


Welcome to the official Fox News Facebook page. Get breaking news, must see videos & exclusive interviews from the #1 name in news.
1 people like this
373 Posts
2 Photos
0 Videos
0
Reviews
Share
Share this page
Recent Updates
-
America's smallest EV truck prototype has arrivedwww.foxnews.comRecommended Published March 24, 2025 6:00am EDT close 'CyberGuy': Americas smallest electric truck ever hits the streets Tech expert Kurt Knutsson discusses how this super-small electric mini-truck takes a big step toward production. California-based EV startup Telo Trucks has unveiled the preproduction prototype of its MT1 electric mini-truck, signaling a significant step toward production. At an event in Los Angeles, attendees got an up-close look at the MT1, which combines the utility of a full-size truck with the compact footprint of a Mini Cooper SE. This innovative design challenges the oversized vehicle trend dominating the U.S. market by offering a practical and efficient alternative for urban and outdoor enthusiasts alike.Stay protected & informed! Get security alerts & expert tech tips sign up for Kurts The CyberGuy Report now. MT1 electric mini-truck (Telo) (Kurt "CyberGuy" Knutsson)Compact size meets full-size capabilityTheMT1 is designed to pack Toyota Tacoma-like functionality into a vehicle just 152 inches long, roughly the size of a Mini Cooper SE. Despite its small stature, it boasts impressive interior space for five adults and a 60-inch truck bed. The truck's folding midgate allows it to carry items as large as an 8-foot surfboard or 4-by-8 plywood sheets, making it ideal for both city errands and weekend adventures. MT1 electric mini-truck (Telo) (Kurt "CyberGuy" Knutsson)Performance and rangeTelo offers two configurations for the MT1.Base model: A single-motor, rear-wheel-drive system with 300 horsepower and an estimated range of 260 miles.Upgraded model: A dual-motor, all-wheel-drive system delivering 500 horsepower, extending the range to 350 miles. This version accelerates from 0 to 60 mph in around four seconds.Both models feature fast-charging capabilities, allowing for a 20%-80% recharge in just 20 minutes. Optional solar panels on the cab roof, tonneau cover or camper shell can add up to 15 miles of range per day, further enhancing its efficiency. MT1 electric mini-truck (Telo) (Kurt "CyberGuy" Knutsson)Innovative featuresThe MT1 incorporates several standout features.Flexible configurations: Its midgate design extends the truck bed into the cab, accommodating larger items or enabling seating for up to eight passengers.Sustainable materials: The interior uses biodegradable cork and other eco-friendly materials for a clean, minimalist aesthetic.Advanced safety: Cutting-edge sensors and structural technology aim to make the MT1 one of the safest vehicles in its class. MT1 electric mini-truck (Telo) (Kurt "CyberGuy" Knutsson)Cost and future plansThe MT1 will start at $41,520 for the base model, with upgrades available for additional power and range. While full-scale production is still a couple of years away, Telo is actively testing its prototypes for safety and durability ahead of homologation inspections next winter. The prototypes will be hand-built by leading California-based manufacturerAria Group, which is a major player in the early stage development of concept vehicles and rapid prototyping for the most notable automotive companies globally. Telo has already secured more than 5,000 preorders, translating to more than $250 million in customer commitments, a remarkable achievement for a startup challenging conventional truck design. MT1 electric mini-truck (Telo) (Kurt "CyberGuy" Knutsson)Kurts key takeawaysThe Telo MT1 is no doubt an intriguing concept that definitely challenges the oversized truck norm with its compact size and impressive capabilities. With preproduction prototypes now unveiled and testing underway, Telo seems to be making some real progress. However, it remains to be seen if Telo can deliver on its promises, especially in terms of production and affordability. While the MT1 has the potential to carve out a niche in the EV market, it seems like there are a lot of hurdles that undoubtedly lie ahead before we see this on the streets in the future.Would you ever consider downsizing to an MT1 mini-truck? Why or why not? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Alert:Malware steals bank cards and passwords from millions of devices.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·8 Views
-
Protecting your daughter from deepfakes and online abusewww.foxnews.comPublished March 23, 2025 10:00am EDT close Deepfakes and digital doubles without consent turn AI into a bombshell issue Fox News senior correspondent Claudia Cowan analyzes the impact of artificial intelligence on the entertainment industry on 'Fox News Sunday.' Most of us have at least one young woman in our lives that we cherish a daughter, niece or goddaughter, for example. Well, this International Womens Day, I learned something that should be concerning to us all. Fully96% of all deepfakes artificial intelligence-generated images and videos that use someones likeness are pornographic and target women without their consent.One well-known case involved an Australian law student who discovered that manipulated pornographic images of her were being shared online when she was just 18. But this isnt an isolated incident. According to arecent survey of women in the U.S., AI deepfakes are among the types of online abuse that a significant number of women face despite being a relatively new technology.But this isnt the only type of online abuse women face.According to the same survey, one in four women in the U.S. say theyve experienced online abuse, including cyberbullying, doxxing, sexual harassment, trolling and AI deepfakes. And young women between the ages of 18 and 34 appear to experience much higher rates of online abuse than older generations.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW A woman with her daughter working on a laptop (Kurt "CyberGuy" Knutsson)Why are younger women at higher risk?It probably has a lot to do with how much time younger people spend online.Research shows, to no ones surprise, that younger generations use social media twice as much as older generations (80% versus 42%, respectively). However, it also indicates that women use it more than men.Data privacy also plays a role. A recent study showed younger generations are generally less concerned about keeping their personal information private compared to older generations. Growing up in a digital-first world, many younger people appear to be desensitized to data collection and are more willing to share personal information online. That, in turn, puts them at higher risk of cybercrimes and abuse.So, what can you do to help?If you are concerned about this, and you should be, there are several steps you can take to protect your female loved ones from online abuse and empower them to navigate the digital world safely. A woman working on her laptop (Kurt "CyberGuy" Knutsson)1. Talk to them about online privacyWe live in a world where people constantly share thoughts, pictures and videos. Telling a 22-year-old to stop posting online altogether probably wont get you far, but encouraging them to limit who can see their information is a reasonable compromise. Here are some things you can discuss:Setting social media profiles to "private" so photos, videos and personal details arent easily accessible to strangers.Beingselective about who they accept as friends and followers.How social media platforms are designed to beaddictive. The constant validation from likes and comments especially from strangers can make young women more vulnerable to online predators and cyberbullies. ("The Social Dilemma" documentary provides an in-depth look at how platforms exploit these behaviors.)2. Remove personal information from the internet (especially people search sites)In the survey exploring the experiences of women in the U.S. with online abuse,65% of respondents said theyve been negatively affected by having their personal information online. Why? Because online bullies, stalkers and scammers use publicly available information to target victims. But women can reduce the risk of online abuse by removing personal data from the internet:Searchingtheir name on Google and identifying which sites have their personal data.Optingout of people search websites, which often list names, addresses, phone numbers and even relatives.Using apersonal data removal serviceto automate the process and keep their information off these databases in the long term.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.3. Make sure they have support and resourcesEven with the best precautions, online abuse can still happen. If you have four young female relatives or friends aged 7-21, statistically, it's likely that three of them have faced some form of online harm in the past year. One of the most powerful things you can do is let them know they have someone to turn to. Online abuse, particularly deepfake pornography and revenge porn, is often designed to humiliate, isolate and silence victims. Knowing they have support can help them regain control and fight back. If someone you love is dealing with online abuse, here are some critical resources:Crisis Text Line: By texting HOME to 741741, individuals can connect with trained crisis counselors who offer immediate emotional support and guidance during moments of crisis, helping them manage overwhelming emotions and find calm.National Suicide Prevention Lifeline: Calling or texting 988 connects individuals with trained crisis counselors who provide immediate support for suicidal thoughts, mental health crises or other forms of emotional distress, offering a lifeline to those in urgent need.GET FOX BUSINESS ON THE GO BY CLICKING HERE Women working on their laptops (Kurt "CyberGuy" Knutsson)WHAT IS ARTIFICIAL INTELLIGENCE (AI)?4. Teach digital literacy and critical thinkingEncourage young women in your life to question what they see online and develop a healthy skepticism. Teach them how to spot misinformation, recognize potentialscams and understand the importance of fact-checking.5. Discuss the importance of strong, unique passwordsExplain the risks of using weak or repeated passwords across multiple accounts. Encourage the use ofpassword managers andtwo-factor authentication for added security. Get more details about mybest expert-reviewed Password Managers of 2025 here.6. Promote a healthy balance between online and offline activitiesEncourage them to engage in offline hobbies and social activities. This can help reduce screen time and lessen the impact of potential online negativity.7. Stay informed about current online trends and threatsKeep yourself updated on the latest social media platforms, apps and online trends popular among young people. This knowledge will help you have more informed conversations with your granddaughters about online safety. One great way to do this is to subscribe tosign up for Kurts The CyberGuy Report now.8. Encourage open communication about online experiencesCreate a judgment-free environment where they feel comfortable discussing their online experiences, both positive and negative. This open dialogue can help you identify potential issues early on.9. Have them consider a strong antivirus softwareWith all the clicking young women do online, it's crucial to protect their devices from malware, viruses and other cyber threats. Strong antivirus software acts as a digital shield, safeguarding against potential infections that could compromise personal data or device security.The best way to safeguard against malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurt's key takeawaysOnline abuse is a serious issue that disproportionately affects young women. By taking proactive steps to educate, protect and empower the women in our lives, we can create a safer digital environment for them. Let's work together to foster a culture of online safety, ensuring that young women can thrive online without fear of harassment and abuse. Remember, a safer internet for women means a safer internet for everyone.What are your biggest fears or concerns about the digital world as it relates to the safety and well-being of the young women in your life? Let us know by writing us atCyberguy.com/ContactCLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverAlert:Malware steals bank cards and passwords from millions of devicesFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·11 Views
-
Chinese robot's kung fu moves will make your jaw dropwww.foxnews.comPublished March 23, 2025 6:00am EDT close Chinese robot's kung fu moves will make your jaw drop A humanoid robot has transformed from animble dancer to a martial arts master. In a stunning display of technological advancement, China's Unitree Robotics has unveiled its latest feat, a humanoid robot that can perform kung fu moves with astonishing precision and balance.The G1, Unitree's compact humanoid robot has transformed from animble dancer to a martial arts master, showcasing the rapid progress in robotics and artificial intelligence. G1 humanoid robot (Unitree Robotics)From virtual training to real-world masteryUnitree's approach to developing the G1's skills is as fascinating as the robot itself.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOWThe process begins in a virtual environment using Nvidia's Isaac Simulator, whereby the robot learns complex behaviors before it even exists in physical form. This innovative method involves creating a digital twin of the humanoid robot that observes and learns from human actions using motion capture and video data.The behaviors are then refined through reinforcement learning in the virtual world. Subsequently, these acquired skills are transferred to the physical robot using a technique called Sim2Real, which seamlessly bridges the gap between simulated actions and real-world applications. G1 humanoid robot (Unitree Robotics)Kung fu mastery on displayIn its latest video demonstration, the G1 humanoid robot performs an array of impressive kung fu movements with remarkable balance and agility. The robot executes punches, roundhouse kicks and other complex martial arts techniques, showcasing its enhanced coordination and flexibility. With 23 degrees of freedom, the G1 demonstrates a level of dexterity that would make even Bruce Lee raise an eyebrow.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? G1 humanoid robot (Unitree Robotics)Beyond martial arts: A versatile helperWhile the kung fu demonstration is undoubtedly eye-catching, Unitree envisions a broader role for its humanoid robots. The company positions the G1 as a versatile machine capable of handling challenging, repetitive tasks across various settings, including homes, factories and hospitals. This aligns with Unitree's vision of humanoid robots serving as useful companions in both work and daily life. G1 humanoid robot (Unitree Robotics)Open-source innovationTo further advance the natural movement of its humanoid robots, Unitree has released an open-source full-body dataset. This dataset, compatible with the G1, H1 and H1-2 models, enables the robots to perform human-like motions with improved flexibility and coordination. The dataset incorporates a redirection algorithm that optimizes the robots' movements, taking into account factors such as end posture constraints, joint positions and velocity limitations.GET FOX BUSINESS ON THE GO BY CLICKING HERE G1 humanoid robot (Unitree Robotics)The future of humanoid roboticsAs we witness the G1's transformation from adancing robot to a kung fu master, it's clear that the field of humanoid robotics is advancing at an unprecedented pace. The combination of sophisticated hardware, advanced AI algorithms and innovative training techniques like Sim2Real is pushing the boundaries of what these machines can achieve.While the demonstration of martial arts skills is impressive, it also raises questions about the future applications and implications of such advanced robotics. As these machines become increasingly capable of mimicking human movements and behaviors, we must consider both the potential benefits and the ethical considerations that come with this technology.Whether these machines will ultimately become our helpful companions or raise concerns about the future of human-robot interactions remains to be seen. One thing is certain: the field of humanoid robotics is evolving rapidly, and we're only beginning to scratch the surface of what's possible. G1 humanoid robot (Unitree Robotics)Kurt's key takeawaysIt's hard not to be amazed by Unitree's G1 humanoid robot, which has transformed from a nimble dancer to a kung fu master in a remarkably short time. This isn't just about cool martial arts moves. It's a glimpse into a future where robots could become our everyday helpers. But as we celebrate these advancements, we also need to think about what they mean for our relationship with technology.CLICK HERE TO GET THE FOX NEWS APPAs robots like Unitree's G1 become increasingly capable of mimicking human movements and behaviors, do you think we should be excited about the potential benefits or concerned about the potential risks of creating machines that can perform complex tasks, including martial arts? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverAlert:Malware steals bank cards and passwords from millions of devicesFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·16 Views
-
Fox News AI Newsletter: Nvidia joins Trump onshoring pushwww.foxnews.comRecommended By Fox News Staff Fox News Published March 22, 2025 8:30am EDT Jensen Huang, co-founder and CEO of Nvidia Corp., gives a talk in Taipei, Taiwan. (Annabelle Chih/Bloomberg via Getty Images) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY'S NEWSLETTER:-- AI chipmaker Nvidia to invest billions in US amid Trump onshoring push: CEO-- The 10 telltale signs of AI-created images-- Adobe reveals how AI can be used to make projects easier-- Meta unveils new AR glasses with heart rate monitoring-- Trump urged by Ben Stiller, Paul McCartney and hundreds of stars to protect AI copyright rules Nvidia CEO Jensen Huang delivers a keynote address during the Nvidia GTC Artificial Intelligence Conference at SAP Center, March 18, 2024, in San Jose, California. (Justin Sullivan/Getty Images / Getty Images)STACKING CHIPS: Nvidia CEO Jensen Huang said Wednesday that the leading artificial intelligence chipmaker will invest hundreds of billions of dollars in the U.S. supply chain over the next four years.SPOT THE AI LIE: Its becoming more common for images to be made with AI tools. As the artificial intelligence generation gets more advanced, its getting trickier to tell the difference between AI-made and human-made images. However, there are still signs to look out for.CREATIVITY BOOST: Adobe president of digital experience business Anil Chakravarthy unpacked Adobe's dive into the world of artificial intelligence on "The Claman Countdown."CREEPY SPY GLASSES: Get ready for some amazing tech that's about to change the way we see the world, literally. Meta has just unveiled its latest creation, the Aria Gen 2 augmented reality (AR) glasses. Aria Gen 2 augmented reality glasses (Meta)DEAR MR. PRESIDENT: Ben Stiller, Paul McCartney and Ron Howard were among the over 400 entertainment figures and industry workers who signed an open letter this week urging President Donald Trump to protect artificial intelligence copyright rules. Side-by-side photos of Donald Trump, Ben Stiller and Paul McCartney. (CHIP SOMODEVILLA/Monica Schipper/Jim Dyson)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.0 Comments ·0 Shares ·25 Views
