


Welcome to the official Fox News Facebook page. Get breaking news, must see videos & exclusive interviews from the #1 name in news.
1 people like this
300 Posts
2 Photos
0 Videos
0
Reviews
Share
Share this page
Recent Updates
-
Airlines eye weight-based fees: Will heavier passengers pay more?www.foxnews.comTech Airlines eye weight-based fees: Will heavier passengers pay more? Weigh and pay: The controversial future of airline pricing Published February 21, 2025 6:00am EST close Laura: We need total transparency to restore trust in aviation Fox News host Laura Ingraham asks why there are so many plane crashes on 'The Ingraham Angle.' In 2008, American Airlines became the first major U.S. carrier to charge for checked bags, introducing a $15 fee as part of a cost-cutting measure. Since then, other airlines have adopted similar fees, with prices steadily increasing over the years. Now, a new debate has emerged about whether airlines should charge passengers based on their weight to help reduce fuel consumption and lower emissions. In 2013, Samoa Air introduced a "fat tax" where passengers paid based on their weight. (Kurt "CyberGuy" Knutsson) The changing landscape of airline weight policiesIn 2013, Samoa Air introduced a "fat tax" where passengers paid based on their weight, but it didn't catch on widely.In February 2024, Finnair expanded its weight data collection initiative. The airline is now asking passengers to voluntarily weigh themselves along with their carry-on luggage at Helsinki Airport. This data collection will take place over three months, covering both short Schengen-area flights and longer-haul routes.Finnair's approach is designed to be anonymous, with only age, gender and travel class recorded alongside the weight data. The collected information will be used to update the airline's aircraft balance and loading calculations for the period from 2025 to 2030.These developments indicate a growing interest in the airline industry in exploring weight-based strategies for both operational efficiency and potential future pricing models. Researchers believe its important to discuss weight-based pricing as a way to reduce the environmental impact of air travel. (Kurt "CyberGuy" Knutsson)Weight-based airline pricing divides opinionA recentstudy asked 1,012 U.S. adults for their opinion on charging based on weight. It looked at three pricing options: a regular fare with a set luggage limit, a "weight threshold" where passengers over 160 pounds would pay extra and a "body weight" model where ticket prices would depend on each persons weight.The results showed that lighter passengers were more in favor of weight-based fees, while heavier passengers preferred the current system. However, almost half of the heavier respondents were still open to the idea.Younger travelers, frequent flyers and wealthier passengers were more likely to support weight-based charges.The study also revealed concerns about fairness, with nearly 60% worried about possible discrimination. Despite these worries, researchers believe its important to discuss weight-based pricing as a way to reduce the environmental impact of air travel. The airline industry faces the challenge of balancing environmental responsibility, economic efficiency and inclusive customer experience. (Kurt "CyberGuy" Knutsson)Ethical and environmental implications of weight-based airline pricingThe potential implementation of weight-based airline pricing extends beyond simple economics, touching on complex environmental and social justice considerations. Climate researchers suggest that such a model could significantly reduce carbon emissions by creating a more direct correlation between passenger weight and fuel consumption. Environmental experts calculate that every additional pound on an aircraft increases fuel burn, with some estimates suggesting that a reduction of 1% in total aircraft weight could lead to approximately 0.75% fuel savings.This data provides a compelling scientific argument for weight-sensitive pricing strategies. However, the approach raises critical ethical questions about body diversity, accessibility and potential discrimination. Disability advocates argue that such pricing could disproportionately impact individuals with medical conditions or physical differences beyond their control.Emerging technologies like advanced lightweight materials and more fuel-efficient aircraft designs might ultimately provide alternative solutions to reducing aviation's carbon footprint, potentially rendering weight-based pricing unnecessary in the long term. As the debate continues, the airline industry faces the challenge of balancing environmental responsibility, economic efficiency and inclusive customer experience.Kurts key takeawaysAlthough there's interest in weight-based charges, societal norms and the potential for discrimination make it challenging to address. As airlines continue exploring new ways to reduce fuel costs and environmental impact, its clear that any move toward weight-based pricing will need to carefully consider fairness and public perception.Do you think airlines should focus on weight-based pricing to cut emissions, or are there better ways to make air travel more eco-friendly? Sound off atCyberguy.com/ContactFor more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·48 Views
-
Huge data leak exposes 14 million customer shipping recordswww.foxnews.comTech Huge data leak exposes 14 million customer shipping records Shipping platform responsible for exposure is used by sellers on eBay, Shopify, Amazon Published February 20, 2025 10:00am EST close 'CyberGuy': Protect your data Kurt Knutsson joins "FOX & Friends" to discuss how your smart home cameras could be spying on you and how to combat phone addiction. No industry is safe from data breaches. Over the past few months alone, we've seen security incidents hit almost every sector, including healthcare, finance and tech. Now, the shipping industry has joined the list, with a major global shipper that works with Amazon, eBay and Shopify exposing 14 million records.To make things worse, the open instance was found in December during the peak of international shipping when people are sending and receiving gifts all over the world. Researchers traced it back to an unprotected AWS bucket owned by Hipshipper. Amazon boxes with labels on top. (Kurt "CyberGuy" Knutsson)What you need to knowHipshipper, a shipping platform used by sellers on eBay, Shopify and Amazon, accidentally exposed millions of shipping labels with personal customer information. Researchers at Cybernews found the exposed data in December 2024, but it wasn't fixed until January, meaning it was open for at least a month. Hipshipper helps people ship packages to over 150 countries, offering tracking, free insurance and easy returns. The exposed shipping labels are important because they detail what's inside the packages and where theyre supposed to go.However, an unprotected AWS bucket held over 14.3 million records, mainly shipping labels and customs forms. Researchers from Cybernews said,"Cybercriminals can use leaked data to carry out scams and phishing attacks. For example, criminals might pretend to be trusted businesses and send fake messages using specific order details to trick people into sharing personal or financial information." Employees at a shipping facility. (Kurt "CyberGuy" Knutsson)What data was leaked?Researchers believe the exposed bucket contained sensitive information about buyers, including their full names, home addresses, phone numbers and order details such as mailing dates and parcel information. While theres no direct evidence that cybercriminals accessed the exposed data, millions of malicious actors use automated bots to search the internet for similar leaks, hoping to find data they can use for harmful purposes.These criminals could exploit the leaked information to launchscams andphishing attacks. For instance, they might pretend to be trusted companies and send fake messages that use specific order details to pressure people into urgently verifying personal or financial information. Unfortunately, retail companies are a prime target for hackers, and relying on large, well-known firms doesnt always protect your information. Recent breaches involving companies likeGrubhub,Mizuno andHot Topic show that even big-name retailers can suffer significant security lapses. Illustration of a hacker at work. (Kurt "CyberGuy" Knutsson)7 ways you can protect yourself after a data breach like this1) Beware of phishing attempts and use strong antivirus software:After a data breach, scammers often use the stolen data to craft convincing phishing messages. These can come via email, text or phone calls, pretending to be from trusted companies. Be extra cautious about unsolicited messages with links asking for personal or financial details, even if they reference recent orders or transactions.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Watch out for snail mail:While many security threats happen online, physical mail can also be a target. With home addresses exposed in data leaks, criminals may send fraudulent letters or fake invoices to trick you into providing further personal information or making payments. If you receive suspicious mail, avoid responding and report it to the company it claims to be from.3) Invest in identity theft protection:Given the exposure of personal data, such as names, addresses and order details, investing in identity theft protection services can provide an extra layer of security. These services monitor your financial accounts and credit report for any signs of fraudulent activity, alerting you to potential identity theft early on. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.4) Enable two-factor authentication on accounts:Enablingtwo-factor authentication adds an extra layer of security to your online accounts. Even if hackers get hold of your login credentials, they won't be able to access your accounts without the second verification step, such as a code sent to your phone or email. This simple step can significantly reduce the risk of unauthorized access to sensitive personal information.5) Monitor your credit reports regularly: You can request free credit reports from major credit bureaus to check for any suspicious activity or unauthorized accounts opened in your name.6) Update your passwords: Change passwords for any accounts that may have been affected by the breach and use unique, strong passwords for each account. Consider using apassword manager. This can help you generate and store strong, unique passwords for all your accounts.7)Remove your personal data from public databases: If your personal data was exposed in this breach, it's crucial to act quickly to reduce your risk of identity theft and scams by removing your personal information from the web.Check out my top picks for data removal services here.Kurts key takeawayIts high time every industry took cybersecurity seriously. If your business operates online, you are just as responsible for protecting customer data as a tech company, possibly even more so, since tech companies typically have stronger safeguards in place. The fact that Hipshipper left a storage bucket containing 14 million records unprotected speaks volumes about how little they prioritize cybersecurity. And it's not just Hipshipper. Many companies dealing with tech products arent even careful enough to password-protect their critical documents. This lack of basic security highlights a worrying trend across industries.Do you think businesses are doing enough to protect customer data?Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·26 Views
-
$20K foldable tiny home in a box you can set up in just 1 hourwww.foxnews.comPublished February 20, 2025 6:00am EST close 'CyberGuy': $20K foldable tiny home in a box you can set up in just 1 hour Boxabls Baby Box is a 120-square-foot foldable home that can be set up in 60 minutes and has off-grid features. Kurt Knutsson says it's designed to maximize functionality. Boxabls Baby Box is transforming the tiny home movement with its innovative, foldable design. This ultra-compact home offers a fully functional, climate-controlled living space that can be set up by one person in just 60 minutes, no tools required. Exterior of the Baby Box (Boxabl). (Kurt "CyberGuy" Knutsson)A compact design with big featuresAlthough small, theBaby Box is thoughtfully designed to maximize functionality. The living area features a multipurpose "SLS" sofa that easily converts into a bed, offering both comfort and practicality. Interior of the Baby Box (Boxabl). (Kurt "CyberGuy" Knutsson)The kitchen is equipped with a countertop induction stove, a compact refrigerator, a deep sink and USB outlets for charging small electronics. Interior of the Baby Box (Boxabl). (Kurt "CyberGuy" Knutsson)The bathroom includes a marine-style toilet with a foot-operated flush system, a glass-enclosed shower with a skylight for added sunlight, and ventilation to maintain comfort. To ensure year-round livability, the Baby Box comes with a ductless mini-split system that provides heating and cooling. Interior of the Baby Box (Boxabl). (Kurt "CyberGuy" Knutsson)Portable and easy to set upThe Baby Box is designed for mobility and ease of installation. When folded for transport, it measures just 6 feet 6 inches wide and 14 feet 9 inches long, making it compact enough to be towed by most SUVs or trucks. Once unfolded, it more than doubles in width, creating a spacious interior measuring 14 feet 9 inches long, 14 feet 1 inch wide and 9 feet 3 inches high. Setting up the Baby Box is remarkably simple; its walls, floor and roof unfold and clasp together seamlessly without requiring any tools or expertise. Interior of the Baby Box (Boxabl). (Kurt "CyberGuy" Knutsson)Built for off-grid livingFor those looking to embrace off-grid living or reside in remote areas, the Baby Box is well-equipped to meet these needs. It includes dual batteries to power lighting and water pumps and features water tanks with capacities for black water, gray water and fresh water. The unit is also compatible with solar power systems and can run on a generator for complete energy independence. These features make it an excellent choice for adventurers or anyone seeking self-sufficient living arrangements. Interior of the Baby Box (Boxabl). (Kurt "CyberGuy" Knutsson)Who will love this tiny house?The Baby Box is perfect for minimalists who want an affordable housing solution without sacrificing functionality or comfort. Its also ideal for remote workers or adventurers who need a portable home base that can be set up quickly and easily.Additionally, its mobility and rapid installation make it an excellent option for emergency housing or disaster relief situations. For those accustomed to studio apartment living, the Baby Box offers privacy without compromising on essential amenities. Floor plan diagram of the interior of the Baby Box (Boxabl). (Kurt "CyberGuy" Knutsson)Price of the Baby BoxThe Baby Box, priced at an introductory $19,999 (set to rise to $30,000), provides an affordable and convenient housing option for those seeking a minimalist or off-grid lifestyle. Floor plan diagram of the Baby Box. (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysThe Baby Box by Boxabl is a great innovation that combines affordability, portability and practicality into one compact package. Whether youre looking to downsize your life, explore off-grid living or simply need a quick housing solution, this foldable tiny home delivers on all fronts. Its thoughtful design makes it not just a home but a lifestyle choice that embraces simplicity without sacrificing quality.Would you consider living in a foldable, 120-square-foot Baby Box home that sets up in 60 minutes? Why or why not? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·61 Views
-
Fox News AI Newsletter: Can Musk's Grok AI beat the Warren Buffett challenge?www.foxnews.comRecommended By Fox News Staff Fox News Published February 19, 2025 11:53am EST close 'CyberGuy': Humanoid robots bust dance moves alongside humans Unitree H1 robots dance at gala, blending AI and tradition. Tech expert Kurt Knutsson examines the convergence of cutting-edge technology and traditional culture. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Elon Musk hints new Grok AI could beat Warren Buffett's March Madness bracket challenge- Humanoid robots bust dance moves alongside humans- Don't let AI phantom hackers drain your bank account Elon Musk debuted xAI last year. (Hakan Nural / Anadolu Agency / File / Getty Images)AI DREAMS: BillionaireElon Musk on Monday said his startup xAI's latest iteration of the Grok chatbot could help college basketball fans pick a perfect bracket once March Madness begins.BUSTIN A MOVE: In a stunning display of technological prowess and cultural fusion, Unitree's H1 humanoid robots recently stole the show at China's Spring Festival Gala, performing alongside human dancers in a mesmerizing rendition of the traditional Yangge folk dance. This groundbreaking performance marks a significant milestone in the world of robotics and entertainment.AI PHANTOM HACKERS: Tech support scams have been around for years, but a new variant called the Phantom Hacker scam is rapidly gaining traction. It has cost victims, primarily older Americans, over $500 million since 2023. This scam is particularly deceptive because it unfolds in three carefully orchestrated phases and uses AI-powered social engineering tactics to avoid detection. Attackers leverage caller ID spoofing and AI-generated voices to make their scheme more persuasive, but there are ways to protect yourself. The Shielding Suit (Vollebak) (Kurt "CyberGuy" Knutsson)STEALTH TECH SHIELD: British clothing brand Vollebak has created a revolutionary solution for individuals concerned about digital privacy and electromagnetic exposure. The Shielding Suit, a futuristic tracksuit made of pure silver, provides comprehensive protection against various forms of tracking and surveillance.MALWARE ATTACKS MACS: A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems.NO DRIVERS HERE: Autonomous driving technology company Waymo has partnered with automaker Zeekr to develop the next generation of vehicles for ride-hailing services. Exterior of the Zeekr RT (Zeekr)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.0 Comments ·0 Shares ·44 Views
-
