
Image by Stephen Phillips, from Unsplash
Over Half of Americans Targeted In Email Scams
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
If you’ve been getting more scam messages lately, you’re not imagining things, and Google now has the numbers to back it up.
In a rush? Here are the quick facts:
- 61% of U.S. users were targeted by email scams last year.
- More than half of Americans experienced a data breach.
- Most users still rely on passwords and 2FA, Google reports.
The survey conducted by Google shows that more than 60% of U.S. users have observed rising online scams throughout the previous year. Alarmingly, 61% of users have received direct attacks through email, Google researchers add that the situation is even worse via text message.
Google says more than half of users have experienced a data breach, yet “almost all users are yet to upgrade their accounts to make them safer and more secure,” as reported by Forbes .
Despite Google’s warning about their declining security, the majority of users continue to use traditional authentication methods, including passwords and two-factor authentication (2FA).
“Passwords are not only painful to maintain, but are also more prone to phishing and often leaked through data breaches,” the company warns .
The solution? Google suggests to use passkeys and social sign-ins, like “Sign in with Google.” These newer tools are easier to use and much harder to hack. “Passkeys are phishing-resistant and can log you in simply with the method you use to unlock your device (like your fingerprint or face ID) — no password required.”
But the company wants everyone on board. “We want to move beyond passwords altogether, while keeping sign-ins as easy as possible,” it says. In short, if you’re still using passwords to protect your Gmail and Google accounts, it’s time for an upgrade, not just for convenience, but for your own safety.

Image by Kahunapule Michael Johnson, from Flickr
BadBox Malware Turns Cheap Android Devices Into Cybercrime Tools
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
The FBI issued a warning that millions of low-cost Android devices could transform domestic networks into criminal platforms.
In a rush? Here are the quick facts:
- BadBox malware infects millions of cheap Android devices globally.
- Devices come preloaded with malware straight from the manufacturer.
- Malware enables fraud, fake accounts, and proxy network abuse.
The devices used for streaming, in-car entertainment, and video projection contain a malware strain named BadBox, which according to Ars Technica , has existed in multiple forms since nearly a decade ago.
The powerful Trojan called Triada serves as the base for BadBox to bypass Android’s built-in security features. The cybersecurity firm Kaspersky first discovered Triada as one of the most sophisticated mobile Trojans in 2016.
Ars Technica notes that Google implemented a software update to block the malware, but it returned in 2019 as manufacturers pre-installed it on devices prior to consumer sale. Google confirmed the supply chain attack, and explained the measures they took to stop additional infections.
Security company Human Security discovered in 2023 that thousands of Android devices received pre-installed Triada-based backdoor software. Ars Technica explains that the backdoor allowed cybercriminals to execute fraudulent operations and hide illegal activities through home networks, while simultaneously generating artificial Gmail and WhatsApp accounts.
Ars Technica reports that Google, together with other tech organizations, launched a joint operation to stop the BadBox 2.0 campaign. It was reported that this campaign infected more than one million Android devices during the first half of this year.
The devices didn’t have Google Play Protect certification, and ran on Android’s open-source version, instead of Android TV. Human Security researchers identified more than twelve TV models that suffered from this issue, as reported by Ars Technica.
Despite these efforts, the FBI says the threat continues. “The public is urged to evaluate IoT devices in their home for any indications of compromise and consider disconnecting suspicious devices from their networks,” the agency said.
The FBI advises users to look for suspicious behavior such as automatic connections to untrustworthy app stores, and alerts to disable Play Protect. The safest move? Users should stay away from extremely inexpensive Android devices, especially when they come from unknown manufacturers.