-
Protect your files and memories with simple spring cleaning tipswww.foxnews.comTech Protect your files and memories with simple spring cleaning tips Simple steps to amp up your digital security and protect your precious documents, photos and memories Published March 22, 2025 10:00am EDT close BREAKING: Elon Musk reveals X under massive cyberattack Elon Musk announces his platform X is experiencing a major coordinated cyberattack. It happens without warning.Suddenly, access to your personal data gets interrupted by a simple hardware failure, a nasty virus, a cyberattack, a software glitch, accidental deletion or a human mistake. It's clearer than ever that our personal data is vulnerable.As an advocate for privacy and security and the editor behind the popular CyberGuy Report, which you can subscribe to for free atCyberGuy.com/newsletter, I have always emphasized the importance of personal responsibility when it comes to data security.My top recommendation for protecting your precious memories, critical documents and the mountains of personal data we accumulate is straightforward: utilize a personal drive for backups.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW A woman working on her laptop. (Kurt "CyberGuy" Knutsson)Choosing the right backup toolsSpring is traditionally a time for cleaning, and this should extend to digital hygiene as well. Each year, I undertake a thorough cleaning of my personal data, making sure to back up documents, family photos and other irreplaceable items. There's nothing quite like the peace of mind that comes from having a physical backup, which places control firmly in your hands, irrespective of whether you use a Mac, PC or even a Chromebook. A man working on his laptop. (Kurt "CyberGuy" Knutsson)Recommended backup solutionsOne of my favorite tools for this task is aWD portable drive, which offers 2 terabytes of storage. It easily connects to your device via SuperSpeed USB 3.0, ensuring quick and efficient data transfer, and is fully compatible with Chromebook. A reliable drive like this is a must-have; I use another similar WD model for my MacBook and PC. Image of a portable drive. (Kurt "CyberGuy" Knutsson)Backup, unplug then store your portable drive in a secure placeIn addition to regular ongoing backups either on the cloud or another drive, I use this WD drive that plugs into your Mac, PC or Chromebook as an extra copy of my important data that can be disconnected and kept in a safe place away from hackers and other threats. A man working on his laptop. (Kurt "CyberGuy" Knutsson)What to backup: A digital checklistWhen deciding what to back up from your computer, it's crucial to prioritize documents, files, and memories that are important and irreplaceable. Here's a comprehensive list to consider:1. Personal documents: Include items like birth certificates, passports, social security cards, marriage certificates, wills and other legal documents that could be difficult or time-consuming to replace.2. Financial records: This category should cover bank statements, tax returns, investment records and other financial documents that are essential for personal record-keeping and legal compliance.3. Photos and videos: Family photos, vacation videos, special events like weddings or graduations and other personal memories that cannot be recreated.4. Work and educational documents: If you use your computer for work or school, ensure you back up important projects, research papers, presentations and related correspondence.5. Emails: Some emails might contain important information, agreements or attachments that you may need to refer back to. Consider backing up important emails or archiving them.6. Contacts: A backup of your digital address book can save you a lot of trouble in case you lose access to your devices.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?7. Music and media collections: For those who collect music, movies and books digitally, backing up these files ensures you dont lose your collection.8. Software and app data: Back up settings and data for apps that you use frequently, especially if they help manage your schedule, finances or health.9. Website bookmarks: If you rely on bookmarks to navigate the internet efficiently, backing them up can save time if you need to restore or switch to a new device.10. Game saves and profiles: If you're a gamer, backing up your game saves and profiles can prevent loss of progress in case of system failure.11. Creative works: Include writings, artwork, design files, coding projects or any other personal or professional creative work. A woman looking at her phone while working on her laptop. (Kurt "CyberGuy" Knutsson)Some additional steps to consider to keep your data safeAdopt the 3-2-1 backup strategy: Ensure you maintain three copies of your data: the original, a backup on a different device and a third copy stored offsite or in the cloud. This approach offers robust protection against data loss.Implement two-factor authentication (2FA): Enhance account security by enabling2FA, requiring additional verification steps beyond just passwords, thereby reducing unauthorized access risks.Regularly update and patch systems: Keep your operating systems and softwareup to date to address vulnerabilities that cyber threats might exploit.Use strong antivirus software: Install a trusted antivirus software solution to guard against ransomware, viruses, and malicious attacks that can compromise your files.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices.GET FOX BUSINESS ON THE GO BY CLICKING HEREUpdate your passwords for better security: One of the most important steps in protecting your data is regularly updating your passwords to prevent unauthorized access. Heres how to do it effectively:Use a password manager Instead of relying on memory, use a trustedpassword manager like to generate and store complex passwords.Enable two-factor authentication (2FA) Add an extra layer of protection by requiring a secondary verification method, such as a one-time code via SMS or an authenticator app.Create unique passwords Avoid reusing passwords across multiple accounts. Each password should be at least 12 characters long and include a mix of uppercase, lowercase, numbers, and symbols.Check for compromised passwords Use services with password breach detection. Some servicesinclude a data breach scanner that checks if your stored passwords have been leaked and suggests updates.Change default router and device passwords If youre still using the default login credentials for your Wi-Fi router, smart home devices or online accounts, update them immediately to prevent security risks.Get more details about my best expert-reviewed password managers of 2025 here.By updating passwords along with other spring-cleaning security measures, you significantly reduce the risk of cyber threats and unauthorized access to your sensitive data.Kurts key takeawaysTaking a few minutes to protect your data and devices today can save you hours of frustration, heartache and financial loss tomorrow. Regular backups and trusted antivirus software work hand in hand to shield your digital life. Unplug your backup drive when finished and store it in a safe place its a small step that makes a big difference.Whats your data disaster story, and what lessons did you learn about digital backups from it? Let us know by writing us atCyberguy.com/ContactCLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Alert:Malware steals bank cards and passwords from millions of devices.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·24 Views
-
Radical new tech brings flying cars closer to realitywww.foxnews.comTech Radical new tech brings flying cars closer to reality The big breakthroughs that are making flying cars a near certainty Published March 22, 2025 6:00am EDT close Radical new tech brings flying cars closer to reality A aviation company is turning heads with an electric vertical take-off and landing vehicle. Remember those futuristic dreams of flying cars we saw in "The Jetsons"?Well, they might be closer than you think.CycloTech, an Austrian aviation company, is turning heads with its BlackBird demonstrator, an electric vertical take-off and landing vehicle (eVTOL) designed to showcase a game-changing propulsion system.Could this be the technology that finally makes flying cars a practical reality?STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW BlackBird demonstrator. (CycloTech)What makes BlackBird special?CycloTech isn't just building another eVTOL. It's hinging its vision on unique CycloRotor technology. What's so special about it? Well, theBlackBird demonstrator is designed to test the seventh generation of CycloTech's 360-degree thrust vectoring propulsion system.CycloTech claims that its CycloRotor technology is the only propulsion system that can fully control the thrust vector in strength and direction throughout a complete 360-degree path. This allows the Blackbird demonstrator to have unmatched maneuverability; imagine a vehicle that can take off and land vertically, move sideways, brake mid-air and even parallel park. With six CycloRotors, the BlackBird is designed to do just that.Also, the BlackBird's design aims to decouple the flight path from the aircraft's orientation, promising a smooth and comfortable ride even in less-than-ideal conditions without needing to bank or tilt. When it comes to safety, the Blackbird has it covered with its six CycloRotors, providing redundancy in the event of an engine failure, allowing the aircraft to continue to fly in a controlled manner. CycloTech CEO Hans-Georg Kinsky notes,"With our BlackBird, we are showing how this innovative technology will open up the market for flying cars." BlackBird demonstrator. (CycloTech)BlackBird demonstrator specs and featuresThe BlackBird demonstrator, which completed development at the end of 2024, boasts impressive specificationsand is currently undergoing flight testing:Size: Approximately three-quarters the size of a potential flying car (approximately 16 feet long, 7.5 feet wide, and 6.5 feet tall.Weight: Maximum take-off weight of 750 lbsSpeed: Up to 75 mphPropulsion: Six electric-driven 7th generation CycloRotors Interior ofBlackBird demonstrator. (CycloTech)Safety and redundancySafety is paramount in aviation, and CycloTech addresses this with a multi-rotor design. "Thats why we at CycloTech use at least six CycloRotors to ensure that the aircraft can continue to fly in a controlled manner in the event of an engine failure," explains Kinsky. The 360 thrust vector control also allows the aircraft to brake and stop mid-air, enhancing control and safety, particularly in congested airspace. The two CycloRotors along the vehicle's length enable sideways flight without banking, further increasing maneuverability.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? BlackBird demonstrator. (CycloTech)Advantages of CycloRotor technologyCycloRotors enable the construction of compact aircraft, potentially half the size of those using propellers or rotors. This compact design means they can be more easily integrated into existing environments without requiring special infrastructure. The BlackBird demonstrator showcases the capabilities of the 7th generation CycloRotor, offering precise control, vertical take-off and landing, and maximum stability at various pitch angles (up to 30 degrees while hovering). This makes it suitable for a wide range of applications.GET FOX BUSINESS ON THE GO BY CLICKING HERE BlackBird demonstrator. (CycloTech)First flight on the horizonThe first flight of the BlackBird is planned for the first quarter of 2025. This flight will build upon the knowledge gained from over 800 successful flights of CycloTechs first-generation flight demonstrator. BlackBird demonstrator. (CycloTech)Kurts key takeawaysCycloTech's BlackBird demonstrator offers a glimpse into a potential future where flying cars are more than just a future concept. With its unique CycloRotor technology, its emphasis on safety and maneuverability, and with test flights on the horizon, the BlackBird is definitely one to watch. The prospect of electric air vehicles to cut down on pollution is appealing, and the Cyclotech system could be the key that unlocks Urban air mobility. Will CycloTech be the company that finally brings flying cars to the masses? Only time will tell, but they're certainly making a compelling case.CLICK HERE TO GET THE FOX NEWS APPGiven CycloTech's emphasis on safety features like its multi-rotor redundancy and advanced maneuverability, how much trust would you place in the technology to feel comfortable flying in the BlackBird or a similar vehicle when it's ready for passenger use? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Alert:Malware steals bank cards and passwords from millions of devices.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·32 Views
-
The 10 telltale signs of AI-created imageswww.foxnews.comPublished March 21, 2025 10:00am EDT close 'Decoding Broken Hearts': Artificial intelligence used to advance heart health research Fox News anchor Bret Baier has the latest on the Murdoch Children's Research Institute's partnership with the Gladstone Institutes for the "Decoding Broken Hearts" initiative on "Special Report." Its becoming more common for images to be made with AI tools.As the artificial intelligence generation gets more advanced, its getting trickier to tell the difference between AI-made and human-made images. However, there are still signs to look out for.Here are some key indicators that an image was created by AI.GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX.SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Example of an AI-created image (Kurt "CyberGuy" Knutsson)1. Detail problemsWhen it comes to photos of people, AI still has trouble mastering fine details like faces, textures and hands. Keep an eye out for inconsistencies such as extra fingers, strange skin tones or too many teeth.2. Glossy or fake-looking texturesAI cant always get textures right, so images may look too smooth or shiny. This shows up a lot in things like skin (which might look unnaturally poreless) or in nature scenes where trees or grass look kind of plasticky. If everything looks just a little too perfect, its probably AI.3. Lighting and shadow issuesOne of the easiest ways to spot AI is by looking at how lighting and shadows work. You might see shadows in odd places, or the lighting could look flat or inconsistent.4. Background irregularitiesAI struggles with depth and perspective, so check the background for anything that seems off. For instance, you might see blurry objects or a distorted skyline. Sometimes, the background wont even correctly match the image subject.5. Messed-up wordsIf there are words in the image, they might look jumbled, misspelled or nonsensical. This is because AI has a tough time making legible text, especially in more complex images.6. Hidden biasesAI learns from existing data, which can have a lot of built-in biases. As a result, AI images can showcase forms of discrimination. For example, most AI images of prestigious jobs will automatically feature White males.GET FOX BUSINESS ON THE GO BY CLICKING HERE Example of an AI-created image (Kurt "CyberGuy" Knutsson)7. Unrealistic elementsSometimes, AI images will incorporate things that simply dont make sense. This might include animals in bizarre colors, impossible gadgets and other truly unbelievable settings. If youre questioning whether something is real, theres a good chance it isnt.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Example of an AI-created image (Kurt "CyberGuy" Knutsson)8. WatermarksSome generative AI tools automatically add a watermark to the image. This will either be included in the lower corner of an image or be embedded in the background.9. Missing metadataWhile you might not be able to see it right away, AI images usually lack metadata. This is the information thats attached to an image file, such as photo resolution or copyright details.To view image metadata in Windows:Right-click theimage file and selectPropertiesClick theDetails tab in the windowTo find it on a Mac:Right-click the image fileSelectGet InfoOn real photos, metadata will be displayed. This information is missing when a photo is generated by AI.10. Reverse image searchFor the more deceptive photos, try doing areverse image search to track down where one came from. If its all over social media but not on trusted sites, be wary.Think you can spot the fake? Put your skills to the test with my "Find the Fake" games here.Kurts key takeawaysAI-generated images are becoming increasingly popular. While the technology may be useful in certain situations, it can also bring up big concerns around trust and security. Thats why its crucial to know how to spot AI images to help stop misinformation and protect brand credibility.CLICK HERE TO GET THE FOX NEWS APPWhat other types of AI content would you like help identifying? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Alert:Malware steals bank cards and passwords from millions of devices.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·46 Views
-