Smart home device maker exposes 2.7 billion records in huge data breachwww.foxnews.comTech Smart home device maker exposes 2.7 billion records in huge data breach Chinese company that makes IoT devices database was unprotected Published February 19, 2025 10:00am EST Data breaches keep happening, and too often they come down to companies failing to take cybersecurity seriously. Some of the biggest breaches have been caused by negligence, and now theres another major one to add to the list. Mars Hydro, a Chinese company that makes Internet of Things (IoT) devices like LED lights and hydroponics equipment, left a massive database unprotected online. As a result, 2.7 billion records were exposed to anyone who knew where to look. Illustration of IoT devices (Kurt "CyberGuy" Knutsson)What happened?Mars Hydro, a Chinese manufacturer of IoT devices, suffered a massive data breach after a publicly accessible, unprotected database containing nearly 2.7 billion records was discovered online. The 1.17-terabyte database was not password-protected or encrypted, exposing a massive amount of sensitive information related to the companys smart devices, including LED grow lights and hydroponic equipment.The database contained logging, monitoring and error records for IoT devices sold worldwide. Among the exposed data were Wi-Fi network names (SSIDs), Wi-Fi passwords, IP addresses, device ID numbers and other details linked to user devices and the Mars Pro IoT software application. Plus, internal records referenced LG-LED SOLUTIONS LIMITED, a California-registered company, as well as Spider Farmer, which produces agricultural equipment.Security researcherJeremiah Fowler identified the database and immediately sent a responsible disclosure notice to LG-LED SOLUTIONS and Mars Hydro. Within hours, public access to the database was restricted.It remains unclear how long the database was publicly accessible or whether any unauthorized parties accessed the data before its restriction. The only way to confirm potential access or misuse would be through an internal forensic audit, but no such investigation has been publicly disclosed. Illustration of using an app to access smart home devices (Kurt "CyberGuy" Knutsson)Should you be worried?The unprotected database contained highly sensitive user and device information, including SSIDs and passwords stored in plain text, which could allow unauthorized users to access home networks. Although the researcher did not indicate that any personally identifiable information was exposed, the presence of network credentials, IP addresses, device ID numbers and data about smartphones running the IoT software raises serious security concerns.The exposed credentials could theoretically enable an attacker to connect to the network, compromise other devices, intercept data or even launch targeted cyberattacks. This risk is particularly troubling, given the broader vulnerabilities within the IoT industry.According to a threat report by Palo Alto Networks, 57% of IoT devices across all industries are considered highly vulnerable, and an alarming 98% of data transmitted by these devices is unencrypted. The report further found that 83% of connected devices operate on outdated or unsupported operating systems, leaving them susceptible to attacks that exploit known vulnerabilities.This incident underscores a recurring problem in the IoT sector: poor security practices, weak data protection and the absence of encryption. Without proactive security measures, such breaches will likely continue, exposing users to risks that extend beyond just their IoT devices, potentially compromising entire home or business networks. Illustration of a IoT device (Kurt "CyberGuy" Knutsson)5 ways you can protect yourselfIf you own a Mars Hydro device or use the Mars Pro app, take the following steps to protect your data and secure your network:1) Change your Wi-Fi password: Since Wi-Fi network names and passwords were stored in plain text, the first step is to update your router password immediately.Even if you believe your credentials were not directly exposed, its best to assume otherwise. A strong password should be complex, combining upper and lowercase letters, numbers and special characters. Avoid using simple or easily guessable passwords, such as your name, address or basic numerical sequences.2) Enable two-factor authentication (2FA): If your router supportstwo-factor authentication, enabling it adds an extra layer of security. This ensures that even if someone gains access to your login credentials, they would still need a secondary authentication code typically sent via text message or an authentication app to log in. This significantly reduces the risk of unauthorized access.3) Monitor your network for unusual activity: With Wi-Fi credentials and IP addresses exposed, attackers could attempt to access your network remotely. Checking your routers admin panel regularly to review connected devices is an important security measure. If you notice an unfamiliar device, remove it immediately and change your Wi-Fi password again.4) Keep your devices updated: IoT devices are notorious for running outdated or unsupported software, making them vulnerable to cyberattacks. Regularlyupdating the firmware and software of your smart devices ensures that you receive the latest security patches. Check your device settings for available updates and install them as soon as they are released. Keeping your routers firmware updated is equally important, as routers are a primary target for hackers.5) Beware of phishing attempts and use strong antivirus software: Hackers may try to exploit the data from this breach by launching phishing attacks. If you receive an email claiming to be from Mars Hydro or LG-LED SOLUTIONS, urging you to reset your password or provide personal details, be cautious. Cybercriminals often create fake login pages designed to steal credentials. Do not click on suspicious links or download attachments from unknown senders.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurts key takeawayThe Mars Hydro breach is yet another reminder of the security risks that come with IoT devices. Companies need to do a better job of protecting user data, but at the end of the day, it is up to you to secure your own network. Updating passwords, enabling two-factor authentication and keeping an eye on your connected devices can make a big difference in keeping your data safe and your smart home secure.Do you think governments should regulate IoT security more strictly, or should it be left to the companies? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·47 Views
-
Humanoid robots bust dance moves alongside humanswww.foxnews.comRecommended Published February 19, 2025 6:00am EST close 'CyberGuy': Humanoid robots bust dance moves alongside humans Unitree H1 robots dance at gala, blending AI and tradition. Tech expert Kurt Knutsson examines the convergence of cutting-edge technology and traditional culture. In a stunning display of technological prowess and cultural fusion, Unitree's H1 humanoid robots recently stole the show at China's Spring Festival Gala, performing alongside human dancers in a mesmerizing rendition of the traditional Yangge folk dance. This groundbreaking performance marks a significant milestone in the world of robotics and entertainment. H1 humanoid robots dancing (Unitree Robotics) (Kurt "CyberGuy" Knutsson)A dance of man and machineThe performance featured 16H1 robots, each standing at an impressive 5.74 feet tall, seamlessly integrated with a troupe of human dancers. What set this performance apart was not just the robots' ability to keep pace with the music and their human counterparts but their mastery of a particularly challenging aspect of the Yangge dance: the handkerchief trick. H1 humanoid robots dancing (Unitree Robotics) (Kurt "CyberGuy" Knutsson)The handkerchief trick: A testament to precisionThe robots demonstrated remarkable dexterity by spinning, throwing and catching handkerchiefs in motion, a feat that typically requires extensive practice for human performers. This display of fine motor control and timing showcased the advanced capabilities of Unitree's AI-driven full-body motion control technology. H1 humanoid robots dancing (Unitree Robotics) (Kurt "CyberGuy" Knutsson)Behind the scenes: AI and lidar in actionThe dance routine was a preset performance based on data from real dancers. Unitree employed whole-body AI motion control to ensure synchronization between the robots, while lidar scans of the environment allowed for real-time adjustments to unscripted events. H1 humanoid robots dancing (Unitree Robotics) (Kurt "CyberGuy" Knutsson)A global audienceThe performance was part of the annual Spring Festival Gala, recognized by Guinness World Records as the most-watched annual TV program globally. Directed by acclaimed filmmaker Zhang Yimou, the robot dance segment reached an estimated audience of over a billion viewers. H1 humanoid robots dancing (Unitree Robotics) (Kurt "CyberGuy" Knutsson)The future of humanoid robotsThis performance represents significant progress for Unitree, which has been steadily improving its robotic offerings. The company's product line includes the more affordable G1 humanoid robot and various quadruped "robot dogs." With the global demand for humanoid robots projected to reach $38 billion by 2035, according to Goldman Sachs, Unitree is positioning itself at the forefront of this burgeoning industry. The company anticipates seeing its robots engaged in more commercial applications within the next three to five years. H1 humanoid robots dancing (Unitree Robotics) (Kurt "CyberGuy" Knutsson)Kurts key takeawaysThe Unitree H1 robots' performance at the Spring Festival Gala is a fascinating convergence of cutting-edge technology and traditional culture. As these machines continue to evolve, we may see them playing increasingly significant roles in various sectors, from entertainment to industry. While the idea of "Terminator-style" robots taking over might still be the stuff of science fiction, the rapid advancements in robotics certainly give us pause for thought about the future relationship between humans and machines.Would you want to see a performance with humans and humanoid robots dancing, or do you prefer traditional human-only performances?Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·40 Views
-
SpaceX makes history after launching rocket from Florida and landing booster in Bahamaswww.foxnews.comRecommended By Greg Wehner Fox News Published February 18, 2025 9:28pm EST close SpaceX lands a Falcon 9 rocket on a drone ship off the coast of the Bahamas For the first time, SpaceX launched a Falcon 9 from Florida and landed the rocket booster off the coast of the Bahamas. SpaceX has pulled off a historic feat, after launching a rocket into space from the coast of Florida and landing the rocket booster in another country.Tuesdays mission marked the first time a Falcon 9 landed on a droneship off the coast of the Bahamas.Nearly eight minutes after blasting off from Cape Canaveral, Florida, the Falcon 9s first stage booster landed on the "Just Read the Instructions" droneship stationed off the coast of the Bahamas, in the Atlantic Ocean. SpaceX lands a Falcon 9 rocket on a drone ship off the coast of the Bahamas (Handout)"This is the first time that a rocket has taken off from one country, gone to space and landed in another country!" SpaceX CEO Elon Musk wrote on X.The commercial space company said being able to land in the Bahamas allows Falcon 9 to maximize its performance by launching into a southeast trajectory from the Florida Space Coast.SPACEX PULLS OFF HISTORIC ACHIEVEMENT, LAUNCHING FOUR ROCKETS IN LESS THAN 40 HOURS SpaceX lands a Falcon 9 rocket on a drone ship off the coast of the Bahamas (Handout)For instance, launching toward the southeast allows SpaceX to put additional satellites into orbit, while also allowing the rockets to launch human spaceflight missions like Fram2, a polar-orbit human spaceflight mission to explore Earth.SpaceX also said landing off the coast of the Bahamas provides greater winter weather for recovery options, which will allow the Falcon booster to continue to provide "rapid and reliable service" for the companys customers. SpaceX lands a Falcon 9 rocket on a drone ship off the coast of the Bahamas (Handout)The Falcon 9 booster used in Tuesdays mission was previously used to launch eight astronauts to the space station, critical cargo and supplies to the orbital lab, and send over 200 Starlink satellites into orbit, among other things.In fact, on Tuesday, the booster helped deliver another 23 Starlink satellites into orbit before making its return to terrestrial Earth. Greg Wehner is a breaking news reporter for Fox News Digital.Story tips and ideas can be sent to Greg.Wehner@Fox.com and on Twitter @GregWehner.0 Comments ·0 Shares ·59 Views
-
Don't let AI phantom hackers drain your bank accountwww.foxnews.comPublished February 18, 2025 10:00am EST close 'CyberGuy': New bank scams are costing victims thousands of dollars Kurt Knutsson joins "Fox & Friends" to discuss bank scams and a self-driving car that trapped a rider inside. Tech support scams have been around for years, but a new variant called the Phantom Hacker scam is rapidly gaining traction. It has cost victims, primarily older Americans, over $500 million since 2023. This scam is particularly deceptive because it unfolds in three carefully orchestrated phases and uses AI-powered social engineering tactics to avoid detection. Attackers leverage caller ID spoofing and AI-generated voices to make their scheme more persuasive, but there are ways to protect yourself. Illustration of a phantom hacker at work (Kurt "CyberGuy" Knutsson)How the phantom hacker scam worksAshighlighted by the FBI, the scam begins with the tech support impostor phase. You might receive a call, email, text or even a pop-up on your computer warning you that your device has been compromised. The message urges you to call a customer support number for assistance. Once you do, a scammer posing astech support claims that hackers have targeted your accounts. To "help," they instruct you to download remote access software, allowing them to take control of your computer. Under the guise of scanning for threats, they trick you into revealing your financial accounts, setting up the next phase of the scam.Next comes the financial institution impostor phase. Another scammer, pretending to be from your bank or investment firm, calls to warn that a foreign hacker has infiltrated your accounts. They advise moving your money to a "safe" government-protected account, often using wire transfers, cryptocurrency or cash deposits. They might also insist on keeping the transaction confidential, claiming its necessary for security reasons.In the final U.S. government impostor phase, a third scammer impersonates a federal official often from the Federal Reserve who pressures you to act quickly. If you start doubting the scheme, they may send you an official-looking email or document to convince you that the transfer is legitimate. By the time victims realize theyve been tricked, their money is gone, often sent overseas beyond the reach of U.S. authorities. Illustration of a phantom hacker at work (Kurt "CyberGuy" Knutsson)How AI is making things worseAI is making scams like the Phantom Hacker scam more deceptive and harder to spot. Scammers are using AI-powered chatbots to automate their schemes. Instead of relying on human operators, they can now deploy AI-driven responses that sound natural and convincing.AI-generateddeepfake voices are also being used to impersonate bank officials and government representatives. With just a short audio sample, scammers can clone a voice to make their calls seem even more authentic. This means a victim might hear what sounds like their bank manager or an official from the Federal Reserve.Email scams are also becoming more sophisticated. AI tools can craft messages that mimic the tone and style of official communications. Scammers can even generate fake but realistic-looking documents with official letterheads to convince victims that the scam is legitimate. Illustration of man getting a deepfake scam call (Kurt "CyberGuy" Knutsson)7 ways to protect yourselfThe best way to defend yourself against the Phantom Hacker scam is to stay informed, be cautious and follow these steps:1) Ignore unsolicited messages: Scammers often send pop-ups, text messages or emails claiming that your computer is infected or that your bank account is at risk. These messages may look official, but they are designed to create panic and pressure you into taking immediate action. Never click on links or attachments from unknown senders, as they may contain malware or lead to phishing websites that steal your personal information.2)Have strong antivirus software:The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3) Verify phone numbers before calling: If you receive an unexpected message urging you to call tech support, do not use the number provided in the message. Instead, visit the official website of the company in question and find their customer support contact information. Scammers often create fake websites or usecaller ID spoofing to make their phone numbers appear legitimate, so always double-check before making a call.4) Avoid downloading unknown software: No reputable company will ever ask you to install remote access tools unless you have specifically reached out for tech support. Scammers use these programs to take control of your computer, monitor your activity and access sensitive information. If someone unexpectedly asks you to download software to "fix a problem" or "protect your account," it is likely a scam.5) Never give control of your device to a stranger: If you allow a scammer to remotely access your computer, they can view your personal files, log your keystrokes and manipulate your accounts without your knowledge. Legitimate customer support representatives will never request remote access unless you have initiated the support request through an official company channel. If someone insists on taking control of your device, hang up immediately.6) Be skeptical of urgent financial warnings: The U.S. government will never contact you unexpectedly and demand that you move your money to a "safe account." They will also never ask you to wire funds, purchase gift cards or send cryptocurrency as a form of payment. Scammers create a false sense of urgency to trick victims into acting before they can think critically about the situation. If someone claims to be from a bank or government agency and pressures you to move money, stop and verify their identity through official channels.7) Invest in personal data removal services: Scammers often gather information from data broker websites to make their scams more convincing. Your name, phone number, home address and even financial history may be publicly available without your knowledge. Consider using a data removal service to regularly scan and request the removal of your personal information from these databases. This reduces the chances of scammers targeting you with highly personalized attacks. You can also manually opt out of major data broker sites, but using a service automates the process and keeps your information protected over time.Check out my top picks for data removal services here.Kurts key takeawayThe Phantom Hacker scam is designed to be convincing, but understanding how it works can help you stay one step ahead. Scammers rely on fear, urgency and deception to trick their victims, but you can protect yourself by staying cautious, verifying requests through official sources and never sharing personal or financial information with unknown callers.Do you think law enforcement and tech companies are doing enough to combat AI-powered scams? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·39 Views
