN, ProxyGate, ShieldVPN and ShineVPN, were used to create this botnet.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

When users installed these VPN apps, their devices were turned into proxy servers, meaning they were used to redirect someone else’s internet traffic

This huge network spread across 19 million unique IP addresses in over 190 countries, making it possibly the largest botnet ever created. The people controlling the botnet sold access to these infected devices to other criminals, who used them for cyberattacks, money laundering and fraud.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET

You can’t trust free VPN apps because they have no reason to keep you or your data safe. Here's why you should be cautious:

There's a growing demand for VPN apps across all platforms, including smartphones and computers. Users often believe that if they find a VPN app in an official store, like Google Play, it's safe to use. They're especially drawn to free services, thinking it's a great deal. However, this can often be a trap.

MASSIVE DATA BREACH EXPOSES 3 MILLION AMERICANS’ PERSONAL INFORMATION TO CYBERCRIMINALS

If you need a VPN, stick to a service that’s well-known, trusted and not free. Look for ones that are talked about on mainstream sites and backed by solid reviews. If you’re not sure where to start, I’ve put together a handy list of my favorite VPNs. I’ve tested them myself, and you can trust them to keep your data safe. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

UNDERSTANDING BRUSHING SCAMS AND HOW TO PROTECT YOURSELF 

Here are seven essential steps to help you choose a reliable VPN and safeguard your online privacy.

1. Stick to official app stores: Always download apps from trusted platforms like the App Store for iOS or the Google Play Store for Android. These stores have built-in security measures that help detect and remove fake or harmful apps. Avoid downloading apps from random websites or third-party stores, as they are more likely to host malicious software. Even on official stores, check the app’s reviews, ratings and download count to ensure it’s trustworthy.

2. Pay attention to app permissions: Be careful about the permissions you grant to apps during installation. A flashlight app, for example, doesn’t need access to your contacts or location. Question any permission that doesn’t align with the app’s functionality. Both iOS and Android allow you to review and manage app permissions in your settings, so take the time to double-check what you’ve already allowed.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Use two-factor authentication (2FA): Implement 2FA for your VPN accounts to add an extra layer of security beyond just a password.

4. Keep software updated: Regularly update all VPN-related software, including clients, servers and associated networking hardware, to benefit from the latest security patches and improvements.

5. Use strong encryption: Look for VPN services that use robust encryption protocols like AES-256 to protect your data.

6. Monitor VPN traffic: Continuously monitor VPN traffic and logs for unusual patterns that might indicate security issues.

7. Invest in strong antivirus software: A strong antivirus program can help detect and remove malware before it compromises your device. Many antivirus apps also come with features like web protection, anti-phishing tools and the ability to scan new apps for threats. While there are free options, premium versions often provide more comprehensive protection. Look for a trusted name in cybersecurity when choosing an antivirus solution. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Fake VPN apps are everywhere, and they’re bad news. They’re not just useless. They can turn your device into a tool for cybercriminals. The 911 S5 botnet showed us just how dangerous free VPNs can be, turning millions of devices into a giant network for fraud and attacks. The truth is free VPNs aren’t really free. They often come with weak security, leak your data or demand permissions that put your privacy at risk. If you’re serious about protecting your online activity, invest in a trusted, paid VPN service.

How often do you check the credibility of apps you download? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved.

Apple Mail app redesign introduces new categorization feature in iOS 18.2

29 December 2024 at 06:00

Apple's new Mail Categories in iOS 18.2 and later are here to help you take control and make managing your email a lot easier. 

Let's dive into how you can make the most of these new inbox features on your iPhone.

First things first, let's update your software to iOS 18.2 or later:

GET SECURITY ALERTS, EXPERT TIPS, SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE

GET ORGANIZED: NEW IOS 18 CALENDAR FEATURE

In iOS 18.2 and later, the Mail app enhances email management by automatically sorting messages into distinct categories. This feature is designed to help you quickly find and manage your emails.

Note: If a message in the Transactions, Updates or Promotions categories contains time-sensitive information, it will also appear in the Primary category.