How to protect your data from IRS scammers this tax seasonwww.foxnews.comPublished March 20, 2025 10:00am EDT | Updated March 20, 2025 3:44pm EDT close Americans to see taxes go up if Trump tax cuts arent extended: GOPAC chair "America Reports" panelists Meghan Hays and David Avella discuss Democrats' ongoing criticism of DOGE cuts. Scammers try to impersonate everything and everyone. They email you pretending to be your boss and ask for money, call you claiming your Microsoft account has been hacked or send phishing links for fake package deliveries.However, the most common type of impersonation scam occurs when bad actors pose as government agencies, especially the IRS.The Treasury Inspector General for Tax Administration (TIGTA) is aware of this and has issued a new warning for 2025 about text messages impersonating the Internal Revenue Service. I will discuss everything you need to know to avoid this new tax scam and protect your personal information.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW A person working on their taxes (Kurt "CyberGuy" Knutsson)The new IRS scam alertTo understand the new IRS scam, lets first examine what its based on. The IRS has been sending out COVID-19 stimulus payments worth up to $1,400 to around 1 million tax filers who missed them. Initially, these payments were self-claimed, but now the IRS is automatically issuing them to ensure eligible taxpayers get what theyre owed.This provision, known as theRecovery Rebate Credit, allows people to claim missed stimulus payments from 2021. If you were eligible but didnt receive the funds, you can still claim them by filing a tax return by April 15, 2025. Payments will be deposited directly using the banking information listed on the taxpayer's 2023 return or sent as a paper check.However, TIGTA is warning that scammers are targeting taxpayers with fraudulent text messages, as reported byTaxAct. These fake texts claim that recipients will receive an Economic Impact Payment from the IRS and often ask for sensitive personal information, like bank account details or your Social Security number. Scammers use this information to steal your identity or financial data.The IRS has made it clear that eligible taxpayers who didnt claim the Recovery Rebate Credit on their 2021 tax return will receive their payments automatically; no action is required. A woman working on her taxes (Kurt "CyberGuy" Knutsson)Spotting phishing scams is more important than everMost phones and PCs today have enough protections to keep bad actors at bay, so in almost every case, the only way anyone can access your device and data is if you give it to them. Hackers often sendphishing links thatimpersonate a government agency, someone you know or a trusted brand, tricking you into clicking. Once you do, malware is installed on your device to quietly collect useful data and send it to the hackers. Thats why the most important part of staying safe online is knowing how to distinguish between legitimate and scam messages emails or calls. For example, you can easily tell if a communication is from the IRS or a scam by focusing on the following key factors.Type of communication: The IRS will never contact you via text for things like economic impact payments or financial information requests; they will send a letter or notice through mail or fax.Suspicious links: Government websites always end in ".gov," while scam texts may contain links ending in ".com" or ".net."Demands or threats: Be cautious of messages that create urgency or threats and look for any oddities or misspellings in the link as well.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Illustration of items used to prepare taxes (Kurt "CyberGuy" Knutsson)10 ways to stay safe from scammers impersonating government agencies1. Install strong antivirus software: As scammers increasingly impersonate government agencies like the IRS through phishing links and fake messages, installing strong antivirus software is crucial to protect yourself from these threats. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Antivirus software can detect and block suspicious links, warn you about potentially harmful websites and prevent malware from being installed on your device.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Always verify the authenticity of unsolicited communications:If you receive an unexpected email, text or phone call claiming to be from a government agency, it's essential to confirm its authenticity. Scammers often create a sense of urgency to trick you into taking immediate action. To verify, always use official contact details from government websites. Avoid clicking any links in the message and reach out to the agency directly to confirm whether the communication is legitimate.3. Reach out directly if you're unsure:When youre unsure about the legitimacy of a message or request, contact the government agency directly using verified contact details. Never respond to the message or click on any links within it. By calling or visiting the agencys official website, you can ensure youre communicating with authorized representatives and avoid scammers impersonating government officials.4. Use strong, unique passwords to protect your accounts:One of the best ways to protect your sensitive information from scammers is by using strong, unique passwords for each of your accounts. Avoid using easily guessable passwords like "password123" or "qwerty." Instead, create complex passwords that include a mix of uppercase and lowercase letters, numbers and special characters.Also, consider using a password manager to keep track of your credentials and ensure youre using different passwords for each account. Get more details about mybest expert-reviewed password managers of 2025 here.GET FOX BUSINESS ON THE GO BY CLICKING HERE5. Monitor your tax account: Regularly check your IRS account atwww.irs.gov to confirm the status of your tax return, verify that no unauthorized tax filings have occurred and update personal and contact information as needed.6. Report suspicious tax-related activities immediately: If you suspect a scam or fraudulent activity, its crucial to report it to the relevant authorities right away. Whether youve received a suspicious message or believe your information has been compromised, reporting it helps prevent further harm. The IRS and other agencies have dedicated channels for reporting fraud, so take action as soon as you can to protect yourself and others from these schemes.7. Invest in personal data removal services: Use a personal data removal service to remove your personal information from data broker and people-finder sites, which scammers often use to find phone numbers and email addresses. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.8. Use direct deposit for refunds: This is the safest way to receive your tax refund, reducing the risk of mail theft, forgery or fraudulent check cashing.9. Be wary of spoofed websites: Type the address of your actual tax prep site rather than clicking on a link from an email or advertisement. Investigate the domain before entering any confidential information.10. Use an identity theft protection service:An identity theft protection service provides personal and financial monitoring and will try to help you if your identity is ever compromised. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft.Kurts key takeawayTax season is here, and with it comes an increase in scams impersonating the IRS and targeting taxpayers. The good news is these scams are often easy to spot. If you receive a text message from the IRS asking you to provide personal information, its a red flag; its not from them. Be especially cautious of any links included in the message. A legitimate URL will always end in ".gov." However, scammers may try to trick you by altering the link slightly, so look closely for any misspellings or strange characters. If in doubt, always verify through official channels.CLICK HERE TO GET THE FOX NEWS APPDo you think AI is making it easier for scammers to impersonate legitimate organizations like the IRS? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Alert:Malware steals bank cards and passwords from millions of devices.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·28 Views
-
Meta unveils new AR glasses with heart rate monitoringwww.foxnews.comTech Meta unveils new AR glasses with heart rate monitoring How cutting-edge augmented reality technology is shaping future of wearables Published March 20, 2025 6:00am EDT close Meta unveils AR glasses with heart rate monitoring, enhanced voice recognition The glasses' sensor technology opens up new possibilities for research and development in augmented reality applications. Get ready for some amazing tech that's about to change the way we see the world, literally. Meta has just unveiled its latest creation, the Aria Gen 2 augmented reality (AR) glasses.But don't rush out to get them just yet.These aren't your run-of-the-mill smart specs. Aria Gen 2 is currently in research mode but is designed to push the boundaries of what's possible with AR and AI.GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX.SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Aria Gen 2 augmented reality glasses (Meta)Key features and improvementsAria Gen 2 features an impressive array of upgrades from its predecessor. The glasses feature an advanced sensor suite that includes an RGB camera, 6DOF SLAM cameras, eye-tracking cameras and spatial microphones. One of the most innovative additions is a set of sensors embedded in the nosepad: a PPG sensor for heart rate monitoring and a contact microphone to distinguish the wearer's voice from others. This level of sophistication in sensor technology opens up new possibilities for research and development in AR applications.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Meta has also made significant strides in on-device processing capabilities. The company's custom silicon enables local processing of SLAM, eye tracking, hand tracking and speech recognition, reducing latency and enhancing the overall user experience. Despite these advanced features, Aria Gen 2 remains remarkably lightweight at just 75 grams and offers an impressive six to eight hours of continuous use. The glasses also feature foldable arms for easy portability, making them ideal for extended research sessions.Audio interaction has been given special attention in this iteration. High-quality open-ear, force-canceling speakers provide clear audio feedback, enabling researchers to explore user-in-the-loop system prototyping and develop more intuitive AR interfaces. Aria Gen 2 augmented reality glasses (Meta)Research applicationsThe Aria Gen 2 glasses are designed to push the boundaries of AR and artificial intelligence research across multiple domains. In the field of machine perception, these glasses enable researchers to explore how AI systems can better understand the world from a human perspective. This has far-reaching implications for the development of more intuitive and context-aware AI systems.Accessibility research has already benefited from the Aria project. Initiatives like the NavCog project at Carnegie Mellon University have utilized earlier versions of Aria glasses to develop navigation aids for visually impaired individuals. With the enhanced capabilities of Aria Gen 2, companies like Envision are exploring the integration of AI assistants and spatial audio to further improve indoor navigation and accessibility experiences.The potential applications extend to robotics and AI as well. Researchers at Georgia Tech have demonstrated how the Aria Research Kit can help humanoid robots learn to assist people in home environments. This intersection of AR technology and robotics could lead to significant advancements in human-robot interaction and assistance. Aria Gen 2 augmented reality glasses (Meta)Potential future impactWhile Aria Gen 2 iscurrently a research tool, it offers amazing insights into the future capabilities of consumer AR glasses. The inclusion of a heart rate sensor suggests potential health-focused features in future eyewear, allowing for seamless health monitoring throughout the day. The spatial audio capabilities could be used to guide users to specific locations or help find lost items, enhancing everyday navigation and task completion.The hand and eye tracking technologies incorporated into Aria Gen 2 point towards more intuitive interfaces for future AR devices. These features could enable users to interact with digital content in their field of view naturally, without the need for additional controllers or input devices.These glasses, while not intended for consumer use, offer a glimpse into the future of AR and AI integration in everyday eyewear. The advancements made in Aria Gen 2 are likely to influence the development of consumer-grade AR glasses, potentially leading to more capable, comfortable and user-friendly devices in the coming years.GET FOX BUSINESS ON THE GO BY CLICKING HERE Aria Gen 2 augmented reality glasses (Meta)Kurt's key takeawaysYou know, it's pretty wild to think about where AR tech is heading. Meta's Aria Gen 2 glasses are like a sneak peek into the future, and let me tell you, it's looking pretty mind-blowing. These glasses are packed with all sorts of high-tech goodies: advanced sensors, on-device processing, AI integration, the works.While we probably won't see all these fancy features in the AR glasses we can buy anytime soon, it's still great to imagine what's coming down the pipeline. Just think about it: One day, we might be wearing glasses that can monitor our health, help us navigate unfamiliar places or even assist those with visual impairments. As researchers keep tinkering with this tech, who knows what amazing applications they'll come up with? I've got a feeling AR is going to become a bigger part of our lives before we know it.CLICK HERE TO GET THE FOX NEWS APPDo you think you'd be comfortable wearing AR glasses with advanced sensors like those in Aria Gen 2 in your daily life? Why or why not? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Alert:Malware steals bank cards and passwords from millions of devices.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·63 Views
-
Congressman calls for Zuckerberg to answer on China dealingswww.foxnews.comTech Congressman calls for Zuckerberg to answer on China dealings Meta CEO faces scrutiny over alleged censorship tools and AI collaboration Published March 19, 2025 3:37pm EDT close Meta launches community notes for Facebook to replace fact-checking Founder and Hedgehog CEO John Matze joined 'Fox & Friends First' to discuss his optimism surrounding the community notes program, staying competitive globally with AI and the possibility of Oracle buying TikTok. Congressman Ro Khanna, D-Calif., is calling for Mark Zuckerberg to appear before the congressional oversight committee to address accusations about his efforts to create censorship tools for China.The demand comes in the wake of explosive allegations made in a new memoir by a former Meta employee. Here's whatKhanna told me this morning:"I think Mr. Zuckerberg needs to appear in front of my congressional oversight committee to answer questions about these allegations with China."STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOWHE CYBERGUY REPORT NOW Mark Zuckerberg and California Congressman Ro Khanna (Meta; House.gov)Shocking revelations from inside MetaSarah Wynn-Williams, a former director of global public policy at Facebook (now Meta), has penned a tell-all book titled "Careless People: A Cautionary Tale of Power, Greed, and Lost Idealism." The memoir paints a damning picture of Meta's leadership, particularly focusing on Zuckerberg's alleged attempts to gain access to the Chinese market.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?"This is all pushed by an employee terminated eight years ago for poor performance. We do not operate our services in China today," a Meta spokesperson said. "It is no secret we were once interested in doing so as part of Facebooks effort to connect the world. This was widely reported beginning a decade ago. We ultimately opted not to go through with the ideas we'd explored, which Mark Zuckerberg announced in 2019." Sarah Wynn-Williams' new book (MacMillan)Zuckerberg's China strategy unveiledZuckerberg's China strategy, as revealed by Sarah Wynn-Williams, was far more extensive and controversial than previously known. According to her account, the Meta CEO went to extraordinary lengths to persuade the Chinese Communist Party (CCP) to grant Meta permission to operate within China's borders. Zuckerberg's efforts reportedly included providing detailed briefings to CCP officials on cutting-edge technologies, with a particular focus on artificial intelligence.Furthermore, Meta allegedly collaborated directly with the CCP to develop custom-made censorship tools tailored to the party's specifications. Perhaps most alarmingly, Wynn-Williams claims that Zuckerberg attempted to conceal these cooperative efforts with the CCP from the U.S. Congress, raising serious questions about transparency and potential legal implications.Meta's response and past statementsMeta has refuted the claims, stating that they haven't seen the book and that the former employee was terminated in 2017. The company spokesperson referenced Zuckerberg's 2019 speech at Georgetown University, where he claimed that despite his efforts, they could never reach an agreement with China on the terms of operation. We reached out to Meta for a response to our article but did not hear back before our deadline. Here is some of what he said back then:"Its one of the reasons we dont operate Facebook, Instagram or our other services in China," Zuckerberg said. "I wanted our services in China because I believe in connecting the whole world and I thought we might help create a more open society. I worked hard to make this happen. But we could never come to agreement on what it would take for us to operate there, and they never let us in. And now we have more freedom to speak out and stand up for the values we believe in and fight for free expression around the world."GET FOX BUSINESS ON THE GO BY CLICKING HERE Meta logo (Meta)Broader implications for tech and politicsThe allegations raise serious questions about the relationship between big tech companies and authoritarian regimes. They also highlight the ongoing challenges faced by social media platforms in balancing global expansion with ethical considerations and national security concerns.Kurt's key takeawaysThe call for Zuckerberg to testify before Congress underscores the gravity of these allegations. If true, they could have far-reaching consequences for Meta, its leadership and the tech industry as a whole. As the story unfolds, it will be crucial to watch how lawmakers, regulators and the public respond to these revelations about one of the world's most influential companies.CLICK HERE TO GET THE FOX NEWS APPIs it ever OK for tech companies to compromise on ethics and transparency in pursuit of global growth, especially when dealing with authoritarian governments? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverAlert:Malware steals bank cards and passwords from millions of devicesFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·66 Views
-
Fox News AI Newsletter: 'America's great industrial comeback'www.foxnews.comRecommended By Fox News Staff Fox News Published March 19, 2025 11:11am EDT close Vance celebrates 'America's great industrial comeback' in tech summit speech. Vice President JD Vance joined the American Dynamism Summit in Washington, D.C., on Tuesday to discuss the future of AI. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY'S NEWSLETTER:-- Vance knocks globalization's 'cheap labor' and lauds 'America's great industrial comeback' at AI summit-- Home robot automates household chores like Rosie from 'The Jetsons'-- AI dashcams enhance trucker safety while raising privacy concerns-- Getting divorced? Artificial intelligence deepfakes could cost you in court 'INDUSTRIAL COMEBACK': Vice President JD Vance knocked recent globalization efforts that use "cheap labor as a crutch" while simultaneously hampering innovation on the global scale during a Tuesday tech and artificial intelligence speech.NO MORE CHORES: Developed by the artificial intelligence company 1X, NEO Gamma isn't your clunky, metallic automaton. It is designed to be a helpful, almost human-like assistant. NEO Gamma humanoid robot serving coffee (1X)AI DASHCAM DILEMMA: The trucking industry is in the midst of a technological revolution, thanks to the arrival of artificial intelligence-powered dashcams. These innovative devices promise to make roads safer and operations more efficient, but they also raise some important questions about privacy. AI dashcam system (Motive)REAL 'THREAT': Americans looking to settle a divorce and obtain custody of their children could rack up unforeseen court costs by trying to disprove artificial intelligence (AI)-generated deepfake videos, photographs and documents, according to a leading family law attorney. The use of artificial intelligence to generate fake images and videos could rack of costs for clients working their way through a divorce. (iStock/KIRILL KUDRYAVTSEV/AFP via Getty Images)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.0 Comments ·0 Shares ·71 Views