-
Electric SUV is the ultimate lifeline for search and rescue missionswww.foxnews.comRecommended Published February 18, 2025 6:00am EST close 'CyberGuy': Electric SUV is the ultimate lifeline for search and rescue missions Tech expert Kurt Knutsson talks about the Genesis GV60 MIV, an electric rescue EV with snow tracks for extreme missions. Genesis has once again pushed the boundaries of automotive design with its latest concept vehicle, the GV60 Mountain Intervention Vehicle (MIV). Unveiled at the World Economic Forum 2025 in Davos, Switzerland, this innovative creation showcases Genesis' commitment to combining luxury, technology and functionality in extreme environments. GV60 Mountain Intervention Vehicle (Genesis) (Kurt "CyberGuy" Knutsson)Reimagining rescue operationsTheGV60 MIV Concept represents a purpose-built electric vehicle designed specifically for rescue operations in challenging terrains and harsh weather conditions. Drawing inspiration from small unit support vehicles, the concept transforms the luxurious Genesis GV60 compact SUV into a sophisticated and capable rescue machine. GV60 Mountain Intervention Vehicle (Genesis) (Kurt "CyberGuy" Knutsson)Extraordinary technical capabilitiesThe most remarkable feature of the GV60 MIV is its revolutionary snow tracks, which replace traditional wheels and enable seamless movement across treacherous winter landscapes. Large carbon fiber fender flares provide critical protection for both the vehicle and surrounding personnel, while vibrant orange accents dramatically enhance visibility in challenging environments. GV60 Mountain Intervention Vehicle (Genesis) (Kurt "CyberGuy" Knutsson)Advanced rescue technologiesThe vehicle's interior is meticulously designed with specialized sports seats, comprehensive medical supplies and sophisticated emergency communication systems. A dedicated Garmin GPS device ensures precise navigation even in areas without cellular connectivity, demonstrating the concept's commitment to mission-critical functionality. GV60 Mountain Intervention Vehicle (Genesis) (Kurt "CyberGuy" Knutsson)Electric performance meets rescue efficiencyThe electric drivetrain offers multiple strategic advantages for rescue operations, including near-silent operation, reduced environmental impact and a powerful vehicle-to-load system that can power critical external equipment. The concept delivers an impressive 429 horsepower with an estimated range of 294 miles, proving that electric vehicles can perform exceptionally in demanding scenarios. GV60 Mountain Intervention Vehicle (Genesis) (Kurt "CyberGuy" Knutsson)Visionary design philosophyWhile the GV60 MIV Concept will not enter mass production, it represents a bold statement about the potential of electric vehicles in specialized applications. Genesis demonstrates how advanced automotive technology can be reimagined to serve critical human needs in the most challenging environments. GV60 Mountain Intervention Vehicle (Genesis) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysGenesis has truly outdone themselves with this mountain rescue concept. It's like they've created a superhero vehicle that combines luxury, technology and life-saving potential into one extraordinary package. While we might not see these snow-track-equipped rescuers on real-life missions any time soon, if ever, the GV60 MIV Concept certainly sparks the imagination about the future of specialized electric vehicles.If you could adapt any existing vehicle for a specific rescue mission, which would you choose and why? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·51 Views
-
How to set up a home network like a prowww.foxnews.comclose Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "The Cyberguy" Knutsson explains how to keep your Windows computer safe and discusses the security risks of online retail giant Temu. With remote work becoming the norm, a reliable home network is more crucial than ever. Whether you're video conferencing, streaming or managing critical work tasks, a robust and secure home network is no longer a luxury but a necessity.A well-configured network ensures your devices stay connected and that your online experience runs smoothly. Heres how to set up a high-performance home network, understand the equipment you'll need and secure your connection. A man working on his laptop (Kurt "CyberGuy" Knutsson)1) Install your router and configure important settingsStart byplacing your router in a central location within your home. The closer your device is to the router, the stronger and more reliable your Wi-Fi signal will be. For a wired network, connect a switch or Ethernet hub to an available power outlet using a high-quality Ethernet cable.Once your router is installed, its time to configure the security settings. Find your routers online setup page on the instructions, which are usually provided with the device or printed on the router itself.Key settings to change include renaming your network and updating the network security key.Check our list of the top routers for best security here. Home router (Kurt "CyberGuy" Knutsson)2) Decide if you want a wired or wireless setupWhen setting up your home network, youll need to choose between a wired or wireless configuration. Wired networks offer enhanced security and faster speeds, but wireless networks offer the convenience of connecting multiple devices without needing additional hardware.Wired devices:Use anRJ-45 network cable to link your device to the router or switch. Most modern routers supportGigabit Ethernet (1,000 Mbps). For performance, its best to useCat5e,Cat6 orCat6acables between your devices and router.Cat5e supports gigabit speeds but can struggle over long distances.Cat6 andCat6a cables offer superior performance with speeds up to10 Gbps. While Cat6 is adequate for most homes, Cat6a is ideal for longer distances or for homes with10 Gbps devices. Cat6a cables are typically used in high-demand environments, like data centers or large offices.Switches are essential for connecting multiple wired devices within your home network. They allow devices to communicate over a single Ethernet segment and can be cascaded to extend your network. There are two types of switches:Unmanaged switches: Affordable and straightforward, these typically offer basic features and come infive- or eight-port configurations.Managed switches: Higher-priced but offer advanced features such asvirtual LANs, traffic segmentation and even the ability to block traffic from specific devices.Some switches also providePower over Ethernet, which can power devices likeaccess points orsecurity cameras without needing a separate power outlet. This is particularly useful for devices in hard-to-reach areas.Wireless devices:To connect wireless devices, youll need a Wi-Fi-capable router orwireless access point. Wi-Fi comes in different generations, such asWi-Fi 5 andWi-Fi 6. Make sure your devices and router are compatible with the latest Wi-Fi version. If needed, a USB adapter can help update your devices for compatibility.Wireless networks operate on two primary bands:2.4 GHz: Offers longer range but with lower bandwidth. Its ideal for devices likesmart home gadgets that don't require high-speed data.5 GHz: Provides higher bandwidth and faster speeds but has a shorter range. Its perfect for devices likelaptopsandstreaming devices that need fast, uninterrupted connectivity.3) Extend your network rangeBoth wired and wireless networks can experience connectivity issues if there are physical barriers or long distances between devices and the router. Toexpand the range of your network, consider these options:Ethernet cables: Ethernet cables can extend up to100 meters. Adding aswitch allows multiple devices to connect at different locations in your home. You can also usepower-line adapters, which send your network signal through your home's electrical wiring, enabling network access in rooms far from the router.Wireless repeaters:These devices extend the Wi-Fi signal by amplifying and retransmitting it.Mesh systems: Amesh network uses multiple nodes (router-like devices) that communicate with each other to create a seamless Wi-Fi network. Theyre easy to set up and provide consistent coverage. Check out ourtop mesh networking winners here. Ethernet cable (Kurt "CyberGuy" Knutsson)4) Secure your home networkSecuring your home network is critical to maintaining your privacy. Here are some best practices to follow.Change default passwords: Make sure to change the default passwords on all devices that control or access your network.Activate the firewall:This helps block unauthorized traffic and protects against potential threats.Minimize open ports: Routers use virtual ports for specific services, such as web traffic on port 80 or secure browsing on port 443. Opening only the necessary ports helps reduce vulnerabilities.Disable remote access: Turn off remote access to your router and cable modem unless absolutely necessary.Use WPA2 or WPA3 encryption: Always secure your wireless network with a strong password and WPA encryption to prevent unauthorized access.5) Start with the right internet plan for a stronger home networkNo matter how advanced your home network setup is, your internet speed and reliability depend on your provider and plan. If youre experiencing lag, buffering or connectivity issues, it might be time to upgrade or switch to a better internet service.Choose the right speed for your needs: Households with multiple users streaming, gaming or working remotely should aim forat least 100-500 Mbps for smooth performance.Check for fiber or 5G home internet: If available in your area, these options provide faster and more stable connections than traditional cable or DSL.Compare plans for the best deal: Internet providers often have better pricing or faster speeds based on your location; switching could improve your connection and save money.. Illustration of checking your security features (Kurt "CyberGuy" Knutsson)Kurts key takeawaysSetting up an optimal home network might seem complex, but with the right approach, it becomes a straightforward process that dramatically improves your digital experience. By understanding your network's components, prioritizing security and investing in quality equipment, you'll create a reliable digital infrastructure that supports your work and lifestyle. Remember, a well-configured network is an investment in your productivity, entertainment and peace of mind.What other home technology topics would you like tips and tricks on? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·50 Views
-
Stealth tracksuit shields you from infrared cameras and electromagnetic signalswww.foxnews.comRecommended Published February 17, 2025 6:00am EST close 'CyberGuy': Stealth tracksuit shields you from infrared cameras and electromagnetic signals Kurt Knutsson talks about Vollebaks Shielding Suit, which blocks EM radiation, infrared and tracking for privacy. British clothing brand Vollebak has created a revolutionary solution for individuals concerned about digital privacy and electromagnetic exposure. The Shielding Suit, a futuristic tracksuit made of pure silver, provides comprehensive protection against various forms of tracking and surveillance. The Shielding Suit (Vollebak) (Kurt "CyberGuy" Knutsson)How does it actually work?This high-tech garment completely blocks electromagnetic radiation, infrared detection and bacteria, effectively shielding the entire body from unwanted digital intrusions. TheShielding Suit's most impressive feature allows smartphones to become completely undetectable, even when powered on, through specially designed pockets that function like Faraday cages. The Shielding Suit (Vollebak) (Kurt "CyberGuy" Knutsson)Technical detailsThe suit features pure silver-embedded fabric designed to block electromagnetic radiation across multiple frequencies. Its Faraday cage pockets provide complete device isolation, while the lightweight design ensures maximum comfort. The Shielding Suit (Vollebak) (Kurt "CyberGuy" Knutsson)More than just a protective layerThe suit's capabilities extend far beyond basic electromagnetic shielding. It deflects mid and long-wave infrared radiation, rendering the wearer invisible to infrared cameras in low-light conditions. The silver-infused fabric also provides antimicrobial protection, potentially reducing the risk of bacterial transmission. The Shielding Suit (Vollebak) (Kurt "CyberGuy" Knutsson)Style meets functionalityVollebak ensures the Shielding Suit doesn't sacrifice comfort for protection. The jacket feels as comfortable as a regular lightweight jacket, with the added benefit of looking like something from a futuristic space mission. The Shielding Suit (Vollebak) (Kurt "CyberGuy" Knutsson)NASA-inspired technology for everyday protectionVollebak developed the suit using the same shielding material NASA employed for its Mars exploration rover, Curiosity. The outer shell contains pure silver, blocking radio waves and microwaves across a frequency range of 0.2GHz to 10GHz. This technological spectrum covers Wi-Fi, Bluetooth, satellite communications and radar systems. The Shielding Suit (Vollebak) (Kurt "CyberGuy" Knutsson)Scientific backgroundElectromagnetic radiation travels through the universe, facilitating information and energy transfer. However, as we enter an era of increased cybersecurity threats and technological complexity, personal protection becomes increasingly important. The Shielding Suit (Vollebak) (Kurt "CyberGuy" Knutsson)The price of privacyAdvanced technology comes with a significant investment. The complete Shielding Suit, including jacket and pants, costs $5,290. Thejacket alone is priced at $3,295, while thepants are available for $1,995. You can pre-order the suit, with shipping expected in April.Kurt's key takeawaysThe Vollebak Shielding Suit is a technological shield that transforms personal protection from a theoretical concept into a wearable reality. While the price may seem steep, for those genuinely concerned about digital tracking and radiation exposure, this suit offers an unprecedented level of personal security that transcends traditional clothing limitations.If you owned this high-tech Shielding Suit, in what situations would you wear it and why? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·34 Views
-
Mac users beware: AI-powered malware threats are on the risewww.foxnews.comPublished February 16, 2025 10:00am EST close Is China leading the artificial intelligence race? Yurts founder and CEO Ben Van Roo breaks down concerns over DeepSeek on 'The Will Cain Show.' Apple devices are believed to be pretty secure, and that's what the company will tell you. You might have seen the tagline "Privacy. Thats Apple." in their promotions.However, the tech landscape is changing, and even Apple products arent beyond cybercriminals reach.A new report suggests Mac users will need to be more vigilant this year because AI advancements are helping hackers breach even the most secure systems. I haveconsistently reported on how Mac malware is targeting users, and experts now believe this will only get worse.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW A man working on his laptop (Kurt "CyberGuy" Knutsson)The rise of cyberattacks on Apple devicesMac malware is not what it used to be. For years, the biggest threats were annoying adware and browser hijackers, more of a nuisance than a real danger. But that is changing fast. As highlighted byMalwarebytes, a new wave of information stealers is taking over, and they are far more dangerous, going after passwords, authentication cookies, credit card details and even cryptocurrency.This shift started in mid-2023 with the arrival ofAtomic Stealer, also known as AMOS, a piece of malware that looked much more like something you would see on Windows than the typical Mac threats. AMOS was not just effective. It was easy to use and sold as a service for $1,000 a month with a slick web-based control panel. That success led to the rise of even more dangerous variants.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?One of them,Poseidon, launched in mid-2024 and quickly became the dominant Mac stealer, responsible for 70% of infections. It can drain over 160 different cryptocurrency wallets, steal passwords from browsers and password managers and even grab VPN credentials.At the same time, cybercriminals have doubled down onmalvertising, using fake ads on Google and Bing to trick users into downloading malware instead of real software. These campaigns are highly targeted, allowing attackers to pinpoint Mac users and serve fake downloads based on their searches. With AI now being used to create and execute many of these attacks, they are likely to increase in scale. A woman working on her laptop (Kurt "CyberGuy" Knutsson)Things are worse for Android usersWhile Mac malware is evolving, the situation on Android is even more alarming. Phishing attacks on the platform have reached staggering levels, with thousands of malicious apps designed to steal credentials and bypass security measures.So far in 2024, researchers have detected 22,800 phishing-capable apps, alongside 3,900 apps designed to read OTPs from notification bars and 5,200 apps capable of extracting OTPs from SMS messages. These numbers highlight how widespread and effective Android phishing malware has become.Just like phishing emails, phishing apps trick users into handing over their usernames, passwords and two-factor authentication codes. Once stolen, these credentials can be sold or used for fraud,identity theft or furthercyberattacks. Because phishing apps require minimal code and fewer permissions than traditional malware, they are much easier to sneak onto app stores, including Google Play.Many phishing apps look like regular, fully functional software. Some impersonate games or utilities, while others appear as cracked versions of popular apps like TikTok, WhatsApp or Spotify. Some stay dormant for days to avoid detection before launching their attacks. Others rely on ad functionality to redirect users to phishing sites, making the malicious code harder to trace.Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices.GET FOX BUSINESS ON THE GO BY CLICKING HERE A woman working on a desktop and laptop computer (Kurt "CyberGuy" Knutsson)5 tips to protect your devices from malwareFollow these essential tips to safeguard your devices from the latest malware threats, including the notorious info stealer malware.1. Have strong antivirus software:The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store, Google Play Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links.Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.3. Keep your software updated: Ensure that both macOS, Android and all installed applications are up to date. Apple and Android frequently release security patches and updates that address vulnerabilities. Enable automatic updates for macOS, Android and your apps to stay protected without having to manually check for updates. If you need more help, see myguide on keeping all your devices updated.4. Use strong and unique passwords:To protect your Mac from malware, its also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. Apassword manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack.It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you dont have to remember them yourself. By reducing the number of passwords you need to recall, youre less likely to reuse them, which lowers the risk of security breaches. Get more details about mybest expert-reviewed Password Managers of 2025 here.5. Use two-factor authentication (2FA): Enable2FA for your important accounts, including your Apple ID, Google account, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.Kurts key takeawaysThe days when Mac users could assume they were safe are long gone. Cybercriminals are evolving their tactics, with Mac malware shifting from simple adware to advanced information stealers. Android phishing apps are also becoming harder to detect and more widespread than ever. From stealing passwords and authentication cookies to intercepting OTPs and draining cryptocurrency wallets, these threats are growing in both sophistication and scale. No platform is immune, and as cybercriminals continue refining their techniques, users and organizations must stay ahead with strong security measures.CLICK HERE TO GET THE FOX NEWS APPDo you trust official app stores like the App Store and Google Play, or do you think they need to do more to prevent malware? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·70 Views