IOS 18'S NEW TEXT FORMATTING AND EFFECTS IN MESSAGES  

Now that you're all set with iOS 18.2 or later, let's explore how to use the new Mail Categorization feature:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

SECRET TRICK TO SEND A TEXT MESSAGE AGAIN WITH IOS 18'S NEW "SEND LATER" FEATURE

To make sure important emails, like the CyberGuy newsletter, land in the "Primary" category:

GET FOX BUSINESS ON THE GO BY CLICKING HERE

This simple action helps signal its importance. Once you manually move an email to the Primary category, Apple's Mail app will learn from this action.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Apple's new Mail Categories feature aims to streamline your email management by automatically sorting your messages. While it can be incredibly helpful, it may take some time to adjust and fine-tune. Remember to periodically check other categories to ensure important emails aren't misclassified. With a bit of patience and customization, you can transform your inbox into a more organized and efficient space.

Have you found the new email categorization feature helpful, or do you wish you could go back to the way things were? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

New iPhone auto-restart feature locks encrypted data after extended inactivity

20 December 2024 at 10:00

Your iPhone data just got more secure, thanks to a new feature in iOS 18.1. This update includes an important security measure designed to protect your device and its encrypted data after long periods of inactivity.

Apple has introduced an Inactivity Reboot feature in iOS 18.1, which automatically reboots your iPhone if it has been idle and locked for more than three days. This feature uses the Secure Enclave Processor (SEP) to monitor when your iPhone was last unlocked. 

If the device stays locked for an extended period, the SEP notifies the kernel, which triggers a reboot and kills the Springboard (the core of iOS).

GET SECURITY ALERTS, EXPERT TIPS, SIGN UP FOR KURT'S NEWSLETTER - THE CYBERGUY REPORT HERE

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

The main benefit of the inactivity reboot is better data protection. By forcing a reboot after prolonged idle time, the iPhone essentially wipes encryption keys from memory. Once rebooted, the phone enters an "at rest" state. This makes it nearly impossible for cybercriminals to decrypt the data. Even if the device is left powered on for an extended period, the feature ensures that outdated forensic tools used by cybercriminals won't be able to access sensitive information.

BEST POWER STRIPS AND SURGE PROTECTORS 2024

Although this new security measure is a big win for privacy, it has raised concerns with law enforcement. Specifically, they are facing more challenges when trying to unlock phones for forensic analysis. However, researcher Jiska Classen points out that three days is still enough time to coordinate steps with analysts to access the device.

HOW TO STOP ANNOYING ROBOCALLS

To enable this feature, all you have to do is make sure your iPhone is running iOS 18.1. Here’s how to check and update:

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

While the inactivity reboot feature is a valuable security tool, it’s not a foolproof solution. To further protect your data, consider taking these additional steps:

1. Set a strong password: Create strong passwords for your accounts and devices and avoid using the same password for multiple online accounts. Using the same password across multiple platforms will always make you more vulnerable, because if one account gets hacked, they all get hacked. Consider using a password manager to generate and store complex passwords.

2. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

3. Back up your iPhone regularly: Backups prevent data loss caused by malicious attacks. It's a crucial step to protect your personal information. Here's how to do it: 

4. Turn on two-factor authentication (2FA): 2FA is an extra shield that will prevent a hacker from getting into your accounts on your iPhone. Here's how to do it:

After adding a trusted phone number, for security, when you sign in to your account on a new device or on the web, you'll need both your password and a section factor, such as a six-digit code sent to your devices or your phone numbers. 

5. Enable Stolen Device Protection: This feature adds an extra layer of security if your iPhone is stolen by requiring biometric authentication for sensitive actions when you're not in a familiar location. To enable it, follow these steps:

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

The new auto-restart feature is a major step forward in improving iPhone security, offering extra protection against cybercriminals. As security technology continues to evolve, it’s exciting to think about what future developments might look like.

What other security features would you like to see on your iPhone? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

KURT'S HOLIDAY DEALS:

Copyright 2024 CyberGuy.com. All rights reserved.

