<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[911Cyber: Cyber Hygiene]]></title><description><![CDATA[Actionable data to help you stay safe online.]]></description><link>https://911cyber.substack.com/s/cyber-hygiene</link><image><url>https://substackcdn.com/image/fetch/$s_!UfA9!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc1fc91a8-2bd7-4741-b380-7a6bd0f0291a_1280x1280.png</url><title>911Cyber: Cyber Hygiene</title><link>https://911cyber.substack.com/s/cyber-hygiene</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 17:20:02 GMT</lastBuildDate><atom:link href="https://911cyber.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[911Cyber Company]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[911cyber@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[911cyber@substack.com]]></itunes:email><itunes:name><![CDATA[911Cyber]]></itunes:name></itunes:owner><itunes:author><![CDATA[911Cyber]]></itunes:author><googleplay:owner><![CDATA[911cyber@substack.com]]></googleplay:owner><googleplay:email><![CDATA[911cyber@substack.com]]></googleplay:email><googleplay:author><![CDATA[911Cyber]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Deepfake Medical Imaging]]></title><description><![CDATA[When the diagnosis is the fake news]]></description><link>https://911cyber.substack.com/p/deepfake-medical-imaging</link><guid isPermaLink="false">https://911cyber.substack.com/p/deepfake-medical-imaging</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Wed, 01 Apr 2026 18:10:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_HW4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_HW4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_HW4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!_HW4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!_HW4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!_HW4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_HW4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2098998,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://911cyber.substack.com/i/192874421?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_HW4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!_HW4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!_HW4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!_HW4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2844998b-3a27-46bf-b50e-57d8fe61667b_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>&#127917; </strong>What is a deepfake, and why should you care?</h2><p style="text-align: justify;">A deepfake is any image, video, or audio that looks completely real but was created or manipulated by AI. Most people associate deepfakes with fake videos of politicians saying things they never said, or scammers impersonating a CEO on a video call. But the threat has quietly moved somewhere far more consequential: your health records. When deepfake technology enters the world of medicine, the stakes are not embarrassment or financial loss alone. They are &#8220;misdiagnosis&#8221;, &#8220;mistreatment&#8221;, and in the worst case, someone&#8217;s life.</p><div><hr></div><h2><strong>&#129659; </strong>What&#8217;s happening with medical imaging and deepfake?</h2><p style="text-align: justify;">A study published in March 2026 in Radiology, the journal of the Radiological Society of North America, tested a disturbing question: can trained radiologists tell the difference between a real X-ray and one generated by ChatGPT? The answer was deeply unsettling. Researchers from 12 centers across six countries showed radiologists 264 X-ray images, half real and half AI-generated. Without any warning, fewer than half spotted the fakes. Even after being told synthetic images were present, their accuracy only reached 75%.</p><p style="text-align: justify;">What makes this especially alarming is how easy it was to produce the fake scans. Researchers used simple, plain-language prompts to generate X-rays of specific body parts, specific disorders, and specific levels of image noise. No radiology training. No specialized tools. Just a chatbot.</p><blockquote><p>&#8220;This creates a high-stakes vulnerability for fraudulent litigation if, for example, a fabricated fracture could be indistinguishable from a real one.&#8221; <br>Dr. Mickael Tordjman, Mount Sinai, New York </p></blockquote><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C8HA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C8HA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!C8HA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!C8HA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!C8HA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C8HA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:150477,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://911cyber.substack.com/i/192874421?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C8HA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!C8HA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!C8HA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!C8HA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F840805b7-0724-4acd-9082-0f26c19c5834_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2 style="text-align: justify;"><strong>&#9888;&#65039; </strong>What are the risks?</h2><p><strong>Insurance fraud</strong></p><p>A fake X-ray showing a non-existent fracture or injury can now be generated in seconds to support a fraudulent claim. You no longer need to steal someone else&#8217;s scan.</p><p><strong>Tampered patient records</strong></p><p>If a bad actor gains access to a hospital network, they could inject synthetic images directly into electronic health records, leading doctors to treat conditions that do not exist, or miss ones that do.</p><p><strong>Legal manipulation</strong></p><p>Medical imaging is routinely used as evidence in personal injury lawsuits and malpractice cases. A convincing fake could sway a verdict.</p><p><strong>Poisoned AI training data</strong></p><p>AI tools used in radiology learn from existing scans. If synthetic images enter those training datasets without detection, the diagnostic models themselves become corrupted.</p><p><strong>Erosion of trust</strong></p><p>Two radiologists writing an editorial alongside the study warned that the widespread availability of deepfake technology risks accelerating the erosion of public trust in medical institutions.</p><div><hr></div><h2>&#128301; What&#8217;s coming next?</h2><p style="text-align: justify;">Researchers say X-rays are only the beginning. The next frontier is deepfake 3D medical images: CT scans and MRIs. These are far more complex, carry far more clinical weight, and are used for some of the most consequential diagnoses in medicine. Beyond imaging, the lead researcher noted that any kind of medical data could be faked, including clinical notes signed by a doctor, inserted into a patient&#8217;s chart as a PDF.</p><p style="text-align: justify;">The FDA issued draft guidance in 2024 covering AI-enabled medical devices, but specific safeguards against maliciously generated medical images remain underdeveloped. Researchers are calling for mandatory image watermarking, automated deepfake detection tools built into hospital systems, and dedicated physician training programs.</p><div><hr></div><h2>&#128737;&#65039; How to protect yourself?</h2><p>You may not be a radiologist, but you interact with the healthcare system, and that makes you part of this story. Here is how to protect yourself:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ARE-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ARE-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!ARE-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!ARE-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!ARE-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ARE-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:214039,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://911cyber.substack.com/i/192874421?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ARE-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!ARE-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!ARE-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!ARE-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feeceb181-fd7a-4cfd-894e-0e12f1af370e_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2><strong>&#129520; </strong>Resources to Learn More</h2><p style="text-align: justify;"></p><p style="text-align: justify;">&#128218;<strong>Books </strong></p><ol><li><p style="text-align: justify;"><a href="https://amzn.to/4sEXP66">The Patient&#8217;s Playbook</a> by <a href="https://www.linkedin.com/in/leslie-michelson-2b88b46/">Leslie Michelson</a></p></li><li><p style="text-align: justify;"><a href="https://amzn.to/4c51tPD">Deep Medicine </a>by <a href="https://www.linkedin.com/in/eric-topol-md-b83a7317/">Eric Topol</a></p></li><li><p style="text-align: justify;"><a href="https://amzn.to/4s91vMi">The AI Contagion: Deepfakes, Disinformation, and the Future of Healthcare</a> by Mohammed Mir</p></li></ol><p style="text-align: justify;"></p><p style="text-align: justify;"><strong>&#128196; Research Paper</strong></p><ol><li><p style="text-align: justify;"><a href="https://pubs.rsna.org/doi/10.1148/radiol.252094">The Rise of Deepfake Medical Imaging (Radiology, March 2026)</a></p></li><li><p style="text-align: justify;"><a href="https://www.nature.com/articles/s41598-022-23081-4">DeepFake Knee Osteoarthritis X-rays from GANs (Scientific Reports, 2022)</a></p></li></ol><p style="text-align: justify;"></p><p style="text-align: justify;"><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p style="text-align: justify;"><a href="https://www.theradiologyreview.com/">The Radiology Podcast</a></p><p style="text-align: justify;"></p></li></ol><p style="text-align: justify;"><strong>&#9654;&#65039; Videos</strong></p><ol><li><p style="text-align: justify;"><a href="https://www.cbs.com/shows/video/_hblPZKrjWYvKnr525koiHAmiteeOCTw/">60 Minutes: AI in Medicine (CBS, 2024)</a></p></li><li><p style="text-align: justify;"><a href="https://www.youtube.com/watch?v=VxdqSvq0eYc">Telehealth Fraud, AI, and Cybersecurity: The Compliance Landscape in 2025</a></p><p style="text-align: justify;"></p></li></ol><p style="text-align: justify;"><strong>&#128736;&#65039; Tool</strong></p><ol><li><p style="text-align: justify;"><a href="http://noneedanick.github.io/DeepFakeXRay">DeepFakeXRay (noneedanick.github.io/DeepFakeXRay)</a></p><div><hr></div></li></ol><h2><strong>&#128274;</strong> Final Thoughts</h2><p style="text-align: justify;">Deepfake medical imaging is not a distant threat sitting in a research lab. It is a capability that exists today, is accessible to anyone with a chatbot, and has already demonstrated it can fool the most trained eyes in medicine. The doctors who read your scans are not failing at their jobs. They are facing a tool that was not part of any threat model when their careers began.</p><p style="text-align: justify;">The good news is that awareness is the first line of defense, and you now have it. You know what the risk looks like, you know where it can enter the system, and you know what to watch for in your own records. That puts you ahead of most patients sitting in a waiting room right now.</p><p style="text-align: justify;">Medicine has always required trust. Trust that the doctor sees what is really there. Trust that the record reflects what really happened. Deepfakes do not just threaten a diagnosis. They threaten that trust at its foundation. Protecting it is not only the job of hospitals and regulators. It starts with patients who ask the right questions.</p><p style="text-align: justify;">Stay informed. Stay skeptical. And never assume a picture is worth a thousand words just because it looks like an X-ray.</p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2026 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on: <a href="https://linktr.ee/911cyber">https://linktr.ee/911cyber</a></p>]]></content:encoded></item><item><title><![CDATA[Online Gambling Scams ]]></title><description><![CDATA[The House and The Scammers Always Win.]]></description><link>https://911cyber.substack.com/p/online-gambling-scams</link><guid isPermaLink="false">https://911cyber.substack.com/p/online-gambling-scams</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Mon, 23 Mar 2026 19:01:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SO4C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Online betting has become one of the fastest-growing digital industries on the planet and one of the most fertile hunting grounds for cybercriminals. Every thirty seconds, someone loses money to an online betting scam. In 2024 alone, losses surpassed $4.3 billion. This week, CyberHygiene goes all in on the fraud hiding inside your sportsbook.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SO4C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SO4C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!SO4C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!SO4C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!SO4C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SO4C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:193986,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191888501?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SO4C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!SO4C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!SO4C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!SO4C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F62ad8204-1374-4b21-a2bc-1a8897e4ff56_744x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#127920; What Is Online Betting, and How Does It Work?</h3><p style="text-align: justify;">Online betting is the act of placing wagers on sporting events, casino games, poker, or other outcomes through internet-based platforms and mobile apps. It is a broad category that includes sports betting (NFL, NBA, football, horse racing), iGaming (virtual slots, blackjack, roulette, poker), fantasy sports, and increasingly, esports.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p style="text-align: justify;">The mechanics are straightforward: a user creates an account on a licensed platform, deposits funds via credit card, bank transfer, or cryptocurrency, then places bets on outcomes. Platforms set odds, calculated probabilities that determine how much a winning bet pays out. If your prediction is right, your winnings are credited to your account and can be withdrawn. If wrong, the stake is lost.</p><p style="text-align: justify;">The 2018 U.S. Supreme Court ruling striking down federal restrictions on sports betting opened a tidal wave of legalization. Today, 38 U.S. states allow some form of legal sports betting. In 2024, Americans legally wagered $13.71 billion, up from $4.29 billion in 2021. Global online gambling revenues topped $84 billion in 2023 and are on a trajectory toward $169 billion by 2030.</p><p style="text-align: justify;">Where there is money, there is fraud. And with millions of new, inexperienced users entering the betting ecosystem every year, many of them unfamiliar with the red flags, the conditions for scams couldn&#8217;t be more perfect.</p><div><hr></div><h3>&#128373;&#65039;&#8205;&#9794;&#65039; Threats: The Scammer's Full Playbook</h3><p></p><p>Betting fraudsters don't operate on instinct. They run sophisticated enterprises with designers, developers, and customer service teams. Here are the main attack vectors:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mNT5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mNT5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!mNT5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!mNT5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!mNT5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mNT5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9f10097c-953d-46d8-88a6-266953d47d75_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:73255,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191888501?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mNT5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!mNT5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!mNT5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!mNT5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9f10097c-953d-46d8-88a6-266953d47d75_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>&#128200; How Big Is the Problem?</h2><p style="text-align: justify;">The scale of online betting fraud is staggering and almost certainly undercounted. According to FBI data, only an estimated 13% of betting scam victims ever report the crime. Most blame themselves for bad luck, for poor strategy, never realizing they were robbed.</p><p style="text-align: justify;">The Better Business Bureau received nearly 200 scam reports and over 10,000 business complaints related to online gambling and gaming between 2022 and mid-2025. The average victim loses approximately $15,000 though high-value targets have lost six figures. Forty-five percent of victims report suffering from anxiety, depression, or suicidal thoughts in the aftermath.</p><p style="text-align: justify;">&#8220;Many victims don&#8217;t realize they&#8217;ve been defrauded they blame losses on bad luck or poor betting strategy. The &#8216;dark figure&#8217; of fraud that remains officially uncounted is massive.&#8221;</p><p style="text-align: justify;">The most vulnerable are new players still learning the platforms, people with gambling addictions, those experiencing financial stress, and increasingly older adults. A 2024 survey found that 18% of people over 65 participate in online sports betting &#8220;very often.&#8221; Younger users are targeted through social media ads. In short: there is no safe demographic.</p><div><hr></div><h3>&#128202; Online Betting in Numbers</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D1fn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D1fn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!D1fn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!D1fn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!D1fn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D1fn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf873e49-3b45-4914-bc44-7e8f71566929_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59028,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191888501?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D1fn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!D1fn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!D1fn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!D1fn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf873e49-3b45-4914-bc44-7e8f71566929_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129302; How AI Is Reshaping the Threat Landscape</h3><p>AI has amplified scammers&#8217; capabilities, allowing one person to execute what previously required a team.</p><p style="text-align: justify;">AI as the Scammer&#8217;s Superpower:</p><ul><li><p style="text-align: justify;">AI generates convincing voice and face deepfakes for hundreds of multilingual, fake gambling ads.</p></li><li><p style="text-align: justify;">Fake app store reviews are created rapidly in any language to legitimize malicious apps.</p></li><li><p style="text-align: justify;">Stolen data feeds AI models that craft highly personalized, effective phishing messages.</p></li><li><p style="text-align: justify;">AI clones voices in real-time for fraudulent &#8220;customer support&#8221; to reassure victims and delay chargebacks.</p></li></ul><p style="text-align: justify;">Deepfake financial scams surged 210% between 2024 and 2025, prompting alerts from the FBI, FinCEN, and NY DFS. The EU AI Act (mid-2025) targets identity manipulation, though cross-border enforcement is challenging.</p><div><hr></div><h3>&#128737;&#65039; Protect Yourself: Your Personal Playbook</h3><p>You cannot control the industry. You can control your behavior. Here is what every bettor should do:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!32Gl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!32Gl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!32Gl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!32Gl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!32Gl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!32Gl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:64446,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191888501?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!32Gl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!32Gl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!32Gl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!32Gl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed443f1e-5156-455a-b204-66b9bb1d7b5e_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p><strong>&#129520; What Resources Are Available to Help?</strong></p><p style="text-align: justify;">&#128218;<strong>Books </strong></p><ol><li><p style="text-align: justify;"><a href="https://amzn.to/4uGH3Vz">Smart betting secret and scam expose</a> by OG FSO</p></li><li><p style="text-align: justify;"><a href="https://amzn.to/4bDDCpV">Wired for Risk: The Rise of Online Gambling Addiction</a> by Adam LeMoine</p></li><li><p style="text-align: justify;"><a href="https://amzn.to/4uLaNAz">Gambling on AI</a> by James Whittaker Screech</p></li></ol><p style="text-align: justify;"><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p style="text-align: justify;"><a href="https://music.youtube.com/watch?v=t_Dvs3wiCnU">Online Gambling Scams </a>by Office of Justice Affairs</p></li><li><p style="text-align: justify;"><a href="https://open.spotify.com/show/7qWpxzrQjv1EzrYly1bMjX?si=5d4bdaa0c7884a9f">The Gambling Files</a> by Jon Buford and <a href="https://www.linkedin.com/in/fintancostello/">Fintan Costello</a></p></li><li><p style="text-align: justify;"><a href="https://youtu.be/OV7EE8X2jXM?si=VCus1vdkQt_WODSU">Online Gambling Fraud Exposed </a>on <a href="https://www.linkedin.com/company/corefycom/">Corefy</a> with <a href="https://www.linkedin.com/in/mike-ferrier-mbe/">Mike Ferrier MBE</a></p></li></ol><p style="text-align: justify;"><strong>&#9654;&#65039; Videos</strong></p><ol><li><p style="text-align: justify;"><a href="https://youtu.be/bPvqAMLAiJI?si=J332bZhaSsSxevzQ">Scammers Are Getting Smarter: Gaming Payments &amp; Fraud Prevention</a> on MaxBet Podcast with <a href="https://www.linkedin.com/in/diallo-gordon-35a1671/">Diallo Gordon</a>, <a href="https://www.linkedin.com/in/kiski/">Mike McKiski </a>and <a href="https://www.linkedin.com/in/hillarymcafee/">Hillary McAfee</a></p></li><li></li></ol><p style="text-align: justify;"><strong>&#128736;&#65039; Tools</strong></p><ol><li><p style="text-align: justify;"><a href="https://ublockorigin.com/">uBlock Origin</a>: for blocking malicious betting ads and scam popups.</p></li><li><p style="text-align: justify;"><a href="https://keepassxc.org/">KeePassXC</a>: for creating and storing unique passwords for betting and financial accounts.</p></li><li><p style="text-align: justify;"><a href="https://github.com/elceef/dnstwist">dnstwist</a>: for checking lookalike betting domains and fake clone sites.</p></li><li><p style="text-align: justify;"><a href="https://reportfraud.ftc.gov/">FTC ReportFraud</a>: for reporting online betting or gambling scams.</p></li><li><p style="text-align: justify;"><a href="https://www.ic3.gov/">FBI IC3</a>: for filing complaints about internet-enabled betting fraud.</p></li><li><p style="text-align: justify;"><a href="https://www.bbb.org/scamtracker">BBB Scam Tracker</a>: for reporting scams and checking whether others saw the same fraud.</p></li><li><p style="text-align: justify;"><a href="https://www.ncsc.gov.uk/collection/phishing-scams/report-scam-website">NCSC scam reporting</a>: for reporting suspicious scam websites and phishing in the UK.</p></li><li><p style="text-align: justify;"><a href="https://www.gamblingcommission.gov.uk/public-register">UK Gambling Commission Public Register</a>: for checking whether a gambling operator is officially licensed.</p></li><li><p><a href="https://www.mga.org.mt/licensee-hub/licensee-register/">Malta Gaming Authority Register</a>: for verifying whether an online betting site holds an MGA license.</p><div><hr></div></li></ol><h2>&#128176; The Bottom Line</h2><p style="text-align: justify;">Online betting isn&#8217;t going away. The industry will reach $169 billion by 2030, and more people than ever are placing wagers from their phones. That scale creates an enormous opportunity for legitimate operators and for criminals alike.</p><p style="text-align: justify;">The scammers will keep finding new vectors. AI gives them tools that scale faster than any human enforcement operation can respond. But knowledge remains the most effective defense. Understanding how the fraud works, the fake apps, the withdrawal blocks, the Telegram tipsters, the deepfake ads, makes you vastly harder to victimize.</p><p style="text-align: justify;">The house always has an edge. The scammer&#8217;s edge is your trust. Withdraw it before they do.</p><p style="text-align: justify;">Stay safe. Stay skeptical. And if something feels too good to be true in the world of online betting, it is, every single time.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XDxb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XDxb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!XDxb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!XDxb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!XDxb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XDxb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191888501?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XDxb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!XDxb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!XDxb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!XDxb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff004c911-8a22-4d31-b77a-6abd2625c977_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2026 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on: <a href="https://linktr.ee/911cyber">https://linktr.ee/911cyber</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cybercrime and The Oscars]]></title><description><![CDATA[Hollywood's Biggest Night. Cybercrime's Biggest Opportunity.]]></description><link>https://911cyber.substack.com/p/cybercrime-and-the-oscars</link><guid isPermaLink="false">https://911cyber.substack.com/p/cybercrime-and-the-oscars</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Mon, 16 Mar 2026 18:38:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vATt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vATt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vATt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!vATt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!vATt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!vATt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vATt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c639220c-398e-4454-99f3-2240c410b11c_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1495315,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191154296?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vATt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!vATt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!vATt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!vATt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc639220c-398e-4454-99f3-2240c410b11c_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The 98th Academy Awards aired on March 15, 2026, hosted by Conan O&#8217;Brien at the Dolby Theatre in Hollywood.</p><p style="text-align: justify;">One Battle After Another won Best Picture, taking home six awards. Sinners, Ryan Coogler&#8217;s period vampire thriller celebrating the origins of Blues music, made history, earning four Oscars including Best Actor for Michael B. Jordan.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe today!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p style="text-align: justify;">Billions of people worldwide watched, talked, and searched. And while Hollywood celebrated, cybercriminals were running their own awards campaign, targeting every single person who reached for their phone to find a free stream.</p><div><hr></div><h2><strong>&#127917; What Is the Cyber Threat Hidden Behind The Oscars?</strong></h2><p style="text-align: justify;">Researchers at CyberNews uncovered a live malware campaign named Efimer, specifically built around this year&#8217;s Oscar-nominated films.</p><p style="text-align: justify;">The setup is simple. Someone searches Google for a free stream of Sinners, Hamnet, or One Battle After Another. They land on what looks like a legitimate streaming site. A message appears: &#8220;Install our special player to watch in HD.&#8221;</p><p style="text-align: justify;">That player is malware.</p><p style="text-align: justify;">Every single Best Picture nominee was used as bait. Marty Supreme had 16 malicious links in Google results. Bugonia had 15. Sinners had 12. Roughly one in eight Google results for these films led to a compromised site.</p><p style="text-align: justify;">The threat is not hypothetical. It is live, it is indexed by Google, and it is targeting people right now, the morning after the ceremony.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rJ8n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rJ8n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!rJ8n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!rJ8n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!rJ8n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rJ8n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:144465,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191154296?