-
The temptations and risks of free Wi-Fiwww.foxnews.comPublished March 18, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "Cyberguy" Knutsson explains how to keep your Windows computer safe and discusses the security risks of online retail giant Temu. Public Wi-Fi is everywhere and incredibly convenient, but is it safe to use? Keep reading to explore the risks of using public Wi-Fi and how a VPN can help protect your privacy while browsing on the go. Illustration of Wi-Fi icon (Kurt "CyberGuy" Knutsson)Risks of using public Wi-FiHackers sometimes try to trick you into connecting to a network labeled "FREE Wi-Fi." Heres what you need to know about the potential dangers of public Wi-Fi.Unencrypted networksMany public Wi-Fi networks are unencrypted, meaning the data transmitted over them is not secured. This makes it easy for cybercriminals with the right tools to intercept your online activities, including sensitive information like login details, banking data and personal messages.Malware threatsConnecting to public Wi-Fi can expose you to malware attacks. Malicious actors on the same network can take advantage of security flaws on your device to install harmful software. Some examples arespyware that steals your personal information orransomware that locks your system or turns your device into a bot for a distributed denial-of-service attack.Man-in-the-middle attacksA man-in-the-middle attack occurs when an attacker secretly intercepts communication between two parties, like a user and an app. This allows them to listen in on or alter conversations. On unsecured public Wi-Fi networks, attackers can more easily capture data packets. This potentially gives them access to sensitive information like login credentials, credit card details or private messages. In some cases, they may even modify the data, leading to fraud or data breaches.Signs of an unsafe networkHackers often take advantage of public Wi-Fi, but some may go a step further and create fake hot spots under their control. To help you steer clear of these traps, here are some common signs of a rogue Wi-Fi network.The network name resembles a trusted one: Hackers sometimes set up fraudulent networks that mimic legitimate ones. For example, you might see duplicate network names or be connected to a "home network" when you're far from home."HTTPS" sites appear as "HTTP":If you're trying to access a secure website and notice its loading as an "HTTP" site instead of "HTTPS," you may be connected to a fake Wi-Fi hot spot.The name is generic: Rogue networks often appear in busy areas with vague names like "Free Wi-Fi" to attract unsuspecting users. Legitimate public networks, like those in cafs, usually have more specific names tied to the business.Unusual behavior: If you experience strange pop-ups, ads, frequent Wi-Fi disconnections or slow speeds, the network youre connected to could be compromised. To minimize the risk, disconnect immediately and run amalware scan.Now that you're aware of the risks and how to recognize an unsafe Wi-Fi network, you can browse more securely. Illustration of a hacker (Kurt "CyberGuy" Knutsson)Where to find legitimate free Wi-FiIf you're looking for reliable spots to access free Wi-Fi, these are some great options.WiFi MapWiFi Map has pinpointed millions of free Wi-Fi locations across more than 200 countries. Their website displays nearby free Wi-Fi locations by city on an interactive map. Clicking on a spot will reveal the address, the Wi-Fi hot spot name and any required passwords. Theres also a mobile app available, which is especially handy for accessing passwords. Plus, the app offers an offline map feature, so you can search for hot spots without needing a connection.Your local libraryMany libraries offer free Wi-Fi in addition to computer access. Bring your own device to enjoy internet access at no cost. Check your local librarys website or give them a call to confirm if they provide free Wi-Fi and learn about any connection requirements. While some libraries offer open access, others may ask for a password or require a library card number.Wi-Fi-FreeSpot DirectoryTheWi-Fi-FreeSpot Directory helps you locate free Wi-Fi hot spots in the U.S., Canada, Asia, the Middle East and more. You can search by region, state or country and even narrow your search to specific types of locations, such as hotels, airports, coffee shops or vacation rentals that provide free Wi-Fi.6 ways to protect your devices for secure public Wi-Fi usePublic Wi-Fi is everywhere, from your favorite coffee shop to the airport. But while it's convenient, it also comes with some risks, as we mentioned above. Here are six essential tips to help keep your devices and data safe when you're browsing on public networks.1) Use a VPN:Accessing the internet in public places, like coffee shops, can put your personal data at risk. AVPN (virtual private network) ensures that your connection is secure and that your information is encrypted. Using a VPN is one of the most effective ways to safeguard your privacy when browsing on public Wi-Fi. It creates a private, encrypted tunnel for your data, protecting you from potential cyber threats. VPN on an iPhone (Kurt "CyberGuy" Knutsson)2) Have strong antivirus software:Cybercriminals often exploit the vulnerabilities of public Wi-Fi to distribute malware or intercept sensitive data, making it crucial to protect your devices against such threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3) Use two-factor authentication (2FA): Enable2FA on your accounts to add an extra layer of security, even if someone manages to intercept your password.4) Set strong passwords: Use complex, unique passwords for each of your online accounts. Get more details about mybest expert-reviewed password managers of 2025 here.5) Keep software updated: Ensure your operating system, applications and security software areup to date to patch known vulnerabilities.6) Avoid sensitive transactions: Refrain from accessing sensitive information or making financial transactions while on public Wi-Fi.Kurts key takeawaysFinding free Wi-Fi is easy, but its important to watch out for security risks. Services like WiFi Map, local libraries and Wi-Fi-FreeSpot can help you find safe hot spots. To protect your data, always use a VPN on public networks and be careful of suspicious networks or activity.Have you ever fallen victim to a public Wi-Fi scam? What happened? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Alert:Malware steals bank cards and passwords from millions of devices.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·82 Views
-
Massive floating solar power plant is making waveswww.foxnews.comRecommended Published March 18, 2025 6:00am EDT close 'CyberGuy': Massive floating solar power plant is making waves The 126 MW Omkareshwar Floating Solar Park spans 642 acres, boosting green power. Kurt Knutsson reports on this innovative solution to global energy challenges. By now, we've all heard of solar power farms on land, but on water? Well, India has just launched its largest floating solar park yet, the Omkareshwar Floating Solar Park, in Madhya Pradesh.This ambitious project is making waves in the renewable energy sector, marking a significant milestone in India's goal toward a greener future. Located on a vast reservoir, the park demonstrates the country's innovative approach to harnessing solar power while conserving vital resources.. Omkareshwar Floating Solar Project (Larsen & Toubro) (Kurt "CyberGuy" Knutsson)A solar oasis in the heart of IndiaTata Power Renewable Energy Limited (TPREL) has achieved a pretty incredible engineering feat that's as impressive as it is innovative. TPREL's 126 MW floating solar project features 213,460 bifacial glass-to-glass modules spread across 260 hectares (642 acres) of water surface between the Indira Sagar and Omkareshwar hydroelectric reservoirs. These advanced panels are expected to generate a whopping 204,580 MWh of clean energy annually, sufficient to power thousands of homes across the region.Larsen & Toubro (L&T), a global leader in renewable energy solutions, has also played a crucial role in the Omkareshwar Floating Solar Park. L&T successfully commissioned a 90 MW floating solar power plant as part of the project. This significant contribution underscores L&T's expertise in harnessing renewable energy and its commitment to sustainable development. Omkareshwar Floating Solar Project (Larsen & Toubro) (Kurt "CyberGuy" Knutsson)More than just solar panelsThe Omkareshwar project goes far beyond simply placing solar panels on water. The installation incorporates robust mooring systems, wave breakers and ballast anchors to ensure stability in varying conditions. Flexible cableways allow the structure to adapt to fluctuating water levels and high winds. Additionally, the project hosts the world's largest floating inverter platform, setting a global benchmark in floating solar technology. Omkareshwar Floating Solar Project (Larsen & Toubro) (Kurt "CyberGuy" Knutsson)A win-win for energy and the environmentThe benefits of this floating solar wonder extend far beyond clean electricity production. By shading the reservoir, the plant significantly reduces water evaporation, helping to conserve precious resources. The project conserves approximately 32.5 million cubic meters of water annually. The use of water bodies for energy production also frees up land for agriculture and other vital uses. Furthermore, TPREL's 126 MW project is set to offset a staggering 173,893 tonnes of CO2 emissions each year, making a substantial contribution to India's climate goals. Omkareshwar Floating Solar Project (Larsen & Toubro) (Kurt "CyberGuy" Knutsson) Omkareshwar Floating Solar Project (Larsen & Toubro) (Kurt "CyberGuy" Knutsson)Kurts key takeawaysBy harnessing the potential of floating solar technology, India is not only reducing its carbon footprint but also showcasing innovative solutions to global energy challenges. As the country continues to expand its renewable energy capacity, projects like Omkareshwar underscore India's commitment to achieving its ambitious clean energy targets, including reaching 500 GW of non-fossil fuel capacity by 2030. This progress positions India as a leader in the global transition to sustainable energy, highlighting the potential for floating solar to play a crucial role in meeting future energy demands.Do you believe the higher initial costs of floating solar installations are justified by their increased efficiency and potential long-term savings? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Alert:Malware steals bank cards and passwords from millions of devices.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·80 Views
-
Are you being stalked? Start with this safety checkwww.foxnews.comclose UK police arrest Gavin Plumb for plotting to stalk, kill TV host Essex police body-worn camera footage shows the arrest of Gavin Plumb, who plotted to kidnap and murder Holly Willoughby. I get so many calls during my national radio show and DMs from folks who think theyre being stalked. Sometimes, the person is seeing signs that arent there. Other times, its clear theres something going on. Its not surprising, given how easy it is for tech to watch someones movements.Win an iPhone 16 Pro with Apple Intelligence ($999 value). No purchase necessary.Enter to win now!The good news is you have me, and I know the exact settings creeps use to spy on you. Grab your phone and lets dive in.IS YOUR PHONE LISTENING TO EVERYTHING YOU SAY? ITS COMPLICATEDStart here, Apple folksFirst, check Share My Location. Youll see a list of the people who can follow your every move.Go to Settings > Privacy & Security > Location Services > Share My Location.Pro tip:If you remove access, theyll be notified. Take a screenshot of that list if you need to show it to the cops or someone else. Press and hold the right-side power button and the top volume button until you see a flash.Now, if someones signed into your Apple ID, they could track you across everything that uses it. Lets make sure no ones in your account.Tap Settings > [your name], then scroll to the bottom to see a list of anything signed into your account. Hit the arrow on the right, then press Remove from Account to delete the ones you don't recognize.Hit this link for a quick security fix everyone who owns an iPhone should know.Pro tip:Want a quick fix?Apples Safety Check shows you what info youre sharing and lets you cut off access from people or apps you dont trust.Go to Settings > Privacy & Security > Safety Check. At the bottom, hit Manage Sharing & Accessto see who still has the keys to your account. Press Start Emergency Reset to yank access from everyone with your Apple ID.RELATED:Cheaters leave tech breadcrumbs. Suspect something is up?These are the red flags. Your cellphone is an easy target for bad actors looking to spy on you. (Photo by Silas Stein/picture alliance via Getty Images)On to you, Android crewThe easiest way for someone to spy is by logging into your Google account. This shows them your Maps history, location, searches and everything else. Yeesh.In yourGoogle account, head to Security (left side). Scroll to Your devices and select Manage all devices. Click on one to see its info. You can Sign out at the bottom.Dont recognize something? Sign out and change your password. Do this just in case.One more check for everyoneIts worth checking Google Maps, too, to see if your location was shared that way.Open Maps,tap your profile pic (top right) and hit Location sharing.If someone who shouldnt be following you shows up, just tap their icon and press Stop.On that card, hit those three dots on the top right and select Remove from list. If you're looking to ensure you're not sharing your location, it might be worth checking out what your Google Maps situation looks like. (Photo Illustration by Mateusz Slodkowski/SOPA Images/LightRocket via Getty Images)Beep-beep! Hear a tracker?Almost 10% of Americans have been stalked via GPS, like an Apple AirTag or another small gadget. If thats not you, its someone you know.An AirTag will start beeping only after 24 hours away from its owner. That gives the stalker plenty of time to reach you, especially if theyre local. If a carjacker tags your ride, they could learn your routine and follow you home before you even know whats going on.The rumor mill says Apples AirTags 2, coming later this year, will have antistalking tech. With the most current AirTags, tech-savvy stalkers can rip out the built-in speaker so you wont get alert, but the new ones should make it harder. For now, you need to do everything you can to stay safe.IM A TECH PRO AND THESE ARE MY SECRETS TO BETTER FLIGHTS AND LUXURY TRAVELOn your iPhone, make sure a few settings are enabled:Go to Settings > Notifications > Tracking Notifications and toggle on Allow Notifications.Now, open your Find My app and tap Items at the bottom of the screen. Tap on Identify Found Item.On Android, the process is similar as long as your phone is running Android 6.0 or newer. If its not, you really need a new phone!To make sure alerts are enabled, go to Settings > Safety & Emergency > Find Unknown Tracker Alerts. Toggle on Allow Alerts. Almost 10% of Americans have reportedly been stalked by GPS devices, including, but not limited to, Apple AirTags. (James D. Morgan/Getty Images)You need to make sure your location and Bluetooth settings are enabled, too.On iPhone:Open Settings> Privacy & Security > Location Services. From there, toggle on Location Services and Find My iPhone. Then, head to System Services and turn on Significant Locations.Next, go to Settings > Bluetooth and toggle on Bluetooth.On Android:Open Settings > Location and toggle on Use location, Wi-Fi scanning or Bluetooth scanning.Turn on Bluetooth by going to Settings > Bluetooth and toggling on Bluetooth.CLICK HERE TO GET THE FOX NEWS APPGet tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours or get the free podcast.Daily newsletter:Join 650,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "The Current powered by Kim Komando" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.0 Comments ·0 Shares ·78 Views
-