How to thief-proof your Christmas decorations

14 December 2024 at 10:00

Holiday decoration theft has become an increasingly frustrating issue for many homeowners. Karen from Los Angeles shared her experience with us in an email, stating,

"We have criminals who visit our neighborhood to not only steal mail and packages but also holiday decorations. I made a Christmas decoration for our mailbox, which was promptly stolen."

We’re sorry to hear about the theft in your neighborhood. This highlights a problem that goes beyond mere property loss. It's a theft of holiday cheer and personal effort. Let’s see how we can use technology to help secure your decorations.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Karen also inquired about the effectiveness of Samsung SmartTags, asking if these tags would work on her decorations and how far they could reach. The good news is that Samsung SmartTags can indeed be used on your holiday decorations. You can attach the SmartTag to any item you want to track. These devices are compatible with most recent Samsung Galaxy phones, including the Galaxy S9, making them accessible to many Android users.

As for the distance, the range of the Samsung SmartTag uses Bluetooth to connect to your phone. If the item is within Bluetooth range, you can ring it to find it or use the "Search Nearby" feature to get directions to it. If the item is out of range, other Samsung devices near the tag will anonymously locate it for you and then let you know where it is. This is done in the background and is encrypted to ensure privacy. The SmartTag does not beep when it’s out of range.

The Samsung SmartTag is compatible with almost all Samsung Galaxy phones released recently. They must have 2GB of RAM and run Android 8.0 (Oreo) or higher. So, your Samsung Galaxy S9 phones should be compatible with the Samsung SmartTag.

TOP PICKS TO AMP UP YOUR HOME SECURITY

For those considering a switch to Apple, AirTags present another viable option. Karen asked if she would have problems tracking her decorations with an Apple AirTag. While primarily designed for iOS devices, you can use it with your Android phone as mentioned in our article here, with some limitations. It uses the Find My network, and if another Apple device passes by the AirTag, the Find My network will be notified of the lost item’s location.

The AirTag does not beep when it’s out of range. However, the AirTag’s Precision Finding feature, which provides highly accurate tracking, is only compatible with iPhone 11 series and onwards. If you’re considering purchasing an iPhone, the iPhone 11 would be a relatively inexpensive option that is compatible with the AirTag’s Precision Finding feature.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

BEST HOME SECURITY SYSTEMS

Both Samsung SmartTags and Apple AirTags offer extensive tracking capabilities. The SmartTag uses Bluetooth for nearby tracking and relies on other Samsung devices for long-range location. Similarly, AirTags leverage the Find My network, utilizing nearby Apple devices to relay location information.

For Samsung users like Karen, the SmartTag is the natural choice, working seamlessly with Galaxy devices. Those considering Apple might look at the AirTag as an option.

Please note that while these tags can help you track your items, they might not prevent theft as they are not hidden devices and can be removed by someone who recognizes what they are. 

10 THINGS YOU MUST CONSIDER WHEN CHOOSING ANY SECURITY CAMERA

1. Use motion-activated cameras: Install motion-activated security cameras to monitor your decorations. Many security cameras send real-time notifications to your phone, allowing you to act quickly if someone tampers with your property.

2. Secure decorations: Consider physically securing your decorations with zip ties, chains or locks. While this won't deter all thieves, it can make stealing more difficult and time-consuming.

3. Light it up: Well-lit areas are less appealing to thieves. Ensure your yard and decorations are adequately lit with outdoor lights, especially in dark corners or near entry points.

4. Engage your neighbors: Create a sense of community by alerting neighbors to thefts and keeping an eye out for suspicious activity. A connected neighborhood can act as a strong deterrent.

5. Mark your property: Use invisible ink or engrave your decorations with a unique identifier. If stolen items are recovered, this will help law enforcement return them to you.

6. Report thefts to local law enforcement: Always report thefts, no matter how small. Law enforcement can track patterns and increase patrols in areas with frequent incidents. Providing details may also help them recover stolen items.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

In her email, Karen expressed her frustration: "I know this seems minor... but it’s disheartening to see the things you spend time, money and a little love get stolen." The desire to protect holiday decorations goes beyond material value — it's about safeguarding the joy and effort put into creating a festive atmosphere. As we embrace these technologies, let's also remember the importance of community vigilance and mutual respect.

