Fox News
Fox News
Welcome to the official Fox News Facebook page. Get breaking news, must see videos & exclusive interviews from the #1 name in news.
  • 1 people like this
  • 72 Posts
  • 2 Photos
  • 0 Videos
  • 0 Reviews
  • News
Search
Recent Updates
  • WWW.FOXNEWS.COM
    Must-do privacy settings on your iPhone in iOS 18.1
    close Must-turn off privacy settings on your iPhone in iOS 18.1 AI The 'CyberGuy' walks you through which settings to adjust. With Apple rolling out the latest iOS 18.1 update, privacy has become an even hotter topic. The update introduces advanced AI capabilities through Apple Intelligence and Siri, giving your device more autonomy in understanding and learning from your behaviors.While this sounds promising, it also means that your iPhone might be capturing and analyzing sensitive information, especially if you have certain financial or health-related apps on your device.Well walk you through which settings to adjust, why its important and how to ensure that Apples AI isnt overstepping its boundaries with your personal data. Apple Intelligence on iPhone. (Apple)Why privacy matters more than ever in iOS 18.1iOS 18.1 brings a slew of AI-powered features aimed at enhancing your experience with Siri and Apple Intelligence, but its worth questioning: How much does your iPhone really need to know about you? If you're like most people, privacy is a top priority, especially when it comes to sensitive data such as banking information, health details and your location.When Apple Intelligence is enabled, it starts "learning" from your interactions with certain apps, creating a digital profile that can theoretically tailor your experience. This is a double-edged sword; while personalization might sound appealing, its crucial to consider what data Apples AI is learning and why you might want to limit its reach. Apple Intelligence and Siri on iPhone. (Kurt "CyberGuy" Knutsson)Apple Intelligence requirements for iPhoneDevices: iPhone 16, iPhone 16 Plus, iPhone 16 Pro, iPhone 16 Pro Max, iPhone 15 Pro or iPhone 15 Pro MaxSettings:Device language and Siri language set to a supported language.Storage: 4 GB available storage.Operating systems: iOS 18.1, update to iOS 18.1 viaSettings > General>Software Update.If available, tapUpdate Now and begin downloading and installing iOS 18.1 Steps to update your iPhones software. (Kurt "CyberGuy" Knutsson)Recommended apps to turn off 'Learn from this App'Financial apps: Banking and finance apps often contain highly sensitive information. Disabling learning on these apps prevents Apple Intelligence from accessing details about your transactions, account balances or other financial data.Health and fitness apps: Health-related apps can reveal personal information that you may not want to share with Apple Intelligence, even if its just being used for personalization.Location-based apps: Location data can be incredibly telling. Maps and similar apps often gather your location history, places you frequent and travel patterns. Turning off learning from these apps will help you avoid disclosing this information.The critical settings you need to changeApple Intelligence and Siri settings are at the heart of managing your data privacy. By navigating here, youre taking the first step in controlling what Apples AI can access. Heres how to protect your sensitive information from being used by Apple Intelligence and Siri:Open your iPhone and go toSettings.Tap onApple Intelligence and Siri.Enable Apple Intelligence bytoggling it on. Steps to enable Apple Intelligence. (Kurt "CyberGuy" Knutsson)Once youre in the Apple Intelligence section, scroll to the bottom and tapApps.These are all the apps that Apple Intelligence will learn from.Youll find a list of all the apps from which Apple Intelligence learns.Click oneach app andtoggle off next to "Learn from this App."Remember:Gray means off, andgreen means on. Steps to turn on "Learn from this App" on iPhone. (Kurt "CyberGuy" Knutsson)GET FOX BUSINESS ON THE GO BY CLICKING HEREHow to customize Siri and Apple Intelligence settingsEven if you turn off learning for certain apps, you may want to activate other AI settings selectively based on your preferences. For instance, some users prefer Siris suggestions for navigation but dont want AI involved with their social media or financial accounts. This customization is entirely up to you, but its essential to know where these toggles are and what each does.Why you should revisit these settings regularlyOne thing about privacy settings is that they can change with each software update. As Apple introduces more features, some apps may automatically gain access to Apple Intelligence. Its essential to check these settings periodically to ensure that no new permissions have been granted without your knowledge.Kurt's key takeawaysThe arrival of iOS 18.1 is exciting, especially with the enhanced AI features, but its crucial to stay vigilant about your privacy. Banking, health and location apps contain some of your most sensitive data, and allowing Apple Intelligence to learn from them might open up unintended risks. By turning off "Learn from this App" in settings, youre taking a proactive step to control your personal information. Remember, gray is off, green is on, and when it comes to privacy, sometimes its best to err on the side of caution.Revisit these settings occasionally to ensure they remain as you want them and stay in control of your data. Taking a few minutes to manage these settings today can go a long way in safeguarding your privacy in the future.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about the balance between convenience and privacy with AI features? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:KURT'S HOLIDAY GIFT GUIDESUnbeatable Best Black Friday dealsBest gifts forMen |Women |Kids |Teens |Pet loversBest deals:Laptops |DesktopsCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 15 Views
  • WWW.FOXNEWS.COM
    How your browser is spying on you: Hidden dangers lurking behind every click
    close CyberGuy shows how you can add ChatGPT to your browser Kurt Knutsson explains how ChatGPT's functions can help you in your day-to-day life. A browser is one of the most popular apps we use. It's the gateway between the internet and its users, translating raw code into something we perceive as a web page and allowing us to interact with the web. It's safe to say that anyone who uses the internet uses a web browser.But while this tool is extremely useful, it can also be equally dangerous. For example, clicking malicious links can redirect you to harmful websites that either steal personal information or infect your device with malware.If you use a search engine like Google through Chrome, it can collect data on your searches, browsing history and even your location (if location services are enabled). Most browsers also use cookies, small files that store information about your online behavior. Let's discuss the risks associated with web browsers and how to stay safe. A person conducting a Google search on their laptop (Kurt "CyberGuy" Knutsson)How a browser doubles as spywareBrowsers are much more than simple tools to navigate the web. They are, in many ways, tools for surveillance. While they help you access websites and services, they also track your every move online to feed the ever-hungry advertising industry.First off, most browsers collect data about your searches, browsing habits and even your location. This data isn't just stored to "improve your experience," it's used to create a detailed profile of you, which is then shared with advertisers who target you with personalized ads.Google Chrome, for example, is notorious for tracking your activity. As you browse, it feeds data to Googles advertising engine, allowing it to serve highly targeted ads based on your behavior. This includes everything from your search history to the websites you visit, even down to the smallest detail, like how long you stay on a page."Google may share information about you with advertisers, business partners, sponsors, and other third parties," Google boldlymentions on its privacy policy page.Browsers also use cookies to keep tabs on you. These cookies track your activity across different sites, even after you've left a site. This means that ads you saw on one website might follow you across others, creating a persistent digital footprint. And while cookies can be blocked or deleted, many websites rely on them to function, making it hard to escape this kind of tracking. Google browser (Kurt "CyberGuy" Knutsson)Even Incognito mode isnt safeEven if you're using privacy-focused browsers or tools like Incognito mode, they dont really guarantee privacy. A2020 class-action lawsuit revealed that Google kept scraping searches by gathering data from users browsing in Incognito through ad tools used by websites, picking up "potentially embarrassing" searches from millions of people. Google then used that data to track web traffic and sell ads.Its not just Google. Your internet service provider, the websites you visit and even governments can monitor your browsing activity, even in Incognito mode. All it does is hide your activity from your local browser history.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A person conducting a Google search on their laptop (Kurt "CyberGuy" Knutsson)How to protect your privacyAs you all know, web browsers are essential tools for accessing the internet, but many popular options compromise your privacy by collecting extensive data. While Google Chrome is widely used, it tracks significant amounts of user information to power targeted advertising. However, there areseveral privacy-focused browser alternatives that prioritize user data protection. Also, to enhance your online security and protect your personal information, consider implementing these essential cybersecurity practices.Keep software updated: Regularlyupdate your operating system, browsers and other software to patch security vulnerabilities. Enable automatic updates whenever possible to ensure you're always protected against the latest threats.Use strong, unique passwords: Create complex passwords for each of your accounts and avoid reusing them. Consider using apassword manager to generate and securely store strong passwords.Enable two-factor authentication (2FA): Activate2FA on all accounts that offer it. This adds an extra layer of security by requiring a second form of verification beyond your password.GET FOX BUSINESS ON THE GO BY CLICKING HEREBe cautious with emails and links: Avoid opening suspicious emails or clicking on unknown links. These could be phishing attempts designed to steal your information or infect your device with malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.Use secure networks: When usingpublic Wi-Fi, connect through aVPN to encrypt your internet traffic. For sensitive transactions, stick to secure, private networks.Be mindful of social media sharing: Limit the personal information you share on social media platforms and adjust yourprivacy settings to control who can view your posts.VPN: Your first line of defense against browser spying:A VPN (virtual private network) encrypts your internet connection, making it difficult for anyone, including your browser, to track your online activities. By masking your IP address and routing your traffic through secure servers, a VPN not only protects your personal data from prying eyes but also helps you avoid targeted advertising and potential data breaches.Regardless of whether you are new to VPNs or not, youll want to choose trusted VPN providers known for robust encryption and no-log policies to ensure your privacy. Whether for sensitive tasks or everyday use, reputable VPN services will boost both your security and speed.By implementing these security practices and using privacy-focused browsers, you can significantly enhance your online safety and protect your personal data while browsing the web. Remember, cybersecurity is an ongoing process that requires vigilance and regular updates to your practices.Kurts key takeawayThe web browser is an essential tool for accessing the internet, but it also opens the door to a host of privacy and security risks. Whether its being tracked for ads, snooped on by your ISP or accidentally stumbling onto a malware-filled site, the risks are everywhere. Tools like Incognito mode or cookie-blocking can help a bit, but theyre not enough to truly protect you. If youre serious about staying private and secure, you need to up your game. Use a VPN, be cautious about what you click on and stay informed about the ways your browser might be working against you.CLICK HERE TO GET THE FOX NEWS APPDo you think companies have gone too far with tracking? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Unbeatable Best Black Friday dealsBest gifts forMen |Women |Kids |Teens |Pet loversBest deals:Laptops |DesktopsCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 1 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: Chatbot's disturbing message
    By Fox News Staff Fox News Published November 20, 2024 12:21pm EST A Google Gemini user reported a shocking answer. (Tobias Schwarz/AFP/Jonathan Raa/NurPhoto/David Paul Morris/Getty Images) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Google AI chatbot tells user to 'please die'- Ben Affleck is confident AI cannot replace Hollywood movies for this reason- Donald Trump will be very good for AI: Jeff Sica'PLEASE DIE': Google's AI chatbot Gemini is at the center of another controversy after a user reported a shocking answer in a conversation about challenges aging adults face. A graduate student in Michigan was told "please die" by the artificial intelligence chatbot, CBS News first reported. (Marilla Sicilia/Archivio Marilla Sicilia/Mondadori Portfolio via Getty Images)'LAST TO GO' Ben Affleck is getting a lot of attention for his views on artifical intelligence. Last week, the actor spoke at CNBC's Delivering Alpha 2024 investor summit, taking time to share his thoughts on how AI will affect the entertainment industry. "Movies will be one of the last things, if everything gets replaced, to be replaced by AI," he explained. (Omar Marques/SOPA Images/LightRocket/CHARLY TRIBALLEAU/AFP)HERE COMES THE BOOM: Circle Squared Alternative Investments founder Jeff Sica explains how President-elect Donald Trump policies will aid the construction of A.I data centers on 'Varney & Co.' Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)CHINESE STRENGTH: China's Shanghai Kepler Robotics is making waves in the world of humanoid robotics with its innovative Forerunner series. Its latest humanoid robot, the Forerunner K2, has quickly become a hot topic, showcasing Kepler's commitment to pushing the boundaries of what robots can do.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 1 Views
  • WWW.FOXNEWS.COM
    This tool is made for the laziest parent ever
    Published November 19, 2024 6:00am EST close 'CyberGuy': Easy way to motorize your manual baby stroller to give it the push and power it needs Tech expert Kurt Knutsson discusses how an innovative Easy-Way kit turns standard strollers electric, simplifying navigation for parents. Ever wished your trusty stroller could magically power itself up those steep hills or through sandy beaches? Well, get ready to have your mind blown. The is a game-changer for parents seeking to ease their daily stroller routines. This innovative device transforms any standard stroller into an electric one, making walks with little ones easier and more enjoyable.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)What is the Easy-Way kit?The Easy-Way kit is designed to retrofit existing strollers, providing electric assistance without the need for a brand-new stroller purchase. This Polish startup's creation is currently featured on Kickstarter, aiming to make life easier for parents everywhere. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Key features of the Easy-Way electric kitThe Easy-Way kit is designed to be compatible with most strollers that have a rear axle width ranging from 21.7 to 29.5 inches. It features two powerful 150-watt motors that automatically adjust their output based on the terrain, ensuring a smooth experience whether you're going uphill or downhill.With a single charge, parents can expect over 19 miles of use, making it ideal for long city strolls or trips out of town. Additionally, the kit includes a user-friendly remote that is mounted on the stroller handle, allowing parents to select from five different levels of electric assistance to suit their needs. Electric stroller kit remote (Easy-Way) (Kurt "CyberGuy" Knutsson)How the Easy-Way kit worksThe Easy-Way kit clamps onto the stroller's frame above the rear axle, featuring rubber rollers that engage with the stroller's wheels. Integrated sensors track wheel speed and incline, adjusting motor output automatically for uphill climbs and downhill descents. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Safety features of the Easy-Way kitThe Easy-Way kit is equipped with essential safety features designed to enhance the security of both the child and the parent. If a parent lets go of the stroller, the system automatically locks the wheels in place, effectively acting as a parking brake to prevent any unintended movement.Additionally, the kit includes an emergency braking function that helps to avoid dangerous situations when navigating slopes, ensuring that the stroller remains under control at all times. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Conquering any terrain with the Easy-Way kitThe Easy-Way kit provides exceptional uphill assistance, making climbing hills effortless for parents. It also features downhill control, which prevents the stroller from rolling away on slopes, ensuring safety during descents. Additionally, the kit is beach-ready, designed to handle loose sand and uneven surfaces, allowing for smooth strolls in challenging environments. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)The soothing rocking feature of the Easy-Way kitOne of the standout features of the Easy-Way is its ability to rock the stroller gently, helping soothe infants during outings. With three rocking modes, parents can choose the intensity that best suits their child's preferences. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Installation and maintenanceThe Easy-Way kit features a quick installation process that requires no tools, taking less than a minute to set up. Its durable design is weather-resistant and built to withstand various conditions, ensuring reliability during daily use. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)How to get oneThe Easy-Way is currently available through aKickstarter campaign. By pledging approximately $496, backers can secure one of these kits before they hit retail shelves. Once production is complete, the planned retail price will be around $648. This preorder opportunity allows early adopters to take advantage of a lower price while supporting this exciting new product. Electric stroller kit (Easy-Way) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysFor parents looking to reduce physical strain while enjoying outdoor activities with their children, the Easy-Way electric stroller kit offers an innovative solution. By blending technology with practicality, this tool promises to make parenting just a little bit easier, one stroll at a time.Are devices like the Easy-Way electric stroller making parenting too easy and contributing to a culture of laziness? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 1 Views
  • WWW.FOXNEWS.COM
    Data breach exposes over 56 million clothing store customers
    Tech Data breach exposes over 56 million clothing store customers This data includes email addresses, physical addresses, phone numbers, more Published November 19, 2024 10:00am EST close 'CyberGuy': This years most devastating data breaches Kurt Knutsson: Data breaches in 2024 exposed info of millions, stressing the need for better cybersecurity. A cybersecurity vendor claimed last month that a hacker stole data from the fashion retailer Hot Topic, including the personal information of millions of customers. At that time, there was no confirmation from the retailer itself. However, a breach notification site has now confirmed that the personal data of 56,904,909 users was found online and leaked from customers of Hot Topic, Torrid and Box Lunch.This data includes email addresses, physical addresses, phone numbers, purchase history, gender and dates of birth. Partial credit card data was also included in the breach.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter. Image of a person shopping (Kurt "CyberGuy" Knutsson)What you need to knowThe breach notification serviceHave I Been Pwned (HIBP) announced this week that it alerted 56 million Hot Topic customers about a data breach compromising their personal information. While Hot Topic, which operates more than 640 stores across the U.S., has yet to confirm the breach, HIBP reported that it occurred on Oct. 19. Just two days later, a threat actor using the alias "Satanic" claimed responsibility.Satanic alleges that the database contains details of 350 million users, though that number seems inflated. The leaked data does, however, include names, email addresses, physical addresses and dates of birth; all information collected through Hot Topics loyalty program. The hacker is offering the database for $20,000 and demanding that Hot Topic pay $100,000 to prevent its sale.Hudson Rock, an Israeli cybersecurity firm, initially reported the breach and considers it credible. The firm traced the issue back to a malware infection on an employees computer at Robling, a third-party retail analytics firm. Hudson Rock, which operates the cyber intelligence platform Cavalier to monitor compromised devices, discovered the infection and flagged it for clients.Its likely that the threat actor used credentials stolen by info stealer malware to gain access to an analytics platform used by Hot Topic, potentially allowing them to infiltrate the retailers cloud environments. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)Hot Topics silence after the breach is suspiciousEvidence of a data breach at Hot Topic keeps piling up, but the company hasnt said a word yet. Customers and state attorneys general havent been notified, either. Hot Topics silence could mean a few things, especially with such a big breach. They might still be investigating, working with cybersecurity experts to confirm what happened and figure out the extent of the damage. Sometimes, companies stay quiet, hoping to delay or dodge bad press. But this strategy can backfire, leading to more scrutiny and skepticism.We reached out to Hot Topic to request a comment on our story but did not hear back before our deadline. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)5 ways you can stay safe in the event of a data breach1) Keep a strong password:With the Hot Topic data breach exposing sensitive information, its essential to update your passwords. Use a strong, unique password for each account, especially for services where your personal details are stored. A mix of letters, numbers and symbols will make it harder for hackers to guess. Consider using apassword manager to keep everything secure and easily accessible.2) Beware of suspicious links:After a breach, phishing attempts increase, and hackers may use your leaked email to send fake links or emails. Never click on suspicious links, especially those that ask for personal information. Always double-check the sender's email and look out for strange language or urgent requests. If in doubt, go directly to the website instead of following the links in the message.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.3) Invest in a data removal service:Since your personal information could be floating around on the dark web or public databases, its a good idea to invest in a data removal service.Check out my top picks for data removal services here.4) Watch out for the risk of identity theft:The leaked data includes sensitive details like addresses, birthdays and purchase histories, which could be used for identity theft. Be extra cautious when sharing personal information moving forward, and if you notice anything unusual, report it immediately. If you are a Hot Topic customer, you might also want to consider an identity theft monitoring service.See my tips and best picks on how to protect yourself from identity theft.5) Monitor your accounts regularly:Keep an eye on your bank accounts, credit card statements and even loyalty programs where your information is stored. Set up alerts for transactions and logins so you can act fast if anything seems off. Regular monitoring can help you catch fraudulent activity early, minimizing the damage if your data is misused.Kurts key takeawayThe Hot Topic data breach is alarming, especially since it affects over 56 million people. What makes the situation even more concerning is that Hot Topic has stayed silent about it. The company hasnt notified those affected, leaving many unprepared for potential cybersecurity threats. Hackers could use this gap to target victims with scams, leading to financial losses. This situation is a strong reminder of the importance of maintaining good cybersecurity hygiene, whether youre impacted by a breach or not.Should companies be forced to compensate customers whose data has been exposed instead of just staying silent? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 3 Views
  • WWW.FOXNEWS.COM
    New Tech Platforms Help Legal Immigrants
    By David Nath Fox News Published November 19, 2024 11:52am EST close New tech platforms focus on helping legal immigrants Legal immigrants are increasingly turning to high-tech solutions to help navigate Americas immigration landscape. Its no secret that Americas immigration policy is in desperate need of a high-tech overhaul. Most online immigration tools so far have been rudimentary, and thats often left legal immigrants complaining of long wait times, contradictory instructions, and a web presence that doesn't help with things like green card renewal or family petitions. Now President-Elect Trump is promising a big deportation push when he comes into office for his second term, and its more important than ever for immigrants to have their paperwork in order."Immigration, legal immigration should be efficient and accessible and affordable for everyone," says Yasaman Soroori, the co-founder and CEO of Consulta, a new A.I.-powered platform offering high-tech solutions for those immigration issues. Its thought to be the first online platform dedicated specifically to helping legal immigrants navigate Americas complicated immigration landscape. Their goal is simple; integrating tech with personalized support, hoping to bring order and affordability to a complex and costly process.And Soroori says their intake protocol is much more simple and cost-effective than going to see an immigration attorney. "Once the user finds us on our website and goes to the platform," she explains, "they are able to select the service that pertains to them, answer a simplified questionnaire, upload the necessary documents, well even take care of the passport pictures for them. And that's it."As the immigration debate heats up, Consulta is getting more visibility; it has a number of high-profile backers, including the founder of Venmo. Right now, services include renewing green cards, petitions for family visas, and help with citizenship. Its all part of using A.I. to deliver a more streamlined immigration experience."We always talk about the negativity about immigration, but we don't focus on the legal immigrants that are in this country," says Soroori. "And we wanted to offer them the most stress free, affordable option in order for more people to pursue it."