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rJ8n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!rJ8n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!rJ8n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!rJ8n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85560e9e-9053-4303-8edc-2b094eec3326_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2><strong>&#128272; What Else Happens During Awards Season?</strong></h2><p style="text-align: justify;">Oscar night is not only about fake streaming sites.</p><p style="text-align: justify;">The global buzz around winners creates a surge of fake celebrity accounts, fraudulent giveaways, and deepfake videos. After Michael B. Jordan won Best Actor for Sinners, fake accounts impersonating him began circulating on social media, offering &#8220;exclusive content&#8221; and fake prize draws to followers.</p><p style="text-align: justify;">These scams exploit emotional engagement. When you just watched someone win an Oscar and you see their name trending, your guard drops. That is the moment attackers are counting on.</p><p style="text-align: justify;">Phishing emails also spike during and after award ceremonies, mimicking ticket platforms, streaming services, and fan clubs. Subject lines reference the night&#8217;s biggest winners to trigger curiosity and urgency.</p><p style="text-align: justify;">Awards season is not a pause in cybercrime. It is an acceleration. </p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NCT4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NCT4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!NCT4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!NCT4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!NCT4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NCT4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:174023,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191154296?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NCT4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!NCT4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!NCT4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!NCT4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38170962-053f-4ee4-8b38-6b0e92e0ffd0_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2><strong>&#9888;&#65039; How Can This Impact Everyone?</strong></h2><p style="text-align: justify;">You do not need to search for a free movie to be at risk.</p><p style="text-align: justify;">If you follow celebrities on social media, you are exposed to impersonation scams. If you use a streaming service, your credentials are a target. If you share Oscar reactions online, you may be interacting with fake accounts designed to harvest your data.</p><p style="text-align: justify;">The scale of Oscar Night attention, billions of searches, tens of millions of social media posts, global trending topics, creates the largest single-day audience for entertainment-themed cybercrime of the year.</p><p style="text-align: justify;">Children watching with families, older adults catching up on nominees, and small business employees streaming from work devices are all in scope.</p><p style="text-align: justify;">The red carpet ends. The scam campaign does not.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yv6M!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yv6M!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!yv6M!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!yv6M!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!yv6M!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yv6M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:173202,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191154296?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yv6M!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!yv6M!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!yv6M!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!yv6M!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F165d5b83-5f57-42c5-adbc-458dbe0240b0_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>&#127961;&#65039; What Can You Do Beyond Your Own Devices?</strong></h3><p style="text-align: justify;">Share this with people in your circle who love movies and may not think about security.</p><p style="text-align: justify;">The person most likely to click a fake streaming link is not naive.</p><p style="text-align: justify;">They are simply passionate. Film lovers, families catching up on nominated titles, office colleagues doing post-ceremony recaps are all potential targets.</p><p style="text-align: justify;">Awareness is the cheapest and most effective security tool available. </p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QHy1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QHy1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!QHy1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!QHy1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!QHy1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QHy1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:143640,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191154296?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QHy1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!QHy1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!QHy1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!QHy1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6d44fb0b-443b-4c3d-86e9-46c14565bb14_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3 style="text-align: justify;"><strong>&#129504; Why Nobody Is Exempt</strong></h3><p style="text-align: justify;">You do not need to search for pirated movies to be affected.</p><p style="text-align: justify;">Award shows create a mass moment of emotional engagement. Billions of people sharing the same cultural experience at the same time. That shared attention is the most valuable raw material for social engineering that exists.</p><p style="text-align: justify;">Criminals do not target the cautious. They target the excited, the curious, and the fans. They build scam infrastructure weeks before the ceremony, indexed in search engines and ready to catch the wave the morning after.</p><p style="text-align: justify;">The films nominated for Best Picture this year told stories about battle, survival, and resilience. The cybersecurity lesson is the same: the attack rarely looks like a threat. It looks like something you already wanted.</p><p style="text-align: justify;">&#8220;Free&#8221; is the most expensive word on the internet.</p><div><hr></div><h3><strong>&#129520; What Resources Are Available to Help?</strong></h3><p>&#128218;<strong>Books </strong></p><ol><li><p style="text-align: justify;"><a href="https://amzn.to/4cW5rwd">Digital Security for Celebrities</a> by <a href="https://www.linkedin.com/in/mobiols/">Mart&#237;n Obiols Herrera</a></p></li><li><p style="text-align: justify;"><a href="https://amzn.to/472d8Ns">Securing Your Digital Social Life</a> by Joseph R. Dyer</p></li><li><p style="text-align: justify;"><a href="https://amzn.to/472yR80">Surviving a Cyberattack: Securing Social Media and Protecting Your Home</a> by <a href="https://www.linkedin.com/in/toddshipley/">Todd Shipley</a> and <a href="https://www.linkedin.com/in/artbowker/">Bowker Art</a></p></li></ol><p style="text-align: justify;"><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p style="text-align: justify;"><a href="https://www.youtube.com/watch?v=z-pIKadO63M">Streaming, Malware, Piracy, and Media Entertainment</a> by <a href="https://switchedtolinux.com/">Switched to Linux</a></p></li><li><p style="text-align: justify;"><a href="https://podscan.fm/podcasts/scammed-real-people-real-ripoffs-1/episodes/digital-identity-theft-and-online-scams-real-stories-of-fraud-victims?utm_source=chatgpt.com">Digital Identity Theft and Online Scams: Real Stories of Fraud Victims</a> by Finn Hack</p></li><li><p style="text-align: justify;"><a href="https://open.spotify.com/show/0I61rLfYeWuKXvUFjeGQhX">Scamfluencers</a> by <a href="https://www.linkedin.com/in/scaachi-koul-538a8525/">Scaachi Koul</a> and Sarah Hagi</p></li></ol><p style="text-align: justify;"><strong>&#9654;&#65039; Videos</strong></p><ol><li><p style="text-align: justify;"><a href="https://www.youtube.com/watch?v=J9G66yojDUo">The Secret Malware Inside Your Movies</a></p></li><li><p><a href="https://www.youtube.com/watch?v=3X2Jach4Qqo">Inside the Rise of Fake Celebrity Scams: What to Look Out For</a></p></li></ol><div><hr></div><h2 style="text-align: justify;"><strong>&#128274; Final Thoughts</strong></h2><p style="text-align: justify;">Hollywood celebrated resilience, artistry, and storytelling last night. The films that won showed what it means to fight back, to persist, and to protect what matters.</p><p style="text-align: justify;">The cybersecurity lesson is quieter, but just as urgent.</p><p style="text-align: justify;">The most dangerous moment is not when you feel afraid. It is when you feel excited. When you are caught up in a cultural moment, searching for a film, following a winner, sharing a reaction, your defenses drop. That is the gap that attackers are trained to find.</p><p style="text-align: justify;">Oscar Night happens once a year. The infrastructure cybercriminals built for it will run for months.</p><p style="text-align: justify;">CyberHygiene is not about avoiding the internet or missing cultural moments. It is about enjoying them with your eyes open.</p><p style="text-align: justify;">Watch the films. Celebrate the winners. Just watch where you click.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4juJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4juJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!4juJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!4juJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!4juJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4juJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/191154296?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4juJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!4juJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!4juJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!4juJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8dbd5126-9385-4169-83e2-317fe9a223ea_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2026 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on: <a href="https://linktr.ee/911cyber">https://linktr.ee/911cyber</a></p><div><hr></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[I Have Nothing To Hide]]></title><description><![CDATA[The Most Dangerous Privacy Myth]]></description><link>https://911cyber.substack.com/p/i-have-nothing-to-hide</link><guid isPermaLink="false">https://911cyber.substack.com/p/i-have-nothing-to-hide</guid><pubDate>Mon, 09 Mar 2026 18:31:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!q1Lz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!q1Lz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!q1Lz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!q1Lz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!q1Lz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!q1Lz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!q1Lz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2186154,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/190415045?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!q1Lz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!q1Lz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!q1Lz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!q1Lz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45fbfcb-4849-4596-a5a1-7df60185e224_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Every day, we generate a vast trail of digital data through our phones, apps, searches, and online interactions. Because much of this happens quietly in the background, many people assume it doesn&#8217;t matter. That&#8217;s why a common response to privacy concerns is: &#8220;<strong>I have nothing to hide.</strong>&#8221;</p><p style="text-align: justify;">But this idea misunderstands how the digital world works. Privacy isn&#8217;t about hiding wrongdoing. It&#8217;s about preventing your personal information from being collected, analyzed, and used in ways you never intended. Even the most ordinary information can become powerful in the wrong hands.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2><strong>&#128269; What do I have to hide?</strong></h2><p>A better question is: <strong>&#8220;Do I have anything someone else could weaponize?&#8221;</strong></p><p>Your seemingly innocent data, your location history, browsing habits, political views, private photos, and financial behavior, are not crimes.</p><p>However, in the hands of cybercriminals, data brokers, or malicious actors, these details become tools for manipulation, fraud, coercion, or surveillance.</p><p>This is the central reason why personal data is now one of the world&#8217;s most valuable commodities.</p><div><hr></div><h2><strong>&#128202; The &#8220;Nothing to Hide&#8221; Data Map</strong></h2><p style="text-align: justify;">To a cyber-attacker, you aren&#8217;t a person; you are a <strong>multi-dimensional data set.</strong> </p><p style="text-align: justify;">When you say you have &#8220;nothing to hide,&#8221; you&#8217;re assuming they want your deep dark secrets. They don&#8217;t. </p><p style="text-align: justify;">They want the &#8220;mundane&#8221; data points that allow them to impersonate you, predict your behavior, and bypass your security.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BZQD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BZQD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!BZQD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!BZQD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!BZQD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BZQD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:271939,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/190415045?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BZQD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!BZQD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!BZQD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!BZQD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c54a1b6-0888-44e4-ab3f-88e91e82d5af_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Many of these data points <strong>are never explicitly given by you</strong>. They are <strong>inferred by algorithms</strong>.</p><div><hr></div><h2>&#128204;  <strong>How Your Data Is Weaponized</strong></h2><p>Cybercriminals and malicious actors are not looking for deep secrets. They are looking for the mundane data points that allow them to impersonate you and bypass security. They care if they can use your data to weaponize your information.</p><p>You may be denied: a loan, a job, insurance coverage based on <strong>an AI prediction about your future health or behavior.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4LRy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4LRy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!4LRy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!4LRy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!4LRy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4LRy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:156794,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/190415045?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4LRy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!4LRy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!4LRy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!4LRy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb0ac1c09-e3bc-41dd-a4e1-e995748470e4_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2><strong>&#129504; </strong> <strong>Privacy Is Power and Control</strong></h2><p>When large organizations collect vast amounts of personal data, they gain a massive asymmetry of power over the individual. This imbalance is a central threat to digital autonomy.</p><p>Their data advantage allows them to:</p><ul><li><p>Predict your behavior.</p></li><li><p>Influence your decisions and opinions.</p></li><li><p>Adjust prices for products and services dynamically.</p></li><li><p>Shape the content and news you see.</p></li><li><p>Construct detailed profiles of your life (health, politics, finances).</p></li></ul><p>Privacy is often misunderstood as secrecy. It is not.</p><p>Privacy is about control.</p><p>It is the right to decide who can access, analyze, and profit from your digital life.</p><p>Without that control, data becomes a tool for manipulation, exploitation, and behavioral influence.</p><div><hr></div><h2><strong>&#128737;&#65039; How to Protect Yourself</strong></h2><p>You do not need to disappear from the internet.</p><p>But you should <strong>reduce unnecessary exposure</strong>.</p><p>Small habits can dramatically improve your digital security.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5v-C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5v-C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!5v-C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!5v-C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!5v-C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5v-C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:151910,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/190415045?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5v-C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!5v-C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!5v-C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!5v-C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3ac88ec9-f47d-4e00-93d3-382a21b314af_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>&#129520; What Resources Are Available to Help?</strong></h3><p style="text-align: justify;">&#128218;<strong>Books </strong></p><ol><li><p style="text-align: justify;"><a href="https://amzn.to/4lge2vE">DIGITAL FOOTPRINT DEFENSE</a> by Eduardo Maschietto</p></li><li><p style="text-align: justify;"><a href="https://amzn.to/3MTsoWh">Protecting Your Digital Footprint </a>by Nicholas Lucia</p></li><li><p style="text-align: justify;"><a href="https://amzn.to/4rhyygL">Protecting Your Digital Footprint</a> by Isaac Hungbeme</p></li><li><p style="text-align: justify;"><a href="https://amzn.to/46QZH2P">Unsearchable</a> by William Crawford</p></li><li><p style="text-align: justify;"><a href="https://www.amazon.com/Your-Digital-Privacy-Playbook-Non-Technical-ebook/dp/B0GRFRCTX3/ref=sr_1_7?crid=2DPMUSQADF49D&amp;dib=eyJ2IjoiMSJ9._ClYNGWJEFtZxvoYJk_wcae9lOpN5gTFvlLyP6eO4NWgZ03J8CIIxnUhiTyc1RSNVFYI_4RTOcOkPM3YTaBzoeLaKhNvj8VTCARRODDur5w3mt8s58r1O7x7mhg-WDvKRs0sse7hfSNzw9fkSDqBxDuwC8lLiB2klF9MUM_e0JtwysDtklmUFvMMiyiRpZmAhHAXHk9lBLyS4OfuJ2Y37Ylw7uOLCqk_npy46OMiwHsQxBF4dj_RuoQfPLoP_FsUUUrHoRRV2gGY0VXdrRviQ1jHGQ8ckun9y_P37vNb3-4.rmvSjhQae0DnV3ixdaHSO_mLhxYHY2nYMwc-LfwyXgk&amp;dib_tag=se&amp;keywords=how+to+protect+privacy&amp;qid=1773072541&amp;sprefix=how+to+protect+privacy%2Caps%2C335&amp;sr=8-7">Your Digital Privacy Playbook </a>by Gabe Herrera</p></li><li><p style="text-align: justify;"><a href="https://amzn.to/4ujdTMb">Declutter &amp; Defend</a> by Alessio rocchI</p><p></p></li></ol><p style="text-align: justify;"><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p style="text-align: justify;"><a href="https://www.pbs.org/wgbh/frontline/article/podcast-how-to-protect-yourself-and-your-data-online/">How to Protect Yourself (and Your Data) Online </a>with <a href="https://www.linkedin.com/in/sarahchildress/">Sarah Childress</a>, <a href="https://www.linkedin.com/in/julia-angwin-180316176/">Julia Angwin</a> and Hanni Fakhoury</p></li><li><p style="text-align: justify;"><a href="https://open.spotify.com/show/0EUicNr0gkLJvQFqzvc5oy?si=cc7cc69797754295">Data Protection Made Easy </a>with <a href="https://www.linkedin.com/in/caine-glancy-404773246/">Caine Glancy</a> and <a href="https://www.linkedin.com/in/catarina-pereira-dos-santos-283692150/">Catarina Pereira dos Santos</a></p></li><li><p style="text-align: justify;"><a href="https://www.npr.org/2020/10/09/922262686/your-technology-is-tracking-you-take-these-steps-for-better-online-privacy">Your Technology Is Tracking You. Take These Steps For Better Online Privacy</a> with Laurel Wamsey  and <a href="https://www.linkedin.com/in/eva-galperin-4825a92ba/">Eva Galperin</a></p><p></p></li></ol><p style="text-align: justify;"><strong>&#9654;&#65039; Videos</strong></p><ol><li><p style="text-align: justify;"><a href="https://youtu.be/r8gJMczQTAs?si=Wn4xowDo5gzu7Wmt">Easy Steps to Take Control of Your Online Privacy</a> with <a href="https://www.linkedin.com/in/christophergparker/">Chris Parker</a> and host <a href="https://www.linkedin.com/in/andy-murphy/">Andy M.</a></p><p style="text-align: justify;"></p><p></p></li></ol><p><strong>&#128736;&#65039; Tools</strong></p><ol><li><p style="text-align: justify;"><a href="https://www.torproject.org/download/">Tor Browser</a> - Free and open-source anonymity browser.</p></li><li><p style="text-align: justify;"><a href="https://keepassxc.org/">KeePass / KeePassXC</a> - Fully free open-source password managers.</p></li><li><p style="text-align: justify;"><a href="https://signal.org/">Signal </a>- Free open-source encrypted messaging app.</p></li><li><p style="text-align: justify;"><a href="https://getoutline.org/en-GB/">Outline VPN</a> - Free open-source tool to deploy a private VPN server.</p><div><hr></div></li></ol><h2 style="text-align: justify;"><strong>&#128274; Final Thoughts</strong></h2><p style="text-align: justify;">The phrase <strong>&#8220;I have nothing to hide&#8221;</strong> assumes that privacy is about guilt. It isn&#8217;t.</p><p style="text-align: justify;">Privacy is about <strong>control</strong>.</p><p style="text-align: justify;">Control over who can access your information.<br>Control over how your data is interpreted.<br>Control over how it can be used, or misused, against you.</p><p style="text-align: justify;">The real question isn&#8217;t <strong>whether you have something to hide</strong>.</p><p style="text-align: justify;">The question is: <strong>Could someone use your data against you?</strong></p><p style="text-align: justify;">In the modern digital economy, <strong>data is power</strong>.</p><p style="text-align: justify;">Protecting your privacy isn&#8217;t paranoia. It&#8217;s protecting your autonomy in a world where information can easily be turned into influence, manipulation, or exploitation.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YhFx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YhFx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!YhFx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!YhFx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!YhFx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YhFx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/190415045?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YhFx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!YhFx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!YhFx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!YhFx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8041e075-32b8-4e62-a14f-7ef367b75764_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2026 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on: <a href="https://linktr.ee/911cyber">https://linktr.ee/911cyber</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Roblox Safety]]></title><description><![CDATA[Staying one step ahead]]></description><link>https://911cyber.substack.com/p/roblox-safety</link><guid isPermaLink="false">https://911cyber.substack.com/p/roblox-safety</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Mon, 02 Mar 2026 18:33:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!D_1b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!D_1b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!D_1b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!D_1b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!D_1b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!D_1b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!D_1b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:4047890,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189678571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!D_1b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!D_1b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!D_1b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!D_1b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F76039afb-9d28-4c5f-9dac-fcf419be3da3_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>&#128680;What is Roblox?</h2><p>Roblox is much more than a single video game. It is a massive global platform and &#8220;metaverse&#8221; where users can create, share, and play millions of 3D experiences generated by other users. It functions as a social network, a creative studio, and a digital economy powered by its own currency, Robux.</p><p>Because it blends gaming with social interaction, Roblox faces unique security and privacy challenges. For regular users, staying safe means understanding how the platform works and where the risks hide.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><p>&#128202; Roblox  In Numbers</p><p>The scale of Roblox is staggering. These figures from early 2026 highlight the massive volume of data and interaction the platform handles daily.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LTlf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LTlf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!LTlf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!LTlf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!LTlf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LTlf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:196281,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189678571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LTlf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!LTlf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!LTlf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!LTlf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd35dca2a-9781-40ea-a5e3-0738a2d59647_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>&#128204;  <strong>Roblox Threat Landscape</strong></h2><p>The most dangerous threat to Roblox users today isn&#8217;t a &#8220;technical hack&#8221; of the company itself, but rather social engineering and session theft.</p><p>Cookie Logging is the most sophisticated attack. Attackers try to steal a browser cookie called .ROBLOSECURITY. If they get it, they can bypass your password and 2-Step Verification entirely to take over your account. They often do this by tricking users into pasting code into their browser or sharing &#8220;HAR&#8221; files.</p><p>Phishing and Scams remain rampant. Fake &#8220;Free Robux&#8221; generators, malicious browser extensions like the &#8220;SearchBlox&#8221; incident, and fake job offers on Discord are used to harvest credentials or steal rare in-game items.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IBNA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IBNA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!IBNA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!IBNA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!IBNA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IBNA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:205915,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189678571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IBNA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!IBNA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!IBNA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!IBNA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F714f0f7a-fa27-4176-b355-30acc551dfb0_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>&#129302; Why Roblox Is Such a Prime Target</h2><p>Roblox is a magnet for cybercriminals for three main reasons:</p><ul><li><p><strong>The Economy:</strong></p></li></ul><p>Robux has real-world monetary value. High-value accounts with rare items or large balances can be &#8220;liquidated&#8221; for profit on the dark web.</p><ul><li><p><strong>A Young Audience:</strong></p></li></ul><p>With millions of children on the platform, attackers exploit a lack of technical security knowledge through &#8220;social engineering&#8221;.</p><ul><li><p><strong>Supply Chain Weaknesses:</strong></p></li></ul><p>Attackers often target third-party vendors that work with Roblox, such as event registration sites, to find backdoors into user data.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Aqyz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Aqyz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Aqyz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Aqyz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Aqyz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Aqyz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:193742,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189678571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Aqyz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!Aqyz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!Aqyz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!Aqyz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a44bf2e-579b-42b6-9e3c-44910316b49a_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2><strong>&#128737;&#65039; What Roblox </strong><em><strong>Does</strong></em><strong> to Protect You</strong></h2><p>In late 2024 and early 2025, Roblox launched a major safety overhaul to combat these threats.</p><p><strong>Sentinel AI</strong> is a proactive system that monitors conversation history to detect early signals of grooming or child endangerment. This system helped generate over 1,200 reports to law enforcement in the first half of 2025 alone.