







{"id":17572,"date":"2024-09-10T04:23:50","date_gmt":"2024-09-10T04:23:50","guid":{"rendered":"https:\/\/cissar.com\/?p=17572"},"modified":"2024-09-10T04:23:50","modified_gmt":"2024-09-10T04:23:50","slug":"the-mystery-behind-those-creepy-unknown-spam-calls","status":"publish","type":"post","link":"https:\/\/cissar.com\/index.php\/2024\/09\/10\/the-mystery-behind-those-creepy-unknown-spam-calls\/","title":{"rendered":"The mystery behind those creepy &#8216;Unknown&#8217; spam calls"},"content":{"rendered":"<div class=\"article-body\">\n<div class=\"featured featured-video video-ct\" data-v-543741ec=\"\">\n<div class=\"contain\" data-v-543741ec=\"\">\n<div class=\"control\" data-v-543741ec=\"\"><a href=\"#\" class=\"top\" data-v-543741ec=\"\"><\/a> <a href=\"#\" class=\"close\" data-v-543741ec=\"\">close<\/a><\/div>\n<div class=\"video-container\" data-v-543741ec=\"\">\n<div data-video-tags=\"3play_sameday,web_exclusives,primary_tech\" data-video-title=\"The mystery behind those creepy 'Unknown' spam calls\" data-video-id=\"6361624009112\" data-video-domain=\"foxnews\" data-video-type=\"CLIP\" data-widget-type=\"embed\" class=\"m video-player\" data-v-543741ec=\"\"><a href=\"https:\/\/www.foxnews.com\/video\/6361624009112\" data-v-543741ec=\"\"><picture data-v-543741ec=\"\"><source srcset=\",  2x\" media=\"(max-width: 767px)\" data-v-543741ec=\"\"><source srcset=\",  2x\" media=\"(min-width: 768px) and (max-width: 1023px)\" data-v-543741ec=\"\"><source srcset=\",  2x\" media=\"(min-width: 1024px) and (max-width: 1279px)\" data-v-543741ec=\"\"><source srcset=\",  2x\" media=\"(min-width: 1280px)\" data-v-543741ec=\"\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/static.foxnews.com\/static\/orion\/styles\/img\/fox-news\/bg\/default.png\" alt=\"The mystery behind those creepy 'Unknown' spam calls\" width=\"896\" height=\"500\" data-v-543741ec=\"\"><\/source><\/source><\/source><\/source><\/picture> <span class=\"overlay\" data-v-543741ec=\"\">Video<\/span><\/a><\/div>\n<\/div>\n<div class=\"info\" data-v-543741ec=\"\">\n<div class=\"caption\" data-v-543741ec=\"\">\n<h4 class=\"title\" data-v-543741ec=\"\"><a href=\"https:\/\/www.foxnews.com\/video\/6361624009112\" data-v-543741ec=\"\">The mystery behind those creepy &#8216;Unknown&#8217; spam calls<\/a><\/h4>\n<p data-v-543741ec=\"\">There&#8217;s a rise in more sophisticated targeted phone scams.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"speakable\">Scammers are becoming more sophisticated in their attempts to steal your sensitive data. One particularly concerning trend is the rise of targeted phone scams, where callers possess just enough information to seem legitimate but are <a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/ask-kurt-how-to-avoid-phishing-scams-and-protect-your-iphone\/\" target=\"_blank\" rel=\"nofollow noopener\">actually phishing<\/a> for more details to exploit.<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb2\" id=\"tablet-tw-ad-lb2\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban1\" id=\"mobile-mw-ad-ban1\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p class=\"speakable\">Recently, we received an email from <a href=\"https:\/\/www.foxnews.com\/category\/us\/los-angeles\" target=\"_blank\" rel=\"noopener\">James in LA<\/a> detailing his unsettling experience with a series of suspicious phone calls. His story serves as a stark reminder of the importance of vigilance in protecting our personal information. Here&#8217;s what James shared with us:<\/p>\n<p>&#8220;I have received multiple random unknown calls (in the past two months), and they always start with the person calling me on the phone (listed as unknown) and providing my full name. Absolutely Correct. Then, ask if I am that \u2018name, in (insert city). Then, when I say no, you have the wrong guy, they provide a birthdate and ask if it is mine, which, of course, it is Not. Then, they politely apologize, say thank you, and hang up. At that point, you realize that they never told you who they are representing. Maybe I\u2019m paranoid, but it just seems strange.&#8221;<\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb2\" id=\"desktop-desk-ad-lb2\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>James&#8217; experience is not unique. Many people across the country are reporting similar incidents, where callers seem to have a partial set of personal information and are attempting to verify or expand upon it. This tactic, known as &#8220;social engineering,&#8221; is a common method used by scammers to gain trust and extract valuable data.<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban2\" id=\"mobile-mw-ad-ban2\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/cyberguy.com\/newsletter\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>GET SECURITY ALERTS, EXPERT TIPS \u2014 SIGN UP FOR KURT\u2019S NEWSLETTER \u2014 THE CYBERGUY REPORT HERE<\/u><\/strong><\/a><\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/1-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/1-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/1-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/1-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/1-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/1-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/1-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/1-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/1-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1\" alt=\"woman on phone\" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A woman talking on her cellphone.