Flooded by spam after searching for a lender to refinance?www.foxnews.comclose 'CyberGuy': Is it safe to open that spam email? Tech expert Kurt Knutsson says opening emails is safe, but risks arise from interacting with links, attachments or HTML content. We want to warn you about a potential issue that could occur after refinancing your home: an unexpected surge in spam messages. "Morgan" from Yuma, Arizona, reached out to share that she experienced this."We had to refinance our house and tried through XYZ. We now get a lot of spam that I have to continually block. I know it is them because weve used Rocket Mortgage for years and never had an issue, and XYZ was the only new organization we had been communicating with using that email. How do you prevent that?"The good news is there are ways to avoid spam and prevent it from coming back. Heres what you need to know. Illustration of deleting messages (Kurt "CyberGuy" Knutsson)Tips to help combat spamIf you get a spam message, avoid replying or clicking on any links in the message. Follow the steps below to prevent future spam texts.How to stop spam text messages on iPhoneOpen the Settings appScroll down and tapAppsScroll down to the Messages app and open itScroll down until you seeFilter Unknown Senders and toggle it onOpen the Messages appand tap on Filters in the upper right-hand corner. Then, you will see that your text messages have been filtered into five categories: All Messages, Known Senders, Unknown Senders, Unread Messages and Recently DeletedNow, messages from senders not in your contact list will be directed to the "Unknown Senders" folder, and you wont receive a notification for them.How to stop spam text messages on AndroidSettings may vary depending on your Android phones manufacturer.Open theMessages appTap the three-dots icon in the top-right cornerInSettings, scroll down and tapSpam ProtectionTurn onEnable spam protection Illustration of securing your data (Kurt "CyberGuy" Knutsson)How to attempt to minimize these annoying robocallsAlong with spam messages, those annoying robocalls after searching for a lender to refinance can be a serious nuisance. Fortunately, there are several steps you can take to minimize these interruptions as well and protect your privacy.1) Dont answer calls or texts from unfamiliar numbersNot answering unfamiliar calls is one of the best ways to avoid a potential scam. Most phone carriers now label robocalls as "Spam Risk" or something similar. Scammers often use your local area code or even parts of your phone number to make you think the call is legitimate. That's why it's crucial to carefully check the number before picking up. If you dont recognize the number, its safest to ignore the call or text in case it's spam.2) Block the numberIf you get a spam call and want to prevent future calls from the same number, you can easily block it. Find out how to block unknown callers on both iPhones and Android deviceshere.3) Use your carriers spam and robocall blocking serviceMajor carriers like Verizon, AT&T, Sprint and T-Mobile offer free services to block spam and robocalls. These include AT&T Call Protect, Sprint/T-Mobile Scam Shield and Verizon Call Filter. Reach out to your provider for more details.4) Try third-party spam-blocking appsiPhones and Androids have apps available for users to download to detect spam calls before they reach you.Get our top recommendations here.5) Invest in personal data removal servicesUnfortunately, theres a high chance that your phone number is readily available on many lists that data brokers sell to numerous search websites. However, removing your number from these sites can help lower the chances of spammers getting a hold of it and reaching out to you. With a data removal service, your personal information is removed from the web so data brokers and scammers never get their hands on your personal phone number, home address or email address. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here. Illustration of the delete icon (Kurt "CyberGuy" Knutsson)Kurts key takeawaysAs frustrating as spam may be, there are steps you can take to minimize these unwanted messages, including blocking numbers, using carrier spam-blocking services and enabling built-in spam filters on your phone. These tips will help you reduce spam and protect your personal information.Whats your biggest challenge when it comes to spam calls and texts? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·94 Views
-
How to record voice notes on iPhone and Androidwww.foxnews.comPublished March 17, 2025 6:00am EDT close 'CyberGuy': How to record voice notes on your iPhone Tech expert Kurt Knutsson talks about easily recording voice notes on iPhone via Notes. Voice notes are an incredibly convenient way to capture ideas, reminders or important information without needing to type or write. Whether you're using an iPhone or an Android device, we'll walk you through the steps to record voice notes effortlessly.. A man recording voice notes on his phone (Kurt "CyberGuy" Knutsson)Recording voice notes on your iPhoneWant to easily capture and organize voice notes on your iPhone? Heres how you can do it in just a few simple steps using the Notes app. We captured the images below on an iPhone 15 Pro running iOS 18.3.1.Step 1: Open the Notes appSwipe down from the top of your screen and type Notes in the search barTap on theNotes app to open it Steps to record voice notes on your iPhone (Kurt "CyberGuy" Knutsson)Step 2: Create a new noteTap thecompose icon (a square with a pencil) at the bottom right corner to create a new note Steps to record voice notes on your iPhone (Kurt "CyberGuy" Knutsson)Step 3: Start recordingWith your note open, tap thepaperclip icon above the keyboardFrom the menu that appears, select Record AudioPress thelarge red button to begin recording your voice Steps to record voice notes on your iPhone (Kurt "CyberGuy" Knutsson)Step 4: Stop and save your recordingTap thered button again to stop recordingYou can play back your recording using the play buttonTo view a transcript, tap thespeech bubble icon in the bottom left corner of your screen Steps to record voice notes on your iPhone (Kurt "CyberGuy" Knutsson)Words will behighlighted as they play, making it easy to review Steps to record voice notes on your iPhone (Kurt "CyberGuy" Knutsson)Step 5: Edit and shareTo rename your recording,tap the three-dot menu in the upper-right cornerSelectRenameType anew name Steps to record voice notes on your iPhone (Kurt "CyberGuy" Knutsson)Next, click returnThen,tapDoneShare your recording by tapping the share icon Steps to record voice notes on your iPhone (Kurt "CyberGuy" Knutsson)Then, choose options likeAirDrop,Messages orMail to share it Steps to record voice notes on your iPhone (Kurt "CyberGuy" Knutsson)This feature is especially useful for creating searchable transcripts directly within your notes, making it ideal for meetings or lectures.Recording voice notes on your AndroidWant to quickly capture your thoughts or important moments on your Android? Heres how you can easily record voice notes using a simple voice recorder app. We captured the images below on a Galaxy S24 Ultra.Settings may vary depending on your Android phones manufacturer.Step 1: Locate or install a Voice Recorder appOpen yourapp drawer and search forVoice RecorderOr click the search bar and typeVoice RecorderIf it's not pre-installed, download avoice recorder app from theGoogle Play Store Steps to record voice notes on your Android (Kurt "CyberGuy" Knutsson)Step 2: Start and stop recordingOpen theVoice Recorder appTap thered record button at the bottom of your screen to begin recordingTap thestop button when you're done speaking Steps to record voice notes on your Android (Kurt "CyberGuy" Knutsson)Step 3: Save your recordingThen, next to the record button, tap theblack squareType a name for your recordingTapSave Steps to record voice notes on your Android (Kurt "CyberGuy" Knutsson)Step 4: PlaybackTap it from the list of saved recordings tolisten to your recordingPress play Steps to record voice notes on your Android (Kurt "CyberGuy" Knutsson)Step 5: ShareTo share it, tap onyour recordingThen select thethree-dot menu in the upper-right cornerClick theShare iconChoose yourpreferred method of sharing, such as Messages, Email or Google Drive Steps to record voice notes on your Android (Kurt "CyberGuy" Knutsson)Kurts key takeawaysRecording voice notes is a simple way to stay organized and capture ideas on the go. Whether youre using an iPhone or an Android, these steps will ensure you never lose track of important thoughts. With just a few taps, you can save time and boost productivity while keeping all your notes easily accessible.Do you prefer traditional written notes, or do you think voice notes are easier and more convenient for capturing ideas, reminders or important information on the go? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·76 Views
-
Warning signs your mail has been fraudulently redirectedwww.foxnews.comTech Warning signs your mail has been fraudulently redirected Steps to protect your mail and personal information from scammers Published March 16, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt 'CyberGuy' Knutsson joins 'Fox & Friends' to warn of new cyberscams and his tips on how to avoid them. Change-of-address scams involve some of the most seemingly harmless personal information getting into the wrong hands. This can lead to a whole host of problems, including financial losses and identity theft, although change-of-address fraud is technically a form of identity theft.This kind of fraud involves a scammer impersonating you to request a change of address with the United States Postal Service (USPS).Once they have your mail redirected to an address they control, they can go through it at their leisure, looking for mail they can steal and information they can use to perpetrate further scams, like taking out loans or credit cards in your name or using your identity to defraud others.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW USPS delivery truck (Kurt "CyberGuy" Knutsson)Heres how it works, step by stepThis detailed breakdown explains the process of a change-of-address scam, from initial targeting to the potential consequences and warning signs to watch for.TargetingA person with criminal intent gets your postal address and full name, something thats most easily done using a so-called people search site. People search sites, also known as people finder sites, are a kind of data broker that specializes in collecting, organizing and selling access to personal information.Making a fraudulent change-of-address requestThe scammer then mails a change-of-address request to the USPS, providing your name and a new address he has access to. Theonline change-of-address form is generally more secure, requiring confirmation via a bank account. Thats why scammers will almost always mail in the request.The form requires a signature, but this is unlikely to be verified when processing the request. So, the scammer will either find an image of your signature somewhere, steal a document that includes your signature or simply sign your name any which way.Harvesting sensitive documents and dataNow that theyve redirected your mail straight into their hands, the scammer just has to patiently wait for sensitive mail to arrive. Theyre on the lookout for anything they can use to steal from you or defraud you. Bank statements, tax documents, checks and even your household bills can be used to commit further acts of fraud and identity theft.One of the scariest things a scammer can do once he has enough of your personal information is to commit deed fraud, otherwise known ashome title theft. Youre far from helpless, though. There are telltale signs that you can watch for to catch change-of-address scams early.The signs to look out forThe most obvious sign to watch for is a sudden and persistent drop in the amount of mail entering your mailbox. This only applies to mail addressed to you by name. Mail delivered to your address without an addressee, including mail addressed to "homeowner" or "occupant," wont be affected by a change-of-address scam.The other major things to keep an eye on are your credit report, credit card statements and bank statements. You can request a free credit report from one of the three credit bureaus once per year. A mailbox in front of a house (Kurt "CyberGuy" Knutsson)What to do if you think your mail has been fraudulently redirectedIf you have good reason to believe that someone has redirected your mail without permission, dont hesitate to take action. The sooner you catch this, the better. Heres what you can do:Start by keeping detailed records: Document everything thats led you to believe your mail has been redirected. This includes the mail you were expecting, any communication with the senders of the missed mail (such as confirming dispatch dates), suspicious phone calls, texts or emails, and any unusual activity in your online accounts, bank accounts or credit reports.Reach out to the USPS for help: Use theonline locator to find and contact your local U.S. Postal Inspection Service (USPIS) office. They can assist with investigating fraudulent mail redirection.Take action if identity theft is suspected: If you believe youve become a victim of identity fraud, visit the Federal Trade Commission's identity theft portal. This resource will help you develop a recovery plan and guide you through the steps to protect yourself.Taking these steps will put you on the road to regaining control and getting through what can quickly become a stressful situation.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A stack of mail (Kurt "CyberGuy" Knutsson)Stop change-of-address scammers in their tracksPrevention is better than a cure, and, luckily, theres a lot you can do to stop change-of-address scams before they start.1. Invest in personal data removal services: Have your personal information removed from data broker databases, including people search sites. Theyre the first port of call for many scammers. Without these companies in the mix, scammers arent likely to come across your address in the first place.A reputable personal information removal service can take your data down from hundreds of sites and keep it off by resending removal requests, even as data brokers try to add your information to their databases.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.2. Reduce the amount of sensitive mail in your mailbox: Start by switching to paperless options wherever available. This will dramatically reduce the amount of sensitive mail heading to your mailbox, leaving criminals with little value to steal. Check your mail daily, as soon as possible after its delivered. Get someone to do this for you if youre away. Some redirection scams start with mail being stolen from your mailbox. Definitely avoid allowing your mailbox to overflow.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Secure your mailbox: Consider upgrading to alocked mailboxto prevent mail theft. If you live in an area prone to mail theft, this simple step can stop criminals from intercepting sensitive documents before they even reach you.4. Use an identity theft protection service:Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft.5. Set up USPS Informed Delivery: Enroll inUSPS Informed Delivery, a free service that lets you preview images of incoming mail before it arrives. This can help you spot missing mail early and identify potential issues with mail redirection.6. Report suspicious activity immediately: If you notice anything unusual, such as missing mail or unauthorized changes to your accounts, report it right away. Contact the USPS, your bank and the Federal Trade Commission to ensure the issue is documented and addressed promptly.Kurts key takeawaysChange-of-address scams might sound like an unlikely threat, but they can wreak havoc on your finances and peace of mind if left unchecked. By staying alert, securing your personal information and taking proactive measures like monitoring your mail and credit, you can greatly reduce the risk of falling victim to these scams. Remember, catching fraud early is key. So, dont hesitate to act if something feels off.CLICK HERE TO GET THE FOX NEWS APPWhat do you think should be done to prevent change-of-address scams? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·94 Views
-
Home robot automates household chores like Rosie from 'The Jetsons'www.foxnews.comRecommended Published March 16, 2025 6:00am EDT close Home robot automates household chores like Roisie of 'The Jetsons' Robots are inching closer to being helpers in our homes. Remember Rosie from "The Jetsons?"For those too young, Rosie was a futuristic robot helper in a classic cartoon. Now, the idea of having such a robot in our homes feels like it's inching closer to reality with the unveiling of NEO Gamma.Developed by the artificial intelligence company 1X, this isn't your clunky, metallic automaton. NEO Gamma is designed to be a helpful, almost human-like assistant.GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX.SIGN UP FOR KURTS THE CYBERGUY REPORT NOW NEO Gamma humanoid robot (1X)Not just a robot, but a companionStanding at 65 inches tall,NEO Gamma features AI-driven conversation, human-like movements and the ability to manipulate objects with impressive dexterity. Imagine waking up to freshly brewed coffee prepared by your own robot. Or picture NEO Gamma helping you hang pictures, doing laundry while you meditate or even expertly serving wine during dinner. This robot aims to blend seamlessly into your life, offering assistance without being intrusive.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? NEO Gamma humanoid robot serving coffee (1X)What makes this humanoid robot so special?Human-like design: 1X has gone the extra mile to make NEO Gamma feel less like a machine. It walks with a natural gait, swings its arms and can even squat to pick things up. To soften its appearance, it sports a "Knit Suit," a 3D-printed nylon covering that hides the metallic frame and prevents bumps.AI-powered interaction: NEO Gamma isn't just programmed to perform tasks. It's designed to understand and respond to you. It features emotive "earrings" that light up when it's listening and an in-house language model that enables natural conversations.Observational learning: This robot learns by watching. It can observe how you perform tasks and then mimic those actions.Quiet and considerate: With a reduced noise level, NEO Gamma operates as quietly as a humming refrigerator. It also knows when to give you space, relaxing in another room after a job well done. NEO Gamma humanoid robot (1X)The tech behind the helpNEO Gamma's movements are controlled at a frequency of 100 Hz, learned through reinforcement learning from human motion capture data. This allows it to move with a range of motion similar to a human. The robot can also recognize and handle objects, even in new environments. It has four microphones with echo cancellation for clear audio and three speakers for voice interaction and sound effects.GET FOX BUSINESS ON THE GO BY CLICKING HERE NEO Gamma humanoid robot cleaning windows (1X)The competition and the challengesThe company 1X isn't alone in vying for a spot in the future of home robotics.Tesla's Optimus andFigure's AI-powered humanoid are also in the race. However, the path to a truly useful and affordable home robot is filled with engineering challenges. NEO Gamma humanoid robot helping with picture hanging (1X)Is NEO Gamma ready for your home?While 1X aims to get NEO into customers' homes as quickly as possible, there's no firm release date. NEO Gamma humanoid robot accepting groceries (1X)Kurt's key takeawaysThe idea of a robot helper like NEO Gamma is exciting, and it's hard not to think about how such a device could change our lives. Whether NEO Gamma or another robot achieves this first, it feels like we're on the cusp of a new era. Will we look back on videos of these early models with nostalgia, or will the robots of the future have something else in store for us? Only time will tell.CLICK HERE TO GET THE FOX NEWS APPWhen NEO Gamma (or a robot like it) becomes available, would you want one in your home? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·70 Views
-