    0 Comments 0 Shares 3 Views
  • WWW.FOXNEWS.COM
    T-Mobile hacked by Chinese cyber espionage in major attack on US telecoms
    Tech T-Mobile hacked by Chinese cyber espionage in major attack on US telecoms Learn how to stay safe amid rise in telecom data breaches Published November 18, 2024 10:00am EST | Updated November 18, 2024 4:47pm EST close 'CyberGuy': NSA urges Americans to reboot phones once a week. Why? Tech expert Kurt Knutsson says the National Security Agency advises weekly phone reboots to protect against cyberattacks and enhance mobile security. The telecom industry is one of cybercriminals' favorite targets, likely because of the sensitive data it stores. Your carrier knows who you call and what you text. This type of information is valuable not only to hackers but also to governments. Thats probably why U.S. phone giant T-Mobile was hacked as part of a broad cyberattack on domestic and international phone and internet companies in recent months.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! T-Mobile booth (T-Mobile) (Kurt "CyberGuy" Knutsson)What you need to knowThere was unauthorized access to a limited number of T-Mobile routers using methods indicative of a major Chinese cyber-espionage operation, but T-Mobiles layered defenses and security monitoring enabled T-Mobile to quickly identify and shut down the threat.The report revealed that hackers connected to a Chinese intelligence agency breached T-Mobile as part of a monthslong effort to spy on the cellphone communications of high-value intelligence targets. The report did not specify when the attack occurred, but T-Mobile says no customer calls or communication records were stolen.The U.S. government alsoconfirmed this month that Chinese hackers breached multiple U.S. telecommunications service providers to access wiretap systems used by law enforcement for surveillance of Americans. Wiretap systems allow law enforcement agencies to monitor phone calls, text messages and internet communications as part of investigations, typically with a warrant.CISA (Cybersecurity and Infrastructure Security Agency) and the FBI issued a joint statement revealing "a broad and significant" cyber-espionage campaign. The statement disclosed that PRC-affiliated hackers had breached networks at "multiple telecommunications companies" across the United States. While CISA and the FBI did not name the organizations affected, multiple reports suggest that T-Mobile, AT&T, Lumen (formerly CenturyLink) and Verizon are likely on the list.WSJ reported in October that Chinese hackers had access to the networks "for months or longer," enabling them to collect "internet traffic from internet service providers that count businesses large and small and millions of Americans as their customers." Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)T-Mobiles many data breachesT-Mobile has faced several hacks in recent years. In 2021, a malicious actor breached T-Mobiles lab environment by posing as a legitimate connection to an unidentified piece of equipment. The hacker guessed passwords for multiple servers and moved laterally through the network, ultimately stealing personal data, including names, addresses, Social Security numbers and drivers license IDs, from tens of millions of customers.In 2022, T-Mobile experienced another breach when a malicious actor used SIM-swapping, phishing and other tactics to infiltrate the companys internal platform for managing mobile resellers who serve T-Mobile customers.The troubles continued into 2023. Early in the year, hackers used phished credentials from dozens of T-Mobile retail employees to access a sales application originally set up during the COVID-19 pandemic for remote viewing of customer data. Then, in January 2023, a misconfigured application programming interface exposed personal data for 37 million current customers, marking yet another significant security lapse. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)T-Mobiles responseWhen CyberGuy reached out to T-Mobile regarding the latest security incident, a spokesperson provided the following statement: "T-Mobile is closely monitoring this industry-wide attack. Due to our security controls, network structure and diligent monitoring and response we have seen no significant impacts to T-Mobile systems or data. We have no evidence of access or exfiltration of any customer or other sensitive information as other companies may have experienced. We will continue to monitor this closely, working with industry peers and the relevant authorities."5 ways to stay safe amid the rise in telecom data breaches1) Change your passwords regularly: Make it a habit to update your passwords every few months, especially for your telecom accounts and related services. Use strong, unique passwords that include a mix of letters, numbers and symbols.Password managers can help you generate and store these securely.2) Invest in personal data removal services: Consider services that scrub your personal information from public databases. This reduces the chances of your data being exploited in phishing or other cyberattacks after a breach.Check out my top picks for data removal services here.3) Use identity theft protection: Identity theft protection services monitor your accounts for unusual activity, alert you to potential threats and can even assist in resolving issues if your data is compromised.See my tips and best picks on how to protect yourself from identity theft.4) Enable two-factor authentication (2FA): Add an extra layer of security to your telecom accounts with2FA. This requires a second form of verification, like a text code or an app-based prompt, making it harder for hackers to access your accounts even if they have your password.5) Guard against phishing scams with strong antivirus software: Be cautious about unsolicited calls, texts or emails that ask for personal information or account access. Legitimate companies won't ask for sensitive details this way. If something seems off, contact your telecom provider directly through official channels. Whatever you do, don't click on links, as they can lead to scams or malware.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurts key takeawayTelecom providers like T-Mobile and AT&T are frequent targets for hackers. Over the last two years, millions of Americans have had their data stolen, things like call records, text messages and even personal details. The issue got so bad that the FCC stepped in, warning T-Mobile to step up its cybersecurity efforts. The company was fined about $30 million, split between a $15 million penalty and a mandatory $15 million investment in better security. Unfortunately, if the companies handling your data keep getting breached, there's only so much you can do.Do fines and penalties for telecom companies feel like enough of a deterrent, or should they face stricter consequences? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 4 Views
  • WWW.FOXNEWS.COM
    Helpful hack: Customize your home screen by adding widgets on your iPhone
    close 'CyberGuy': Customize your home screen by adding widgets on your iPhone Tech expert Kurt Knutsson shows you how to add, customize and manage widgets for quick access to apps and info from your iPhone home screen. Have you ever wished for a way to access your favorite apps and information without the hassle of digging through your iPhone's home screen? Well, youre in luck. Widgets are here to transform your iPhone experience. Think of them as mini apps that bring key information right to your fingertips, allowing you to stay updated at a glance. Whether its checking the weather, tracking your fitness goals or keeping an eye on your calendar, widgets make it all possible without needing to open each app individually. Lets get started on making your home screen not just functional but uniquely yours.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter. Image of widgets on iPhone (Apple) (Kurt "CyberGuy" Knutsson)What are widgets?Widgets are mini applications that display at-a-glance information from your favorite apps directly on your home screen. They provide quick access to key features and updates without the need to open the full app, saving you time and streamlining your iPhone experience. Widgets on iPhone (Kurt "CyberGuy" Knutsson)How to update your iPhone to the latest softwareNot sure if you're running the latest iOS? No worries. Here are some quick steps to update your iPhone:OpenSettingsTapGeneralSelectSoftware UpdateIf available, tapUpdate Now and begin downloading and installing iOS 18.1 Steps to update your iPhones software (Kurt "CyberGuy" Knutsson)Adding widgets to your home screenFollow these simple steps to add widgets to your home screen and make your iPhone even handier:Touch and hold an empty area on your home screen until the apps start to jiggle.Look for the Edit icon in the top-left corner of your screen and tap it.ClickAdd WidgetScroll through theavailable widgets or use thesearch bar to find a specific one.Tap on yourchosen widget, then swipe left or right to view different options.Once you've selected the size, tapAdd Widget to place it on your home screen. Steps to add widgets to your iPhones home screen (Kurt "CyberGuy" Knutsson)Arranging and resizing widgetsAfter adding a widget, you can easily adjust its position and size. Here's how:Touch and hold the widget until it floats, then drag it to your desired location. You can place it anywhere on the current page or even drag it to the edge of the screen to move it to a different page. Then, tap an empty area on the home screen.Next,long-presson a widget to see available size options. Tap on the size you'd like the widget to be.Now, tap on the empty area on the home screen, and if available, you cangrab the corner of the widgetwhere you see a small handle to make it larger.To finalize the changes, tapDone. Steps to arrange and resize widgets on iPhones home screen (Kurt "CyberGuy" Knutsson)Customizing widget appearanceiOS 18 introduced new ways to customize the look of your widgets:Change icon size: Press the empty area on your home screen. TapEdit at the top of the screen, then chooseCustomize to access options for making icons larger.Adjust appearance: SelectLight orDark mode for your icons and widgets or chooseAutomatic to switch based on the time of day.Add color tint: Use theTinted option to add a color overlay to your icons and widgets, adjusting the hue and saturation to your liking. Press theempty area on your home screen to save your changes. Steps to customize widget appearance (Kurt "CyberGuy" Knutsson)Removing widgetsIf you want to remove a widget from your home screen:Touch and hold an empty area on the home screen until the apps jiggle.Look for the "-" icon on the widget you want to remove.TapRemove to confirm your decision. Steps to remove widgets on iPhones home screen (Kurt "CyberGuy" Knutsson)Kurts key takeawaysCustomizing your iPhone's home screen with widgets is a great way to personalize your device and improve your productivity. With the ability to add, resize and arrange widgets, you can create a home screen that perfectly suits your needs and preferences. Remember to experiment with different layouts and widget combinations to find what works best for you.What new widgets do you plan to add to your iPhone home screen to enhance your daily productivity and access to information? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 7 Views
  • WWW.FOXNEWS.COM
    New Chinese humanoid robot shows off its strength by lifting 35 pounds per hand
    Tech New Chinese humanoid robot shows off its strength by lifting 35 pounds per hand The humanoid robot that you could be working next to in the future Published November 17, 2024 6:00am EST close New Chinese humanoid robot shows off its strength by lifting 35 pounds per hand Kepler's Forerunner K2 represents the fifth generation of its humanoid robot technology. China's Shanghai Kepler Robotics is making waves in the world of humanoid robotics with its innovative Forerunner series.Its latest humanoid robot, the Forerunner K2, has quickly become a hot topic, showcasing Kepler's commitment to pushing the boundaries of what robots can do.With each new development, Kepler is not just keeping pace with the competition. It's setting the stage for a future where humanoid robots play an integral role in our everyday lives.I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)Pioneering technologyThe original Forerunner, now known as K1, showcased Kepler's advanced technology, including proprietary planetary roller screw actuators, intelligent dexterous hands and the Nebula AI system. Standing at 5 feet, 10 inches tall and weighing 187 pounds, the K1 was designed to compete directly with other leading humanoid robots in the market. Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)The next generation: Forerunner K2Building on the success of the K1, Kepler has introduced theForerunner K2, representing the fifth generation of its humanoid robot technology. This latest model has undergone extensive software and hardware enhancements, tailoring it for commercial applications across various industries. Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)Advanced features and capabilitiesThe Forerunner K2 features an impressive 52 degrees of freedom throughout its body, allowing for more natural and fluid movements. Its rotating and tilting head module, combined with improved arm and leg rigidity, enhances its overall functionality and ease of maintenance.One of the most remarkable features of the K2 is its dexterous hands. Each hand supports up to 11 degrees of active and passive freedom and can carry up to 33 pounds. The fingertips are equipped with sensor arrays, each containing 96 contact points, enabling precise object manipulation and tactile sensing.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)AI and software advancementsKepler has significantly enhanced the K2's vision system and navigation software, allowing it to better perceive and react to its environment in real time. The robot's artificial intelligence capabilities have been expanded through a combination of embodied intelligence software, imitation and reinforcement learning and a cloud-based cognitive model.These improvements enable the K2 to perform specific tasks autonomously and cooperate effectively with human operators. The robot's stability and walking speed have also been improved through advancements in gait planning and control algorithms. Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)GET FOX BUSINESS ON THE GO BY CLICKING HERECommercial applications and future prospectsKepler has positioned the Forerunner K2 as an ideal solution for various industries, including intelligent manufacturing, warehousing and logistics, high-risk operations and research and education. The company has already begun evaluating the K2's performance in customer facilities, where it's being used for materials handling, sample processing, patrol and inspection and quality control tasks.With an estimated retail price range of $20,000 to $30,000, Kepler aims to make its humanoid robots accessible to a wide range of businesses. The company plans to commence mass production of its humanoid robots in the second half of 2024, positioning itself at the forefront of the industry. Forerunner K2 humanoid robot (Shanghai Kepler Robotics Co., Ltd)Kurts key takeawaysKepler's Forerunner K2 is truly a game changer in the world of humanoid robotics, showcasing impressive advancements that hint at a future where these machines become commonplace in our workplaces. With rapid improvements from the K1 to the K2, it's clear that Kepler is not just keeping pace but leading the charge in innovation. As these robots become more capable and affordable, we can expect to see them assisting us in various industries, from manufacturing to health care.CLICK HERE TO GET THE FOX NEWS APPHow comfortable are you with the increasing presence of humanoid robots like Kepler's Forerunner K2 in everyday life and the workplace, and what concerns or benefits do you foresee? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 7 Views
  • WWW.FOXNEWS.COM
    How a wrong Google search can compromise your data and bring law enforcement calling
    Tech How a wrong Google search can compromise your data and bring law enforcement calling Beware of what you search on Google Published November 17, 2024 10:00am EST close Google accused of using unlawful tactics to control digital advertising market Constitutional law professor Jonathan Turley joins 'The Faulkner Focus' to discuss the Justice Department's antitrust case against Google, accusing the search engine of abusing its power to create an online advertising monopoly. Google is probably the one online service that we all use at least once a day, whether it's searching for a query, finding something to buy or anything else.It's generally safe to use, even though the search results arent quite hitting the mark these days. Thats a discussion for another time.What we have at hand today are the hidden risks involved with Google search, which can not only compromise your device and personal data but also bring law enforcement to your doorstep. This is not an exaggeration, and below you'll find out how. Woman typing on laptop (Kurt "CyberGuy" Knutsson)The hidden dangers of niche queriesCybersecurity companySophos issued an urgent warning on its website, asking people not to type six words into its search engines. Those who Google "Are Bengal Cats legal in Australia?" have reportedly had their personal information stolen after clicking on fraudulent links that appear near the top of the page.Its unclear why hackers have launched this unusually specific campaign. The only reason I can think of is that they are targeting the Australian demographic, and the phrase "Are Bengal Cats legal in Australia?" is easy to rank for on the Google search engine results page.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?People who search about whether bengal cats are legal in Australia (they are, if youre curious) are at risk of being targeted by GootLoader malware. This malware is spread through SEO tactics, where hackers make infected links show up high in search results. When people search for terms like legal documents or agreements, they might click on these dangerous links that lead to websites hosting a ZIP file with harmful code.Once this malware gets onto a computer, it opens the door for a second, more dangerous malware called GootKit, which is designed to steal personal information and allow hackers to control the device remotely. Image of Google search engine (Kurt "CyberGuy" Knutsson)Hackers arent the only ones watching your Google searchesWhile hackers are targeting Google searches, theyre not the only ones watching what you search. Law enforcement, your workplaces IT department and your telecom provider can also see your search activity. One couple reportedly learned this the hard way when police showed up at their door after they searched just four words, "pressure cooker bomb," along with the word "backpack."Michele Catalano and her husband from Long Island, New York, were browsing online for some everyday items, but they quickly found themselves in unexpected trouble. Michele, a freelance writer, was looking to buy a pressure cooker, while her husband wanted a new backpack. They each searched for the items separately.But two days later, her husband searched for both items from his work computer, just before leaving his job. His former employers IT staff flagged these searches and reported them to the local Suffolk County Police Department. Soon after, several black SUVs showed up at the couple's house, with police wanting to make sure there were no security threats.GET FOX BUSINESS ON THE GO BY CLICKING HERE A person doing a Google search (Kurt "CyberGuy" Knutsson)5 ways to stay safe when searching something on Google1. Avoid clicking on ads and suspicious links: Be cautious of ads or unfamiliar links at the top of search results. Hackers often use SEO poisoning to place dangerous links in prominent positions. So, try to stick with trusted websites and known sources.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Use a VPN: A virtual private network (VPN) encrypts your internet traffic, making it harder for hackers, ISPs or other third parties to track your online activity and searches. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices3. Enable SafeSearch: Googles SafeSearch filters help to block explicit or potentially harmful content. Its especially useful for filtering out unsafe links and improving search safety.4. Limit personal data on Google: Adjust your Google accounts privacy settings to minimize data collection, including search history, location tracking and ad personalization. You can access these settings in the "My Activity" section of your Google account.5. Use private browsing or clear your history: Using Incognito Mode or clearing your browsing history regularly can help reduce tracking of your searches. While it doesnt hide your activity from ISPs or law enforcement, it limits the data Google can store on your device.Kurts key takeawayBad actors are always trying to exploit any digital medium you use, whether its social media or a Google search. Its concerning how malicious websites that put users at risk are readily available on the first page of Google. Although the search giant has claimed to prioritize helpful content this year, the ease with which hackers manipulate search results suggests Google is doing quite the opposite. Im not holding out much hope for Google to improve its platform, but you can stay safe by avoiding suspicious links and being extra careful.CLICK HERE TO GET THE FOX NEWS APPDo you feel like Googles search results have become more or less trustworthy over the years? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 7 Views
  • WWW.FOXNEWS.COM
    How to make your VPN faster