<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<h2><strong>Where scammers get their information<\/strong><\/h2>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb3\" id=\"tablet-tw-ad-lb3\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>The mystery behind these creepy &#8216;Unknown&#8217; spam calls often begins with <a href=\"https:\/\/cyberguy.com\/privacy\/4-3-million-americans-exposed-in-massive-health-savings-account-data-breach\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>data breaches<\/u><\/a> or information leaks. Scammers obtain partial information from various sources, including public records, social media profiles or purchased data from the <a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/how-to-protect-yourself-when-your-cell-phone-number-is-exposed-on-the-dark-web\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>dark web<\/u><\/a>. They then use this incomplete data as a starting point for their phishing attempts, aiming to fill in the gaps and create a more complete profile of their targets.<\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/2-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/2-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/2-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/2-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/2-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/2-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/2-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/2-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/2-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1\" alt=\"man on phone\" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A man talking on his cellphone.<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/cyberguy.com\/privacy\/4-3-million-americans-exposed-in-massive-health-savings-account-data-breach\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH<\/u><\/strong><\/a><\/p>\n<h2><strong>Understanding the scammer&#8217;s playbook<\/strong><\/h2>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban3\" id=\"mobile-mw-ad-ban3\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Let&#8217;s break down the tactics used in these calls:<\/p>\n<p><strong>Partial Knowledge:<\/strong> The scammer starts with some correct information, like a full name and city. This creates an illusion of legitimacy and can catch you off guard. However, they might be <a href=\"https:\/\/cyberguy.com\/privacy\/dont-click-that-link-how-to-spot-prevent-phishing-attacks-in-your-inbox\/\" target=\"_blank\" rel=\"nofollow noopener\">phishing for<\/a> more details, like your birthdate.<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb4\" id=\"tablet-tw-ad-lb4\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p><strong>Verification requests:<\/strong> By asking to confirm additional details like a birthdate, the scammer is attempting to gather more valuable personal information.<\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb3\" id=\"desktop-desk-ad-lb3\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban4\" id=\"mobile-mw-ad-ban4\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><strong>Vague identity:<\/strong> The caller never identifies themselves or their organization, making it difficult to verify their legitimacy or report them later.<\/p>\n<p><strong>Polite disengagement:<\/strong> The quick, polite end to the call is designed to leave the recipient feeling that nothing suspicious has occurred, reducing the likelihood of <a href=\"https:\/\/www.foxnews.com\/category\/tech\/topics\/cybercrime\" target=\"_blank\" rel=\"noopener\">immediate suspicion or action<\/a>.<\/p>\n<p>These tactics are carefully crafted to exploit human psychology. The initial correct information builds trust, the request for verification seems reasonable and the polite exit leaves the recipient with a positive final impression.<\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/3-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/3-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/3-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/3-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/3-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/3-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/3-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/3-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/3-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1\" alt=\"seated man with phone\" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A man talking on his cellphone.<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb5\" id=\"tablet-tw-ad-lb5\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban5\" id=\"mobile-mw-ad-ban5\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/worlds-largest-stolen-password-database-uploaded-to-criminal-forum\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>WORLD\u2019S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM<\/u><\/strong><\/a><\/p>\n<h2><strong>The dangers of information gathering<\/strong><\/h2>\n<p>You might wonder, &#8220;What harm can come from confirming my birthdate?&#8221; Unfortunately, in the wrong hands, even small pieces of information can be dangerous. Scammers can use these details to:<\/p>\n<ul>\n<li>Build a more complete profile for identity theft<\/li>\n<li>Access accounts or reset passwords<\/li>\n<li>Impersonate you in other scams or fraudulent activities<\/li>\n<li>Sell your information on the <a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/how-to-protect-yourself-when-your-cell-phone-number-is-exposed-on-the-dark-web\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>dark web<\/u><\/a><\/li>\n<\/ul>\n<p>Data is a valuable commodity these days, and every piece of <a href=\"https:\/\/www.foxnews.com\/category\/tech\/topics\/security\" target=\"_blank\" rel=\"noopener\">personal information<\/a> should be guarded carefully.<\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/4-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/4-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/4-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/4-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/4-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/4-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/4-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/4-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/4-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1\" alt=\"woman speaking on phone \" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A woman talking on her cellphone.