-
Inflatable tiny house with space for six is blowing upwww.foxnews.comTech Inflatable tiny house with space for six is blowing up Mobile living space that can inflate in as little as 15 minutes Published February 16, 2025 6:00am EST close Inflatable tiny house with space for six is blowing up This mobile living space resembles a space station with its inflatable dome. We've reported on many tiny houses, but none quite like this before. This housing concept is called the Esch 22 Space Station, also nicknamed E22SS PIU!This mobile living space resembles a space station with its inflatable dome, which can inflate to triple its size. The brains behind this futuristic pad is an architectural firm called 2001, and it was developed for Esch-Alzette in Luxembourg, which is the country's second-largest city.Now, I'm not talking about just another cramped mobile tiny home here. This thing can not only grow in size but is transportable, and it's even eco-friendly. Let's dive in and see how this space-age dwelling actually works.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Exterior of the Esch 22 Space Station (2001)A mobile tiny house with a twistAt its core,E22SS PIU! is a 6-person mobile tiny house that can be easily transported to various locations. In its compact form, it resembles a stainless steel trailer, containing essential amenities such as a bathroom, kitchen and dining space. However, the real magic happens when it reaches its destination. Interior of the Esch 22 Space Station (2001)Unfolding and inflatingOnce parked, the E22SS PIU! undergoes a remarkable transformation. Two wings unfold from the trailer, creating a circular platform with a 29.53-foot diameter. This platform is then covered with cork, providing a stable and eco-friendly base. The final step in this metamorphosis is the inflation of a double-shell pneumatic dome on top of the platform. A model of the exterior of the Esch 22 Space Station (2001)This inflation process, which can be completed in as little as 15 minutes, turns the compact trailer into generous sleeping quarters capable of accommodating up to six people comfortably.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Sleeping quarters of the Esch 22 Space Station (2001)Innovative features and sustainabilityThe E22SS PIU! incorporates several innovative features. A water recycling system ensures that wastewater from sinks and showers is repurposed for toilet flushing, promoting efficient water use. Accessibility has been carefully considered, with an elevator system ensuring the upper level is accessible to people with reduced mobility.The use of cork for flooring adds an eco-friendly touch to the design, further emphasizing the project's commitment to sustainability.GET FOX BUSINESS ON THE GO BY CLICKING HERE Diagram of the Esch 22 Space Station (2001)More than just a tiny homeWhile the E22SS PIU! may not be a practical solution for everyday tiny living, it serves a greater purpose. Created as part of Esch's Capital of Culture program, this project is designed to explore various contexts and environments within the city of Esch. It challenges our perceptions of resource usage in architecture and society, stimulating discussions about innovative housing solutions.Phillippe Nathan, Founder of 2001, an architecture firm developing territories, buildings, spaces and ideas, tells CyberGuy,"E22SSPIU is not a solution, nor does it seek resolution. It is a provocation an experimental construct that redefines collective living by destabilizing conventional relationships to resources: soil, water and energy. It resists fixity, embedding itself within shifting landscapes, absorbing and reflecting their logic. Less an answer, more a system in flux." Exterior of the Esch 22 Space at night Station (2001)How to stay in the inflatable house in Luxembourg's nature reserveWhat's cool is that you can now stay in this unique inflatable house situated at the Ellergronn Nature Reserve. The spacious, inflatable structure is nowavailable to rent. So, it's your chance to explore the surrounding trails and immerse yourself in a blend of innovative design and natural beauty.Kurt's key takeawaysThe Esch 22 Space Station is a bold experiment in mobile architecture. By combining portability with expandability and sustainable features, it pushes the boundaries of what we consider possible in temporary living spaces. While it may not be a practical solution for everyday use, the E22SS PIU! serves as an important conversation starter about the future of housing, resource management and urban development.CLICK HERE TO GET THE FOX NEWS APPWould you feel comfortable staying in an inflatable tiny home like the E22SS PIU!? Why or why not? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·80 Views
-
How cyberscams are draining Americans wallets by the billionswww.foxnews.comPublished February 15, 2025 10:00am EST close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt 'CyberGuy' Knutsson joins 'FOX & Friends' to warn of new cyberscams and his tips on how to avoid them. Cyberscams have reached alarming levels in the U.S., with nearly 30% of Americans falling victim to fraudulent schemes in the past year alone.The financial toll is staggering scams cost Americans over $159 billion annually, with average individual losses now exceeding $3,500 per victim. This epidemic is not just a financial crisis but also a human rights issue, as many scams originate from forced labor operations in Southeast Asia.With nearly 90% of Americans targeted by scam attempts and 40% receiving suspicious messages daily, the question remains: how can we protect ourselves and hold perpetrators accountable in an increasingly digital world?STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW The word scam with data in the background (Kurt "CyberGuy" Knutsson)The mechanics of "pig butchering"One of the most pervasive scams today is the so-called "pig butchering" scheme. Originating in China and spreading across Southeast Asia, this scam involves criminals building trust with victims through social media or messaging apps. Once trust is established, victims are lured into fraudulent cryptocurrency investment schemes. These scams are meticulously crafted to appear legitimate, often involving fake trading platforms and simulated profits. Victims are encouraged to invest more until they are "slaughtered," losing theirentire savings when the scammers vanish with their funds.Forced labor behind these scam centersWhat makes these scams even more horrifying is their reliance on human trafficking. Criminal syndicates in countries like Myanmar, Cambodia and Laos force trafficked individuals to run these operations under threat of violence. These "scam centers" operate in lawless regions controlled by rebel groups or corrupt officials, making international intervention challenging. Survivors describe conditions akin to modern slavery, with physical abuse and even torture being common. Illustration of a scam on a computer key. (Kurt "CyberGuy" Knutsson)Why America is a prime targetCyberscams have taken hold in the U.S. for several reasons that make it particularly vulnerable. As an American, youre likely connected to the digital world through social media platforms, messaging apps and other online tools. This high level of connectivity makes it easier for scammers to reach you directly, whether through a text message, email or social media chat. The sheer number of people online in the U.S. creates a vast pool of potential targets for cybercriminals.Additionally, the growing popularity of cryptocurrency in the U.S. has made it aprime medium for fraud. Cryptocurrency transactions are fast, anonymous and difficult to trace, which makes them ideal for scammers looking to steal funds without leaving a trail. Many scams are designed to exploit this lack of transparency, leaving victims with little chance of recovering their money once its gone.Another major issue is the lack of a centralized reporting system for cyberscams in the U.S. If youve ever been scammed or know someone who has, you might have noticed how confusing it can be to figure out where to report the crime whether to the FBI, the Federal Trade Commission (FTC) or another agency. This fragmented system not only makes it harder for victims to seek help but also prevents authorities from gathering comprehensive data to tackle the problem effectively. These factors combined have made Americans some of the most targeted individuals in the world when it comes to cyberscams. Illustration of a scammer at work. (Kurt "CyberGuy" Knutsson)Global solutions: Lessons from other nationsSeveral countries have implemented innovative measures to combat cyberscams, offering valuable lessons for the U.S. Singapore, for instance, has introduced a mandatory SMS Sender ID Registry (SSIR) that requires organizations to register their alphanumeric Sender IDs. This system effectively blocks unregistered SMS senders, significantly reducing impersonation scams. In fact, cases involving scam SMSes in Singapore fell by 70% over three months after mandating the SSIR.Britain has taken a different approach by establishing a dedicated "159" hotline, allowing residents to instantly verify suspicious calls. This simple yet effective system provides a quick way for individuals to check the legitimacy of unexpected communications, potentially preventing many scams before they occur.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Many nations have also implemented stricter authentication measures, such as biometric checks and in-app verifications, which have proven highly effective in reducing fraud. For example, Singapore has required facial verification for higher-risk transactions through Singpass since 2022, resulting in no further reports of malware-enabled scams involving unauthorized CPF withdrawals since its implementation in June 2023.Some countries are exploring ways to slow down cryptocurrency transactions or cap transfer amounts, which could significantly hinder scammers who rely on quick, anonymous transfers. These measures, combined with a coordinated global response involving major victim nations like the U.S. and China, could prove instrumental in dismantling criminal networks more effectively. By learning from these international examples and adapting them to the American context, the U.S. could significantly strengthen its defenses against the rising tide of cyberscams. Illustration of scamming techniques. (Kurt "CyberGuy" Knutsson)Tips to protect yourself and your loved onesRecognizing red flags is essential to avoid falling victim to scams. Here are some important red flags to be aware of:Unsolicited calls or emails: Be wary of anyone asking for personal or financial information. Legitimate organizations will not ask for sensitive information in this manner.Urgent requests for payment: Scammers often demand immediate action to avoid scrutiny. Take a moment to verify the request through official channels before responding.Unfamiliar contact information: Be cautious if the contact information provided does not match the official contact details of the company or organization.Untraceable payment methods: Requests for payment via gift cards, cryptocurrency or wire transfers are major warning signs. Reputable companies will not ask for these types of payments.Too good to be true offers: If an offer seems too good to be true, it likely is. Research and verify any claims before proceeding.10 ways to protect yourself from being scammedProtecting yourself and your loved ones from scams requires vigilance and awareness. Here are eight effective ways to safeguard against scammers:1. Verify before you act: Always verify the identity of the person or organization contacting you. Use official contact information to reach out directly and confirm the legitimacy of the request.2. Limit personal information sharing: Avoid sharing personal or financial information over the phone, email or online unless you are certain of the recipient's identity and legitimacy.3. Use strong, unique passwords for all your accounts:A robust password should include a mix of uppercase and lowercase letters, numbers and symbols. Avoid reusing passwords across multiple platforms, and consider using a reputablepassword manager to store and generate complex passwords securely.4. Enable two-factor authentication (2FA) wherever possible:2FA adds an extra layer of security by requiring a secondary verification method, such as a code sent to your phone or biometric authentication. This ensures that even if your password is compromised, unauthorized access remains highly unlikely.5. Keep your devices and software up to date:By regularly installing thelatest updates and security patches, you can ensure your devices are equipped with the latest security features and bug fixes, reducing the risk of becoming a target for cyberattacks. Many cyberattacks exploit unpatched vulnerabilities, so enabling automatic updates for your operating system, apps and antivirus software can significantly reduce your risk.GET FOX BUSINESS ON THE GO BY CLICKING HERE6. Invest in personal data removal services: Consider using a service that specializes in removing your personal information from the internet to reduce your exposure to potential scammers. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.7. Monitor financial accounts: Regularly check your bank and credit card statements for any unusual or unauthorized transactions. Promptly report any suspicious activity.8. Be skeptical of unsolicited requests: Treat unexpected requests for money or personal information with caution. Scammers often create a sense of urgency to pressure you into acting quickly.9. Be vigilant against phishing attempts and use strong antivirus software:Avoid clicking on links or downloading attachments from unsolicited emails or messages. Ensure your devices are protected with strong antivirus software that can detect and block malicious activities. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.10. Report Suspected Scams: If you suspect you've encountered a scam, report it to your local authorities, the Federal Trade Commission (FTC), and any relevant financial institutions.Kurts key takeawaysThe rise of cyberscams is not just an economic issue but a moral one that demands immediate action. With billions lost annually and countless lives disrupted, we cannot afford complacency in addressing this crisis. By learning from global best practices and fostering international collaboration, we can begin to dismantle these criminal networks. Be sure to follow the steps I outlined to keep yourself safe.CLICK HERE TO GET THE FOX NEWS APPWhat do you think should be done to tackle cyberscams more effectively? Should governments focus on stricter regulations or public education campaigns? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·85 Views
-
Fox News AI Newsletter: Trump's Stargate ambitionswww.foxnews.comRecommended By Fox News Staff Fox News Published February 15, 2025 8:30am EST close Trump announces US artificial infrastructure project Stargate President Trump announces the U.S. Stargate investment alongside three artificial intelligence industry leaders. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:Massive AI Stargate Project under Trump admin reveals next stepsElon Musk says he'll drop $97B OpenAI purchase offer if ChatGPT maker stays a nonprofitThe Simpsons star fears AI could rip off his work, but says theres one thing it cannot recreateBREAKING GROUND: Stargate, the massive artificial intelligence (AI) infrastructure project recently unveiled by President Donald Trump, has begun production in Texas with data center construction in other states expected to be announced in the coming months. ON ONE CONDITION: Elon Musk will withdraw his unsolicited bid of $97.4 billion to take over OpenAI if its board of directors stops the companys conversion into a for-profit entity. Elon Musk. (Anna Moneymaker/Getty Images)EXISTENTIAL THREAT: OPINION: Our socioeconomic system is facing an existential threat from AI. In our capitalist society, most people depend on jobs to sustain themselves. The U.S. government, in turn, relies heavily on taxing the income of individual workers for revenue.UNCHARTED TERRITORY: OpenAI CEO Sam Altman commended Vice President JD Vance's artificial intelligence (AI) speech in Paris on Tuesday while laying out his vision for how people can take advantage of the rapidly evolving technology at the same conference. INHUMAN CARTOON: "The Simpsons" star Hank Azaria has voiced his fears over artificial intelligence in a new opinion piece.AI ROMANCE SCAMS: "Love is blind" takes on a more sinister meaning when so-called artificial intelligence (AI) becomes a tool for exploiting our deepest human emotions.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.0 Comments ·0 Shares ·101 Views
-
