Welcome to the official Fox News Facebook page. Get breaking news, must see videos & exclusive interviews from the #1 name in news.
Recent Updates
-
Over 8M patient records leaked in healthcare data breach
Published
June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles!
In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop 5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you. One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#over #patient #records #leaked #healthcareOver 8M patient records leaked in healthcare data breachPublished June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop 5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you. One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication. It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #over #patient #records #leaked #healthcareWWW.FOXNEWS.COMOver 8M patient records leaked in healthcare data breachPublished June 15, 2025 10:00am EDT close IPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' NEWYou can now listen to Fox News articles! In the past decade, healthcare data has become one of the most sought-after targets in cybercrime. From insurers to clinics, every player in the ecosystem handles some form of sensitive information. However, breaches do not always originate from hospitals or health apps. Increasingly, patient data is managed by third-party vendors offering digital services such as scheduling, billing and marketing. One such breach at a digital marketing agency serving dental practices recently exposed approximately 2.7 million patient profiles and more than 8.8 million appointment records.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)Massive healthcare data leak exposes millions: What you need to knowCybernews researchers have discovered a misconfigured MongoDB database exposing 2.7 million patient profiles and 8.8 million appointment records. The database was publicly accessible online, unprotected by passwords or authentication protocols. Anyone with basic knowledge of database scanning tools could have accessed it.The exposed data included names, birthdates, addresses, emails, phone numbers, gender, chart IDs, language preferences and billing classifications. Appointment records also contained metadata such as timestamps and institutional identifiers.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSClues within the data structure point toward Gargle, a Utah-based company that builds websites and offers marketing tools for dental practices. While not a confirmed source, several internal references and system details suggest a strong connection. Gargle provides appointment scheduling, form submission and patient communication services. These functions require access to patient information, making the firm a likely link in the exposure.After the issue was reported, the database was secured. The duration of the exposure remains unknown, and there is no public evidence indicating whether the data was downloaded by malicious actors before being locked down.We reached out to Gargle for a comment but did not hear back before our deadline. A healthcare professional viewing heath data (Kurt "CyberGuy" Knutsson)How healthcare data breaches lead to identity theft and insurance fraudThe exposed data presents a broad risk profile. On its own, a phone number or billing record might seem limited in scope. Combined, however, the dataset forms a complete profile that could be exploited for identity theft, insurance fraud and targeted phishing campaigns.Medical identity theft allows attackers to impersonate patients and access services under a false identity. Victims often remain unaware until significant damage is done, ranging from incorrect medical records to unpaid bills in their names. The leak also opens the door to insurance fraud, with actors using institutional references and chart data to submit false claims.This type of breach raises questions about compliance with the Health Insurance Portability and Accountability Act, which mandates strong security protections for entities handling patient data. Although Gargle is not a healthcare provider, its access to patient-facing infrastructure could place it under the scope of that regulation as a business associate. A healthcare professional working on a laptop (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from healthcare data breachesIf your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you. One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. GET FOX BUSINESS ON THE GO BY CLICKING HEREGet a free scan to find out if your personal information is already out on the web3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayIf nothing else, this latest leak shows just how poorly patient data is being handled today. More and more, non-medical vendors are getting access to sensitive information without facing the same rules or oversight as hospitals and clinics. These third-party services are now a regular part of how patients book appointments, pay bills or fill out forms. But when something goes wrong, the fallout is just as serious. Even though the database was taken offline, the bigger problem hasn't gone away. Your data is only as safe as the least careful company that gets access to it.CLICK HERE TO GET THE FOX NEWS APPDo you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.Please log in to like, share and comment! -
Fox News AI Newsletter: Hollywood studios sue 'bottomless pit of plagiarism'
The Minions pose during the world premiere of the film "Despicable Me 4" in New York City, June 9, 2024. NEWYou can now listen to Fox News articles!
Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Major Hollywood studios sue AI company over copyright infringement in landmark move- Meta's Zuckerberg aiming to dominate AI race with recruiting push for new ‘superintelligence’ team: report- OpenAI says this state will play central role in artificial intelligence development The website of Midjourney, an artificial intelligencecapable of creating AI art, is seen on a smartphone on April 3, 2023, in Berlin, Germany.'PIRACY IS PIRACY': Two major Hollywood studios are suing Midjourney, a popular AI image generator, over its use and distribution of intellectual property.AI RACE: Meta CEO Mark Zuckerberg is reportedly building a team of experts to develop artificial general intelligencethat can meet or exceed human capabilities.TECH HUB: New York is poised to play a central role in the development of artificial intelligence, OpenAI executives told key business and civic leaders on Tuesday. Attendees watch a presentation during an event on the Apple campus in Cupertino, Calif., Monday, June 9, 2025. APPLE FALLING BEHIND: Apple’s annual Worldwide Developers Conferencekicked off on Monday and runs through Friday. But the Cupertino-based company is not making us wait until the end. The major announcements have already been made, and there are quite a few. The headliners are new software versions for Macs, iPhones, iPads and Vision. FROM COAL TO CODE: This week, Amazon announced a billion investment in artificial intelligence infrastructure in the form of new data centers, the largest in the commonwealth's history, according to the eCommerce giant.DIGITAL DEFENSE: A growing number of fire departments across the country are turning to artificial intelligence to help detect and respond to wildfires more quickly. Rep. Darin LaHood, R-Ill., leaves the House Republican Conference meeting at the Capitol Hill Club in Washington on Tuesday, May 17, 2022. SHIELD FROM BEIJING: Rep. Darin LaHood, R-Ill., is introducing a new bill Thursday imploring the National Security Administrationto develop an "AI security playbook" to stay ahead of threats from China and other foreign adversaries. ROBOT RALLY PARTNER: Finding a reliable tennis partner who matches your energy and skill level can be a challenge. Now, with Tenniix, an artificial intelligence-powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve. DIGITAL DANGER ZONE: Scam ads on Facebook have evolved beyond the days of misspelled headlines and sketchy product photos. Today, many are powered by artificial intelligence, fueled by deepfake technology and distributed at scale through Facebook’s own ad system. Fairfield, Ohio, USA - February 25, 2011 : Chipotle Mexican Grill Logo on brick building. Chipotle is a chain of fast casual restaurants in the United States and Canada that specialize in burritos and tacos.'EXPONENTIAL RATE': Artificial intelligence is helping Chipotle rapidly grow its footprint, according to CEO Scott Boatwright. AI TAKEOVER THREAT: The hottest topic nowadays revolves around Artificial Intelligenceand its potential to rapidly and imminently transform the world we live in — economically, socially, politically and even defensively. Regardless of whether you believe that the technology will be able to develop superintelligence and lead a metamorphosis of everything, the possibility that may come to fruition is a catalyst for more far-leftist control.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff.
#fox #news #newsletter #hollywood #studiosFox News AI Newsletter: Hollywood studios sue 'bottomless pit of plagiarism'The Minions pose during the world premiere of the film "Despicable Me 4" in New York City, June 9, 2024. NEWYou can now listen to Fox News articles! Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Major Hollywood studios sue AI company over copyright infringement in landmark move- Meta's Zuckerberg aiming to dominate AI race with recruiting push for new ‘superintelligence’ team: report- OpenAI says this state will play central role in artificial intelligence development The website of Midjourney, an artificial intelligencecapable of creating AI art, is seen on a smartphone on April 3, 2023, in Berlin, Germany.'PIRACY IS PIRACY': Two major Hollywood studios are suing Midjourney, a popular AI image generator, over its use and distribution of intellectual property.AI RACE: Meta CEO Mark Zuckerberg is reportedly building a team of experts to develop artificial general intelligencethat can meet or exceed human capabilities.TECH HUB: New York is poised to play a central role in the development of artificial intelligence, OpenAI executives told key business and civic leaders on Tuesday. Attendees watch a presentation during an event on the Apple campus in Cupertino, Calif., Monday, June 9, 2025. APPLE FALLING BEHIND: Apple’s annual Worldwide Developers Conferencekicked off on Monday and runs through Friday. But the Cupertino-based company is not making us wait until the end. The major announcements have already been made, and there are quite a few. The headliners are new software versions for Macs, iPhones, iPads and Vision. FROM COAL TO CODE: This week, Amazon announced a billion investment in artificial intelligence infrastructure in the form of new data centers, the largest in the commonwealth's history, according to the eCommerce giant.DIGITAL DEFENSE: A growing number of fire departments across the country are turning to artificial intelligence to help detect and respond to wildfires more quickly. Rep. Darin LaHood, R-Ill., leaves the House Republican Conference meeting at the Capitol Hill Club in Washington on Tuesday, May 17, 2022. SHIELD FROM BEIJING: Rep. Darin LaHood, R-Ill., is introducing a new bill Thursday imploring the National Security Administrationto develop an "AI security playbook" to stay ahead of threats from China and other foreign adversaries. ROBOT RALLY PARTNER: Finding a reliable tennis partner who matches your energy and skill level can be a challenge. Now, with Tenniix, an artificial intelligence-powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve. DIGITAL DANGER ZONE: Scam ads on Facebook have evolved beyond the days of misspelled headlines and sketchy product photos. Today, many are powered by artificial intelligence, fueled by deepfake technology and distributed at scale through Facebook’s own ad system. Fairfield, Ohio, USA - February 25, 2011 : Chipotle Mexican Grill Logo on brick building. Chipotle is a chain of fast casual restaurants in the United States and Canada that specialize in burritos and tacos.'EXPONENTIAL RATE': Artificial intelligence is helping Chipotle rapidly grow its footprint, according to CEO Scott Boatwright. AI TAKEOVER THREAT: The hottest topic nowadays revolves around Artificial Intelligenceand its potential to rapidly and imminently transform the world we live in — economically, socially, politically and even defensively. Regardless of whether you believe that the technology will be able to develop superintelligence and lead a metamorphosis of everything, the possibility that may come to fruition is a catalyst for more far-leftist control.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff. #fox #news #newsletter #hollywood #studiosWWW.FOXNEWS.COMFox News AI Newsletter: Hollywood studios sue 'bottomless pit of plagiarism'The Minions pose during the world premiere of the film "Despicable Me 4" in New York City, June 9, 2024. (REUTERS/Kena Betancur) NEWYou can now listen to Fox News articles! Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Major Hollywood studios sue AI company over copyright infringement in landmark move- Meta's Zuckerberg aiming to dominate AI race with recruiting push for new ‘superintelligence’ team: report- OpenAI says this state will play central role in artificial intelligence development The website of Midjourney, an artificial intelligence (AI) capable of creating AI art, is seen on a smartphone on April 3, 2023, in Berlin, Germany. (Thomas Trutschel/Photothek via Getty Images)'PIRACY IS PIRACY': Two major Hollywood studios are suing Midjourney, a popular AI image generator, over its use and distribution of intellectual property.AI RACE: Meta CEO Mark Zuckerberg is reportedly building a team of experts to develop artificial general intelligence (AGI) that can meet or exceed human capabilities.TECH HUB: New York is poised to play a central role in the development of artificial intelligence (AI), OpenAI executives told key business and civic leaders on Tuesday. Attendees watch a presentation during an event on the Apple campus in Cupertino, Calif., Monday, June 9, 2025. (AP Photo/Jeff Chiu)APPLE FALLING BEHIND: Apple’s annual Worldwide Developers Conference (WWDC) kicked off on Monday and runs through Friday. But the Cupertino-based company is not making us wait until the end. The major announcements have already been made, and there are quite a few. The headliners are new software versions for Macs, iPhones, iPads and Vision. FROM COAL TO CODE: This week, Amazon announced a $20 billion investment in artificial intelligence infrastructure in the form of new data centers, the largest in the commonwealth's history, according to the eCommerce giant.DIGITAL DEFENSE: A growing number of fire departments across the country are turning to artificial intelligence to help detect and respond to wildfires more quickly. Rep. Darin LaHood, R-Ill., leaves the House Republican Conference meeting at the Capitol Hill Club in Washington on Tuesday, May 17, 2022. (Bill Clark/CQ-Roll Call, Inc via Getty Images)SHIELD FROM BEIJING: Rep. Darin LaHood, R-Ill., is introducing a new bill Thursday imploring the National Security Administration (NSA) to develop an "AI security playbook" to stay ahead of threats from China and other foreign adversaries. ROBOT RALLY PARTNER: Finding a reliable tennis partner who matches your energy and skill level can be a challenge. Now, with Tenniix, an artificial intelligence-powered tennis robot from T-Apex, players of all abilities have a new way to practice and improve. DIGITAL DANGER ZONE: Scam ads on Facebook have evolved beyond the days of misspelled headlines and sketchy product photos. Today, many are powered by artificial intelligence, fueled by deepfake technology and distributed at scale through Facebook’s own ad system. Fairfield, Ohio, USA - February 25, 2011 : Chipotle Mexican Grill Logo on brick building. Chipotle is a chain of fast casual restaurants in the United States and Canada that specialize in burritos and tacos. (iStock)'EXPONENTIAL RATE': Artificial intelligence is helping Chipotle rapidly grow its footprint, according to CEO Scott Boatwright. AI TAKEOVER THREAT: The hottest topic nowadays revolves around Artificial Intelligence (AI) and its potential to rapidly and imminently transform the world we live in — economically, socially, politically and even defensively. Regardless of whether you believe that the technology will be able to develop superintelligence and lead a metamorphosis of everything, the possibility that may come to fruition is a catalyst for more far-leftist control.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff.0 Comments 0 Shares -
How addresses are collected and put on people finder sites
Published
June 14, 2025 10:00am EDT close Top lawmaker on cybersecurity panel talks threats to US agriculture Senate Armed Services Committee member Mike Rounds, R-S.D., speaks to Fox News Digital NEWYou can now listen to Fox News articles!
Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. A woman searching for herself online.How your address gets exposed online and who’s using itIf you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams. A woman searching for herself online.How do people search sites get your home address?First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 1. Public sourcesYour home address can appear in:Property deeds: When you buy or sell a home, your name and address become part of the public record.Voter registration: You need to list your address when voting.Court documents: Addresses appear in legal filings or lawsuits.Marriage and divorce records: These often include current or past addresses.Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.WHAT IS ARTIFICIAL INTELLIGENCE?These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.2. Private sourcesOther sites buy your data from companies you’ve interacted with:Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.Mobile apps and websites: Some apps track your location.People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information. A woman searching for herself online.What are the risks of having your address on people finder sites?The Federal Trade Commissionadvises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:Stalking and harassment: Criminals can easily find your home address and threaten you.Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.How to protect your home addressThe good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.I recommend a few ways to delete your private information, including your home address, from such websites.1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like "opt out," "delete my information," etc., point the way.Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.Kurt’s key takeawaysYour home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#how #addresses #are #collected #putHow addresses are collected and put on people finder sitesPublished June 14, 2025 10:00am EDT close Top lawmaker on cybersecurity panel talks threats to US agriculture Senate Armed Services Committee member Mike Rounds, R-S.D., speaks to Fox News Digital NEWYou can now listen to Fox News articles! Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. A woman searching for herself online.How your address gets exposed online and who’s using itIf you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams. A woman searching for herself online.How do people search sites get your home address?First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 1. Public sourcesYour home address can appear in:Property deeds: When you buy or sell a home, your name and address become part of the public record.Voter registration: You need to list your address when voting.Court documents: Addresses appear in legal filings or lawsuits.Marriage and divorce records: These often include current or past addresses.Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.WHAT IS ARTIFICIAL INTELLIGENCE?These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.2. Private sourcesOther sites buy your data from companies you’ve interacted with:Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.Mobile apps and websites: Some apps track your location.People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information. A woman searching for herself online.What are the risks of having your address on people finder sites?The Federal Trade Commissionadvises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:Stalking and harassment: Criminals can easily find your home address and threaten you.Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.How to protect your home addressThe good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.I recommend a few ways to delete your private information, including your home address, from such websites.1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like "opt out," "delete my information," etc., point the way.Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.Kurt’s key takeawaysYour home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #how #addresses #are #collected #putWWW.FOXNEWS.COMHow addresses are collected and put on people finder sitesPublished June 14, 2025 10:00am EDT close Top lawmaker on cybersecurity panel talks threats to US agriculture Senate Armed Services Committee member Mike Rounds, R-S.D., speaks to Fox News Digital NEWYou can now listen to Fox News articles! Your home address might be easier to find online than you think. A quick search of your name could turn up past and current locations, all thanks to people finder sites. These data broker sites quietly collect and publish personal details without your consent, making your privacy vulnerable with just a few clicks.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join. A woman searching for herself online. (Kurt "CyberGuy" Knutsson)How your address gets exposed online and who’s using itIf you’ve ever searched for your name and found personal details, like your address, on unfamiliar websites, you’re not alone. People finder platforms collect this information from public records and third-party data brokers, then publish and share it widely. They often link your address to other details such as phone numbers, email addresses and even relatives.11 EASY WAYS TO PROTECT YOUR ONLINE PRIVACY IN 2025While this data may already be public in various places, these sites make it far easier to access and monetize it at scale. In one recent breach, more than 183 million login credentials were exposed through an unsecured database. Many of these records were linked to physical addresses, raising concerns about how multiple sources of personal data can be combined and exploited.Although people finder sites claim to help reconnect friends or locate lost contacts, they also make sensitive personal information available to anyone willing to pay. This includes scammers, spammers and identity thieves who use it for fraud, harassment, and targeted scams. A woman searching for herself online. (Kurt "CyberGuy" Knutsson)How do people search sites get your home address?First, let’s define two sources of information; public and private databases that people search sites use to get your detailed profile, including your home address. They run an automated search on these databases with key information about you and add your home address from the search results. 1. Public sourcesYour home address can appear in:Property deeds: When you buy or sell a home, your name and address become part of the public record.Voter registration: You need to list your address when voting.Court documents: Addresses appear in legal filings or lawsuits.Marriage and divorce records: These often include current or past addresses.Business licenses and professional registrations: If you own a business or hold a license, your address can be listed.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?These records are legal to access, and people finder sites collect and repackage them into detailed personal profiles.2. Private sourcesOther sites buy your data from companies you’ve interacted with:Online purchases: When you buy something online, your address is recorded and can be sold to marketing companies.Subscriptions and memberships: Magazines, clubs and loyalty programs often share your information.Social media platforms: Your location or address details can be gathered indirectly from posts, photos or shared information.Mobile apps and websites: Some apps track your location.People finder sites buy this data from other data brokers and combine it with public records to build complete profiles that include address information. A woman searching for herself online. (Kurt "CyberGuy" Knutsson)What are the risks of having your address on people finder sites?The Federal Trade Commission (FTC) advises people to request the removal of their private data, including home addresses, from people search sites due to the associated risks of stalking, scamming and other crimes.People search sites are a goldmine for cybercriminals looking to target and profile potential victims as well as plan comprehensive cyberattacks. Losses due to targeted phishing attacks increased by 33% in 2024, according to the FBI. So, having your home address publicly accessible can lead to several risks:Stalking and harassment: Criminals can easily find your home address and threaten you.Identity theft: Scammers can use your address and other personal information to impersonate you or fraudulently open accounts.Unwanted contact: Marketers and scammers can use your address to send junk mail or phishing or brushing scams.Increased financial risks: Insurance companies or lenders can use publicly available address information to unfairly decide your rates or eligibility.Burglary and home invasion: Criminals can use your location to target your home when you’re away or vulnerable.How to protect your home addressThe good news is that you can take steps to reduce the risks and keep your address private. However, keep in mind that data brokers and people search sites can re-list your information after some time, so you might need to request data removal periodically.I recommend a few ways to delete your private information, including your home address, from such websites.1. Use personal data removal services: Data brokers can sell your home address and other personal data to multiple businesses and individuals, so the key is to act fast. If you’re looking for an easier way to protect your privacy, a data removal service can do the heavy lifting for you, automatically requesting data removal from brokers and tracking compliance.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web2. Opt out manually : Use a free scanner provided by a data removal service to check which people search sites that list your address. Then, visit each of these websites and look for an opt-out procedure or form: keywords like "opt out," "delete my information," etc., point the way.Follow each site’s opt-out process carefully, and confirm they’ve removed all your personal info, otherwise, it may get relisted.3. Monitor your digital footprint: I recommend regularly searching online for your name to see if your location is publicly available. If only your social media profile pops up, there’s no need to worry. However, people finder sites tend to relist your private information, including your home address, after some time.4. Limit sharing your address online: Be careful about sharing your home address on social media, online forms and apps. Review privacy settings regularly, and only provide your address when absolutely necessary. Also, adjust your phone settings so that apps don’t track your location.Kurt’s key takeawaysYour home address is more vulnerable than you think. People finder sites aggregate data from public records and private sources to display your address online, often without your knowledge or consent. This can lead to serious privacy and safety risks. Taking proactive steps to protect your home address is essential. Do it manually or use a data removal tool for an easier process. By understanding how your location is collected and taking measures to remove your address from online sites, you can reclaim control over your personal data.CLICK HERE TO GET THE FOX NEWS APPHow do you feel about companies making your home address so easy to find? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
Massive DMV phishing scam tricks drivers with fake texts
Published
June 7, 2025 10:00am EDT close Tennessee DMV experiencing long lines ahead of REAL ID deadline May 7 is the deadline to get a REAL ID, and some DMVs are facing large crowds and major backup. FOX's Asher Reed spoke with FOX 35 Orlando from outside a DMV in Antioch, Tennessee, with more on the issue. NEWYou can now listen to Fox News articles!
If you've received a text message claiming to be from your state's Department of Motor Vehiclesand threatening you with fines or penalties unless you pay up, you're not alone. A new wave of scam texts is sweeping across the country, targeting drivers in states like Connecticut, Pennsylvania, Georgia, Florida, New York, California, Illinois, New Jersey, Virginia, Colorado, Vermont, Texas, North Carolina and even Washington, D.C.These messages look official and urgent, warning you about supposed unpaid tickets or tolls and demanding immediate payment. But don't be fooled, as these texts are sophisticated scams designed to steal your personal information or money. The scammers are getting better at making their messages look real, so it can be tricky to spot the fraud. But with a few simple tips, you can learn how to recognize these scams and protect yourself before you click or respond. DMV scam text.How the DMV scam text message worksThese scam messages vary slightly depending on the state you're in, but they’re generally structured in the same way. The text threatens consequences, such as credit score damage, revoked driving privileges, suspended vehicle registration or increased toll fees, if you do not pay the bill you have supposedly incurred. To make the message appear legit, the scammers often include a date for penalties to begin, a fake administrative code and a link that appears to be an official DMV website.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEPro tip: If you're instructed to copy the link into your browser rather than clicking it directly, it's a scam. A person receiving a scam text message on their phone.Why DMV text scams are so convincingThe scam relies on two key elements to be effective: fear and a sense of urgency. These are two powerful psychological motivators that can send you into a panic since your driving privileges are at risk, or you're facing financial consequences. The aim is to get you to act hastily without pausing to verify the source. The messages also mimic legitimate government communications by including familiar terms, official-sounding codes and web addresses that appear authentic. Here is an example of what the text might look like: DMV scam text.States known to have issued warnings about DMV scam texts:ConnecticutPennsylvaniaGeorgiaFloridaNew YorkCaliforniaIllinoisNew JerseyVirginiaColoradoVermontTexasNorth CarolinaWashington, D.C.Reports are surfacing across the U.S., and the list of affected states is likely to continue growing as more residents come forward.How to spot and avoid DMV text message scamsIf you receive a suspicious text message claiming to be from your state's DMV and demanding payment or personal information, follow these steps to protect yourself:1. Be skeptical of any message creating urgency or panic: Scammers rely on fear and urgency to trick you into acting without thinking. If a message pressures you to act immediately, that's a major red flag.2. Check for obvious red flags: Look for signs like strange sender addresses, awkward language, misspellings or links that don't match your state's official DMV website.3. Do not click any links or reply, and use strong antivirus software: Legitimate DMVs will not ask for payments, personal details or sensitive information via unsolicited text messages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Verify directly with your DMV: If you're concerned the message might be real, contact your state's DMV using the official website or a trusted phone number. Never use the contact information provided in the suspicious text.5. Consider a Personal Data Removal Service: Your personal information is widely available online, which can make you a bigger target for these types of scams, therefore you might look into a personal data removal service. These services work by submitting opt-out requests to data brokers that collect and sell your information, helping to reduce your digital footprint and making it harder for scammers to find your contact details. GET FOX BUSINESS ON THE GO BY CLICKING HEREWhile no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6. Delete the message immediately and block the sender: Removing the text helps prevent accidental clicks and reduces the risk of falling for the scam later. Also, be sure to block phone numbers and texts that send spam or scam messages, reducing future risk.7. Register your number with the National Do Not Call Registry: While this won't stop all scams, it can help reduce unwanted communications.8. Don't provide any personal or financial information: Never share your Social Security number, driver's license number, banking information, or passwords in response to an unsolicited text.9. If you clicked the link or gave out information, act quickly: If you accidentally entered personal or financial information, contact your bank, credit card provider or local law enforcement right away to minimize potential damage.10. Keep your phone's security features updated: Ensure your device's operating system and security software are current to help block known scam numbers and malicious links.11. Report the scam: Forward the message to 7726to alert your mobile provider and help block similar messages in the future. Mark the message as junk or spam within your messaging app, if possible. File a complaint with the Federal Trade Commission at reportfraud.ftc.gov or the FBI's Internet Crime Complaint Center at ic3.gov.Kurt’s key takeawaysScam texts pretending to be from the DMV are getting more convincing, but you don't have to be their next victim. Staying skeptical of urgent messages, double-checking anything that seems off and never clicking suspicious links can go a long way in protecting your personal information. Remember, the real DMV will never pressure you for payment or sensitive details over text. By staying alert, you can help prevent these scams and keep your personal information and money secure.CLICK HERE TO GET THE FOX NEWS APPShould tech companies and telecom providers be doing more to protect you from scam texts, or does the responsibility ultimately fall on you to keep your digital life safe? Let us know by writing to us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#massive #dmv #phishing #scam #tricksMassive DMV phishing scam tricks drivers with fake textsPublished June 7, 2025 10:00am EDT close Tennessee DMV experiencing long lines ahead of REAL ID deadline May 7 is the deadline to get a REAL ID, and some DMVs are facing large crowds and major backup. FOX's Asher Reed spoke with FOX 35 Orlando from outside a DMV in Antioch, Tennessee, with more on the issue. NEWYou can now listen to Fox News articles! If you've received a text message claiming to be from your state's Department of Motor Vehiclesand threatening you with fines or penalties unless you pay up, you're not alone. A new wave of scam texts is sweeping across the country, targeting drivers in states like Connecticut, Pennsylvania, Georgia, Florida, New York, California, Illinois, New Jersey, Virginia, Colorado, Vermont, Texas, North Carolina and even Washington, D.C.These messages look official and urgent, warning you about supposed unpaid tickets or tolls and demanding immediate payment. But don't be fooled, as these texts are sophisticated scams designed to steal your personal information or money. The scammers are getting better at making their messages look real, so it can be tricky to spot the fraud. But with a few simple tips, you can learn how to recognize these scams and protect yourself before you click or respond. DMV scam text.How the DMV scam text message worksThese scam messages vary slightly depending on the state you're in, but they’re generally structured in the same way. The text threatens consequences, such as credit score damage, revoked driving privileges, suspended vehicle registration or increased toll fees, if you do not pay the bill you have supposedly incurred. To make the message appear legit, the scammers often include a date for penalties to begin, a fake administrative code and a link that appears to be an official DMV website.