    Published November 16, 2024 6:00am EST close How VPNs shield your identity and secure your financial transactions from theft A VPN could be your secret weapon to protect your identity and finances. Many people turn to VPNs virtual private networks for added privacy and security online, only to find that their internet speeds suddenly slow to a crawl. But what exactly does a VPN do, and why might it cause this slowdown?A VPN works by creating a secure, encrypted pathway between your device and the internet, keeping your data private from hackers, advertisers and anyone else trying to monitor your activity. This encryption process also allows you to browse as if youre in a different location, which can help access content that may be restricted where you are.Just ask Terry from Reno, who recently reached out with this frustration:"My VPN slows down my phone to the point where I can't open the apps! Help!"Youre not alone, Terry. VPNs are fantastic tools for safeguarding data and unlocking restricted content, but that extra layer of protection and location masking can sometimes slow things down. The good news? There are several ways to keep your VPN running smoothly without sacrificing security. Let's dive in. A woman using a VPN on her laptop. (Kurt "CyberGuy" Knutsson)Make sure it's actually the VPNBefore we blame the VPN, let's make sure it's really the culprit. Here's a quick test:1. Disconnect from your VPN: Close your VPN application completely or turn off the VPN connection in your device settings.2. Run a speed test at Speedtest.net and note the results: Click the "Go" button and wait for the test to complete. Write down your download and upload speeds, as well as the ping.3. Connect to your VPN: Open your VPN application and connect to your preferred server. Wait until the connection is fully established.4. Run the speed test again: Refresh the Speedtest.net page to ensure it detects your new location, then run the test again. Note down the new results.If your VPN-connected speeds are less than about 60% of your normal speeds, then Houston, we have a VPN problem. If the difference is minimal, you may just need to optimize your base internet connection first. A woman using a VPN on her cellphone. (Kurt "CyberGuy" Knutsson)Fixing VPN speed issuesWhen encountering slow speeds while using a VPN, it's crucial to approach the problem systematically. Assuming the VPN is indeed the bottleneck in your connection, there are several steps you can employ to potentially boost your speeds and improve your overall experience.1. Switch VPN serversThe physical distance between you and the VPN server location plays a significant role in connection speeds. Opting for a server closer to your geographical location can often result in a noticeable improvement. If you need to connect to a specific country for content access or other reasons, experiment with different cities within that country. Many VPN providers offer multiple server options in popular locations. Additionally, some VPNs display server load information, which can be incredibly useful. Connecting to a less crowded server typically yields faster speeds, as you're sharing fewer resources with other users.CLICK HERE FOR MORE U.S. NEWS Various server locations available on VPN. (Kurt "CyberGuy" Knutsson)2. Tweak VPN settingsAdjusting your VPN settings can lead to performance enhancements. If your VPN service allows for customization, consider lowering the encryption level from 256-bit to 128-bit AES. While 256-bit encryption is incredibly secure, it can sometimes impact speed. The 128-bit AES encryption is still considered very secure for most purposes and may offer a speed boost. Another setting to look for is the WireGuard protocol. If your VPN provider offers this newer protocol, enabling it could significantly improve your connection speed, as it's designed to be both faster and more efficient than older protocols. For those using the OpenVPN protocol, switching from TCP to UDP can often result in faster speeds. However, approach these changes cautiously, especially if you're not entirely sure about their implications. Avoid disabling critical security features in your quest for speed.3. Change VPN protocolsDifferent protocols offer varying levels of speed and security. Generally, protocols like PPTP, L2TP and IKEv2 are known for their speed but may not provide the highest level of security. OpenVPN is often the default choice as it strikes a good balance between speed and security. If you decide to stick with OpenVPN, which is recommended for most users, try switching from TCP to UDP. This simple change can potentially provide a noticeable speed boost without compromising security.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Update your VPN appKeeping your VPN application up to date is essential for ensuring optimal performance and security. VPN providers frequently release updates that not only enhance the overall functionality of their software but also address any bugs or vulnerabilities that may have been discovered. An outdated VPN app can lead to compatibility issues with your operating system, which can hinder performance and reduce connection speeds. Therefore, it is advisable to regularly check for updates within your VPN app's settings or visit the provider's official website to download the latest version. Additionally, many VPN services offer an automatic update feature, which you should enable to ensure that you are always using the most current version of the software without having to remember to do it manually.5. Close background apps and optimize your deviceTo improve your VPN speed, it is important to minimize the load on your device by closing unnecessary applications running in the background. Many applications consume bandwidth and processing power, which can significantly affect your VPN's performance. For instance, streaming services, file-sharing programs or even software that automatically updates can slow down your connection. Before connecting to your VPN, take a moment to close these apps and consider disabling any auto-sync features temporarily.Also, restarting your device before initiating a VPN connection is also a good practice, as it clears temporary files and frees up memory, allowing for a smoother experience.6. Consider a faster VPN serviceIf you have tried various troubleshooting methods and your current VPN service still fails to deliver satisfactory speeds, it may be time to explore other options. The market is filled with numerous VPN providers that emphasize speed and reliability, so conducting thorough research is essential. Look for services that boast a large network of servers strategically located around the world, as this can significantly enhance connection speeds. Many top-tier VPN providers offer free trials or money-back guarantees, allowing you to test their performance without any financial risk. When evaluating potential new services, consider not only their speed but also their security features, privacy policies and customer support options. By making an informed choice, you can find a VPN that meets both your speed requirements and security needs effectively.Remember, while these strategies can help optimize your VPN speed, it's important to have realistic expectations. Your base internet speed, provided by your internet service provider (ISP), will always be the ultimate limiting factor. No VPN can make your connection faster than the maximum speed your ISP provides. However, by implementing these techniques, you can ensure that you're getting the most out of your VPN connection and minimizing any unnecessary slowdowns. A woman using a VPN on her tablet. (Kurt "CyberGuy" Knutsson)Find the perfect VPNRegardless of whether you are new to VPNs or in need of a faster, more secure option, youll want to choose trusted VPN providers known for robust encryption and no-log policies to ensure your privacy. Whether for sensitive tasks or everyday use, reputable VPN services will boost both your security and speed.For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devicesKurt's key takeawaysVPNs are incredible privacy tools, but they shouldn't cripple your internet experience. With a bit of tweaking, you should be able to find a sweet spot between speed and security. And Terry, I hope these tips help get your phone apps running smoothly again. Remember, a good VPN might slow things down a tad, but it shouldn't make your device unusable. If nothing here helps, definitely reach out to your VPN's support team or consider trying a different service.CLICK HERE TO GET THE FOX NEWS APPWhat challenges have you faced when trying to balance VPN security with connection speed, and how did you overcome them? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 9 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: Beatles song will 'push the limit'
    close The Beatles come together Their final song was mixed with John Lennon's voice. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- The Beatles' AI-assisted songs Grammy nomination could push the limit on interest in the technology- Gary Marcus: OpenAI could be the next WeWork- Trump is not going to regulate AI industry with Musk 'sitting next to him,' exec says The Beatles posing together. From left to right: musicians George Harrison, John Lennon, Paul McCartney and Ringo Starr, circa 1965. (Getty Images)'COME TOGETHER': The Beatles' return to the Grammys has come with an assist from artificial intelligence. "Now and Then" is nominated for record of the year and best rock performance at the 2025 Grammy Awards, making it the first nominated song ever to use AI in its production.MODELS MAXED OUT?: New York University professor emeritus Gary Marcus discusses the consequences of artificial intelligence and OpenAI's valuation on 'The Claman Countdown.'HANDS-OFF APPROACH: Dominari Securities CEO Kyle Wool joins 'Mornings with Maria' to assess Q3 earnings, deregulation under President-elect Trump and his expectations for upcoming economic data. Tesla CEO Elon Musk speaks on stage as he joins former U.S. President and Republican presidential candidate Donald Trump during a campaign rally at site of his first assassination attempt in Butler, Pa. on Oct. 5, 2024. (JIM WATSON/AFP via Getty Images)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 10 Views
  • WWW.FOXNEWS.COM
    Apples AirPods Pro 2 makes hearing tests as easy as a few taps
    close Apples AirPods Pro 2 makes hearing tests as easy as a tap Checking your hearing just got much easier. Millions of people are walking around with undetected hearing loss, but checking your hearing just got a whole lot easier thanks to the new hearing test feature in AirPods Pro 2.No more booking appointments or visiting clinics. Now, you can take a scientifically validated hearing test right from your iPhone or iPad in the comfort of your own home. Hearing aid feature using AirPods Pro 2. (Apple)A convenient and accurate hearing testIt's pretty slick how it works. TheAirPods Pro 2 use their Pro-level Active Noise Cancellation and in-ear seal to create a controlled environment, kind of like a mini sound booth in your ears.Using puretone audiometry built on advanced acoustic science, the test plays a series of tones that you respond to by tapping the screen. Helpful animations, tapback effects, and progress indicators guide you through the experience, which takes about five minutes. More than 150,000 realworld audiograms and millions of simulations helped develop thishearing test thats accurate, fast and easy. In about five minutes, you'll have a personalized report on your hearing. Test your hearing using AirPods Pro 2. (Apple)Steps to complete your Hearing test with AirPods Pro 2You'll want to find a quiet spot and follow these steps to take your hearing test. Note that this hearing test is intended for people 18 years and older.Ensure your iPhone is running the latest software. Go toSettings >General >Software Update, then tap"Download and Install" if needed.Next, make sure you are wearing yourAirPods Pro 2.On your iPhone, tap onSettings.Next, click yourAirPods Pro 2.Then, select theHearing Test option.Now tapGet Startedand follow theprompts,which include answering a few questions, confirming you are in a quiet location, and checking the fit of your AirPods Pro 2.Follow the remainingprompts and tapStart Test.It should take about 5 minutes, and you can cancel it at any time.The test will playunique tones at different volumes and frequencies, which, at times, you may not hear. Each tone will pulse three times.Tapthe screen when you hear a tone and wait until you hear another.The test will begin with your left ear and then proceed to the right.After the hearing test is complete, you'll get acheckmark and a message that your results have been saved.TapShow Results, and you can tapShow Details to review your results and any hearing assistance recommendations.Tapdone when you are finished.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Hearing test using AirPods Pro 2. (Apple)Immediate insights into your hearing healthOnce you're done with your hearing test, you'll receive immediate insights into your hearing health. Here's how to access your hearing data, which will be saved in the Health app:In the health app, tap onBrowse in the bottom right-hand corner.Taphearing, and your most recenthealth results will appear near the top.TapHearing Test Results to review your hearing assistance recommendations and all your results, which include a graph that shows the decibel loss for each ear, as well as averages if you've taken multiple tests.You can tapShow More Data for additional information.You can also tapAdd Test in the upper-right corner of your screen if you'd like to upload data from another hearing test or audiogram, like one taken at a doctor's office.If you'd like toprint or save results, scroll down, tapAll Hearing Test Results, and then tapExport PDF.AIRPODS PRO 2 VS. A CUTTING-EDGE HEARING AID: WHICH ONE OFFERS BETTER SOUND? Hearing test results using AirPods Pro 2. (Apple)Transforming AirPods into clinical-grade hearing aidsIf the test indicates mild to moderate hearing loss, you will be prompted to enable the new hearing aid feature. This Hearing Aid mode is pretty groundbreaking. It essentially turns yourAirPods Pro 2 into a clinical-grade hearing aid. Using Apple's H2 chip and advanced computational audio technology, it enhances sound clarity in real time. Let's learn how to set up hearing assistance and turn on the hearing aid feature.While wearing your AirPods Pro 2, tapHearing Assistance in your AirPods settings on your iPhone.You can start a new hearing test from here or selectresults from a test you've already taken.We'll tapUse a Prior Test Result.Answer thequestions on the Provide Some Details screen.Scroll down and tapNext.Now, select acompatible Hearing Test result.Then, tap Next, and the results and recommendations from your selected test will appear.If your test indicates mild to moderate hearing loss, tapSet up Hearing Aid and follow the prompts.When Hearing Aid is ready, tapTurn On Hearing Aid andtap Done.GET FOX BUSINESS ON THE GO BY CLICKING HEREOnce the Hearing Aid feature is on, it's saved to your AirPods Pro 2, so make sure that you don't share your AirPods with anyone. Also, keep in mind that it might take some time to get used to the adjustments based on your personalized hearing profile. You can make additional changes in Control Center at any time. Here's how:TapHearing Assistance in your AirPods settings again andcustomize your Hearing Assistance settings.If you tapAdjustments, you'll find options and sliders to help you further adjust the Hearing Aid feature.Plus,Media Assist is on by default, which automatically improves the clarity of music, phone calls and FaceTime calls.Advanced hearing protectionThe new Hearing Protection feature is designed to safeguard your ears from loud noises in daily life. It actively adjusts to sudden loud sounds, protecting your hearing in noisy environments like concerts or even during your daily commute. What's really cool is how Apple has packaged all of this hearing test, hearing aid, and noise protection into one seamless experience. Advanced hearing protection with AirPods Pro. (Apple)Beyond AirPods: Professional-grade hearing solutionsNow, if the test indicates mild to moderate hearing loss, as we mentioned, you'll be able to use theAirPods Pro 2 as a hearing aid. However, if you have more severe hearing loss, you may need aproduct which is much better for the hearing-impaired.Kurt's key takeawaysThis Apple update to theAirPods Pro 2 is a pretty big deal in the world of hearing health. By making these tools so accessible, Apple's potentially changing the game for millions of people who might have otherwise ignored their hearing health. It's exciting to think about how this could lead to more people taking care of their ears and catching hearing issues early on.CLICK HERE TO GET THE FOX NEWS APPWhat barriers have you encountered in addressing your hearing health, and how do you think innovations like these could help overcome them? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 10 Views
  • WWW.FOXNEWS.COM
    Exoskeleton helps paralyzed people regain independence
    Tech Exoskeleton helps paralyzed people regain independence Wearable robot can actually walk over to person in wheelchair Published November 15, 2024 6:00am EST close The exoskeleton helping paralyzed people regain independence It can actually walk to a person in a wheelchair, solving a major problem. Advancements in technology are continually reshaping the landscape of mobility aids, particularly for individuals with disabilities.Among these innovations, the WalkON Suit F1, developed by KAIST (Korea Advanced Institute of Science and Technology), stands out as a groundbreaking solution for paraplegic patients.Let's delve into the features, development and implications of this remarkable wearable robot. WalkON Suit F1 (KAIST)What's so special about this suit?Imagine an exoskeleton that doesn't just help you walk, it comes to you. That's right, the WalkON Suit F1 can actually walk over to a person in a wheelchair. This incredible piece of tech solves a major problem that other exoskeletons face. You see, most exoskeletons require helpers to lift users out of their wheelchairs and strap them in. But the WalkON Suit F1? It's got a nifty front-docking system that lets the person put it on while still seated in their wheelchair. Talk about independence.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The suit features a system "that actively controls the center of its weight against the pull of gravity" to prevent it from toppling over as the person stands up. And get this: The WalkON Suit F1 has been tweaked to allow people to use both hands while standing upright and even take short walks without needing a cane. WalkON Suit F1 (KAIST)Tech specs of the exoskeletonFor those of you who love the nitty-gritty details, let me break down what makes the WalkON Suit F1 tick. This exoskeleton is packed with cutting-edge technology that sets it apart from its predecessors.First up, it's got an impressive balance control system that actively manages its center of weight, ensuring it doesn't topple over when the user stands up. This is a game-changer for stability and user confidence.The team has also made significant strides in motor technology, with the output density of the motors doubling compared to previous versions. This means more power in a compact package, which is crucial for a wearable device.But the innovations don't stop there. The WalkON Suit F1 incorporates AI integration through an onboard neural network application, making the suit more adaptable to different users and situations.And let's not forget about the vision recognition system, which allows the suit to spot and navigate around obstacles, adding an extra layer of safety and independence for the user.The team has made some serious advancements in the components. They've domestically produced all the core parts, including the motor, reducer, motor driver and main circuit. The motor's output density has improved twofold, and the control performance of the motor driver is about three times better than the best overseas technology. Now, that's what I call progress.GET FOX BUSINESS ON THE GO BY CLICKING HERE WalkON Suit F1 (KAIST)Putting the exoskeleton to the testNow, you might be wondering, "How do we know this thing really works?" Well, let me tell you about the Cybathlon. It's like the Olympics for cyborgs, and it's where assistive technologies go head-to-head.In the 2024 Cybathlon, the WalkON Suit F1 didn't just participate, it dominated. The team's pilot, Seunghwan Kim, completed all the challenges in just six minutes and 41 seconds, securing first place. We're talking tasks like sidesteps between narrow chairs, moving boxes and even food prep in the kitchen, all without crutches. WalkON Suit F1 (KAIST)The brains behind the exoskeletonLet's give a shout-out to Professor Kyoung-Chul Kong from KAIST's Department of Mechanical Engineering. This guy has been working on exoskeletons since around 2015. The first WalkON Suit hit the scene in 2016, and by 2020, they had the WalkON Suit 4.0 walking at a speedy 1.98 mph. That's practically jogging for an exoskeleton. WalkON Suit F1 (KAIST)Kurts key takeawaysThe WalkON Suit F1 is about giving people with paraplegia more independence and mobility. As Professor Kong puts it, this suit is "the culmination of wearable robot technology for the disabled." It's setting new standards for the entire industry, and I, for one, can't wait to see where this technology goes next. Who knows? Maybe in a few years, we'll see these suits zipping around our cities, helping people live life to the fullest.CLICK HERE TO GET THE FOX NEWS APPWhat are your thoughts on how innovations like the WalkON Suit F1 can change the lives of individuals with disabilities, and what future advancements would you like to see in assistive technology?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 12 Views
  • WWW.FOXNEWS.COM
    Solar-powered aircraft achieves groundbreaking 22-hour autonomous flight