Have you ever used tracking devices, security cameras, or other gadgets to safeguard your decorations? What worked well, and what would you recommend to others? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

7 must-have apps to save big this holiday season

11 December 2024 at 10:00

Imagine walking into a store or browsing online, confident that you’re getting the best deals without spending hours hunting for discounts. 

With the right tools at your fingertips, this can be your reality. We've researched and reviewed seven fantastic options that can help you save both time and money during your holiday shopping spree. 

From cash-back apps to discount tools, these strategies will ensure you check off every item on your wish list without breaking the bank. Ready to save some money? Let's dive in.

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

Downloading big retailer apps can lead to more savings that cannot be found in stores or online. From Target and Walmart to your local drugstore, many offer secret app-only savings and offers. Retailers are trying to get us to shop more with their own app by combining an app purchase with an in-store pickup that can at times offer additional savings. Look for each app in the official Apple app store and Google Play Store, never from a link or other site.

KURT’S BEST HOLIDAY DEAL PICKS

Cashback shopping apps like Rakuten let you earn cash back when shopping online. According to Rakuten, thousands of retailers participate in the savings.

How it works is simple. Register for free online, then use their app or website while shopping at retailers that offer a commission for sending you to their shopping site.

Rakuten shares a portion of the commission it earns with you. Once you earn enough cash-back savings, you can choose to receive a check, have it paid to your PayPal account or use the American Express rewards program.

Click this link and get a $40 bonus when you spend $40.

I've mentioned this app before. Ibotta is an app that you use for couponing and gives you cash back on items you’re already purchasing at your favorite stores, including grocery stores, food delivery, movie and concert tickets, and more.

Some of the most popular retailers you can find deals with through Ibotta are CVS, Walgreens, Target, Lowe’s, Petco, Domino’s Pizza, REI and more than 1,500 brands and retailers.

If you scroll to the bottom of the app, you’ll see a section called "Special Deals." If you scroll, you’ll see a panel called "Free made easy: All free offers all in one place."

Click this link and use referral code mpiaurm to earn $5 when you submit your first receipt.

Copy the code to insert into the Referral code box on Ibotta "Create account" page: mpiaurm

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Discount apps like Flipp aggregate sales fliers and store circulars. All you do is put in your zip code and start browsing for savings from thousands of popular retailers. The Watch List lets you track items from your holiday shopping list. Make sure to create a tight shopping list of each item to track in case prices go down before or after your purchase.

KURT’S UNBEATABLE HOLIDAY DEALS

PayPal Honey leads the pack by automatically entering coupon codes into the promo code field when checking out at 5,500+ retail sites.

How it works: You can use the PayPal Honey app directly, but you are better off using it the way it was designed as a browser extension. Once added to your browser, it tracks where you are shopping and applies the best coupon codes without you needing to do anything. Just watch the total price drop as you are checking out when there is a match to a good discount.

The PayPal Honey browser add-on is available on Safari, Chrome, Edge, Firefox, Opera and Edge browsers. Again, for security, only download directly through your browser and not from a link or email offer.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

PayPal paid $4 billion dollars for the automated coupon code technology browser add-on. That's when Honey became PayPal Honey you will find here.

While it has come under fire by Amazon for privacy concerns, upon close examination it does not collect anything more than most other shopping technologies and says it does not resell customer shopping data. Maybe Amazon does not like that it works with Amazon, too, which can drive down prices.

Amazon Warehouse has millions of open boxes, refurbished, renewed and used goods. Few know that retail giant Amazon has a renewed outlet shopping area that can save you when buying items in good-to-like-new condition.

Make sure you get a very good understanding of an item's condition before buying. You are protected by Amazon's policies making it easier to return the rare dud.

BookFinder.com buys and sells used textbooks. Search with your teacher or professor’s textbook ISBN to make sure you are getting the exact match. Watch that you have thoroughly checked the condition of any used textbook before pulling the trigger at checkout. Avoid textbooks that say there are notations on the various pages, as these may not be the notes that earn you a good grade.