Hop in, no driver needed for this future ride-hailing robotaxiwww.foxnews.comJoin Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. Automaker Zeekr and autonomous driving technology company Waymo have joined forces to create a groundbreaking autonomous vehicle designed specifically for ride-hailing services.The result of this collaboration is the Zeekr RT, the world's first mass-produced, purpose-built autonomous vehicle, which is now ready for delivery to Waymo for robotaxi testing.This partnership combines Zeekr's expertise in electric vehicle manufacturing with Waymo's advanced self-driving technology.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Exterior of the Zeekr RT. (Zeekr)The tech behind the Zeekr RTThe Zeekr RT is equipped with an impressive array of 13 cameras, four lidar units, six radar sensors and external audio receivers, ensuring a 360-degree view of its surroundings. To maintain optimal performance in various weather conditions, the Zeekr RT features a specially designed system to keep its sensors clean. This custom-designed sensor-cleaning system includes tiny wipers and spray nozzles for windshield wiper fluid, specifically created by Waymo, to ensure clear visibility for the cameras and lidar sensors.The robotaxi's advanced sensor suite provides overlapping fields of view all around the vehicle, functioning effectively both day and night.At the heart of the Zeekr RT's autonomous capabilities is Nvidia's Drive AGX Thor system-on-a-chip, making Zeekr the first automaker in the world to integrate this cutting-edge autonomous driving chipset. This powerful AI platform is capable of up to 2,500 teraflops of performance, unifying various intelligent functions such as automated driving, parking, occupant monitoring and infotainment into a single architecture. Exterior of the Zeekr RT. (Zeekr)Comfort meets innovationInside, passengers will find a spacious cabin with a fully configurable interior, which can be tailored to meet the specific requirements of Waymo's ride-hailing service. The Zeekr RT is built on Zeekr's Sustainable Experience Architecture (SEA) platform and features an 800V ultra-fast charging e-powertrain, showcasing the latest advancements in electric vehicle technology.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Interior of the Zeekr RT. (Zeekr)From drawing board to realityThe journey from concept to production has been swift and impressive. The Zeekr RT was designed and developed at Zeekr's R&D facility, CEVT (China Europe Vehicle Technology Centre) in Gothenburg, Sweden. Waymo has been testing prototype versions of the Zeekr RT on public roads in San Francisco and Phoenix, with human safety drivers at the helm. Mass production of the Zeekr RT is set to begin later this year, with initial deliveries to Waymo for further testing and validation.GET FOX BUSINESS ON THE GO BY CLICKING HERE Exterior of the Zeekr RT. (Zeekr)The road aheadAs Waymo prepares to integrate the Zeekr RT into its commercial fleet, the future of autonomous ride-hailing services looks promising. Waymo plans to deploy these vehicles in its Waymo One service, which currently operates in select cities like Phoenix and San Francisco. After thorough testing, Waymo aims to operate these vehicles in fully driverless mode, marking a significant milestone in autonomous transportation. The introduction of a cost-effective and passenger-friendly vehicle could give Waymo a competitive edge in the growing robotaxi market.Kurt's key takeawaysThe Zeekr RT is a pretty big deal in the world of self-driving cars. It's cool to see car companies and tech firms teaming up like this. As these robotaxis hit the streets for testing, we're getting a sneak peek at what city travel might look like in the near future. Sure, there are still some bumps in the road ahead, but the Zeekr RT is definitely pushing us closer to a world where calling a self-driving cab is as normal as ordering a pizza.CLICK HERE TO GET THE FOX NEWS APPWould you feel comfortable taking a ride in a driverless robotaxi?Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved.0 Comments ·0 Shares ·93 Views
-
China launches center to train 100-plus humanoid robots simultaneouslywww.foxnews.comTech China launches center to train 100-plus humanoid robots simultaneously Training its future workforce, one robot at a time Published February 14, 2025 6:00am EST close China's first humanoid robot training ground is building workforce of tomorrow Center showcases China's commitment to becoming a global leader in robotics and AI. Shanghai has officially unveiled its first heterogeneous humanoid robot training center, marking a significant accomplishment in China's robotics development.The Humanoid Robot Kylin Training Ground represents an important step in the country's technological advancement, showcasing China's commitment to becoming a global leader in robotics and artificial intelligence. Humanoid robots being trained (Humanoid Robot Kylin Training Ground)State-of-the-art center pushes boundaries of robotic trainingThe National and Local Co-Built Humanoid Robotics Innovation Center has launched a groundbreaking training facility that is revolutionizing the field of robotics. This cutting-edge complex, spanning over 53,800 square feet, is currently capable of training more than 100 humanoid robots at once. The facility features an impressive array of over a dozen specialized training scenarios, including welding, manufacturing and automotive testing.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOWThese advanced robots have showcased exceptional proficiency, with an average success rate exceeding 90% in various tasks. Their capabilities range from organizing desks and sorting items to operating complex equipment, demonstrating the potential for widespread application across multiple industries. This remarkable achievement underscores the rapid progress being made in the field of humanoid robotics and highlights China's growing prominence in artificial intelligence and automation technologies.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Humanoid robots being trained (Humanoid Robot Kylin Training Ground)How the facility is helping China tackle tech challenges and aging populationThe training facility aligns with China's broader strategy to address multiple challenges, including global tech competition and the complexities of an aging society. By 2027, the center aims to train 1,000 general-purpose robots simultaneously, with plans to collect 10 million high-quality physical data entries through collaborations with local robot manufacturers. Humanoid robots being trained (ShanghaiEye)China's next-gen robot ready to slither into the futureThe center is preparing to introduce the 2.0 version of its humanoid robot, "Deep Snake," which will showcase advanced technologies like linear joint actuators. This means the robot will have smoother, more precise movements. Linear joint actuators are like advanced motors that allow the robot's joints to move in a straight line, giving it more fluid and controlled motions. It's a big step forward in making robots that can perform a wider range of tasks with greater accuracy and efficiency. These innovations are expected to enhance the versatility and performance of humanoid robots, further solidifying China's leadership in the robotics industry.GET FOX BUSINESS ON THE GO BY CLICKING HERE Humanoid robot being trained (ShanghaiEye)The potential and economic impact of the humanoid robot marketThe Chinese humanoid robot market is experiencing explosive growth, showcasing the country's rapid advancement in this cutting-edge technology sector. In 2024, the market was valued at $379 million, demonstrating significant initial traction. Looking ahead, projections indicate a remarkable expansion to approximately $2.3 billion by 2025, based on current exchange rates. Even more impressive is the anticipated growth to about $11.8 billion by 2030, highlighting the immense potential of this industry. The development extends beyond industrial applications, with plans for the first World Humanoid Robot Sports Games and even a marathon-running robot named "Tiangong" set to compete in April. Humanoid robots being trained (ShanghaiEye)Kurt's key takeawaysChina's investment in the Humanoid Robot Kylin Training Ground is a strategic move to reshape industrial capabilities, address societal challenges and position the country at the forefront of global innovation. As the technology continues to evolve, the world will be watching closely to see how these advanced robots will transform various sectors and potentially redefine human-machine interaction.CLICK HERE TO GET THE FOX NEWS APPDo you think humanoid robots are the solution to tomorrow's workforce challenges or the beginning of a technological transformation where humans are replaced? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·85 Views
-
Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attackwww.foxnews.comPublished February 13, 2025 10:00am EST close Hiding the apps on your Android can protect your privacy Kurt 'CyberGuy' Knutsson walks you through the process. Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong.While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device.The issue also affects those downloading apps from the Google Play Store.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS SIGN UP FOR KURTS THE CYBERGUY REPORT NOW A person holding an iPhone. (Kurt "CyberGuy" Knutsson)How the malware works and what makes it differentAccording toresearchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Googles security checks.One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.The infection vectors vary between Apple and Googles ecosystems. On iOS, the malware is often embedded within apps that initially pass Apples rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers. Messaging app in the App Store designed to lure victims. What's being stolen, and who's responsible?The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malwares purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.We reached out to Apple for a comment but did not hear back before our deadline. Messaging app in the App Store designed to lure victims. (Kaspersky)Apple's response to screenshot-scanning malware discovered in App StoreApple has removed the 11 iOS apps mentioned in Kaspersky's report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple's policies, resulting in the termination of their developer accounts.Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API which allows apps to request access to a users Photos library added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library.The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?What Google is doing to stop malwareA Google spokesperson tells CyberGuy:"All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware byGoogle Play Protect, which is on by default on Android devices with Google Play Services."However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all known malware from Android devices. Heres why:What Google Play Protect can do:Scans apps from the Google Play Store for known threats.Warns you if an app behaves suspiciously.Detects apps from unverified sources (sideloaded APKs).Can disable or remove harmful apps.What Google Play Protect cant do:It does not provide real-time protection against advanced threats like spyware, ransomware or phishing attacks.It does not scan files, downloads or links outside of Play Store apps.It may miss malware from third-party app stores or sideloaded apps.It lacks features like VPN protection, anti-theft tools and privacy monitoring. Image of a person typing in their password on screen. (Kurt "CyberGuy" Knutsson)5 ways users can protect themselves from such malware1. Use strong antivirus software:Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Stick to trusted developers and well-known apps:Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Review app permissions carefully:Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on youriPhone andAndroid.4. Keep your device and apps updated:Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Alwayskeep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.5. Be wary of apps that promise too much:Many malware-infected apps lure users by offering features that seem too good to be true such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an apps claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, its best to avoid it. Stick to apps with a transparent development team and verifiable functionalities.Kurts key takeawayThe new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.CLICK HERE TO GET THE FOX NEWS APPDo you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·74 Views
-
$750,000 apocalypse SUV comes with its own gas maskwww.foxnews.comRecommended Published February 13, 2025 6:00am EST close $750,000 apocalypse SUV comes with its own gas mask Vehicle's designer is known for his work in video game vehicle design. Rezvani Motors, an innovative American automotive manufacturer, has redefined the luxury SUV market with its extraordinary Vengeance.This vehicle represents a groundbreaking fusion of military-inspired design and high-end luxury transportation.Designed by digital artist Milen Ivanov, known for his work in video game vehicle design, the Vengeance breaks conventional automotive boundaries with its aggressive styling and comprehensive security features.GET EXPERT SECURITY ALERTS, MUST-KNOW TECH TIPS, AND THE LATEST DIGITAL TRENDS STRAIGHT TO YOUR INBOX.SIGN UP FOR KURTS THE CYBERGUY REPORT NOW Military-inspired Vengeance SUV. (Rezvani Motors)Impressive specificationsThe Vengeance represents a unique fusion of a luxury SUV and military-grade transportation. This remarkable machine is built on GM's T1 platform, sharing fundamental architecture with the Cadillac Escalade. It measures an imposing 18 feet long and weighs approximately 6,200 pounds. Potential owners can choose between two powerful engine configurations.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The gasoline variant delivers 420 horsepower from a 6.2L V8 engine. The diesel option provides a robust 277 horsepower through a Duramax 3.0L Turbo-Diesel engine. Standard amenities include a sophisticated 19-speaker audio system. The vehicle offers tri-zone climate control for maximum passenger comfort. NFC phone pairing comes standard in the base model. Magnetic ride control ensures a smooth driving experience across various terrains. Interior of military-inspired Vengeance SUV. (Rezvani Motors)Military-grade protectionThe Vengeance offers an unprecedented level of personal security through its comprehensive Military Package. Bulletproof glass and B6-rated armor provide significant protection against potential threats. Two military-grade gas masks are included to protect against chemical warfare, tear gas and other potential airborne threats.The package also provides two bulletproof vests designed to meet professional security standards. A matching bulletproof helmet accompanies the protective gear, ensuring complete personal safety. Rezvani further enhances the package with a professional-grade first aid kit and a specialized hypothermia prevention kit. Optional features include smoke screens, thermal night-vision and electromagnetic pulse protection. Buyers can even add pepper spray dispensers and electrified door handles. Gas masks inside military inspired Vengeance SUV. (Rezvani Motors)Target marketThe Vengeance targets ultra-high-net-worth individuals and those requiring exceptional personal security. Diplomats in volatile regions might find particular value in its defensive capabilities. Celebrities seeking maximum protection will appreciate its comprehensive security features.GET FOX BUSINESS ON THE GO BY CLICKING HERE Exterior of military inspired Vengeance SUV. (Rezvani Motors)Pricing and positioningThe base model starts at $285,000, with fully equipped versions approaching $750,000. This pricing positions the Vengeance as an exclusive statement of luxury and preparedness. The vehicle represents more than transportation; it's a comprehensive personal security solution. Military-inspired Vengeance SUV. (Rezvani Motors)Kurts key takeawaysThe Rezvani Vengeance transcends traditional automotive boundaries. It combines luxury, performance and unparalleled security in a single extraordinary package. While most buyers may never utilize its full defensive capabilities, the Vengeance remains an impressive technological vehicle that will definitely have you ready for just about anything.If money were no object, would you spend $750,000 on a vehicle like this to be prepared for the worst? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·70 Views
-
Tech security 101: How to spot a hidden tracker on your carwww.foxnews.comclose Trump says DeepSeek AI is a wake-up call for US tech industry Fox News correspondent Christina Coleman reports on the impact of DeepSeek AI on U.S. tech stocks and reactions to the innovation on Fox News @ Night. The latest stats say 80% of stalking victims are tracked using tech. One of the most popular ways to do it? GPS trackers, like an AirTag. Theyre small enough to slip into a bag, pocket or your car undetected."Kim, this doesnt impact me." I wish that was true. Maybe you have an ex or friend who wont buzz off, or maybe you met a stranger at a bar or store who was acting creepy. Youre at risk. Did you drive across the U.S. border? Yep, crooks are targeting tourists, too.Win an iPhone 16 Pro with Apple Intelligence ($999 value).No purchase necessary.Enter to win now!The good news is your phone can alert you when an unknown tracker is with you. If all else fails, good old-fashioned sleuthing works, too. Ill show you how.THE BIGGEST WI-FI MISTAKE YOU DIDNT KNOW YOU WERE MAKINGThe clock is tickingAn AirTag starts beeping only after 24 hours away from its owner. That gives the stalker plenty of time to reach you, especially if theyre local. If a carjacker tags your ride, they could learn your routine and follow you home before you even know whats going on.The rumor mill says Apples AirTags 2, coming later this year, will have antistalking tech. With the most current AirTags, tech-savvy stalkers can rip out the built-in speaker so you wont get alert, but the new ones should make it harder.For now, you need to do everything you can to stay safe. Apple AirTags, don't come with antistalking tech quite yet. Other GPS trackers come with similar issues. Read more to see what you can do to protect yourself. (Melina Mara/The Washington Post via Getty Images)RELATED: AirTags arent just for creeps.I always toss one in my luggage.On your iPhone, make sure a few settings are enabled:Open Settings> Privacy & Security > Location Services. From there, toggle on Location Services and Find My iPhone. Then, head to System Services and turn on Significant Locations.Next, go to Settings > Bluetooth and toggle on Bluetooth.Go to Settings > Notifications > Tracking Notifications and toggle on Allow Notifications.Now, open your Find My app and tap Items at the bottom of the screen. Tap on Identify Found Item.On Android, the process is similar as long as your phone is running Android 6.0 or newer. If its not, you really need a new phone!Open Settings > Location and toggle on Use location, Wi-Fi scanning or Bluetooth scanning.Turn on Bluetooth by going to Settings > Bluetooth and toggling on Bluetooth.To make sure alerts are enabled, go to Settings > Safety & Emergency > Find Unknown Tracker Alerts. Toggle on Allow Alerts.The alerts arent foolproofIts not just ripping out the speakers. Older tracking devices might not set off an alert, and savvy creeps can reconfigure new trackers to follow you undetected for months. Bad actors can easily use GPS trackers against you. Here's how to check for these unwanted devices' presence in your car and get rid of any you find. (iStock)Thats why its important to check your car now and then, even if you dont hear that telltale beep. First, grab a flashlight and a mirror.Start outside your car. Check spots where the tracker could be magnetically attached, like the wheel wells; grill; underside; bumpers; around the exhaust pipe, roof or hood; and the engine and battery terminals.Inside your car, check the seat crevices and pockets, dashboard, steering wheel, glove compartment, and trunk. Look under the spare tire and dashboard on the drivers side, too, inside the onboard diagnostics port.If you dont find anything but still feel uneasy, try a bug detector.This well-rated option ($37) works for cars, homes, bags or whatever.Small hidden cameras are popular with creeps now, too.Heres my guide on spotting cameras in a rental, dressing room, private space at the gym or anywhere else you expect privacy.IM A TECH EXPERT: 10 AI PROMPTS YOULL USE ALL THE TIMEI found a tracker. What now?Dont smash it or disable it. You want to give the police all the info they need to catch whoever planted it.First, hold your iPhone or NFC device to the white side of the AirTag. Tap that notification that pops up to see info about its owner. Jot down the serial number and phone number so you can share them with the cops. Resist the temptation to destroy unwanted trackers if you find them police need them to get valuable information on your stalker. (James D. Morgan/Getty Images)Now, make an aluminum foil envelope. Wrap the tracker inside, making sure there are no gaps or holes. This will block any signals, so the person who installed it will just think its out of range. Take the foil-wrapped tracker to a police station. Theyll know how to pin down who put it there.Are you being stalked or just paranoid? Its a fine line.Read this if you cant shake that "someones watching" feeling.Ive heard too many stories from stalking victims. I dont want you or a loved one to be another. Share this with folks in your life.CLICK HERE TO GET THE FOX NEWS APPGet tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours or get the free podcast.Daily newsletter:Join 650,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "Kim Komando Today" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.0 Comments ·0 Shares ·106 Views