SpaceX to send Starship to Mars next year, Elon Musk confirmswww.foxnews.comRecommended By Rachel Wolf Fox News Published March 15, 2025 12:43pm EDT close Elon Musk says he will bring the stranded astronauts back home DOGE leader Elon Musk opens up about his work in space on 'Kudlow.' Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. Elon Musk has confirmed that SpaceXs Starship will head to Mars at the end of 2026. The ship will be carrying Optimus, Teslas humanoid robot. The tech billionaire said that if all goes well, humans could be on the red planet by 2029, although he admitted that 2031 is more likely. NASAs Perseverance Mars rover used its dual-camera Mastcam-Z imager to capture this image of "Santa Cruz," a hill within Jezero Crater, on April 29, 2021, the 68th Martian day, or sol, of the mission. (Credits: NASA/JPL-Caltech/ASU/MSSS)SPACEX LAUNCH SCRUBBED HOURS AFTER HEGSETH SHARES MESSAGE TO RESCUE MISSION CREWThe X account for Optimus replied to Musks announcement with just two words: "Hold on.""Starship is the worlds most powerful launch vehicle ever developed, capable of carrying up to 150 metric tonnes fully reusable and 250 metric tonnes expendable," SpaceX writes on its website. In US tons, that is up to 165 tons of fully reusable and up to 275 tons expendable.Musk has long talked about his dream of sending men to Mars, and recently he was spotted in the White House wearing an "Occupy Mars" shirt. Billionaire Elon Musk spoke to podcaster Joe Rogan about the future of the X platform under either future President Kamala Harris or future President Donald Trump. (The Joe Rogan experience.)FORMER ASTRONAUT CELEBRATES SPACEXS IMPRESSIVE TECHNOLOGICAL TOUR DE FORCE"I cant think of anything more exciting than going out there and being among the stars," a quote from Musk reads on SpaceXs webpage on its mission of "making humanity multiplanetary."Musks announcement of a mission to Mars comes during an exciting week for SpaceX. A SpaceX Falcon 9 rocket blasts off from the launch pad at NASA's Kennedy Space Center in Cape Canaveral, Fla., Friday, March 14, 2025. (SpaceX/NASA)On Friday, SpaceX and NASA launched a crew headed for the International Space Station (ISS) with astronauts who will replace Butch Wilmore and Suni Williams, who have been stuck in space for nine months.Test pilots Wilmore and Williams launched into space aboard Boeings Starliner on June 5, 2024, and were scheduled to return to Earth on June 13, 2024. However, thruster failures and helium leaks led NASA and Boeing to leave the astronauts aboard the ISS rather than have them make the risky journey home. Rachel Wolf is a breaking news writer for Fox News Digital and FOX Business.0 Comments ·0 Shares ·89 Views
-
Fox News AI Newsletter: 'Digital twin' dangerwww.foxnews.comRecommended By Fox News Staff Fox News Published March 15, 2025 8:30am EDT A woman in Washington, D.C., views a manipulated video on January 24, 2019, that changes what is said by President Donald Trump and former President Barack Obama. (Rob Lever /AFP via Getty Images) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY'S NEWSLETTER:-- AI digital twins are warping political reality, leaving deepfake victims with few options for legal action-- Scarlett Johansson warns of AI dangers, says 'there's no boundary here'-- OpenAI lays out key proposals for Trump admin AI Action Plan to maintain tech lead over China This illustration photo taken on January 30, 2023 shows a phone screen displaying a statement from the head of security policy at META with a fake video of Ukrainian President Volodymyr Zelensky calling on his soldiers to lay down their weapons shown in the background, in Washington, D.C. (OLIVIER DOULIERY/AFP via Getty Images)NEW REALITY: Artificial intelligence (AI) is producing hyperrealistic "digital twins" of politicians, celebrities, pornographic material, and more leaving victims of deepfake technology struggling to determine legal recourse.NO BOUNDARY: Scarlett Johansson has taken a vocal stand on artificial intelligence, after having her likeness and voice used without permission. Last year, Johansson said she had been asked to voice OpenAIs Chatbot by CEO Sam Altman, but turned down the job, only for people to notice that the feature, named "Sky," sounded almost exactly like the actress. "Particularly with the A.I. piece. It was like: If that can happen to me, how are we going to protect ourselves from this? Theres no boundary here; we're setting ourselves up to be taken advantage of," the 40-year-old told InStyle Magazine earlier this month. Scarlett Johansson poses for InStyle Magazine. (Heather Hazzan/InStyle)MAINTAINING US DOMINANCE: OpenAI has responded to the Trump White House's request for information on developing an Artificial Intelligence (AI) Action Plan to ensure the U.S.' continued technological lead over China.NEXT GEAR: Are you ready to use your daily commute to catch up on your favorite show, respond to emails or simply enjoy the view without worrying about the road ahead? This vision of the future is becoming increasingly real thanks to advancements in autonomous driving technology. Stellantis, the parent company of brands like Dodge, Jeep and Chrysler, has just unveiled its STLA AutoDrive 1.0 system, which the company hopes will soon revolutionize the way we drive. STLA AutoDrive 1.0 system (Stellantis)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.0 Comments ·0 Shares ·106 Views
-
FBI warns of dangerous new smishing' scam targeting your phonewww.foxnews.comclose Kurt CyberGuy Knutsson explains the alarming rise of smishing and how to avoid falling victim Scammers are texting victims and stealing their information by posing as legitimate businesses or agencies. CyberGuy explains how to stay safe. Smishing is a type of phishing scam that works through text messages.The name comes from a mix of "SMS" and "phishing," since scammers use fake messages to trick people into giving away personal information. Its been around for a while, but lately, its gotten so bad that even the FBI and several U.S. cities have started warning people.Hackers have set up over 10,000 fake websites to keep these scams going, targeting both iPhone and Android users with texts designed to steal their personal and financial information.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)What you need to knowCities across the United States are warning residents about an ongoing mobile phishing campaign in which scammers impersonate parking violation departments. The fraudulent text messages claim recipients have unpaid parking invoices and threaten a $35 daily fine if left unpaid. As reported by cybersecurity publicationBleepingComputer, the latest wave of phishing texts has prompted alerts from multiple cities, including Annapolis, Boston, Greenwich, Denver, Detroit, Houston, Milwaukee, Salt Lake City, Charlotte, San Diego and San Francisco.The campaign, which began in December, remains active. The smishing texts claim to be from a government authority and instruct recipients to click a link to pay an alleged overdue fine."This is a final reminder from the City of New York regarding the unpaid parking invoice. A $35 daily overdue fee will be charged if payment is not made today," one fraudulent message says. Smishing scam text (BleepingComputer)The same phishing template has been observed in similar scams targeting residents of other cities. The FBI has also raised concerns about a broader smishing campaign affecting U.S. residents. In a recent alert, the agency warned that scammers have expanded beyond parking fines and are now impersonating road toll collection services.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?"Since early March 2024, the FBI Internet Crime Complaint Center (IC3) has received over 2,000 complaints reporting smishing texts representing road toll collection services from at least three states,"the agency stated."IC3 complaint information indicates the scam may be moving from state to state." Smishing scam text (Kurt "CyberGuy" Knutsson)Smishing scams are evolvingA newreport from cybersecurity firm Palo Alto Networks Unit 42, the companys cybersecurity division specializing in threat intelligence and incident response, has uncovered that these scams are designed to steal sensitive information, including credit card and bank account details.What started as a scheme involving fraudulent toll payment notifications has now expanded to include fake delivery service alerts, tricking users into clicking malicious links.The scam appears to be operated by local cybercriminals using a toolkit developed by Chinese hacking groups. Notably, research from Unit 42 shows that many of the scam's root domains and fully qualified domain names use the Chinese .XIN top-level domain (TLD).6 ways you can protect yourself from smishing scams1. Verify before you trust:Treat unsolicited texts with caution. If a message claims to be from a government agency or company, dont click any links or act immediately. Instead, verify the claim by contacting the organization directly using an official phone number or checking their verified website.2. Avoid clicking suspicious links and use strong antivirus software:Scammers use links to direct you to fake websites that can steal your personal or financial information. Instead of clicking on any link in an unexpected text, manually type the known URL into your browser or search for the organizations official website.GET FOX BUSINESS ON THE GO BY CLICKING HEREThe best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Keep your devices secure:Regularlyupdate your devices operating systems and apps to ensure you have the latest security patches. Consider installing reputable security software that can help detect phishing attempts and warn you about potentially dangerous websites or messages.4. Use a password manager:A trusted password manager can help protect your sensitive information by automatically filling in credentials only on verified sites. This minimizes the risk of entering details on fraudulent websites and can alert you if a site doesnt match whats expected. Get more details about mybest expert-reviewed Password Managers of 2025 here.5. Report suspicious activity:If you receive a text that seems off, report it immediately to your mobile carrier, local law enforcement or the FBIs Internet Crime Complaint Center (IC3). Reporting helps authorities track down scammers and prevent further attacks.6. Consider using a personal data removal service: Personal data removal services can help reduce your exposure to smishing attacks by removing your sensitive information like phone numbers, addresses and email details from data broker websites. Scammers often rely on these publicly available databases to target victims with personalized phishing texts. These services arent foolproof, but they can make it harder for cybercriminals to find and exploit your information. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurts key takeawaysI've been tracking these smishing scams, and it's clear they're evolving fast, from fake parking fines to bogus toll notifications. With the FBI and cities like New York, San Francisco and others sounding the alarm, I'm stepping up my own security game. As a general rule, if you receive a text from an unknown number or email address that's an out-of-the-blue greeting, asks you to click a link, pay a bill or respond in any way, just block it and report the number. It's better to be safe than sorry when it comes to protecting your personal information.CLICK HERE TO GET THE FOX NEWS APPDo you feel that mobile phone providers and tech companies are doing enough to protect users from these types of scams? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·100 Views
-
AI dashcams enhance trucker safety while raising privacy concernswww.foxnews.comTech AI dashcams enhance trucker safety while raising privacy concerns New technology raises concerns about privacy and constant monitoring Published March 15, 2025 6:00am EDT close AI dashcams make roads safer for truckers, but at what cost to privacy There are concerns about how the technology might affect personal space and data security. The trucking industry is in the midst of a technological revolution, thanks to the arrival of artificial intelligence-powered dashcams.These innovative devices promise to make roads safer and operations more efficient, but they also raise some important questions about privacy.For truck drivers, other motorists and even pedestrians, there are valid concerns about how this technology might affect their personal space and data security.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW AI dashcam system (Motive)The promise of AI dashcamsAI dashcams are transforming road safety and fleet management through advanced computer vision technology. These smart devices, equipped with both inward- and outward-facing cameras, can detect a wide range of unsafe driving behaviors.The outward-facing cameras are capable of detecting rolling stops, unsafe lane changes and potential collisions, while the inward-facing cameras monitor driver drowsiness, distraction, seatbelt violations and smoking. The accuracy of these systems is impressive, with detection rates ranging from 88% to 99.5% and false positives as low as 0.5% to 12%.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?FusionSite Services, a waste management provider, installedMotive's AI dashcam system across their 800-unit fleet, resulting in a significant reduction in accidents and unsafe behaviors. Specifically, it saw an 89% decrease in accidents and a 92% decrease in unsafe behaviors, highlighting the tangible impact of this technology on safety. AI dashcam system (Motive)Privacy concernsDespite the safety benefits, the installation of AI dashcams raises significant privacy issues. Many truck drivers view their vehicles as second homes, especially long-haul drivers who spend extended periods on the road. The constant presence of cameras in their workspace raises concerns about perceived invasion of privacy in personal space, fear of constant surveillance and micromanagement and worries about data security and potential misuse of collected information.The use of outward-facing cameras also affects the privacy of other road users because they may record private citizens without consent. There is a risk of data breaches exposing personal information or location data and concerns about how footage might be used or shared. These concerns underscore the need for careful consideration of privacy rights when deploying such technology.To address some of these privacy concerns, Motive has implemented features such as Driver Privacy Mode, which allows drivers to disable the driver-facing camera while off duty. Additionally, Motive's AI dashcam system includes privacy controls and the option to activate Driver Privacy Mode for individual drivers, groups or entire fleets. Motive's AI dash cam also incorporates blurring technology to protect the privacy of individuals captured in the footage, further addressing concerns about recording private citizens without consent.GET FOX BUSINESS ON THE GO BY CLICKING HERE AI dashcam system (Motive)Legal and ethical considerationsThe implementation of AI dashcams must navigate a complex landscape of legal and ethical considerations. In some jurisdictions, like California, the use of such cameras is not considered a violation of state laws. However, in Illinois, a lawsuit has been filed against Samsara, alleging violations of the Biometric Information Privacy Act (BIPA) for capturing and storing drivers' facial scans without proper consent. This highlights the importance of understanding and complying with local regulations when using AI dashcams. AI dashcam system (Motive)Balancing safety and privacyTo address privacy concerns while maintaining safety benefits, companies should develop clear policies on camera usage and data access. Cameras should only record during specific events rather than continuously, and robust data security measures must be established to prevent breaches and misuse.Providing comprehensive training to drivers on the purpose and benefits of the technology is also crucial. Open communication and trust between management and drivers are essential for fostering a positive environment where both safety and privacy are respected.As reported byThe Trucker, an authority on all things in the trucking and freight industry, "Truck drivers are not much different than the rest of us in our desire to adapt to technological advances. At first, they don't want to, and some may go as far as getting out of the business. Eventually, like many of us, once we do adapt to the changing landscape, it soon becomes second nature.However, a driver-facing camera may be too much of an invasion of personal privacy." AI dashcam system (Motive)Kurt's key takeawaysAI dashcams represent a significant advancement in road safety technology, offering tangible benefits in reducing accidents and improving driver behavior. However, the implementation of these systems must be carefully balanced against privacy concerns. As the technology continues to evolve, it is crucial for companies, policymakers and drivers to work together to establish guidelines that protect individual privacy while harnessing the safety potential of AI dashcams. The future of trucking safety lies in finding this delicate balance between technological innovation and personal privacy rights.CLICK HERE TO GET THE FOX NEWS APPWhat are your thoughts on the balance between safety and privacy when it comes to using AI dashcams in trucking?Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·129 Views
-