5 SECRETS TO SHOPPING SMARTER ON AMAZON

You can buy discounted gift cards or sell unwanted gift cards for cash. I also recommend that you check the balance and expiration date of your gift cards before using them and use them as soon as possible to avoid losing them or forgetting about them. Check out the best way to buy gift cards ever by clicking here.

Set Deal Alerts at Slickdeals.net. This community of millions of fellow shoppers is looking for and sharing the best deals. When the price reaches a desired level, you'll receive a notification so you don't miss the deal.

Pro tip: I like to track larger dollar items and then create a calendar entry in my phone reminding me of the last day to reprice a purchase so that I can potentially get money back when the price goes down after the sale.

Make sure it's a deal by using price tracking sites like Camelcamelcamel.com, which shows the history of sale prices.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

As we gear up for the holiday shopping season, remember that saving money doesn't have to be a chore. With the right tools and strategies at your disposal, you can enjoy a stress-free shopping experience while keeping your budget intact. Whether you choose cash-back apps, discount tools or retailer-specific offers, there's something out there for everyone. So, why not dive in and start exploring these options? 

What are some of the absolute best deals you have found using these tools or other methods? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

How to delete multiple emails at once on iPhone

10 December 2024 at 06:00

Managing your inbox can quickly become a daunting task. Many of us find ourselves drowning in a sea of unread emails, making it challenging to stay organized. Dale from Lowell, Arizona, recently reached out with a common frustration:

"My iPhone 13; How do I erase multiple emails from my inbox? Deleting each one individually is time consuming and tedious. Currently 1900 plus."

Don’t worry, Dale. You're not alone in this struggle. Let's dive into some easy steps to declutter your inbox. If you want to delete multiple emails at once on Android, here's how to do it. 

GET SECURITY ALERTS, EXPERT TIPS - SIGN UP FOR KURT’S NEWSLETTER - THE CYBERGUY REPORT HERE

The built-in Mail app on your iPhone 13 offers a straightforward way to delete multiple emails at once:

BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS - CYBERGUY PICKS

When faced with an overwhelming number of emails, try this method:

MUST-TURN-OFF PRIVACY SETTINGS ON YOUR IPHONE IN IOS 18.1

For even more control over bulk deletions, consider using your iPhone's web browser:

This method is particularly effective for quickly clearing out large numbers of emails.

HOW TO USE IPHONE'S MIC MODE FOR CRYSTAL CLEAR, NOISE-FREE CALLS

To ensure that deleted emails are automatically sent to your preferred location, follow these simple steps to configure your iPhone settings. This setting helps you efficiently organize your emails by automatically directing deleted messages to the appropriate folder, saving time and reducing inbox clutter.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Managing a cluttered inbox can feel overwhelming, but with these techniques, you'll be on your way to a more organized inbox. Remember, it's not just about deleting emails. It's about creating habits that prevent inbox overload in the future. Consider setting up filters for recurring emails. By implementing these strategies, Dale and other iPhone users can transform their email management from a tedious chore into a quick and efficient task.

What's the most overwhelming digital clutter challenge you're currently facing, and how is it impacting your daily productivity? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Get ready to build your own Lego masterpieces with this new tech

6 December 2024 at 06:00

Imagine being able to turn any object into a Lego masterpiece with just your phone.

Sounds cool, right? 

Well, that’s exactly what Brick My World offers. 

This innovative app is here to make custom Lego creation fun and accessible for everyone, whether you’re a seasoned builder or just getting started. By using advanced artificial intelligence and mobile scanning technology, Brick My World opens up a world of creative possibilities.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

The process of creating Lego models with Brick My World is pretty simple. First, you snap a photo of any object using your Android or iPhone. Next, you will brick it, as they call it, with the app transforming the scan into a Lego model. Finally, you can build it by following the detailed instructions generated by the app, bringing your creation to life.

Gone are the days when advanced 3D modeling skills were necessary or when building custom models required painstaking manual design. Brick My World makes custom Lego creation accessible to everyone, regardless of your technical expertise.