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEPro tip: If you're instructed to copy the link into your browser rather than clicking it directly, it's a scam. A person receiving a scam text message on their phone.Why DMV text scams are so convincingThe scam relies on two key elements to be effective: fear and a sense of urgency. These are two powerful psychological motivators that can send you into a panic since your driving privileges are at risk, or you're facing financial consequences. The aim is to get you to act hastily without pausing to verify the source. The messages also mimic legitimate government communications by including familiar terms, official-sounding codes and web addresses that appear authentic. Here is an example of what the text might look like: DMV scam text.States known to have issued warnings about DMV scam texts:ConnecticutPennsylvaniaGeorgiaFloridaNew YorkCaliforniaIllinoisNew JerseyVirginiaColoradoVermontTexasNorth CarolinaWashington, D.C.Reports are surfacing across the U.S., and the list of affected states is likely to continue growing as more residents come forward.How to spot and avoid DMV text message scamsIf you receive a suspicious text message claiming to be from your state's DMV and demanding payment or personal information, follow these steps to protect yourself:1. Be skeptical of any message creating urgency or panic: Scammers rely on fear and urgency to trick you into acting without thinking. If a message pressures you to act immediately, that's a major red flag.2. Check for obvious red flags: Look for signs like strange sender addresses, awkward language, misspellings or links that don't match your state's official DMV website.3. Do not click any links or reply, and use strong antivirus software: Legitimate DMVs will not ask for payments, personal details or sensitive information via unsolicited text messages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Verify directly with your DMV: If you're concerned the message might be real, contact your state's DMV using the official website or a trusted phone number. Never use the contact information provided in the suspicious text.5. Consider a Personal Data Removal Service: Your personal information is widely available online, which can make you a bigger target for these types of scams, therefore you might look into a personal data removal service. These services work by submitting opt-out requests to data brokers that collect and sell your information, helping to reduce your digital footprint and making it harder for scammers to find your contact details. GET FOX BUSINESS ON THE GO BY CLICKING HEREWhile no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6. Delete the message immediately and block the sender: Removing the text helps prevent accidental clicks and reduces the risk of falling for the scam later. Also, be sure to block phone numbers and texts that send spam or scam messages, reducing future risk.7. Register your number with the National Do Not Call Registry: While this won't stop all scams, it can help reduce unwanted communications.8. Don't provide any personal or financial information: Never share your Social Security number, driver's license number, banking information, or passwords in response to an unsolicited text.9. If you clicked the link or gave out information, act quickly: If you accidentally entered personal or financial information, contact your bank, credit card provider or local law enforcement right away to minimize potential damage.10. Keep your phone's security features updated: Ensure your device's operating system and security software are current to help block known scam numbers and malicious links.11. Report the scam: Forward the message to 7726to alert your mobile provider and help block similar messages in the future. Mark the message as junk or spam within your messaging app, if possible. File a complaint with the Federal Trade Commission at reportfraud.ftc.gov or the FBI's Internet Crime Complaint Center at ic3.gov.Kurt’s key takeawaysScam texts pretending to be from the DMV are getting more convincing, but you don't have to be their next victim. Staying skeptical of urgent messages, double-checking anything that seems off and never clicking suspicious links can go a long way in protecting your personal information. Remember, the real DMV will never pressure you for payment or sensitive details over text. By staying alert, you can help prevent these scams and keep your personal information and money secure.CLICK HERE TO GET THE FOX NEWS APPShould tech companies and telecom providers be doing more to protect you from scam texts, or does the responsibility ultimately fall on you to keep your digital life safe? Let us know by writing to us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #massive #dmv #phishing #scam #tricksWWW.FOXNEWS.COMMassive DMV phishing scam tricks drivers with fake textsPublished June 7, 2025 10:00am EDT close Tennessee DMV experiencing long lines ahead of REAL ID deadline May 7 is the deadline to get a REAL ID, and some DMVs are facing large crowds and major backup. FOX's Asher Reed spoke with FOX 35 Orlando from outside a DMV in Antioch, Tennessee, with more on the issue. NEWYou can now listen to Fox News articles! If you've received a text message claiming to be from your state's Department of Motor Vehicles (DMV) and threatening you with fines or penalties unless you pay up, you're not alone. A new wave of scam texts is sweeping across the country, targeting drivers in states like Connecticut, Pennsylvania, Georgia, Florida, New York, California, Illinois, New Jersey, Virginia, Colorado, Vermont, Texas, North Carolina and even Washington, D.C.These messages look official and urgent, warning you about supposed unpaid tickets or tolls and demanding immediate payment. But don't be fooled, as these texts are sophisticated scams designed to steal your personal information or money. The scammers are getting better at making their messages look real, so it can be tricky to spot the fraud. But with a few simple tips, you can learn how to recognize these scams and protect yourself before you click or respond. DMV scam text. (Kurt "CyberGuy" Knutsson)How the DMV scam text message worksThese scam messages vary slightly depending on the state you're in, but they’re generally structured in the same way. The text threatens consequences, such as credit score damage, revoked driving privileges, suspended vehicle registration or increased toll fees, if you do not pay the bill you have supposedly incurred. To make the message appear legit, the scammers often include a date for penalties to begin, a fake administrative code and a link that appears to be an official DMV website.FBI WARNS OF SCAM TARGETING VICTIMS WITH FAKE HOSPITALS AND POLICEPro tip: If you're instructed to copy the link into your browser rather than clicking it directly, it's a scam. A person receiving a scam text message on their phone. (Kurt "CyberGuy" Knutsson)Why DMV text scams are so convincingThe scam relies on two key elements to be effective: fear and a sense of urgency. These are two powerful psychological motivators that can send you into a panic since your driving privileges are at risk, or you're facing financial consequences. The aim is to get you to act hastily without pausing to verify the source. The messages also mimic legitimate government communications by including familiar terms, official-sounding codes and web addresses that appear authentic. Here is an example of what the text might look like: DMV scam text. (Kurt "CyberGuy" Knutsson)States known to have issued warnings about DMV scam texts (as of June 2025):ConnecticutPennsylvaniaGeorgiaFloridaNew YorkCaliforniaIllinoisNew JerseyVirginiaColoradoVermontTexasNorth CarolinaWashington, D.C.Reports are surfacing across the U.S., and the list of affected states is likely to continue growing as more residents come forward.How to spot and avoid DMV text message scamsIf you receive a suspicious text message claiming to be from your state's DMV and demanding payment or personal information, follow these steps to protect yourself:1. Be skeptical of any message creating urgency or panic: Scammers rely on fear and urgency to trick you into acting without thinking. If a message pressures you to act immediately, that's a major red flag.2. Check for obvious red flags: Look for signs like strange sender addresses, awkward language, misspellings or links that don't match your state's official DMV website.3. Do not click any links or reply, and use strong antivirus software: Legitimate DMVs will not ask for payments, personal details or sensitive information via unsolicited text messages. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Verify directly with your DMV: If you're concerned the message might be real, contact your state's DMV using the official website or a trusted phone number. Never use the contact information provided in the suspicious text.5. Consider a Personal Data Removal Service: Your personal information is widely available online, which can make you a bigger target for these types of scams, therefore you might look into a personal data removal service. These services work by submitting opt-out requests to data brokers that collect and sell your information, helping to reduce your digital footprint and making it harder for scammers to find your contact details. GET FOX BUSINESS ON THE GO BY CLICKING HEREWhile no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.6. Delete the message immediately and block the sender: Removing the text helps prevent accidental clicks and reduces the risk of falling for the scam later. Also, be sure to block phone numbers and texts that send spam or scam messages, reducing future risk.7. Register your number with the National Do Not Call Registry: While this won't stop all scams, it can help reduce unwanted communications.8. Don't provide any personal or financial information: Never share your Social Security number, driver's license number, banking information, or passwords in response to an unsolicited text.9. If you clicked the link or gave out information, act quickly: If you accidentally entered personal or financial information, contact your bank, credit card provider or local law enforcement right away to minimize potential damage.10. Keep your phone's security features updated: Ensure your device's operating system and security software are current to help block known scam numbers and malicious links.11. Report the scam: Forward the message to 7726 (SPAM) to alert your mobile provider and help block similar messages in the future. Mark the message as junk or spam within your messaging app, if possible. File a complaint with the Federal Trade Commission at reportfraud.ftc.gov or the FBI's Internet Crime Complaint Center at ic3.gov.Kurt’s key takeawaysScam texts pretending to be from the DMV are getting more convincing, but you don't have to be their next victim. Staying skeptical of urgent messages, double-checking anything that seems off and never clicking suspicious links can go a long way in protecting your personal information. Remember, the real DMV will never pressure you for payment or sensitive details over text. By staying alert, you can help prevent these scams and keep your personal information and money secure.CLICK HERE TO GET THE FOX NEWS APPShould tech companies and telecom providers be doing more to protect you from scam texts, or does the responsibility ultimately fall on you to keep your digital life safe? Let us know by writing to us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. -
Major data broker hack impacts 364,000 individuals’ data
Published
June 5, 2025 10:00am EDT close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. NEWYou can now listen to Fox News articles!
Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. A hacker at workLexisNexis breach went undetected for months after holiday hackLexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSA spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. An individual working on their laptopWhy the LexisNexis hack is a bigger threat than you realizeLexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. A hacker at work7 expert tips to protect your personal data after a data broker breachKeeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers. You might switch to a more private search enginethat doesn’t log your queries. Consider using a browser’s "incognito" or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups. Only download apps from official stores and check app permissions.6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.Kurt’s key takeawayFor many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.CLICK HERE TO GET THE FOX NEWS APPShould companies be allowed to sell your personal information without your consent? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#major #data #broker #hack #impactsMajor data broker hack impacts 364,000 individuals’ dataPublished June 5, 2025 10:00am EDT close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. NEWYou can now listen to Fox News articles! Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. A hacker at workLexisNexis breach went undetected for months after holiday hackLexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSA spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. An individual working on their laptopWhy the LexisNexis hack is a bigger threat than you realizeLexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. A hacker at work7 expert tips to protect your personal data after a data broker breachKeeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers. You might switch to a more private search enginethat doesn’t log your queries. Consider using a browser’s "incognito" or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups. Only download apps from official stores and check app permissions.6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.Kurt’s key takeawayFor many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.CLICK HERE TO GET THE FOX NEWS APPShould companies be allowed to sell your personal information without your consent? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #major #data #broker #hack #impactsWWW.FOXNEWS.COMMajor data broker hack impacts 364,000 individuals’ dataPublished June 5, 2025 10:00am EDT close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. NEWYou can now listen to Fox News articles! Americans’ personal data is now spread across more digital platforms than ever. From online shopping habits to fitness tracking logs, personal information ends up in hundreds of company databases. While most people worry about social media leaks or email hacks, a far less visible threat comes from data brokers.I still find it hard to believe that companies like this are allowed to operate with so little legal scrutiny. These firms trade in personal information without our knowledge or consent. What baffles me even more is that they aren’t serious about protecting the one thing that is central to their business model: data. Just last year, we saw news of a massive data breach at a data broker called National Public Data, which exposed 2.7 billion records. And now another data broker, LexisNexis, a major name in the industry, has reported a significant breach that exposed sensitive information from more than 364,000 people. A hacker at work (Kurt "CyberGuy" Knutsson)LexisNexis breach went undetected for months after holiday hackLexisNexis filed a notice with the Maine attorney general revealing that a hacker accessed consumer data through a third-party software development platform. The breach happened on Dec. 25, 2024, but the company only discovered it months later. LexisNexis was alerted on April 1, 2025, by an unnamed individual who claimed to have found sensitive files. It remains unclear whether this person was responsible for the breach or merely came across the exposed data.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSA spokesperson for LexisNexis confirmed that the hacker gained access to the company’s GitHub account. This is a platform commonly used by developers to store and collaborate on code. Security guidelines repeatedly warn against storing sensitive information in such repositories; however, mistakes such as exposed access tokens and personal data files continue to occur.The stolen data varies from person to person but includes full names, birthdates, phone numbers, mailing and email addresses, Social Security numbers and driver's license numbers. LexisNexis has not confirmed whether it received any ransom demand or had further contact with the attacker. An individual working on their laptop (Kurt "CyberGuy" Knutsson)Why the LexisNexis hack is a bigger threat than you realizeLexisNexis isn’t a household name for most people, but it plays a major role in how personal data is harvested and used behind the scenes. The company pulls information from a wide range of sources, compiling detailed profiles that help other businesses assess risk and detect fraud. Its clients include banks, insurance companies and government agencies.In 2023, the New York Times reported that several car manufacturers had been sharing driving data with LexisNexis without notifying vehicle owners. That information was then sold to insurance companies, which used it to adjust premiums based on individual driving behavior. The story made one thing clear. LexisNexis has access to a staggering amount of personal detail, even from people who have never willingly engaged with the company.Law enforcement also uses LexisNexis tools to dig up information on suspects. These systems offer access to phone records, home addresses and other historical data. While such tools might assist in investigations, they also highlight a serious issue. When this much sensitive information is concentrated in one place, it becomes a single point of failure. And as the recent breach shows, that failure is no longer hypothetical. A hacker at work (Kurt "CyberGuy" Knutsson)7 expert tips to protect your personal data after a data broker breachKeeping your personal data safe online can feel overwhelming, but a few practical steps can make a big difference in protecting your privacy and reducing your digital footprint. Here are 7 effective ways to take control of your information and keep it out of the wrong hands:1. Remove your data from the internet: The most effective way to take control of your data and avoid data brokers from selling it is to opt for data removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Review privacy settings: Take a few minutes to explore the privacy and security settings on the services you use. For example, limit who can see your social media posts, disable unnecessary location-sharing on your phone and consider turning off ad personalization on accounts like Google and Facebook. Most browsers let you block third-party cookies or clear tracking data. The FTC suggests comparing the privacy notices of different sites and apps and choosing ones that let you opt out of sharing when possible.3. Use privacy-friendly tools: Install browser extensions or plugins that block ads and trackers (such as uBlock Origin or Privacy Badger). You might switch to a more private search engine (like DuckDuckGo or Brave) that doesn’t log your queries. Consider using a browser’s "incognito" or private mode when you don’t want your history saved, and regularly clear your cookies and cache. Even small habits, like logging out of accounts when not in use or using a password manager, make you less trackable.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Beware of phishing links and use strong antivirus software: Scammers may try to get access to your financial details and other important data using phishing links. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Be cautious with personal data: Think twice before sharing extra details. Don’t fill out online surveys or quizzes that ask for personal or financial information unless you trust the source. Create separate email addresses for sign-ups (so marketing emails don’t go to your main inbox). Only download apps from official stores and check app permissions.6. Opt out of data broker lists: Many data brokers offer ways to opt out or delete your information, though it can be a tedious process. For example, there are sites like Privacy Rights Clearinghouse or the Whitepages opt-out page that list popular brokers and their opt-out procedures. The FTC’s consumer guide, "Your Guide to Protecting Your Privacy Online," includes tips on opting out of targeted ads and removing yourself from people-search databases. Keep in mind you may have to repeat this every few months.7. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.Kurt’s key takeawayFor many, the LexisNexis breach may be the first time they realize just how much of their data is in circulation. Unlike a social media platform or a bank, there is no clear customer relationship with a data broker, and that makes it harder to demand transparency. This incident should prompt serious discussion around what kind of oversight is necessary in industries that operate in the shadows. A more informed public and stronger regulation may be the only things standing between personal data and permanent exposure.CLICK HERE TO GET THE FOX NEWS APPShould companies be allowed to sell your personal information without your consent? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. -
AI robots help nurses beat burnout and transform hospital care
Tech AI robots help nurses beat burnout and transform hospital care Hospitals using AI-powered robots to support nurses, redefine patient care
Published
June 4, 2025 6:00am EDT close AI robots help nurses beat burnout and transform hospital care Artificial intelligence and robotics may help with nursing shortage. NEWYou can now listen to Fox News articles!