</p><p>The platform also uses <strong>Biometric Age Estimation</strong> to ensure users are placed in appropriate chat environments. For technical security, they have implemented <strong>Passkeys</strong>, which allow you to log in using your face or fingerprint, making it nearly impossible for a remote hacker to phish your account. </p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_ZQg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_ZQg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!_ZQg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!_ZQg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!_ZQg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_ZQg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:null,&quot;width&quot;:null,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:206763,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189678571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_ZQg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!_ZQg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!_ZQg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!_ZQg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39645d56-43c3-45a1-bdc0-b749b632b414_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h2>&#128161; How Gamers Can Level Up Their Security</h2><p>Good &#8220;CyberHygiene&#8221; is the best defense. Follow these steps to harden your account:</p><ul><li><p><strong>Use Passkeys or Hardware Keys:</strong> Whenever possible, use FIDO2 security keys (like a YubiKey) or device biometrics. These are much safer than SMS or email codes.</p></li><li><p><strong>Protect Your Session:</strong> Never paste code into your browser&#8217;s Developer Tools (F12) and never share HAR files, as these contain your &#8220;login session&#8221;.</p></li><li><p><strong>Audit Your Extensions:</strong> Regularly remove browser extensions that you don&#8217;t use, especially those that ask for permission to &#8220;read all site data&#8221;.</p></li><li><p><strong>Unique Passwords:</strong> Use a password manager to ensure your Roblox password is long, random, and not used on any other website.</p><div><hr></div></li></ul><h2><strong>&#129504; Parents &amp; Guardians Checklist</strong></h2><p>The updated 2026 parental dashboard allows for much tighter control than in previous years.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UvDJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UvDJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!UvDJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!UvDJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!UvDJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UvDJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:130758,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189678571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UvDJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!UvDJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!UvDJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!UvDJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa501ac6-2b50-4309-8956-b106454eb65d_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2><strong>&#129520; What Resources Are Available to Help?</strong></h2><h3>&#128218;<strong>Books </strong></h3><ol><li><p><a href="https://amzn.to/47e39Vd">Roblox Safety Made Easy</a> by Eliza Trenholm</p></li><li><p><a href="https://amzn.to/4cT87KL">Online Safety in Roblox</a> by Josh Gregory</p></li><li><p><a href="https://amzn.to/4s4lxbT">The Complete Parents&#8217; Guide to Roblox</a> by <a href="https://www.linkedin.com/in/tim-higdem-author/">Tim Higdem</a></p></li><li><p><a href="https://amzn.to/4l0GuS6">Keep Your Kids Safe on Roblox</a> by Fiona Stephens</p></li><li><p><a href="https://amzn.to/400UD8l">The Parents Guide for Roblox </a>by The Roblox Expert</p></li></ol><p></p><h3><strong>&#127897;&#65039; Podcasts</strong></h3><ol><li><p><a href="https://podcasts.apple.com/ca/podcast/we-asked-robloxs-c-e-o-about-child-safety-it-got-tense/id1528594034?i=1000737780180">We Asked Roblox&#8217;s C.E.O. About Child Safety. It Got Tense.</a> on Hard Fork with <a href="https://www.linkedin.com/in/caseynewton1/">Casey Newton</a>, <a href="https://www.linkedin.com/in/kevin-roose/">Kevin Roose</a> and <a href="https://www.linkedin.com/in/davidbaszucki/">David Baszucki</a></p></li><li><p><a href="https://open.spotify.com/episode/0OV9J8fQg0wSg78QZM4SrR?si=dxUDvxTiQRqEK1t8Hg1ZAA">Safety on Roblox Tech Talks</a> with <a href="https://www.linkedin.com/in/davidbaszucki/">David Baszucki</a>, Matt Kaufman and Eliza Jacobs</p></li><li><p><a href="https://connectsafely.org/podcast-inside-robloxs-mission-to-make-gaming-safer/">Inside Roblox&#8217;s Mission to Make Gaming Safer</a> on ConnectSafely with <a href="https://www.linkedin.com/in/larrymagid/">Larry Magid </a>and <a href="https://www.linkedin.com/in/tamibhaumik/">Tami Bhaumik</a></p></li></ol><p></p><h3><strong>&#9654;&#65039; Videos</strong></h3><ol><li><p><a href="https://youtu.be/snsZ0YfgJF8?si=giBcI_vaSdBcMhfA">Roblox Blames PARENTS for Their Predator Problem?!</a> on ClownfishTV</p></li></ol><p></p><h3><strong>&#128736;&#65039; Tools</strong></h3><ol><li><p><strong><a href="https://en.help.roblox.com/hc/en-us">The</a></strong><a href="https://en.help.roblox.com/hc/en-us"> </a><strong><a href="https://en.help.roblox.com/hc/en-us">Roblox Help Center</a></strong> for &#8220;Account Safety&#8221; and the <strong><a href="https://en.help.roblox.com/hc/en-us/articles/30428310121620-Parental-Controls-Overview">Parental Controls Dashboard</a></strong><a href="https://en.help.roblox.com/hc/en-us/articles/30428310121620-Parental-Controls-Overview">.</a></p></li><li><p><strong><a href="https://www.commonsensemedia.org/parents-ultimate-guides/gaming">Common Sense Media</a></strong> provides detailed privacy evaluations and age-appropriateness reviews for Roblox experiences.</p></li><li><p>Familiarize yourself with the <strong><a href="https://www.missingkids.org/home">National Center for Missing and Exploited Children (NCMEC)</a></strong> for reporting serious online harm.</p></li><li><p><strong><a href="https://www.netnanny.com/">Net Nanny</a></strong> helps filter inappropriate content and alerts parents to risky behavior.</p></li><li><p><strong><a href="https://families.google/familylink/">Google Family Link</a></strong>  for free parental controls for Android which includes app management, screen time limits, and safe browsing.</p></li><li><p><strong><a href="https://support.apple.com/en-in/108806">Apple Screen Time</a></strong> which is a Built-in iOS control which limits apps and communication settings.</p><div><hr></div></li></ol><h2><strong>&#128274; Final Thoughts</strong></h2><p>Roblox has made significant strides in 2026 by deploying advanced AI like Sentinel and introducing biometric security features.</p><p>However, technology is only half the battle. Because attackers constantly pivot toward social engineering and session theft, the most effective defense remains a combination of technical &#8220;account hardening&#8221; and open, ongoing communication between gamers and their families.</p><p>Stay skeptical of &#8220;too good to be true&#8221; offers and keep your session data private to enjoy the metaverse safely.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!g3dv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!g3dv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!g3dv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!g3dv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!g3dv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!g3dv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189678571?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!g3dv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!g3dv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!g3dv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!g3dv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F971bcf7e-11c0-4a33-9066-0a177f90088b_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2026 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on: <a href="https://linktr.ee/911cyber">https://linktr.ee/911cyber</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Digital ID]]></title><description><![CDATA[The Invisible Surveillance We&#8217;re All Signing Up For]]></description><link>https://911cyber.substack.com/p/digital-id</link><guid isPermaLink="false">https://911cyber.substack.com/p/digital-id</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Tue, 24 Feb 2026 20:03:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!CZC7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CZC7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CZC7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!CZC7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!CZC7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!CZC7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CZC7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2506928,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189056284?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CZC7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!CZC7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!CZC7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!CZC7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F17019a3f-ebef-492b-b1bd-15b90b552053_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>&#128680;What&#8217;s Going on with Online Identity?</h3><p>In 2026, digital identity systems have become deeply embedded in the way we navigate the online world. What was once a simple process of creating an account with an email address has evolved into an almost universal requirement for real-world identity verification.</p><p>From age-restricted platforms to government services, we&#8217;re increasingly required to verify our identity using biometrics, government IDs, and third-party services. This trend is driven by concerns over fraud, child safety, and personalized services, but it comes at a cost. As more personal information is collected, the risks associated with breaches, misuse, and surveillance have skyrocketed.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>In the wake of several high-profile data breaches and the rise of AI-driven profiling, the question of how and where our identity data is stored and used has never been more critical. We&#8217;re now facing a future where privacy is under threat, and anonymity online is becoming a rare commodity.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ejaJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ejaJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!ejaJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!ejaJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!ejaJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ejaJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:940248,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189056284?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ejaJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!ejaJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!ejaJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!ejaJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdc61bb7a-e037-4a04-9ccc-69938ba29ed5_1920x1080.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#128545; The Digital ID Backlash Is Real</h3><p>The backlash against digital ID systems is intensifying as more people become aware of the potential risks to privacy and security.</p><p>What started as a push to secure online spaces and verify user identity has now sparked heated debates about surveillance, data misuse, and overreach by both governments and corporations.</p><p>Discord, for instance, was forced to retract a controversial ID verification process after users expressed concerns about facial recognition and the privacy of their personal data.</p><p>Similarly, several U.S. states have seen strong opposition to age-verification laws that require users to upload government-issued IDs, with critics arguing that these systems are overly intrusive and can lead to identity theft.</p><p>The fear is real: As we continue to upload more sensitive information online, the risk of breaches and exploitation grows. Privacy advocates are calling for stronger regulations to ensure transparency and accountability, warning that without significant reforms, we&#8217;re heading toward a future where our personal data is up for sale and under constant surveillance.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!a9Dv!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!a9Dv!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png 424w, https://substackcdn.com/image/fetch/$s_!a9Dv!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png 848w, https://substackcdn.com/image/fetch/$s_!a9Dv!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png 1272w, https://substackcdn.com/image/fetch/$s_!a9Dv!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!a9Dv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png" width="1456" height="751" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:751,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:457139,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189056284?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!a9Dv!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png 424w, https://substackcdn.com/image/fetch/$s_!a9Dv!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png 848w, https://substackcdn.com/image/fetch/$s_!a9Dv!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png 1272w, https://substackcdn.com/image/fetch/$s_!a9Dv!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7feed12e-90c9-4135-85b5-ee995ed2e28f_1915x988.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#9888;&#65039; What Can Go Wrong?</h3><p>Data breaches, surveillance misuse, and AI exploitation are some of the biggest concerns surrounding digital ID systems.</p><p><strong>Data Breaches</strong></p><p>If personal identity data (name, address, government IDs, etc.) is stored in centralized databases, hackers can steal it. We&#8217;ve seen massive breaches in platforms like LinkedIn, Facebook, and Equifax that exposed millions of identities.</p><p><strong>Surveillance</strong></p><p>Real-world identities tied to our online actions could create permanent records of everything we do online, especially with the rise of AI systems that can analyze and store data at an unprecedented scale. This leads to a world of permanent surveillance, with corporations and even governments able to track our activities and predict our behavior.</p><p><strong>AI Profiling</strong></p><p>AI systems can use digital identities to build behavioral profiles. These profiles could be used for targeted ads, political manipulation, or even social scoring. This data might not just stay private, but it can be sold to data brokers without us ever realizing it.</p><div><hr></div><h3>&#128737;&#65039; What Can You Do About It?</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0HgK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0HgK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!0HgK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!0HgK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!0HgK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0HgK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:170752,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189056284?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0HgK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!0HgK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!0HgK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!0HgK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F820dc893-2fb3-4b94-aa9b-04af870e601a_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129488; Why Should We Push Back Against This Trend?</h3><p>As digital identity systems evolve, we risk losing control over our personal information. Once our data is uploaded and stored, it can be exploited by hackers, used for unwanted profiling, and shared without our consent.</p><p>The current trends of digital surveillance are normalizing behaviors that could fundamentally shift what it means to live in a free society.</p><p>Privacy is a basic human right, and if we allow these systems to expand unchecked, we may be giving up more than we realize.</p><p>Fighting back means protecting our right to privacy and advocating for strong laws that regulate how our data is used, who can access it, and how long it&#8217;s stored.</p><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><p>&#128218;<strong>Books</strong></p><ol><li><p><a href="https://amzn.to/4lboJ2N">AI in the Surveillance: The Digital Eye of Control</a> by Sebesty&#233;n Istv&#225;n</p></li><li><p><a href="https://amzn.to/46qo3Ad">Surviving the Surveillance Internet</a> by Taylor Royce</p></li><li><p><a href="https://amzn.to/4qRg5aM">THE DEATH OF PRIVACY</a> by JD Arden</p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><a href="https://grcacademy.io/podcast/s1-e32-digital-identity-wallets-how-they-work-and-what-big-tech-is-hiding/">Digital Identity Wallets: How They Work and What Big Tech Is Hiding</a> by GRC Academy with Dr. Paul Ashley</p></li><li><p><a href="https://www.americanbanker.com/podcast/what-might-digital-identity-look-like-in-the-future">What might digital identity look like in the future? </a>By Penny Crosman</p></li><li><p><a href="https://podcast.show/identitypodcast/">Let&#8217;s Talk About Digital Identity</a> by Oscar Santolalla</p></li><li><p><a href="https://medium.com/@larrydelaneyjr/ai-and-the-future-of-identity-episode-2-the-hidden-cameras-reading-your-emotions-biometric-ai-0f2b6346b45b">AI and the Future of Identity</a> by JR DeLaney</p></li></ol><p>&#127759; Other</p><p><a href="https://911cyber.app/digital-id-world-map/">Digital ID World Map</a> by <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><div><hr></div><h3>&#128274; Final Thoughts</h3><p>Digital IDs and online identity verification may seem like a solution to online safety, but they come with serious risks. As individuals, we have the power to take control of our data by practicing cyber hygiene and using the tools available to protect our privacy.</p><p>But we also need to push for stronger regulations to ensure our data is safe and used responsibly. The more we educate ourselves and act now, the better we can prevent a future where surveillance becomes the norm and our privacy is compromised.</p><p>It&#8217;s not too late to act, but the time is now. If we don&#8217;t demand stronger privacy laws today, we could wake up tomorrow in a world where <strong>anonymity online</strong> is extinct, and our every move is tracked.</p><p>Stay informed. Stay protected. Stay vigilant.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!43fY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!43fY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!43fY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!43fY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!43fY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!43fY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/189056284?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!43fY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!43fY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!43fY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!43fY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F313fbf41-920b-4264-8cb0-28b816777a8c_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2026 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on: <a href="https://linktr.ee/911cyber">https://linktr.ee/911cyber</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Your Privacy Starts With You]]></title><description><![CDATA[Stop feeding the beast that may eat you later]]></description><link>https://911cyber.substack.com/p/your-privacy-starts-with-you</link><guid isPermaLink="false">https://911cyber.substack.com/p/your-privacy-starts-with-you</guid><pubDate>Mon, 16 Feb 2026 18:40:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!lxeo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lxeo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lxeo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!lxeo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!lxeo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!lxeo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lxeo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9966a907-630e-4133-962b-c470e3ea53ed_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:493009,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/188168771?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!lxeo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!lxeo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!lxeo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!lxeo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9966a907-630e-4133-962b-c470e3ea53ed_744x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>&#128248; What Does a Picture Reveal About You?</h2><h4><strong>The Illusion of &#8220;It&#8217;s Just a Photo&#8221;</strong></h4><p></p><p>A single image can expose far more than most people realize.</p><p>Your face reveals biometric markers.<br>Your background reveals location clues.<br>Your clothing and devices reveal socioeconomic signals.<br>Your companions reveal your social graph.<br>Your home interior reveals security posture.</p><p>Even without GPS metadata, architecture, vegetation, terrain, weather patterns, and signage can help infer location.</p><p>You may think you are sharing a memory.</p><p>In reality, you are sharing identifiers.</p><p>The illusion is believing that a photo is just a visual moment.<br>In the AI era, it is a data asset.</p><div><hr></div><h2><strong>&#127970; What Happens After You Upload It?</strong></h2><p>When you upload an image to a platform, you do not simply share it. You transfer control.</p><p>Most users assume:</p><ul><li><p>The company will exist indefinitely</p></li><li><p>The privacy policy will remain stable</p></li><li><p>The data will stay contained<br></p></li></ul><p>History shows otherwise.</p><p>Companies get acquired.<br>They pivot business models.<br>They go bankrupt.<br>They sell assets.</p><p>When a startup is acquired by a larger AI company such as OpenAI, datasets often become part of a broader ecosystem.</p><p>In bankruptcy cases, user databases can be treated as assets.</p><p>The platform you trusted today may not resemble the entity controlling your data tomorrow.</p><p>And your consent rarely travels with ownership changes in a meaningful way.</p><div><hr></div><h2>&#128202; The State of Privacy</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mQUl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mQUl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!mQUl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!mQUl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!mQUl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mQUl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c68bd359-7353-4525-8948-c85d2e1e355d_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:59952,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/188168771?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mQUl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!mQUl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!mQUl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!mQUl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc68bd359-7353-4525-8948-c85d2e1e355d_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>&#129302; What Are the New AI Capabilities?</h2><h4><strong>AI Geolocation + Profiling = Compounding Risk</strong></h4><p></p><p>AI systems no longer rely solely on metadata.</p><p>Platforms such as GeoSpy demonstrate that location can be inferred from pixels alone.</p><p>Modern computer vision can:</p><ul><li><p>Estimate geographic location</p></li><li><p>Identify recurring faces across platforms</p></li><li><p>Build behavioral patterns</p></li><li><p>Detect objects and valuables</p></li><li><p>Model your daily environment<br></p></li></ul><p>Individually, a photo seems harmless.</p><p>Collectively, hundreds of uploads enable precision profiling.</p><p>Attackers no longer need to break into your systems.</p><p>They analyze what you voluntarily provided.</p><p>The risk compounds over time.</p><div><hr></div><h2>&#128737;&#65039; What Can You Do About It?</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zpQj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zpQj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!zpQj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!zpQj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!zpQj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zpQj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c4004cd8-877d-469b-8f91-f757c1932f65_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:43262,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/188168771?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zpQj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!zpQj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!zpQj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!zpQj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4004cd8-877d-469b-8f91-f757c1932f65_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2><strong>&#129520; What Resources Are Available to Help?</strong></h2><p>&#128218;<strong>Books </strong></p><ol><li><p><a href="https://amzn.to/46VNKJ5">Your Face Belongs to Us</a> by <a href="https://www.linkedin.com/in/kashmirhill/">Kashmir Hill</a></p></li><li><p><a href="https://amzn.to/4rY444k">Privacy is Power </a>by <a href="https://www.linkedin.com/in/carissa-v%C3%A9liz-a5781555/">Carissa Veliz</a></p></li><li><p><a href="https://amzn.to/40fgl8s">You Are Not a Gadget</a> by Jaron Lanier</p></li><li><p><a href="https://amzn.to/4rmVf48">The Fight for Privacy</a> by <a href="https://www.linkedin.com/in/danielle-citron-9a03264/">Danielle Keats Citron</a></p></li><li><p><a href="https://amzn.to/40fgo48">AI Snake Oil</a> by Arvind Narayanan &amp; <a href="https://www.linkedin.com/in/ksayash/">Sayash Kapoor</a></p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><a href="https://open.spotify.com/episode/2W958HMn5HlTBTnYvhqnDk?si=M3n_1W0LSJ6Aa_bnN8X3Rg">About Face (Recognition) | How I Fix the Internet</a> by <a href="https://www.linkedin.com/in/kashmirhill/">Kashmir Hill</a></p></li><li><p><a href="https://podcasts.apple.com/ca/podcast/at-face-value-facial-recognition-technologies-and/id1550136324?i=1000651381376">At face value: Facial recognition technologies and privacy</a> on Info Matters Podcast by Cynthia Koo</p></li><li><p><a href="https://www.cybereason.com/blog/malicious-life-podcast-inside-clearview-ai-facial-recognition-0?utm_source=chatgpt.com">Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 1</a> with <a href="https://www.linkedin.com/in/tedclaypoole/">Ted Claypoole</a>, <a href="https://www.linkedin.com/in/yossi-n-35113b1/">Yossi Naar</a> and Ran Levi</p></li></ol><p><strong>&#9654;&#65039; Videos</strong></p><ol><li><p><a href="https://youtu.be/WyOA2zwDImw?si=oRgrxmERHjr2Duvs">The Privacy Dilemma: Risks Posed by Facial Recognition Technology</a> by <a href="https://www.linkedin.com/in/debbieareynolds/">Debbie Reynolds</a></p><div><hr></div></li></ol><h2><strong>&#128274; Final Thoughts</strong></h2><p><strong>The Internet doesn&#8217;t forget, and it doesn&#8217;t forgive.</strong></p><p>We often blame platforms for invading our privacy, but the harder truth is that we volunteered the data. AI systems never stop learning, and the internet rarely deletes.</p><p>The question isn&#8217;t whether you trust today&#8217;s platform. The question is whether you trust every future version of it. Before you upload that next &#8220;harmless&#8221; photo, pause. <strong>Your privacy starts with you.</strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9wS9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9wS9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!9wS9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!9wS9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!9wS9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9wS9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.911cyber.app/i/188168771?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9wS9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!9wS9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!9wS9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!9wS9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb6c83253-9ed9-489b-b2b0-a7ebeca23a91_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2026 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on: https://linktr.ee/911cyber</p><div><hr></div>]]></content:encoded></item><item><title><![CDATA[Ring Doorbell]]></title><description><![CDATA[AI Surveillance and Privacy Risks]]></description><link>https://911cyber.substack.com/p/ring-doorbell</link><guid isPermaLink="false">https://911cyber.substack.com/p/ring-doorbell</guid><pubDate>Mon, 09 Feb 2026 23:34:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WJmw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WJmw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WJmw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!WJmw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!WJmw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!WJmw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WJmw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/582a01d3-e621-4544-99bf-c859c539fe27_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:653782,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://911cyber.substack.com/i/187455750?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WJmw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!WJmw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!WJmw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!WJmw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F582a01d3-e621-4544-99bf-c859c539fe27_744x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#128247; What Is a Ring Camera?