    Published November 14, 2024 6:00am EST close Solar-powered aircraft achieves groundbreaking 22-hour autonomous flight Aircraft can stay airborne for weeks without refueling. Imagine an aircraft that can stay airborne for weeks, even months, without refueling. This isn't futuristic fantasy.Skydweller Aero is working toward turning this vision into reality with its innovative solar-powered plane.As the world's largest unmanned solar-powered aircraft, Skydweller is pushing the boundaries of what's possible in aviation. Skydweller Aero solar aircraft (Skydweller Aero)A milestone achievementSkydweller Aero recently achieved a significant milestone by completing a series of uncrewed autonomous flight tests. The longest of these flights lasted an impressive 22 hours, launched from the company's facility at Stennis International Airport in Kiln, Mississippi. This achievement demonstrates the feasibility of remaining airborne for extended periods using solar energy and batteries. Skydweller Aero solar aircraft (Skydweller Aero)The Skydweller advantageWhat sets Skydweller apart from its predecessors? Its foundation is built on the Solar Impulse, the first solar-powered aircraft to circumnavigate the globe. This heritage provides Skydweller with a robust design capable of carrying substantial payloads. With a wingspan of 236 feet (larger than a 747) and weighing just 5,620 pounds (about the same weight as a Ford F150), the Skydweller can carry up to 800 pounds of payload. Skydweller Aero solar aircraft (Skydweller Aero)Military applications and beyondThe Navy has demonstrated significant interest in Skydweller's potential, as evidenced by recent flight tests conducted as part of a Joint Concept Technology Demonstration, which previously played a key role in the development of platforms like the Global Hawk and Predator. This initiative, overseen by the Office of the Undersecretary of Defense for Research and Engineering and supported by a cooperative research and development agreement with the Naval Air Warfare Center Aircraft Division, aims to evaluate autonomous maritime patrol aircraft. Skydweller's ability to remain airborne for extended periods could revolutionize maritime patrol and surveillance operations.Persistent surveillance for maritime and border securitySkydweller Aero's uncrewed, autonomous solar-powered aircraft offers continuous surveillance capabilities, enhancing maritime border security, monitoring illegal fishing activities and preventing unauthorized operations such as trafficking and smuggling. The aircraft's long endurance enables round-the-clock coverage, significantly bolstering national security efforts.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Telecommunications and connectivityBy serving as a non-terrestrial communications platform, Skydweller Aero provides cost-effective, airborne telecom solutions to remote areas and underserved populations. This capability not only connects the unconnected but also promotes economic development in these regions.Disaster response and humanitarian aidIn times of crisis, Skydweller Aero's aircraft can rapidly respond to disasters, offering real-time aerial assessments, communication relays and tracking for relief operations. The solar-powered endurance ensures extended, consistent coverage, complementing other assets or providing solutions where alternatives are unavailable or cost-prohibitive.Environmental monitoring and researchSkydweller Aero's ultra-long endurance and remote access capabilities make it an invaluable asset for environmental and scientific research. From climate and wildfire monitoring to geophysical surveys, the aircraft enables meaningful, long-baseline data collection across vast regions, contributing significantly to environmental protection efforts. Skydweller Aero solar aircraft (Skydweller Aero)The road to commercializationWhile military applications are the initial focus, Skydweller Aero has its sights set on commercial markets, too. CEO Robert Miller envisions a future where solar-powered aircraft could serve as airborne communication platforms, complementing satellite networks. Miller sees solar aircraft as a complementary capability to LEO satellite communications rather than a direct rival, with the potential for providing continuous coverage in specific regions.GET FOX BUSINESS ON THE GO BY CLICKING HERE Skydweller Aero solar aircraft (Skydweller Aero)Overcoming technical challengesDeveloping a solar-powered aircraft isn't without its challenges. Many previous attempts by other companies have ended in failure. Skydweller's success lies in its team's expertise in aeroelasticity, ensuring the aircraft can withstand the stresses of flight. As CEO Robert Miller explains,"Fundamentally, my team has a lot more experience in aeroelasticity than all the other solar programs combined." Skydweller Aero solar aircraft (Skydweller Aero)Kurts key takeawaysAs the world's largest unmanned solar aircraft, Skydweller Aero is revolutionizing aviation and opening up exciting new possibilities. From enhancing maritime patrols to serving as airborne communication platforms, the potential applications are vast. While challenges remain, Skydweller's recent successful test flights demonstrate just how far solar aviation technology has advanced.CLICK HERE TO GET THE FOX NEWS APPWhat challenges do you foresee in the widespread implementation of solar-powered aircraft technology, and how might they be overcome? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 12 Views
  • WWW.FOXNEWS.COM
    Why that Google Meet error might be a sneaky hacker trick
    Published November 14, 2024 10:00am EST close Tech expert explains how AI kidnapping scammers replicate people's real voices Cyble CEO and Chair Beenu Arora explains how scammers use AI to replicate people's real voices in a kidnapping scam. A new scam called ClickFix is targeting users and is on the rise in the U.S. As the name suggests, it prompts you to click on a link, claiming to fix an issue, but in reality it infects your computer with malware.Ireported on this earlier, detailing how threat actors used messages impersonating errors from Google Chrome, Microsoft Word and OneDrive to infect users' computers.Now, a similar type of attack is affecting Google Meet users, regardless of whether theyre using a Windows PC or a Mac. I explain how this cyberattack works and what you can do to protect yourself. A woman working on her laptop (Kurt "CyberGuy" Knutsson)How the Google Meet trap worksAccording to Frenchcybersecurity company Sekoia, it all starts with an email containing a link to a Google Meet. The email can come from any address and may be socially engineered to look like it's related to your organization. It could link to a Google Meet invite for a meeting, webinar, online collaboration or something similar. When you click on the link, youll be directed to a fake Google Meet page, which will soon display a warning claiming theres an issue with your PC. It might say your microphone or camera isn't working or there's a problem with your headset.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?You can expect to see the following URLs in these fake meeting emails:meet[.]google[.]us-join[.]commeet[.]google[.]web-join[.]commeet[.]googie[.]com-join[.]usmeet[.]google[.]cdm-join[.]usThis fake page will also display a pop-up offering to fix the issue, showing phrases like "Press the key combination" or "CTRL+V." When you follow these instructions, malicious code is pasted into the Windows prompt, infecting your computer with malware. Once the code is on your computer, hackers can gain access to your cryptocurrencies, sensitive files and personal information.Sekoia has uncovered several other malware distribution clusters beyond Google Meet. These include platforms like Zoom, PDF readers, fake video games (such as Lunacy, Calipso, Battleforge and Ragon), web3 browsers and projects like NGT Studio and messenger apps such as Nortex. Fake Google Meet page (Sekoia)The bigger pictureBack in July, McAfee noticed that ClickFix campaigns were ramping up, especially in the U.S. and Japan (viaBleeping Computer). Lately, two groups Slavic Nation Empire and Scamquerteo have been behind some of these attacks. Both are said to be offshoots of larger crypto scam gangs Marko Polo and CryptoLove.Earlier this year, Proofpoint found thatmalware was spreading by pretending to be fake error messages for Google Chrome, Word and OneDrive, tricking people into downloading malicious code. They also pointed out a method called "email lure," where hackers send fake emails pretending to be from MS Word to infect computers.GET FOX BUSINESS ON THE GO BY CLICKING HERE Fake page requests (Sekoia)4 ways to protect yourself from harmful softwareThe fake Google Meet page creates a sense of urgency, making users click on the links and unknowingly compromise their devices. There are several steps you can take to protect yourself from such cyberattacks.1. Have strong antivirus software:The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Monitor your accounts: Regularly review your bank statements, credit card statements and other financial accounts for any unauthorized activity. If you notice any suspicious transactions, report them immediately to your bank or credit card company.3. Place a fraud alert:Contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification.4. Enable two-factor authentication:Enabletwo-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.Kurts key takeawaysHackers have come up with sneaky ways to trick you into installing malware. They use social engineering to make emails and website prompts look legit, hoping you'll click on a link and follow their instructions. The best way to protect yourself is by avoiding unknown links and always checking the URL of the page you're on before taking any action.CLICK HERE TO GET THE FOX NEWS APPHave you ever received an email or prompt that looked suspicious but seemed legitimate at first glance? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 12 Views
  • WWW.FOXNEWS.COM
    Oops, heres how to edit and unsend a message on iPhone before its too late
    Tech Oops, heres how to edit and unsend a message on iPhone before its too late Edit and unsend iMessages with ease Published November 13, 2024 6:00am EST close Oops, heres how to edit and unsend your messages on iPhone before its too late With the latest iOS updates, you can unsend your iMessages. We've all experienced that moment of panic after sending a text message, whether its a typo, an accidental send to the wrong person or something you wish you could take back.Thankfully, if you're an iPhone user, there's good news.With the latest iOS updates, you can edit or unsend your iMessages. Lets dive into how you can save yourself from potential embarrassment. Messages app on iPhone (Kurt "CyberGuy" Knutsson)How to edit a sent iMessageOpen theMessages app and find theiMessage you want to changeLong-press on the messageA pop-up menu will appear; tap on Edit.Adjust the text as neededTap theblue check mark to confirm your changesCLICK HERE FOR MORE US NEWS Steps to edit a sent iMessage (Kurt "CyberGuy" Knutsson)Important notes about editing a sent iMessageYou have 15 minutes after sending a message to edit it.You can edit the same message up to five times.The recipient will see an "Edited" label on any modified messages, allowing them to view the original text if they choose.How to unsend an iMessageJust like editing, start by opening theMessages app and finding the message.Long-press on the messageIn the pop-up menu, chooseUndo SendThe message willvanish from both your device and the recipient's screen.GET FOX BUSINESS ON THE GO BY CLICKING HERE Steps to unsend an iMessage (Kurt "CyberGuy" Knutsson)Key considerations about unsending an iMessageYou only have two minutes after sending a message to unsend it.The recipient may still see a notification that you unsent a message.This feature only works for iMessages (blue bubbles), not SMS texts (green bubbles).Limitations you should knowWhile these features are incredibly useful, they come with some limitations.Both you and the recipient must be using iOS 16 or later for full functionality.If the recipient is on an older version or using a non-Apple device, your edits or unsends may not work as intended.Kurt's key takeawaysWith these simple steps, you can easily correct mistakes or retract messages that you may regret sending. The ability to edit and unsend messages is a welcome addition for anyone who has ever felt that pang of regret after hitting "send."What other messaging features would you like to see added to iMessage or other messaging apps in the future? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 16 Views
  • WWW.FOXNEWS.COM
    Your email didnt expire; its just another sneaky scam
    Published November 13, 2024 10:00am EST close Beware of new sneaky parking QR code scam The new scam is giving parkers everywhere a major headache. Its hard to ignore the rise of phishing scams these days. They seem to pop up in our inboxes with alarming frequency. As we become more aware of these deceptive tactics, scammers are also upping their game, using increasingly sophisticated methods to lure in unsuspecting victims.One particularly sneaky tactic involves impersonating a help desk or support team. You might receive an email claiming that your Microsoft 365 account is set to expire today.The goal? To create a sense of panic and urgency, prompting you to act quickly without thinking. So, how do you recognize these scams and protect yourself from falling victim to them? Let's go down that road to keep you safe. A woman opening email on laptop (Kurt "CyberGuy" Knutsson)How can you tell if it is a scam email?Its easy to see why people fall prey to these sorts of tactics, because scammers do a relatively good job of making these scam emails appear professional and legitimate. They go as far as to change the contact information of the email sender to something legitimate like an actual helpdesk or IT department or business.Upon further examination of the email senders contact information, you can see that the domain address of the actual email address is different and random. For example, the name in the "From" field of the email may read from helpdesk, but if you click on the contact information to view the email address, it will have a domain from @magicpin.in, @gmail.com or @hotmail.com, etc. If its an email supposedly from Microsoft, you'd expect the domain to be microsoft.com. Microsoft scam email (Kurt "CyberGuy" Knutsson)How are victims exploited by these types of scams?Getting a "fake" email may seem relatively benign, but it can be a slippery slope to identity theft and fraud. Below are ways in which scammers take advantage of their victims with these phishing email scams:1. Email validation: By opening the email or engaging with the email (clicking a link or responding to it), you can validate that the email account they messaged is active. Oftentimes, scammers randomly email people whose email address they've gotten from data breaches, the dark web or data harvesting.2. Information gathering: If you reply to the email or use any other contact information they provide to "reinstate" your account, it will validate that the email address they reached out to is active, and they will likely hard-sell you for financial and personal information. If you call any phone number they provide you, they will also connect your phone number with your email address so they can continue to update their information on you.3. Malware distribution: They will often have buttons, links or attachments included in the email. If you click the attachment, it can download malware or a virus to your device. If you click on a link that's provided in the email, it might take you to a website that will collect your personal and financial information or download malware or viruses to your device.CLICK HERE FOR MORE US NEWS Illustration of scammer at work What should you do if you receive these types of phishing emails?There are a few easy steps you can take if you receive an email you suspect is a phishing scam.1. Do not click on any links or buttons and do not download or open any attachments: This helps prevent malware installation and protects your personal information. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.GET FOX BUSINESS ON THE GO BY CLICKING HERE2. Do not reply or reach out to these scammers by email or phone: Engaging with them can confirm your email address is active, leading to more scams.3. If your email client allows it, you can block the sender and report it as a phishing email: This action helps protect yourself and others by alerting your email provider to malicious activity.4. Verify the email's legitimacy by checking the official website of the organization: Directly accessing your account ensures you receive accurate information without falling for fake notifications.5. If two-factor authentication is offered for your account, enable it:2FA adds an extra layer of security, making it harder for scammers to gain access even if they have your password.6. Invest in personal data removal services: Reducing your digital footprint minimizes the risk of identity theft and scams based on harvested data. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurts key takeawaysPhishing scams are becoming increasingly sophisticated, but staying informed and vigilant can significantly reduce your risk. By adopting good digital habits and following the tips we've shared, you can navigate the online world with confidence. Remember, awareness is your best defense, so keep sharing this knowledge with friends and family to help protect everyone from these deceptive tactics.What's the most unusual or clever phishing attempt you've encountered, and how did you recognize it as a scam? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 14 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: AI developers discover 'Donald Trump neuron', expert says
    Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- AI developers discover 'Donald Trump neuron', expert says- Petition calls for Trump admin to appoint Musk as AI advisor- OpenAI touts AI infrastructure blueprint to outcompete China, bolster economy under incoming Trump admin. (Omar Marques/SOPA Images/LightRocket/CHARLY TRIBALLEAU/AFP)'DONALD TRUMP NEURON': Artificial intelligence recognizes images and the name of President-elect Donald Trump so much that the phenomenon is referred to as a "Donald Trump neuron," expert Chris Olah says.MUSK PETITION: Anartificial intelligence (AI) advocacy group is urging President-elect Trump to make billionaire entrepreneur Elon Musk a special adviser to the White House focused on AI. INDIA - 2024/05/17: In this photo illustration, the OpenAI logo is seen displayed on a mobile phone screen with ChatGPT logo in the background. (Photo Illustration by Idrees Abbas/SOPA Images/LightRocket via Getty Images) (Idrees Abbas/SOPA Images/LightRocket via Getty Images)HELP FROM SILICON VALLEY: OpenAI has assembled a "blueprint" for artificial intelligence infrastructure that the company hopes will be considered by the incoming Trump administration and Congress suggesting that the plan will help the United States maintain its lead in the field over competitors like China.WHOS RECORDING YOU: Remember when recording a phone call on your iPhone felt like trying to solve a Rubik's Cube blindfolded? Well, those days are officially over. With the release of iOS 18.1, Apple has introduced a native call recording feature as part of Apple Intelligence. Native call recording feature on iPhone (Apple)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere.
    0 Comments 0 Shares 12 Views
  • WWW.FOXNEWS.COM
    FBI, CISA say Chinese hackers breached multiple US telecom providers in targeted attack
    Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) said that People's Republic of China (PRC) hackers breached commercial telecommunication service providers in the U.S.The breached entities have been warned, and the agencies are proactively alerting other potential targets of elevated cyber activity."The U.S. government's continued investigation into thePeople's Republic of China (PRC) targeting ofcommercial telecommunications infrastructure has revealed a broad and significant cyber espionage campaign," the agencies said Wednesday in a joint release.CHINESE HACKERS ATTEMPTED TO BREACH TRUMP AND HARRIS CAMPAIGNS' CELLPHONE DATA The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) say Chinese hackers breached commercial telecommunication service providers in the U.S. (Chip Somodevilla/Getty Images)The agencies said that PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call record data, as well as private communications of a "limited number of individuals who are primarily involved in government or political activity."The joint statement said that the PRC actors also copied "certain information that was subject to U.S. law enforcement requests pursuant to court orders.""We expect our understanding of these compromises to grow as the investigation continues," the agencies noted. The U.S. government is investigating China for targeting commercial telecommunications infrastructure in America. (CISA)The agencies said that they are working to "strengthen cyber defenses," and encouraged organizations that believe they were impacted to contact their local FBI field office or CISA."The FBI and the CISA continue to render technical assistance, rapidly share information to assist other potential victims, and work to strengthen cyber defenses across the commercial communications sector," the agencies said. "We encourage any organization that believes it might be a victim to engage its local FBI Field Office or CISA." The reports of continued Chinese interference in the U.S. come after hackers targeted the Trump and Harris presidential campaigns. (Paul Yeung/Bloomberg via Getty Images)The reports of continued Chinese interference in the U.S. come after hackers targeted President-elect Trump and Vice President Kamala Harris' campaigns during the thick of the race for the White House."After the FBI identified specific malicious activity targeting the sector, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) immediately notified affected companies, rendered technical assistance, and rapidly shared information to assist other potential victims," the FBI and CISA previously told Fox News Digital in a joint statement.Fox News Digital has reached out to the FBI for comment.