The global healthcare system is expected to face a shortage of 4.5 million nurses by 2030, with burnout identified as a leading cause for this deficit. In response, Taiwan's hospitals are taking decisive action by integrating artificial intelligence and robotics to support their staff and maintain high standards of patient care. AI-powered NurabotNurabot: The AI nursing robot changing patient careNurabot, a collaborative nursing robot developed by Foxconn and Kawasaki Heavy Industries with Nvidia's AI technology, is designed to take on some of the most physically demanding and repetitive tasks in clinical care. These include delivering medications, transporting samples, patrolling wards and guiding visitors through hospital corridors. By handling these responsibilities, Nurabot allows nurses to focus on more meaningful aspects of patient care and helps reduce the physical fatigue that often leads to burnout. AI-powered NurabotUsing AI to build the hospitals of the futureFoxconn's approach to smart hospitals goes beyond deploying robots. The company has developed a suite of digital tools using Nvidia platforms, including AI models that monitor patient vitals and digital twins that simulate hospital environments for planning and training purposes.The process starts in the data center, where large AI models are trained on Nvidia supercomputers. Hospitals then use digital twins to test and train robots in virtual settings before deploying them in real-world scenarios, ensuring that these systems are both safe and effective.ARTIFICIAL INTELLIGENCE TRANSFORMS PATIENT CARE AND REDUCES BURNOUT, PHYSICIAN SAYS AI-powered NurabotAI robots in real hospitals: Results from Taiwan's Healthcare SystemTaichung Veterans General Hospital, along with other top hospitals in Taiwan, is at the forefront of this digital transformation. TCVGH has built digital twins of its wards and nursing stations, providing a virtual training ground for Nurabot before it is introduced to real hospital floors. According to Shu-Fang Liu, deputy director of the nursing department at TCVGH, robots like Nurabot are augmenting the capabilities of healthcare staff, enabling them to deliver more focused and meaningful care to patients. AI-powered NurabotWays Nurabot reduces nurse burnout and boosts efficiencyNurabot is already making a difference in daily hospital operations. The robot handles medicine deliveries, ward patrols and visitor guidance, which Foxconn estimates can reduce nurse workloads by up to 30%. In one ward, Nurabot delivers wound care kits and educational materials directly to patient bedsides, saving nurses multiple trips to supply rooms and allowing them to dedicate more time to their patients. The robot is also especially helpful during visiting hours and night shifts, when staffing levels are typically lower.Nurses hope future versions of Nurabot will be able to converse with patients in multiple languages, recognize faces for personalized interactions and even assist with lifting patients when needed. For example, a lung patient who needs two nurses to sit up for breathing exercises might only require one nurse with Nurabot's help, freeing the other to care for other patients. AI-powered NurabotKurt's key takeawaysWhen it comes to addressing the nursing shortage, Taiwan is demonstrating that AI and robotics can make a significant difference in hospitals. Instead of spending their shifts running errands or handling repetitive tasks, nurses now have robots like Nurabot to lend a hand. This means nurses can focus their energy on what matters most – caring for patients – while robots handle tasks such as delivering medication or guiding visitors around the hospital.It's a team effort between people and technology, and it's already helping healthcare staff provide better care for everyone.CLICK HERE TO GET THE FOX NEWS APPHow would you feel if a robot, not a human, delivered your medication during a hospital stay? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#robots #help #nurses #beat #burnoutAI robots help nurses beat burnout and transform hospital careTech AI robots help nurses beat burnout and transform hospital care Hospitals using AI-powered robots to support nurses, redefine patient care Published June 4, 2025 6:00am EDT close AI robots help nurses beat burnout and transform hospital care Artificial intelligence and robotics may help with nursing shortage. NEWYou can now listen to Fox News articles! The global healthcare system is expected to face a shortage of 4.5 million nurses by 2030, with burnout identified as a leading cause for this deficit. In response, Taiwan's hospitals are taking decisive action by integrating artificial intelligence and robotics to support their staff and maintain high standards of patient care. AI-powered NurabotNurabot: The AI nursing robot changing patient careNurabot, a collaborative nursing robot developed by Foxconn and Kawasaki Heavy Industries with Nvidia's AI technology, is designed to take on some of the most physically demanding and repetitive tasks in clinical care. These include delivering medications, transporting samples, patrolling wards and guiding visitors through hospital corridors. By handling these responsibilities, Nurabot allows nurses to focus on more meaningful aspects of patient care and helps reduce the physical fatigue that often leads to burnout. AI-powered NurabotUsing AI to build the hospitals of the futureFoxconn's approach to smart hospitals goes beyond deploying robots. The company has developed a suite of digital tools using Nvidia platforms, including AI models that monitor patient vitals and digital twins that simulate hospital environments for planning and training purposes.The process starts in the data center, where large AI models are trained on Nvidia supercomputers. Hospitals then use digital twins to test and train robots in virtual settings before deploying them in real-world scenarios, ensuring that these systems are both safe and effective.ARTIFICIAL INTELLIGENCE TRANSFORMS PATIENT CARE AND REDUCES BURNOUT, PHYSICIAN SAYS AI-powered NurabotAI robots in real hospitals: Results from Taiwan's Healthcare SystemTaichung Veterans General Hospital, along with other top hospitals in Taiwan, is at the forefront of this digital transformation. TCVGH has built digital twins of its wards and nursing stations, providing a virtual training ground for Nurabot before it is introduced to real hospital floors. According to Shu-Fang Liu, deputy director of the nursing department at TCVGH, robots like Nurabot are augmenting the capabilities of healthcare staff, enabling them to deliver more focused and meaningful care to patients. AI-powered NurabotWays Nurabot reduces nurse burnout and boosts efficiencyNurabot is already making a difference in daily hospital operations. The robot handles medicine deliveries, ward patrols and visitor guidance, which Foxconn estimates can reduce nurse workloads by up to 30%. In one ward, Nurabot delivers wound care kits and educational materials directly to patient bedsides, saving nurses multiple trips to supply rooms and allowing them to dedicate more time to their patients. The robot is also especially helpful during visiting hours and night shifts, when staffing levels are typically lower.Nurses hope future versions of Nurabot will be able to converse with patients in multiple languages, recognize faces for personalized interactions and even assist with lifting patients when needed. For example, a lung patient who needs two nurses to sit up for breathing exercises might only require one nurse with Nurabot's help, freeing the other to care for other patients. AI-powered NurabotKurt's key takeawaysWhen it comes to addressing the nursing shortage, Taiwan is demonstrating that AI and robotics can make a significant difference in hospitals. Instead of spending their shifts running errands or handling repetitive tasks, nurses now have robots like Nurabot to lend a hand. This means nurses can focus their energy on what matters most – caring for patients – while robots handle tasks such as delivering medication or guiding visitors around the hospital.It's a team effort between people and technology, and it's already helping healthcare staff provide better care for everyone.CLICK HERE TO GET THE FOX NEWS APPHow would you feel if a robot, not a human, delivered your medication during a hospital stay? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #robots #help #nurses #beat #burnoutWWW.FOXNEWS.COMAI robots help nurses beat burnout and transform hospital careTech AI robots help nurses beat burnout and transform hospital care Hospitals using AI-powered robots to support nurses, redefine patient care Published June 4, 2025 6:00am EDT close AI robots help nurses beat burnout and transform hospital care Artificial intelligence and robotics may help with nursing shortage. NEWYou can now listen to Fox News articles! The global healthcare system is expected to face a shortage of 4.5 million nurses by 2030, with burnout identified as a leading cause for this deficit. In response, Taiwan's hospitals are taking decisive action by integrating artificial intelligence and robotics to support their staff and maintain high standards of patient care. AI-powered Nurabot (Nvidia)Nurabot: The AI nursing robot changing patient careNurabot, a collaborative nursing robot developed by Foxconn and Kawasaki Heavy Industries with Nvidia's AI technology, is designed to take on some of the most physically demanding and repetitive tasks in clinical care. These include delivering medications, transporting samples, patrolling wards and guiding visitors through hospital corridors. By handling these responsibilities, Nurabot allows nurses to focus on more meaningful aspects of patient care and helps reduce the physical fatigue that often leads to burnout. AI-powered Nurabot (Nvidia)Using AI to build the hospitals of the futureFoxconn's approach to smart hospitals goes beyond deploying robots. The company has developed a suite of digital tools using Nvidia platforms, including AI models that monitor patient vitals and digital twins that simulate hospital environments for planning and training purposes.The process starts in the data center, where large AI models are trained on Nvidia supercomputers. Hospitals then use digital twins to test and train robots in virtual settings before deploying them in real-world scenarios, ensuring that these systems are both safe and effective.ARTIFICIAL INTELLIGENCE TRANSFORMS PATIENT CARE AND REDUCES BURNOUT, PHYSICIAN SAYS AI-powered Nurabot (Nvidia)AI robots in real hospitals: Results from Taiwan's Healthcare SystemTaichung Veterans General Hospital (TCVGH), along with other top hospitals in Taiwan, is at the forefront of this digital transformation. TCVGH has built digital twins of its wards and nursing stations, providing a virtual training ground for Nurabot before it is introduced to real hospital floors. According to Shu-Fang Liu, deputy director of the nursing department at TCVGH, robots like Nurabot are augmenting the capabilities of healthcare staff, enabling them to deliver more focused and meaningful care to patients. AI-powered Nurabot (Nvidia)Ways Nurabot reduces nurse burnout and boosts efficiencyNurabot is already making a difference in daily hospital operations. The robot handles medicine deliveries, ward patrols and visitor guidance, which Foxconn estimates can reduce nurse workloads by up to 30%. In one ward, Nurabot delivers wound care kits and educational materials directly to patient bedsides, saving nurses multiple trips to supply rooms and allowing them to dedicate more time to their patients. The robot is also especially helpful during visiting hours and night shifts, when staffing levels are typically lower.Nurses hope future versions of Nurabot will be able to converse with patients in multiple languages, recognize faces for personalized interactions and even assist with lifting patients when needed. For example, a lung patient who needs two nurses to sit up for breathing exercises might only require one nurse with Nurabot's help, freeing the other to care for other patients. AI-powered Nurabot (Nvidia)Kurt's key takeawaysWhen it comes to addressing the nursing shortage, Taiwan is demonstrating that AI and robotics can make a significant difference in hospitals. Instead of spending their shifts running errands or handling repetitive tasks, nurses now have robots like Nurabot to lend a hand. This means nurses can focus their energy on what matters most – caring for patients – while robots handle tasks such as delivering medication or guiding visitors around the hospital.It's a team effort between people and technology, and it's already helping healthcare staff provide better care for everyone.CLICK HERE TO GET THE FOX NEWS APPHow would you feel if a robot, not a human, delivered your medication during a hospital stay? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. -
Adidas data breach reveals customer info in vendor attack
Published
June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles!
Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft. An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#adidas #data #breach #reveals #customerAdidas data breach reveals customer info in vendor attackPublished June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at workAdidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft. An Adidas signWhat Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harmbeing caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #adidas #data #breach #reveals #customerWWW.FOXNEWS.COMAdidas data breach reveals customer info in vendor attackPublished June 4, 2025 10:00am EDT close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt "CyberGuy" Knutsson explains how to keep your Windows computer safe and the security risks of online retail giant Temu. NEWYou can now listen to Fox News articles! Hackers are no longer targeting only tech giants or hospitals. Any business that collects valuable personal information, such as names, phone numbers, email addresses or even basic financial details, is now a target.Companies that rely heavily on third-party vendors or outsourced customer support are even more at risk, especially if they are not particularly strong in the technology sector.German retailer Adidas learned this the hard way. The company recently confirmed a data breach involving one of its external partners, and although it has acknowledged the issue, many important details are still missing. A hacker at work (Kurt "CyberGuy" Knutsson)Adidas confirms vendor breach: Here’s what we knowAdidas has officially acknowledged that a third-party vendor suffered a breach, resulting in unauthorized access to consumer data. In a public notice titled "Data Security Information," the company revealed that a "third-party customer service provider" had been compromised. While the brand was initially silent on the scope, it had already been reported earlier this month that customers in Turkey and Korea had received breach notifications.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSAdidas posted this information on both its German and English websites. However, no specific region or number of affected individuals has been confirmed. The company’s statement did clarify that no payment information, such as credit card details, nor passwords were included in the breach. Instead, it involved contact details submitted by users to Adidas’ help desk in the past.Data obtained reportedly includes names, phone numbers, email addresses and dates of birth. While this might seem limited compared to financial data, this type of information can be exploited for phishing scams and identity theft. An Adidas sign (Kurt "CyberGuy" Knutsson)What Adidas told customers after the breachIn the wake of the breach, Adidas began notifying potentially affected customers directly. The company's email to customers below aimed to reassure recipients and clarify what information was involved. Here is the full text of the notification sent to affected individuals.Dear customer,We are writing to inform you of an issue that we recently became aware of which may have impacted some of your data.What happenedadidas recently learned that an unauthorized external party gained access to certain customer data through a third-party customer service provider.What information was involvedThe affected data does not contain passwords, credit card or any other payment-related information. Nor have any Social Security numbers been impacted.It mainly consists of contact information relating to customers who had contacted our customer service help desk in the past. This may have included one or more of the following: name, email address, telephone number, gender and/or birth date.What we are doing Privacy and the security of your data is our priority. Upon becoming aware of this incident, adidas took proactive and immediate steps to investigate and contain the incident. This includes further enhancing security measures and resetting passwords for customer service accounts.What you can doWe are currently unaware of any harm (such as identity theft or fraud) being caused to our customers as a result of this incident. There are no immediate steps that you need to take. Although, as always, please remain vigilant and look out for any suspicious messages. As a reminder, adidas will never directly contact you to ask that you provide us with financial information, such as your credit card details, bank account information or passwords.Who you can contactIf you have any questions, then please contact our Customer Service team at https://www.adidas.com/us/helpWe apologise for any inconvenience caused by this incident.adidas TeamWhat Adidas hasn’t said about the vendor hackDespite the official acknowledgment, several questions remain unanswered. Adidas has yet to clarify whether this is a single breach affecting multiple regions or several separate incidents. The lack of transparency around the name of the third-party vendor and the absence of concrete numbers or locations for affected users has created frustration among observers and possibly among customers themselves.The earlier regional reports from Turkey and Korea might suggest that this incident was either global in scale or that similar third-party vendors were independently targeted. In either case, the company's current handling of the situation has left room for speculation. Adidas claims it is in the process of informing potentially affected customers, but it has not detailed the method or timeline for this outreach.We reached out to adidas for a comment, and a representative referred us to this statement on their website. In part, the company said, "We remain fully committed to protecting the privacy and security of our consumers, and sincerely regret any inconvenience or concern caused by this incident."GET FOX BUSINESS ON THE GO BY CLICKING HERE An Adidas shoe (Kurt "CyberGuy" Knutsson)6 critical steps to take after the Adidas data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Adidas data breach:1. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Adidas breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.2. Watch out for phishing scams and use strong antivirus software: With access to your email and phone number, Adidas attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Adidas breach. This makes you a prime target for identity theft. You might want to consider investing in identity theft protection, which can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit.5. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.6. Be wary of social engineering attacks: Hackers may use stolen details like names or birthdates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key.Kurt’s key takeawayThe Adidas breach shows that even companies with decades of brand equity and a massive global footprint are not immune to lapses in data security. It underscores the need for companies to go beyond basic compliance and actively evaluate the cybersecurity standards of every partner in their ecosystem. Consumers are becoming increasingly aware of the trade-offs they make when sharing their personal information, and brands that fail to meet this moment may find their reputations eroding faster than they expect.CLICK HERE TO GET THE FOX NEWS APPShould retailers be penalized for neglecting basic cybersecurity practices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. -
Spot fake online stores, avoid Facebook subscription scams
Published
June 2, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give tips on how to avoid them. NEWYou can now listen to Fox News articles!
Given the number of phishing scams we have all faced over the past decade, most of us have developed a basic skill to spot and avoid obvious phishing emails or SMS messages. Cybercriminals are aware of this, and they have evolved their tactics by shifting to more complex and convincing schemes designed to bypass skepticism and lure victims.Their goal remains the same: to trick you into handing over sensitive information, especially credit card data. One of the latest examples is the rise in subscription scam campaigns. Scammers are creating incredibly convincing websites selling everything from shoes and clothes to electronics, tricking people into signing up for monthly subscriptions and willingly providing their credit card information. Facebook is being used as the primary platform to promote these new and sophisticated scams. A woman shopping onlineWhat you need to knowBitdefender researchers have uncovered a massive and highly coordinated subscription scam campaign involving more than 200 active websites designed to look like real online stores. These sites, often promoted through Facebook ads, sell everything from clothes and electronics to beauty products, but the real goal is to trick users into signing up for recurring payments, often without realizing it.One of the most common lures is the "mystery box" scam, where you are promised a surprise package at a bargain price. These offers are made to look fun and harmless, but behind the scenes you are giving away personal and credit card information while unknowingly agreeing to hidden subscription terms, often written in tiny fine print.The scam doesn’t stop there. Once you’re convinced and reach the checkout page, scammers often layer in a second scam, like loyalty cards or VIP memberships that further lock you into payments. It’s all designed to confuse you, overwhelm you with supposed perks and make the scam feel like a good deal.Researchers found that many of these websites share a single Cyprus address, possibly tied to offshore entities linked to the Paradise Papers. Despite being spread across different categories and brand names, the sites often use the same layouts, AI agents and payment structures, all pointing to a centralized fraud network.Scammers frequently rotate the brands they impersonate and have started moving beyond mystery boxes, now peddling low-quality products, counterfeit goods, fake investment schemes, dubious supplements and more. To avoid automatic detection, they employ several tactics. These include running multiple versions of an ad, with only one of which is actually malicious while the others display harmless product images, uploading ad images from platforms like Google Drive so they can be swapped out later and cropping visuals to alter recognizable patterns. Listing fake productsThe scam is expandingWhat started with simple "mystery box" scams has grown into a sprawling, coordinated campaign. These scams now feature fake surveys, tiered "VIP" memberships and deceptive credit systems that make the purchase process intentionally confusing. Users are promised deep discounts or access to exclusive deals, but in reality they’re just being locked into recurring payments.Many of the scam websites trace back to the same physical address in Cyprus, pointing to what appears to be a centralized operation. Researchers also found links to entities mentioned in the Paradise Papers, suggesting these fraudsters are hiding behind offshore infrastructure.And it’s not just mystery boxes anymore. The same scam format is being used to sell low-quality goods, fake supplements and even bogus investment opportunities. With high-quality site design, aggressive advertising and increasingly sophisticated tactics, subscription scams are becoming the new face of online fraud. A person shopping online10 proactive measures to take to protect your dataEven as scammers become more sophisticated, there are practical steps you can take right now to protect your personal and financial information from subscription fraud and other online threats. Here are ten proactive measures to help keep your data safe:1) Always read the fine print: One of the simplest yet most effective ways to protect yourself from subscription scams is to slow down and read the fine print, especially on checkout pages. Scammers often hide recurring payment terms in small or lightly colored text that’s easy to miss. What seems like a one-time purchase could actually sign you up for a biweekly or monthly charge. Taking just a moment to scan for hidden terms before hitting "Pay" can help you avoid weeks of silent billing.2) Avoid mystery box or VIP-style deals: These offers often prey on curiosity and the promise of surprise or luxury for a low fee. In reality, the "mystery" is the trap: you might receive nothing or a low-quality item while being unknowingly enrolled in a recurring subscription. Scammers use the illusion of exclusivity or urgency to pressure quick decisions.3) Don’t trust ads blindly on social media: Facebook, Instagram and other platforms are a hotbed for these scams, with criminals running paid ads that mimic well-known brands or influencers. These ads often link to professional-looking but fake storefronts. If you’re interested in a deal you see online, don’t click through immediately. Instead, look up the brand or offer in a separate tab and check if it exists outside social media.4) Investigate before you buy: Before purchasing from any unfamiliar site, take a few quick steps to verify its legitimacy. Search the brand's name alongside words like "scam" or "reviews" to see what others have experienced. Look up the company's physical address and check if it actually exists using tools like Google Maps. Make sure the website uses HTTPS, review the site's contact information and cross-check reviews on trusted third-party sites like the Better Business Bureau or Consumer Reports.5) Use strong antivirus software: Adding a strong antivirus program to your devices can provide an extra layer of defense against fraudulent websites and phishing attempts. Strong antivirus software warns you about suspicious links, blocks malicious ads and scans downloads for malware. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Invest in personal data removal services: Scammers often rely on leaked or publicly available personal information to target victims with convincing subscription scams. Investing in a personal data removal service can help minimize your digital footprint by removing your information from data broker databases and reducing the chances of being targeted in future campaigns. Regularly monitoring and cleaning up your online presence makes it harder for fraudsters to exploit your data for financial gain. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.7) Be cautious with payment methods: Use secure payment options like credit cards, which often offer better fraud protection than wire transfers, gift cards or cryptocurrency.8) Limit personal information shared on social media: Scammers often gather details from public profiles to craft convincing scams. Review your privacy settings and only share necessary information.9) Use strong, unique passwords and enable multifactor authentication: Create strong, unique passwords for each of your online accounts, especially those tied to your finances or shopping. Enable multifactor authentication wherever possible, as this adds an extra layer of security and makes it harder for scammers to access your accounts, even if your password is compromised. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.10) Keep your devices and software updated: Regularly update your operating system, browsers and apps. Security updates often patch vulnerabilities that scammers exploit to gain access to your information or install malicious software.Kurt’s key takeawayWhile the rise of subscription scams and deceptive ads is concerning, it’s especially troubling that platforms like Facebook continue to allow these fraudulent ads to run unchecked. Facebook has repeatedly failed to adequately vet or prevent these malicious campaigns from reaching vulnerable individuals. The platform’s ad approval system should be more proactive in spotting and blocking ads promoting scams, particularly those that impersonate well-known brands or content creators. How do you feel about Facebook’s role in allowing scam ads to circulate? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#spot #fake #online #stores #avoidSpot fake online stores, avoid Facebook subscription scamsPublished June 2, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give tips on how to avoid them. NEWYou can now listen to Fox News articles! Given the number of phishing scams we have all faced over the past decade, most of us have developed a basic skill to spot and avoid obvious phishing emails or SMS messages. Cybercriminals are aware of this, and they have evolved their tactics by shifting to more complex and convincing schemes designed to bypass skepticism and lure victims.Their goal remains the same: to trick you into handing over sensitive information, especially credit card data. One of the latest examples is the rise in subscription scam campaigns. Scammers are creating incredibly convincing websites selling everything from shoes and clothes to electronics, tricking people into signing up for monthly subscriptions and willingly providing their credit card information. Facebook is being used as the primary platform to promote these new and sophisticated scams. A woman shopping onlineWhat you need to knowBitdefender researchers have uncovered a massive and highly coordinated subscription scam campaign involving more than 200 active websites designed to look like real online stores. These sites, often promoted through Facebook ads, sell everything from clothes and electronics to beauty products, but the real goal is to trick users into signing up for recurring payments, often without realizing it.One of the most common lures is the "mystery box" scam, where you are promised a surprise package at a bargain price. These offers are made to look fun and harmless, but behind the scenes you are giving away personal and credit card information while unknowingly agreeing to hidden subscription terms, often written in tiny fine print.The scam doesn’t stop there. Once you’re convinced and reach the checkout page, scammers often layer in a second scam, like loyalty cards or VIP memberships that further lock you into payments. It’s all designed to confuse you, overwhelm you with supposed perks and make the scam feel like a good deal.Researchers found that many of these websites share a single Cyprus address, possibly tied to offshore entities linked to the Paradise Papers. Despite being spread across different categories and brand names, the sites often use the same layouts, AI agents and payment structures, all pointing to a centralized fraud network.Scammers frequently rotate the brands they impersonate and have started moving beyond mystery boxes, now peddling low-quality products, counterfeit goods, fake investment schemes, dubious supplements and more. To avoid automatic detection, they employ several tactics. These include running multiple versions of an ad, with only one of which is actually malicious while the others display harmless product images, uploading ad images from platforms like Google Drive so they can be swapped out later and cropping visuals to alter recognizable patterns. Listing fake productsThe scam is expandingWhat started with simple "mystery box" scams has grown into a sprawling, coordinated campaign. These scams now feature fake surveys, tiered "VIP" memberships and deceptive credit systems that make the