What would you do if your phone suddenly went dead โ no calls, no texts, nothing? You might assume it’s a carrier outage, but it could be something far more dangerous: a SIM swap scam. In this week’s episode of Tech Talk with Refresh Computers, David Leavitt and Adam Littlefield break down how criminals are stealing phone numbers to drain bank accounts, why a massive dating app breach should have millions of users on alert, and how AI-powered smart home devices are changing everyday life โ for better and for worse.
Listen to the Episode
Your Phone Number Is Now a Security Liability
For years, getting a text message code to log into your bank or email felt like a safe, easy way to protect your accounts. That era is officially over. Criminals are now using a technique called a SIM swap to hijack your phone number โ and once they have it, they receive every verification code meant for you.
How a SIM Swap Works
Here’s the scary part: a criminal calls your phone carrier โ AT&T, Verizon, T-Mobile โ and pretends to be you. They might say something like, “I lost my phone. I need my number transferred to a new SIM card.” If the carrier falls for it (and they often do), your phone number now rings on the criminal’s device. Your phone goes completely dead.
How do they pull this off? They already have your personal information โ your name, address, maybe even the last four digits of your Social Security number โ gathered from previous data breaches, phishing emails, or information you’ve shared publicly on social media. That’s enough to convince a customer service rep that they’re really you.
If your phone suddenly loses all service โ no calls, no texts โ it may not be a carrier outage. It could mean your SIM has been hijacked. Act immediately.
The real-world damage is staggering. Florida is one of the top states in the country for this type of fraud, and victims have lost tens of thousands of dollars from bank and crypto accounts. The FBI’s Internet Crime Complaint Center received thousands of SIM swap complaints in 2025 alone, and the numbers are climbing in 2026.
What You Can Do Right Now
- Call your carrier and request a SIM lock or port freeze. This requires a PIN or in-person visit before any changes can be made to your number. AT&T calls it “Extra Security,” Verizon calls it “Number Lock,” and T-Mobile calls it “SIM Protection.” All are free and take about five minutes.
- Stop using SMS text codes for two-factor authentication. Microsoft announced this week that it is eliminating SMS-based verification codes entirely, pushing users toward passkeys instead.
- Switch to an authenticator app. Google Authenticator, Microsoft Authenticator, or Authy generate rolling codes that change every 30 to 60 seconds and can’t be intercepted through a SIM swap.
- Set up passkeys wherever possible. Google, Apple, and Microsoft all support passkeys now. They’re the most secure login method available today โ phishing-resistant and tied to your device, not your phone number.
Shiny Hunters Strike Again: A Major Dating App Breach
The notorious hacking group known as the Shiny Hunters has breached the Match Group โ the parent company behind Match.com, Tinder, Hinge, and OkCupid. Roughly 10 million records were exposed, and the type of data involved makes this breach especially concerning.
Dating profiles contain deeply personal information: your relationship status, preferences, photos, and private chat messages. Once that data hits the dark web, it can be used for identity theft, account takeovers, and even blackmail.
If you use or have ever used a Match Group dating app, change your password immediately and enable two-factor authentication on both the app and your associated email account.
Want to know if your email address was part of this breach โ or any other? Visit haveibeenpwned.com (H-A-V-E-I-B-E-E-N-P-W-N-E-D.com). It’s a free tool that tells you if your email appears in any known data breaches.
AI-Powered Smart Home Tech: Cool Convenience, Serious Trade-Offs
The smart home of 2026 goes far beyond tapping a phone app to turn off a light. AI is now learning your routines and adapting your home environment automatically โ sometimes before you even realize you need something.
Devices Worth Knowing About
- Roborock Saros Z70: A robot vacuum with a robotic arm that can pick up obstacles like socks or move cables out of the way instead of dragging them across the floor.
- Switchbot Lock Ultra Vision Pro: A smart lock with facial recognition and fingerprint capability that unlocks your door as you walk up โ no key or PIN required. It also logs every face that approaches your door with timestamps.
- AI-powered lighting and window blinds: Systems like Lutron’s expanded AI lighting can dim lights based on your routine, while smart blinds adjust automatically to reduce glare on your TV screen.
The Privacy Trade-Off
Here’s the catch: for AI-powered devices to learn your habits and respond intelligently, they have to be always listening and always watching. Every smart device connected to your Wi-Fi is also a potential entry point for hackers.
Set up a separate Wi-Fi network just for your smart home devices. Many modern routers now offer a dedicated IoT network option. This keeps your smart devices isolated from your main computers, phones, and personal data.
Most routers already offer a “guest” network โ think of this as a third layer. You have your main Wi-Fi for personal devices, a guest network for visitors, and now an IoT network exclusively for smart home gadgets. This simple step can dramatically reduce your risk if any single device is compromised.
Windows 11 Tip: Snap Layouts for Easy Multitasking
Here’s one of the most underused features in Windows 11: Snap Layouts. Instead of clicking the maximize button to make a window fill your entire screen, try hovering your mouse over that little square icon for just a second. A menu will pop up showing you different layout options โ split screen, quads, or even up to eight windows displayed at once.
This is incredibly handy when you need to compare two documents side by side or keep an eye on multiple things at once. You can also drag a window’s title bar to the top or sides of your screen to snap it into position. It’s a small trick that saves a surprising amount of time.
Scam Alert: AI Voice Cloning Is Getting Worse
AI voice cloning scams are escalating in 2026. Criminals are using artificial intelligence to clone the voice of a family member โ your son, daughter, or grandchild โ and then call you with an urgent, emotional plea: “Mom, I’m in trouble. I need money right now. Don’t tell anyone.”
The biggest red flag in any urgent call is “Don’t tell anyone.” If a family member calls asking for money and insists on secrecy, hang up and call them back at a number you know is theirs.
Your voice is as unique as your fingerprint โ some scientists say even more so. But AI can now replicate it convincingly using just a few seconds of audio pulled from social media videos or voicemail greetings. Always verify by calling the person directly before taking any action.
Stay Protected with Refresh Computers
Whether you need help locking down your SIM card, setting up passkeys, configuring a separate IoT network for your smart home devices, or just want someone to walk you through these security steps, the team at Refresh Computers is here to help. Call the free Tech Support Hotline at 407-478-8200, visit refreshcomputers.net, or stop by the store in Longwood at 820 East State Road 434 โ open Monday through Saturday, 9 AM to 7 PM. Don’t wait until something goes wrong. A few minutes of prevention today can save you from a major headache tomorrow.

05-23-26 When Convenience Becomes a Subscription Trap: Streaming Costs, Summer Tech Deals, and More