<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban6\" id=\"mobile-mw-ad-ban6\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/cyberguy.com\/news\/massive-dell-data-breach-hits-49-million-users-what-this-means-for-your-privacy-and-security\/\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>MASSIVE DELL DATA BREACH HITS 49 MILLION USERS \u2014 WHAT THIS MEANS FOR YOUR PRIVACY AND SECURITY<\/u><\/strong><\/a><\/p>\n<h2><strong>8 steps to protect your personal information<\/strong><\/h2>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb4\" id=\"desktop-desk-ad-lb4\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb6\" id=\"tablet-tw-ad-lb6\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>In light of the sophisticated tactics employed by scammers, it is important to protect your personal information. Here are some measures you can implement:<\/p>\n<h3><strong>1. Avoid sharing information with unknown callers<\/strong><\/h3>\n<p>It is essential to never provide personal information over the phone to unknown callers. Always use caller ID and refrain from answering calls from numbers you do not recognize. If you do answer a call, avoid confirming or denying any information the caller claims to have. Be particularly wary of callers who create a sense of urgency or use fear tactics to manipulate you.<\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/5-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/5-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/5-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/5-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/5-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/5-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/5-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/5-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/5-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1\" alt=\"man speaking on phone \" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A man talking on his cellphone.<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<h3><strong>2. Verify caller identity<\/strong><\/h3>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban7\" id=\"mobile-mw-ad-ban7\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>When you receive a suspicious call, ask for the caller&#8217;s name, the company they represent and a callback number. However, do not call back immediately; instead, take the time to research the company independently. Look up official contact information online and call that number to verify the legitimacy of the initial call.<\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/6-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/6-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/6-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/6-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/6-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/6-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/6-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/6-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/6-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1\" alt=\"another woman speaking on a phone \" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A woman talking on her cellphone.<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<h3><strong>3. Enable spam-blocking features<\/strong><\/h3>\n<p>To further protect yourself, enable spam-blocking features on your phone. You may also consider using <a href=\"https:\/\/cyberguy.com\/how-to\/how-to-get-rid-of-robocalls-with-apps-and-data-removal-services\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>call blocking apps<\/u><\/a> which can help screen calls and identify potential spam.\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb7\" id=\"tablet-tw-ad-lb7\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Additionally, regularly <a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/how-to-update-your-devices\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>updating your phone&#8217;s operating system<\/u><\/a> will ensure that you benefit from the latest security features and protections.<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban8\" id=\"mobile-mw-ad-ban8\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/www.foxnews.com\/tech\/what-is-ai-artificial-intelligence\" target=\"_blank\" rel=\"noopener\"><strong>WHAT IS ARTIFICIAL INTELLIGENCE (AI)?<\/strong><\/a><\/p>\n<h3><strong>4. Report suspicious activity<\/strong><\/h3>\n<p>If you encounter suspicious calls, it is important to report them to your phone carrier. You should also file a complaint with the <a href=\"http:\/\/ftc.gov\/complaint\" target=\"_blank\" rel=\"nofollow noopener\"><u>Federal Trade Commission<\/u><\/a> (FTC). If you believe you have been a victim of fraud, consider reporting the incident to local law enforcement to help protect yourself and others in your community.