Skip to content

Blogs

From Our Blog

Check our some recent articles and posts from our blog.

FCC cracks down on robocall reporting violations

If you are tired of scam calls slipping through the cracks, federal regulators just took a meaningful step. The Federal Communications Commission finalized new penalties aimed at telecom companies that submit false, inaccurate or late information to a key anti-robocall system. The changes go into effect Feb. 5. They strengthen oversight of the Robocall Mitigation Database, which plays a central role in tracking spoofed calls and holding providers accountable.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Under the new rules, voice service providers must recertify every year that their filings in the Robocall Mitigation Database are accurate and current. The FCC will now back that requirement with real financial consequences.

FCC SCRUBS OWN REFERENCE TO 'INDEPENDENT' AGENCY FROM WEBSITE AFTER DEM'S TESTY EXCHANGE WITH CHAIRMAN

Here is what the commission approved:

The FCC also made clear that these violations are considered ongoing until corrected, meaning fines can accrue on a daily basis rather than being treated as one-time penalties.

According to the FCC, many past submissions failed basic standards. Some lacked accurate contact details. Others included robocall mitigation plans that did not describe any real mitigation practices at all.

The Robocall Mitigation Database requires providers to verify and certify the identities of callers that use their networks. Regulators and law enforcement rely on it to trace spoofed calls and illegal robocall campaigns. That task is harder than it sounds. America's telecom system is vast and fragmented. Calls often pass through multiple networks owned by major carriers like Verizon and AT&T, as well as smaller regional providers and VoIP services. When calls hop between networks, verification can be missed or ignored. For years, the FCC did not closely verify or enforce the accuracy of these filings. That gap raised serious concerns.

Under the updated rules, providers that fail to recertify or correct deficient filings can be referred to enforcement and removed from the database, which can prevent other carriers from carrying their calls at all.

When robocall filings are wrong or outdated, scam calls are more likely to reach your phone. Providers may treat a call as trusted even when it should raise red flags. That gives robocallers more time to operate and makes it harder for regulators to shut them down quickly. The FCC says stronger penalties and tighter oversight are meant to close that gap before consumers pay the price.

When the FCC proposed penalties, it asked whether violations should be treated as minor paperwork mistakes or as serious misrepresentations. Telecom trade groups pushed back. They argued that fines should not apply unless providers first get a chance to fix errors or unless the FCC proves the filings were willfully inaccurate. 

State attorneys general and the robocall monitoring platform ZipDX urged a tougher stance. They warned that false filings undermine every effort to stop illegal robocalls. The FCC ultimately chose a middle path. It rejected treating violations as harmless paperwork errors. At the same time, it stopped short of imposing the maximum penalties allowed by law.

For everyday consumers, this move matters more than it may seem. Accurate robocall reporting makes it easier to trace scam calls, shut down bad actors and prevent spoofed numbers from reaching your phone. Stronger penalties give telecoms a reason to take these filings seriously instead of treating them as routine compliance chores. 

11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025

The FCC also set a firm annual deadline. Providers must recertify their robocall mitigation filings each year by March 1, creating a predictable enforcement checkpoint. While this will not end robocalls overnight, it tightens a weak link that scammers have exploited for years.

Even with tougher FCC enforcement, scam calls will not disappear overnight. Here are a few smart steps you can take today to reduce your risk.

The FCC says accurate robocall reporting by telecoms helps carriers identify and shut down scam traffic faster, but consumer habits still matter.

Robocalls do not come out of nowhere. Many start with your personal information being sold or shared by data brokers. These companies collect phone numbers, addresses, emails and even family details from public records, apps, purchases and online activity. Scammers and shady marketers buy that data to build call lists. Removing your data from data broker sites can reduce the number of robocalls you receive over time. You can try to do this manually by finding individual data broker websites and submitting removal requests one by one. The process is time-consuming and often needs to be repeated.