A WHOPPING 342,817 LEGO TECHNIC PIECES ARE USED TO BUILD A SPORTS CAR

Brick My World combines several cutting-edge technologies:

Mobile scanning: Utilizes ARCore (Android) and ARKit (iOS) for precise object capture.

Photogrammetry: Creates detailed 3D models from 2D scans.

Voxelization: Converts 3D models into brick-compatible structures.

AI optimization: Refines the model for accuracy and structural integrity.

KURT’S BEST NEW HOLIDAY DEALS

LEGO-LIKE CONSTRUCTION BLOCKS MADE FROM PLASTIC WASTE CAN STAND UP TO NATURE'S FURY 

With Brick My World, your creativity knows no bounds. Create a scale model of your house, immortalize your pet in bricks or craft unique souvenirs from your travels. The app handles models of various sizes, from small objects using 500-1,000 bricks to larger creations requiring several thousand pieces.

WOULD YOU WANT TO CHAT WITH THIS CREEPY-LOOKING LEGO HEAD POWERED BY AI?

Worried about finding the right pieces? Brick My World has partnered with BrickOwl, an independent Lego marketplace. The app generates a detailed parts list, allowing you to easily source the bricks you need for your custom creation.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Brick My World is the brainchild of a diverse team of Lego enthusiasts and tech innovators. Their combined expertise in software development, AI engineering and UX design has resulted in this revolutionary app.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

The team has ambitious plans for the future, including adding support for non-traditional bricks (plates, slopes, transparent pieces), incorporating wheels and other specialized elements, and expanding the app's capabilities based on user feedback and technological advancements.

Throughout the Kickstarter campaign, supporters are being offered exclusive early-bird pricing for lifetime access to the premium version of the app, allowing them to be among the first to experience this groundbreaking tool. The funds raised will be instrumental in further developing the app's features and expanding its capabilities, including the addition of non-traditional bricks and enhanced design options.

The overwhelming support from backers demonstrates a collective desire to make custom Lego creation accessible to all. As Brick My World moves forward, the team is committed to delivering on its promises and pushing the boundaries of what can be achieved in the world of Lego building. Stay tuned for updates on new features and enhancements as they continue to innovate and inspire creativity in builders everywhere.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

By making the design process accessible to everyone, Brick My World opens up new possibilities for creativity and expression through Lego. Whether you're a seasoned builder or new to the world of bricks, this app promises to bring your ideas to life in a way that's both fun and rewarding.

What unique objects would you love to see transformed into Lego creations using the Brick My World app? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Helpful Hack: Siri's new tricks, photo magic and writing help with iOS 18.1's new AI features

30 November 2024 at 10:00

Ready to make your iPhone even smarter? With the latest iOS 18.1 update, Apple Intelligence brings many powerful new features to your fingertips. 

Before you dive into these exciting tools, let’s get your device updated and set up. 

Don’t worry — it's a quick and easy process. And once you're all set, you'll be amazed at how these features can transform your day-to-day interactions with your phone. Let's get started.

3 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24 12 pm PT)

First things first, you'll need to update your iPhone to iOS 18.1 or later. Here's how:

Open the Settings app.

Tap General.

Select Software Update.

If iOS 18.1 or later is available, tap "Download and Install."

HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWARE

Once you're on iOS 18.1 or later, enabling Apple Intelligence is a breeze:

Go to Settings.

Tap Apple Intelligence & Siri.

Toggle on Apple Intelligence.

Your iPhone will then download the necessary AI models. You'll get a notification when it's ready to roll. Currently, Apple Intelligence is only available on iPhone 15 Pro, iPhone 15 Pro Max, and newer iPads and Macs with M1 chips or later.

WHICH IPHONE 16 IS RIGHT FOR YOU? DISCOVER YOUR PERFECT MATCH

Now for the fun part. Let's check out some of the coolest new features:

You can use Apple Intelligence to summarize messages and mail and get the key details at a glance. Here's how it works:

In your mail app, tap an email message or thread.

Now, tap the summarize button in the top right corner.

An animation appears as Apple Intelligence analyzes the text, and a summary will appear above the email.