    0 Comments 0 Shares 13 Views
  • WWW.FOXNEWS.COM
    Prada's out-of-this-world spacesuit for NASA
    Published November 12, 2024 6:00am EST close 'CyberGuy': Prada's out-of-this-world spacesuit for NASA Kurt Knutsson discusses how Axiom Space and luxury designer Prada are collaborating on NASA's Artemis III spacesuit design. In an unexpected yet fascinating collaboration, Axiom Space has joined forces with the prestigious luxury Italian fashion house Prada to design the next-generation spacesuit for NASA's Artemis program. This partnership marks a significant shift in how spacesuits are conceived, merging high fashion with advanced engineering.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletterhere! AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)The need for new spacesuitsNASA has been using the same extravehicular activity suits since 1982, and there have been no new designs for lunar missions since the Apollo program ended in 1972. To address this gap, NASA awarded Axiom Space a contract worth $228 million in 2022 to develop a modern version of the Apollo suit, leading to the creation of theAxiom Extravehicular Mobility Unit (AxEMU) suit. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Blending fashion with functionAt first glance, involving a fashion designer in an engineering project may seem unusual. However, Axiom and Prada's collaboration highlights an innovative approach to spacesuit design. The AxEMU suit incorporates aesthetic considerations alongside functionality, reflecting a trend seen inprevious designs, such as those for SpaceX's Dragon astronauts. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Key features of the AxEMU SuitAdaptive fit: Unlike previous suits tailored for individual astronauts, the AxEMU is designed to fit 99% of both males and females, enhancing comfort and usability.Advanced materials: The suit features high-performance materials developed through Prada's expertise, ensuring durability against lunar conditions.Enhanced mobility: Innovative joint designs allow for a greater range of motion, enabling astronauts to perform tasks more effectively.Safety innovations: The AxEMU includes redundant systems and self-diagnostic capabilities to ensure astronaut safety during missions. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Unveiling at the International Astronautical CongressThe AxEMU was formally unveiled at the International Astronautical Congress in Milan. During this event, both Axiom Space and Prada emphasized their commitment to pushing boundaries in space exploration through collaborative efforts.Russell Ralston, executive vice president of extravehicular activity at Axiom Space, said,"We are pioneering a new era in space exploration where partnerships are imperative to the commercialization of space."Lorenzo Bertelli, Prada Group chief marketing officer, added,"Going beyond our limits is one of the companys values that perfectly reflects the spirit of the Prada brand." AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Testing and future prospectsThe AxEMU is currently undergoing extensive testing, including simulations designed to mimic lunar conditions. It is expected to enter its critical design review phase in 2025. This rigorous testing process aims to ensure that astronauts are equipped with reliable and advanced capabilities for future lunar missions. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysWho would have thought that high fashion and space exploration could find common ground? Yet here we are, witnessing a luxury brand contribute its expertise to one of humanity's most ambitious endeavors. By combining Prada's knowledge of materials and craftsmanship with Axiom's engineering prowess, we're seeing a suit that promises to be more comfortable, more adaptable and more efficient than anything that's come before.Could we see more fashion houses getting involved in space tech? One thing's for sure: The AxEMU suit is a perfect example of what can happen when we think outside the box and bring diverse expertise together. As we continue to reach for the stars, it seems that the sky is no longer the limit, not even for fashion.How do you feel about the role of aesthetics in spacesuit design? Do you think looking good in space is just as important as functionality?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 12 Views
  • WWW.FOXNEWS.COM
    Alarming rise of fake legal requests: What it means for your privacy
    Published November 12, 2024 10:00am EST close Tips to protect yourself against bank scams Scammers often ask for answers to secret questions for crucial information needed to access accounts. Phishing emails are one of the most common tricks scammers use, but theyre usually easy to catch if you pay attention. Awkward grammar, random details and, most importantly, an unofficial email address are dead giveaways. For example, you might get an email saying your Apple IDs been disabled, but the senders email wont actually be from Apple. Now, though, scammers are finding ways to get around this.According to the FBI, theres been a recent rise in cybercriminal services using hacked police and government email accounts to send fake subpoenas and data requests to U.S.-based tech companies.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)What you need to knowTheFBI has seen a spike in criminal forum posts about emergency data requests and stolen email credentials from police departments and government agencies. Cybercriminals are getting into compromised U.S. and foreign government email accounts and using them to send fake emergency data requests to U.S.-based companies, which exposes customer data for further misuse in other crimes.In August 2024, a popular cybercriminal on an online forum advertised "high-quality .gov emails" for sale, meant for espionage, social engineering, data extortion, emergency data requests and more. The listing even included U.S. credentials, and the seller claimed they could guide buyers on making emergency data requests and even sell real stolen subpoena documents to help them pose as law enforcement.Another cybercriminal boasted about owning government emails from over 25 countries. They claimed anyone can use these emails to send a subpoena to a tech company and get access to usernames, emails, phone numbers and other personal client info. Some con artists are even hosting a "masterclass" on how to create and submit their own emergency data requests to pull data on any social media account, charging $100 for the full rundown. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)How this phishing scam worksWhen law enforcement, whether federal, state or local, wants information about someones account at a tech company, like their email address or other account details, they typically need a warrant, subpoena or court order. When a tech company receives one of these requests from an official email address, theyre required to comply. So, if a scammer gets access to a government email, they can fake a subpoena and get information on just about anyone.To bypass verification, scammers often send emergency data requests, claiming that someones life is at risk and that the data is needed urgently. Because companies dont want to delay in case of an actual emergency, they may hand over the information, even if the request turns out to be fake. By portraying it as a life-or-death situation, scammers make it harder for companies to take time to verify the request.For example, the FBI reported that earlier this year, a known cybercriminal posted pictures on an online forum of a fake emergency data request theyd sent to PayPal. The scammer tried to make it look legitimate by using a fraudulent mutual legal assistance treaty, claiming it was part of a local investigation into child trafficking, complete with a case number and legal code for verification. However, PayPal recognized that it wasnt a real law enforcement request and denied it. Illustration of a person receiving a phishing email (Kurt "CyberGuy" Knutsson)What can companies do to avoid falling for these phishing scams?1) Verify all data requests: Before sharing sensitive information, companies should verify every data request, even those that look legitimate. Establish a protocol for confirming requests directly with the agency or organization that supposedly sent them.2) Strengthen email security:Use email authentication protocols like DMARC, SPF and DKIM to block emails from unauthorized sources. Implement anti-phishing filters to detect suspicious content in messages.3) Train employees on phishing awareness: Regular training sessions on phishing scams can help employees recognize red flags, such as urgent language, unusual requests or emails from unknown addresses. Employees should be encouraged to report suspicious emails.4) Limit access to sensitive data: Restrict who can view or share sensitive customer data. Fewer people with access means fewer chances for accidental or intentional data leaks.5) Implement emergency verification procedures: Have a clear verification process in place for "emergency" data requests, including steps for double-checking with higher management or legal teams before responding to any urgent request for customer information. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)Is there something you need to do?This particular phishing scam mostly targets big tech companies, so theres not much you can do directly. However, its a reminder that you shouldnt automatically trust an email, even if it comes from a .gov address. Here are some steps you can take to stay safe.1) Double-check email addresses and links: Even if an email looks official, take a moment to check the senders email address and hover over any links to see where they actually lead. Be cautious if anything looks off. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Enable two-factor authentication (2FA):Use2FA for all sensitive accounts. This extra layer of security helps protect you even if your login credentials are compromised.3) Stay updated on phishing scams:Keep an eye on the latest phishing tactics, so you know what to look out for. Regular updates help you spot new types of scams before they affect you.4) Verify suspicious requests:If you get an unexpected email asking for sensitive info, contact the sender directly through an official channel to confirm the request. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)Kurts key takeawayScammers are taking phishing emails to a whole new level. I often recommend checking the email carefully when you receive anything suspicious to see if its legit. But now, since scammers can even access government emails, you need to be extra cautious. This phishing scam seems to target mostly big tech companies, so its on them to strengthen their security and verify every request thoroughly before sharing any user information. It's also up to governments worldwide to protect their digital assets from being compromised.Whats your stance on how governments are handling cybersecurity? Are they doing enough to protect sensitive data? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 15 Views
  • WWW.FOXNEWS.COM
    Top scams targeting our military heroes and how to avoid them
    Published November 11, 2024 10:00am EST close Veterans, first responders are top of mind for this celebrity chef Chef Robert Irvine of the Robert Irvine Foundation speaks with Fox News Digital about the importance of supporting veterans and first responders this Veterans Day and some unique ways to do so. Cyberscammers are some of the most heartless people out there. They dont even spare our military heroes.Last year, these criminals stole $477 million from veterans, military personnel and their spouses, according to the Federal Trade Commission (FTC). Thats a $63 million jump from 2022, showing that the military community is a big target for scammers. The number of military members who lost money to these attacks went up by 7% to 30,948, per the FTCs latest data.These scammers use all kinds of tricks to get veterans to hand over personal info or hard-earned cash, including veterans' benefit scams and IRS scams. I break down five of the most common scams targeting our military heroes and how to stay safe from them.Enter bysigning up for my free newsletter! Image of military personnel (Kurt "CyberGuy" Knutsson)Romance scamsRomance scams have become an increasingly painful reality for veterans, as scammers target them through fake online relationships to exploit their emotions and financial stability. Often, these scammers pose as attractive, understanding individuals on dating apps, social media platforms or even support forums specifically tailored for veterans. Theyll build a relationship over weeks or months, using flattery and fabricated stories to create a strong emotional connection with their target.Once the scammer believes theyve gained enough trust, theyll ask for money, typically by inventing a sudden, urgent situation. It might be a "medical emergency," a supposed travel expense to come to visit or even a claim that they need help with a legal matter. The requests start small but can quickly escalate as the scammer continues to manipulate the victim's emotions.This continues to be the most common fraud targeting veterans, costing them and their families over $40 million in 2020, according to Aura. Among all romance scam victims, those ages 50-69 were hit the hardest, losing $179.65 million in just the first three quarters of 2022. That figure has almost certainly surged in 2024. Image of military personnel supporting one another (Kurt "CyberGuy" Knutsson)Veterans benefit scamsSome scammers pretend to offer help with veterans' benefits. They promise to help increase benefits or expedite claims, but theyre really after personal information or a fee. A scammer might claim youre eligible for new or additional benefits, contacting you by phone, email or text. When dealing with unsolicited advice, remember that if it seems too good to be true, it probably is.Phishing scams from fake government agenciesPhishing scams are a social engineering trick where scammers send emails that look like theyre from official places, like the government or your bank. These legit-looking emails act as bait, but the real goal is to grab your banking or credit card info.Sometimes, these scam emails will ask you to click a link or download an attachment, which can install malware on your device. Scammers are also known to send phishing links through LinkedIn, Facebook or other social media.One classic example is the IRS scam. Though it targets everyone, military members are prime targets. Scammers pretend to be IRS agents, threatening jail time, fines or other penalties if they dont get immediate payment. They even spoof IRS caller IDs to make their calls look real.Rental property scamsRental property scams are a common way scammers try to exploit people looking for a place to rent. In these scams, fraudsters often post fake listings for apartments or houses on popular rental websites or social media platforms. The listing might look too good to be true, like a beautiful place at an unbelievably low price.The scammer will usually claim to be out of town or unavailable to meet in person, asking potential renters to send a deposit or rent payment upfront to "secure" the property. In some cases, they may even send fake lease agreements or claim that the property is already rented, but they can still "help" find a similar place.Car sales and financing scamsCar sales and financing scams targeting veterans are unfortunately common. Scammers know that veterans may have limited experience with certain financial deals, so they exploit that by offering unrealistic car sales or financing options. These scams can take various forms, and the result is often financial loss and stress. Image of military personnel honoring our troops (Kurt "CyberGuy" Knutsson)6 ways veterans can protect themselves from scams1) Be cautious with unsolicited offers: Whether its a phone call, email or text, if someone claims to offer help with veterans' benefits or promises something too good to be true, dont take the bait. Verify the legitimacy of any offer directly through official channels like the Department of Veterans Affairs (VA) or trusted veteran organizations.2) Watch out for emotional manipulation in online relationships: Romance scammers often prey on veterans' emotions. Avoid sharing personal or financial details with people you meet online, especially if the relationship feels rushed or too perfect. If someone asks for money after just a few weeks or months, its likely a scam.3) Verify government communications: Scammers often impersonate government agencies like the IRS or VA. If you get a message that threatens penalties or asks for personal information, dont respond. Instead, contact the agency directly using official contact details to confirm whether the message is legitimate.4) Be skeptical of rental or car sale deals that seem too good to be true: If a rental listing or car sale seems too cheap or perfect to be true, it probably is. Always visit the property or dealership in person, and never send money upfront without seeing the product or having a signed agreement.5) Protect your personal information: Avoid clicking on links or downloading attachments from unknown sources. Scammers use phishing emails and fake websites to steal personal and financial information. Ensure your devices have updated security software and be extra cautious when handling sensitive data online.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.6)Invest in data removal services: Consider using data removal services to protect your personal information from being harvested by scammers. These services can help remove your data from public databases and people-search websites, reducing the risk of identity theft and unwanted solicitations.Check out my top picks for data removal services here.Kurts key takeawayScammers rely on misinformation to trick you. However, by staying informed and being extra careful when navigating the internet, you can stay safe. These bad actors are constantly finding new ways to target veterans, from romance scams to fake government offers. Being cautious, verifying offers and keeping your data secure are the best ways to avoid falling victim to these heartless fraudsters.Do you think more needs to be done to protect military personnel from these types of scams? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 12 Views
  • WWW.FOXNEWS.COM
    Avoiding Siri slipups and apologies for butt dials
    Published November 11, 2024 6:00am EST close 'CyberGuy': Avoiding Siri-ous confusion on your work, personal iPhones Voice assistants may cause confusion across devices. Tech expert Kurt Knutsson offers some solutions to fix it. When it comes to using voice assistants across multiple devices, things can get a bit tricky. "Mike" from St. George, Utah, found himself in a comical yet frustrating situation with his personal and work iPhones. Let's dive into his predicament and explore some solutions.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! Man making a call using Siri on iPhone (Kurt "CyberGuy" Knutsson)The dilemmaMike has two iPhones, one for personal use and another for work. In his email to us, he explained his issue: "When using Siri to call my wife (Terrie) on my personal phone, my WORK phone dials a guy I work with also named Terry. So Im constantly having to explain my butt dial to him."This leads to awkward explanations and unnecessary "butt dials." The situation highlights a common challenge faced by many users with multiple devices, where voice assistants can become more of a hindrance than a help. Siri being used on iPhone (Kurt "CyberGuy" Knutsson)HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWAREAttempted solutionsMike's first attempt was to rename his wife's contact to "Wifey" on his personal phone. However, this didn't fully solve the problem, as Siri still struggled to differentiate between similar-sounding names across devices. Unfortunately, Apple doesn't allow users to change Siri's activation phrase to something custom like "Hey Wife." This limitation means we need to look for alternative solutions. iPhone and a laptop on a coffee table (Kurt "CyberGuy" Knutsson)HOW TO ASSOCIATE A RINGTONE WITH ONE OF YOUR CONTACTS ON YOUR PHONEEffective workarounds1) Use Siri Shortcuts:You can create a Siri Shortcut for calling your wife and assign a unique phrase to it. This way, you can say something like "Call Wifey" and it will only trigger on the phone where the shortcut is set up.Create a shortcutOpen the Shortcuts app on your iPhone.Tap the "+" icon to create a new shortcut.Add the action Call and select your wifes contact.Click Done Steps to create a Siri Shortcut on iPhone (Kurt "CyberGuy" Knutsson)Use Voice Control: You can enable Voice Control and create custom commands that wont interfere with Siri.Go to SettingsTap AccessibilityClick Voice ControlTurn on Voice Controlby toggling it onClick the Commands row Steps to set up Voice Control on iPhone (Kurt "CyberGuy" Knutsson)Click CustomClick Create new commandIn the phrase field, type "Call Wifey"Click the Action rowClick Run shortcutClick the first row you just set above called "Call"Click backClick Save in upper right-hand corner Steps to set up Voice Control on iPhone (Kurt "CyberGuy" Knutsson)Now go back to your home screen and say to your phone "Call Wifey" and it should call her.2) Disable Siri on one device: If you primarily use Siri on one phone, you can disable it on the other to prevent accidental triggers.Go to SettingsTap Siri (or could appear as Siri & Search depending on which iOS you have installed).Tap Talk to SiriTurn off Listen for "Hey Siri" and enable Press Side Button for Siri Steps to disable Siri on iPhone (Kurt "CyberGuy" Knutsson)3) Rename contacts differently: Since youve already tried renaming your wifes contact, you might want to use a more unique name that wont conflict with your work contacts. For example, you could use a nickname or a combination of her name and a unique identifier.IOS 18: MAXIMIZE YOUR PRIVACY BY TURNING OFF THESE 3 IPHONES SETTINGS NOWKurt's key takeawaysWhile Siri's confusion can be frustrating, there are several ways to work around the issue. The most effective solution seems to be using Siri Shortcuts or Voice Control, as these methods create unique commands that are less likely to be misinterpreted across devices. It's worth noting that voice assistant technology is continually improving. In the future, we may see more sophisticated context recognition that can better distinguish between similar names on different devices. Until then, these workarounds should help Mike avoid any more awkward explanations to his colleague Terry!In what ways do you think voice assistants could be improved for a better user experience? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 15 Views
  • WWW.FOXNEWS.COM
    Heroes among us: Celebrating American bravery on Veterans Day
    Tech Heroes among us: Celebrating American bravery on Veterans Day 11 inspiring podcasts, audiobooks, documentaries honoring courage of US service members Published November 11, 2024 8:00am EST close Veterans Day: Quaid, Adkins among Hollywood stars honoring military Stars such as Dennis Quaid, Trace Adkins and Erik Estrada share with Fox News Digital what Veterans Day means to them. In a time when stories of courage and sacrifice deserve to be heard, a collection of podcasts,documentaries and audiobooks shines light on the incredible journeys of American heroes.From the inspiring tales shared on the "Proud American" podcast hosted by Johnny Joey Jones to the eye-opening documentaries like "Wildcat" and "To Be of Service," these platforms honor the bravery of veterans, first responders and everyday individuals who embody the spirit of service. Join us as we explore these powerful narratives that not only celebrate their sacrifices but also highlight the ongoing challenges they face, offering a deeper understanding of what it truly means to be an American hero.Enter bysigning up for my free newsletter! Americans honoring our veterans (Kurt "CyberGuy" Knutsson) "#STILLSERVING" podcast (VFW) (Kurt "CyberGuy" Knutsson)This podcast is a must-listen for anyone looking to understand the current challenges facing veterans today. This engaging podcast, produced by the Veterans of Foreign Wars (VFW), dives deep into critical issues that affect service members and their families. With conversations featuring congressional leaders, Department of Defense officials and everyday veterans, each episode tackles important topics like legislation, mental health and community support. As we honor our veterans this Veterans Day, tuning into #StillServing is a great way to stay informed and connected to the ongoing dialogue about the needs and experiences of those who have served our nation. "Proud American" podcast (Fox News) (Kurt "CyberGuy" Knutsson)"Proud American" is another podcast available on every major podcast platform. It is hosted by Johnny Joey Jones, a Fox News correspondent and an Army veteran. In the podcast, Jones honors those who have protected and served our country over the years and echoes stories not only from veterans but also from first responders and everyday American heroes. "Modern Warriors" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)Written by Army veteran and "FOX & Friends Weekend" co-host Pete Hegseth,"Modern Warriors"highlights 15 inspiring stories from great American heroes, including Navy SEALs, Army Rangers, Marines and more. These people discuss what made them want to serve, what sacrificing for their country really means and so many other meaningful topics. You can find this audiobook on Audible now. "The Team House" podcast (YouTube) (Kurt "CyberGuy" Knutsson)"The Team House" is a podcast hosted by Jack Murphy and Dave Parke, both of whom are former Rangers. Murphy eventually became a Green Beret while Parke was a paramilitary contractor.They focus on interviewing other veterans and experts in their field of work. Some of their clips are only a few minutes long, while others go as long as 3.5 hours. The Team House podcast is available on multiple platforms, including Apple Podcasts, Spotify and YouTube.Listen to "The Team House" "Signature Wounds" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)If you want to listen to a good audiobook about veterans, you can listen to"Signature Wounds: The Untold Story of the Military's Mental Health Crisis" by David Kieran. The audiobook explores how much of an effect the Iraq and Afghanistan wars that the U.S. fought throughout the 2000s had on our troops mentally after the fact and how doctors labeled traumatic brain injuries as the "signature wound" among those who fought. You can find this audiobook on Audible right now. "Wildcat" documentary (Amazon) (Kurt "CyberGuy" Knutsson)Available on Prime Video now,"Wildcat" is a documentary that was released back in 2022. It follows a young former soldier suffering from post-traumatic stress disorder and how he copes with his suffering by developing a bond with a baby ocelot in the jungles of Peru. He meets this ocelot through a young woman who runs a wildlife rescue and rehabilitation center in the area. Watch the documentary with a Prime Video membership now. "Danger Close" podcast (officialjackcarr.com) (Kurt "CyberGuy" Knutsson)"Danger Close" with Jack Carr is another great podcast that you can listen to on major platforms, including Apple Podcasts and Spotify. Jack Carr is the host, and he spent 20 years as a Navy SEAL. He has served in various positions, including team leader, platoon commander, troop commander, task unit commander and sniper. Carr has written a series of books about his experiences as a SEAL, and on this podcast, he takes listeners beyond his experiences and has conversations with other veterans, writers and more. "By All Means Available" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)"By All Means Available"by Michael G. Vickers is also currently available on Audible. Vickers is a former Green Beret, and in 1984 he took on the immensely difficult job of taking charge of the CIAs secret war against the Soviets in Afghanistan. In this audiobook, he talks about all his experiences and how they have shaped him today, as well as the challenges that our nation is still facing 40 years later. "To Be of Service" documentary (Amazon) (Kurt "CyberGuy" Knutsson)If you're a dog lover, then you should watch"To Be of Service," available for rent on bothPrime Video andApple TV+. This documentary focuses on service dogs who help veterans work through their struggles with PTSD and how these dogs help restore a sense of independence and inner peace within these men and women who served. "The Protectors" podcast (Buzzsprout) (Kurt "CyberGuy" Knutsson)Available on every major podcast platform, including Apple Podcasts, Spotify and Amazon Music, "The Protectors" is hosted by Dr. Jason Piccolo, who is a seasoned veteran and a retired special agent. Piccolo interviews everyone from fellow veterans to authors and entertainers. It takes a look at both the sacrifices that our men and women in uniform have made and how those experiences have been turned into some noteworthy literature, films and other art forms that we read and watch today. "Here. Is. Better." documentary (Amazon) (Kurt "CyberGuy" Knutsson)"Here. Is. Better." is another inspiring documentary that is available to rent or buy on Prime Video right now. It follows four men and women suffering from PTSD after their time serving our country and how new breakthrough treatments are helping them to overcome their struggles. It's an information-packed film about how human beings experience and process trauma and how we can overcome it.Kurt's key takeawaysAs we reflect on the incredible stories shared through these podcasts and documentaries, it's clear that the journeys of our veterans deserve to be celebrated and understood. Each narrative not only highlights their bravery but also sheds light on the challenges they continue to face. By engaging with these powerful stories, we can foster a deeper appreciation for their sacrifices and contribute to ongoing conversations about support and healing. Lets honor their experiences and ensure that their voices are heard.What stories of courage and service have inspired you the most, and how do you think we can better support our veterans in our communities?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 13 Views