Some people choose to use a data removal service to automate this process and continuously monitor for re-posting. That can help limit how often your phone number circulates among marketers and scammers. Less exposed data means fewer opportunities for robocallers to target you. Cutting off robocalls often starts long before your phone rings.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com     

Robocalls thrive when accountability breaks down. By adding meaningful fines, stronger security, annual recertification and filing fees, the FCC is signaling that accuracy is no longer optional. Because penalties can continue to build until problems are fixed, telecoms now face real consequences for ignoring or delaying corrections. This rule forces providers to own their role in stopping illegal calls instead of passing the blame along the network chain. Real progress will depend on enforcement, but this is one of the clearest signs yet that regulators are closing gaps scammers rely on.

Do you think stricter penalties will finally push telecoms to take robocall prevention seriously, or will scammers just find the next loophole? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com.  All rights reserved.

Malicious Mac extensions steal crypto wallets and passwords

Mac users often assume they're safer than everyone else, especially when they stick to official app stores and trusted tools.

That sense of security is exactly what attackers like to exploit. Security researchers have now uncovered a fresh wave of malicious Mac extensions that don't just spy on you, but can also steal cryptocurrency wallet data, passwords and even Keychain credentials. What makes this campaign especially concerning is where the malware was found, inside legitimate extension marketplaces that many people trust by default.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Security researchers at Koi Security uncovered a new wave of the GlassWorm malware hiding inside extensions for code editors like Visual Studio Code (via Bleeping Computer). If you're not familiar with code editors, they're tools developers use to write and edit code, similar to how you might use Google Docs or Microsoft Word to edit text. These malicious extensions appeared on both the Microsoft Visual Studio Marketplace and OpenVSX, platforms widely used by developers and power users.

FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

At first glance, the extensions looked harmless. They promised popular features like code formatting, themes or productivity tools. Once installed, though, they quietly ran malicious code in the background. Earlier versions of GlassWorm relied on hidden text tricks to stay invisible. The latest wave goes further by encrypting its malicious code and delaying execution, making it harder for automated security checks to catch.

Even though this campaign is described as targeting developers, you don't need to write code to be at risk. If you use a Mac, install extensions or store passwords or cryptocurrency on your system, this threat still applies to you.

Once active, GlassWorm goes after some of the most sensitive data on your device. It attempts to steal login credentials tied to platforms like GitHub and npm, but it doesn't stop there. The malware also targets browser-based cryptocurrency wallets and now tries to access your macOS Keychain, where many saved passwords are stored.

Researchers also found that GlassWorm checks whether hardware wallet apps like Ledger Live or Trezor Suite are installed. If they are, the malware attempts to replace them with a compromised version designed to steal crypto. That part of the attack isn't fully working yet, but the functionality is already in place.

To maintain access, the malware sets itself up to run automatically after a reboot. It can also allow remote access to your system and route internet traffic through your Mac without you realizing it, turning your device into a quiet relay for someone else.

Some of the malicious extensions showed tens of thousands of downloads. Those numbers can be manipulated, but they still create a false sense of trust that makes people more likely to install them.

Malicious extensions don't look dangerous. That's what makes them effective. These steps can help you reduce the risk, even when threats slip into trusted marketplaces.

Every extension you install increases risk. If you're not actively using one, remove it. Be especially cautious of extensions that promise big productivity gains, premium features for free or imitate popular tools with slightly altered names.

Check who made the extension. Established developers usually have a clear website, documentation and update history. New publishers, vague descriptions or cloned names should raise red flags.

A password manager keeps your logins encrypted and stored safely outside your browser or editor. It also ensures every account has a unique password, so if one set of credentials is stolen, attackers can't reuse it elsewhere.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

HOW HACKERS ARE BREAKING INTO APPLE DEVICES THROUGH AIRPLAY

Modern macOS malware doesn't always drop obvious files. Antivirus tools today focus on behavior, looking for suspicious background activity, encrypted payloads and persistence mechanisms used by malicious extensions. This adds a critical safety net when something slips through official marketplaces.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

When your data leaks, it often spreads across data broker sites and breaches databases. Personal data removal services help reduce how much of your information is publicly available, making it harder for attackers to target you with follow-up scams or account takeovers.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Enable 2FA wherever possible, especially for email, cloud services, developer platforms and crypto-related accounts. Even if a password is stolen, 2FA can stop attackers from logging in.