IS IT TIME FOR ME TO UPGRADE TO A NEW IPHONE?

Siri's gotten a major upgrade and is now supercharged by Apple Intelligence. When you talk to Siri, you'll notice an elegant glowing light around the edge of your screen that shows that Apple Intelligence is working for you.

It now can handle those "umm" moments we all have. For example, try saying, "Hey Siri, set a 10-minute, no, 15-minute timer." Siri will understand and set the 15-minute timer.

If you don't want to ask Siri out loud, you can now type to Siri. Just double-tap at the bottom of the screen, and you can quickly and quietly type your Siri request.

Apple Intelligence has your back when it comes to writing. Here's how to use it:

Select any text in an email or document by double-tapping on the text and dragging the cursor over the text you want help with.

Then, the selection handles will appear. Tap the Writing Tools icon that appears above the selected text.

Choose from options like "Proofread," "Rewrite," "Friendly," "Professional," "Concise," "Summary," "Key Points," "List" or "Table." Here's what each does specifically:

Proofread: Checks for grammar and spelling errors.

Rewrite: Offers alternative phrasing for the selected text.

Friendly: Makes the text more casual and approachable.

Professional: Adjusts the tone to be more formal and polished.

Concise: Shortens the text to be more direct.

Summary: Provides a brief overview of the selected text.

Key Points: Highlights the main ideas.

List: Converts the text into a list format.

Table: Organizes the text into a table.

Once you've made your selection, you can either tap Done or Revert to what you had.

Your photo library just got a lot more searchable:

Open the Photos app.

Tap the search icon at the top of the screen.

Try natural language queries like "dog sitting on the couch."

Click Search, and you'll be amazed at how accurately it finds your photos.

Tap Done 

Want to remove unwanted objects from your photos? Here's how:

Open a photo in the Photos app.

Tap the Edit button below the picture.

Select the Clean Up tool in the bottom right of the screen.

Circle or tap the object you want to remove.

Apple Intelligence will work its magic to erase it seamlessly.

Then, click either done or cancel.

Create custom photo slideshows using natural language prompts. Here's how to use this feature:

Open the Photos app.

Scroll down to where it says Memories.

Click where it says Create to Create a Memory Movie.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Enter a text prompt describing the theme or content you want and then tap the up arrow.

Apple Intelligence will work its magic to Create a Memory Movie seamlessly.

Tap the three horizontal dots at the top of the screen to Edit Move Timeline, or you can tap Share Movie to share it via Messages, Mail or Social Media.

Tired of notification overload? Apple Intelligence now provides smart summaries for your emails and messages. Just swipe down from the top of your screen to see condensed versions of your notifications.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

Remember, to access these features, you'll need a compatible device (iPhone 15 Pro, iPhone 16 series or newer iPads/Macs with M1 chips or later) running iOS 18.1 or later. You'll also need to enable Apple Intelligence in your device settings.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

While these features are exciting, Apple has even more in store. We're still waiting on some promised capabilities like emoji creation, image playground and ChatGPT integration. Apple hasn't given us a firm timeline, but stay tuned — the AI revolution on your iPhone is just getting started.

What feature of Apple Intelligence are you most excited to try out on your device, and why? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Try CyberGuy's new games (crosswords, word searches, trivia and more!)

Enter Cyberguy’s $500 Holiday Gift Card Sweepstakes

KURT’S HOLIDAY GIFT GUIDES 

Deals: Unbeatable Best Black Friday deals | Laptops | Desktops | Printers 

Best gifts for: Men | Women | Kids | Teens | Pet lovers 

For those who love: Cooking | Coffee | Tools | Travel | Wine

Devices: Laptops | Desktops | Printers | Monitors | Earbuds | Headphones | Kindles | Soundbars | Vacuums | Surge strips and protectors

Accessories: CarKitchen | Laptop | Keyboards | Phone | Travel | Keep It Cozy

Can’t go wrong with these: Gift Cards | Money-saving apps | Amazon Black Friday insider tips  

Copyright 2024 CyberGuy.com. All rights reserved.

❌
❌