purchase process intentionally confusing. Users are promised deep discounts or access to exclusive deals, but in reality they’re just being locked into recurring payments.Many of the scam websites trace back to the same physical address in Cyprus, pointing to what appears to be a centralized operation. Researchers also found links to entities mentioned in the Paradise Papers, suggesting these fraudsters are hiding behind offshore infrastructure.And it’s not just mystery boxes anymore. The same scam format is being used to sell low-quality goods, fake supplements and even bogus investment opportunities. With high-quality site design, aggressive advertising and increasingly sophisticated tactics, subscription scams are becoming the new face of online fraud. A person shopping online10 proactive measures to take to protect your dataEven as scammers become more sophisticated, there are practical steps you can take right now to protect your personal and financial information from subscription fraud and other online threats. Here are ten proactive measures to help keep your data safe:1) Always read the fine print: One of the simplest yet most effective ways to protect yourself from subscription scams is to slow down and read the fine print, especially on checkout pages. Scammers often hide recurring payment terms in small or lightly colored text that’s easy to miss. What seems like a one-time purchase could actually sign you up for a biweekly or monthly charge. Taking just a moment to scan for hidden terms before hitting "Pay" can help you avoid weeks of silent billing.2) Avoid mystery box or VIP-style deals: These offers often prey on curiosity and the promise of surprise or luxury for a low fee. In reality, the "mystery" is the trap: you might receive nothing or a low-quality item while being unknowingly enrolled in a recurring subscription. Scammers use the illusion of exclusivity or urgency to pressure quick decisions.3) Don’t trust ads blindly on social media: Facebook, Instagram and other platforms are a hotbed for these scams, with criminals running paid ads that mimic well-known brands or influencers. These ads often link to professional-looking but fake storefronts. If you’re interested in a deal you see online, don’t click through immediately. Instead, look up the brand or offer in a separate tab and check if it exists outside social media.4) Investigate before you buy: Before purchasing from any unfamiliar site, take a few quick steps to verify its legitimacy. Search the brand's name alongside words like "scam" or "reviews" to see what others have experienced. Look up the company's physical address and check if it actually exists using tools like Google Maps. Make sure the website uses HTTPS, review the site's contact information and cross-check reviews on trusted third-party sites like the Better Business Bureau or Consumer Reports.5) Use strong antivirus software: Adding a strong antivirus program to your devices can provide an extra layer of defense against fraudulent websites and phishing attempts. Strong antivirus software warns you about suspicious links, blocks malicious ads and scans downloads for malware. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Invest in personal data removal services: Scammers often rely on leaked or publicly available personal information to target victims with convincing subscription scams. Investing in a personal data removal service can help minimize your digital footprint by removing your information from data broker databases and reducing the chances of being targeted in future campaigns. Regularly monitoring and cleaning up your online presence makes it harder for fraudsters to exploit your data for financial gain. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.7) Be cautious with payment methods: Use secure payment options like credit cards, which often offer better fraud protection than wire transfers, gift cards or cryptocurrency.8) Limit personal information shared on social media: Scammers often gather details from public profiles to craft convincing scams. Review your privacy settings and only share necessary information.9) Use strong, unique passwords and enable multifactor authentication: Create strong, unique passwords for each of your online accounts, especially those tied to your finances or shopping. Enable multifactor authentication wherever possible, as this adds an extra layer of security and makes it harder for scammers to access your accounts, even if your password is compromised. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.10) Keep your devices and software updated: Regularly update your operating system, browsers and apps. Security updates often patch vulnerabilities that scammers exploit to gain access to your information or install malicious software.Kurt’s key takeawayWhile the rise of subscription scams and deceptive ads is concerning, it’s especially troubling that platforms like Facebook continue to allow these fraudulent ads to run unchecked. Facebook has repeatedly failed to adequately vet or prevent these malicious campaigns from reaching vulnerable individuals. The platform’s ad approval system should be more proactive in spotting and blocking ads promoting scams, particularly those that impersonate well-known brands or content creators. How do you feel about Facebook’s role in allowing scam ads to circulate? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #spot #fake #online #stores #avoidWWW.FOXNEWS.COMSpot fake online stores, avoid Facebook subscription scamsPublished June 2, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give tips on how to avoid them. NEWYou can now listen to Fox News articles! Given the number of phishing scams we have all faced over the past decade, most of us have developed a basic skill to spot and avoid obvious phishing emails or SMS messages. Cybercriminals are aware of this, and they have evolved their tactics by shifting to more complex and convincing schemes designed to bypass skepticism and lure victims.Their goal remains the same: to trick you into handing over sensitive information, especially credit card data. One of the latest examples is the rise in subscription scam campaigns. Scammers are creating incredibly convincing websites selling everything from shoes and clothes to electronics, tricking people into signing up for monthly subscriptions and willingly providing their credit card information. Facebook is being used as the primary platform to promote these new and sophisticated scams. A woman shopping online (Kurt "CyberGuy" Knutsson)What you need to knowBitdefender researchers have uncovered a massive and highly coordinated subscription scam campaign involving more than 200 active websites designed to look like real online stores. These sites, often promoted through Facebook ads, sell everything from clothes and electronics to beauty products, but the real goal is to trick users into signing up for recurring payments, often without realizing it.One of the most common lures is the "mystery box" scam, where you are promised a surprise package at a bargain price. These offers are made to look fun and harmless, but behind the scenes you are giving away personal and credit card information while unknowingly agreeing to hidden subscription terms, often written in tiny fine print.The scam doesn’t stop there. Once you’re convinced and reach the checkout page, scammers often layer in a second scam, like loyalty cards or VIP memberships that further lock you into payments. It’s all designed to confuse you, overwhelm you with supposed perks and make the scam feel like a good deal.Researchers found that many of these websites share a single Cyprus address, possibly tied to offshore entities linked to the Paradise Papers. Despite being spread across different categories and brand names, the sites often use the same layouts, AI agents and payment structures, all pointing to a centralized fraud network.Scammers frequently rotate the brands they impersonate and have started moving beyond mystery boxes, now peddling low-quality products, counterfeit goods, fake investment schemes, dubious supplements and more. To avoid automatic detection, they employ several tactics. These include running multiple versions of an ad, with only one of which is actually malicious while the others display harmless product images, uploading ad images from platforms like Google Drive so they can be swapped out later and cropping visuals to alter recognizable patterns. Listing fake products (Bitdefender) (Kurt "CyberGuy" Knutsson)The scam is expandingWhat started with simple "mystery box" scams has grown into a sprawling, coordinated campaign. These scams now feature fake surveys, tiered "VIP" memberships and deceptive credit systems that make the purchase process intentionally confusing. Users are promised deep discounts or access to exclusive deals, but in reality they’re just being locked into recurring payments.Many of the scam websites trace back to the same physical address in Cyprus, pointing to what appears to be a centralized operation. Researchers also found links to entities mentioned in the Paradise Papers, suggesting these fraudsters are hiding behind offshore infrastructure.And it’s not just mystery boxes anymore. The same scam format is being used to sell low-quality goods, fake supplements and even bogus investment opportunities. With high-quality site design, aggressive advertising and increasingly sophisticated tactics, subscription scams are becoming the new face of online fraud. A person shopping online (Kurt "CyberGuy" Knutsson)10 proactive measures to take to protect your dataEven as scammers become more sophisticated, there are practical steps you can take right now to protect your personal and financial information from subscription fraud and other online threats. Here are ten proactive measures to help keep your data safe:1) Always read the fine print: One of the simplest yet most effective ways to protect yourself from subscription scams is to slow down and read the fine print, especially on checkout pages. Scammers often hide recurring payment terms in small or lightly colored text that’s easy to miss. What seems like a one-time purchase could actually sign you up for a biweekly or monthly charge. Taking just a moment to scan for hidden terms before hitting "Pay" can help you avoid weeks of silent billing.2) Avoid mystery box or VIP-style deals: These offers often prey on curiosity and the promise of surprise or luxury for a low fee. In reality, the "mystery" is the trap: you might receive nothing or a low-quality item while being unknowingly enrolled in a recurring subscription. Scammers use the illusion of exclusivity or urgency to pressure quick decisions.3) Don’t trust ads blindly on social media: Facebook, Instagram and other platforms are a hotbed for these scams, with criminals running paid ads that mimic well-known brands or influencers. These ads often link to professional-looking but fake storefronts. If you’re interested in a deal you see online, don’t click through immediately. Instead, look up the brand or offer in a separate tab and check if it exists outside social media.4) Investigate before you buy: Before purchasing from any unfamiliar site, take a few quick steps to verify its legitimacy. Search the brand's name alongside words like "scam" or "reviews" to see what others have experienced. Look up the company's physical address and check if it actually exists using tools like Google Maps. Make sure the website uses HTTPS, review the site's contact information and cross-check reviews on trusted third-party sites like the Better Business Bureau or Consumer Reports.5) Use strong antivirus software: Adding a strong antivirus program to your devices can provide an extra layer of defense against fraudulent websites and phishing attempts. Strong antivirus software warns you about suspicious links, blocks malicious ads and scans downloads for malware. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Invest in personal data removal services: Scammers often rely on leaked or publicly available personal information to target victims with convincing subscription scams. Investing in a personal data removal service can help minimize your digital footprint by removing your information from data broker databases and reducing the chances of being targeted in future campaigns. Regularly monitoring and cleaning up your online presence makes it harder for fraudsters to exploit your data for financial gain. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.7) Be cautious with payment methods: Use secure payment options like credit cards, which often offer better fraud protection than wire transfers, gift cards or cryptocurrency.8) Limit personal information shared on social media: Scammers often gather details from public profiles to craft convincing scams. Review your privacy settings and only share necessary information.9) Use strong, unique passwords and enable multifactor authentication: Create strong, unique passwords for each of your online accounts, especially those tied to your finances or shopping. Enable multifactor authentication wherever possible, as this adds an extra layer of security and makes it harder for scammers to access your accounts, even if your password is compromised. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.10) Keep your devices and software updated: Regularly update your operating system, browsers and apps. Security updates often patch vulnerabilities that scammers exploit to gain access to your information or install malicious software.Kurt’s key takeawayWhile the rise of subscription scams and deceptive ads is concerning, it’s especially troubling that platforms like Facebook continue to allow these fraudulent ads to run unchecked. Facebook has repeatedly failed to adequately vet or prevent these malicious campaigns from reaching vulnerable individuals. The platform’s ad approval system should be more proactive in spotting and blocking ads promoting scams, particularly those that impersonate well-known brands or content creators. How do you feel about Facebook’s role in allowing scam ads to circulate? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
Flying motorcycle zooms at 124 mph without touching the ground
Tech Flying motorcycle zooms at 124 mph without touching the ground A jet-powered flying bike that combines speed, agility, and futuristic design
Published
June 1, 2025 6:00am EDT close Flying motorcycle zooms at 124 mph without touching the ground Soar above traffc in the air with ease. Imagine gliding through city traffic, not stuck in traffic jams on the road, but soaring above them in the air with ease. The Volonaut Airbike, a jet-powered flying bike developed by Polish entrepreneur Tomasz Patan, is turning this vision into reality. With a top speed of 124 mph and a frame that is seven times lighter than a typical motorcycle, this innovative vehicle could change the way we get around in cities, making travel faster and easier. Jet-powered flying bike Jet power and featherweight designUnlike many personal flying devices that depend on large, noisy propellers, the Volonaut Airbike uses a jet propulsion system. While the exact technical details have not been disclosed, the Airbike's design emphasizes extreme lightness and agility.CHINESE WEARABLE EVTOL JETPACK MAKES HISTORIC FIRST FLIGHTExtensive use of carbon fiber and 3D-printed parts allows the vehicle to weigh just 86 pounds without a rider. This is approximately seven times lighter than an average motorcycle, which typically weighs around 600 pounds. This featherweight construction makes the Airbike nimble and efficient in the air. Jet-powered flying bike Performance and featuresThe Volonaut Airbike can reach speeds of up to 124 miles per hour, making it faster than most motorcycles in traffic. It features a proprietary stabilization system enhanced by a flight computer, which automatically maintains hover and provides ease of control for the rider. This technology allows even those with limited flying experience to handle the bike safely and confidently. The Airbike's open, roofless design offers the rider an unobstructed 360-degree view, creating a sense of complete freedom and immersion in the flying experience. Additionally, the absence of spinning propellers means the Airbike can navigate through tight spaces with greater ease and safety. Jet-powered flying bike A real-life flying bike inspired by imaginationThe Volonaut Airbike's sleek, futuristic silhouette and compact size evoke the image of a flying motorcycle that many have dreamed about for years. Its design and performance bring to life a concept often seen in movies and stories about the future of transportation. Volonaut's promotional videos even feature a rider dressed as a Stormtrooper, highlighting the bike's resemblance to the flying vehicles of popular culture. This playful nod underscores the Airbike's blend of cutting-edge technology and imaginative design. Jet-powered flying bike Meet the inventor: Tomasz PatanTomasz Patan is a visionary engineer with a talent for creating groundbreaking airborne vehicles. He is best known for the Jetson One, a quad-rotor electric vertical take-off and landingdrone that can carry a human pilot. Building on the success of that project, Patan has now introduced the Volonaut Airbike, a smaller, more agile flying machine that relies on jet propulsion rather than propellers. His work continues to push the boundaries of what personal flight can achieve. Jet-powered flying bike What about the cost?When it comes to price, the Volonaut Airbike is still something of a mystery. Patan has not yet revealed an official cost, but if you look at his previous project, the Jetson One drone, which was priced at around you can get a rough idea of where the Airbike might land. Given the advanced materials, jet propulsion and sophisticated flight computer involved, it's safe to assume this won't be a budget-friendly ride. However, as with most new technologies, prices often come down over time as production scales up and designs are refined. So, while it might start out as a high-end gadget for early adopters and enthusiasts, there's hope that flying bikes like this could become more accessible in the years ahead.WHAT IS ARTIFICIAL INTELLIGENCE? Jet-powered flying bike What lies ahead for the Volonaut Airbike?Although the Volonaut Airbike has already been demonstrated in flight, many details remain undisclosed. Patan has not yet revealed the exact propulsion technology, pricing or release date, but he has expressed optimism the Airbike will be available to the public in the near future. As development continues, this flying motorcycle could soon become a practical option for urban commuters seeking a faster, more flexible way to travel. Jet-powered flying bike Kurt's key takeawaysHonestly, the Volonaut Airbike feels like something we've all dreamed about but never thought we'd actually see. It's exciting to watch this blend of bold engineering and creative design come to life, making personal flight more real than ever before. Sure, it might be a bit pricey at first, but who knows? Maybe in a few years, zipping through the skies on a flying bike will be just as normal as hopping on a motorcycle today.CLICK HERE TO GET THE FOX NEWS APPWould you feel comfortable trading your motorcycle for a flying bike that soars above city traffic? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#flying #motorcycle #zooms #mph #withoutFlying motorcycle zooms at 124 mph without touching the groundTech Flying motorcycle zooms at 124 mph without touching the ground A jet-powered flying bike that combines speed, agility, and futuristic design Published June 1, 2025 6:00am EDT close Flying motorcycle zooms at 124 mph without touching the ground Soar above traffc in the air with ease. Imagine gliding through city traffic, not stuck in traffic jams on the road, but soaring above them in the air with ease. The Volonaut Airbike, a jet-powered flying bike developed by Polish entrepreneur Tomasz Patan, is turning this vision into reality. With a top speed of 124 mph and a frame that is seven times lighter than a typical motorcycle, this innovative vehicle could change the way we get around in cities, making travel faster and easier. Jet-powered flying bike Jet power and featherweight designUnlike many personal flying devices that depend on large, noisy propellers, the Volonaut Airbike uses a jet propulsion system. While the exact technical details have not been disclosed, the Airbike's design emphasizes extreme lightness and agility.CHINESE WEARABLE EVTOL JETPACK MAKES HISTORIC FIRST FLIGHTExtensive use of carbon fiber and 3D-printed parts allows the vehicle to weigh just 86 pounds without a rider. This is approximately seven times lighter than an average motorcycle, which typically weighs around 600 pounds. This featherweight construction makes the Airbike nimble and efficient in the air. Jet-powered flying bike Performance and featuresThe Volonaut Airbike can reach speeds of up to 124 miles per hour, making it faster than most motorcycles in traffic. It features a proprietary stabilization system enhanced by a flight computer, which automatically maintains hover and provides ease of control for the rider. This technology allows even those with limited flying experience to handle the bike safely and confidently. The Airbike's open, roofless design offers the rider an unobstructed 360-degree view, creating a sense of complete freedom and immersion in the flying experience. Additionally, the absence of spinning propellers means the Airbike can navigate through tight spaces with greater ease and safety. Jet-powered flying bike A real-life flying bike inspired by imaginationThe Volonaut Airbike's sleek, futuristic silhouette and compact size evoke the image of a flying motorcycle that many have dreamed about for years. Its design and performance bring to life a concept often seen in movies and stories about the future of transportation. Volonaut's promotional videos even feature a rider dressed as a Stormtrooper, highlighting the bike's resemblance to the flying vehicles of popular culture. This playful nod underscores the Airbike's blend of cutting-edge technology and imaginative design. Jet-powered flying bike Meet the inventor: Tomasz PatanTomasz Patan is a visionary engineer with a talent for creating groundbreaking airborne vehicles. He is best known for the Jetson One, a quad-rotor electric vertical take-off and landingdrone that can carry a human pilot. Building on the success of that project, Patan has now introduced the Volonaut Airbike, a smaller, more agile flying machine that relies on jet propulsion rather than propellers. His work continues to push the boundaries of what personal flight can achieve. Jet-powered flying bike What about the cost?When it comes to price, the Volonaut Airbike is still something of a mystery. Patan has not yet revealed an official cost, but if you look at his previous project, the Jetson One drone, which was priced at around you can get a rough idea of where the Airbike might land. Given the advanced materials, jet propulsion and sophisticated flight computer involved, it's safe to assume this won't be a budget-friendly ride. However, as with most new technologies, prices often come down over time as production scales up and designs are refined. So, while it might start out as a high-end gadget for early adopters and enthusiasts, there's hope that flying bikes like this could become more accessible in the years ahead.WHAT IS ARTIFICIAL INTELLIGENCE? Jet-powered flying bike What lies ahead for the Volonaut Airbike?Although the Volonaut Airbike has already been demonstrated in flight, many details remain undisclosed. Patan has not yet revealed the exact propulsion technology, pricing or release date, but he has expressed optimism the Airbike will be available to the public in the near future. As development continues, this flying motorcycle could soon become a practical option for urban commuters seeking a faster, more flexible way to travel. Jet-powered flying bike Kurt's key takeawaysHonestly, the Volonaut Airbike feels like something we've all dreamed about but never thought we'd actually see. It's exciting to watch this blend of bold engineering and creative design come to life, making personal flight more real than ever before. Sure, it might be a bit pricey at first, but who knows? Maybe in a few years, zipping through the skies on a flying bike will be just as normal as hopping on a motorcycle today.CLICK HERE TO GET THE FOX NEWS APPWould you feel comfortable trading your motorcycle for a flying bike that soars above city traffic? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #flying #motorcycle #zooms #mph #withoutWWW.FOXNEWS.COMFlying motorcycle zooms at 124 mph without touching the groundTech Flying motorcycle zooms at 124 mph without touching the ground A jet-powered flying bike that combines speed, agility, and futuristic design Published June 1, 2025 6:00am EDT close Flying motorcycle zooms at 124 mph without touching the ground Soar above traffc in the air with ease. Imagine gliding through city traffic, not stuck in traffic jams on the road, but soaring above them in the air with ease. The Volonaut Airbike, a jet-powered flying bike developed by Polish entrepreneur Tomasz Patan, is turning this vision into reality. With a top speed of 124 mph and a frame that is seven times lighter than a typical motorcycle, this innovative vehicle could change the way we get around in cities, making travel faster and easier. Jet-powered flying bike (Volonaut)Jet power and featherweight designUnlike many personal flying devices that depend on large, noisy propellers, the Volonaut Airbike uses a jet propulsion system. While the exact technical details have not been disclosed, the Airbike's design emphasizes extreme lightness and agility.CHINESE WEARABLE EVTOL JETPACK MAKES HISTORIC FIRST FLIGHTExtensive use of carbon fiber and 3D-printed parts allows the vehicle to weigh just 86 pounds without a rider. This is approximately seven times lighter than an average motorcycle, which typically weighs around 600 pounds. This featherweight construction makes the Airbike nimble and efficient in the air. Jet-powered flying bike (Volonaut)Performance and featuresThe Volonaut Airbike can reach speeds of up to 124 miles per hour, making it faster than most motorcycles in traffic. It features a proprietary stabilization system enhanced by a flight computer, which automatically maintains hover and provides ease of control for the rider. This technology allows even those with limited flying experience to handle the bike safely and confidently. The Airbike's open, roofless design offers the rider an unobstructed 360-degree view, creating a sense of complete freedom and immersion in the flying experience. Additionally, the absence of spinning propellers means the Airbike can navigate through tight spaces with greater ease and safety. Jet-powered flying bike (Volonaut)A real-life flying bike inspired by imaginationThe Volonaut Airbike's sleek, futuristic silhouette and compact size evoke the image of a flying motorcycle that many have dreamed about for years. Its design and performance bring to life a concept often seen in movies and stories about the future of transportation. Volonaut's promotional videos even feature a rider dressed as a Stormtrooper, highlighting the bike's resemblance to the flying vehicles of popular culture. This playful nod underscores the Airbike's blend of cutting-edge technology and imaginative design. Jet-powered flying bike (Volonaut)Meet the inventor: Tomasz PatanTomasz Patan is a visionary engineer with a talent for creating groundbreaking airborne vehicles. He is best known for the Jetson One, a quad-rotor electric vertical take-off and landing (eVTOL) drone that can carry a human pilot. Building on the success of that project, Patan has now introduced the Volonaut Airbike, a smaller, more agile flying machine that relies on jet propulsion rather than propellers. His work continues to push the boundaries of what personal flight can achieve. Jet-powered flying bike (Volonaut)What about the cost?When it comes to price, the Volonaut Airbike is still something of a mystery. Patan has not yet revealed an official cost, but if you look at his previous project, the Jetson One drone, which was priced at around $92,000, you can get a rough idea of where the Airbike might land. Given the advanced materials, jet propulsion and sophisticated flight computer involved, it's safe to assume this won't be a budget-friendly ride. However, as with most new technologies, prices often come down over time as production scales up and designs are refined. So, while it might start out as a high-end gadget for early adopters and enthusiasts, there's hope that flying bikes like this could become more accessible in the years ahead.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Jet-powered flying bike (Volonaut)What lies ahead for the Volonaut Airbike?Although the Volonaut Airbike has already been demonstrated in flight, many details remain undisclosed. Patan has not yet revealed the exact propulsion technology, pricing or release date, but he has expressed optimism the Airbike will be available to the public in the near future. As development continues, this flying motorcycle could soon become a practical option for urban commuters seeking a faster, more flexible way to travel. Jet-powered flying bike (Volonaut)Kurt's key takeawaysHonestly, the Volonaut Airbike feels like something we've all dreamed about but never thought we'd actually see. It's exciting to watch this blend of bold engineering and creative design come to life, making personal flight more real than ever before. Sure, it might be a bit pricey at first, but who knows? Maybe in a few years, zipping through the skies on a flying bike will be just as normal as hopping on a motorcycle today.CLICK HERE TO GET THE FOX NEWS APPWould you feel comfortable trading your motorcycle for a flying bike that soars above city traffic? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter Ask Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
Microsoft takes down malware found on 394,000 Windows PCs
Published
June 1, 2025 10:00am EDT close Microsoft claims a big leap forward in forecasting Just in time for hurricane season, Microsoft is unveiling a new AI-powered weather prediction system. Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer.I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data, but the good news is that Microsoft has taken it down.The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Illustration of a hacker at work What you need to knowMicrosoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16.Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware’s reach and impact made it a favored choice among threat actors for financial theft and data breaches.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSTo disrupt the malware’s operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma’s core command system and shut down marketplaces where the malware was being sold.International cooperation played a major role as well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage.Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. HP laptop More about the Lumma infostealerLumma is a Malware-as-a-Servicethat has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information.Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn’t limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. Windows laptop 6 ways you can protect yourself from infostealer malwareTo protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures:1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.2. Don’t click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable two-factor authentication: Enable two-factor authenticationwhenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.WHAT IS ARTIFICIAL INTELLIGENCE?5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayMicrosoft’s takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I’ve been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous.CLICK HERE TO GET THE FOX NEWS APPDo you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#microsoft #takes #down #malware #foundMicrosoft takes down malware found on 394,000 Windows PCsPublished June 1, 2025 10:00am EDT close Microsoft claims a big leap forward in forecasting Just in time for hurricane season, Microsoft is unveiling a new AI-powered weather prediction system. Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer.I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data, but the good news is that Microsoft has taken it down.The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Illustration of a hacker at work What you need to knowMicrosoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16.Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware’s reach and impact made it a favored choice among threat actors for financial theft and data breaches.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSTo disrupt the malware’s operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma’s core command system and shut down marketplaces where the malware was being sold.International cooperation played a major role as well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage.Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. HP laptop More about the Lumma infostealerLumma is a Malware-as-a-Servicethat has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information.Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn’t limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. Windows laptop 6 ways you can protect yourself from infostealer malwareTo protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures:1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.2. Don’t click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable two-factor authentication: Enable two-factor authenticationwhenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.WHAT IS ARTIFICIAL INTELLIGENCE?5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayMicrosoft’s takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I’ve been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous.CLICK HERE TO GET THE FOX NEWS APPDo you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #microsoft #takes #down #malware #foundWWW.FOXNEWS.COMMicrosoft takes down malware found on 394,000 Windows PCsPublished June 1, 2025 10:00am EDT close Microsoft claims a big leap forward in forecasting Just in time for hurricane season, Microsoft is unveiling a new AI-powered weather prediction system. Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, phone number and address to financial details and cryptocurrency. Leading the charge is the Lumma infostealer.I have been reporting on this malware since last year, and security researchers have called it one of the most dangerous infostealers, infecting millions. There have been countless incidents of Lumma targeting people's personal data (more on this later), but the good news is that Microsoft has taken it down.The Redmond-based company announced it has dismantled the Lumma Stealer malware operation with the help of law enforcement agencies around the world. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)What you need to knowMicrosoft confirmed that it has successfully taken down the Lumma Stealer malware network in collaboration with law enforcement agencies around the world. In a blog post, the company revealed that its Digital Crimes Unit had tracked infections on more than 394,000 Windows devices globally between March 16 and May 16.Lumma was a go-to tool for cybercriminals, often used to siphon sensitive information like login credentials, credit card numbers, bank account details and cryptocurrency wallet data. The malware’s reach and impact made it a favored choice among threat actors for financial theft and data breaches.MASSIVE DATA BREACH EXPOSES 184 MILLION PASSWORDS AND LOGINSTo disrupt the malware’s operation, Microsoft obtained a court order from the U.S. District Court for the Northern District of Georgia, which allowed the company to take down key domains that supported Lumma’s infrastructure. This was followed by the U.S. Department of Justice stepping in to seize control of Lumma’s core command system and shut down marketplaces where the malware was being sold.International cooperation played a major role as well. Japan’s cybercrime unit helped dismantle Lumma’s locally hosted infrastructure, while Europol assisted in actions against hundreds of domains used in the operation. In total, over 1,300 domains were seized or redirected to Microsoft-managed sinkholes to prevent further damage.Microsoft says this takedown effort also included support from industry partners such as Cloudflare, Bitsight and Lumen, which helped dismantle the broader ecosystem that enabled Lumma to thrive. HP laptop (Kurt "CyberGuy" Knutsson)More about the Lumma infostealerLumma is a Malware-as-a-Service (MaaS) that has been marketed and sold through underground forums since at least 2022. Over the years, its developers have released multiple versions to continually improve its capabilities. I first reported on Lumma in February 2024, when it was used by hackers to access Google accounts using expired cookies that contained login information.Lumma continued targeting users, with reports in October 2024 revealing it was impersonating fake human verification pages to trick Windows users into sharing sensitive information. The malware wasn’t limited to Windows. In January 2024, security researchers found the infostealer malware was targeting 100 million Mac users, stealing browser credentials, cryptocurrency wallets and other personal data. Windows laptop (Kurt "CyberGuy" Knutsson)6 ways you can protect yourself from infostealer malwareTo protect yourself from the evolving threat of infostealer malware, which continues to target users through sophisticated social engineering tactics, consider taking these six essential security measures:1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to press Windows + R, copy commands or paste anything into PowerShell. If a website instructs you to do this, it’s likely a scam. Close the page immediately and avoid interacting with it.2. Don’t click links from unverified emails and use strong antivirus software: Many infostealer attacks start with phishing emails that impersonate trusted services. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company’s official website instead of clicking any links inside the email.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.3. Enable two-factor authentication: Enable two-factor authentication (2FA) whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password.4. Keep devices updated: Regularly updating your operating system, browser and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?5. Monitor your accounts for suspicious activity and change your passwords: If you’ve interacted with a suspicious website, phishing email or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets or financial transactions that you don’t recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.6. Invest in a personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from infostealer malware or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayMicrosoft’s takedown of the Lumma Stealer malware network is a major win in the fight against infostealers, which have fueled a surge in data breaches over the past year. Lumma had become a go-to tool for cybercriminals, targeting everything from browser credentials to crypto wallets across Windows and Mac systems. I’ve been tracking this malware since early 2024, and its ability to impersonate human verification pages and abuse expired cookies made it especially dangerous.CLICK HERE TO GET THE FOX NEWS APPDo you feel tech companies are doing enough to protect users from malware like this? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