-
Fox News AI Newsletter: VP calls for ideology-free AIwww.foxnews.comRecommended By Fox News Staff Fox News Published February 12, 2025 11:47am EST close Gladstone AI CEOs outline how artificial intelligence will become critical to national security Gladstone A.I. co-founders and CEOs Edouard Harris and Jeremie Harris explain the major role that A.I will play in national security and warfare on The Will Cain Show. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Vance tells world leaders AI must be 'free from ideological bias,' American tech won't be censorship tool- Altman says Musk 'trying to slow us down,' OpenAI not for sale- Top translation apps for travelers Vice President JD Vance will attend an AI summit in Paris, France, a French official said anonymously. (AP Photo/Alex Brandon)FREE FROM BIAS: Vice PresidentJDVancetold world leaders in Paris on Tuesday that the United States intends to remain the dominant force in artificial intelligence and warned that the European Union's far tougher regulatory approach to the technology could cripple it.'TRYING TO SLOW US DOWN': OpenAI CEO Sam Altman said Elon Musk is "probably just trying to slow us down" with his bid to purchase the company, insisting on Tuesday that it is not for sale.'MASS SURVEILLANCE': OpenAI CEO Sam Altman predicts that artificial general intelligence will lead to lower costs for many goods, but has also warned that AI could be leveraged by authoritarian governments aiming to control people. A man using a translation app on his cellphone (Kurt "CyberGuy" Knutsson)TRANSLATED TRUTH: Whether you have an iPhone or an Android, these apps have got you covered with features like live speech translation, text input and even AI-powered sign and menu translation.CONDOLEEZZA RICE, AMY ZEGART: DeepSeeks new AI model is causing deep consternation from Silicon Valley to Washington. Few would have predicted that a little-known Chinese startup with a couple of hundred homegrown engineers would be able to release a frontier AI model rivaling the capabilities of Americas best and biggest tech companies reportedly at a fraction of the cost and computational power.SPEEDY ROBOT DOG: A Chinese team has unveiled a groundbreaking quadruped robot that is pushing the boundaries of robotics and speed. Black Panther 2.0 (Mirror Me)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.0 Comments ·0 Shares ·86 Views
-
How to not fall in love with AI-powered romance scammerswww.foxnews.comPublished February 12, 2025 10:00am EST close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt "CyberGuy" Knutsson joins "Fox & Friends" to warn of new cyberscams and offer tips on how to avoid them. "Love is blind" takes on a more sinister meaning when so-called artificial intelligence (AI) becomes a tool for exploiting our deepest human emotions.Convincing AI technologies are increasingly targeting mature online daters, turning fantasies into lucrative and dangerous criminal enterprises. Illustration of a romance scam (Kurt "CyberGuy" Knutsson)AI is helping criminals create convincing personasRomance scams have become the most common type of fraud in 2025 and have swindled would-be lovers out of over $1.3 billion in the United States alone. Just last year, the world heard the cautionary tale of a 53-year-old French woman who lost $850,000 to a convincing AI deepfake of Brad Pitt.The scammers had wooed her for over 8 months with realistic (yet fake) images, voice calls, videos and even multiple social media accounts. Similarly, a 67-year-old from San Diego was tricked out of her life savings when an AI impostor gang posed as Keanu Reeves, also raising awareness about romance scams impacting the elderly. The worst side of both stories is that the fraudsters havent been caught, and the victims financial institutions did little to help them recover their funds. Illustration of a romance scam (Kurt "CyberGuy" Knutsson)Can you really blame the victims for 'falling for it'?AI-powered romance scams have become far more sophisticated than "traditional" scams. Criminals use a variety of AI tools together with advanced tactics to create deeply personalized and remarkably realistic digital identities. Unlike traditional scams relying on generic scripts, these AI-powered approaches can generate nuanced, contextually appropriate conversations that adapt in real time to victims' emotional state and personal background. In short, romance scams have become so dangerous because they use multiple advanced methods.They use your personal datato identify psychological vulnerabilities through conversational analysis. They might know your friends names, your job, interests or personal details.They deploy targeted emotional manipulation techniques that are unique to each person they target.They create dynamic, seemingly personal storylines that incrementally build trust and "remember" details about conversations.AI-driven romance conversations are increasingly challenging for both victims and traditional anti-fraud mechanisms to detect. Spotting and preventing these scams can be tricky, but privacy experts recommend some tried-and-true ways. Illustration of a romance scam (Kurt "CyberGuy" Knutsson)Here's how you can spot the red flags of a romance scamSpotting and preventing these sophisticated AI-driven scams can be tricky, but staying informed can help you avoid becoming a victim. By being vigilant, verifying identities and recognizing red flags, you can navigate online dating safely while protecting your finances and personal information. Here are some things to look out for:Too much love. They "love-bomb" too early in conversationsTheyre too perfect or too tailored to you in their background, job history or personal details. Fraudsters often present the perfect picture of what you want and avoid disagreeing with youThey avoid in-person meetings and/or have convincing excuses for why they cant meet or have a video callThey lack real reactions. While AI-powered deepfakes are convincing, they still struggle to react naturally to more human interactions: jokes, surprises, exclamations, throat-clearing, coughing, etc.Demanding money early, especially for family emergencies, medical events or business ideas. Never send money transfers, gift cards or financial information to someone you have not met in person Illustration of a romance scam (Kurt "CyberGuy" Knutsson)What to do if you think it might be a scamAsk a friend or family member:Getting an outside perspective can help you see warning signs you might have overlookedReport the profile or scammer:Online dating apps and social media have built-in reporting features to warn against fraud. If the account disappears soon after your report, its likely that the account was fake. If you think you're a victim of scamming, go to the Federal Trade Commission's (FTC) websitehere and report the scammer. The steps for reporting a scam are pretty straightforward, and the FTC will immediately send out alerts to law enforcement to help with investigating the scammers. You can also contact theBetter Business Bureau and file a report with them 24/7Contact your bank: If you sent money to the scammer and want to get it back, you should immediately contact your bank or credit/debit card company and report it as fraud. The representatives will then walk you through the steps to get your money reimbursedWHAT IS ARTIFICIAL INTELLIGENCE (AI)?Contact the gift card company: If you sent a gift card to the scammer, make sure you keep the receipt and report the scam to the gift card company. The representatives there may be able to help you, and it will also help them be aware of scammers using their gift cards for fraudVisit IdentityTheft.gov: If you gave out personal information like a Social Security number, follow the steps atIdentityTheft.gov. You'll be able to make a report there, and the website will help you create a recovery plan and walk you through each step of gaining your identity backUse Identity theft protection: If you want a service that will walk you through every step of the reporting and recovery process, one of the best things you can do to protect yourself from this type of fraud is to subscribe to an identity theft service. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of identity theft protection services, is that they have identity theft insurance ofup to $1 million to cover losses and legal feesand a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses.See my tips and best picks on how to protect yourself from identity theftHave strongantivirus software on all your devices: This story is also another reminder to always have good antivirus software running on your devices, as romance scams can also entail email and text communications asking the victim to click a link. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices Kurt "CyberGuy" Knutsson offers his advice to avoid romance scams. (Kurt "CyberGuy" Knutsson)Make it difficult for a romance scammer to target youYour personal information is a scammers best tool. This includes your phone number, email and other contact details that allow them to reach you, as well as information like the celebrities you follow, your family members and even the type of content you engage with online to tailor the perfect attack. As scams become more sophisticated and reliant on loads of data, its more important than ever to take proactive measures to safeguard your personal information.1. Vigilance in online dating: In the digital world, not everyone is who they claim to be. Be wary of potential romantic interests who ask for money or gifts or those who want to move the relationship along too quickly. Keep your personal and financial information private and never share it with someone you haven't met in person.GET FOX BUSINESS ON THE GO BY CLICKING HERE2. Verify the identity: Request additional information or proof to verify their identity, such as video chatting or meeting in person if possible. Exercise caution before getting emotionally invested in someone you haven't met in real life.3. Research and verify: Conduct an online search using the person's name, email address or phone number to see if any suspicious or fraudulent activities are associated with them.Reverse image search their profile pictures to check if they are stolen from elsewhere on the internet. You can also reverse-search their phone number for free by following the instructions foundhere.4. Privacy settings: Keep your social media profiles private so only those you trust can see whats going on in your life.5. Limit sharing: Adjust the privacy settings on all of your online accounts and apps to limit data collection and sharing.6. Use reputable dating platforms: Stick to well-known and reputable dating websites or apps with security measures to help protect their users from scams. These platforms often have guidelines for safe online dating and report suspicious users.7. Invest in personal information removal services:I highly recommend you remove your personal information that can be found on various people search sites across the web. If you give someone your email address or phone number, they could potentially reverse-search your information and get your home address.Check out my top picks for data removal services here.Kurt's key takeawaysAI-powered romance scams have become a serious threat, exploiting our deepest emotions for financial gain. As you navigate the digital dating landscape, it's crucial to stay vigilant and protect yourself from these sophisticated schemes. Remember, if something seems too good to be true, it probably is. Trust your instincts, take things slow and always prioritize your safety and financial well-being.CLICK HERE TO GET THE FOX NEWS APPHow has the rise of AI-powered romance scams changed your approach to online dating or your views on digital relationships?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·96 Views
-
How to delete multiple text messages on a Mac and iPadwww.foxnews.comPublished February 12, 2025 6:00am EST close How to delete multiple text messages on a Mac and iPad Apple provides ways to manage your messages more efficiently. Are you overwhelmed by the sheer volume of text messages cluttering your Mac or iPad? You're not alone.Many users find themselves endlessly scrolling through conversations, searching for important information or simply trying to declutter their digital space.Fortunately, Apple has provided ways to manage your messages more efficiently. Let's dive into how you can delete multiple messages on both your Mac and iPad, helping you regain control of your messaging app.Here are steps to bulk delete text messages on aniPhone or anAndroid. Mac and iPad (Kurt "CyberGuy" Knutsson)Deleting entire conversations from various people on a MacIf you're using a Mac, follow these steps to delete multiple messages at once:Launch theMessages app on your Mac Steps to delete entire conversations on a Mac (Kurt "CyberGuy" Knutsson)Hold down theCommand (Cmd) key and click oneach text message you want to remove. This allows you to select multiple messages simultaneouslyOnce you've selected all the desired messages, clickConversation in the upper leftScroll down and clickDelete Conversations Steps to delete entire conversations on a Mac (Kurt "CyberGuy" Knutsson)If prompted, confirm the deletion by clickingDelete Steps to delete entire conversations on a Mac (Kurt "CyberGuy" Knutsson)Deleting multiple text messages within a conversation on a MacIf you're using a Mac, follow these steps to delete multiple messages within a conversation at once:Launch theMessages app on your Mac Steps to delete multiple text messages within a conversation on a Mac (Kurt "CyberGuy" Knutsson)Open theconversation containing the messages you want to deleteHold down the Command (Cmd) key and click on each message you want to remove. The messages will turn adark gray color. This allows you to select multiple messages simultaneouslyOnce you've selected all the desired messages, press theDelete key on your keyboard Steps to delete multiple text messages within a conversation on a Mac (Kurt "CyberGuy" Knutsson)If prompted, confirm the deletion by clickingDelete Steps to delete multiple text messages within a conversation on a Mac (Kurt "CyberGuy" Knutsson)This method is particularly useful when you need to remove several messages from a lengthy conversation without deleting the entire thread.Deleting entire conversations from various people on iPadOpen theMessages app on your iPad Steps to delete entire conversations from various people on iPad (Kurt "CyberGuy" Knutsson)In themain conversation list, find theconversations you want to deleteTap Edit in the top-left cornerWHAT IS ARTIFICIAL INTELLIGENCE (AI)? Steps to delete entire conversations from various people on iPad (Kurt "CyberGuy" Knutsson)Click Select Messages Steps to delete entire conversations from various people on iPad (Kurt "CyberGuy" Knutsson)Tap the checkbox next to each conversation you want to deleteTap theDelete button in the bottom-right corner Steps to delete entire conversations from various people on iPad (Kurt "CyberGuy" Knutsson)Confirm the deletion when prompted by clicking Delete Steps to delete entire conversations from various people on iPad (Kurt "CyberGuy" Knutsson)Deleting multiple messages within a conversation on an iPadOpen theMessages app on your iPadTap theconversation containing the messages you want to deleteTouch and hold amessage bubble until the context menu appearsTapMore... from the menuSelect multiple messages by tapping the checkboxes next to each message bubbleTap theTrash icon (bottom-left corner) after selecting your messagesConfirm the deletion when promptedHow to set up automatic message deletion on a MacTo prevent future clutter, consider setting up automatic message deletion:On your Mac, openMessagesGo to MessagesClick SettingsTapGeneralClick theKeep messages pop-up menu and choose a time frame (30 days or one year)GET FOX BUSINESS ON THE GO BY CLICKING HERE Steps to set up automatic message deletion on a Mac (Kurt "CyberGuy" Knutsson)This setting will automatically remove older messages, keeping your conversations manageable.Note: Deleting messages from your Mac does not delete them from other Apple devices unless you have Messages in iCloud enabled. To check if Messages in iCloud is enabled on your Mac:Go to MessagesClick Settings (or Preferences)Tap iMessage and see if Messages in iCloud is enabledKurt's key takeawaysManaging message clutter can feel like a never-ending battle. While these tips won't magically solve all your digital chaos, they'll definitely help you take back control of your Messages app. A little effort now means less scrolling and more breathing room later. And hey, who doesn't love a clean, organized digital space that doesn't make you want to pull your hair out? Just remember, your messages are meant to connect you, not stress you out.CLICK HERE TO GET THE FOX NEWS APPTell us the most frustrating digital communication challenge you have and how we might be able to help. Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·82 Views