  • WWW.FOXNEWS.COM
    Avoiding Siri slipups and apologies for butt dials
    Published November 11, 2024 6:00am EST close 'CyberGuy': Avoiding Siri-ous confusion on your work, personal iPhones Voice assistants may cause confusion across devices. Tech expert Kurt Knutsson offers some solutions to fix it. When it comes to using voice assistants across multiple devices, things can get a bit tricky. "Mike" from St. George, Utah, found himself in a comical yet frustrating situation with his personal and work iPhones. Let's dive into his predicament and explore some solutions.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! Man making a call using Siri on iPhone (Kurt "CyberGuy" Knutsson)The dilemmaMike has two iPhones, one for personal use and another for work. In his email to us, he explained his issue: "When using Siri to call my wife (Terrie) on my personal phone, my WORK phone dials a guy I work with also named Terry. So Im constantly having to explain my butt dial to him."This leads to awkward explanations and unnecessary "butt dials." The situation highlights a common challenge faced by many users with multiple devices, where voice assistants can become more of a hindrance than a help. Siri being used on iPhone (Kurt "CyberGuy" Knutsson)HOW TO PROTECT YOUR IPHONE & IPAD FROM MALWAREAttempted solutionsMike's first attempt was to rename his wife's contact to "Wifey" on his personal phone. However, this didn't fully solve the problem, as Siri still struggled to differentiate between similar-sounding names across devices. Unfortunately, Apple doesn't allow users to change Siri's activation phrase to something custom like "Hey Wife." This limitation means we need to look for alternative solutions. iPhone and a laptop on a coffee table (Kurt "CyberGuy" Knutsson)HOW TO ASSOCIATE A RINGTONE WITH ONE OF YOUR CONTACTS ON YOUR PHONEEffective workarounds1) Use Siri Shortcuts:You can create a Siri Shortcut for calling your wife and assign a unique phrase to it. This way, you can say something like "Call Wifey" and it will only trigger on the phone where the shortcut is set up.Create a shortcutOpen the Shortcuts app on your iPhone.Tap the "+" icon to create a new shortcut.Add the action Call and select your wifes contact.Click Done Steps to create a Siri Shortcut on iPhone (Kurt "CyberGuy" Knutsson)Use Voice Control: You can enable Voice Control and create custom commands that wont interfere with Siri.Go to SettingsTap AccessibilityClick Voice ControlTurn on Voice Controlby toggling it onClick the Commands row Steps to set up Voice Control on iPhone (Kurt "CyberGuy" Knutsson)Click CustomClick Create new commandIn the phrase field, type "Call Wifey"Click the Action rowClick Run shortcutClick the first row you just set above called "Call"Click backClick Save in upper right-hand corner Steps to set up Voice Control on iPhone (Kurt "CyberGuy" Knutsson)Now go back to your home screen and say to your phone "Call Wifey" and it should call her.2) Disable Siri on one device: If you primarily use Siri on one phone, you can disable it on the other to prevent accidental triggers.Go to SettingsTap Siri (or could appear as Siri & Search depending on which iOS you have installed).Tap Talk to SiriTurn off Listen for "Hey Siri" and enable Press Side Button for Siri Steps to disable Siri on iPhone (Kurt "CyberGuy" Knutsson)3) Rename contacts differently: Since youve already tried renaming your wifes contact, you might want to use a more unique name that wont conflict with your work contacts. For example, you could use a nickname or a combination of her name and a unique identifier.IOS 18: MAXIMIZE YOUR PRIVACY BY TURNING OFF THESE 3 IPHONES SETTINGS NOWKurt's key takeawaysWhile Siri's confusion can be frustrating, there are several ways to work around the issue. The most effective solution seems to be using Siri Shortcuts or Voice Control, as these methods create unique commands that are less likely to be misinterpreted across devices. It's worth noting that voice assistant technology is continually improving. In the future, we may see more sophisticated context recognition that can better distinguish between similar names on different devices. Until then, these workarounds should help Mike avoid any more awkward explanations to his colleague Terry!In what ways do you think voice assistants could be improved for a better user experience? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 15 Views
  • WWW.FOXNEWS.COM
    Heroes among us: Celebrating American bravery on Veterans Day
    Tech Heroes among us: Celebrating American bravery on Veterans Day 11 inspiring podcasts, audiobooks, documentaries honoring courage of US service members Published November 11, 2024 8:00am EST close Veterans Day: Quaid, Adkins among Hollywood stars honoring military Stars such as Dennis Quaid, Trace Adkins and Erik Estrada share with Fox News Digital what Veterans Day means to them. In a time when stories of courage and sacrifice deserve to be heard, a collection of podcasts,documentaries and audiobooks shines light on the incredible journeys of American heroes.From the inspiring tales shared on the "Proud American" podcast hosted by Johnny Joey Jones to the eye-opening documentaries like "Wildcat" and "To Be of Service," these platforms honor the bravery of veterans, first responders and everyday individuals who embody the spirit of service. Join us as we explore these powerful narratives that not only celebrate their sacrifices but also highlight the ongoing challenges they face, offering a deeper understanding of what it truly means to be an American hero.Enter bysigning up for my free newsletter! Americans honoring our veterans (Kurt "CyberGuy" Knutsson) "#STILLSERVING" podcast (VFW) (Kurt "CyberGuy" Knutsson)This podcast is a must-listen for anyone looking to understand the current challenges facing veterans today. This engaging podcast, produced by the Veterans of Foreign Wars (VFW), dives deep into critical issues that affect service members and their families. With conversations featuring congressional leaders, Department of Defense officials and everyday veterans, each episode tackles important topics like legislation, mental health and community support. As we honor our veterans this Veterans Day, tuning into #StillServing is a great way to stay informed and connected to the ongoing dialogue about the needs and experiences of those who have served our nation. "Proud American" podcast (Fox News) (Kurt "CyberGuy" Knutsson)"Proud American" is another podcast available on every major podcast platform. It is hosted by Johnny Joey Jones, a Fox News correspondent and an Army veteran. In the podcast, Jones honors those who have protected and served our country over the years and echoes stories not only from veterans but also from first responders and everyday American heroes. "Modern Warriors" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)Written by Army veteran and "FOX & Friends Weekend" co-host Pete Hegseth,"Modern Warriors"highlights 15 inspiring stories from great American heroes, including Navy SEALs, Army Rangers, Marines and more. These people discuss what made them want to serve, what sacrificing for their country really means and so many other meaningful topics. You can find this audiobook on Audible now. "The Team House" podcast (YouTube) (Kurt "CyberGuy" Knutsson)"The Team House" is a podcast hosted by Jack Murphy and Dave Parke, both of whom are former Rangers. Murphy eventually became a Green Beret while Parke was a paramilitary contractor.They focus on interviewing other veterans and experts in their field of work. Some of their clips are only a few minutes long, while others go as long as 3.5 hours. The Team House podcast is available on multiple platforms, including Apple Podcasts, Spotify and YouTube.Listen to "The Team House" "Signature Wounds" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)If you want to listen to a good audiobook about veterans, you can listen to"Signature Wounds: The Untold Story of the Military's Mental Health Crisis" by David Kieran. The audiobook explores how much of an effect the Iraq and Afghanistan wars that the U.S. fought throughout the 2000s had on our troops mentally after the fact and how doctors labeled traumatic brain injuries as the "signature wound" among those who fought. You can find this audiobook on Audible right now. "Wildcat" documentary (Amazon) (Kurt "CyberGuy" Knutsson)Available on Prime Video now,"Wildcat" is a documentary that was released back in 2022. It follows a young former soldier suffering from post-traumatic stress disorder and how he copes with his suffering by developing a bond with a baby ocelot in the jungles of Peru. He meets this ocelot through a young woman who runs a wildlife rescue and rehabilitation center in the area. Watch the documentary with a Prime Video membership now. "Danger Close" podcast (officialjackcarr.com) (Kurt "CyberGuy" Knutsson)"Danger Close" with Jack Carr is another great podcast that you can listen to on major platforms, including Apple Podcasts and Spotify. Jack Carr is the host, and he spent 20 years as a Navy SEAL. He has served in various positions, including team leader, platoon commander, troop commander, task unit commander and sniper. Carr has written a series of books about his experiences as a SEAL, and on this podcast, he takes listeners beyond his experiences and has conversations with other veterans, writers and more. "By All Means Available" audiobook (Amazon) (Kurt "CyberGuy" Knutsson)"By All Means Available"by Michael G. Vickers is also currently available on Audible. Vickers is a former Green Beret, and in 1984 he took on the immensely difficult job of taking charge of the CIAs secret war against the Soviets in Afghanistan. In this audiobook, he talks about all his experiences and how they have shaped him today, as well as the challenges that our nation is still facing 40 years later. "To Be of Service" documentary (Amazon) (Kurt "CyberGuy" Knutsson)If you're a dog lover, then you should watch"To Be of Service," available for rent on bothPrime Video andApple TV+. This documentary focuses on service dogs who help veterans work through their struggles with PTSD and how these dogs help restore a sense of independence and inner peace within these men and women who served. "The Protectors" podcast (Buzzsprout) (Kurt "CyberGuy" Knutsson)Available on every major podcast platform, including Apple Podcasts, Spotify and Amazon Music, "The Protectors" is hosted by Dr. Jason Piccolo, who is a seasoned veteran and a retired special agent. Piccolo interviews everyone from fellow veterans to authors and entertainers. It takes a look at both the sacrifices that our men and women in uniform have made and how those experiences have been turned into some noteworthy literature, films and other art forms that we read and watch today. "Here. Is. Better." documentary (Amazon) (Kurt "CyberGuy" Knutsson)"Here. Is. Better." is another inspiring documentary that is available to rent or buy on Prime Video right now. It follows four men and women suffering from PTSD after their time serving our country and how new breakthrough treatments are helping them to overcome their struggles. It's an information-packed film about how human beings experience and process trauma and how we can overcome it.Kurt's key takeawaysAs we reflect on the incredible stories shared through these podcasts and documentaries, it's clear that the journeys of our veterans deserve to be celebrated and understood. Each narrative not only highlights their bravery but also sheds light on the challenges they continue to face. By engaging with these powerful stories, we can foster a deeper appreciation for their sacrifices and contribute to ongoing conversations about support and healing. Lets honor their experiences and ensure that their voices are heard.What stories of courage and service have inspired you the most, and how do you think we can better support our veterans in our communities?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 13 Views
  • WWW.FOXNEWS.COM
    How VPNs shield your identity and secure your financial transactions from theft
    close How VPNs shield your identity and secure your financial transactions from theft A VPN could be your secret weapon to protect your identity and finances. Ever feel like navigating the internet is like walking through a digital minefield?With cybercriminals lurking around every corner, protecting your identity and finances can feel daunting. But what if I told you that a VPN could be your secret weapon?By masking your IP address and encrypting your data, a VPN makes you nearly invisible to online threats.Lets dive into how this powerful tool can safeguard your online activities and keep your financial transactions secure. A woman using a VPN on a tablet (Kurt "CyberGuy" Knutsson)What is a VPN?A VPN, or virtual private network, is a service that encrypts your internet connection, ensuring that your online activities remain private and secure. By routing your internet traffic through a secure server, VPNs mask your IP address, making it difficult for hackers and malicious entities to track your online behavior. A VPN being used on a laptop (Kurt "CyberGuy" Knutsson)How VPNs workVPNs operate through two primary mechanisms IP address masking and data encryption. When you connect to a VPN, it hides your real IP address by assigning you a new one from its server network, effectively preventing websites and cybercriminals from tracking your location or identifying you based on your IP address.Simultaneously, VPNs encrypt all data transmitted between your device and the internet, rendering it unreadable to anyone who might attempt to intercept it. This encryption process ensures that sensitive information, such as credit card details, remains confidential throughout your online activities. By combining these two powerful features, VPNs create a secure tunnel for your internet traffic, significantly enhancing your online privacy and security. A woman using a VPN on her cell phone (Kurt "CyberGuy" Knutsson)Protecting against identity theft by using a VPNIdentity theft occurs when someone illegally obtains your personal information to commit fraud. This can lead to unauthorized transactions and damage to your credit status. So, how can a VPN prevent identity theft? By encrypting your internet connection, VPNs protect against data breaches and unauthorized access to personal information, especially on unsecured networks like public Wi-Fi. VPNs also prevent third parties from tracking your online activities, reducing the risk of personal data being harvested for malicious purposes.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A woman using a VPN on her laptop (Kurt "CyberGuy" Knutsson)Using a VPN to reduce risks in online transactionsOnline transactions are vulnerable to interception by cybercriminals looking to steal financial information such as credit card numbers and banking credentials. A VPN can be used as a shield for financial data. VPNs ensure that all data exchanged during online transactions is encrypted, making it nearly impossible for hackers to access sensitive financial information. When using public Wi-Fi networks, which are often targeted by cybercriminals, a VPN provides an additional layer of security by encrypting all data transmissions. A woman using a VPN on her cell phone (Kurt "CyberGuy" Knutsson)Practical tips for using VPNs effectively1. Choose a reliable VPN provider:Opt for reputable VPN services known for strong encryption standards and no-log policies to ensure maximum privacy and security.For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices2. Use strong passwords:Combine the use of a VPN with strong, unique passwords for each of your accounts to enhance security. Consider using apassword manager to generate and store complex passwords.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Enable two-factor authentication(2FA):Wherever possible, enable 2FA to add an extra layer of protection against unauthorized access.4. Regularly update software: Keep yourdevices and software updated to protect against vulnerabilities that could be exploited by cybercriminals.5. Monitor financial accounts: Regularly check bank statements and credit reports for any suspicious activity to catch potential fraud early. A woman working on a laptop using a VPN (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysVPNs play a vital role in protecting your identity and securing financial transactions online. By masking your IP address and encrypting data transmissions, they offer a robust defense against identity theft and credit card fraud. Implementing the tips provided can further enhance your online security, ensuring peace of mind in the digital world.Have you ever experienced identity theft or fraud? How might the information in this article help you prevent it in the future? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 13 Views
  • WWW.FOXNEWS.COM
    Score big on Amazon Black Friday 2024 with my insider tips
    close Amazon facing backlash after reportedly canceling pro-Israel talk, inviting Macklemore instead Bestselling author Samantha Ettus tells 'Fox & Friends First' about reportedly being banned from holding a pro-Israel talk with Jewish workers. Amazons Black Friday sales event will start onFriday, Nov. 22, and end onFriday, Nov. 29. This is Amazon's longest Black Friday sale yet.The first phase of deals is fromNov.,expect exclusive deals.During the main Black Friday event, you can browse through deals from a wide number of categories, including major TV brands, smart home devices, fashion, beauty and wellness, furniture, pet supplies, tools, fitness equipment and more. A woman using the Amazon app to shop (Kurt "CyberGuy" Knutsson)How to work the deals be fast!Black Friday deals can expire in minutes, and some deals conclude when inventory is gone. Inside the Black Friday event are promotions called Spotlight Deals, Gold Box Deals of the Day and Lightning Deals. I rank these in order of urgency.The Lightning Deals almost always offer the best prices and last for a small window of time or when sold out, sometimes even just minutes.Even though it may look like a deal is gone, there's a tip below that could provide an easy workaround to getting the deal anyway.CLICK HERE FOR MORE U.S. NEWS A woman using the Amazon app to shop (Kurt "CyberGuy" Knutsson)CyberGuy Black Friday battle plan tips"Join Waitlist" on sold-out products you want and missed. Think it's sold out? Maybe not. Items sitting in another shopper's cart expire if not purchased within 15 minutes. If you are on a waitlist, you could get notified that the deal is yours.Download the Amazon smartphone or tablet app to see deals first. The app shows deals coming first and allows you to create a "Watch this deal" list to get notified when a deal is going live.Say, "Alexa, what are your deals?" for exclusive offers. You can power through this audio form of deals by saying "Alexa, next" as they are being described to advance to the next deal. Voice shopping is a complete hassle, and Amazon knows it. That's why it is tempting us to try it with even better deals than what you can find on the site.Compare prices at other retailers like BestBuy, Walmart, Kohls and Target since so many other sources are taking advantage of the Black Friday excitement.GET FOX BUSINESS ON THE GO BY CLICKING HERE A woman shopping on the Amazon website (Kurt "CyberGuy" Knutsson)Watch out for these losing Black Friday mishapsAvoidUnknown Brands that can often disappointAvoidFake Reviewsby using fakespot.com. Instead of adding its browser extension, just link to the search field to copy and paste an Amazon product listing. Fakespot will analyze the results to show a letter grade and explanation. The goal is to weed out fake reviews and identify troubled listings.Avoidoverpaying by checking the lowest price history at CamelCamelCamel.A price history of almost every Amazon item is recorded here to show if you are really getting the lowest price.Avoidthe Amazon Assistant browser plug-in for privacy concerns. While Amazon's browser plug-in can make comparing items and tracking deals convenient, it also comes at a cost to your personal privacy in the way it can track your web browser activity.Kurt's key takeawaysAs you prepare for Amazon's longest Black Friday sales event yet, from Nov. 22-29, get ready to uncover some fantastic deals. With a wide range of categories, including electronics, home goods and fashion, theres something special waiting just for you. Remember, timing is everything. Many of the best offers will only last for a short window. So, having a solid plan will help you grab those must-have items. Be sure to take advantage of the Amazon app and ask Alexa for notifications on the latest deals. Happy shopping, and may you score some incredible savings this holiday season.CLICK HERE TO GET THE FOX NEWS APPWhat types of products are you most excited to shop for during Amazon's Black Friday event and why? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 12 Views
  • WWW.FOXNEWS.COM
    Say goodbye to needle nightmares: gadget gives doctors X-ray vision of your veins
    Tech Say goodbye to needle nightmares: gadget gives doctors X-ray vision of your veins Device ends the struggle to find a vein in someone's body Published November 9, 2024 6:00am EST close Say goodbye to needle nightmares. This gadget gives doctors x-ray vision of your veins This device gives medical professionals Superman-like X-ray vision. We've all been there, sitting in the doctor's office, sleeve rolled up, watching nervously as the nurse searches for that elusive vein.For some, it's a quick and painless process.For others, it can feel like an eternity of poking and prodding. But what if there was a way to make this experience easier for everyone involved? Vein Locator. (Adison)Turning your skin transparent (sort of)Imagine a device that could give medical professionals Superman-like X-ray vision, allowing them to see right through your skin to the veins beneath. That's exactly what theAdison Vein Locator does. This nifty gadget uses cutting-edge optical technology to create a 3D map of your veins, making needle insertion a breeze.CLICK HERE FOR MORE U.S. NEWS Vein Locator. (Adison)How it worksThe Adison Vein Locator uses near-infrared light to penetrate your skin and create a real-time, three-dimensional image of your veins. It's like having a personal GPS for your circulatory system. The best part? It works on all skin tones and even through scar tissue. Vein Locator. (Adison)Not just for adultsFinding veins in infants can be particularly challenging due to their chubby little arms. The Adison Vein Locator has proven effective on patients as young as 6 months old, making those necessary blood draws and IV insertions much less stressful for both babies and medical staff.GET FOX BUSINESS ON THE GO BY CLICKING HERE Vein Locator. (Adison)Boosting success rates and patient comfortTests have shown that this device can improve the success rate of first-time IV insertions by a whopping 30%. That means fewer attempts, less discomfort, and happier patients all around. Vein Locator. (Adison)Award-winning designThe Adison Vein Locator isn't just functional it's also a looker. This sleek device won a RedDot design award, one of the most prestigious accolades in the product design world. It's not often that medical equipment gets recognized for its aesthetics. With its tilting screen and portable design, the Adison Vein Locator is ready for action in any setting. Whether you're in a hospital room or kneeling beside a patient on the ground, this device adapts to your needs. Vein Locator. (Adison)Kurt's key takeawaysBy making vein access easier and more accurate, the Adison Vein Locator has the potential to reduce patient anxiety, improve treatment efficiency, and even save lives in emergency situations. As we continue to see advancements in medical technology, devices like this remind us that sometimes, the most impactful innovations are those that solve everyday challenges in healthcare. The days of dreading needle sticks may soon be behind us, thanks to this remarkable "x-ray vision" gadget.CLICK HERE TO GET THE FOX NEWS APPWould you feel more at ease during blood draws or IV insertions if your healthcare provider used advanced vein visualization technology like the Adison Vein Locator compared to traditional methods? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 12 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: 'It might kill us all'
    Hugh Grant attends the Los Angeles Premiere of Warner Bros. "Wonka" at Regency Village Theatre on Dec. 10, 2023, in Los Angeles. (Axelle/Bauer-Griffin/FilmMagic) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Hugh Grant movie slams AI; director warns 'it might kill us all'- US finalizes rule to block investments in China-based tech firms to protect AI, military development- AI-powered attack drones take flight Hugh Grant in a scene from "Heretic." (Kimberly French/A24)'MIGHT KILL US ALL': Hugh Grants new film, "Heretic," has an unexpected announcement about artificial intelligence in the final credits. Variety reported there is a message that says, "No generative AI was used in the making of this film." The film's directors, Scott Beck and Bryan Woods, made their feelings about the technology clear in comments with the outlet.BLOCKING BEIJING: The Biden administration this week finalized steps to block Americans from investing in a range of advanced technology, including artificial intelligence, being developed in China. The Bolt-M (Anduril)ON THE ATTACK: Anduril Industries recently announced the launch of two advanced drones, the Bolt and Bolt-M, which are designed to enhance military operations through cutting-edge technology.APPLES BIG UNVEILING: Apple's week of Mac announcements kicked off Oct. 28, and all the reveals are now official. The lineup includes a refreshed iMac with the new M4 chip and updated color options, plus redesigned accessories keyboard, mouse and trackpad now featuring USB-C ports. iMac M4 (Apple)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 11 Views