<\/p>\n<div class=\"image-ct inline\">\n<div class=\"m\"><picture><source media=\"(max-width: 767px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/343\/192\/7-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/686\/384\/7-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"192\" width=\"343\"><source media=\"(min-width: 768px) and (max-width: 1023px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/672\/378\/7-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1344\/756\/7-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"378\" width=\"672\"><source media=\"(min-width: 1024px) and (max-width: 1279px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/931\/523\/7-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1862\/1046\/7-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"523\" width=\"931\"><source media=\"(min-width: 1280px)\" srcset=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/720\/405\/7-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1, https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1440\/810\/7-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1 2x\" height=\"405\" width=\"720\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/a57.foxnews.com\/static.foxnews.com\/foxnews.com\/content\/uploads\/2024\/09\/1200\/675\/7-The-mystery-behind-those-creepy-Unknown-spam-calls.jpg?ve=1&#038;tl=1\" alt=\"woman in purple hat talking on phone \" width=\"1200\" height=\"675\"><\/source><\/source><\/source><\/source><\/picture><\/div>\n<div class=\"info\">\n<div class=\"caption\">\n<p><span>A woman talking on her cellphone.<\/span> <span>(Kurt &#8220;CyberGuy&#8221; Knutsson)<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<h3><strong>5. Remove your personal information from the internet<\/strong><\/h3>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb5\" id=\"desktop-desk-ad-lb5\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>To reduce your online presence, consider using a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.\u00a0They aren\u2019t cheap \u2014 and neither is your privacy.\u00a0These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.\u00a0\u00a0<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb8\" id=\"tablet-tw-ad-lb8\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban9\" id=\"mobile-mw-ad-ban9\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>It\u2019s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.\u00a0By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you. <a href=\"https:\/\/cyberguy.com\/privacy\/best-services-for-removing-your-personal-information-from-the-internet\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Check out my top picks for data removal services here.<\/u><\/a> Additionally, make it a habit to regularly Google your name and phone number to see what information is publicly available about you.<\/p>\n<p><a href=\"https:\/\/www.foxbusiness.com\/apps-products\" target=\"_blank\" rel=\"noopener\"><strong>GET FOX BUSINESS ON THE GO BY CLICKING HERE<\/strong><\/a><\/p>\n<h3><strong>6. Use an identity theft protection service<\/strong><\/h3>\n<p>Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account.\u00a0They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.\u00a0<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban10\" id=\"mobile-mw-ad-ban10\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. <a href=\"https:\/\/cyberguy.com\/security\/best-identity-theft-protection-services\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>See my tips and best picks on how to protect yourself from identity theft.<\/u><\/a><\/p>\n<h3><strong>7. Secure your accounts<\/strong><\/h3>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb9\" id=\"tablet-tw-ad-lb9\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>To enhance the security of your online accounts, use strong and unique passwords for each one.\u00a0It is also wise to avoid using easily guessable information, such as birthdates, in your passwords. Consider using a <a href=\"https:\/\/cyberguy.com\/tech-tips-tricks\/best-password-managers\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>password manager<\/u><\/a> to generate and store complex passwords. Also, enabling <a href=\"https:\/\/cyberguy.com\/how-to\/what-is-two-factor-authentication-and-why-should-i-enable-it\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>two-factor authentication<\/u><\/a> wherever possible on your devices adds an extra layer of security.<\/p>\n<h3><strong>8. Be cautious on social media<\/strong><\/h3>\n<p>When using social media, review and tighten your <a href=\"https:\/\/cyberguy.com\/privacy\/how-protect-yourself-from-social-media-scammers\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>privacy settings<\/u><\/a> to limit who can see your personal information. Be mindful of the details you share publicly, as scammers often use social media to gather information. Additionally, avoid accepting friend requests or messages from unknown individuals to reduce the risk of falling victim to scams.<\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb6\" id=\"desktop-desk-ad-lb6\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban11\" id=\"mobile-mw-ad-ban11\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>By implementing these comprehensive steps, you will significantly reduce your risk of falling victim to phone scams and identity theft. Remember that protecting your personal information is an ongoing process that requires vigilance and regular attention.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/c\/KurttheCyberGuy?sub_confirmation=1\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>SUBSCRIBE TO KURT\u2019S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES<\/u><\/strong><\/a><\/p>\n<h2><strong>Kurt&#8217;s key takeaways<\/strong><\/h2>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb10\" id=\"tablet-tw-ad-lb10\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Scammers are constantly evolving their tactics, making it crucial for us to stay one step ahead. James&#8217; experience serves as a wake-up call for all of us. It&#8217;s not just about being cautious; it&#8217;s about being proactively defensive with our personal data.<\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban12\" id=\"mobile-mw-ad-ban12\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Remember, every piece of information you share, no matter how small, can be a puzzle piece for scammers. Your birthdate, your city, even your social media posts \u2014 they&#8217;re all potential tools in a scammer&#8217;s arsenal. But don&#8217;t let this paralyze you with fear. Instead, let it empower you to take control of your digital footprint.