Security updates close gaps that malware relies on. Turn on automatic updates so you're protected even if you miss the headlines or forget to check manually.

GlassWorm shows that malware doesn't always come from shady downloads or obvious scams. Sometimes it hides inside tools you already trust. Even official extension stores can host malicious software long enough to cause real harm. If you use a Mac and rely on extensions, a quick review of what's installed could save you from losing passwords, crypto or access to important accounts.

When was the last time you checked the extensions running on your Mac? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2026 CyberGuy.com. All rights reserved. 

NASA returns humans to deep space after over 50 years with February Artemis II Moon mission

NASA plans to return humans to deep space next month, targeting a Feb. 6 launch for Artemis II, a 10-day crewed mission that will carry astronauts around the Moon for the first time in more than 50 years.

"We are going — again," NASA said Tuesday in a post on X, saying the mission is set to depart no earlier than Feb. 6.

The first available launch period will run from Jan. 31 to Feb. 14, with launch opportunities on Feb. 6, 7, 8, 10 and 11.

If the launch is scrubbed, additional launch periods will open from Feb. 28 to March 13 and from March 27 to April 10. For the former, launch opportunities will be available on March 6, 7, 8, 9 and 11, and for the latter on April 1, 3, 4, 5 and 6.

NASA SAYS AMERICA WILL WIN ‘THE SECOND SPACE RACE’ AGAINST CHINA

The mission is scheduled to lift off from Launch Complex 39B at NASA’s Kennedy Space Center in Florida aboard the Space Launch System, the most powerful rocket the agency has ever built.

Preparations are underway to begin moving the rocket to the launch pad no earlier than Jan. 17. The move involves a four-mile journey from the Vehicle Assembly Building to Launch Pad 39B aboard the crawler-transporter 2, a process expected to take up to 12 hours.

"We are moving closer to Artemis II, with rollout just around the corner," Lori Glaze, acting associate administrator for NASA’s Exploration Systems Development Mission Directorate, said. "We have important steps remaining on our path to launch and crew safety will remain our top priority at every turn, as we near humanity’s return to the Moon."

TRANSPORTATION SECRETARY DUFFY TO ANNOUNCE NUCLEAR REACTOR DEVELOPMENT PLAN FOR THE MOON

The 322-foot rocket will send four astronauts beyond Earth orbit to test the Orion spacecraft in deep space for the first time with a crew aboard, marking a major milestone following the Apollo era, which last sent humans to the Moon in 1972.

The crew includes NASA astronauts Reid Wiseman, Victor Glover and Christina Koch, along with Canadian Space Agency astronaut Jeremy Hansen, making Artemis II the first lunar mission to include a Canadian astronaut and the first to carry a woman beyond low Earth orbit.

After launch, the astronauts are expected to spend about two days near Earth checking Orion’s systems before firing the spacecraft’s European-built service module to begin the journey toward the Moon.

BLUE ORIGIN LAUNCHES NEW GLENN ROCKET TO MARS AFTER DELAYS

That maneuver will send the spacecraft on a four-day trip around the far side of the Moon, tracing a figure-eight path that carries the crew more than 230,000 miles from Earth and thousands of miles beyond the lunar surface at its farthest point.

Instead of firing engines to return home, Orion will follow a fuel-efficient free-return path that uses Earth and Moon gravity to guide the spacecraft back toward Earth during the roughly four-day return trip.

The mission will end with a high-speed reentry and splashdown in the Pacific Ocean off the coast of San Diego, where NASA and Department of War teams will recover the crew.

Artemis II follows the uncrewed Artemis I mission and will serve as a critical test of NASA’s deep-space systems before astronauts attempt a lunar landing on a future flight.

NASA says the mission is a key step toward long-term lunar exploration and eventual crewed missions to Mars.