  • WWW.FOXNEWS.COM
    How a researcher hacked ChatGPT's memory to expose a major security flaw
    Published November 9, 2024 10:00am EST close Company behind ChatGPT disbands AI safety board Kurt 'CyberGuy' Knutsson discusses OpenAI ending its safety task force, actress Scarlett Johansson claiming the company copied her voice and the growing popularity of the voice notes phone feature. ChatGPT is an amazing tool, and its developer, OpenAI, keeps adding new features from time to time.Recently, the company introduced a new memory feature in ChatGPT, which essentially enables it to remember things about you. For example, it can recall your age, gender, philosophical beliefs and pretty much anything else.These memories are meant to remain private, but a researcher recently demonstrated how ChatGPT's artificial intelligence memory features can be manipulated, raising questions about privacy and security. ChatGPT introduction screen. (Kurt "CyberGuy" Knutsson)What is ChatGPT's Memory feature?ChatGPTs memory feature is designed to make the chatbot more personal to you. It remembers information that might be useful for future conversations and tailors responses based on that information, even if you open a different chat. For example, if you mention that youre vegetarian, the next time you ask for recipes, it will provide only vegetarian options.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?You can also train it to remember specific details about you, such as saying, "Remember that I like to watch classic movies." In future interactions, it will tailor recommendations accordingly. You have control over ChatGPTs memory. You can reset it, clear specific memories or all memories, or turn this feature off entirely in your settings. A prompt on ChatGPT. (Kurt "CyberGuy" Knutsson)The security vulnerability in ChatGPTAs reported byArstechnica, security researcher Johann Rehberger found that its possible to trick the AI into remembering false information through a method called indirect prompt injection. This means the AI can be manipulated into accepting instructions from unreliable sources like emails or blog posts.For instance, Rehberger demonstrated that he could trick ChatGPT into believing a certain user was 102 years old, lived in a fictional place called the Matrix and thought the Earth was flat. After the AI accepts this made-up information, it will carry it over to all future chats with that user. These false memories could be implanted by using tools like Google Drive or Microsoft OneDrive to store files, upload images or even browse a site like Bing all of which could be manipulated by a hacker.Rehberger submitted a follow-up report that included a proof of concept, demonstrating how he could exploit the flaw in the ChatGPT app for macOS. He showed that by tricking the AI into opening a web link containing a malicious image, he could make it send everything a user typed and all the AI's responses to a server he controlled. This meant that if an attacker could manipulate the AI in this way, they could monitor all conversations between the user and ChatGPT.Rehberger's proof-of-concept exploit demonstrated that the vulnerability could be used to exfiltrate all user input in perpetuity. The attack isn't possible through the ChatGPT web interface, thanks to an API OpenAI rolled out last year. However, it was still possible through the ChatGPT app for macOS.When Rehberger privately reported the finding to OpenAI in May, the company took it seriously and mitigated this issue by ensuring that the model doesnt follow any links generated within its own responses, like those involving memory and similar features. JohannRehbergers ChatGPT conversation. (Johann Rehberger)OpenAIs responseAfter Rehberger shared his proof of concept, OpenAI engineers took action and released a patch to address this vulnerability. They released a new version of the ChatGPT macOS application (version 1.2024.247) that encrypts conversations and fixes the security flaw.So, while OpenAI has taken steps to address the immediate security flaw, there are still potential vulnerabilities related to memory manipulation and the need for ongoing vigilance in using AI tools with memory features. The incident underscores the evolving nature of security challenges in AI systems.The company says, instruction hierarchy or application-layer defenses like the ones mentioned."How do I disable ChatGPT memory?If you're not cool with ChatGPT keeping stuff about you or the chance that it could let a bad actor access your data, you can just turn off this feature in the settings.Open theChatGPT app or websiteon your computer or smartphone.Click on theprofile icon in the top right corner of the screen.Go to Settings and then select Personalization.Switch the Memory option off, and youre all set.This disables ChatGPTs ability to retain information between conversations, giving you full control over what it remembers or forgets.GET FOX BUSINESS ON THE GO BY CLICKING HERE A man using ChatGPT on his laptop (Kurt "CyberGuy" Knutsson)Cybersecurity best practices: Protecting your data in the age of AIAs AI technologies like ChatGPT become more prevalent, it's crucial to adhere to cybersecurity best practices to protect your personal information. Here are some tips for enhancing your cybersecurity:1. Regularly review privacy settings:Stay informed about what data is being collected. Periodically check and adjust privacy settings on AI platforms like ChatGPT and others to ensure youre only sharing information youre comfortable with.2. Be cautious about sharing sensitive information:Less is more when it comes to personal data. Avoid disclosing sensitive details such as your full name, address, or financial information in conversations with AI.3. Use strong, unique passwords:Create passwords that are at least 12 characters long, combining letters, numbers, and symbols, and avoid reusing them across different accounts. Consider using apassword manager to generate and store complex passwords.4. Enable two-factor authentication(2FA): Add an extra layer of security to your ChatGPT and other AI accounts.By requiring a second form of verification, such as a text message code, you significantly reduce the risk of unauthorized access.5. Keep software and applications up to date:Stay ahead of vulnerabilities.Regular updates often include security patches that protect against newly discovered threats, so enable automatic updates whenever possible.6. Have strong antivirus software: In an age where AI is everywhere, protecting your data from cyber threats is more important than ever. Adding strong antivirus software to your devices adds a critical layer of protection. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.7. Regularly monitor your accounts:Catch issues early. Frequently check bank statements and online accounts for any unusual activity, which can help you identify potentialbreaches quickly.Kurts key takeawaysAs AI tools like ChatGPT get smarter and more personal, it's pretty interesting to think about how they can tailor conversations to us. But, as Johann Rehbergers findings remind us, there are some real risks involved, especially when it comes to privacy and security. While OpenAI is able to mitigate these issues as they arise, it also shows that we need to keep a close eye on how these features work. It's all about finding that sweet spot between innovation and keeping our data safe.CLICK HERE TO GET THE FOX NEWS APPWhat are your thoughts on AI remembering personal detailsdo you find it helpful, or does it raise privacy concerns for you? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 11 Views
  • WWW.FOXNEWS.COM
    AI-powered attack drones take flight
    Published November 8, 2024 6:00am EST close AI-powered attack drones take flight Drones are designed to enhance military operations through cutting-edge technology. Anduril Industries recently announced the launch of two advanced drones, the Bolt and Bolt-M, which are designed to enhance military operations through cutting-edge technology.These drones are not just typical consumer models. They are tailored for tactical applications, with the Bolt-M variant specifically equipped for munitions delivery. The Bolt-M (Anduril)Cutting-edge technology in defenseThe Bolt family operates on Anduril's Lattice artificial intelligence platform, which integrates artificial intelligence to streamline complex military operations. The Lattice system is designed to manage machine-to-machine tasks at unprecedented speeds, allowing for efficient coordination in combat scenarios. This technology enables operators to focus on strategic decisions rather than navigating the drones manually.I'M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS Operator controlling Bolt-M drone (Anduril)Specifications of the Bolt and Bolt-MBoltWeight: Approximately 12 poundsFlight time: Up to 45 minutesRange: 12.4 milesPrimary use: Intelligence, surveillance and reconnaissance; search and rescue Image of Bolt drone (Anduril)Bolt-MWeight: 13-15 pounds (dependent on payload)Flight time: Up to 40 minutesRange: 12.4 milesPayload capacity: Up to 3 pounds of munitionsBoth drones can be deployed rapidly, with the Bolt being ready for flight in under five minutes.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? The Bolt-M (Anduril)User-friendly operationThe design of both drones emphasizes ease of use. Operators interact with a touchscreen controller that simplifies decision-making into four key actions: where to look, what to follow, how to engage and when to strike. This intuitive interface allows for quick adaptations to changing battlefield conditions. Touchscreen controller (Anduril)Autonomous features and flexibilityThe Bolt-M drone boasts advanced features such as:Autonomous waypoint navigation: Operators can set specific paths for the drone to follow.Target-agnostic tracking: The drone can track any visual target identified by the operator.Modular payloads: Operators can easily switch between different types of warheads based on mission requirements.These capabilities ensure that the Bolt-M drone can adapt to various operational needs while maintaining high levels of performance. The Bolt-M (Anduril)Kurt's key takeawaysBy combining lightweight design with sophisticated AI capabilities, these drones offer modern armed forces a versatile tool for both reconnaissance and precision strikes. As warfare continues to evolve, innovations like these will likely play a crucial role in shaping future combat strategies. The integration of such technology not only enhances operational efficiency but also aims to reduce the cognitive burden on operators, making military engagements more effective and safer.CLICK HERE TO GET THE FOX NEWS APPWhat are your thoughts on the implications of AI-powered drones like the Bolt and Bolt-M for the future of military operations? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 14 Views
  • WWW.FOXNEWS.COM
    Ransomware attacks devastating toll on hospital patients health
    Published November 7, 2024 10:00am EST close Lack of extradition treaty with Russia fueling ransomware groups: Morgan Wright SentinelOne's chief security adviser discusses the alarming rise in cyberattacks worldwide on 'Fox News Live.' Data theft and ransomware attacks against health care and critical third-party providers are still happening at an alarmingly high rate in 2024, which is shaping up to be as severe as last year, the worst on record for health care breaches.You might remember theAscension ransomware attack from May, one of the most devastating incidents in the health care sector, causing major issues for patients.A new report from Microsoft highlights that these attacks not only lead to data theft but also put patients' physical health at risk. Woman working on a computer in a hospital (Kurt "CyberGuy" Knutsson)Impact of ransomware on health careMicrosoft points out that beyond the financial risk to health care organizations, ransomware attacks can have life-threatening consequences. When health care providers lose access to diagnostic equipment or patient records due to ransomware, patient care is severely disrupted. For example, stroke code activations are nearly double during hospital attacks, with confirmed strokes increasing by 113.6%, and cardiac arrest cases rise by 81% and survival rates drop from 40% to just 4.5%.Health care facilities near hospitals hit by ransomware attacks also feel the impact, facing a surge in patients needing urgent care that they may not be equipped to handle. As a result, patients often face longer wait times.Whats more troubling is that these attacks arent limited to urban areas. Rural health clinics are also prime targets for cyberattacks. These facilities are particularly vulnerable to ransomware because they often lack the resources to prevent or respond to security incidents. And since these clinics are the only health care option within miles, a successful attack can be devastating for many rural communities. Mother, daughter and doctor walking in a hospital (Kurt "CyberGuy" Knutsson)Why health care is the prime target?Ransomware attacks on health care have shot up 300% since 2015, making it one of the top 10 most targeted industries in the second quarter of 2024. This rise is mostly because health care organizations store extremely sensitive data, and hackers know theres big money to be made. With lives on the line, hospitals cant risk poor patient outcomes if their systems go down or the exposure of patient data if they dont pay. This reputation for paying ransoms just makes health care an even bigger target.Some of the blame also falls on health care organizations. They tend to have lower cybersecurity budgets compared to other industries, making it harder to defend against these kinds of attacks. Many facilities dont have staff dedicated to cybersecurity; some dont even have a chief information security officer or a security operations center. Instead, cybersecurity often gets lumped in with regular IT duties. Plus, doctors, nurses and other health care staff might not get any cybersecurity training, so they might not even recognize aphishing email when they see one.CLICK HERE FOR MORE US NEWS Emergency sign at the entrance of a hospital's emergency room (Kurt "CyberGuy" Knutsson)7 proactive steps to take in the face of health care cyberattacksWith the rise in cyberattacks on health care providers, its wise to take proactive steps to protect your personal information and be prepared for potential disruptions in health care services:1. Stay informed: Keep up to date with the latest news from your health care providers and reliable sources to stay aware of any disruptions or data breaches affecting systems and services.2. Maintain personal health records: Keep copies of your health records on your own devices or printed out, including details like medications, allergies, past surgeries and other relevant health information. This can be crucial if electronic health records become temporarily unavailable.3. Prepare for medical emergencies: Have a backup plan for emergencies, including knowing nearby alternative health care facilities. Research wait times and accessibility to help avoid delays if your primary facility is impacted.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Practice cybersecurity best practices: Use strong, unique passwords for online accounts and consider apassword manager to help manage them. Enable two-factor authentication where available to add an extra layer of security.5. Be vigilant against phishing: Cyberattacks often result in a spike in phishing emails and calls as attackers exploit the situation. Protect yourself by using strong antivirus software on all your devices, which can help block malicious links and detect phishing emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Confirm appointments: If you have upcoming appointments or procedures, contact your health care provider to confirm or reschedule if a cyberattack disrupts their normal operations.7. Monitor patient portals: Keep an eye on patient portals like MyChart for updates on your medical records and communication with health care providers, as these can provide critical information during service disruptions.Kurts key takeawayThe surge in ransomware attacks on the health care industry is troubling and a harsh reminder that criminals dont care about the lives at risk. Theyre just after money. Health care organizations need to take lessons from the past two years, investing heavily in cybersecurity infrastructure and hiring dedicated staff to protect patient data and systems. With stronger defenses in place, the goal is to prevent these situations from reaching the point where paying a ransom is even considered.Have you ever experienced delays or issues with health care services due to a cyberattack or system outage?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 15 Views
  • WWW.FOXNEWS.COM
    How to easily record phone calls on your iPhone
    close How to easily record phone calls on your iPhone Apple introduced call recording feature as part of Apple Intelligence. Remember when recording a phone call on your iPhone felt like trying to solve a Rubik's Cube blindfolded?Well, those days are officially over. With the release of iOS 18.1, Apple has introduced a native call recording feature as part of Apple Intelligence.This new functionality makes it easier than ever to document important conversations. Lets take a closer look at how this feature is changing the game for recording calls on our iPhones. Native call recording feature on iPhone (Apple)The legal lowdownBefore we get into the nitty-gritty of how to use this feature, let's talk about the elephant in the room: legality. Recording phone calls can be a bit of a legal minefield, and the last thing you want is to end up on the wrong side of the law. Laws vary by state, so it's crucial to do your homework and make sure you're playing by the rules in your area. Remember, it's always better to be safe than sorry. Man recording a phone call on iPhone (Kurt "CyberGuy" Knutsson)What you'll need to record calls on iPhoneNow that we've got the legal stuff out of the way, let's talk about what you need to get started:An iPhone 15 Pro, iPhone 15 Pro Max, iPhone 16 or iPhone XS (or newer model)iOS 18.1 or later installed on your deviceHow to update your iPhone to the latest softwareNot sure if you're running the latest iOS? No worries! Here are some quick steps to update your iPhone:OpenSettingsTapGeneralSelectSoftware UpdateIf available, tapUpdate Now and begin downloading and installing iOS 18.1 Steps to update your iPhone to the latest software (Kurt "CyberGuy" Knutsson)How to record a call on your iPhoneNow, let's get to the fun part, actually recording a call. Here's how it works:Start or answer a phone call like you normally would.Look for thenew recording icon in the upper-left corner of the call screen.Tap that icon to start recording.You'll hear acountdown from three seconds, followed by anaudio message saying, "This Call Will Be Recorded."A notification will pop up to let everyone on the call know that it's being recorded.After the recording begins, aNotes notification will appear at the top of the screen to alert you that a new note has been created for this transcript.Hit thestop button to end the call at any time, you'll hear another message saying, "This call is no longer being recorded." Steps to record a call on iPhone (Kurt "CyberGuy" Knutsson)How to access your recordingAfter successfully recording your call, follow these steps to access and manage your recording:Look for a notification from the Notes app pointing you to the audio file and transcript.Tap thenotification to open the recording directly in Notes or open theNotes app later to review.In the Notes app, find your recordings in a new folder calledCall Recordings.Tap the note to review the transcript. Here you can: 1) Listen to the audio from the beginning by hittingPlay; 2) Scroll down and tap within the transcript tostart playback from a specific point; 3) Tap a sentence to start playback from there; 4) Pause playback at any time by tapping the play button.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Steps to access recording (Kurt "CyberGuy" Knutsson)How to add a copy of the transcript to the note for editingTap themenu buttonSelectAdd Transcript to NoteEdit the transcript as needed, such as highlighting important sentencesShare the recording by clicking thesend buttonTapDoneGET FOX BUSINESS ON THE GO BY CLICKING HERE Steps to add a copy of the transcript to the note for editing (Kurt "CyberGuy" Knutsson)Remember, you can always return to these recordings in the Notes app to review, edit or share as needed.Kurt's key takeawaysWhether you're conducting interviews, keeping records for research or just want to remember important details from a conversation, it's never been easier to record calls on your iPhone. However, with great power comes great responsibility. Always make sure you have the consent of all parties before recording a call and use this feature ethically and legally.CLICK HERE TO GET THE FOX NEWS APPSo, what do you think about this new feature? Are you excited to try it out?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 29 Views
  • WWW.FOXNEWS.COM
    Is just reading that sketchy scammers email dangerous or do I have to click on a link to get in trouble?
    close 'CyberGuy': Is it safe to open that spam email? Tech expert Kurt Knutsson says opening emails is safe, but risks arise from interacting with links, attachments or HTML content. Are you worried about opening suspicious emails? You're not alone. Many people are confused about the risks associated with spam and phishing emails.That includes "Bill" from Groton, Connecticut, who wrote to us and asked, "Myself and my friends are unclear if we can get into trouble by clicking on a spam or hacker email...as long as we don't open anything INSIDE the email ... in other words ... can we EVER get into trouble by simply reading any email ??? thank you if you can address this to your viewers ... I think many are unclear about this."That's a great question, Bill. Now let's dive into this topic and clear up some common misconceptions.Enter bysigning up for my free newsletter! Person checking emails on laptop (Kurt "CyberGuy" Knutsson)Common misconceptionsOpening emails can instantly infect your device: One common myth is that simply opening an email can automatically infect your device with malware. In reality, modern email systems (such as Gmail, Outlook, etc.) generally prevent this from happening. The real danger comes from interacting with the content inside the email, such as clicking on malicious links or downloading harmful attachments.Plain text emails are always safe: While emails in plain text format are generally safer than HTML-based emails, they can still pose a risk if they contain malicious links. Phishing attacks can appear in plain text emails, luring you to dangerous websites.Emails from known contacts are always safe: Even if an email appears to come from someone you know, that doesnt always mean it's safe. Attackers can spoof email addresses or hack accounts, so always be cautious about unexpected or unusual messages from known contacts, especially those containing links or attachments.Spam filters catch all malicious emails: Spam filters are highly effective but not perfect. Some sophisticated phishing and malicious emails can bypass these filters and land in your inbox. This is why its important to stay vigilant, even with emails that seem to have passed your email services security checks.Previewing emails is always safe: Most modern email clients use a "preview" pane for quick reading. While the risk of malware through previews is significantly reduced in up-to-date systems, embedded trackers or other forms of data collection can still occur, confirming your activity to the spammer. Always disable automatic image loading or other active content features in your email clients settings to minimize exposure. Person checking emails on laptop (Kurt "CyberGuy" Knutsson)What to watch out forAs mentioned already, generally, simply opening an email is not enough to cause harm. However, there are some important points to consider:1) Embedded trackers: Some spam orphishing emails contain trackers that can notify the sender when the email is opened. This can confirm to the spammer that your email address is active, potentially leading to more spam.2) Malicious links and attachments: The real danger lies in clicking on links or downloading attachments within the email. These can lead to malicious websites or download malware onto your device.3) HTML emails: Emails that contain HTML content can sometimes execute scripts when opened. While modern email clients have protections against this, its still a potential risk.4) Phishing attempts: Even if you dont click on anything,phishing emails can be designed to look very convincing and may trick you into providing personal information if you respond. Person checking emails on laptop (Kurt "CyberGuy" Knutsson)How to stay safe from suspicious emailsIf you're worried about receiving sketchy emails, there are several steps you can take to stay safe and reduce your risk of encountering malware or falling for scams. Follow these guidelines to protect yourself:1) Avoid clicking links or downloading attachments: Never click on links or download files from emails you dont trust. Scammers often use these tactics to direct you to malicious websites or install malware on your device. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Use a reputable email client: Choose an email provider that prioritizes security features like spam filtering andtwo-factor authentication to add an extra layer of protection for your account.Read more about secure and private email here.3) Enable email filtering: Turn on spam filters to reduce the number of unsolicited or potentially dangerous emails reaching your inbox. This reduces your exposure to phishing attempts. Most email platforms these days automatically filter out what they assume to be "junk" into their own folder. If you notice the amount of spam getting through to your inbox increasing, you may want to consider aSpam Filter.There are free options for different email providers. For Gmail, tryMailwasher. For Outlook and Windows Mail, trySpam Bully, which costs an annual fee of $29.95.4) Keep your software updated: Regularlyupdate your email client and operating system to stay protected from the latest security vulnerabilities that hackers might exploit.5) Consider data removal services: Use data removal services to ensure your personal information is less accessible to potential scammers. This reduces your risk of being targeted in the first place.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurts key takeawaysWhile opening spam emails isn't typically dangerous, it's always better to err on the side of caution. Be vigilant, trust your instincts, and when in doubt, delete suspicious emails without opening them.What's the most convincing spam email you've ever received, and how did you recognize it was fake? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 26 Views
  • WWW.FOXNEWS.COM
    My iPhone says I have 14 viruses. What should I do next?