Apple releases emergency security update for serious vulnerabilitywww.foxnews.comTech Apple releases emergency security update for serious vulnerability Apple patches zero-day vulnerability in iPhones and iPads: What you need to know Published March 14, 2025 10:00am EDT close 'CyberGuy': Is that iPhone app spying? What Apple's App Privacy Report can tell you Tech expert Kurt Knutsson urges you to use Apples App Privacy Report to see what your apps are really up to. If you own an iPhone or iPad, its time to stop what youre doing and update your device.A newly discovered security flaw, CVE-2025-24201, could leave your personal information vulnerable to hackers.The good news? Apple has released iOS 18.3.2 and iPadOS 18.3.2 to fix the issue. Let me explain what all this means for you and how you can stay protected.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW IOS 18.3.2 software update on iPhone (Kurt "CyberGuy" Knutsson)What is CVE-2025-24201?This vulnerability resides in WebKit, the open-source browser engine that powers Safari, Mail, App Store and other apps on Apple devices. The flaw is an out-of-bounds write issue, which allows attackers to use maliciously crafted web content to bypass the Web Content sandbox, a key security layer that isolates web content from accessing sensitive system resources. Apple has acknowledged thatthis vulnerability may have been exploited in highly advanced attacks targeting specific individuals using older versions of iOS before 17.2. These attacks are believed to involve well-funded threat actors, such as state-sponsored hackers or advanced cybercriminal groups.Why does this matter?Zero-day vulnerabilities like CVE-2025-24201 are particularly dangerous because they are exploited before developers can patch them. In this case, the attacks were highly targeted, meaning most users are unlikely to have been affected directly. However, these incidents underscore the importance of regularly updating your devices to stay protected against evolving threats.Who is affected?The vulnerability impacts a wide range of Apple devices, including:iPhone XS and lateriPad Pro 13-inch, iPad Pro 12.9-inch 3rd generation and late-r, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 7th generation and later and iPad mini 5th generation and later.If you own any of these devices, it's crucial to update your software immediately.What is Apple doing about it?Apple released emergency patches on March 11, 2025, as part of iOS 18.3.2 and iPadOS 18.3.2 updates. These updates introduce improved checks to prevent unauthorized actions caused by the vulnerability. This patch is a supplementary fix for an earlier attack mitigated in iOS 17.2.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Software update notice (Kurt "CyberGuy" Knutsson)How to update your software on iPhoneGo toSettingsTapGeneralClickSoftware UpdateDownload and install the latest updateYour iPhone willrestart once the update is complete Steps to update software on iPhone (Kurt "CyberGuy" Knutsson)GET FOX BUSINESS ON THE GO BY CLICKING HEREHow to update your software on iPadGo to theSettings app on your iPadTap GeneralThen clickSoftware UpdateTapDownload and Install to begin the update processEnter your passcode if prompted andagree to the terms and conditionsThe update willdownload and installYour iPad willrestart once the update is completeAdditional security measures to protect your iPhone and iPad1. Enable two-factor authentication: Turn ontwo-factor authentication for your Apple ID to add an extra layer of security to your account.2. Have strong antivirus software:The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Use a strong passcode: Set up astrong alphanumeric passcode instead of a simple four-digit PIN. Avoid using easily guessable information like birth dates.4. Enable face ID or touch ID: Utilizebiometric authentication to prevent unauthorized access to your device.5. Manage app permissions: Regularlyreview and adjust app permissions to ensure they only access necessary data.6. Secure lock screen notifications: Disable or limit sensitive information displayed in lock screen notifications.7. Use Apple's App Privacy Report:Apples App Privacy Report is a powerful tool that allows iPhone users to monitor how apps access their data and interact with third-party services. This feature provides valuable insights into app behavior, helping you make informed decisions about your privacy.8. Download apps from official sources: Only install apps from the Apple App Store to avoid potential malware.9. Keep your Apple ID secure: Never share your Apple ID or password with others, even family members.10. Enable Find My iPhone: EnsureFind My iPhone is activated to help locate your device if it's lost or stolen.11. Invest in a password manager: To go beyond iClouds keychain for increased security, youll want to invest in a password manager. These are created specifically for the protection of passwords and include features for important documents and photos. This is also beneficial when sharing private data with family members. Get more details about mybest expert-reviewed password managers of 2025 here.Kurts key takeawaysWhile it might be tempting to put off updates, you dont want to delay this one. CVE-2025-24201 is a serious threat that's already been used in the wild. Sure, you might not be a high-profile target, but why take chances with your personal data? Updating your device is like giving it a digital suit of armor, and it only takes a few minutes. So, hit that update button and give yourself some peace of mind.CLICK HERE TO GET THE FOX NEWS APPDo you think Apple is doing enough to stay ahead of evolving cyber threats, or are there additional steps the company should take to protect its users?Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Alert:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·80 Views
-
Solar-powered roof wraps new mega-modern opera housewww.foxnews.comTech Solar-powered roof wraps new mega-modern opera house Can this solar-powered opera house help environment, lower costs long term? Published March 14, 2025 8:00am EDT close Solar-powered roof wraps new mega-modern opera house Theater in Pritina is a modern symbol of national pride. In the heart of Pritina, the capital of Kosovo, a small country in Southeast Europe, an architectural and cultural revolution is underway.The Kosovo Opera and Ballet Theatre, recently unveiled, promises to become a landmark not just for the city but for the entire region.As the first opera house in Kosovo, this project represents a monumental step forward for a nation that has been steadily building its cultural identity since gaining independence in 2008.Combining cutting-edge technology, sustainable design and a deep connection to local traditions, the theater is poised to captivate audiences from around the world.STAY SAFE & IN THE KNOW AT NO COST! SUBSCRIBE TO KURTS THE CYBERGUY REPORT FOR FREE SECURITY ALERTS & TECH TIPS The Kosovo Opera and Ballet Theatre (Bjarke Ingels Group)A solar-powered symbol of traditionThe theaters most eye-catching feature is its flowing, undulating roof, which spans an impressive area and is entirely clad in solar panels. These photovoltaic panels are designed to generate renewable energy on-site, significantly reducing the buildings environmental impact while also lowering its operational costs.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The roofs design is more than just functional; it takes inspiration from the xhubleta, a traditional bell-shaped skirt worn by women in Kosovo. This cultural reference transforms the structure into a modern symbol of national pride while creating an exterior that is both elegant and dynamic. The roofs soft curves intuitively guide visitors toward key entrances and spaces, making navigation seamless and inviting from every angle. The Kosovo Opera and Ballet Theatre (Bjarke Ingels Group)Architecture that balances beauty and functionalityInside, the theater is designed to deliver an unparalleled experience for performers and audiences alike. The central foyer, illuminated by a massive skylight, serves as a welcoming hub that connects all four performance spaces. These include a 1,200-seat Concert Hall, a 1,000-seat Theatre Hall, a 300-seat Recital Hall and a flexible Theatre Room. Each space is crafted with meticulous attention to acoustics and sightlines to ensure every performance feels intimate and immersive.The interior design features curved wooden elements that not only add sculptural beauty but also enhance sound quality throughout the venue. The use of natural materials like timber creates a warm and cohesive atmosphere, while deep velvet upholstery and acoustic curtains add both comfort and functionality.GET FOX BUSINESS ON THE GO BY CLICKING HERE The Kosovo Opera and Ballet Theatre (Bjarke Ingels Group)Connecting culture with communityThe theater does not stand alone; it has been carefully integrated into its urban surroundings to serve as both a cultural hub and a public gathering space. Located near major landmarks like the Palace of Youth and Sports and Fadil Vokrri Stadium, the building sits at the heart of Pritinas emerging cultural district. A large public staircase connects the theater directly to Garibaldi Street, improving pedestrian access while creating an inviting plaza where locals and visitors can gather. The existing podium of the nearby Palace of Youth has been extended to merge with the theaters base, further enhancing connectivity and activating the area as a vibrant public space.The surrounding landscape has been thoughtfully designed to complement the buildings architecture while promoting biodiversity. Natural stone paving is interspersed with planted islands featuring beech trees and other vegetation native to the region. These green spaces provide shade during warmer months while adding seasonal variety to the environment. (Bjarke Ingels Group)A collaborative visionThe Kosovo Opera and Ballet Theatre is a collaborative effort between some of Europes most innovative designers.Bjarke Ingels Group, an internationally renowned architecture firm based in Denmark, partnered with ALB-Architect to bring this vision to life. Commissioned by Kosovos Ministry of Culture, Youth, and Sport, the project reflects a shared commitment to creating a space that meets both artistic and community needs. Bjarke Ingels himself described the theater as "an efficient factory for artistic performances," emphasizing its adaptability and functionality alongside its striking visual appeal. The Kosovo Opera and Ballet Theatre (Bjarke Ingels Group)Kurt's key takeawaysThe Kosovo Opera and Ballet Theatre is truly a remarkable blend of modern technology and sustainable practices, all while paying homage to local traditions. With its stunning solar-powered roof and inviting spaces designed for artistic excellence and community engagement, this theater is set to shine as a beacon of innovation in Southeast Europe and beyond. As Kosovo carves out its place on the international cultural map, this landmark is sure to play a vital role in shaping the future narrative of the nation.CLICK HERE TO GET THE FOX NEWS APPCould integrating solar technology into iconic buildings, like this opera house, change how we view renewable energy in the U.S., or is it just architectural eye candy? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·88 Views
-
Dangerous Chrome extensions mimic password managerswww.foxnews.comPublished March 13, 2025 10:00am EDT close Google Chrome privacy tricks Kurt the CyberGuy explains how to increase your security and privacy through Google Chrome on your devices when browsing the web. Chrome extensions are incredibly useful, whether you want to block ads, track the best deals orenhance your browsing experience. They can be downloaded from the Chrome Web Store, which functions like the Play Store but for extensions. However, extensions are easier to mimic and turn into malicious software compared to apps.As we just reported, over 3.2 million users were victimized by a security breach tied to16 malicious browser extensions, highlighting how attackers exploit tools that seem legitimate to spread malware or steal sensitive data.Now, security researchers have discovered a polymorphic attack that allows malicious Chrome extensions to transform into other browser extensions, including password managers, crypto wallets and banking apps, to steal sensitive information.Keep reading to learn how this attack works and how to protect yourself from it.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Chrome browser on smartphone (Kurt "CyberGuy" Knutsson)How the malicious polymorphic attack worksSecurity researchers atSquareX Labs have found a new attack that lets malicious Chrome extensions disguise themselves as legitimate ones, like password managers, crypto wallets and banking apps, to steal sensitive information. This "polymorphic" attack takes advantage of Chromes extension system to trick users while staying under the radar.The attack starts with hackers uploading what looks like a harmless extension to the Chrome Web Store. It might even have real features, like an AI-powered marketing tool, to convince users to install and pin it to their browser.Once installed, the malicious extension scans the victims browser for other extensions. It can do this in two ways. If it has permission to use the "chrome.management" API, it grabs a list of installed extensions directly. If not, it injects code into web pages to check for unique files or resources tied to certain extensions.If it finds a targeted extension, like 1Password, the malicious extension reports back to an attacker-controlled server. The attacker then tells it to impersonate the real extension by disabling it if permissions allow, changing its name and icon and displaying a fake login popup that looks just like the real thing. Fake extension page (SquareX)Social engineering makes things worseTo steal user credentials, the malicious extension triggers a fake "Session Expired" prompt when the victim tries to log in to a website. This tricks them into thinking they need to reenter their credentials for their password manager or banking app. When they do, the stolen data is sent straight to the attackers.After collecting the credentials, the extension switches back to its original form. It restores the legitimate extension, making everything look normal so the victim doesnt suspect anything. This shows just how dangerous malicious Chrome extensions can be and why stronger security measures are needed to protect users.We reached out to Google, and a spokesperson told CyberGuy,"We appreciate the work of the research community and we've received the report. We are constantly investing in ways to improve the security of the Chrome Web Store, and we take appropriate action when we learn of emerging threats."WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Google Chrome extension on a laptop (Kurt "CyberGuy" Knutsson)5 ways you can protect your personal dataHere are five ways to safeguard your sensitive information and maintain your online privacy.1.Keep your browser and extensions up to date: Outdated software is a goldmine for cybercriminals. Bugs or security gaps in old versions of your browser or extensions can be exploited to inject malicious code, steal data or take control of your system. Updates patch these vulnerabilities, making them a critical line of defense. Turn on automatic updates for your browser (e.g., Chrome, Firefox, Edge) so youre always running the latest version without thinking about it. See my guide onkeeping your devices and apps updated for more information.2. Install extensions only from trusted sources:Official browser stores like the Chrome Web Store or Firefox Add-ons have rules and scans to catch bad actors, but theyre not perfect. Extensions from random websites or third-party downloads are far more likely to hide malware or spyware. Stick to the official store for your browser; dont download extensions from sketchy links.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Have strong antivirus software:The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Update your passwords: Change passwords for any accounts that may have been affected by the extension and use unique, strong passwords for each account. Consider using a password manager. This can help you generate and store strong, unique passwords for all your accounts. Get more details about mybest expert-reviewed password managers of 2025 here.5.Invest in personal data removal services: If your personal data gets stolen by the extension, its crucial to act quickly to reduce your risk of identity theft and scams. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurts key takeawayThe malicious extension highlights that Google isnt doing enough to keep malware off its platform. Security researchers pointed out that the Chrome Web Store lacks protections against these types of attacks, such as blocking sudden changes to an extensions icon or HTML, or at least alerting users when such changes occur. The problem isnt limited to the Chrome Web Store. The Play Store also hosts malicious apps from time to time, affecting millions of users. Google needs to step up its security efforts and put user privacy front and center.CLICK HERE TO GET THE FOX NEWS APPDo you trust Google to keep malicious apps and extensions off its platforms? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·69 Views
-
Ready to drive without your hands on the wheel or eyes on the road?www.foxnews.comTech Ready to drive without your hands on the wheel or eyes on the road? Imagine relaxing while your car takes care of the road Published March 13, 2025 6:00am EDT close AI dashcams make roads safer for truckers, but at what cost to privacy? Stellantis unveils its STLA AutoDrive 1.0 system, which the company hopes will revolutionize the way we drive. Are you ready to use your daily commute to catch up on your favorite show, respond to emails or simply enjoy the view without worrying about the road ahead?This vision of the future is becoming increasingly real thanks to advancements in autonomous driving technology. Stellantis, the parent company of brands like Dodge, Jeep and Chrysler, has just unveiled its STLA AutoDrive 1.0 system, which the company hopes will soon revolutionize the way we drive. STLA AutoDrive 1.0 system (Stellantis)The future of driving is here ... almostStellantis has developed its cutting-edge Level 3 automated driving system. This innovative technology allows motorists to safely take their eyes off the road and hands off the wheel. Stellantis' STLA AutoDrive 1.0 system is designed to handle driving tasks autonomously at speeds of up to 37 mph in traffic and on highways under certain conditions. This means drivers can potentially engage in activities like watching movies, reading books or catching up on emails during their commute.GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX.SIGN UP FOR KURT'S THE CYBERGUY REPORT NOWThe system will manage steering, acceleration, braking and maintain safe distances from other vehicles without human intervention.However, there's a catch: Despite being fully developed and ready for deployment, Stellantis isn't launching these features just yet. The company cites a limited market for Level 3 autonomous driving as the reason for holding back, that they'll introduce the technology once the market becomes more receptive.GET FOX BUSINESS ON THE GO BY CLICKING HERE STLA AutoDrive 1.0 system (Stellantis)What sets STLA AutoDrive apart?STLA AutoDrive offers several impressive features that make it stand out in the world of autonomous driving. It offers hands-free and eyes-off functionality at speeds of up to 37 mph, allowing drivers to completely disengage from driving tasks. The system is designed to work at night and in light rain, providing reliable performance in various weather conditions.Additionally, an automated sensor-cleaning system ensures that critical components remain clear for optimal reliability and functionality. Built on a cloud-connected platform, STLA AutoDrive can receive over-the-air updates to improve its capabilities, making it a scalable and adaptable technology. Furthermore, Stellantis hints at potential upgrades that could enable operation at speeds of up to 59 mph and even off-road automation. STLA AutoDrive 1.0 system (Stellantis)The challenges of Level 3 autonomyLevel 3 autonomy, often referred to as "conditional automation," presents unique challenges. The system can only be activated under certain driving conditions, requiring specific environmental and traffic criteria to be met. Also, drivers must remain alert and prepared to take control at a moment's notice, which can be a difficult standard to maintain. Regulatory authorities also face challenges in setting and enforcing standards for this level of autonomy, as it requires a delicate balance between safety and technological innovation. STLA AutoDrive 1.0 system (Stellantis)The race for autonomous drivingStellantis isn't alone in the pursuit of Level 3 autonomy. Mercedes-Benz was the first to launch an SAE Level 3 system in commercial vehicles in Europe and the U.S. in 2023. Other major automakers, including Honda, Ford, GM, Volvo, Sony, Kia and Xpeng, are also developing their own Level 3 systems, indicating a competitive and rapidly evolving landscape in the automotive industry.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?What this means for driversWhen STLA AutoDrive eventually hits the market, it could significantly change the driving experience. Automated driving in heavy traffic could make commutes less stressful, allowing you to relax or engage in other activities. Additionally, you might be able to use travel time more efficiently, whether that means catching up on work or enjoying leisure activities. Enhanced safety is another potential benefit, as advanced sensors and AI could reduce human error and improve overall road safety. STLA AutoDrive 1.0 system being used at night (Stellantis)Kurt's key takeawaysStellantis' STLA AutoDrive is no doubt a significant milestone toward fully autonomous vehicles. While the technology is ready, the market and regulatory landscape are still catching up. As automakers continue to push the boundaries of what's possible, we're inching closer to a future where cars truly drive themselves. However, the transition will likely be gradual, with safety and consumer acceptance playing crucial roles in the widespread adoption of Level 3 and beyond autonomous driving technologies.CLICK HERE TO GET THE FOX NEWS APPAre you ready to take your hands off the wheel and let technology do the driving? Why or why not? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·126 Views