\u00a0<\/p>\n<p><a href=\"https:\/\/foxnews.onelink.me\/xLDS?pid=AppArticleLink&#038;af_dp=foxnewsaf%3A%2F%2F&#038;af_web_dp=https%3A%2F%2Fwww.foxnews.com%2Fapps-products\" target=\"_blank\" rel=\"noopener\"><strong>CLICK HERE TO GET THE FOX NEWS APP<\/strong><\/a><\/p>\n<p>By implementing the steps we&#8217;ve discussed \u2014 from being alert on phone calls to using data removal and identity protection services \u2014 you&#8217;re not just protecting yourself. You&#8217;re also making it harder for scammers to operate, potentially saving others from falling victim.<\/p>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb11\" id=\"tablet-tw-ad-lb11\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban13\" id=\"mobile-mw-ad-ban13\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>What&#8217;s the most unusual or clever scam attempt you&#8217;ve encountered, and how did you handle it? Your experiences could help others recognize and avoid similar scams in the future. Let us know by writing us at<strong> <\/strong><a href=\"http:\/\/cyberguy.com\/Contact\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>Cyberguy.com\/Contact<\/u><\/strong><\/a><\/p>\n<div class=\"ad-container desktop ad-h-50 ad-w-300\">\n<div data-iu=\"lb7\" id=\"desktop-desk-ad-lb7\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to <a href=\"http:\/\/cyberguy.com\/Newsletter\" target=\"_blank\" rel=\"nofollow noopener\"><strong><u>Cyberguy.com\/Newsletter<\/u><\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cyberguy.com\/contact\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Ask Kurt a question or let us know what stories you&#8217;d like us to cover<\/u><\/a><a rel=\"nofollow noopener\"><u>.<\/u><\/a><\/p>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban14\" id=\"mobile-mw-ad-ban14\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Follow Kurt on his social channels:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.facebook.com\/CyberGuyOfficial\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Facebook<\/u><\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/c\/KurttheCyberGuy?sub_confirmation=1\" target=\"_blank\" rel=\"nofollow noopener\"><u>YouTube<\/u><\/a><\/li>\n<li><a href=\"https:\/\/www.instagram.com\/kurtthecyberguy\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>Instagram<\/u><\/a><\/li>\n<\/ul>\n<div class=\"ad-container tablet ad-h-50 ad-w-300\">\n<div data-iu=\"lb12\" id=\"tablet-tw-ad-lb12\" data-ad-size=\"\" class=\"ad gam\"><\/div>\n<\/p><\/div>\n<p>Answers to the most-asked CyberGuy questions:<\/p>\n<ul>\n<li><a href=\"https:\/\/cyberguy.com\/software\/best-antivirus-protection\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>What is the best way to protect your Mac, Windows, iPhone and Android devices from getting hacked?<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/privacy\/best-vpns\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>What is the best way to stay private, secure and anonymous while browsing the web?<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/how-to\/how-to-get-rid-of-robocalls-with-apps-and-data-removal-services\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>How can I get rid of robocalls with apps and data removal services?<\/u><\/a><\/li>\n<li><a href=\"https:\/\/cyberguy.com\/privacy\/best-services-for-removing-your-personal-information-from-the-internet\/\" target=\"_blank\" rel=\"nofollow noopener\"><u>How do I remove my private data from the internet?<\/u><\/a><\/li>\n<\/ul>\n<p>New from Kurt:<\/p>\n<ul>\n<li><a href=\"https:\/\/cyberguy.com\/Games_FA\" target=\"_blank\" rel=\"nofollow noopener\"><u>Try CyberGuy&#8217;s new games (crosswords, word searches, trivia and more!)<\/u><\/a><\/li>\n<\/ul>\n<div class=\"ad-container mobile ad-h-250 ad-w-300 ad-placeholder-load\">\n<div data-iu=\"ban15\" id=\"mobile-mw-ad-ban15\" data-ad-size=\"\" class=\"ad gam inline\"><\/div>\n<\/p><\/div>\n<p>Copyright 2024 CyberGuy.com.\u00a0All rights reserved.<\/p>\n<div class=\"article-meta\">\n<div class=\"author-bio\">\n<p>Kurt &#8220;CyberGuy&#8221; Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News &#038; FOX Business beginning mornings on &#8220;FOX &#038; Friends.&#8221; Got a tech question? Get Kurt\u2019s free CyberGuy Newsletter, share your voice, a story idea or comment at <a href=\"https:\/\/cyberguy.com\/Newsletter\/\" target=\"_blank\" rel=\"nofollow noopener\">CyberGuy.com.<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>close Video The mystery behind those creepy &#8216;Unknown&#8217; spam calls There&#8217;s a rise in more sophisticated targeted phone scams. Scammers are becoming more sophisticated in their attempts to steal your sensitive data. One particularly concerning trend is the rise of targeted phone scams, where callers possess just enough information to seem legitimate but are actually [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":17573,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,9],"tags":[],"class_list":["post-17572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tech"],"_links":{"self":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/17572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/comments?post=17572"}],"version-history":[{"count":1,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/17572\/revisions"}],"predecessor-version":[{"id":17646,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/posts\/17572\/revisions\/17646"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/media\/17573"}],"wp:attachment":[{"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/media?parent=17572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/categories?post=17572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cissar.com\/index.php\/wp-json\/wp\/v2\/tags?post=17572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}