</h3><p><a href="https://www.linkedin.com/company/ring-labs/">Ring</a> is a consumer home security company owned by <a href="https://www.linkedin.com/company/amazon/">Amazon</a> . Its products include video doorbells and security cameras designed to monitor doors, yards, and indoor spaces.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>These devices record video, detect motion, send alerts to users&#8217; phones, and store footage in the cloud. Ring also operates the <em>Neighbors</em> app, which allows users to share videos and alerts with people nearby and, in some cases, local authorities.</p><p>Marketed as safety tools, Ring cameras function as always-on sensors connected to cloud infrastructure and increasingly powered by AI.</p><div><hr></div><h3>&#128269; What Are the Privacy Concerns?</h3><p>Ring&#8217;s privacy issues are not hypothetical. They are documented.</p><p>In 2023, the U.S. Federal Trade Commission found that Ring employees had unrestricted access to customer video feeds for years, allowing them to view private footage without sufficient oversight. In addition, weak security practices enabled hackers to take over accounts and spy on users.</p><p>Ring has also faced criticism for encouraging widespread video sharing with law enforcement, sometimes without warrants, and for capturing footage of people who never consented to being recorded.</p><p>When cameras are installed on private homes but monitor public and semi-public spaces, privacy stops being an individual choice.</p><div><hr></div><h3>&#129302; How Do New AI Features Impact Privacy?</h3><p>Recent and recent-adjacent features, including facial recognition, tagging familiar faces, and AI-powered search across video footage, shift Ring from passive recording to active identification.</p><p>Even when users only label people they know, the system still scans every face that appears on camera. That means neighbors, delivery workers, visitors, and passersby are analyzed without consent.</p><p>This is a fundamental shift. The technology is no longer just recording events. It is interpreting human presence.</p><div><hr></div><h3>&#128202; Ring in Numbers</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bl51!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bl51!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!Bl51!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!Bl51!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Bl51!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bl51!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:48113,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://911cyber.substack.com/i/187455750?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Bl51!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!Bl51!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!Bl51!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Bl51!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7848e1eb-9a71-4079-bb6c-5ee6fcafefdd_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#128272; What Are the Security Concerns?</h3><p>Internet-connected cameras are high-value targets.</p><p>Ring has experienced multiple security incidents, including account takeovers where attackers accessed live feeds, spoke through cameras, and monitored households. These incidents were enabled by poor authentication controls and delayed enforcement of security best practices like mandatory two-factor authentication.</p><p>When a security camera is compromised, it does not just expose data. It exposes real people, real homes, and real routines.</p><div><hr></div><h3>&#127757; How Can This Impact Everyone?</h3><p>You do not need to own a Ring camera to be affected by one.</p><p>A single doorbell can record an entire sidewalk. Multiple cameras can map daily routines. AI features can quietly turn neighborhoods into sensor networks.</p><p>As more people adopt these devices, opting out becomes impossible. Privacy erosion becomes collective, not individual.</p><div><hr></div><h3>&#9888;&#65039; How Privacy Failures Can Reduce Safety</h3><p>Surveillance does not automatically equal safety.</p><p>Footage leaks can expose victims, witnesses, and vulnerable individuals. Abusers can misuse cameras for stalking. Criminals can analyze publicly shared videos to plan attacks.</p><p>When trust in technology erodes, people change their behavior, avoid public spaces, and hesitate to seek help.</p><p>Safety without privacy is fragile.</p><div><hr></div><h3>&#129520; CyberHygiene Checklist</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RnEP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RnEP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!RnEP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!RnEP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!RnEP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RnEP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:46436,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://911cyber.substack.com/i/187455750?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RnEP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!RnEP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!RnEP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!RnEP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a029bd2-98e0-4e4e-9eb3-a918d2c74aa3_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#127961;&#65039; What can you do about cameras and AI in public places?</h3><p>Awareness is step one.</p><p>Support transparency laws, local regulations, and community discussions around surveillance technology. Ask schools, apartment buildings, and workplaces how cameras are used, stored, and protected.</p><p>Push for clear boundaries. AI should assist humans, not silently monitor them.</p><div><hr></div><h3>&#129504; Why Nobody Is Exempt</h3><p>It is easy to think privacy risks only apply to people who own smart cameras. That assumption is wrong.</p><p>You can be recorded without ever installing a device. A neighbor&#8217;s doorbell can capture your face. A delivery camera can log your routines. A shared hallway camera can store your movements in the cloud. Once AI is added, those recordings are no longer passive. They become searchable, sortable, and analyzable.</p><p>You do not need to opt in to be included. You simply need to walk by.</p><p>Children, visitors, delivery workers, and vulnerable populations are especially exposed. They have no control over how long footage is stored, who accesses it, or how it is used in the future. Even if a system is marketed as private, the people being recorded rarely have visibility or consent.</p><p>As surveillance technology spreads, opting out becomes impossible. Privacy stops being a personal setting and becomes a community issue. That is why CyberHygiene is no longer just about protecting your own devices. It is about understanding how other people&#8217;s devices affect you too.</p><div><hr></div><p><strong>&#129520; What Resources Are Available to Help?</strong></p><p>&#128218;<strong>Books</strong></p><ol><li><p><a href="https://www.amazon.com/AI-Surveillance-Digital-Eye-Control-ebook/dp/B0G7SL243P/ref=sr_1_2?crid=352UI3SEYQSBB&amp;dib=eyJ2IjoiMSJ9.5CMPwidvwVWTY1gJDbR2OO4nGwu_FbOVuROcRt9YVt97IqGOQTNUPwtj8tuaLYcO1jmf_SNP2sVrowGZetFqL9R3p6dSv-LWcg5-Kr-clG-H2QSmRA5V_yS8GMEc5I-fQZauRwq0s63ztj_ACY5QIm-0ks1YgRXIodDC06I_UeBvZ6bDvbiaZVtO_Lnbv80-kzevOTTIKj2UsHAdAecfxVZX2g55b3YkphB_hQCdYbA.FYaLSKLNQpEHHGOO-fGfbw6blrm4NUaDV5p71y9q9S0&amp;dib_tag=se&amp;keywords=ai+in+surveillance+%26+monitoring+book&amp;qid=1770653061&amp;sprefix=ai+in+surveillance+%26+monitoring+boo%2Caps%2C306&amp;sr=8-2">AI in the Surveillance: The Digital Eye of Control</a> by Sebesty&#233;n Istv&#225;n</p></li><li><p><a href="https://www.amazon.com/Automating-Inequality-High-Tech-Profile-Police/dp/1250215781/ref=sr_1_1?crid=3LHGZLCZOG4H1&amp;dib=eyJ2IjoiMSJ9.LPoZC9frqeR5DSJFh2QBLAasy_6p3a_TEcMvWpeHmrtzU6lmQPL6j-14e6PQbfJq6WeQRbfbr9zBDlL38O79mV9n8x0iz7o40zwlpbQ42mwZnJQAZgUNUPRfEw5DF-ZekBQC4bI1i9aIsMvHhd5TvOVzFHhfoxvdTf9-lISEmhs.zD7GFAQcRi-qaROLPzHsodqOoCp0tTm1YJy5UB3f2GU&amp;dib_tag=se&amp;keywords=Automating+Inequality&amp;qid=1770653180&amp;sprefix=automating+inequality%2Caps%2C363&amp;sr=8-1">Automating Inequality</a> by <a href="https://www.linkedin.com/in/virginia-eubanks-92012788/">Virginia Eubanks</a></p></li><li><p><a href="https://www.amazon.com/Age-Surveillance-Capitalism-Future-Frontier/dp/1610395697">The Age of Surveillance Capitalism</a> by Shoshana Zuboff</p></li><li><p><a href="https://www.amazon.com/Race-After-Technology-Abolitionist-Tools/dp/1509526404/ref=sr_1_1?crid=GZOIFCFWTIUM&amp;dib=eyJ2IjoiMSJ9.UMwabMW5PX0UfLucmEq1NfDu4YfR6hrGRFjElK1urXjoYEaQbBJgmUDLvl0gLnabMabqhfX6Sbx-CZ4xsfyAkouINYvpFKvh2Veon9CuUjI.iQD01F724Ar8Q6KT_Nzm7J3NzfUnXkjus1xdn6nmWsY&amp;dib_tag=se&amp;keywords=race+after+technology+by+ruha+benjamin&amp;qid=1770653244&amp;sprefix=Race+After+Technology+%2Caps%2C335&amp;sr=8-1">Race After Technology</a> by <a href="https://www.linkedin.com/in/ruha9/">Ruha Benjamin</a></p></li><li><p><a href="https://www.amazon.com/American-Surveillance-Intelligence-Privacy-Amendment/dp/0299308804/ref=sr_1_1?crid=IX6WF3GBPLG0&amp;dib=eyJ2IjoiMSJ9.Ayja5dH8OV6VX1B_L9NDIiCfu5C-gY4GmKv4hFD1tkbeCo8VSrfy3d8Etb98jIXvZSvLQlcyHHQKVe3VHo63QT5s6NVV1GAMNFdkFJ3SVi-hQ_i7h6iXoy2TpCEPZ0xPHh3tGkfr8iTTx65cJ3yDbx1CQ4Uz99H93zmOO00MzCuSzVUS4VKqhvJpIhKwsxqJP_igaVoekEz1bSd2UmXULlFOBhFqS9llc0DJFhj30a4.ezabmrpj2bN2qxwqPRl47MjCK7NuTWCe98whGilYs3I&amp;dib_tag=se&amp;keywords=American+Surveillance%3A+Intelligence%2C+Privacy%2C+and+the+Fourth&amp;qid=1770653325&amp;sprefix=american+surveillance+intelligence%2C+privacy%2C+and+the+fourth%2Caps%2C317&amp;sr=8-1">American Surveillance: Intelligence, Privacy, and the Fourth Amendment</a> by Anthony Gregory</p></li><li><p><a href="https://www.amazon.com/Mastering-Security-Cameras-Step-Step-ebook/dp/B0G52KFRMJ/ref=sr_1_3?crid=2XC16P5A1QLBN&amp;dib=eyJ2IjoiMSJ9.1bFHbP5b1s892sV_MJ564-5GV93ihB__Ord6Rx9apxBZA3FwRCwlwrD6QZKx8eJbE5b-OJujxqb0m1IXcjHcsSLLpwuYlnZtM8lIdECzT0F8TBgFbrY0ctvlwzGlFwGhXjawF6RKYyCIePShj7uhQw.aLjJD5nxtxWGzBn49ECVia7dMmL3dUAIJieNKmS9Bsg&amp;dib_tag=se&amp;keywords=Mastering+AI+Home+Security+Cameras&amp;qid=1770653421&amp;sprefix=mastering+ai+home+security+cameras+%2Caps%2C307&amp;sr=8-3">Mastering AI Home Security Camera</a> by Vector Sentry</p></li><li><p><a href="https://www.amazon.com/Video-Surveillance-Privacy-Everyday-Scholarship/dp/1593323700/ref=sr_1_1?crid=XBN928HGNL9P&amp;dib=eyJ2IjoiMSJ9.JIiuLufoEzJZfENmBy03L9T7PX8WilpEn4DQHUfl7MVFiRe0lsDhOz_Yuah2hpWpo9zrVVvdRPwU4GnZML-kzTancGsRwb6rjw6lo7S_iFhHmvCYo1X3pEIk9xFYvw7rG2uHVQuCaSsGEwwKhbgqdGe9sKJ04gR2_AqnSD-RfUgOzD2PHlzIWpvnpJqmmurxFqNDO0AH5Pl6gJH7mSAyTZrXw6h45eK6lMqwmDIKZiA.jo9-mmhS_wf3xM5fjXivhqE2MqV5-28KG0Rdbn9xFh0&amp;dib_tag=se&amp;keywords=Video+Surveillance%3A+Power+and+Privacy+in+Everyday+Life&amp;nsdOptOutParam=true&amp;qid=1770653485&amp;sprefix=video+surveillance+power+and+privacy+in+everyday+life+%2Caps%2C329&amp;sr=8-1">Video Surveillance: Power and Privacy in Everyday Life</a> by Bilge Yesil</p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><a href="https://youtu.be/fVuVJTmglAQ?si=Uq5xSNgls4N1iAHe">Is Your Ring Doorbell Feeding ICE? The Surveillance Trade You Never Agreed To</a> on <a href="https://www.linkedin.com/company/rethinkingtechpodcast/">Rethinking Tech </a>by <a href="https://www.linkedin.com/in/aparnabhushan/">Aparna Bhushan</a> and <a href="https://www.linkedin.com/in/harindak/">Dr. Harinda K.</a></p></li><li><p><a href="https://youtu.be/W5Ishw7rkRk?si=SqKJdmCUywgbL_Sv">Ring Doorbells Just Got Facial Recognition &#8212; Why Privacy Experts Are Worried!</a> On <a href="https://www.linkedin.com/company/shared-security-podcast/">Shared Security</a> Podcast hosted by <a href="https://www.linkedin.com/in/tomeston/">Tom Eston</a> and <a href="https://www.linkedin.com/in/scottwright/">Scott Wright</a></p></li><li><p><a href="https://open.spotify.com/episode/4qMFRRLZUe7xTq3cXb6Sq3?si=Emj8_r2CRwu4uGvDo2wnsw">Amazon Privacy &amp; Spotify Fines</a> on the The Data Rockstar&#8217;s Coffee PodCAST</p></li></ol><p><strong>&#9654;&#65039; Videos</strong></p><ol><li><p><a href="https://youtu.be/hIXhnWUmMvw?si=7809mTwKnD9qk4Af">Shoshana Zuboff on surveillance capitalism</a> | VPRO Documentary by <a href="https://www.linkedin.com/company/vpro/">VPRO</a></p></li></ol><div><hr></div><h3>&#128273; Final Thoughts</h3><p>Ring&#8217;s AI camera is marketed as a symbol of safety, community, and peace of mind. The Super Bowl commercial frames a growing surveillance network as a tool for good, helping neighbors find lost dogs and feel more connected.</p><p>But technology rarely stays confined to its original purpose. What begins as a convenience feature often evolves into a broader system of monitoring, data collection, and automated decision-making. When AI quietly analyzes faces, movements, and behaviors across millions of front doors, privacy is redefined without a clear public conversation.</p><p>The real risk is not a single feature or a single company. It is how quickly surveillance becomes normal, invisible, and unquestioned. When privacy fades, trust erodes. When trust erodes, safety becomes fragile.</p><p>CyberHygiene is about awareness before acceptance. The future of privacy will not be decided by ads or algorithms alone. It will be shaped by how willing we are to question what we invite into our homes and neighborhoods.</p><div><hr></div><p>Sources:<br><a href="https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-says-ring-employees-illegally-surveilled-customers-failed-stop-hackers-taking-control-users">https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-says-ring-employees-illegally-surveilled-customers-failed-stop-hackers-taking-control-users</a></p><p><a href="https://www.businessinsider.com/ring-went-from-shark-tank-to-largest-civilian-surveillance-network-2025">https://www.businessinsider.com/ring-went-from-shark-tank-to-largest-civilian-surveillance-network-2025</a></p><p><a href="https://www.sec.gov/Archives/edgar/data/1018724/000121465924009029/o514240px14a6g.htm">https://www.sec.gov/Archives/edgar/data/1018724/000121465924009029/o514240px14a6g.htm</a></p><p><a href="https://nypost.com/2026/02/04/tech/amazon-ring-products-expand-ai-powered-network-to-help-find-lost-dogs/">https://nypost.com/2026/02/04/tech/amazon-ring-products-expand-ai-powered-network-to-help-find-lost-dogs/</a></p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-says-ring-employees-illegally-surveilled-customers-failed-stop-hackers-taking-control-users">https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-says-ring-employees-illegally-surveilled-customers-failed-stop-hackers-taking-control-users</a></p><p><a href="https://www.nextgov.com/digital-government/2023/06/ftc-charges-ring-over-disregard-customer-data-security/386993/">https://www.nextgov.com/digital-government/2023/06/ftc-charges-ring-over-disregard-customer-data-security/386993/</a></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!u5Gs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!u5Gs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!u5Gs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!u5Gs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!u5Gs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!u5Gs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:37358,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/gif&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://911cyber.substack.com/i/187455750?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!u5Gs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!u5Gs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!u5Gs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!u5Gs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6820543f-2e1e-4e56-bb56-9855c620928f_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><div><hr></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app"><span>Get Help</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2026 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><strong><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></strong></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">This Substack is reader-supported. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Botnets]]></title><description><![CDATA[The Workforce Behind Modern Cybercrimes]]></description><link>https://911cyber.substack.com/p/botnets</link><guid isPermaLink="false">https://911cyber.substack.com/p/botnets</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Wed, 28 Jan 2026 19:00:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rEa5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rEa5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rEa5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!rEa5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!rEa5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!rEa5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rEa5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png" width="711" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:711,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rEa5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!rEa5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!rEa5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!rEa5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff8e58a76-6246-4958-a6c9-24a34bec2a37_711x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3><strong>&#129302; What a Botnet Really Is</strong></h3><div><hr></div><p>A botnet is a network of compromised devices remotely controlled by an operator, often without the owner&#8217;s knowledge.</p><p>These devices can include:</p><ul><li><p>Routers</p></li><li><p>IP cameras</p></li><li><p>Printers</p></li><li><p>Servers</p></li><li><p>Cloud workloads</p></li><li><p>Smart home and office equipment</p></li></ul><p>Once enrolled, devices continue to function normally while executing commands such as sending spam, launching DDoS attacks, or harvesting credentials.</p><p>Botnets are not a single malware family. They are an operational model.</p><div><hr></div><h3><strong>&#128376;&#65039; How Does a Botnet Work</strong></h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pDL5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pDL5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!pDL5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!pDL5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!pDL5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pDL5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!pDL5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!pDL5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!pDL5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!pDL5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa73165e8-af51-4a62-81ad-7ebe3e3ab4e8_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>&#128204; Why Botnets Matter Today</strong></h3><div><hr></div><p>Botnets are no longer just about denial-of-service attacks.</p><p>Today they enable:</p><ul><li><p>Business Email Compromise at scale</p></li><li><p>Credential stuffing and account takeovers</p></li><li><p>Ransomware delivery</p></li><li><p>Ad fraud and fake engagement</p></li><li><p>AI scraping and model abuse</p></li><li><p>Infrastructure disruption</p></li></ul><p>Botnets provide <strong>scale</strong>, anonymity, and resilience. That makes them fundamental to modern cybercrime economics.</p><p>Most major cybercrime operations depend on botnets at some stage.</p><div><hr></div><h3><strong>&#128202; Botnets in Numbers</strong></h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gMVt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gMVt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!gMVt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!gMVt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!gMVt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gMVt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!gMVt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!gMVt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!gMVt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!gMVt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F39cc4239-b6c6-495c-8ef1-6f3cc29193aa_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>&#127919; Who&#8217;s at Risk</strong></h3><div><hr></div><p>Individuals are often the first and easiest targets. Home routers, smart TVs, cameras, and personal devices are frequently left running with default credentials or outdated firmware. These devices are rarely monitored, always online, and trusted by default, making them ideal candidates for silent enrollment into botnets without disrupting daily use.</p><p>Small and medium-sized businesses face an even higher risk, not because they are targeted, but because they operate in the middle ground. They rely on always-on infrastructure like firewalls, printers, NAS devices, and remote access tools, yet often lack the resources or visibility to manage them continuously. Many compromises occur not through laptops, but through forgotten or unmanaged network equipment.</p><p>Certain sectors are especially exposed due to scale and complexity. Hospitality, retail, healthcare, and manufacturing environments deploy large numbers of connected devices that prioritize availability over security. When devices must stay online at all times, even minor lapses in configuration or patching can turn operational necessities into long-term botnet assets.</p><div><hr></div><h3><strong>&#128064; How You&#8217;d (Not) Notice</strong></h3><div><hr></div><p>Most botnet infections are silent.</p><p>Possible indicators include:</p><ul><li><p>Internet slowdowns at unusual hours</p></li><li><p>Unexpected outbound traffic spikes</p></li><li><p>IP addresses being blocked by services</p></li><li><p>Devices running hotter than normal</p></li><li><p>Logs showing unfamiliar destinations</p></li></ul><p>Many organizations only monitor inbound threats. Botnets live outbound.</p><div><hr></div><h3><strong>&#128737;&#65039; Botnet CyberHygiene Checklist</strong></h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dujt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dujt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!dujt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!dujt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!dujt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dujt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d385d876-f702-4136-9e9a-43a466889807_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!dujt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!dujt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!dujt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!dujt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd385d876-f702-4136-9e9a-43a466889807_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>&#129504; Who Operates Botnets</strong></h3><div><hr></div><p>Botnets are no longer controlled by a single type of attacker. They are built, rented, and repurposed across multiple ecosystems with different motivations but shared reliance on scale.</p><p>Organized cybercriminal groups and cybercrime-as-a-Service operators treat botnets like infrastructure. They lease or manage networks of compromised devices to provide services such as DDoS-for-hire, credential stuffing, spam, ad fraud, and large-scale scraping. These operations often mimic legitimate SaaS platforms with dashboards, pricing tiers, and customer support. Hacktivist collectives use botnets to amplify political messages or disrupt perceived adversaries. Visibility and impact often outweigh stealth, and campaigns can combine volunteer participation with social pressure or misinformation to rapidly scale.</p><p>State-aligned and hybrid actors use botnets in the gray zone between crime and geopolitics for disruption, intelligence collection, or strategic signaling while maintaining plausible deniability. Emerging models like DDosia show that botnets can also rely on willing participants. Users install software that turns their systems into attack nodes, incentivized by ideology, reputation, or gamification. Modern botnets can scale as effectively through social and incentive structures as through malware alone.</p><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><a href="https://amzn.to/4rpGMEh">This Is How They Tell Me the World Ends</a> by <a href="https://www.linkedin.com/in/nicoleperlroth/">Nicole Perlroth</a></p></li><li><p><a href="https://amzn.to/4qalYzx">The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet</a> by <a href="https://www.linkedin.com/in/davidsenecal/">David Senecal</a></p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><a href="https://open.spotify.com/episode/2SkFBD2a016q4ByE9IKWpX?si=mQt4s6awTHO4jRTE-ylP8g">Spam Botnets</a> on Darknet Diaries, hosted by <a href="https://www.linkedin.com/in/jack-rhysider-02922a167/">Jack Rhysider</a></p></li><li><p><a href="https://podcasts.apple.com/be/podcast/a-tale-of-two-botnets-research-saturday/id1071831261?i=1000714905358">A tale of two botnets. [Research Saturday]</a> on CyberWire Daily with <a href="https://www.linkedin.com/in/kyle-lefton-72774b219/">Kyle Lefton</a> and <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bitner</a></p></li><li><p><a href="https://www.sophos.com/es-es/blog/s3-ep2-creepy-smartwatches-botnets-and-pings-of-death-podcast">Creepy smartwatches, botnets and Pings of Death</a> by <a href="https://www.linkedin.com/company/sophos/">Sophos</a> , presented by <a href="https://www.linkedin.com/in/kimberlytruong/">Kimberly Truong</a>, <a href="https://www.linkedin.com/in/doug-aamoth-759886b5/">Doug Aamoth</a> and <a href="https://www.linkedin.com/in/pducklin/">Paul Ducklin</a>.</p></li></ol><p><strong>&#9654;&#65039; Videos</strong></p><ol><li><p><a href="https://www.youtube.com/watch?v=8Z3N4mlAFWg">Coffee Break Session #110: What Is a Botnet?</a> with <a href="https://www.linkedin.com/in/christincifaldi/">Christin Cifaldil</a> on Strategic Treasurer</p></li></ol><div><hr></div><h3>&#128273; <strong>Final Thoughts</strong></h3><div><hr></div><p>Botnets are not a failure of technology. They are a failure of ownership.</p><p>As AI accelerates automation, botnets will become more adaptive, more evasive, and harder to attribute. AI will not replace botnets. It will optimize them.</p><p>The real question is not whether botnets will evolve. It&#8217;s whether we will take responsibility for the systems we connect to the internet.</p><p>In cybersecurity, the most dangerous compromises are the ones that never break anything.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Payment Diversion Scams]]></title><description><![CDATA[When Legitimate Payments Quietly Get Hijacked]]></description><link>https://911cyber.substack.com/p/payment-diversion-scams</link><guid isPermaLink="false">https://911cyber.substack.com/p/payment-diversion-scams</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Fri, 23 Jan 2026 13:34:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SWYx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SWYx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SWYx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!SWYx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!SWYx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!SWYx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SWYx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:232390,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://mrcyber.substack.com/i/185535528?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SWYx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!SWYx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!SWYx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!SWYx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F980872d3-94a6-4085-b80b-f7122a9a918e_744x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#128228; What Exactly Are Payment Diversion Scams?</h3><div><hr></div><p>Payment diversion scams (also called <em>invoice fraud</em> or <em>funds transfer fraud</em>) occur when cybercriminals intercept or impersonate legitimate communications about a payment and trick the victim into sending money to an account the attacker controls instead of the intended party. Unlike malware or ransomware, this attack is about <em>deception and substitution</em>; the money moves, but it goes to the wrong bank account.</p><p><em><strong>At scale, these scams exploit:</strong></em></p><ul><li><p>Business email compromise (BEC)</p></li><li><p>Fake vendor invoices</p></li><li><p>Fake updated bank instructions</p></li><li><p>Email account takeovers</p></li><li><p>AI-generated impersonation</p></li></ul><div><hr></div><h3>&#128269; Why Payment Diversion Scams Matter to You</h3><div><hr></div><p>These scams can hit anyone who transfers funds, from individuals wiring money to settle a purchase, to businesses paying suppliers, to real estate closings and nonprofits sending payroll. Unlike &#8220;click here&#8221; attacks, payment diversion scams can:</p><ul><li><p>Cause <strong>large financial losses</strong> (tens to hundreds of thousands of dollars per incident)</p></li><li><p>Compromise trust in financial workflows</p></li><li><p>Slip past traditional security controls because they rely on <em>trusted channels</em></p></li><li><p>Be difficult to recover once the funds are sent</p></li></ul><p>In many cases, victims only realize something is wrong when the bank tells them the funds have been cleared.</p><div><hr></div><h3>&#128202; Payment Diversion Scams in Numbers</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J-T3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J-T3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!J-T3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!J-T3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!J-T3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J-T3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!J-T3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!J-T3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!J-T3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!J-T3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e8a1e06-c298-4e61-881e-880007ffe802_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#128100; Who Is Behind Payment Diversion Scams?