-
Im a tech pro and these are my secrets to better flights and luxury travelwww.foxnews.comclose Hot overseas travel spots for 2025 With warmer months on the way, it's time to think about summer travel. FOX Business correspondent Kelly Saberi reports. My dad worked for United Airlines, so I grew up on airplanes. Ive explored 38 countries and counting, with plenty more on my bucket list. Lucky for us both, Im cheap, so I know all the tricks to save money.Spring break is around the corner, and Sundays are the best day to book trips, so lets talk travel hacks and score you some great deals.IS YOUR PHONE LISTENING TO EVERYTHING YOU SAY? ITS COMPLICATEDWin an iPhone 16 Pro with Apple Intelligence ($999 value).No purchase necessary.Enter to win now!Scoring a great flight deal isnt just about luckAirlines constantly adjust prices based on demand, timing, and even the day of the week. A little flexibility and some smart planning can mean big savings. Before you book, try these proven strategies.Set up price alerts:Google Flights andKayak will email you when prices drop. The best time to book? One to three months ahead for domestic flights and four to six months out for international. A woman is seen using a laptop to book travel. (iStock)Fly on the cheap days: Tuesdays, Wednesdays and Saturdays are usually the cheapest. Red-eyes and early morning flights also cost less and are less likely to be delayed or canceled.Be flexible:TryGoogles Explore feature to spot budget-friendly dates.Skyscanners Cheapest Month tool is neat. Instead of choosing a date, click Flexible Dates and watch the prices fluctuate.Hidden-city ticketing (use with caution):Skiplagged finds flights where your destination is a layover, which can save you cash. Just dont check a bag. It wont follow you.Check for 24-hour price drops:Booked a flight? Some airlines let you cancel within 24 hours for free. If you find a lower price, cancel and rebook. Easy savings.IM A TECH EXPERT: 10 AI PROMPTS YOULL USE ALL THE TIMEOr use Googles guarantee.Certain flights are eligible. After you book a trip, Google monitors the price until the first flight in your itinerary departs. If the price drops, the company will make up the difference. Select a badged flight from Departing flights (the badge is a colorful shield surrounding a dollar sign). Make sure you pick a badged itinerary through checkout.Charging and travel: 5 malware mistakes most people makeLets upgrade your tripOK, the flight is booked and your bags are packed. Lets make your travel even better, easier and less stressful.I download the official app for every airline I fly: Heres a pro tip. Look for the live activities feature in your app of choice. This generally gives you a countdown until boarding time and a real-time view of your gate and seat info in case anything changes at the last minute. A plane is pictured departing from a travel destination. (iStock)Airport charging is dicey.Newer phones are smart enough to be wary of an unknown USB connection. Theyll ask if you want to "trust this device" or "share data." Always say "No" to these options when traveling! Both allow data communication between your phone and the charging hardware, which may have implanted malware. Choose the "charge-only option." If thats not available, keep walkin.Traveling solo?Share your location with your family and friends. On iPhone, open the Find My app and tap People (bottom of the screen) > + (plus icon) > Share My Location. Then, select a contact, hit Send and choose the duration. In Google Maps, tap your profile icon(top right) > Location sharing > New Share and send the link through your messaging app.Skip the lines at U.S. Customs: TheMobile Passport app is your secret weapon. Its free, secure, and lets you submit your passport and customs info right from your phone no forms needed! Plus, you get access to fast-track lanes at participating airports and cruise ports.10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEARRELATED: Read this before you book an UberVIP experience secretsNow, if "budget" is not in your lexicon, you can bypass a lot of airport hassles.PS (Private Suite) at LAX and ATLGet private TSA screening and a terminal with no lines. Think velvet couches and chilled champagne. Board via a private car on the tarmac and have a similar arrival service.PS costs about $4,000 for the first passenger. Its an Amex Centurion cardholder perk, and thats how I get to use it.Airport Butler/Royal Airport Concierge fast-track serviceRoyal Airport Concierge meets you at the curb, handles your luggage, escorts you through security and takes you to a VIP lounge. A woman is pictured walking through an airport with her suitcase. (iStock)Delta VIP SelectEnjoy a private check-in lounge with champagne, canaps, private TSA screening and a ride to the plane on the tarmac.Costs $500 for the first passenger and $100 for each additional one.Heres a video about it.United Global ServicesIts invitation-only offering private check-in for United Airlines Global Services members.Hawaiian Airlines Premium Airport ServiceCheck-in is completed before you arrive, with priority baggage handling, expedited TSA lines and an escort to your gate. You get access to a private lounge featuring a liquor menu, meals and showers.Prices start at $500 for two with the option to use HawaiianMiles.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours or get the free podcast.Daily newsletter:Join 650,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "The Current powered by Kim Komando" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.0 Comments ·0 Shares ·110 Views
-
Fox News AI Newsletter: Laser-wielding robots are redefining farmingwww.foxnews.comRecommended By Fox News Staff Fox News Published March 12, 2025 11:59am EDT close Robot uses lasers to make chemical-free farming a reality Game-changing technology figures to revolutionize weed control. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Robot uses lasers to make chemical-free farming a reality- Kamala Harris roasted for trying to tie love of Doritos to Big Tech innovation during AI conference- Chinese humanoid robot lands worlds first front flip LaserWeeder G2 (Carbon Robotics)FARMING MEETS SCI-FI: TheLaserWeeder G2 builds on the success of its predecessors to bring submillimeter weed control to a wider range of farms, crops and soil types.CHIPS ACT: Former Vice President Kamala Harris was roasted for delivering another "word salad" on a public stage after trying to tie the "innovation" of Big Tech to her love of nacho cheese Doritos during an artificial intelligence conference. PM01 humanoid robot performing a front flip (EngineAI)FRONT-FLIPPING ROBOT: Chinese robotics company Zhongqing Robotics, also known as EngineAI, has officially entered the humanoid robotics scene by releasing a video showcasing what it claims is the world's first humanoid robot front flip.FIGHT TO SAVE KIDS: Australia's Murdoch Children's Research Institute is helping scientists use stem cell medicine and artificial intelligence to develop precision therapies for pediatric heart disease, the leading cause of death and disability in children. The Mallinsons (Fox News)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.0 Comments ·0 Shares ·110 Views
-
Malware steals bank cards and passwords from millions of deviceswww.foxnews.comTech Malware steals bank cards and passwords from millions of devices At least 25 million users were targeted between 2023 and 2024 Published March 12, 2025 10:00am EDT close New malware threat targets Mac users via fake browser updates Kurt "CyberGuy" Knutsson joins "Fox & Friends" to warn Americans about a new information-stealing threat to Mac users. Infostealer malware is one of the biggest cybersecurity threats right now. There are different types of this malware, and it comes with all sorts of names. Some are even sold as software services, where hackers pay monthly fees to use them to scam people, just like you pay to access Netflix.The infostealer malware economy is clearly booming, and the latest evidence of that is a Kaspersky report claiming that at least 25 million users were targeted between the start of 2023 and the end of 2024.Infostealers are designed to capture any valuable information, including bank card details, passwords and sensitive media.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURT'S THE CYBERGUY REPORT NOW A man using his bank card online (Kurt "CyberGuy" Knutsson)What you need to knowA newlypublished report from Kaspersky Digital Footprint Intelligence reveals that nearly 26 million devices fell victim to infostealer malware across 2023 and 2024. Along with this, more than 2 million unique bank card details were leaked. Perhaps the most alarming statistic is that one in every 14 infections resulted in stolen bank card data. The stolen information didnt stop there. Passwords, second-factor authentication cookies and other sensitive credentials were also compromised.Kaspersky analysts pointed out that 2024 saw a sharp rise in infections driven by certain malware strains. RisePro, which made up only 1.4% of infections in 2023, surged to 22.45% in 2024. Stealc, a newer threat first detected in 2023, also gained traction, increasing its share from 2.65% to 13.33%. Despite these emerging threats, Redline remained the most widespread infostealer, responsible for 34.36% of all infections. A woman using her credit card to shop (Kurt "CyberGuy" Knutsson)Infostealer malware is surging at an unimaginable paceBy August 2024, researchers estimated that 15.9 million devices had been hit by infostealer malware in 2023. But by March 2025, that number had climbed to 16.49 million, surpassing earlier predictions by 3.69%. New log files from 2023 are still popping up on dark web platforms, suggesting the actual number of infections was even higher than expected. As of March 2025, researchers have tracked more than 9 million infections from 2024. The final count is expected to surpass 2023s numbers, but not by a huge margin.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)6 ways you can protect your bank cards and passwordsWith the alarming rise in infostealer malware infections and the increasing sophistication of cybercriminals, it's crucial to take proactive measures to protect your sensitive information. Here are six effective ways to safeguard your bank cards and passwords.1. Have strong antivirus software: Install and regularly update strong antivirus software on all your devices. Antivirus software can help detect and prevent infostealer malware infections. Be sure to perform regular scans to identify and remove potential threats. The best way to safeguard yourself from malicious links that install malware potentially accessing your private information is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Use virtual cards for online payments: Instead of using your actual bank card, generate virtual cards through your bank or a service like Privacy.com. These temporary cards limit exposure in case of a data breach.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Enable transaction alerts and spending limits:Set up real-time alerts for transactions and daily spending limits on your cards. This way, youll be notified immediately of any unauthorized activity.4. Never store card details in browsers:Infostealers target autofill data in Chrome, Edge and Firefox. Always deny the pop-up that asks to "save payment info" and use a secure password manager instead. You may also want to take advantage of additional digital security measures such astwo-factor authentication. Newer types of authentication, such as Face ID and Touch ID, are slowly replacing passwords as a legitimate means to grant a person access to sensitive financial information.5. Be smart about passwords: Simply employing all the password rules wont prevent a breach, but since you dont know exactly what information thieves are looking for, it cant hurt. You should use strong passwords and change them frequently. I recommend using a password manager to generate and store strong passwords. Get more details about mybest expert-reviewed password managers of 2025 here.6. Invest in personal data removal services: While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurts key takeawayInfostealers are a major threat to everyone online, and they are also quite common. However, since this malware often disguises itself as legitimate apps or uses social engineering tricks, its easy to get fooled. Even the most cautious individuals can fall victim to a well-executed campaign. The best way to stay safe is to exercise caution when browsing online, downloading apps or making online transactions. Using tools like a password manager and antivirus software can also help enhance security and make your life easier.CLICK HERE TO GET THE FOX NEWS APPDo you use a password manager, or do you still rely on memorizing passwords or writing them down? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·115 Views
-
Robot uses lasers to make chemical-free farming a realitywww.foxnews.comTech Robot uses lasers to make chemical-free farming a reality How this new farming tech is redefining weed control and sustainability Published March 12, 2025 6:00am EDT close Robot uses lasers to make chemical-free farming a reality Game-changing technology figures to revolutionize weed control. Imagine a future where farming is not only more efficient but also cleaner and greener.That's exactly what Carbon Robotics is promising with its latest innovation, the LaserWeeder G2. This game-changing technology figures to revolutionize weed control by ditching chemicals altogether.It's a solution that's both good for the planet and great for farmers looking to reduce their environmental footprint.GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX.SIGN UP FOR KURTS THE CYBERGUY REPORT NOW LaserWeeder G2 (Carbon Robotics)A new era of precision farmingTheLaserWeeder G2 builds on the success of its predecessors to bring submillimeter weed control to a wider range of farms, crops and soil types. By harnessing the power of lasers, artificial intelligence and advanced robotics, the G2 offers an alternative to traditional herbicides and labor-intensive manual weeding. It is equipped with powerful 240-watt lasers that can destroy weeds with pinpoint accuracy. The G2 also features high-resolution cameras and enhanced optics for precise weed identification, utilizing Carbon AI that processes over 40 million labeled plants for accurate detection. Additionally, it includes target and predict cameras for weed identification.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The G2 operates effectively day or night, thanks to its LED lighting system, and its modular design supports widths from 6.6 to 60 feet, making it adaptable to various farm sizes and needs. Underneath its sleek exterior, the LaserWeeder G2 boasts a GPS/LTE antenna for precise positioning, a chiller system for temperature control, self-contained weeding modules, satellite internet connectivity for real-time updates and an electrical cabinet that houses advanced processing units. LaserWeeder G2 (Carbon Robotics)The science of laser weedingThe LaserWeeder G2 doesn't just remove weeds; it obliterates them. Using optimal thermal energy, the laser explodes cell walls at the meristem, effectively killing the weed from the inside out. This method is not only effective but also prevents regrowth. The company claims an impressive 80% reduction in yearly weed control costs and a 99% kill rate on all types of weeds. Moreover, the LaserWeeder G2 offers models tailored for over 100 specialty crops.The LaserWeeder G2 is versatile, capable of working with a wide range of crops, including leafy greens, onions, carrots and brassicas. This adaptability makes it a valuable asset for farmers who cultivate diverse crops. LaserWeeder G2 (Carbon Robotics)Beyond weeding: LaserThinningThe G2 isn't just a one-trick pony. Its LaserThinning feature allows it to eliminate 99% of unwanted plants, operate continuously day and night and simultaneously thin and weed crops. This capability makes it a versatile tool for farmers looking to optimize their crop management.GET FOX BUSINESS ON THE GO BY CLICKING HERE LaserWeeder G2 (Carbon Robotics)Real-world impactFarmers are already seeing the benefits of laser weeding technology. Tanimura & Antle, a leading fresh produce company, has integrated the LaserWeeder into their operations. Scott Rossi, VP of northern farming operations, praises the technology for its efficiency and contribution to sustainable farming practices. LaserWeeder G2 (Carbon Robotics)Safety firstWhile the LaserWeeder G2 is a powerful tool, it's important to note that it's classified as a class 4 laser product. Users must exercise caution to avoid eye or skin exposure to direct or scattered radiation. LaserWeeder G2 (Carbon Robotics)Kurt's key takeawaysBy offering a chemical-free, labor-reducing solution to weed control, the LaserWeeder G2 has the potential to transform farming practices worldwide. As we move towards more sustainable and efficient agricultural methods, innovations like the LaserWeeder G2 pave the way for a greener, more productive future in farming. With its impressive accuracy, adaptability and potential for cost savings, the LaserWeeder G2 could indeed be the future of farming. As more farmers adopt this technology and real-world data continues to accumulate, we may see a significant shift in how we approach weed control and crop management.Given the LaserWeeder G2's potential to drastically reduce pesticide use and improve crop quality, do you think there should be a major push or incentive program to encourage all farmers to adopt this laser technology? Why or why not? Let us know by writing us atCyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·129 Views
More Stories