-
Reset what you see on social mediawww.foxnews.comclose Moms for Liberty co-founder voices concern over Kids Off Social Media Act Moms for Liberty co-founder Tiffany Justice explained her concerns over the Kids Off Social Media Act, namely that it does not apply to YouTube Kids. You went down a rabbit hole and now gardening (or hot rod or political) posts are all you see online. Algorithms are smart, but they dont know when youre ready to get back to your regularly scheduled programming.Its time to reset your feed and take control of what you see.Win an iPhone 16 Pro with Apple Intelligence ($999 value).No purchase necessary.Enter to win now!5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTERStart with FacebookGoodbye, annoying ads. It only takes a minute to kick out the things you no longer want to see.The fix:Filter your advertising topics by going to Settings & Privacy> Settings> Account Center> Ad Preferences> Customize ads.Random Facebook requests can end badly.This one lost a widow $40K. The Facebook logo is pictured at the Facebook headquarters in Menlo Park, California. (Reuters)Now, on to YouTubeSay your family is staying with you for the holidays and your niece is watching cartoons on your YouTube account all day long. Now thats all YouTube recommends. Delete your search history to get things back to normal.The fix:On the YouTube app, tap You to bring up your History. Tap the cog icon > Settings > Manage All History. At the bottom, youll see DELETEwith a blue down arrow. Tap from the dropdown menu to delete videos from today, a custom range or all time. Click X to remove items individually, if you prefer.10 TECH UPGRADES TO SAVE YOUR TIME, PRIVACY AND MONEY THIS YEARGoing forward, turn off your viewing history any time you dont want those vids in your algorithm. You can set your video and search histories to autodelete, too. Now your YouTube is back to how you like it, with my videopodcast at the very top. Youll love it!TikTok tracks your habitsTikToks algorithm is built to keep you on the app. Every time you like, follow or comment on something, it tells the algorithm youre interested in a video, and more videos like it will pop up on your For You page. Disliking a video or writing a nasty comment doesnt matter, by the way; you still kept watching. TikTok is pictured on a smartphone. (iStock)The fix:Reset your feed. Open your Profile in the bottom right corner then press the three linesat the top right > Settings and Privacy> Content Preferences> Refresh Your For You Feed> Continue.Fine-tune InstagramWatch Instagram Reels instead? Theres no way to reset them, but you can nudge the algorithm in the right direction.The fix:Tap the three dots in the upper right corner. From here, you can adjust:Posts:Select Hide to move them to the bottom of your feed.Stories: Tap Muteso youll no longer see them.Accounts:Choose either Restrict, which limits if an account can interact with you, or Block.IM A TECH EXPERT: 10 AI PROMPTS YOULL USE ALL THE TIMEHeres the giveaway that an email from Instagram about your security is fake.Most apps have this optionOn just about every social platform, you can hide or see less of certain things. The more you take this action, the more you steer the algorithm.The fix: Next to a post, video or anything else, look for the three-dot or three-line menu that opens more options. On YouTube, for example, tap the three dots next to a video and choose Dont recommend channel or Not interested. In this photo illustration, a YouTube logo is seen displayed on a smartphone. (Mateusz Slodkowski/SOPA Images/LightRocket via Getty Images)Feeling inspired to clean more of your digital traces? Wipe your browser history while youre at it.Heres how.Final piece of adviceYour social media feed is carefully curated based on who you follow, who follows you and, most importantly, what you do online. Sure, you can reset your algorithm, but dont be fooled. Every post you linger on, like, comment on or share gets tracked and used to shape what you see next. Even just scrolling tells the platform what grabs your attention.Before your next deep dive, remember: Big Tech is always watching, and your every move fine-tunes what pops up next.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours or get the free podcast.Daily newsletter:Join 650,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "Kim Komando Today" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.0 Comments ·0 Shares ·107 Views
-
Don't fall for that sneaky iCloud storage alert in your inboxwww.foxnews.comPublished February 11, 2025 10:00am EST close 'CyberGuy': Don't fall for that sneaky iCloud storage alert in your inbox Beware of iCloud scams using urgent messages. Tech expert Kurt Knutsson helps you spot the red flags to protect yourself. iCloud scams are becoming increasingly sophisticated, targeting unsuspecting users with urgent messages about their accounts. Our team recently received two suspicious iCloud emails. We want to share our experience and provide comprehensive steps on how to identify and protect yourself from these scams. iCloud email scam (Kurt "CyberGuy" Knutsson)The anatomy of iCloud scamsiCloud scams typically follow a pattern designed to create a sense of urgency and fear. Let's break down the two emails our team received below. Here is the urgent wording that the scammers used, "Payment Failure for iCloud Storage Renewal" and "iCloud Suspended. Fix it before Mon, 13 January 2025." Both emails share common characteristics of phishing attempts, including urgent language, threats of account suspension or data loss, requests to update payment information, links to external websites and vague or incorrect account details. These emails are crafted to look legitimate, often mimicking Apple's branding and tone. However, they contain several red flags that indicate they are scams. iCloud email scam (Kurt "CyberGuy" Knutsson)How to identify iCloud scamsTo protect yourself from falling victim to these scams, look out for these telltale signs:Check the sender's email address: Legitimate Apple emails will always come from "@apple.com" or "@icloud.com" domains. The scam email address is not even close to that. iCloud email scam showing the senders bogus email address (Kurt "CyberGuy" Knutsson)Look for spelling and grammatical errors: Scam emails often contain mistakes that official communications wouldn't have.Be wary of urgent deadlines: Scammers create arbitrary deadlines to pressure you into acting quickly without thinking.Verify account details: If the email mentions account information, check if it matches your actual iCloud details.Hover over links without clicking:This allows you to preview the URL and check if it's legitimate, as in the example below, which, as you can see, is not from Apple. iCloud email scam showing the URL preview being bogus (Kurt "CyberGuy" Knutsson)Steps to protect yourselfIf you receive a suspicious email claiming to be from Apple or iCloud, follow these steps:Don't click any links or download attachments: These could lead tophishing sites or install malware on your device.Use strong antivirus software: Consider installing reputable antivirus software to help protect against malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Check your account directly: Instead of using links in the email, go directly to appleid.apple.com or check your device settings.Update your Apple ID password: If you suspect your account may have been compromised, change your password immediately.Enable two-factor authentication(2FA): 2FA adds an extra layer of security to your Apple ID.Report the phishing attempt: Forward suspicious emails to reportphishing@apple.com. iCloud email scam (Kurt "CyberGuy" Knutsson)Invest in personal data removal services: While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.What to do if you've been scammedFollow these steps if you think you may have fallen for an iCloud scam.1) Change your Apple ID password immediately: Ensure you create a strong, unique password that you haven't used on other accounts.2) Check for any unauthorized changes to your account settings or payment information: Go to account.apple.com and review any devices, personal information or security settings that look unfamiliar.3) Contact Apple Support directly through official channels for assistance: Forward the suspicious email to reportphishing@apple.com or abuse@icloud.com to help Apple track and block these scams.4) Monitor your financial accounts for any suspicious activity: If you provided payment information, cancel and replace your credit card immediately and pay close attention to even small unauthorized charges.5) Consider placing a fraud alert on your credit reports: Report the scam to theFederal Trade Commission andInternet Crime Complaint Center to help combat these fraudulent activities.6) Use an identity theft protection service:Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft.Kurt's key takeawaysRemember, Apple will never ask you to provide personal information, passwords or security codes via email, text message or phone call. If you're ever in doubt about the legitimacy of a communication from Apple, always err on the side of caution and contact Apple directly through their official website or support channels. By staying vigilant and following these guidelines, you can better protect yourself from iCloud scams and keep your personal information secure. Don't let the urgency of these messages cloud your judgment. Take a moment to verify before you act, and you'll be much safer in the long run.Have you ever been targeted by an iCloud or Apple-related scam? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·98 Views
-
Top translation apps for travelerswww.foxnews.comTech Top translation apps for travelers Enjoy your overseas travel without worrying about a language barrier thanks to these great translation apps Published February 11, 2025 6:00am EST close App allows you to translate conversations in foreign language in real time Navi allows you to understand anyone, anywhere, anytime. Traveling abroad can be an incredible adventure, but the language barrier can make even the most intrepid explorer nervous. The fear of being unable to communicate or understand signs and menus keeps many would-be travelers from ever leaving their home country. But fear not. With the rise of powerful translation apps, you can harness the latest technology right on your smartphone to bridge the language gap wherever your journey takes you.I've tested out the top contenders to bring you my picks for the best translation apps for global travelers. Whether you have an iPhone or an Android, these apps have got you covered with features like live speech translation, text input and even AI-powered sign and menu translation. A man using a translation app on his cellphone (Kurt "CyberGuy" Knutsson)The best overall translation appGoogle Translate Google Translate (Google) (Kurt "CyberGuy" Knutsson)Google Translate is the best translation app for most people. It supports the most languages, with 133 languages supported. It also features an incredibly user-friendly interface and design, and best of all, it's completely free. There are multiple ways to translate languages with Google Translate, be it by typing text into the translation box or utilizing text-to-speech translation, and you can even take advantage of Google's AI translator, which can translate text from photos that you take.If you are using an iOS device, you candownload Google Translate here. If you are using an Android-based device, you can download Google Translate from theGoogle Play Store here. Additionally, you can access Google Translate in your web browser from any device by going to translate.Google.com.The best free translation app for iOS usersApple Translate Apple Translate (Apple) (Kurt "CyberGuy" Knutsson)If you're an iOS devotee, you may have already encounteredApple Translate, which comes pre-installed on all iOS devices. This powerful translation app is one of the best available exclusively to iOS users, capable of translating written text and images of text and facilitating direct speech translation to help you converse with speakers of other languages. Apple Translate currently supports 19 languages, including popular options like Spanish, French, German, Chinese and Arabic, making it a valuable tool for planning international vacations or communicating while traveling.Additionally, the Translate app is available on theApple Watch, allowing you to access your favorite translations on the go. With its seamless integration across Apple devices, you can easily switch between your iPhone and Apple Watch for quick and convenient translations. Whether you're navigating a foreign city or engaging in conversation with locals, Apple Translate is designed to enhance your travel experience.The best translation app for professionalsMicrosoft Translator Microsoft Translator (Microsoft) (Kurt "CyberGuy" Knutsson)Microsoft Translator is a totally free-to-use translation app that is popular with business professionals. Featuring over translation for more than 120 languages, this is one of the most robust free-to-use translation apps. You can translate via text, spoken word or images with Microsoft Translate, and where the app really stands out is its ability to be used with multiple devices. You can create translation groups with Microsoft Translator and everyone can talk and translate together. The Microsoft Translator is available for bothiOS and Android devices.The best paid translation appiTranslate iTranslate (iTranslate) (Kurt "CyberGuy" Knutsson)With over 500,000 reviews on the Apple App Store, iTranslate is one of the most popular translation apps for travelers. It offers translation options for more than 100 languages, and its premium features make it well worth the cost of the app. You can use iTranslate for free, but you will be limited to just text translations. With the paid option, you can access both voice translations and text-via-camera translations. For those willing to pay $6 per month, users can save their translations and dictionaries offline, so you can use them from anywhere, even without service. iTranslate is available for both theiOS platform and the Android platform.Kurt's key takeawaysThere are a lot of different translation apps out there on the market aimed at travelers, and we highlighted our favorites today. While the majority of the apps in this list are free-to-use, and all the apps in this list have a free-to-use mode, you will need to pay for additional features from apps such as iTranslate.What challenges have you faced while communicating in a foreign language during your travels? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·112 Views
-
ESAs space telescope Euclid discovers astonishing' Einstein ringwww.foxnews.comBy Greg Wehner Fox News Published February 10, 2025 9:52pm EST close Debris from SpaceX Starship streaks through the sky SpaceX's Starship exploded during an unmanned test flight. Debris from the explosion streaked through the sky, leaving people on the ground amazed and confused. (Greg Munch /TMX) The European Space Agency (ESA) said Monday that its Euclid space telescope has detected a rare bright halo of light around a nearby galaxy.Known as an Einstein ring, the halo was captured in photos encircling a galaxy nearly 590 million light-years away, which is considered close by cosmic standards. A single light-year is measured at 5.8 trillion miles.While astronomers have known about the galaxy where the phenomenon was captured for over a century, they were surprised when Euclid revealed the bright glowing ring,Euclid blasted off from Cape Canaveral, Florida on July 1, 2023, to begin a six-year mission to explore the dark universe.GIANT STELLAR NURSERY REVEALED IN NEW IMAGES FROM ESA'S SPACE TELESCOPE A sea of colorful stars and galaxies appear to swim in the vast blackness of space around a hazy halo at center stage. In the middle of the image, the fuzzy-looking bulb of light in a warm shade of yellow extends around a small bright spot, nestled within a thin light circle that appears to be drawn closely around it. (ESA/Euclid/Euclid Consortium/NASA, image processing by J.-C. Cuillandre, G. Anselmi, T. Li)But before the space telescope could begin its survey of the universe, scientists had to ensure everything onboard was working properly. During the early phase of testing, which took place in September 2023, Euclid sent images back to Earth.The ESA said the images were deliberately out of focus, but in one of the images, Euclid Archive Scientist Bruno Altieri saw what he believed was a very special phenomenon and decided to look at it a bit closer."I look at the data from Euclid as it comes in," Bruno said in a press release from the ESA. "Even from that first observation, I could see it, but after Euclid made more observations of the area, we could see a perfect Einstein ring. For me, with a lifelong interest in gravitational lensing, that was amazing."For most of the population out there, an Einstein Ring is an "extremely rare phenomenon," the ESA said. A thin ring of a perfect circular shape and a piercingly bright white disc in its middle are the protagonists of this image. They stand out against a uniformly colored background of a hazy dark gray. (ESA/Euclid/Euclid Consortium/NASA, image processing by J.-C. Cuillandre, G. Anselmi, T. Li)When a distant galaxy is observed through a telescope, the light from that galaxy may encounter another galaxy on its way to the telescope. When that happens, the foreground galaxy acts like a magnifying glass, and gravity causes the traveling light rays to bend. When light rays bend, scientists call that gravitational lensing, according to the ESA.When the background galaxy, lensing galaxy and telescope are in perfect alignment, the image appears as a ring, also known as an Einstein Ring.The galaxy, called NGC 6506, is about 590 million light-years away, and this is the first time the ring of light around its center has ever been detected."All strong lenses are special, because they're so rare, and they're incredibly useful scientifically," Conor ORiordan of the Max Planck Institute for Astrophysics said. "This one is particularly special, because its so close to Earth and the alignment makes it very beautiful."POWERFUL WEBB TELESCOPE CAPTURES PHOTOS OF ONE OF THE EARLIEST SUPERNOVA EVER SEEN The text paragraph explains the principle behind the Einstein rings. (ESA)Einstein rings are based on physicist Albert Einsteins general theory of relativity, which predicts that light will bend around objects in space, so they focus the light like giant lenses, ESA said. The phenomenon allows scientists to sometimes see the light from distant galaxies that would otherwise be hidden."I find it very intriguing that this ring was observed within a well-known galaxy, which was first discovered in 1884," Valeria Pettorino, ESA Euclid project scientist, said. "The galaxy has been known to astronomers for a very long time. And yet this ring was never observed before. This demonstrates how powerful Euclid is, finding new things even in places we thought we knew well. This discovery is very encouraging for the future of the Euclid mission and demonstrates its fantastic capabilities."Over the course of the mission, scientists expect Euclid will reveal more about the role of gravity in the Universe, as well as the nature of dark energy and dark matter.Euclid will map over a third of the sky and observe billions of galaxies as far as 10 billion light-years away, ESA said. In doing so, scientists expect Euclid to find around 100,000 more strong lenses, though finding one so cosmically close to home and so spectacular, ESA added, "is astonishing.""Euclid is going to revolutionize the field, with all this data we've never had before," ORiordan said.The Associated Press contributed to this report. Greg Wehner is a breaking news reporter for Fox News Digital.Story tips and ideas can be sent to Greg.Wehner@Fox.com and on Twitter @GregWehner.0 Comments ·0 Shares ·132 Views