</h3><div><hr></div><p>There&#8217;s no single &#8220;villain&#8221; payment diversion scams are facilitated by a spectrum of actors:</p><ol><li><p><strong>Organized Cybercrime Groups: </strong>Professional fraud syndicates that run phishing, BEC, and diversion as a service.</p></li><li><p><strong>Cybercrime-as-a-Service Operators: </strong>Infrastructure platforms (e.g., RedVDS) sell access to disposable servers, phishing kits, and impersonation tools.</p></li><li><p><strong>Opportunistic Actors: </strong>Small groups or individuals who pivot into diversion when automation makes it easy and profitable.</p></li><li><p><strong>Insider Threats: </strong>Employees, contractors, or vendors with legitimate access to payment workflows who manipulate instructions or share sensitive information, intentionally or under coercion.</p></li></ol><p>Their common goal: <em>trick trusting parties during critical payment moments.</em></p><div><hr></div><h3>&#128260; How Do Payment Diversion Scams Happen?</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DTB9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DTB9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!DTB9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!DTB9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!DTB9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DTB9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!DTB9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!DTB9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!DTB9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!DTB9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff01a166b-19a0-48e9-9b17-116f4cb9ae9a_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129302; What Are the Latest Trends</h3><div><hr></div><p>Payment diversion tactics are evolving for three reasons:</p><p><strong>1. AI-Generated Impersonation</strong></p><p>Attackers can now:</p><ul><li><p>Clone voices</p></li><li><p>Generate realistic video of executives</p></li><li><p>Write highly personalized emails This makes impersonation indistinguishable from legitimate contacts.</p></li></ul><p><strong>2. Automation at Scale</strong></p><p>Crime services sell turnkey tools:</p><ul><li><p>Phishing templates</p></li><li><p>Scripts for invoice manipulation</p></li><li><p>Disposable infrastructure These lower the bar for attackers.</p></li></ul><p><strong>3. Blended Social Engineering</strong></p><p>Attackers combine AI outputs with well-timed social engineering:</p><ul><li><p>AI drafts the perfect pretext</p></li><li><p>Human attackers adjust for context This results in <em>far higher success rates than dumb spam.</em></p></li></ul><p>The bottom line: AI turns <em>volume scams</em> into <em>precision attacks.</em></p><div><hr></div><h3>&#128737; How to Protect Against Payment Diversion Scams</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JgEY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JgEY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!JgEY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!JgEY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!JgEY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JgEY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!JgEY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!JgEY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!JgEY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!JgEY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e7e60c3-7e92-47ad-beee-9636b97c2da3_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><a href="https://www.amazon.com/Fraud-Fighters-Handbook-Stopping-Chargebacks/dp/B0FMXC2CT8/ref=sr_1_1?crid=2EY4T36C1LKTU&amp;dib=eyJ2IjoiMSJ9.pSb8iuB5p3QiBaAtxee1qUOfKmrQTBwlnoRJm02U0gHGjHj071QN20LucGBJIEps.8NzNMAIKLnY4Ulbb5ssO-XXp02cmpo0oQcBQLBqRYLo&amp;dib_tag=se&amp;keywords=The+Fraud+Fighter%27s+Handbook&amp;qid=1769011571&amp;sprefix=the+fraud+fighter%27s+handbook%2Caps%2C368&amp;sr=8-1">The Fraud Fighter&#8217;s Handbook</a> by Nate Seidel</p></li><li><p><a href="https://www.amazon.com/Outsmarting-Business-Email-Compromise-Mid-Market-ebook/dp/B0DWRH5H5D/ref=sr_1_1?crid=182LBVHD6T96S&amp;dib=eyJ2IjoiMSJ9.2hE8_TddWO5KuHdtkgjwkg.Hoxd-nr6KzrVTFWWT-j25xZpGeEYF18hbKCO1BOrMHc&amp;dib_tag=se&amp;keywords=Outsmarting+Business+Email+Compromise+by+Philippe+Flichy&amp;qid=1769011822&amp;sprefix=outsmarting+business+email+compromise+by+philippe+flichy%2Caps%2C694&amp;sr=8-1">Outsmarting Business Email Compromise</a> by <a href="https://www.linkedin.com/in/flichy/">Philippe Flichy</a></p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><a href="https://youtu.be/zzPkLb_VXNQ?si=OO5YQXJyRjNhaHts">Episode 27: Payment Diversion Fraud in the Legal Sector</a> by National Crime Agency</p></li><li><p><a href="https://podcasts.apple.com/us/podcast/fraudology-podcast-with-karisse-hendrick/id1530461089">Fraudology Podcast</a> with <a href="https://www.linkedin.com/in/karissehendrick/">Karisse Hendrick</a></p></li><li><p><a href="https://youtu.be/JmARypva7OM?si=47t0S19En2JNmfFI">Fraud Risks in Real-Time Payments | Connecting the Dots in Payments on podcast What the Fraud?</a> With <a href="https://www.linkedin.com/in/tomtaraniuk/">Thomas Taraniuk</a> and <a href="https://www.linkedin.com/in/arthur-bedel">Arthur Bedel</a></p></li><li><p><a href="https://youtu.be/N2b9BRS9T-o?si=lEzxUpQJhx3vTCJD">Payment Diversion Fraud - Gemma&#8217;s Story</a> by <a href="https://www.linkedin.com/company/city-of-london-police/">City of London Police</a></p></li></ol><p><strong>&#9654;&#65039; Videos</strong></p><ol><li><p><a href="https://youtu.be/GP3u0Ed4c2Q?si=uEqibHFn5yCPa9Kf">Unmasking Money Mules: &#8220;The Evolution of a Scammer&#8221; (Financial Crime Podcast Episode 5)</a> with <a href="https://www.linkedin.com/in/gollumfun/">Brett Johnson</a></p></li></ol><div><hr></div><h3>&#128273; <strong>Final Thoughts</strong></h3><div><hr></div><p>Payment diversion scams aren&#8217;t about technology failing. They&#8217;re about trust being exploited at the right moment.</p><p>AI makes the deception sharper, faster, and harder to detect. But the real weakness isn&#8217;t the hacker. It&#8217;s the process we leave exposed.</p><p>Every familiar email. Every routine invoice. Every &#8220;small&#8221; change to payment details is a potential trigger.</p><p>Cybersecurity isn&#8217;t just about stopping breaches. It&#8217;s about designing workflows that don&#8217;t let a single message move your money.</p><p>So ask yourself: <strong>are you protecting your systems, or just hoping no one notices when trust gets hijacked?</strong></p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What does AI know about you?]]></title><description><![CDATA[This edition of CyberHygiene examines how everyday AI collects and connects personal data, highlighting its impact on users without sensationalism.]]></description><link>https://911cyber.substack.com/p/what-does-ai-know-about-you</link><guid isPermaLink="false">https://911cyber.substack.com/p/what-does-ai-know-about-you</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Wed, 14 Jan 2026 19:18:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PkHz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PkHz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PkHz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!PkHz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!PkHz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!PkHz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PkHz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1791022,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://mrcyber.substack.com/i/184578546?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PkHz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!PkHz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!PkHz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!PkHz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F68f1e9a0-cc69-46b4-9418-a59846be76f8_1920x1080.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#129302; What AI Actually Learns About You</h3><div><hr></div><p>AI systems do not need to be told who you are to learn about you. They infer.</p><p>Over time, routine interactions reveal several categories of information:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MRqn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MRqn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!MRqn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!MRqn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!MRqn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MRqn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:416841,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://mrcyber.substack.com/i/184578546?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MRqn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!MRqn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!MRqn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!MRqn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31b0191f-59f3-484c-9a73-80945889066d_1920x1080.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The key point is simple but often overlooked:</p><p><strong>AI does not need explicit personal data to generate personal insight.</strong></p><p>Patterns are enough.</p><div><hr></div><h3>&#9888;&#65039;Why Aggregation Is the Real Risk</h3><div><hr></div><p>The primary risk introduced by AI is not surveillance.<br> It is <strong>aggregation</strong>.</p><p>Historically, personal data was fragmented across many services. One platform held emails, another documents, another social interactions, another search history.</p><p>AI increasingly operates <em>across</em> these layers.</p><p>When fewer systems hold richer, interconnected context, several things change:</p><ul><li><p>Breaches become more damaging because the data is more complete</p></li><li><p>Misuse becomes more precise because context already exists</p></li><li><p>Internal access carries greater consequences</p></li><li><p>Errors or misinterpretations propagate faster</p></li><li><p>Old data remains relevant longer than intended</p></li></ul><p>This is not an accusation against AI vendors.<br> It is a description of <strong>structural risk</strong> created by consolidation.</p><p>Good intentions do not eliminate architectural exposure.</p><div><hr></div><h3>&#128202; AI Data Attacks in Numbers</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TSjK!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TSjK!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!TSjK!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!TSjK!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!TSjK!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TSjK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:654325,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://mrcyber.substack.com/i/184578546?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TSjK!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!TSjK!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!TSjK!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!TSjK!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e7d8257-bc32-4b86-9de0-e5d672e50c00_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#128374;&#65039; AI Glasses as a Concrete Example</h3><div><hr></div><p>AI glasses attract attention because they are visible.</p><p>A camera.<br>A microphone.<br>A device that looks back at the world.</p><p>They make people uneasy because recording is obvious.</p><p>But the deeper issue is not being recorded.<br>It is being recognized and contextualized.</p><p>AI glasses combine:</p><ul><li><p>Vision with cloud-based profiles</p></li><li><p>Real-time identification with existing data</p></li><li><p>Contextual overlays with historical information</p></li><li><p>Ephemeral moments with persistent records</p></li></ul><p>They do not create a new privacy problem.<br>They expose how mature the data ecosystem already is.</p><p>AI glasses simply make visible what is otherwise abstract:<br>how quickly identity, context, and history can be assembled when enough data already exists.</p><div><hr></div><h3>&#127919; How This Data Can Be Used Against People</h3><div><hr></div><p>When personal context is aggregated, abuse does not require advanced techniques.</p><p>Plausible, real-world outcomes include:</p><ul><li><p><strong>Hyper-personalized phishing</strong> that mirrors tone, timing, and real projects</p></li><li><p><strong>Convincing impersonation</strong> using accurate language and references</p></li><li><p><strong>Reputation manipulation</strong> built from partial truths and contextual details</p></li><li><p><strong>Social engineering at scale</strong> that exploits trust and familiarity</p></li></ul><p>These attacks succeed not because they are technically sophisticated, but because they feel authentic.</p><p>Context lowers friction. Familiarity lowers suspicion.</p><div><hr></div><h3><strong>&#128737;&#65039;Practical Tips for AI Users </strong></h3><p>You do not need to stop using AI.<br> You need to use it <strong>intentionally</strong>.</p><p>Practical CyberHygiene includes:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bPmN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bPmN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!bPmN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!bPmN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!bPmN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bPmN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:537164,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://mrcyber.substack.com/i/184578546?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bPmN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png 424w, https://substackcdn.com/image/fetch/$s_!bPmN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png 848w, https://substackcdn.com/image/fetch/$s_!bPmN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!bPmN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F473631f3-86b0-4eb6-9fa5-46d444527b60_1920x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><a href="https://amzn.to/4sL64hy">AI Data Privacy and Protection: The Complete Guide to Ethical AI, Data Privacy, and Security</a> by Justin Ryan, <a href="https://www.linkedin.com/in/mariolazo/">Mario Lazo</a></p></li><li><p><a href="https://amzn.to/4py01tH">Beyond the Algorithm: AI, Security, Privacy, and Ethics</a> by <a href="https://www.linkedin.com/in/santosomar/">Omar Santos</a>, Petar Radanliev</p></li><li><p><a href="https://amzn.to/45TTgeJ">Generative AI for Cybersecurity and Privacy</a> by Youssef Baddi, <a href="https://www.linkedin.com/in/malehyassine/">Yassine Maleh</a>, Izzat Alsmadi, Mohamed Lahby.</p></li></ol><p>&#127897;&#65039; Podcasts</p><ol><li><p><em><a href="https://www.smashingsecurity.com/447-grok-the-stalker-the-louvre-heist-and-microsoft-365-mayhem/">Smashing Security</a></em><a href="https://www.smashingsecurity.com/447-grok-the-stalker-the-louvre-heist-and-microsoft-365-mayhem/"> </a>&#8211; Graham Cluley &amp; Carole Theriault </p></li><li><p><em><a href="https://open.spotify.com/episode/7KJCLYxqrhUVLiLXlzlpEn">The Cyber Hygiene Show</a></em> &#8211; Meir Niad &amp; Rich Freiberg</p></li><li><p><em><a href="https://open.spotify.com/episode/73H0Toarz70Asg3xKCKU2h">Digital Hygiene</a></em> &#8211; Edgar Dogourt</p></li></ol><p>&#9654;&#65039; Videos</p><ol><li><p><em><a href="https://www.youtube.com/watch?v=JPmffvba_0s">Cybersecurity in the Age of AI &amp; Social Engineering</a></em> | Tech Tangents Podcast Ep. 2 with Robert Walker &amp; Dr. Dave Bolman</p><p></p></li></ol><div><hr></div><h3>&#128273; <strong>Final Thoughts</strong></h3><div><hr></div><p>AI is not inherently hostile to users.<br>But it changes the economics of personal data.</p><p>CyberHygiene in the age of AI is not about avoiding tools or rejecting progress. It is about understanding <strong>what accumulates, where it lives, and how long it lasts</strong>.</p><p>The most important question is no longer whether AI is safe.</p><p>It is:</p><p><strong>What does AI already know about you, and who else might want that information?</strong></p><p>Awareness, boundaries, and deliberate use remain the most effective forms of protection.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Cleaning Up Your Digital Closet]]></title><description><![CDATA[Forgotten accounts, old apps, and shared files quietly expand your attack surface. A 45-minute digital cleanup reduces risk, exposure, and impersonation.]]></description><link>https://911cyber.substack.com/p/cleaning-up-your-digital-closet</link><guid isPermaLink="false">https://911cyber.substack.com/p/cleaning-up-your-digital-closet</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Wed, 07 Jan 2026 17:15:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uOF0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uOF0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uOF0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uOF0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uOF0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uOF0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uOF0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:122019,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://marcthecyberguy.substack.com/i/183813255?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uOF0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg 424w, https://substackcdn.com/image/fetch/$s_!uOF0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg 848w, https://substackcdn.com/image/fetch/$s_!uOF0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!uOF0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19e62a2e-a612-482b-8a09-c5686e1b1489_1920x1080.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#128085; What is a &#8220;digital closet&#8221;?</h3><div><hr></div><p>Your digital closet is everything you created, signed up for, installed, shared, or stored online that you no longer actively manage.</p><p>This typically includes:</p><ul><li><p>Old email addresses and usernames</p></li><li><p>Dormant social media, forum, and marketplace accounts</p></li><li><p>Apps, browser extensions, and SaaS tools you no longer use</p></li><li><p>Cloud files, shared links, and backups</p></li><li><p>Devices you no longer update or no longer own</p></li></ul><p>Each one quietly expands your attack surface.</p><p>Attackers don&#8217;t need you to be careless today. They only need you to have been careless once.</p><div><hr></div><h3>&#128202; Digital Clutter in Numbers</h3><div><hr></div><p>Most incidents don&#8217;t require innovation. They exploit repetition, neglect, and reuse.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jEPG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jEPG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!jEPG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!jEPG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!jEPG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jEPG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!jEPG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!jEPG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!jEPG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!jEPG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ed42974-43f1-4952-9a4f-0b4efac76778_1488x837.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The numbers consistently point to the same conclusion: weak credentials, reused passwords, and poor access management remain the dominant drivers of real-world compromises.</p><p>None of this reflects advanced attackers. It reflects predictable human behavior.</p><div><hr></div><h3>&#9888;&#65039; Why Clutter Equals Risk</h3><div><hr></div><p>When forgotten digital assets are compromised, the outcomes are predictable.</p><p><strong>Account takeover</strong> Old accounts often reuse passwords and lack modern protections like multi-factor authentication. Once compromised, they are used for fraud, spam, or as a stepping stone into other services.</p><p><strong>Identity and reputation damage</strong> Abandoned profiles and outdated data are easy to impersonate and hard to monitor. They are frequently used in scams and social engineering campaigns.</p><p><strong>Data exposure</strong> Old Google Docs, Dropbox folders, and shared links often remain accessible long after they stop being relevant. Many data leaks are self-inflicted and go unnoticed.</p><p><strong>Silent compromise</strong> You won&#8217;t detect suspicious activity on an account you never check.</p><p>For scammers, credential stuffers, and social engineers, these assets are ideal: no alerts, no oversight, no resistance.</p><div><hr></div><h3>&#9201;&#65039; The 45-minute Digital Closet Cleanup</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AhmL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AhmL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!AhmL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!AhmL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!AhmL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AhmL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!AhmL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!AhmL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!AhmL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!AhmL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F101c95e7-5cd7-4518-bd31-047ec959e99b_1488x837.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#128269; Audit Your Digital Footprint</h3><div><hr></div><p>Cleaning your digital closet also means understanding what the internet already knows about you.</p><p>Start by searching for yourself. Use your full name, common variations, usernames, old email addresses, and phone numbers. Review image results as well. Outdated profiles, cached pages, data broker listings, and forgotten posts often surface quickly.</p><p>Then treat AI-powered search tools as a mirror. Ask them who you are based solely on public data. These systems summarize what already exists. If an AI can assemble a quick profile about you, so can a scammer or impersonator.</p><p>If you find information that is inaccurate, excessive, or sensitive:</p><ul><li><p>Remove what you control</p></li><li><p>Lock down or delete unused profiles</p></li><li><p>Request removals from data brokers where possible</p></li><li><p>Tighten privacy settings across platforms</p></li></ul><p>If you were targeted tomorrow, this is the information an attacker would start with.</p><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><em><a href="https://amzn.to/3NaFM7Z">Permanent Record</a></em> by Edward Snowden</p></li><li><p><a href="https://amzn.to/3YtMWXl">Digital Minimalism</a> by Cal Newport</p></li><li><p><a href="https://amzn.to/4pqSmNG">Digital Tidiness</a> by Kara Johnson</p></li><li><p><a href="https://amzn.to/4ssUmbd">The Smart Girl&#8217;s Guide to Privacy</a> by <a href="https://www.linkedin.com/in/violetblue/">Violet Blue</a></p></li></ol><p>&#127897;&#65039; Podcasts</p><ol><li><p><a href="https://www.smashingsecurity.com/446-a-hacker-doxxes-himself-and-social-engineering-as-a-service/">A hacker doxxes himself, and social engineering-as-a-service</a> on Smashing Security by <a href="https://www.linkedin.com/in/grahamcluley/">Graham Cluley</a></p></li><li><p><a href="https://open.spotify.com/show/2IaOJnu5KJ5enHUiIZlMcy?utm_source=chatgpt.com">The Cyber Hygiene Show</a> by <a href="https://www.linkedin.com/in/meirniad/">Meir Niad</a>, Rich Freiberg</p></li><li><p><a href="https://open.spotify.com/episode/73H0Toarz70Asg3xKCKU2h">Digital Hygiene</a> by Edgar Dogourt</p></li><li><p><a href="https://youtu.be/pBgXRgQwAAA?si=d2DtlXtKbXVxJvrn">Digital Hygiene Protecting Yourself Online</a> by <a href="https://www.linkedin.com/in/tracydegraaf/">Tracy DeGraaf</a></p></li></ol><p>&#9654;&#65039; Videos</p><ol><li><p><a href="https://youtu.be/CvVe7S4qsCw?si=e7vGTyE1bvPuaM29">Essential &amp; Simple Cyber Hygiene Tips | Tech Tangents Podcast Ep. 2</a> with <a href="https://www.linkedin.com/in/walkerobert/">Robert Walker</a> and <a href="https://www.linkedin.com/in/dr-dave-bolman-2a81b31/">Dr. Dave Bolman</a></p></li></ol><p>&#128736;&#65039; Tools</p><ol><li><p><a href="https://myaccount.google.com/intro/security-checkup?hl=en-US">Google Security Checkup</a></p></li><li><p><a href="https://haveibeenpwned.com/">Have I Been Pwned</a></p></li><li><p><a href="https://bitwarden.com/">Bitwarden</a> - Password Manager</p></li><li><p><a href="https://monitor.mozilla.org/">Mozilla Monitor</a> &#8211; Breach Alerts</p></li></ol><p> 911Cyber<strong> : <a href="https://911cyber.app/report-cyber-incident/">https://911cyber.app/report-cyber-incident/</a></strong></p><div><hr></div><h3>&#129529; One habit worth keeping</h3><div><hr></div><p>Digital clutter is not a technical failure. It is a maintenance failure.</p><p>If you created it, installed it, or shared it, you still own it, even if you forgot about it. Attackers do not forget. They archive.</p><p>The most effective security work is rarely visible. It does not trigger alerts or make headlines. It happens quietly, through routine cleanup and intentional ownership.</p><p>Good cyber hygiene is boring, repetitive, and invisible. And that is exactly why it works.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Marc's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What To Do When You Get Hacked]]></title><description><![CDATA[Getting hacked means someone gained unauthorized access to your accounts, devices, or data. Know the signs, act fast to contain damage, and use strong security to stay protected.]]></description><link>https://911cyber.substack.com/p/what-to-do-when-you-get-hacked</link><guid isPermaLink="false">https://911cyber.substack.com/p/what-to-do-when-you-get-hacked</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Thu, 11 Dec 2025 15:35:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!aeyU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aeyU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aeyU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!aeyU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!aeyU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!aeyU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aeyU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png" width="711" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:711,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aeyU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!aeyU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!aeyU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!aeyU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc72635b8-8581-49ef-a4cf-ad6e0dc33d88_711x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#128522; What Does &#8220;Getting Hacked&#8221; Mean?</h3><div><hr></div><p>&#8220;Getting hacked&#8221; is a broad, non-technical way of saying that someone gained unauthorized access to your digital accounts, devices, or data, or tricked you into giving away credentials, money, or personal information.</p><p>There is an important difference between a malfunction and an actual hack:</p><p>Malfunction, bug, or performance issue Your device or app stops working because of software problems, hardware issues, or configuration errors. You might see crashes, freezes, or data loss, but no one has accessed or misused your information.</p><p>Hacking, compromise, or social engineering An external actor intentionally exploits a vulnerability, steals your credentials, infects your device, or manipulates you into taking an action. Examples include phishing, SIM swaps, malware infections, and account takeovers. In these cases, someone with intent and capability is actively involved.</p><p>This distinction matters when you ask for help. Use clear language such as &#8220;This is a malfunction&#8221; or &#8220;My account or device was compromised by an unknown third party.&#8221;</p><div><hr></div><h3>&#128204;Most Common Cyber Attacks on Individuals</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_GIN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_GIN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!_GIN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!_GIN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!_GIN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_GIN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!_GIN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!_GIN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!_GIN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!_GIN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F18566b33-c71e-4f60-a51b-965a85fe64d1_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#9888;&#65039; Why You Should Care?</h3><div><hr></div><p>Getting hacked is not just an abstract risk. It can have real consequences that affect nearly every aspect of your life. Your personal information, financial assets, reputation, and digital presence are all vulnerable. Hackers can steal your identity to open accounts or take out loans in your name, drain your bank or payment accounts, lock your files with ransomware, or use your social media and email accounts to target friends, family, or colleagues.</p><p>Even seemingly minor breaches, such as a compromised email or password, can quickly grow into larger problems. For example, a hacker gaining access to a single account can use it to reset passwords on other accounts, bypass security measures, or spread malware to your contacts.</p><p>Being informed and prepared is your best defense. By recognizing common threats, implementing strong security practices, and knowing how to respond when something goes wrong, you can act quickly, limit the damage, and regain control of your digital life before a small incident becomes a major crisis.