    Published November 6, 2024 10:00am EST close Tech experts sounding alarm on cyberattack targeting iPhone users Kurt "CyberGuy" Knutsson discusses a text scam that seeks to gain access to users' Apple ID information; he also weighs in on the popular new Noplace app being used by Gen Z. Although iPhones have robust security features, they are not entirely immune to threats. While they are generally safer from viruses and malware than Android devices, no device is completely invulnerable.This point was reinforced by a strange experience that caught our attention when "Pam" of Mesa, Arizona, wrote to us, "My iPhone says I have 14 viruses. What program can I [install] to help with my phone? How can I [make] my phone safe?"Well, Pam, we're more than happy to explore why you are getting strange messages on your iPhone suggesting that there were 14 viruses on it. There are various reasons why you could be seeing these types of messages, and there are workarounds to make your phone safe again.Enter the giveaway bysigning up for my free newsletter. Woman shocked about virus alerts on her phone (Kurt "CyberGuy" Knutsson)Why am I getting virus or malware alerts?The iPhone is less vulnerable to viruses and malware due to its closed-code design. This means that Apple doesnt share all of its code information, which makes it harder for hackers to exploit vulnerabilities to take over a users apps or iPhone. Its important to note that Apple will never send you an alert via pop-up, text or email that you have a virus on your device. Warning on phones home screen (Kurt "CyberGuy" Knutsson)Watch out for these fake virus alerts on your iPhoneBelow are several reasons why you could get notifications on your iPhone about viruses, which you may or may not actually have.1) Pop-up ads: You may not actually have any viruses or malware on your iPhone. Instead, it can be an ad that pops up from your mobile browser stating that you have viruses or malware on your iPhone. These can scam you in a couple of ways:It causes you to click on the ad, which can cause you to download viruses or malware.It sends you to another website that asks you for private information, such as payment, so you can pay to get rid of the virus or malware.2) Fake apps: Some scammers have fake apps that display fake alerts about viruses or malware to scare people to download their apps or purchase their services to get rid of these fake problems.3) Phishing scams: This alert about viruses can be a scam email or text message claiming you have viruses or malware that need to be eradicated from your device. Do not click on any links or call any numbers as it will likely transfer you to the actual scammer, who will likely hard sell you to buy their services, part with private and financial information or give them access to your iPhone. Man scrolling on his iPhone (Kurt "CyberGuy" Knutsson)How do I protect my iPhone?Even though it is more difficult to penetrate the iPhone, it doesnt mean it is impossible. In fact, some hackers watch for particular vulnerabilities in iOS to launch their attacks. If you see such warnings, its best to ignore them and avoid clicking on any links or downloading any suggested software. Below are several key steps you can take to secure your iPhone.1) Keep your iPhone up to date: Occasionally, Apple releases new iOS updates to address known vulnerabilities. When possible, it is best toupdate the iOS so that your iPhone is safe from known vulnerabilities.2) Install and run strong antivirus software: An antivirus software actively running on all of your devices can help keep them all safe, including your iPhone. With iPhones, strong antivirus software will prevent you from clicking on any malicious links that may then install malware onto your devices, which can potentially extract personal information from your device. Avoid clicking on suspicious links or downloading attachments from unknown sources. These can be phishing attempts designed to steal your personal information.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.3) Download apps only from the App Store: Stick to downloading apps from the official Apple App Store. Apps on the App Store are vetted by Apple for security, reducing the risk of downloading malicious software.4) Enable two-factor authentication (2FA): Adding an extra layer of security to your Apple ID can help protect your personal information. With2FA, even if someone gets your password, they wont be able to access your account without the second factor.5) Use strong passwords: Ensure that your passwords are strong and unique for different accounts. Consider using apassword manager to keep track of them.6) Monitor app permissions: Regularly check thepermissions granted to your apps and revoke any that seem unnecessary. This can help prevent apps from accessing more information than they need.Kurts key takeawaysWhile most iPhone users rest easy knowing that the iOS keeps most common viruses and malware at bay, they are still susceptible to scammers trying to work around the closed code and scaring people into making bad choices that endanger their phones and data. Because Apple never sends out alerts about viruses or malware on your iPhone, it should be the first clue of a scam. Even if it looks official, iPhone users do not get alerts from Apple about viruses or malware. If you do install a good antivirus program, that will be the only program notifying you that there is anything amiss with your iPhone. Understanding these scams can go a long way in keeping you calm and your phone safe.Have you ever received what looks like an official alert from Apple notifying you about viruses on your iPhone? Have you received pop-ups and other alerts trying to get you to buy services or forward you to random websites? What steps did you take to figure out if it was legitimate or not? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 19 Views
  • WWW.FOXNEWS.COM
    Robot dog is making waves with its underwater skills
    Published November 5, 2024 6:00am EST close 'CyberGuy': Robot dog making waves with underwater skills Tech expert Kurt Knutsson discusses how MAB Robotics' Honey Badger 4.0, a versatile robot, now walks underwater with amphibious skills. The world of robotics has taken an exciting plunge with the latest iteration of MAB Robotics' Honey Badger quadruped robot. This innovative machine is not just another land-dwelling robot dog; it is now making waves with its ability to walk underwater.Enter the giveaway by signing up for my free newsletter. Honey Badger 4.0 quadruped robot underwater (MAB Robotics) (Kurt "CyberGuy" Knutsson)From land to sea: The Honey Badger's evolutionMAB Robotics, a Polish company founded in 2019, has been refining itsHoney Badger robot since its inception. The fourth generation, known as Honey Badger 4.0, has added a surprising new skill to its repertoire: underwater locomotion. Honey Badger 4.0 quadruped robot underwater (MAB Robotics) (Kurt "CyberGuy" Knutsson)Diving into the detailsThe Honey Badger 4.0 measures about 23.6 inches in length and stands between 9.8 and 19.6 inches high, weighing in at approximately 26.5 pounds. This compact yet capable machine boasts a payload capacity of around 4.4 pounds. It is equipped with RGB and thermal cameras, lidar and gas sensors, allowing it to navigate various environments effectively. The robot can operate for up to two hours on its built-in lithium-ion battery and can be controlled remotely via 5G or a fiber-optic cable. Honey Badger 4.0 quadruped robot underwater (MAB Robotics) (Kurt "CyberGuy" Knutsson)Making waves in roboticsWhat truly sets the Honey Badger apart is its amphibious capability. Recent footage shows the robot confidently walking along the bottom of a swimming pool. While legs may not be the most efficient means of underwater propulsion, this versatility opens up new possibilities for the robot's applications.Potential applicationsThe Honey Badger's amphibious nature makes it ideal for a variety of tasks. It could be invaluable in search and rescue operations in disaster areas, as well as for inspection and maintenance in flooded environments. The robot is also well-suited for industrial inspections across diverse settings and can contribute to research and development in robotics and locomotion. A group of Honey Badger 4.0 quadruped robots (MAB Robotics) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysThe Honey Badger 4.0's ability to operate both on land and underwater showcases the potential for versatile and adaptable robots in various fields. As MAB Robotics continues to refine and improve their design, we can expect to see even more impressive capabilities from this tough little robot dog. The future of robotics is looking increasingly amphibious, and the Honey Badger is leading the pack.As we develop more advanced robots like the Honey Badger 4.0, what concerns do you think we should keep in mind for our communities?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 23 Views
  • WWW.FOXNEWS.COM
    Is your Social Security number at risk? Signs someone might be stealing it
    Published November 5, 2024 10:00am EST close Trump turns Social Security into a tax issue He'd make the benefits tax-free, but the costs could be significant. With most of your life attached to these nine numbers, your Social Security number (SSN) is incredibly important to keep safe. Thats why it is crucial to pay attention to signs that your SSN may have been compromised. While preventing the misuse of your SSN is paramount, there are action steps you can take if it does fall into the wrong hands.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter the giveaway by signing up for my free newsletter. There are steps you can take if your Social Security number falls into the wrong hands. (Kurt "CyberGuy" Knutsson)Top signs someone might be using your Social Security numberAre you concerned that your Social Security number may have gotten into the wrong hands? Check below to see if you are experiencing any of these signs:1) Changes to your credit report and scoreAmericans are granted free credit reports every 12 months from the three major consumer reporting companies. Regularly culling through these reports can help you spot potential fraud, which might signal that your Social Security number has been compromised. Any hard inquiries you didnt request on your credit report are a strong indicator that someone tried to open a credit card or another line of credit with your SSN.2) Changes to your Social Security statementWhile most people know they should check their credit report and scores, you can see your Social Security statement by creating an account on the official Social Security Administration website. Because only one account can be created per SSN, it is safer if you claim it so that no one else can by piecing together your personal information (along with your SSN) to claim it fraudulently. Make sure it is connected to a secure email account that you check frequently. This account also provides up-to-date data on earnings and benefit distributions so you can see if anything is "off." You can see your Social Security statement by creating an account on the official Social Security Administration website. (Kurt "CyberGuy" Knutsson)3) Strange or new mailings or calls from debt collectors and junk mailersWhile it might seem natural to toss a pile of "junk" mailers or ignore calls from random debt collectors or advertisers, it may be an indicator that someone has gotten a hold of your Social Security number and has begun opening accounts under your number. Its important to make note of the patterns and follow up with these collectors should it become more and more apparent that your SSN might have been misused. Oftentimes, consumers start getting more credit offers when new credit cards are opened. Additionally, if you start receiving bills under someone elses name at your address, it might be time to follow up with these notices.4) New notices from the IRS or other governmental agenciesIf you start receiving notices about your Social Security number being used to file someone elses taxes or inappropriately use your health insurance, it is definitely a sign that someone may have compromised your SSN. While receiving a notice from the IRS or Medicare can feel scary, it is imperative that you reach out to the corresponding agency to notify them of the fraudulent activity so that you can stop further damage. Beware of new notices from the IRS or other governmental agencies. (Kurt "CyberGuy" Knutsson)Top ways to keep your Social Security number safe1) Sign up for aSocial Security accountGo to the official Social Security Administration website to create an account,if you havent already.2) Hide/keep safe your Social Security number cardPut your Social Security number card in a very safe place, such as a safe, bank safe or a filing cabinet that can be locked. Because it is used so frequently, those nine digits are worth memorizing. If your wallet is lost or stolen, and you keep your SSN card in there, it will be messier than losing just money or your ID. Dont carry your Social Security card in your wallet or purse.3) Go onlineSkip jotting down your Social Security number on in-person forms. When your SSN is jotted down on paper, it is hard to control how the information gets used or disposed of. If you can submit forms online, you can skip the risk of having your SSN getting into the wrong hands. If you mail in forms that denote your SSN, you risk having that piece of mail stolen or lost.4) Opt out of inputting SSNEven though your SSN is requested on some forms, it is not always necessary. If a future employer is requesting your SSN, double-check why they need it. They would most likely need it to run a background check, which you should know about anyway. Additionally, some establishments allow you to provide the last four digits of your SSN until you are finalizing a screening process, etc.5) Combat child identity theftOpen accounts for your children's Social Security numbers because you want to claim them for them early and be able to monitor any movement related to their SSN.6) Secure documentsSome records that contain your Social Security number are important to keep on hand, such as income tax filings. If they are kept digitally, encrypt and or password-protect the document or folder, especially if it is uploaded to the cloud. Keep offline documents with SSNs in a safe or shred instead of throwing them away.Remember you (usually) only get one SSN in a lifetime, it is important to safeguard that data with your "life."7) Remove your personal information from the internetRemoving your personal information from the internet, given the increasing privacy concerns about artificial intelligence, is essential. Data removal services can help protect your Social Security number by systematically erasing your details from websites, thus reducing the risk of identity theft.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.They arent cheap, and neither is your privacy.These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.Its what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.8) IRS identity protection PIN (IP PIN)To further protect your tax returns from identity theft, the IRS offers an identity protection PIN (IP PIN). This is a six-digit number that prevents someone else from filing a tax return using your Social Security number or individual taxpayer identification number. The IP PIN is known only to you and the IRS, adding an extra layer of security to your tax filings.How to get an IP PINOnline request:The fastest way to receive an IP PIN is to request one through your online account onthe IRS website. If you dont already have an account, you must register to validate your identity.Alternative methods:If you cant establish an online account, there are other methods, but they take longer. You can file an application or request in-person authentication.Using your IP PINEnter the six-digit IP PIN when prompted by your tax software or provide it to your trusted tax professional when filing your return.An IP PIN must be used on all federal tax returns during the year, including prior year returns.Do not reveal your IP PIN to anyone except your tax professional when you are ready to sign and submit your return.Important informationAn IP PIN is valid for one calendar year, and a new one is generated each year.If you lose your IP PIN, you can retrieve it online or have it reissued by calling the IRS.By using an IP PIN, you can significantly reduce the risk of tax-related identity theft and ensure that your tax returns are processed smoothly and securely.9) Recognizing and reporting a Social Security scamIf there is a problem with a persons SSN or record, Social Security will typically mail a letter. You can learn more about recognizing Social Security-related scams, including how to report a scam quickly and easily online to Social Securitys Office of the Inspector General, by reading more atwww.ssa.gov/scams. Image of a lock on Social Security cards (Kurt "CyberGuy" Knutsson)What to do if you think your Social Security number has been compromised?If you noticed any of the signs listed above that indicate that your Social Security number may have been compromised, below are action steps you can take:1) Reach out to the Social Security Administration immediately: Call them at 1-800-772-1213 to put an electronic block on your SSN.2) Contact the three main credit bureaus to freeze your credit: This will prevent anyone, including hackers, from wreaking havoc on your credit. Make sure to report any errors on your credit reports with the credit agencies as well.3) File a report with the local authorities as well as the Federal Trade Commission.4) Submit a Social Security fraud report online or call the SSA's Office of the Inspector General at 1-800-269-0271. They can help investigate any Social Security-related fraud.5) Use an identity theft protection service:Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using some services is that they might include identity theft insurance ofup to $1 million to cover losses and legal fees and a white-glove fraud resolution team where aU.S.-based case manager helps you recover any losses.See my tips and best picks on how to protect yourself from identity theft.Kurts key takeawaysBecause your Social Security number has such a significant impact on your life, it is important to pay attention to any signs that it has been compromised and misused. While it may feel overwhelming to see any of these signs that your SSN might be compromised, its important to know there are steps you can take to protect yourself moving forward. While paying regularly for fraud protection services may seem like an unnecessary expense when youre not presently dealing with identity or credit issues, a fraud protection service subscription can help you focus on your present moment instead of worrying about what a criminal might do with your SSN. And if something does happen, you have people in your corner to help you through the process.What additional steps do you think government agencies should take to enhance the security of Social Security numbers? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 17 Views
  • WWW.FOXNEWS.COM
    Updated Android malware can hijack calls you make to your bank
    Tech Updated Android malware can hijack calls you make to your bank Learn how to protect your Android device from being hijacked Published November 4, 2024 10:00am EST close Android 15's new anti-theft feature is rolling out Powered by artificial intelligence, the tool aims to keep personal information safe. Do you remember those TV shows where the villain gets defeated in one season but comes back even stronger in the next? Think"Stranger Things" on Netflix. The malware were talking about here is just like that. Its called FakeCalls, and every time researchers figure out how it infects devices, it evolves with new ways to hide.Earlier this year, it was reported to be impersonating large financial institutions, and now security researchers have discovered that the malware has gone through another upgrade. It can even hijack the calls you make to your bank using your Android phone. Man surfing on his Android phone (Kurt "CyberGuy" Knutsson)What you need to knowFakeCalls is a banking trojan that focuses on voice phishing, where victims are deceived through fraudulent calls impersonating banks and are asked to share sensitive information. Earlier versions did this by prompting users to call the bank from within an app that impersonated the financial institution, as reported byBleeping Computer. However, the latest version, analyzed byZimperium, sets itself as the default call handler.The default call handler app manages incoming and outgoing calls, allowing users to answer, reject or initiate calls. Giving these permissions to a malicious app, as you can imagine, carries serious risks.When a user gives the app permission to set itself as the default call handler, the malware gets the green light to intercept and mess with both outgoing and incoming calls. It even shows a fake call interface that looks just like the real Android dialer, complete with trusted contact info and names. This level of deception makes it really tough for victims to see what's happening."When the compromised individual attempts to contact their financial institution, the malware redirects the call to a fraudulent number controlled by the attacker,"explains the new Zimperium report. "The malicious app will deceive the user, displaying a convincing fake UI that appears to be the legitimate Android's call interface showing the real bank's phone number.""The victim will be unaware of the manipulation, as the malwares fake UI will mimic the actual banking experience, allowing the attacker to extract sensitive information or gain unauthorized access to the victims financial accounts,"the report added. Android home screen (Kurt "CyberGuy" Knutsson)The malware can also steal your dataThis malware not only hijacks your calls but can also steal your data. It gets access to Androids Accessibility permissions, which basically gives it free rein to do whatever it wants. The developer of the malware has also added several new commands, including the ability to start livestreaming the device's screen, take screenshots, unlock the device if its locked and temporarily turn off auto-lock. It can also use accessibility features to mimic pressing the home button, delete images specified by the command server, and access, compress and upload photos and thumbnails from storage, especially from the DCIM folder. Android phone (Kurt "CyberGuy" Knutsson)6 ways to protect yourself from FakeCalls malware1) Have strong antivirus software: Android has its own built-in malware protection called Play Protect, but the FakeCalls malware proves its not enough. Historically, Play Protect hasnt been 100% foolproof at removing all known malware from Android phones. Also, avoid clicking on any links in messages or emails that seem suspicious. The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of anyphishing emails orransomware scams.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Download apps from reliable sources:Its important to download apps only from trusted sources, like the Google Play Store. The FakeCalls malware infects your phone when you download an app from an unknown link. As an Android user, you should only download apps from the Play Store, which has strict checks to prevent malware and other harmful software. Avoid downloading apps from unknown websites or unofficial stores, as they pose a higher risk to your personal data and device. Also, never trust download links that you receive through SMS.3) Be cautious with app permissions: Always review the permissions requested by apps before installation. If an app requests access to features that seem unnecessary for its function, it could be a sign of malicious intent. Do not give any app Accessibility permissions unless you really need to. Avoid granting permissions that could compromise your personal data.4) Regularly update your devices operating system and apps: Keeping your softwareup to date is crucial, as updates often include security patches for newly discovered vulnerabilities that could be exploited by malware like FakeCalls.5) Monitor financial activity regularly: Check your bank and credit card statements often for unauthorized transactions. Set up alerts for any account activity, which can notify you immediately if suspicious activity occurs.6) Limit sensitive transactions on mobile: Whenever possible, avoid performing high-risk transactions (like large money transfers) on your mobile device, especially if youre inpublic or connected to unsecured Wi-Fi. Use a secure computer or contact your bank directly from a verified number.Kurts key takeawayHackers are constantly upgrading their tactics and finding clever ways to hack your devices and scam you out of your hard-earned money. I really think Android phone manufacturers and Google need to step up their game on security to help keep users from getting hacked so often. I dont see the same level of malware affecting iPhones.How comfortable are you using your mobile phone for financial transactions, and what would make you feel safer?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 24 Views
More Stories