-
Microsoft Teams is becoming a prime target for sophisticated scammerswww.foxnews.comTech Microsoft Teams is becoming a prime target for sophisticated scammers Here are some important ways to spot a Microsoft Teams scam Published February 10, 2025 10:00am EST close 'CyberGuy': Protecting yourself from Microsoft tech support scams Tech expert Kurt Knutsson says scammers exploit fears, falsely claim computer issues to access your personal data. If there is one corporation that is targeted by scammers more than anyone else, it is Microsoft. From customer support scams to impersonation and phishing attacks, the companys services are constantly under threat. Recently, even Russia-sponsored hackers managed to breach Microsoft and steal sensitive information.While Microsoft services as a whole are prime targets, one that stands out is Teams. The collaboration tool is used by more than 300 million people worldwide, making it a goldmine for attackers. Hackers are using it to spreadphishing,vishing andquishing campaigns, relying on social engineering tactics to trick victims into sharing private and sensitive data. Microsoft Teams app on home screen of smartphone (Kurt "CyberGuy" Knutsson)The rising attacks on Microsoft Teams usersCybercriminals are increasingly targeting Microsoft Teams users withsophisticated attack methods. One such technique involves malicious GIF images that exploit worm-like vulnerabilities, allowing attackers to take over accounts and infiltrate chat sessions when the image is opened.Hackers also insert malware-laden files into chat threads, tricking users into downloading DLL files that enable system takeover. Phishing campaigns leverage compromised accounts or domains to send deceptive invitations, luring victims into downloading harmful files.Some attackers use email bombing and vishing, posing as tech support to overwhelm users with spam emails before tricking them into granting remote access. Compromised email addresses and stolen Microsoft 365 credentials provide another entry point for unauthorized access.Plus, external access settings in Microsoft Teams, which often allow outside users to initiate chats or meetings, can be exploited if not properly restricted. Another common tactic is sending phishing links through Teams chats, often disguised as invoices or payment notifications, leading to ransomware infections. A woman carrying a Microsoft laptop (Kurt "CyberGuy" Knutsson)Beware of fake jobs as wellScammers have been running fake job schemes for a while, but their tactics keep evolving. Lately, I reported howfake job emails are being used to install crypto mining software that slows down computers. Now, they are using Microsoft Teams chat to trick people.It usually starts with an email about a job followed by a suggestion to do the interview over Teams. The first red flag is that the entire interview happens over chat with no video and no call. After that, you are "hired" and asked to submit your details, often through a Google Doc requesting personal info like your social security or tax number. Some victims are even asked to buy equipment for the job, pay a hiring fee or purchase gift cards, which are classic signs that the whole thing is a scam. A woman working on her Microsoft laptop (Kurt "CyberGuy" Knutsson)6 ways you can stay safe from scammers targeting Microsoft Teams1) Avoid opening suspicious links and attachments: Be cautious of unsolicited links or attachments, especially in chat messages or emails. Cybercriminals often use these to deliver malware or phishing links. Never click on links that seem unusual or come from unknown sources.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Check for red flags in job offers: If you receive a job offer that seems too good to be true or involves an interview conducted entirely via chat with no phone call or video meeting, it's likely a scam. Legitimate companies typically conduct interviews using multiple forms of communication.A job offer that insists on only text-based conversations is a major red flag. Other warning signs include being asked to provide personal information through Google Docs, being asked to pay for equipment, paying fees to secure the job or purchasing gift cards as part of the hiring process.3) Use strong, unique passwords: Ensure your Microsoft 365 and other accounts are protected with strong passwords. Consider usingtwo-factor authentication to add an extra layer of protection against unauthorized access. Also, you might want to use apassword manager to generate and store complex passwords.4) Be cautious with personal information: Never share sensitive personal details, like social security numbers or tax information, through unsecured or unsolicited channels, such as Google Docs or messages on Teams. Always verify the legitimacy of such requests.5) Report suspicious activity: If you notice any suspicious activity on your Microsoft Teams account or receive unusual job offers, report it immediately. Prompt action can prevent a potential breach or further compromise. Notify your IT department or relevant authorities so they can investigate and take appropriate measures.6) Verify IT support requests: Be cautious of unsolicited messages or calls claiming to be from IT support, especially those asking you to install software or grant remote access. Cybercriminals often impersonate IT staff to deploy ransomware or steal sensitive data. Always verify such requests with your actual IT department before taking any action. If in doubt, contact your IT team directly using official channels, not through the message or call you received.Kurts key takeawayScammers and hackers are not slowing down, so staying sharp is the only way to stay ahead. If something feels off, like a job that sounds too good to be true, a random Teams message with a sketchy link or an interview that is just a chat, trust your instincts. You should always be careful with external messages and invites that you to receive on Microsoft Teams. Even if it seems like it is from someone you know, it is best to double-check, especially if it involves a file, a link or an invitation to a chat you were not expecting to receive.Should Microsoft be doing more to prevent phishing and impersonation scams on Teams?Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·104 Views
-
Is your camera ticket a fake? Heres how to tellwww.foxnews.comPublished February 10, 2025 6:00am EST close 'CyberGuy': Is your camera ticket a fake? Heres how to tell Red light camera tickets: Not liable to ID the driver; some are fishing expeditions. Tech expert Kurt Knutsson helps you fight back against tricky fake tickets. Suddenly, a red light camera ticket arrives in your mailbox bearing your name but you weren't even driving that day. This frustrating scenario is catching many drivers off guard. So, what's the deal here? Let's break down these tricky fake tickets and how to fight back when you're wrongly in the crosshairs. Example of a fake red light camera ticket (Highwayrobbery.net) (Kurt "CyberGuy" Knutsson)The ticket that might not be a ticketFirst things first, not all "tickets" are created equal. If you receive something that looks like a ticket but doesn't have the court's full address or phone number or worse, it says "Do not contact the court" you might be dealing with what's cheekily called a "snitch ticket." These aren't real tickets at all but rather attempts to get you to rat out whoever was actually driving. The dead giveaway is usually that they will say something like, "Courtesy Notice: This is not a ticket." Example of a fake red light camera ticket (motorists.org) (Kurt "CyberGuy" Knutsson)Why are they playing this game?Because cities often have to pay camera vendors for every ticket issued, whether or not they ever collect a dime. So, when the footage is too blurry to ID the driver, they toss out these "Whoops, was this you?" tickets, hoping youll do their homework for them. Its basically a shady game of"Guess Who?" except you never agreed to play, the rules are rigged and the only prize is an unwanted fine.Now what?If you've received a "snitch ticket" (a fake ticket designed to get you to identify the driver), here's what you can do.Ignore it: Since it's not a real ticket, you're not legally obligated to respond. Many people simply disregard these notices.Don't identify the driver: Remember, you're under no legal obligation to name who was driving your car.Check for red flags: Confirm it's a fake by looking for missing court information or the phrase "Do not contact the court regarding this notice."Stay informed: Keep the notice for your records, but don't let it stress you out. It's not a legal document.Remember, these fake tickets are just fishing expeditions. You're well within your rights to toss them in the recycling bin and go about your day. Example of a fake red light camera ticket (motorists.org) (Kurt "CyberGuy" Knutsson)'But it's not me!' What to doIf you receive a genuine ticket (one with all the court info) but you weren't the driver, you've got options.1) Contact the police (optional): You can try calling the number on the ticket and explaining the situation. But beware, they might pressure you to identify the actual driver.2) Stand your ground: Remember, you're not legally required to identify the driver. It's not your job to play detective for them.3) Go to court: If push comes to shove, you can always contest the ticket in court. Just be prepared for some potential pushback.Kurt's key takeawaysDealing with red light camera tickets can feel like navigating a legal minefield. The key is to know your rights, stand firm and don't let anyone pressure you into admitting guilt or identifying others if you're not comfortable doing so. Remember, the burden of proof is on them, not you. Stay informed, stay calm, and if all else fails, seek legal advice. After all, justice shouldn't be a game of "gotcha."Has a "snitch ticket" ever landed in your mailbox? Tell us how you handled it by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·119 Views
-
Top 20 apps tracking you every daywww.foxnews.comPublished February 9, 2025 10:00am EST close Hiding the apps on your Android can protect your privacy Kurt 'CyberGuy' Knutsson walks you through the process. If something is free, youre the product being sold. This is especially true for most online services we use. For example, Googles primary source of revenue is ads. They make money by collecting data about you and me and selling targeted advertising to companies, which then show us products relevant to our interests.You might have noticed that the moment you search for a product on Google, you start seeing ads for it on Facebook. The same applies to apps like Instagram, Threads and LinkedIn. In fact, research shows that the apps collecting the most data about you are also among the most widely used.Lets look at the top 20 of them and explore how you can take control of your personal information. A man scrolling through his apps on his phone (Kurt "CyberGuy" Knutsson)The most invasive apps youre probably usingApps collect all sorts of data about you, but lets get one thing straight. Not all data collection is bad. Some apps genuinely need access to certain information to function properly. For example, Uber stores your location data to help you find a ride faster, while WhatsApp requires access to your contacts so you can send messages.The real issue is data collection that serves no purpose other than showing you ads or selling your information to third parties. According to Marin Marini, head of IT Infrastructure atNsoft, the top 20 most invasive apps collect data that is not necessary for their core functions.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Leading the list is Meta with all four of its major apps. Facebook, Messenger, Instagram and Threads share 68% of collected data with third parties while also using it for targeted ads. LinkedIn follows, sharing around 37% of user data, with Amazon in third place, followed by YouTube.What makes this concerning is how deeply embedded these apps are in our daily lives, making it nearly impossible to find alternatives or avoid data collection altogether.The list also includes Elon Musks X at No. 5, followed by Uber Eats, PayPal, Uber, Google and Amazon Prime Video. TikTok, despite ongoing scrutiny over its data policies, ranks 14th. While many of these names were expected, one surprising entry is the mobile game Candy Crush, which uses 28% of collected data for ads. You can find the full list in the image below. The top 20 most invasive applications (Nsoft)Looking for alternatives is the only solutionAvoiding data collection is nearly impossible if you use the apps above. The only way to dodge these invasive apps is to switch to apps that respect your privacy. While it may seem impossible to replace some of the biggest platforms, there are alternatives that collect little to no unnecessary data.For messaging, Signal is one of the best options. Unlike WhatsApp, it does not store metadata or share information with third parties. If you need a search engine that does not track your activity,check out these options instead of Google.When it comes to social media, Mastodon and Bluesky offer decentralized alternatives to Twitter.For those looking to replace YouTube, PeerTube and Nebula are worth exploring.If you shop frequently on Amazon, consider smaller online retailers or direct brand websites that may be less likely to track your every move.Instead of Google Drive, considerthese solutions which offer cloud storage with strong encryption.Switching to these alternatives may require some effort, but it is the best way to limit how much of your personal data is being collected. Taking control of your privacy starts with making conscious choices about the apps you use.GET FOX BUSINESS ON THE GO BY CLICKING HERE Apps on the home screen of an Android phone (Kurt "CyberGuy" Knutsson)5 ways to reduce data sharingIf youre not able to delete the apps listed above, follow the simple steps below to minimize how much information is being collected and shared.1. Review app permissions:Most apps request access to data they do not actually need. Go to your phone settings and check app permissions on youriPhone andAndroid. Disable access to location, microphone, contacts and other sensitive data unless absolutely necessary.2. Turn off ad personalization:Many companies track your online activity to show targeted ads. You can limit this by disabling ad personalization inGoogle,Facebook, and other accounts. This reduces the amount of data collected about your interests and behavior.3. Limit social media tracking:Social media platforms track your activity even when you are not using them.Adjust privacy settings to restrict data collection.4. Avoid signing in with Google or Facebook:Many websites offer login options using Google or Facebook. While convenient, this shares even more data with these platforms. Instead, create separate accounts using email whenever possible.5. Use a Virtual Private Network (VPN) and private browsing mode:AVPN hides your IP address, helping to obscure your location and online activity, making it harder for websites to track you. Combined with private browsing or incognito mode, this reduces the amount of data companies can collect about your online activity. Using a VPN service can also enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi.While VPNs dont directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies.6. Regular app cleanup:Uninstall apps you no longer use to reduce passive data collection.App-specific suggestions to safeguard your digital footprintProtect your personal information across the popular platforms mentioned above with these essential privacy adjustments.Facebook/Instagram/Threads:Disable activity tracking by going toSettings > Privacy > Activity Tracking.Turn off"Apps, Websites and Games" to limit third-party data sharing.LinkedIn:Turn off ad targeting inSettings > Advertising preferences.Disableprofile viewing history.Amazon/Prime Video:Opt-out of personalized ads in your account settings.Limit sharing by disabling Alexa voice data storage (if applicable).YouTube/Google Products (e.g., Gmail, Google Maps):Disable ad personalization underGoogle Account > Data & Personalization > Ad Settings.Turn off location history and web/app activity tracking.Uber/Uber Eats:Use the app only when needed, and avoid storing payment methods if possible.Disable tracking after rides/deliveries are complete.PayPal:Restrict sharing underSettings > Privacy & Security by opting out of data sharing for marketing purposes.Snapchat:Disable location sharing via Snap Map and turn off ad personalization underAd Preferences.TikTok:Restrict personalized content recommendations inPrivacy > Personalization and Data.Avoid posting unnecessary personal information.Spotify:Adjust data sharing preferences inAccount Settings > Privacy Settings.Opt out of tailored ads.Roblox:Setstrict privacy controls in the account settings, especially for children.Use a separate,disposable email for account registration.Kurts key takeawayThe best way to reduce companies from collecting your data is to remove invasive apps from your phone. Many apps request unnecessary permissions that can track your activity, so deleting them limits exposure. Instead of downloading standalone apps, try using the browser versions of popular social media platforms, as they typically have fewer permissions.CLICK HERE TO GET THE FOX NEWS APPHowever, web tracking still exists through cookies and fingerprinting, so using aprivacy-focused browser like Brave, Firefox with enhanced tracking protection, or Safari with Intelligent Tracking Prevention (ITP) can further reduce data collection. However, some apps are so deeply integrated that replacing them is difficult. For example, if you use an Android phone, avoiding Googles ecosystem is nearly impossible. Apple, on the other hand, offers more privacy controls, giving users better options to limit data collection.Do you check app permissions before installing? How do you decide which permissions are acceptable?Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments ·0 Shares ·139 Views
More Stories