</p><div><hr></div><h3>&#128202; Individuals Hacking in Numbers</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PGjN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PGjN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!PGjN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!PGjN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!PGjN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PGjN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!PGjN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!PGjN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!PGjN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!PGjN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77ae02a-8139-4906-9c00-83bc7a2d1495_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129302; Will It Get Worse?</h3><div><hr></div><p>Short answer: very likely yes, at least in the short term.</p><p>The volume and sophistication of phishing and scam content have increased. Industry reports show that AI is already being used to scale and perfect phishing, social engineering, and deepfake extortion. Microsoft, APWG, and other organizations have documented AI-assisted attacks and deepfake scams. The FBI has warned about AI-enabled virtual kidnapping and convincingly fabricated audio and video used in fraud.</p><p>Defenders also use AI for threat detection, triage, and fraud blocking. The landscape has become an arms race: attackers create more convincing attacks while defenders develop better detection tools. AI gives attackers a near-term advantage because it makes realistic targeting and messages cheap and fast to produce. Expect more targeted scams, faster credential stuffing campaigns, and more convincing voice and video cons.</p><div><hr></div><h3>&#128737;&#65039; What to Do When You Get Hacked</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!llGN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!llGN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!llGN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!llGN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!llGN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!llGN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!llGN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!llGN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!llGN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!llGN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0ceae469-eee0-4030-8e5b-554dc2bbbafe_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#10067; Other Questions People Are Asking</h3><div><hr></div><ol><li><p><strong>If I get hacked, should I pay the ransom? </strong>Paying doesn&#8217;t guarantee recovery, encourages attackers, and may violate local rules in some cases. First consult law enforcement and cyber specialists; document everything.</p></li><li><p><strong>How long until I know everything is clean? </strong>There&#8217;s no universal time. After wiping/reinstalling and changing credentials, monitor for unusual activity for months. Consider professional triage for complex cases.</p></li><li><p><strong>Do I need to report minor losses? </strong>Yes, reporting to IC3/FTC helps law enforcement connect cases and improves overall response; some banks require a police/official report for reimbursement.</p></li><li><p><strong>Is MFA safe? Won&#8217;t attackers bypass it? </strong>MFA greatly reduces risk. Authenticator apps or hardware keys (FIDO2/WebAuthn) are stronger than SMS and should be used when available.</p></li><li><p><strong>My kid&#8217;s social account was hacked, what should I do?</strong> Reclaim and secure the account, change passwords, enable MFA, warn contacts, and remove any third-party apps. If the attack targeted family info, consider identity monitoring.</p></li></ol><p><em><strong>Report scams here: <a href="https://911cyber.app/report-cyber-incident/">https://911cyber.app/report-cyber-incident/</a></strong></em></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hZs_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hZs_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png 424w, https://substackcdn.com/image/fetch/$s_!hZs_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png 848w, https://substackcdn.com/image/fetch/$s_!hZs_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png 1272w, https://substackcdn.com/image/fetch/$s_!hZs_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hZs_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png" width="512" height="55" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:55,&quot;width&quot;:512,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:14279,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://marcthecyberguy.substack.com/i/181340749?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hZs_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png 424w, https://substackcdn.com/image/fetch/$s_!hZs_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png 848w, https://substackcdn.com/image/fetch/$s_!hZs_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png 1272w, https://substackcdn.com/image/fetch/$s_!hZs_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F624fb9d5-f549-4a81-b5e3-ca8a203f976c_512x55.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Get Help&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Get Help</span></a></p><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><a href="https://www.amazon.com/What-When-You-Hacked-Practitioners-ebook/dp/B0BH1K1NMS/ref=sr_1_1?crid=2UJRVQPXLEEWB&amp;dib=eyJ2IjoiMSJ9.7Dx0DqTPCDbC_yYTfwcd4w.g9T8rPTIfOE46dQUA-YYwn8AKyMA1V8jzEVNcNILgac&amp;dib_tag=se&amp;keywords=what+to+do+when+hacked&amp;qid=1765383232&amp;sprefix=what+to+do+when+hacked%2Caps%2C420&amp;sr=8-1">What To Do When You Get Hacked</a> by <a href="https://www.linkedin.com/in/shimon-brathwaite/">Shimon Brathwaite</a></p></li><li><p><a href="https://www.amazon.com/Hacked-Uncovering-Strategies-Secrets-Attacks/dp/1398613703/ref=sr_1_1?crid=1O9JSBLNDOYLD&amp;dib=eyJ2IjoiMSJ9.5wRjF1g9GotCj_33vpF-n5iTlbW8apV4hfbHDvs5V4H5vR0ZOe4Jqn1y6veQUAM__1YH4ufLnryjarNhOS7I6890JdIBw3EozcX_fIm3SGelZdX6R5f8Ng6-bpfcg-zh9405sKsZxH5dkZfN7Rjoc-bpgjTyJBcTbit0f91lgpm2X-ZVjCL9SSeT73CLYWtY0pqzKFOfaw0ZhXF_oRqcYU8G97XoMaktYzZ8m30tQrM.B5hetUQeGY183-kkHkbrDKIC4Pex0v0dyQssVobfTN4&amp;dib_tag=se&amp;keywords=hacked&amp;qid=1765383290&amp;sprefix=hacked%2Caps%2C329&amp;sr=8-1">Hacked: The Secrets Behind Cyber Attacks</a> by <a href="https://www.linkedin.com/in/jessica-barker/">Dr Jessica Barker</a></p></li><li><p><a href="https://www.amazon.com/Cyber-Security-Understand-Yourself-Organization/dp/9198630865/ref=sr_1_1?crid=DYXRJKCYS9KI&amp;dib=eyJ2IjoiMSJ9.AM-P51owPIagMLT5V3AogA8-fUBGDMJCu6Jc1YD6Lq7BXf3ZRz1N6f1CAJMB7rIeL4e_YNzRqQ9h1z1TZpYqNQ.1ahulJZpdLQBlJDMR8rpiFSgLPCCqKgdeNZ006y7Qfk&amp;dib_tag=se&amp;keywords=Cyber+Security%3A+Understand+Hacking+and+Protect+Yourself+and+Your+Organization&amp;nsdOptOutParam=true&amp;qid=1765383676&amp;sprefix=cyber+security+understand+hacking+and+protect+yourself+and+your+organization%2Caps%2C555&amp;sr=8-1">Cyber Security</a> by Hacking Studios</p></li><li><p><a href="https://www.amazon.com/Secret-Cybersecurity-Protect-Business-Cybercrime/dp/1948677083/ref=sr_1_2?crid=DYXRJKCYS9KI&amp;dib=eyJ2IjoiMSJ9.AM-P51owPIagMLT5V3AogA8-fUBGDMJCu6Jc1YD6Lq7BXf3ZRz1N6f1CAJMB7rIeL4e_YNzRqQ9h1z1TZpYqNQ.1ahulJZpdLQBlJDMR8rpiFSgLPCCqKgdeNZ006y7Qfk&amp;dib_tag=se&amp;keywords=Cyber+Security%3A+Understand+Hacking+and+Protect+Yourself+and+Your+Organization&amp;nsdOptOutParam=true&amp;qid=1765383676&amp;sprefix=cyber+security+understand+hacking+and+protect+yourself+and+your+organization%2Caps%2C555&amp;sr=8-2">The Secret to Cybersecurity</a> by <a href="https://www.linkedin.com/in/saugenbaum/">Scott Augenbaum</a></p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><a href="https://podcasts.apple.com/us/podcast/what-the-hack/id1571482669">What the Hack?</a> With <a href="https://www.linkedin.com/in/beau-friedlander-a9a3194/">Beau Friedlander</a> on <a href="https://www.linkedin.com/company/deleteme/">Delete Me</a></p></li><li><p><a href="https://open.spotify.com/episode/2QsGJQFIf5hY2gv3kKcmUw?si=VrUGQ1OxRgGDfl7folXYhQ">Ep 69: Human Hacker</a> with <a href="https://www.linkedin.com/in/christopherhadnagy/">Christopher Hadnagy</a> on Darknet Diaries</p></li><li><p><a href="https://youtu.be/Ad_V49KaR4s?si=eLNbKm_pUYAXjv9n">Do This If Your Being Hacked</a> | Ex-NSA Hacker <a href="https://www.linkedin.com/in/kylehanslovan/">Kyle Hanslovan</a> by The Reed Mornin Show</p></li></ol><p><strong>&#9654;&#65039; Videos</strong></p><p><a href="https://youtu.be/HUR4QOHEurY?si=61-SUvdhcbJFTdJ4">What to do if you are hacked: Full Guide</a> by <a href="https://www.linkedin.com/company/tpsctech/">PC Security Channel</a></p><p><strong>&#128736;&#65039; Tools</strong></p><ul><li><p>Authenticator apps: Microsoft Authenticator, Google Authenticator, Authy.</p></li><li><p>Password managers: 1Password, Bitwarden (choose one and use strong unique passwords).</p></li><li><p>Antivirus &amp; endpoint tools: Malwarebytes, Windows Defender (built-in), Bitdefender.</p></li><li><p>Credit monitoring / freeze:</p></li><li><p>Reporting &amp; official help:</p></li></ul><p> IC3 (FBI):<strong> </strong>https://www.ic3.gov</p><p> FTC IdentityTheft<strong>: </strong>https://www.identitytheft.gov</p><p> 911Cyber<strong> : <a href="https://911cyber.app/report-cyber-incident/">https://911cyber.app/report-cyber-incident/</a></strong></p><div><hr></div><h3>&#128161; Final Thoughts</h3><div><hr></div><p>Getting hacked feels personal, and it is. Attackers target your trust, urgency, and digital routines. The good news is that the most effective actions are practical and achievable. Isolate your devices, change passwords from a clean device, enable strong multi-factor authentication, notify your banks, and report incidents to authorities. AI will make attacks more convincing, but it will also power better defense tools. Your best defense remains layered: use strong, unique passwords, enable MFA, keep devices up to date, and approach unexpected messages or requests with healthy skepticism. Slow down, verify, and stay in control.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Marc's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Convenience That Fuels Scammers]]></title><description><![CDATA[Gift card fraud is rising fast as scammers use impersonation and AI to steal value instantly. Awareness, verification, and strong safeguards are key to staying safe.]]></description><link>https://911cyber.substack.com/p/convenience-that-fuels-scammers</link><guid isPermaLink="false">https://911cyber.substack.com/p/convenience-that-fuels-scammers</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Thu, 11 Dec 2025 15:29:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!kWi-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kWi-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kWi-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!kWi-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!kWi-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!kWi-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kWi-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png" width="711" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:711,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kWi-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!kWi-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!kWi-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!kWi-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F181cd174-2f64-4497-ad90-d38fb65a1b81_711x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#127873; What Is Gift Card Fraud?</h3><div><hr></div><p>Gift card fraud is a scam where criminals trick people into buying gift cards and handing over the codes, or they steal the value from gift cards without the victim realizing it. Scammers often pretend to be trusted organizations, family members, or company executives to pressure victims into paying with gift cards because these payments are fast and cannot be reversed. Fraudsters also tamper with physical cards in stores, steal card numbers online, or sell fake cards on marketplaces. Once a scammer gets the code, the money is usually gone within minutes, which is why gift cards remain one of the most widespread tools used in modern fraud schemes.</p><div><hr></div><h3>&#128717;&#65039; What Are the Types of Gift Card Fraud?</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h01s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h01s!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!h01s!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!h01s!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!h01s!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h01s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!h01s!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!h01s!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!h01s!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!h01s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F25d646fd-1e0e-42cd-8516-22ae7d6c6fb1_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#9888;&#65039; Why You Should Care About Gift Card Fraud</h3><div><hr></div><p>Gift card fraud is one of the fastest-growing scam types, and it can affect both individuals and businesses.</p><p>For individuals, falling victim often means losing money instantly with almost no way to recover it.</p><p>For businesses, scammers exploit employees through impersonation or business email compromise, leading to significant financial and reputational damage.</p><p>The convenience and irreversibility of gift card payments make them attractive to criminals, which means awareness and caution are your best defenses.</p><p>Understanding how these scams operate can prevent you from becoming a target and protect your personal and professional finances.</p><div><hr></div><h3>&#128202; Gift Card Fraud in Numbers</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uDBj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uDBj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!uDBj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!uDBj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!uDBj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uDBj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!uDBj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!uDBj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!uDBj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!uDBj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54ca3dd7-dfb8-45c7-99b2-7cf4b608f4ae_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129302; Is AI Making Gift Card Fraud Worse?</h3><div><hr></div><p>Absolutely. AI is making gift card fraud more sophisticated and easier to scale.</p><p>Scammers can now use AI-generated voice cloning to impersonate executives, government officials, or family members, making impersonation scams more convincing.</p><p>AI can also craft highly personalized phishing emails and text messages at scale, increasing the chances that victims will respond.</p><p>Automation tools powered by AI help criminals quickly test stolen or guessed gift card numbers, while bots can monitor card balances and drain funds immediately.</p><p>Overall, AI lowers the barrier for criminals, allowing them to target more victims with more convincing scams than ever before.</p><div><hr></div><h3>&#128737;&#65039; How to Protect Yourself From Gift Card Fraud</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zl_l!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zl_l!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!zl_l!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!zl_l!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!zl_l!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zl_l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!zl_l!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!zl_l!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!zl_l!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!zl_l!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d558f53-8d4c-4cb1-b63e-46bee18d7c01_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#10067; Other Questions People Are Asking</h3><div><hr></div><p><strong>1. Can you get your money back after a gift card scam?</strong></p><p>Almost never. Gift card transactions are irreversible, but you can report it to the retailer and the FTC.</p><p><strong>2. Why do scammers love gift cards so much?</strong></p><p>They&#8217;re anonymous, fast, and hard to trace.</p><p><strong>3. Which gift cards are most targeted?</strong></p><p>Target, Apple, Amazon, Google Play, and Walmart.</p><p><strong>4. Are e-gift cards safer than physical ones?</strong></p><p>Slightly, because there&#8217;s no store-rack tampering, but phishing still applies.</p><p><strong>5. Should you report gift card scams even if the money is gone?</strong></p><p>Yes. Your report helps law enforcement track patterns and shut down criminal networks.</p><div><hr></div><div id="youtube2-RtmyfZFeDtY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;RtmyfZFeDtY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/RtmyfZFeDtY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p><strong>&#128218;Books </strong></p><ol><li><p><a href="https://www.amazon.com/Scams-Cons-Frauds-Deceptions-person/dp/1032756489/ref=sr_1_1?crid=EOPPE8ZH8FGJ&amp;dib=eyJ2IjoiMSJ9.ABONmBvPbgr6FuYFdM23766aMxQpSBAqpckAQGu6iRIRVSEddWYMlEjgHHie7EgiJaO7cXI9Jh27UKowDxpjAy2XKlLcjIwNxMyTzxSc3CSuc-A6HMg5PNQk9hKZJYp-WeuyefplPNWkLP0IjTqTY_SRgZQ1yhZfv8OdxpUg3gzmfmOqgYzN9ZF3-kQHhmqixXrELPFGW4rLDyoNE4kvuBLZsJhiJ280OsNWzUMhdPA.Xsn5w0u6FjOb50k8dUG5DpDX_GKYntlhkYt4ZoiLGgE&amp;dib_tag=se&amp;keywords=Scams%2C+Cons%2C+Frauds%2C+and+Deceptions&amp;qid=1764779414&amp;sprefix=scams%2C+cons%2C+frauds%2C+and+deceptions%2Caps%2C273&amp;sr=8-1">Scams, Cons, Frauds, and Deceptions</a> by Sean Byrne, and James Byrne</p></li><li><p><a href="https://www.amazon.com/Truth-About-Avoiding-Scams/dp/0132333856/ref=sr_1_1?crid=172TH0DCHE22U&amp;dib=eyJ2IjoiMSJ9.smLOXGkjTHxM9nPYxRoYij9QiMnWaFRSZ1XLM1PzstWvlGro6lpgZR-Mg4OBLk6SheV9UhxdV3zz-Hi4EJydV2tH-RTiNb2P64ACkMCwRFxK_l00RANH9fR4VHjDkdyqfMuiiGmPJWS6zBFb17SHiw.grSyafGNybuY9IQJoUrmdRbIJtMma2fy5n7ohzyXCzM&amp;dib_tag=se&amp;keywords=The+Truth+About+Avoiding+Scams&amp;qid=1764782368&amp;sprefix=the+truth+about+avoiding+scams%2Caps%2C686&amp;sr=8-1">The Truth About Avoiding Scams</a> by Steve Weisman</p></li><li><p><a href="https://www.amazon.com/Comprehensive-Look-Fraud-Identification-Prevention-ebook/dp/B0CW1F7RHN/ref=sr_1_1?crid=2DLGGSYQSPBWD&amp;dib=eyJ2IjoiMSJ9.AJJAD-87gOipHW2DYzrLsA.rG5NbgJ_IFNY_hx4eXg8mgba8KSHxDTbjRHOW6khsRs&amp;dib_tag=se&amp;keywords=A+Comprehensive+Look+at+Fraud+Identification+and+Prevention&amp;nsdOptOutParam=true&amp;qid=1764782425&amp;sprefix=a+comprehensive+look+at+fraud+identification+and+prevention%2Caps%2C319&amp;sr=8-1">A Comprehensive Look at Fraud Identification and Prevention</a> by James R. Youngblood</p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><a href="https://podcasts.apple.com/co/podcast/gift-card-scams-how-to-spot-them-before-you-get-hooked/id1509113775?i=1000737248299">Gift Card Scams: How to Spot Them Before You Get Hooked</a> by <a href="https://www.linkedin.com/in/fabravo/">Frank Bravo</a> on Your Tech Makeover</p></li><li><p><a href="https://podcasts.apple.com/ie/podcast/why-gift-cards-are-gold-mines-for-scammers-part-1/id1362050907?i=1000582608997">Why Gift Cards Are Gold Mines for Scammers, Part 1</a> by <a href="https://www.linkedin.com/in/journalistbobsullivan/">Bob Sullivan</a> on The Perfect Scam</p></li><li><p><a href="https://podcasts.apple.com/us/podcast/playing-the-fraud-card/id1649563473?i=1000663953043">Playing the Fraud Card</a> by Michelle Martinez on All Things Internal Audit</p></li><li><p><a href="https://youtu.be/PmFyCisU5Bs?si=g0p8XgarA-g6QAf-">What is gift card draining? How to prevent getting scammed</a> by TODAY</p></li></ol><div><hr></div><h3>&#128161; Final Thoughts on Gift Card Fraud</h3><div><hr></div><p>Gift card fraud is a simple but highly effective scam that can lead to significant financial losses for both individuals and businesses. Scammers exploit urgency, fear, and trust, often using sophisticated tactics like impersonation or AI-generated messages to pressure victims into paying quickly. The irreversible nature of gift card payments makes prevention and awareness critical, because once a code is shared, recovery is nearly impossible. Staying vigilant, verifying requests independently, and following clear internal policies for businesses can drastically reduce the risk of falling victim. Education, combined with caution and practical safeguards, remains the best defense against this growing threat.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Marc's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Tis the Season… for Scammers Too]]></title><description><![CDATA[Black Friday brings great deals and bigger risks. Slow down, verify offers, avoid suspicious links, and stay alert to AI-driven scams this holiday season.]]></description><link>https://911cyber.substack.com/p/tis-the-season-for-scammers-too</link><guid isPermaLink="false">https://911cyber.substack.com/p/tis-the-season-for-scammers-too</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Wed, 26 Nov 2025 18:53:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1UW9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1UW9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1UW9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!1UW9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!1UW9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!1UW9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1UW9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png" width="711" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:711,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1UW9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!1UW9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!1UW9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!1UW9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9860dd35-f410-40bd-8acc-68d90097d7e7_711x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#127873; Why Black Friday Attracts Scammers</h3><div><hr></div><p>Every year, Black Friday kicks off the holiday shopping season in the U.S. It&#8217;s a day of steep discounts, heavy traffic, and frantic bargain hunting. For retailers, it&#8217;s a financial gold mine. For cybercriminals, it&#8217;s an open invitation. The urgency, hype, and impulse buying that fuel real sales also create ideal conditions for scams. Shoppers are impatient, less cautious, and more likely to click anything that promises &#8220;limited-time&#8221; or &#8220;door buster&#8221; savings. This makes Black Friday and the days around it some of the riskiest moments of the year for online fraud.</p><p>As the season begins, it&#8217;s more important than ever to recognize the threats hiding behind &#8220;too good to be true&#8221; deals.</p><div><hr></div><h3>&#128717;&#65039; Top Black Friday Scams to Watch Out For</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oB8n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oB8n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!oB8n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!oB8n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!oB8n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oB8n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!oB8n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!oB8n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!oB8n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!oB8n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4ae4aaef-ff54-4685-9db1-98f701e8103d_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#128274; Why You Should Care</h3><div><hr></div><p>Black Friday may seem like a chance to score unbeatable deals, but for cybercriminals, it is a peak season for attacks. Every click on a suspicious link, every rushed checkout, and every unverified offer creates an opening for fraud. Scammers rely on the urgency and excitement of holiday shopping to trick shoppers into giving away sensitive information.</p><p>Even small mistakes can have major consequences. A compromised email or payment account can lead to identity theft, unauthorized charges, or access to other accounts. The impact can extend beyond financial loss, affecting your personal and professional life.</p><p>Being aware of the risks is the first step toward staying safe. By taking a moment to verify deals, using secure payment methods, and avoiding impulse clicks, you can protect your data, your money, and your peace of mind during the busiest shopping season of the year.</p><div><hr></div><h3>&#128202; Black&#8239;Friday Scams in Numbers</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ygpz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ygpz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!ygpz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!ygpz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!ygpz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ygpz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87f35442-817c-4657-a034-adb6852cc2b8_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!ygpz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!ygpz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!ygpz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!ygpz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87f35442-817c-4657-a034-adb6852cc2b8_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129302; How AI Is Making Things Worse This Year</h3><div><hr></div><p>The 2025 holiday season shows a worrying acceleration in scam sophistication, much of it driven by advances in AI and automation.</p><ul><li><p>Fraudsters are using AI to generate convincing store clones. Realistic product photos, polished web design, and automated checkout flows make fake storefronts difficult to distinguish from real ones.</p></li><li><p>Deepfake and voice-cloning tools, once niche, are now widely accessible. Scammers using voice or video impersonations, such as fake spokespeople, customer support, or even friends and family in distress, make social engineering far more effective.</p></li><li><p>Automated mass-domain registration and bot-powered phishing campaigns, including look-alike domains, fake ads, and social-media storefronts, scale up quickly. Attackers can flood the web with hundreds or thousands of scam sites in just a few days.</p></li></ul><p>AI does not just automate old tricks. It amplifies them, improves their believability, and drastically increases the scale of attacks.</p><div><hr></div><h3>&#128737;&#65039; How to Protect Yourself</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2lLW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2lLW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!2lLW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!2lLW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!2lLW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2lLW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!2lLW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!2lLW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!2lLW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!2lLW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc4c3f4b1-435d-4af5-87d1-f1aed35f7cbb_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#10067; Other Questions People Are Asking</h3><div><hr></div><p><strong>1. Can I get scammed even on well-known retailer websites?</strong></p><p>Yes. Even legitimate websites can be compromised by hackers or display malicious ads. Always double-check that the website&#8217;s URL is correct, look for HTTPS, and avoid clicking on pop-ups or unexpected redirects during checkout.</p><p><strong>2. How can I spot a fake product review or influencer promotion?</strong></p><p>Fake reviews often sound generic, overly positive, or repeated across multiple products. Be wary of influencer posts or ads offering &#8220;exclusive&#8221; deals outside official retailer channels. Cross-check product listings on the retailer&#8217;s official site.</p><p><strong>3. Is it safe to use gift cards, cryptocurrency, or wire transfers for holiday deals?</strong></p><p>No. These payment methods are preferred by scammers because transactions are hard to reverse. Use secure payment options such as credit cards, PayPal, or digital wallets that offer buyer protection. One-time use or virtual cards can provide an additional layer of security.</p><p><strong>4. What should I do if I think I&#8217;ve encountered a Black Friday scam?</strong></p><p>Stop all communication with the suspicious site or person immediately. Do not provide any personal or payment information. Report the scam to the retailer, your bank or payment provider, and government or consumer protection agencies such as the FTC in the U.S.</p><p><strong>5. How can I safely verify Black Friday deals on social media?</strong></p><p>Check the official retailer&#8217;s social media accounts or website to confirm promotions. Avoid clicking on links from ads, direct messages, or influencer posts unless they redirect to a verified, official page. Use browser extensions or apps that warn about suspicious websites.