There’s a government warehouse that stores just about everything you could imagine — vitamins, “domestic sludge,” a standard bullet and even a jar of peanut butter that sells for about 200 times the going grocery store rate. It even maintains a cybersecurity database with all known software vulnerabilities. You’ll find all this at the National Institute of Standards and Technology. So, what is going on?
The fresh face of payday loans: Cash-advance apps

You get paid next week, but your credit card bill is due this week, and, oops, so is that new car payment. You’re only a few hundred bucks short — you just need a way to bridge the gap.
Unfortunately for you, there’s an app for that. Actually, there are dozens. They’re called cash-advance apps. And most things about them tick me off.
Their names make it sound like you’re borrowing from a friend, like “Dave,” “Albert,” or “Brigit,” or like they’re giving you a leg up, like “Empower.” But trust me, there’s nothing empowering about them.
I dug up the dirt they don’t want you to know about and how to avoid getting caught up in their scheme.
What has two thumbs and owes 376% interest?
You, if you fall for this BS. These apps are just big yellow Payday Loan signs with a fresh coat of paint. They target folks living paycheck to paycheck, and once you’re in their clutches, it’s nearly impossible to get out.
Get this: The average APR on an advance from these apps is 376% — pretty much identical to a typical payday loan’s 400% markup. And that’s if you manage to repay it in one to two weeks.
And you probably won’t. Studies show that 75% of people take out another advance the same day or day after making a repayment. And if you’re using one, there’s a good chance you’ll get hooked into others, too.
On top of ludicrous fees …
They ask you to “tip” for the service. Some apps even try to guilt you, saying they’re helping “vulnerable people” with the money. Sure, they’re not gonna break your kneecaps or repo your car, but these companies are still laughing all the way to your bank.
One home health aide in Texas pays a day-and-a-half of work per month in fees. She didn’t know about the free option to transfer money immediately instead of one to three days — these apps make it hard to find on purpose.
My (free) tips to avoid the trap
How to deal with a cyberstalker

Let me tell you, more and more victims of cyberstalking are reaching out to me for advice using my Ask Kim page. Here’s one note I received recently from P.W. in Oklahoma:
“I’ve been cyberstalked for three years. I recently discovered it was my roommate. I moved out and he launched another attack. He’s on my and my fiance’s phones, Wi-Fi, Bluetooth — everything. He has stolen financial data, pictures, erased accounts, taken over emails and harassed me through VOIP. … He admitted to sitting outside our house all night. I thought he was spying on me. Now I know he was also gaining access to my Wi-Fi. I can’t do this anymore and need expert advice/help terribly.”
Why does the government sell a $1K jar of peanut butter?
💊 Who’s in your doc’s pocket? Worried your doctor might not be giving you impartial advice because they’re getting paid by Big Pharma? Look ‘em up in this government database (U.S. only) and see which companies are giving them money. That includes celebrity doctors, too, if you’re feeling nosy!
I bet you’re in this database: A Russian hacker who stole the location data of millions of people from Gravy Analytics is bragging on a hacker forum. Forensics specialists who’ve seen the 1.4 gigabytes of leaked info say it seems like the real thing, not just boasting or threats. I’ll keep you updated.
$75 million
Record ransom, paid to ransomware gang Dark Angels. This fairly new gang goes after some of the largest companies in the world. Once they’ve hacked into a database, they send a ransom note threatening to expose the stolen data on their site, Dunghill Leak. They say they’re “making the world more secure.” I’ll tell you one thing they’re definitely making: A boatload of money.
3 tricks to see if your passwords are being sold on the Dark Web

Hackers can make a ton of money by selling your private information on underground forums. It’s possible that your passwords are being sold on the Dark Web right now. That’s why you should run a cybersecurity check now and then.
Protect your privacy: A guide to avoiding drone surveillance

I share a ton of tips to protect your privacy online. Do this quick 30-second check to keep your Google and Facebook accounts safe if you haven’t yet.
What about when you leave your home? Just about everywhere you go, you’re being watched.
Vroom-vroom! Check out this database of the 62 e-bike incentive programs available in 19 states. You can score up to $1,400 off a snazzy new bike. Pro tip: Don’t buy an e-bike that costs less than $700. Not worth the battery fire risk.
361 million
Stolen email addresses found in the Have I Been Pwned database. Type in yours to find out if you were part of any recent data breaches. If so, it’s time for a password change — and stay on high alert for scams.
💊 Who’s in your doc’s pocket? Worried your doctor might not be giving you impartial advice because they’re getting paid by Big Pharma? Look up your doc in this government database (U.S. only) and see which companies are giving them money. That includes celebrity docs, too!
Tell me more: The ProductFrom website is the perfect match if you ever wonder, “How do I know if a product is from China?” or “Where did this come from?” Their database contains 112,000 products, so there’s a good chance you’ll find what you’re looking for.
Looking for a remote job? Use these tips to find a high-quality gig

Remote jobs are a tantalizing prospect: You can work from the comfort of your own home, cutting out traffic, chatter from coworkers and other office distractions. Changing from a traditional job to a remote position can be challenging, especially if you’ve never worked from home. Finding legitimate work-from-home jobs can also be challenging since there are so many fake job scams.
3 websites that gather and sell your info - And how to delete it

You’ve got a few hundred secret admirers. These figures hide in the shadows, watching over you, writing down as much as they can, becoming as much of an expert on you as possible. Then they turn around, sell what they find, and make a killing.
Find out if your doctor takes money from drug companies

Doctors and health care providers don’t just make money from your health insurance payments. Many doctors and hospitals also get paid by pharmaceutical manufacturers and other companies. Do you know who’s paying your doctor?
60M records exposed: Fitbit, Apple, Google health info leaked in massive data breach

Whether you are a professional athlete, casual runner or enjoy tracking your fitness level, you need an app to record progress. There are many of these apps available, and some smartphones come pre-installed with them. Tap or click here for five health apps you never knew existed.
1.9 million records leaked after online photo editor hacked

There are tons of easy-to-use photo editing apps available. Whether you’re looking for a quick glow-up from the Facetune app or need an app that can help you create the perfect image, you’ve got plenty of options.
One of the best free online editors that we’ve recommended in the past is Pixlr. This free photo editor offers a ton of helpful tools. But a recent hack gave cybercriminals access to millions of users’ records, which could lead to some pretty serious issues.
Credit card info of millions of guests leaked in travel site data breach

If you’ve traveled any time since 2013, it might be time to check your bank accounts. Three of the web’s biggest travel sites have leaked personal and financial data for millions of users, including payment card details.
Time your favorite TV shows for binge watching

Forget baseball — binge watching is the new American pastime, quarantine or not. And with so much media at our disposal these days, why not curl up on the couch and watch some of our favorite TV shows back-to-back? It’s not like we have to wait days and days between episodes anymore.
Looters won't be able to use iPhones swiped from Apple Stores - here's why

Apple has long included security features for its smartphones and other gadgets, and one of the most prominent the company has to offer comes bundled with every single iOS device it makes: Activation Lock.
This feature works by using your Apple ID and password to ensure the phone can be tracked if stolen. What’s more, it can remotely erase the device if the user logs in via iCloud.com. And because this feature takes place at the firmware level, resetting the phone won’t remove the lock. This even applies to people selling their own phones! Tap or click to see why.