</p><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;Books </p><ol><li><p><a href="https://amzn.to/4psRbhi">Secrets of Black Friday: How Shoppers Save Big, Sellers Earn More, and Everyone Stays Safe from Scams</a> by Ruben Elliott</p></li><li><p><a href="https://amzn.to/4ijUhSo">100 Facts About Black Friday &amp; Cyber Monday with Tips on How to Avoid Scams</a> by Robert Gres</p></li><li><p><a href="https://amzn.to/4pSO5DJ">How to Protect Yourself from Online Scams A Guide to Safe Shopping and Phishing Prevention</a> by Atanas Atanasov</p></li><li><p><a href="https://amzn.to/4pdaZ8H">How to Beat Scammers</a> by <a href="https://www.linkedin.com/in/nick-stapleton-a909282b7/">Nick Stapleton</a></p></li></ol><p>&#127897;&#65039; Podcasts</p><ol><li><p><a href="https://youtu.be/fbON90F2oGE?si=0B8ipLU_JH9OPLL8">Top Security Risks on Black Friday - What The Shoppers Need To Know</a> with Mike Bolhius</p></li><li><p><a href="https://youtu.be/zZ4_zGOZNao?si=IYN7fkN0fUxmLWm2">Avoid Black Friday scams and shop safely online</a> with <a href="https://www.linkedin.com/in/simon-miller-a06b27156/">Simon Miller</a></p></li><li><p><a href="https://open.spotify.com/episode/74yUZxNRnqpt1RYY88XVet?si=eVi1-d9US0O0RyR8xo9syg">Is Black Friday a Scam</a> by Cybernews Podcast</p></li><li><p><a href="https://www.iheart.com/podcast/263-kim-komando-daily-tech-upd-30511737/now-playing">Your guide to a scam-free Black Friday</a> by <a href="https://www.linkedin.com/company/the-kim-komando-network/">The Kim Komando Show</a></p></li></ol><p>&#9654;&#65039; Videos</p><ol><li><p><a href="https://youtu.be/v5M5k_AbuNs?si=A7mGB7ywA9nmcj12">Black Friday: How to avoid being scammed online by cybersecurity criminals</a> with <a href="https://www.linkedin.com/in/lisa-barber-b3595211/">Lisa Barber</a></p></li><li><p><a href="https://youtu.be/j81VrNwgnv8?si=VKa5nAnl_ty5dMsJ">Black Friday Scams: Avoid &#8216;Black Fraud Day&#8217; - Essential Tips to Stay Safe</a> by Nexus of Ideas</p></li><li><p><a href="https://youtu.be/XgkdYxNDTK0?si=ABrLypJ_re_8llGX">How to spot and avoid Black Friday scams</a> by <a href="https://www.linkedin.com/company/nord-vpn/">NordVPN</a></p></li></ol><div><hr></div><h3>&#10024; Final Thoughts</h3><div><hr></div><p>Black Friday and the holiday shopping season offer great deals but also give cybercriminals a once-a-year opportunity to strike on a large scale. The same urgency, excitement, and chaos that fuel holiday sales also create the perfect cover for scams. As shoppers chase the thrill of a bargain, scammers do the same for stolen data and quick cash.</p><p>If there is one thing to remember this season, it is to pause first and click later. Treat every unsolicited deal, link, or &#8220;too-good-to-be-true&#8221; discount as a potential trap. A bit of skepticism and a few deliberate checks can go a long way in keeping your wallet, identity, and peace of mind intact.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Marc's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Attack on Human Reality]]></title><description><![CDATA[Cognitive hacking manipulates perception at scale using AI, misinformation, and emotional triggers, threatening trust, safety, and decision-making.]]></description><link>https://911cyber.substack.com/p/the-attack-on-human-reality-3ed</link><guid isPermaLink="false">https://911cyber.substack.com/p/the-attack-on-human-reality-3ed</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Tue, 18 Nov 2025 18:48:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!tqjf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tqjf!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tqjf!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!tqjf!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!tqjf!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!tqjf!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tqjf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png" width="711" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4b8de92-150b-4821-afe8-02f54e66985e_711x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:711,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tqjf!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!tqjf!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!tqjf!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!tqjf!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4b8de92-150b-4821-afe8-02f54e66985e_711x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#129504; What Is Cognitive Hacking?</h3><div><hr></div><p>Cognitive hacking is the deliberate manipulation of human thought. It targets perception, memory, judgment, and decision-making by using digital channels like social media and fake news to influence beliefs and actions.</p><p>Unlike traditional social engineering, which usually focuses on a single interaction, cognitive hacking works at scale, using technology to manipulate groups or society. Unlike general disinformation campaigns, it specifically exploits human cognition to change behavior.</p><p>Attackers rely on natural vulnerabilities in our thinking:</p><ul><li><p>Confirmation bias: Messages confirm existing beliefs, making them easy to accept and share.</p></li><li><p>Emotional appeals: Fear, outrage, or urgency push people to act impulsively.</p></li><li><p>Motivated reasoning: People interpret information to fit their identity or social group.</p></li></ul><p>In short, cognitive hacking is a sophisticated, large-scale attempt to manipulate minds and drive real-world actions.</p><div><hr></div><h3>&#9888;&#65039; How Dangerous Is It?</h3><div><hr></div><p>Cognitive hacking is more than a digital threat. It can cause real-world harm, including financial loss, reputational damage, psychological stress, harassment, and even physical danger. In extreme cases, manipulated information has led to riots and vigilante attacks.</p><p>At a societal level, these attacks erode trust in institutions, media, and democracy. They often exploit divisions and target groups that are more susceptible to certain messages. Governments now consider the ability to influence perception and behavior a serious national security concern.</p><p>Corporations and financial markets are also at risk. False reports or synthetic media can quickly damage brands, trigger boycotts, and create stock volatility. For example, a false claim about Farmland Partners in 2018 caused a 40 percent drop in stock value in a single day.</p><p>Cognitive hacking is a powerful tool that can affect individuals, communities, and entire markets, making it one of today&#8217;s most serious cyber threats.</p><div><hr></div><h3>&#128202; Cognitive Hacking in Numbers</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GKT-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GKT-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!GKT-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!GKT-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!GKT-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GKT-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!GKT-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!GKT-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!GKT-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!GKT-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0bb63639-f42a-4ea7-9b66-dc2ba92b1e19_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#128293; Why You Should Care</h3><div><hr></div><p><strong>It affects daily life.</strong></p><p>Whether planning for kids&#8217; safety online, deciding what news to trust, or clicking a payment link, cognitive hacking changes everyday choices.</p><p><strong>It undermines trust.</strong></p><p>Democracies, emergency response, healthcare, and markets depend on shared facts and trust. Cognitive hacks corrode that foundation.</p><p><strong>It targets the vulnerable</strong>.</p><p>Children, elderly, those with low digital literacy, and emotionally distressed people are easier to manipulate.</p><p><strong>It scales via tech.</strong></p><p>Social platforms and recommendation algorithms can accidentally amplify manipulative content. Add AI, and scale + realism increase dramatically.</p><div><hr></div><h3>&#129302; How AI Is Making Cognitive Hacking Worse</h3><div><hr></div><p>AI changes the game in four major ways:</p><ol><li><p><strong>Scale &amp; speed of content production:</strong> generative models produce realistic text, images, audio and video quickly, lowering the cost of creating manipulative content.</p></li><li><p><strong>Realism (deepfakes):</strong> voice and video synthesis now can convincingly impersonate individuals, increasing success in scams and political manipulation.</p></li><li><p><strong>Personalization &amp; micro-targeting:</strong> AI can craft tailored narratives and messages optimized for each psychological profile, improving persuasion and conversion.</p></li><li><p><strong>Automation of amplification:</strong> bots and coordinated inauthentic networks can be driven by AI to optimize posting times, hashtags, and engagement to maximize reach.</p></li></ol><p>Beyond the technology itself, <strong>regulatory and ethical asymmetries</strong> matter: attackers can freely experiment and scale, whereas defenders face legal, privacy, and ethical constraints (and slower institutional processes). That gives attackers an advantage unless we strengthen systemic defenses. (See policy responses such as EU and national rules about labeling AI content.)</p><div><hr></div><h3>&#128737;&#65039; How to Protect Against Cognitive Hacking</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Sx0y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Sx0y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!Sx0y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!Sx0y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Sx0y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Sx0y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!Sx0y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!Sx0y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!Sx0y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Sx0y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc925ae63-4405-40b5-aa37-b0db0655bc9c_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#10067; Other Questions People Are Asking</h3><div><hr></div><p><strong>1. Can cognitive hacking really affect me personally?</strong></p><p>Yes. Even individuals can be manipulated through social media, messaging apps, or fake news, influencing decisions, emotions, and behavior.</p><p><strong>2. How is cognitive hacking different from a scam or phishing?</strong></p><p>Scams aim to steal money or credentials. Cognitive hacking manipulates your perception and behavior, sometimes without immediate financial motives.</p><p><strong>3. Are deepfakes the main tool for cognitive hacking?</strong></p><p>Not always. Deepfakes are one method, but misinformation, emotional narratives, and social engineering all fall under cognitive hacking.</p><p><strong>4. Can families protect children from these attacks?</strong></p><p>Yes. Teaching critical thinking, digital literacy, and safe online habits can make children more resilient to manipulation.</p><p><strong>5. How can I tell if information is trying to manipulate me?</strong></p><p>Look for content designed to provoke strong emotions, confirm your existing beliefs, or create a sense of urgency. Pause, fact-check, and seek multiple sources before reacting.</p><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><strong><a href="https://amzn.to/3X4HKIQ">Cognitive Hack</a></strong> by <strong><a href="https://www.linkedin.com/in/chiefriskofficer/">James Bone</a></strong></p></li><li><p><strong><a href="https://amzn.to/4i6cMcR">The Psychology of Cybersecurity</a></strong> by <strong><a href="https://www.linkedin.com/in/ts111/">Tarnveer Singh</a></strong></p></li><li><p><strong><a href="https://amzn.to/4i8ZjRx">Emerging Cyber Threats and Cognitive Vulnerabilities</a></strong> by Vladlena Benson, <strong><a href="https://www.linkedin.com/in/john-mcalaney-23562627/">John McAlaney</a></strong></p></li><li><p><strong><a href="https://amzn.to/4pibVrU">Behavioral Insights in Cybersecurity</a></strong> by <strong><a href="https://www.linkedin.com/in/dustinsachs/">Dustin S. Sachs</a></strong></p></li><li><p><strong><a href="https://amzn.to/43CA6cl">Human Hacking</a></strong> by <strong><a href="https://www.linkedin.com/in/christopherhadnagy/">Christopher Hadnagy</a></strong> and Seth Schulman</p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><strong><a href="https://youtu.be/pTZBXKDOveQ?si=T4pPDR3Z1qZIB_Nr">Human Factor Security, Episode 24: &#8220;People Hacking &amp; Detecting Deception&#8221;</a></strong> by Karl Lankford and <strong><a href="https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/">Jenny Radcliffe</a></strong></p></li><li><p><strong><a href="https://youtu.be/nW2NdFx1jpA?si=rwlFAhqiPcbqyT4f">The Social&#8209;Engineer Podcast, Episode 253: &#8220;Understanding Human Behavior&#8221;</a></strong> by <strong><a href="https://www.linkedin.com/in/christopherhadnagy/">Christopher Hadnagy</a></strong> and <strong><a href="https://www.linkedin.com/in/dr-abbie-maro%C3%B1o-phd-35ab2611a/">Abbie Marono</a></strong> with guest <strong><a href="https://www.linkedin.com/in/davidmatsumoto/">Dr. David Matsumoto</a></strong>.</p></li><li><p><strong><a href="https://youtu.be/OGmvoj5Dj_A?si=5I_ldyYQpyvM3xXY">Cognitive Security: Exploring the Human Layer</a></strong> with <strong><a href="https://www.linkedin.com/in/matthew-cognitivesecurity/">Dr. Matthew Canham</a></strong></p></li></ol><div><hr></div><h3>&#10024; Final Thoughts</h3><div><hr></div><p>Cognitive hacking is not a distant threat. It is happening now, influencing the choices we make, the information we trust, and even the stability of communities, markets, and governments. Awareness, critical thinking, and simple protective steps can dramatically reduce your risk and that of your family. The digital world is increasingly designed to manipulate attention and emotions, but knowledge is the first line of defense. By staying alert, verifying information, and teaching those around us, we reclaim control over our perceptions and our decisions.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Marc's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How to Build a Personal Incident Response Plan]]></title><description><![CDATA[A personal incident response plan helps you stay calm, act fast, and recover quickly from digital emergencies by protecting accounts, data, and devices.]]></description><link>https://911cyber.substack.com/p/how-to-build-a-personal-incident-59e</link><guid isPermaLink="false">https://911cyber.substack.com/p/how-to-build-a-personal-incident-59e</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Tue, 11 Nov 2025 18:47:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WF4K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WF4K!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WF4K!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!WF4K!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!WF4K!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!WF4K!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WF4K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png" width="711" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:711,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WF4K!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!WF4K!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!WF4K!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!WF4K!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fdbebcd-266a-4867-89f9-a0f768908f8d_711x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#129504; What Is an Incident Response Plan?</h3><div><hr></div><p>An Incident Response Plan (IRP) is simply a written guide that tells you what to do, who to call, and how to recover if something bad happens in your digital life; whether that&#8217;s a hacked account, a stolen phone, or suspicious charges on your credit card.</p><p>It&#8217;s not a document for &#8220;tech people.&#8221; It&#8217;s for anyone who uses the internet, which means all of us. You don&#8217;t have to be technical to write one. It&#8217;s your personal &#8220;what if&#8221; guide for digital emergencies. It&#8217;s not about being paranoid. It&#8217;s about being ready.</p><div><hr></div><h3>&#9888;&#65039; Why You Need One</h3><div><hr></div><p>When a cyber incident happens, panic is natural and panic leads to mistakes. In the heat of the moment, we might reuse old passwords, click on suspicious links, or struggle to remember who to call for help. Every second counts, and a wrong move can make the problem worse or slow down recovery.</p><p>Having a personal incident response plan acts like a safety net for your digital life. It saves time, reduces stress, and gives you a clear path to follow when things go wrong. Think of it as insurance for your peace of mind. You hope you never need it, but you are incredibly glad it is there when you do.</p><div><hr></div><h3>&#128270; Knowing What to Protect</h3><div><hr></div><p>The first step in your personal incident response plan is knowing exactly what needs protection. Start by identifying the accounts, devices, and data that are most valuable or could cause the biggest problems if compromised.</p><p>Make a short list that includes your main email account, which often controls password resets for everything else, your bank and credit accounts, cloud storage with important documents and photos, social media or professional profiles, and the devices you use every day such as your phone or laptop. You can also include work-related accounts, cryptocurrency wallets, or any subscriptions tied to payment information. These are your digital crown jewels, the assets you will focus on securing and recovering first. Knowing what matters most helps you prioritize your defenses and respond quickly if something goes wrong.</p><div><hr></div><h3>&#128506;&#65039; Mapping Your Digital Footprint</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cgxR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cgxR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!cgxR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!cgxR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!cgxR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cgxR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!cgxR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!cgxR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!cgxR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!cgxR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa54906cb-2d77-414c-9d27-264ddec31ed3_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129534; Creating Your Digital Estate Plan</h3><div><hr></div><p>A digital estate plan is about making sure someone you trust can access your important online accounts and data if something happens to you. This is not just for older adults. Anyone who manages email, bank accounts, cloud storage, social media, or important photos should have one.</p><p>Start by listing your critical accounts and devices and decide who you would want to have access in an emergency. Make sure the process does not expose your passwords publicly. You can use password managers that offer &#8220;emergency access&#8221; features, encrypted notes, or secure documents to share instructions safely. Include details on how to recover accounts, access backups, and locate important files.</p><p>Think of it like a will for your online life. Just as a will ensures your physical belongings are handled according to your wishes, a digital estate plan ensures your accounts, data, and digital identity can be managed by someone you trust without putting your information at risk.</p><div><hr></div><h3>&#129521; Fortifying Your Perimeter</h3><div><hr></div><p>Two easy wins:</p><ul><li><p>Use a password manager. It remembers the hard stuff so you can use unique passwords everywhere.</p></li><li><p>Turn on MFA (Multi-Factor Authentication) for your main accounts &#8212; especially email, bank, and social media.</p></li></ul><p>It&#8217;s the digital equivalent of locking your front door and setting the alarm.</p><div><hr></div><h3>&#128190; Creating Data Resilience</h3><div><hr></div><p>Use the 3-2-1 Backup Strategy.</p><p>Backup strategies don&#8217;t have to be complicated:</p><ul><li><p>3 copies of your data</p></li><li><p>2 different storage types (cloud + external drive)</p></li><li><p>1 copy kept offline or off-site</p></li></ul><p>If ransomware or device failure hits, this is how you sleep at night knowing your photos and files are safe.</p><div><hr></div><h3>&#129523; The &#8220;Go-Bag&#8221; : Your Emergency Kit</h3><div><hr></div><p>Every firefighter has a go-bag. You should too, for digital emergencies.</p><p>Include:</p><ul><li><p>Recovery contacts for your bank, mobile provider, and credit bureaus</p></li><li><p>Your insurance or cybersecurity provider&#8217;s hotline (if you have one)</p></li><li><p>Access to your password manager or emergency recovery keys</p></li><li><p>Copies of your ID and important documents (encrypted or printed safely)</p></li></ul><p>Keep it where you can reach it fast, not buried in your inbox.</p><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><strong><a href="https://amzn.to/43ti5gB">Digital Fortress: Your Personal Guide to Bulletproof Cybersecurity in 2025</a></strong> by Massimiliano Curcio</p></li><li><p><strong><a href="https://amzn.to/4oBZFm8">Personal Digital Security: Protecting Yourself from Online Crime</a></strong> by Michael Bazzell</p></li><li><p><strong><a href="https://amzn.to/47EDBkU">Cybersecurity 101: Protecting Your Digital Life: Essential Strategies to Safeguard Your Personal Data and Devices</a></strong> by Milo Codde Milligan</p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><strong><a href="https://open.spotify.com/show/6rYVQJapAUdJvpk3SZJYbL?si=617f503498ae4ccb">Bee Cyber Fit: Simplifying Cybersecurity for Everyone hosted</a></strong> by Wendy Battles and James Tucciarone</p></li><li><p><strong><a href="https://open.spotify.com/show/7vAbYigR3zs8GYJP3EoVWw?si=1411a7a7dc304b4b">Security Now Podcast hosted</a></strong> by Steve Gibson &amp; Leo Laporte</p></li><li><p><strong><a href="https://youtu.be/HUR4QOHEurY?si=ZI7uazk00PwQl_-4">What to do if you are hacked: Full Guide</a></strong> by PC Security Channel</p></li><li><p><strong><a href="https://youtu.be/fSErHToV8IU?si=59ANcqkhUFh2-Pa8">Everyday cybercrime and what you can do about it</a></strong> by James Lyne on TED</p></li></ol><p><strong>&#9654;&#65039; Videos</strong></p><ol><li><p><strong><a href="https://youtu.be/tQ3g-zarz9c?si=F0bRfBkvoxlndoF-">5 SIMPLE steps to take if you&#8217;ve been hacked</a></strong> by VPNpro</p></li><li><p><strong><a href="https://youtu.be/Pon74S8we5Q?si=pLwowcuspDdDHufS">4 TIME-SENSITIVE Steps to Take if You&#8217;ve Been Hacked</a></strong> by Josh Summers on All Things Secured</p></li></ol><div><hr></div><h3>&#129504; Final Thoughts</h3><div><hr></div><p>Building a personal incident response plan is not just a weekend checklist. It is a mindset. It is about accepting that no matter how careful you are, things can and will go wrong online. Phishing emails, stolen devices, and hacked accounts are not &#8220;if&#8221; scenarios, they are &#8220;when&#8221; scenarios.</p><p>Having a plan means you are not helpless when it happens. It is saying I cannot prevent every attack, but I can control how I respond, limit the damage, and recover faster. Your plan turns confusion and panic into clear, deliberate action. It gives you confidence, reduces stress, and ensures that even in a digital emergency, you are in control of your own recovery. In the world of cybersecurity, preparation is not optional. It is a key part of staying safe.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Marc's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Copy-Paste Attack That's Spreading Quietly]]></title><description><![CDATA[ClickFix tricks users into pasting malicious commands that bypass defenses. It exploits human behavior, making awareness and a &#8220;stop, question, verify&#8221; mindset essential.]]></description><link>https://911cyber.substack.com/p/the-copy-paste-attack-thats-spreading-164</link><guid isPermaLink="false">https://911cyber.substack.com/p/the-copy-paste-attack-thats-spreading-164</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Tue, 04 Nov 2025 18:46:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!k1Tp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!k1Tp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!k1Tp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!k1Tp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!k1Tp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!k1Tp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!k1Tp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png" width="711" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:711,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!k1Tp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png 424w, https://substackcdn.com/image/fetch/$s_!k1Tp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png 848w, https://substackcdn.com/image/fetch/$s_!k1Tp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png 1272w, https://substackcdn.com/image/fetch/$s_!k1Tp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96b32d56-1110-47c0-b5eb-b2cc6fea4a6e_711x400.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#128522; What is ClickFix?</h3><div><hr></div><p>ClickFix is a social engineering technique where an attacker convinces you to run a command or paste code on your device. The prompt often appears as a CAPTCHA, a verification step, or a &#8220;fix this error&#8221; message. The user executes the command themselves, which triggers malware or gives the attacker access.</p><div><hr></div><h3>&#129513; How It Works</h3><div><hr></div><ol><li><p>A victim receives a phishing email, clicks on a malicious ad, or visits a compromised website.</p></li><li><p>The site displays a fake &#8220;You must verify you are human&#8221; or &#8220;Fix this error&#8221; prompt.</p></li><li><p>The victim is instructed to open Run (Win+R) or Terminal, paste a command, and press Enter.</p></li><li><p>The pasted command executes malware or loads further stages (infostealer, RAT, loader).</p></li><li><p>Because the user initiated the action, many automated defenses are bypassed.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PVcr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PVcr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!PVcr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!PVcr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!PVcr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PVcr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!PVcr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!PVcr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!PVcr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!PVcr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbc883b4e-72ab-42f2-a6c1-3b649a53cf93_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div></li></ol><div><hr></div><h3>&#128680; Why It Matters</h3><div><hr></div><p>ClickFix is important because it marks a shift in how attackers operate. Instead of relying solely on software vulnerabilities or attachments, they are exploiting the most consistent weakness of all: the user.</p><p>When you are told to &#8220;paste this code&#8221; as part of what looks like a normal workflow, you become the delivery mechanism.</p><p>This method is particularly dangerous because:</p><ul><li><p>Many security tools assume the threat comes from outside. With ClickFix, the user triggers it, making detection much harder.</p></li><li><p>It works on both Windows and macOS, putting a wide range of users, including less technical ones, at risk.</p></li><li><p>In sectors like hospitality, small businesses, and service industries&#8212;where cybersecurity resources are often limited&#8212;these user-based attacks can go unnoticed.</p></li></ul><p>The future of cyber defense must include not only technology but also behavioral hygiene, teaching people that sometimes the act of clicking or pasting itself can be the threat.</p><div><hr></div><h3>&#128737;&#65039; How to Protect Yourself Against ClickFix?</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Ad9N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Ad9N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!Ad9N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!Ad9N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Ad9N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Ad9N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png" width="744" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:744,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!Ad9N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png 424w, https://substackcdn.com/image/fetch/$s_!Ad9N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png 848w, https://substackcdn.com/image/fetch/$s_!Ad9N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Ad9N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6722a8f7-c2b9-4811-b012-6d66bc7441d3_744x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#10067; Other Questions People Ask</h3><div><hr></div><p><strong>1. Is ClickFix a virus, or is it malware?</strong></p><p>ClickFix is neither. It is a social engineering tactic. It is the delivery method or the &#8220;con.&#8221; It represents the psychological tricks (the visual lure) used to convince a user to manually run malicious commands on their own computer. These commands, once run by the user, then proceed to download the actual malware (such as infostealers, Remote Access Trojans (RATs), or ransomware).</p><p><strong>2. Does it only affect Windows?</strong></p><p>While Windows is a primary target, attackers are also adapting the technique for macOS.</p><p><strong>3. Can my antivirus or EDR solution automatically block ClickFix?</strong></p><p>Not reliably, as ClickFix is designed to bypass these tools. The attack bypasses traditional file-scanning AV because it is often &#8220;fileless&#8221; (executing only in memory). It can bypass many EDR solutions because the user is the one performing the malicious action (bypassing &#8220;human intervention&#8221; checks) , and they are using trusted, legitimate system utilities (like PowerShell) to do it.</p><p><strong>4. Why is this technique rising now?</strong></p><p>Because it leverages human behavior rather than strict technical vulnerabilities, making it scalable and effective for attackers.</p><p><strong>5. How can organizations respond?</strong></p><p>By shaping both technical controls (restricting Run/Terminal) and behavioral controls (training staff, building pause culture).</p><p><strong>6. Who are the main threat actors using ClickFix?</strong></p><p>The tactic is used by a very broad spectrum of actors, which is why it is so dangerous.</p><ul><li><p><strong>Cybercriminals</strong>: It was pioneered by financially motivated groups, specifically the initial access broker TA571 and the ClearFake cluster. It is now widely used by countless criminal actors to deploy commodity malware like the Lumma Stealer.</p></li></ul><ul><li><p><strong>State-Sponsored (APT) Groups</strong>: In a major strategic escalation, ClickFix has been adopted by nation-state espionage groups. Researchers have confirmed its use by APTs linked to North Korea (TA427), Iran (TA450, MuddyWater), and Russia (APT28, TA422).</p></li></ul><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><em><strong><a href="https://a.co/d/bQNPL4C">Social Engineering</a></strong> </em> by Robert W. Gehl &amp; Sean T. Lawson</p></li><li><p><em><strong><a href="https://a.co/d/9vo4oCh">Phishing for Phools</a></strong></em> by <strong><a href="https://www.linkedin.com/in/george-akerlof-25a4035/">George A. Akerlof</a></strong></p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><em><strong><a href="https://thecyberwire.com/podcasts/hacking-humans">Hacking Humans</a></strong></em> <strong><a href="https://thecyberwire.com/podcasts/hacking-humans">(by the CyberWire)</a></strong> hosted by <strong><a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a></strong>, <strong><a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a></strong> and <strong><a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a></strong></p></li><li><p><em><strong><a href="https://podcasts.apple.com/gb/podcast/human-factor-security/id1174807837">Human Factor Security</a></strong></em> by <strong><a href="https://www.linkedin.com/in/jenny-radcliffe-the-people-hacker-%F0%9F%8E%A4%F0%9F%8E%A7%F0%9F%A7%A0-85ba1611/">Jenny Radcliffe</a></strong></p></li></ol><p><strong>&#9654;&#65039; Video</strong></p><ol><li><p><strong><a href="https://youtu.be/DOSw40Ik0BQ?si=vW38tb2z2TZrmVXf">AI ClickFix: Hijacking Computer-Use Agents with popular social engineering tricks, like ClickFix</a></strong>. By Embrace The Red</p></li></ol><div><hr></div><h3>&#129504; Final Thoughts</h3><div><hr></div><p>The ClickFix attack makes it clear that in 2025, the human element is the main battleground. Technology alone is not enough to stop these threats; the most effective, and often only, defense is teaching people to pause, question, and verify.</p><p>Attackers using methods like ClickFix exploit human actions, not just software vulnerabilities. That means the best defense combines technology with behavior. While having the right tools is important, building a culture where the team automatically follows a &#8220;stop, question, verify&#8221; mindset is just as critical as the latest endpoint protection.</p><p>Ultimately, the strongest defense is one that recognizes the user as both the target and the essential front-line defender.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Marc's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Where Digital Meets Physical Risk]]></title><description><![CDATA[Ride-sharing blends digital and physical risk, exposing users to scams, data abuse, account takeovers, and safety threats unless they stay vigilant and verify every step.]]></description><link>https://911cyber.substack.com/p/where-digital-meets-physical-risk-048</link><guid isPermaLink="false">https://911cyber.substack.com/p/where-digital-meets-physical-risk-048</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Tue, 28 Oct 2025 18:46:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4zM0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4zM0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4zM0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!4zM0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!4zM0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!4zM0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4zM0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4zM0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!4zM0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!4zM0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!4zM0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe13aa741-3a7c-41dd-895a-97a27c0e3819_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#128663; What are the safety risks associated with ride-sharing?</h3><div><hr></div><p>Ride-sharing offers convenience but also exposes riders to a mix of digital, physical, and privacy risks. Criminals can impersonate drivers using cloned profiles or similar-looking vehicles, while phishing messages disguised as refund or payment alerts trick users into sharing personal data. Weak passwords and reused credentials make accounts vulnerable to takeovers, giving attackers access to payment details and trip histories. The apps themselves collect vast amounts of location data, creating privacy risks if breached or misused. Inside the car, riders face potential physical threats from unverified or malicious drivers, and oversharing trip details online can make users targets for stalking or theft. In short, every ride is a trust exchange, one that demands both digital vigilance and real-world awareness.</p><div><hr></div><h3>&#9888;&#65039; Ride-Sharing Risks</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!li3P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!li3P!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!li3P!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!li3P!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!li3P!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!li3P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61199d45-3f42-4927-8612-0f194bca9027_1488x837.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!li3P!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!li3P!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!li3P!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!li3P!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61199d45-3f42-4927-8612-0f194bca9027_1488x837.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#128373;&#65039; Privacy Considerations</h3><div><hr></div><p>When using ride-sharing services, there are several privacy considerations to keep in mind. Apps constantly track your location, revealing sensitive patterns such as your home, workplace, and daily routines. Many services share anonymized or aggregated trip data with third parties, but even this data can sometimes be re-identified. Your account information, including email, phone number, payment methods, and sometimes social media links, can be exposed if passwords are weak or reused. Trip history stored in the app can reveal habits and frequented locations, potentially enabling stalking or targeted scams. In-app communications may also be stored or monitored, so avoid sharing sensitive personal details outside official channels. Device permissions such as access to contacts or microphone should be granted sparingly. Finally, avoid posting ride details or screenshots online to prevent oversharing.</p><div><hr></div><h3>&#128202; Ride-Sharing Safety in Numbers</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_YWU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_YWU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!_YWU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!_YWU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!_YWU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_YWU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!_YWU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!_YWU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!_YWU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!_YWU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb77e1ce-e8cc-4a9b-ac65-b2224033677f_1488x837.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129302; How AI Is Making It Worse</h3><div><hr></div><p>AI is amplifying ride-sharing risks in ways many riders do not realize. Fraudsters use <strong>AI-generated profiles and deepfake photos</strong> to create convincing fake driver accounts that can bypass casual verification. Phishing messages have become more sophisticated, with AI crafting personalized texts that mimic the tone and style of official ride-sharing communications, making scams harder to spot.</p><p>Even in the physical world, AI can analyze stolen trip data to <strong>predict user patterns</strong>, from daily commutes to weekend routines, which enables targeted stalking or theft. Some attackers also deploy AI chatbots to interact with victims in real time, tricking them into revealing passwords, PINs, or personal details. AI does not just speed up attacks, it makes them smarter, more convincing, and far more dangerous for the average rider.</p><div><hr></div><h3>&#128274; How to Protect Against Ride-Sharing Risks?</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6_UV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6_UV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!6_UV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!6_UV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!6_UV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6_UV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!6_UV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!6_UV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!6_UV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!6_UV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6287ff35-7d10-4816-afc5-fe2440869832_1488x837.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#10067; Other Questions People Ask</h3><div><hr></div><ul><li><p><strong>How can I reduce my digital footprint in ride-sharing apps?</strong></p></li></ul><p>Limit location permissions, avoid storing unnecessary payment methods, and review privacy settings regularly.</p><ul><li><p><strong>What if I feel unsafe during a ride?</strong></p></li></ul><p>End the ride if possible, share your trip with a trusted contact, and report the driver immediately through the app.</p><ul><li><p><strong>How do I know if a ride request or driver is a scam?</strong></p></li></ul><p>Verify the driver&#8217;s photo, license plate, and car model, and only communicate through the official app to avoid phishing.</p><ul><li><p><strong>What data do ride-sharing companies collect about me, and how is it used?</strong></p></li></ul><p>Ride-sharing apps track your location, payment details, and ride history to improve services, but this data may also be shared with third parties or exposed in data breaches. Review the company&#8217;s privacy policy and delete old ride history when possible.</p><ul><li><p><strong>How can I stay safe when riding late at night or in unfamiliar areas?</strong></p></li></ul><p>Wait for your ride indoors, confirm driver details before getting in, sit in the back seat, and share your live location with a friend. Avoid sharing personal information with the driver and trust your instincts. If something feels off, end the ride.</p><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><strong><a href="https://amzn.to/4oMqVhG">How To Reduce Your Digital Footprint</a></strong> by Maya Lane</p></li><li><p><strong><a href="https://amzn.to/3X16GRn">7 Days To Remove Your Digital Footprint</a></strong> by G Davila</p></li><li><p><strong><a href="https://amzn.to/4qziR5w">Little Black Book of Safety</a></strong> by Keisha Gebre</p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><strong><a href="https://open.spotify.com/episode/2u8F9ipoKOWcVSIexd9kTA">The Dangers Of RideSharing</a></strong> by Safety Chick Kathleen Gallagher</p></li><li><p><strong><a href="https://podcasts.apple.com/us/podcast/the-legalrideshare-podcast/id1646745846">The LegalRideshare Podcast</a></strong> by Bryant Greening and Jared Hoffa</p></li><li><p><strong><a href="https://www.audible.com/podcast/Are-Rideshares-Uber-Safe-For-Solo-Travelers-8-Tips-to-Feel-Safer/B0CVQVJT5N?language=/podcast/Are-Rideshares-Uber-Safe-For-Solo-Travelers-8-Tips-to-Feel-Safer/B0CVQVJT5N%3Faction_code%3DASSGB149080119000H%26language%3Den_US%26share_location%3Dpdp&amp;srsltid=AfmBOoosZ4uZ5p4nWn-96ZtUVdmBS8zFMcvnNTNTVx0tDpshJOrnwDTZ">Are Rideshares (Uber) Safe For Solo Travelers? 8 Tips to Feel Safer</a></strong> by Cheryl Esch</p></li></ol><p><strong>&#9654;&#65039; Videos</strong></p><ol><li><p><strong><a href="https://www.youtube.com/watch?v=TRd5SnuVSXY&amp;pp=ygUTcmlkZSBzaGFyaW5nIHNhZmV0eQ%3D%3D">Ridesharing Safety: 5 Important Tips to Follow</a></strong></p></li></ol><div><hr></div><h3>&#129504; Final Thoughts</h3><div><hr></div><p>Ride-sharing is convenient, but every trip comes with both digital and real-world risks. Your personal data, travel patterns, and even physical safety can be exposed if you are not vigilant. The good news is that <strong>small, consistent habits</strong>, such as verifying drivers, limiting location sharing, using strong passwords, and staying aware during rides, can dramatically reduce your risk. Think of every ride as a trust exchange, where awareness and preparation are your first line of defense. Protect your privacy, stay alert, and make safety a routine part of every journey.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Marc's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Dangers of Digital Doppelgängers]]></title><description><![CDATA[Ride-sharing blends digital and physical risk, exposing users to scams, data abuse, account takeovers, and safety threats unless they stay vigilant and verify every step.]]></description><link>https://911cyber.substack.com/p/the-dangers-of-digital-doppelgangers-a3f</link><guid isPermaLink="false">https://911cyber.substack.com/p/the-dangers-of-digital-doppelgangers-a3f</guid><dc:creator><![CDATA[911Cyber]]></dc:creator><pubDate>Tue, 21 Oct 2025 18:45:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-R_O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-R_O!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-R_O!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!-R_O!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!-R_O!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!-R_O!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-R_O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png" width="1280" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-R_O!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png 424w, https://substackcdn.com/image/fetch/$s_!-R_O!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png 848w, https://substackcdn.com/image/fetch/$s_!-R_O!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png 1272w, https://substackcdn.com/image/fetch/$s_!-R_O!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b7e88db-29df-4e4b-96dd-fa239bc12e48_1280x720.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Welcome to Cyber Hygiene, my weekly newsletter, where I share tips and actionable data to help everyone stay safe online.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.substack.com/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><h3>&#128373;&#65039;What Is Online Impersonation?</h3><div><hr></div><p>Online impersonation is the act of creating a false online identity that mimics another real person or a legitimate entity. This can involve using someone else&#8217;s name, photos, and personal details to create social media profiles, email addresses, or even entire websites. The motivations behind such acts are diverse and often malicious, including financial fraud, harassment, defamation, or simply to sow confusion and chaos. It&#8217;s a significant breach of trust and can have severe consequences for the individual being impersonated.</p><div><hr></div><div id="youtube2-riLctiWQUOA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;riLctiWQUOA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/riLctiWQUOA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>&#9888;&#65039; Where Does the Danger Lie in Online Impersonation?</h3><div><hr></div><p>The dangers of online impersonation extend far beyond mere annoyance. They can infiltrate various aspects of a victim&#8217;s life:</p><ul><li><p><strong>Reputational Damage:</strong> An impersonator can post offensive, false, or damaging content under your name, severely harming your personal and professional reputation.</p></li><li><p><strong>Financial Fraud:</strong> Impersonators can use your identity to open credit accounts, apply for loans, make fraudulent purchases, or trick your contacts into sending them money.</p></li><li><p><strong>Emotional Distress and Harassment:</strong> Being impersonated can lead to feelings of violation, anxiety, and helplessness. Impersonators might also use the fake profile to harass or stalk others, making it appear as though you are the perpetrator.</p></li><li><p><strong>Loss of Trust and Relationships:</strong> An impersonator can send messages to your friends, family, and colleagues, potentially damaging your relationships and trust networks.</p></li><li><p><strong>Legal Consequences:</strong> In some cases, an impersonator&#8217;s actions could inadvertently lead to legal issues for the victim, especially if the impersonation is used for criminal activities.</p></li></ul><div><hr></div><h3>&#128202; Online Impersonation in Numbers</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VGkt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VGkt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!VGkt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!VGkt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!VGkt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VGkt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!VGkt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!VGkt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!VGkt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!VGkt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4a7dba0f-5278-4125-bc4e-0e176917c6f7_1488x837.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#129302; How AI Is Making It Worse</h3><div><hr></div><p>The rapid growth of AI technologies has given impersonators powerful new tools to deceive people more effectively. <strong>Deepfake technology</strong> now allows the creation of highly realistic yet entirely fabricated videos and audio recordings, showing individuals saying or doing things that never happened. This makes it increasingly difficult to tell real content from fake.</p><p><strong>Generative AI</strong> for text can imitate someone&#8217;s writing style with striking accuracy, helping impersonators craft convincing emails, messages, or posts that appear authentic. <strong>Voice cloning</strong> takes this a step further, enabling AI to replicate a person&#8217;s voice from just a few seconds of audio and use it to make realistic-sounding phone calls that trick victims or automated systems.</p><p>Even the process of creating fake online identities has become automated. AI can generate countless fake profiles using scraped personal data and AI-generated photos, giving these accounts a convincing and trustworthy appearance.</p><div><hr></div><h3>&#128269; How to Find Out If You&#8217;re Being Impersonated Online</h3><div><hr></div><p>Vigilance is your first line of defense. Here&#8217;s how to actively monitor for signs of impersonation:</p><ul><li><p><strong>Regular Self-Audits</strong></p></li></ul><p>Periodically search your name, email address, and common usernames on search engines (Google, Bing) and major social media platforms (Facebook, Instagram, X, LinkedIn, TikTok).</p><ul><li><p><strong>Reverse Image Search</strong></p></li></ul><p>Use tools like Google Images reverse search to see if your photos are appearing on unfamiliar profiles or websites.</p><ul><li><p><strong>Set Up Google Alerts</strong></p></li></ul><p>Create alerts for your name, professional titles, and business names to be notified whenever they appear online.</p><ul><li><p><strong>Monitor Account Activity</strong></p></li></ul><p>Keep a close eye on your own online accounts for any unusual activity, such as login attempts from unknown locations or messages you didn&#8217;t send.</p><ul><li><p><strong>Listen to Your Network</strong></p></li></ul><p>Your friends, family, and colleagues might be the first to notice a suspicious profile impersonating you. Encourage them to notify you if they see anything out of the ordinary.</p><div><hr></div><h3>&#128737;&#65039; How to Protect Against Online Impersonation</h3><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wmQg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wmQg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!wmQg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!wmQg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!wmQg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wmQg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Article content&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Article content" title="Article content" srcset="https://substackcdn.com/image/fetch/$s_!wmQg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png 424w, https://substackcdn.com/image/fetch/$s_!wmQg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png 848w, https://substackcdn.com/image/fetch/$s_!wmQg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png 1272w, https://substackcdn.com/image/fetch/$s_!wmQg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbfe12a60-a616-4d3a-9128-587c7b467c05_1488x837.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>&#10067; Other Important Questions People Ask</h3><div><hr></div><ul><li><p><strong>Is online impersonation illegal?</strong></p></li></ul><p>In most jurisdictions, yes. Laws vary, but impersonating someone online with intent to defraud, harass, or harm them can lead to criminal charges, civil lawsuits, or both. For example, California has a specific law against online impersonation.</p><ul><li><p><strong>Can impersonators steal my money directly?</strong></p></li></ul><p>Yes. Many impersonators use fake profiles, emails, or messages to trick victims into sending money, sharing account details, or approving fraudulent transactions. Business Email Compromise (BEC) scams often target employees with financial access.</p><ul><li><p><strong>Can I prevent deepfake impersonation completely?</strong></p></li></ul><p>Completely preventing it is difficult, but you can minimize risks. Limit public sharing of personal photos and voice recordings, verify unusual requests carefully, and use AI detection tools for suspicious content.</p><ul><li><p><strong>How do I report someone impersonating me?</strong></p></li></ul><p>Report the profile to the platform where the impersonation appears. Collect evidence such as screenshots, URLs, and timestamps. You can also file complaints with authorities like the FTC in the U.S. or your local cybercrime unit.</p><div><hr></div><h3>&#129520; What Resources Are Available to Help?</h3><div><hr></div><p>&#128218;<strong>Books </strong></p><ol><li><p><strong><a href="https://amzn.to/47gLFH1">The AI Scam Survival Guide: How to Spot Deepfakes, Outsmart Chatbots, and Stay Safe from Online Fraud</a></strong> by <strong><a href="https://www.linkedin.com/in/alexaeast/">Alex East</a></strong></p></li><li><p><strong><a href="https://amzn.to/4qCvOvw">The Personal Cybersecurity Manual: How Anyone Can Protect Themselves from Fraud, Identity Theft, and Other Cybercrimes (Home Technology Manuals)</a></strong> by <strong><a href="https://www.linkedin.com/in/marlonbuchanan/">Marlon Buchanan</a></strong></p></li><li><p><strong><a href="https://amzn.to/42SOInC">Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond</a></strong> by <strong><a href="https://www.linkedin.com/in/mtreyes1/">Matt Reyes</a></strong></p></li><li><p><strong><a href="https://amzn.to/3WOBd4L">Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud</a></strong> by <strong><a href="https://www.linkedin.com/in/robertsiciliano/">Robert Siciliano</a></strong></p></li></ol><p><strong>&#127897;&#65039; Podcasts</strong></p><ol><li><p><strong><a href="https://open.spotify.com/episode/4STLdMN4pQwoxDZFQ4u30b?si=24Fabl8NS8SiQgbrGKeEww">Impersonated, Threatened, Stalked</a></strong> by <strong><a href="https://www.linkedin.com/in/jaimie-beebe-98b41327/">Jaimie&#8239;Beebe</a></strong> and <strong><a href="https://www.linkedin.com/in/jakedeptula/">Jake&#8239;Deptula</a></strong> on Strictly Stalking</p></li><li><p><strong><a href="https://podcasts.apple.com/us/podcast/the-deepfake-tipping-point-with-frank-mckenna/id1530461089?i=1000731768602">The Deepfake Tipping Point</a></strong> with <strong><a href="https://www.linkedin.com/in/frankmckenna/">Frank Mckenna</a></strong> and host <strong><a href="https://www.linkedin.com/in/karissehendrick/">Karisse Hendrick</a></strong></p></li><li><p><strong><a href="https://podcasts.apple.com/au/podcast/avoiding-impersonation-scams/id1591332198?i=1000636367615">Avoiding Impersonation Scams</a></strong> with <strong><a href="https://www.linkedin.com/in/catriona-lowe-6306a459/">Catriona Lowe</a></strong> and host Valens Quinn</p></li><li><p><strong><a href="https://youtu.be/-89h8FGgypQ?si=_TzMEgTsGjQlQSah">Let&#8217;s Talk About How Impersonation Scams Work</a></strong> by <strong><a href="https://www.linkedin.com/in/natalyarice/">Natalya Rice</a></strong>, FTC</p></li></ol><p><strong>&#9654;&#65039; Videos</strong></p><ol><li><p><strong><a href="https://youtu.be/riLctiWQUOA?si=VEVfBhdZ5kdWszmk">AI impersonation scams on the rise</a></strong> by WUSA9</p></li></ol><p><strong>&#128736;&#65039; Tools</strong></p><ol><li><p><strong>Facebook:</strong> Use their &#8220;<strong><a href="https://www.facebook.com/help/171757096241231/">Report a Profile</a></strong>&#8220; or &#8220;<strong><a href="https://www.facebook.com/help/contact/295309487309948">Report an Impostor Account</a></strong>&#8220; feature.</p></li><li><p><strong>Instagram:</strong> <strong><a href="https://help.instagram.com/192435014247952/?helpref=uf_share">Report the account</a></strong> directly through the app.</p></li><li><p><strong>X (formerly Twitter):</strong> Utilize their &#8220;<strong><a href="https://help.x.com/en/safety-and-security/report-x-impersonation">Report an Impersonation</a></strong>&#8220; option.</p></li><li><p><strong>LinkedIn:</strong> Report the fake profile through their <strong><a href="https://www.linkedin.com/help/linkedin/answer/a1338436">help center</a></strong>.</p></li><li><p>Most other social media and online service providers have similar reporting tools.</p></li><li><p><strong>Identity Theft Protection Services:</strong> Companies like <strong><a href="https://lifelock.norton.com/?srsltid=AfmBOoooKUhSoA3Lxzu3728PkAJH0sq4AjQX2Gm66HDDcSzRghCguV4E">LifeLock</a></strong> or <strong><a href="https://www.identityforce.com/">IdentityForce</a></strong> offer services to monitor your identity and assist in recovery if impersonation occurs.</p></li><li><p><strong>Federal Trade Commission (FTC):</strong> For US residents, the <strong><a href="https://www.ftc.gov/">FTC</a></strong> provides resources and a place to report identity theft.</p></li><li><p><strong>Identity Theft Remediation Support:</strong> For individuals seeking guided recovery and account restoration, services such as <strong><a href="https://911cyber.app/product/personalized-identity-theft-remediation/">Identity Theft Remediation by 911Cyber</a></strong> can help coordinate response steps and assist with restoring compromised digital identities.</p></li></ol><div><hr></div><h3>&#10024; Final Thoughts</h3><div><hr></div><p>Online impersonation is a serious threat in our interconnected world, but it&#8217;s not insurmountable. By understanding the risks, staying vigilant, and implementing robust cyber hygiene practices, you can significantly reduce your vulnerability. Remember, your online identity is a valuable asset, and protecting it is an ongoing responsibility. Stay safe, stay smart, and never underestimate the power of being proactive in your digital defense.</p><div><hr></div><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bs1-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif" width="1080" height="100" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:100,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!bs1-!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 424w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 848w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1272w, https://substackcdn.com/image/fetch/$s_!bs1-!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322617c0-1a67-4dbe-a78f-d656eb8b6e45_1080x100.gif 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://911cyber.app/&quot;,&quot;text&quot;:&quot;Check Out!&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://911cyber.app/"><span>Check Out!</span></a></p><div><hr></div><h3>Subscribe and Comment.</h3><p>Copyright &#169; 2025 @ <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a> All Rights Reserved.</p><p>This article was written by <a href="https://www.linkedin.com/in/marcraphael?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAATTD4kBEaqgdqYClnm4X-535EM_nqz653E">Marc Raphael</a> with the support of:</p><p>Team <a href="https://www.linkedin.com/company/cybermaterial/">CyberMaterial</a> and Team <a href="https://www.linkedin.com/company/911cyber/">911Cyber</a></p><p>Follow 911Cyber on:</p><p><a href="https://www.linkedin.com/company/911cyber/">LinkedIn</a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://911cyber.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Marc's Substack! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>