Massive data breach exposes 184 million passwords and logins
Published
May 31, 2025 10:00am EDT close iPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' Data breaches are no longer rare events but a persistent problem. We’ve been seeing regular incidents at public-facing companies across various sectors, including healthcare, retail and finance. While bad actors are certainly to blame, these corporations aren’t entirely without fault. They often make it easy for hackers to access user data by failing to protect it properly. A recent example came to light when a cybersecurity researcher discovered an open database containing over 184 million account credentials. Illustration of a hacker at work.How the database was uncovered and what it containedCybersecurity researcher Jeremiah Fowler has revealed the existence of an open database that contains 184,162,718 million account credentials. These include email addresses, passwords, usernames and URLs for platforms such as Google, Microsoft, Apple, Facebook and Snapchat. The information also covers banking services, medical platforms and government accounts. Most shockingly, the entire dataset was left completely unsecured. There was no encryption, no authentication required and no form of access control. It was simply a plain text file sitting online for anyone to find.19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELFFowler located the database during routine scanning of publicly exposed assets. What he found was staggering. The file included hundreds of millions of unique records containing user credentials linked to the world’s largest technology and communication platforms. There were also account details for financial services and official portals used by state institutions.The file was not protected in any way. Anyone who discovered the link could open it in a browser and instantly view sensitive personal data. No software exploit was needed. No password was asked for. It was as open as a public document. Illustration of a hacker at work.Where did the data come fromFowler believes the data was harvested using an infostealer. These lightweight tools are favored by cybercriminals for their ability to silently extract login credentials and other private information from compromised devices. Once stolen, the data is often sold on dark web forums or used in targeted attacks.After reporting the breach, the hosting provider quickly removed access to the file. However, the owner of the database remains unknown. The provider did not disclose who uploaded it or whether the database was part of a legitimate archive that was accidentally published. Fowler could not determine whether this was the result of negligence or an operation with malicious intent.To verify the data, Fowler contacted some individuals listed in the records. Several confirmed that the information was accurate. This confirmation turns what might seem like abstract statistics into something very real. These were not outdated or irrelevant details. These were live credentials that could allow anyone to hijack personal accounts in seconds.1.7 BILLION PASSWORDS LEAKED ON DARK WEB AND WHY YOURS IS AT RISK Login on a tablet.6 ways to protect yourself after a data breach1. Change your password on every platform: If your login credentials have been exposed, it’s not enough to change the password on just one account. Cybercriminals often try the same combinations across multiple platforms, hoping to gain access through reused credentials. Start by updating your most critical accounts, email, banking, cloud storage and social media, then move on to others. Use a new, unique password for each platform and avoid variations of old passwords, as they can still be predictable. Consider using a password manager to generate and store complex passwords. Our top-rated password manager delivers powerful protection to help keep your accounts secure. It features real-time data breach monitoring to alert you if your login details have been exposed, plus a built-in data breach scanner that checks your saved emails, passwords and credit card information against known leak databases. A password health checker also highlights weak, reused or compromised passwords so you can strengthen your online defenses with just a few clicks. Get more details about my best expert-reviewed Password Managers of 2025 here.2. Enable two-factor authentication: Two-factor authentication, or 2FA, is a critical security feature that drastically reduces the risk of unauthorized access. Even if someone has your password, they won’t be able to log in without the second verification step, usually a one-time code sent to your phone or an authenticator app. Enable 2FA on all services that support it, especially your email, financial accounts and any service that stores sensitive personal data.3. Watch for unusual account activity: After a breach, it’s common for compromised accounts to be used for spam, scams, or identity theft. Pay close attention to signs such as login attempts from unfamiliar locations, password reset requests you didn’t initiate or unexpected messages sent from your accounts. Most platforms allow you to review login history and connected devices. If you see something off, take action immediately by changing your password and revoking suspicious sessions.4. Invest in personal data removal services: You should also consider a data removal service. Given the scale and frequency of breaches like the one described above, relying on personal caution alone is no longer enough. Automated data removal services can provide an essential extra layer of defense by continuously scanning for and helping eliminate your exposed information from data broker sites and other online sources. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.5. Avoid clicking on suspicious links and use strong antivirus software: One of the most common post-breach threats is phishing. Cybercriminals often use information from leaked databases to craft convincing emails that urge you to verify your account or reset your password. Never click on links or download attachments from unknown or suspicious sources. Instead, visit websites by typing the URL directly into your browser. The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Keep your software and devices up to date: Many cyberattacks exploit known vulnerabilities in outdated software. Operating systems, browsers, antivirus programs and even apps need to be updated regularly to patch security flaws. Turn on automatic updates wherever possible so you’re protected as soon as fixes are released. Staying current with your software is one of the easiest and most effective ways to block malware, ransomware and spyware from infiltrating your system. Kurt’s key takeawaySecurity is not only the responsibility of companies and hosting providers. Users need to adopt better practices, including unique passwords, multifactor authentication and regular reviews of their digital footprint. The careless exposure of over 184 million credentials is not just a mistake. It is an example of how fragile our systems remain when even basic protection is absent. In an era where artificial intelligence, quantum computing, and global connectivity are reshaping technology, it is unacceptable that plain text files containing financial and governmental credentials are still left sitting online.CLICK HERE TO GET THE FOX NEWS APPDo you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#massive #data #breach #exposes #millionMassive data breach exposes 184 million passwords and loginsPublished May 31, 2025 10:00am EDT close iPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' Data breaches are no longer rare events but a persistent problem. We’ve been seeing regular incidents at public-facing companies across various sectors, including healthcare, retail and finance. While bad actors are certainly to blame, these corporations aren’t entirely without fault. They often make it easy for hackers to access user data by failing to protect it properly. A recent example came to light when a cybersecurity researcher discovered an open database containing over 184 million account credentials. Illustration of a hacker at work.How the database was uncovered and what it containedCybersecurity researcher Jeremiah Fowler has revealed the existence of an open database that contains 184,162,718 million account credentials. These include email addresses, passwords, usernames and URLs for platforms such as Google, Microsoft, Apple, Facebook and Snapchat. The information also covers banking services, medical platforms and government accounts. Most shockingly, the entire dataset was left completely unsecured. There was no encryption, no authentication required and no form of access control. It was simply a plain text file sitting online for anyone to find.19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELFFowler located the database during routine scanning of publicly exposed assets. What he found was staggering. The file included hundreds of millions of unique records containing user credentials linked to the world’s largest technology and communication platforms. There were also account details for financial services and official portals used by state institutions.The file was not protected in any way. Anyone who discovered the link could open it in a browser and instantly view sensitive personal data. No software exploit was needed. No password was asked for. It was as open as a public document. Illustration of a hacker at work.Where did the data come fromFowler believes the data was harvested using an infostealer. These lightweight tools are favored by cybercriminals for their ability to silently extract login credentials and other private information from compromised devices. Once stolen, the data is often sold on dark web forums or used in targeted attacks.After reporting the breach, the hosting provider quickly removed access to the file. However, the owner of the database remains unknown. The provider did not disclose who uploaded it or whether the database was part of a legitimate archive that was accidentally published. Fowler could not determine whether this was the result of negligence or an operation with malicious intent.To verify the data, Fowler contacted some individuals listed in the records. Several confirmed that the information was accurate. This confirmation turns what might seem like abstract statistics into something very real. These were not outdated or irrelevant details. These were live credentials that could allow anyone to hijack personal accounts in seconds.1.7 BILLION PASSWORDS LEAKED ON DARK WEB AND WHY YOURS IS AT RISK Login on a tablet.6 ways to protect yourself after a data breach1. Change your password on every platform: If your login credentials have been exposed, it’s not enough to change the password on just one account. Cybercriminals often try the same combinations across multiple platforms, hoping to gain access through reused credentials. Start by updating your most critical accounts, email, banking, cloud storage and social media, then move on to others. Use a new, unique password for each platform and avoid variations of old passwords, as they can still be predictable. Consider using a password manager to generate and store complex passwords. Our top-rated password manager delivers powerful protection to help keep your accounts secure. It features real-time data breach monitoring to alert you if your login details have been exposed, plus a built-in data breach scanner that checks your saved emails, passwords and credit card information against known leak databases. A password health checker also highlights weak, reused or compromised passwords so you can strengthen your online defenses with just a few clicks. Get more details about my best expert-reviewed Password Managers of 2025 here.2. Enable two-factor authentication: Two-factor authentication, or 2FA, is a critical security feature that drastically reduces the risk of unauthorized access. Even if someone has your password, they won’t be able to log in without the second verification step, usually a one-time code sent to your phone or an authenticator app. Enable 2FA on all services that support it, especially your email, financial accounts and any service that stores sensitive personal data.3. Watch for unusual account activity: After a breach, it’s common for compromised accounts to be used for spam, scams, or identity theft. Pay close attention to signs such as login attempts from unfamiliar locations, password reset requests you didn’t initiate or unexpected messages sent from your accounts. Most platforms allow you to review login history and connected devices. If you see something off, take action immediately by changing your password and revoking suspicious sessions.4. Invest in personal data removal services: You should also consider a data removal service. Given the scale and frequency of breaches like the one described above, relying on personal caution alone is no longer enough. Automated data removal services can provide an essential extra layer of defense by continuously scanning for and helping eliminate your exposed information from data broker sites and other online sources. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.5. Avoid clicking on suspicious links and use strong antivirus software: One of the most common post-breach threats is phishing. Cybercriminals often use information from leaked databases to craft convincing emails that urge you to verify your account or reset your password. Never click on links or download attachments from unknown or suspicious sources. Instead, visit websites by typing the URL directly into your browser. The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Keep your software and devices up to date: Many cyberattacks exploit known vulnerabilities in outdated software. Operating systems, browsers, antivirus programs and even apps need to be updated regularly to patch security flaws. Turn on automatic updates wherever possible so you’re protected as soon as fixes are released. Staying current with your software is one of the easiest and most effective ways to block malware, ransomware and spyware from infiltrating your system. Kurt’s key takeawaySecurity is not only the responsibility of companies and hosting providers. Users need to adopt better practices, including unique passwords, multifactor authentication and regular reviews of their digital footprint. The careless exposure of over 184 million credentials is not just a mistake. It is an example of how fragile our systems remain when even basic protection is absent. In an era where artificial intelligence, quantum computing, and global connectivity are reshaping technology, it is unacceptable that plain text files containing financial and governmental credentials are still left sitting online.CLICK HERE TO GET THE FOX NEWS APPDo you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #massive #data #breach #exposes #millionWWW.FOXNEWS.COMMassive data breach exposes 184 million passwords and loginsPublished May 31, 2025 10:00am EDT close iPhone users instructed to take immediate action to avoid data breach: 'Urgent threat' Kurt 'The CyberGuy' Knutsson discusses Elon Musk's possible priorities as he exits his role with the White House and explains the urgent warning for iPhone users to update devices after a 'massive security gap.' Data breaches are no longer rare events but a persistent problem. We’ve been seeing regular incidents at public-facing companies across various sectors, including healthcare, retail and finance. While bad actors are certainly to blame, these corporations aren’t entirely without fault. They often make it easy for hackers to access user data by failing to protect it properly. A recent example came to light when a cybersecurity researcher discovered an open database containing over 184 million account credentials. Illustration of a hacker at work. (Kurt "CyberGuy" Knutsson)How the database was uncovered and what it containedCybersecurity researcher Jeremiah Fowler has revealed the existence of an open database that contains 184,162,718 million account credentials. These include email addresses, passwords, usernames and URLs for platforms such as Google, Microsoft, Apple, Facebook and Snapchat. The information also covers banking services, medical platforms and government accounts. Most shockingly, the entire dataset was left completely unsecured. There was no encryption, no authentication required and no form of access control. It was simply a plain text file sitting online for anyone to find.19 BILLION PASSWORDS HAVE LEAKED ONLINE: HOW TO PROTECT YOURSELFFowler located the database during routine scanning of publicly exposed assets. What he found was staggering. The file included hundreds of millions of unique records containing user credentials linked to the world’s largest technology and communication platforms. There were also account details for financial services and official portals used by state institutions.The file was not protected in any way. Anyone who discovered the link could open it in a browser and instantly view sensitive personal data. No software exploit was needed. No password was asked for. It was as open as a public document. Illustration of a hacker at work. (Kurt "CyberGuy" Knutsson)Where did the data come fromFowler believes the data was harvested using an infostealer. These lightweight tools are favored by cybercriminals for their ability to silently extract login credentials and other private information from compromised devices. Once stolen, the data is often sold on dark web forums or used in targeted attacks.After reporting the breach, the hosting provider quickly removed access to the file. However, the owner of the database remains unknown. The provider did not disclose who uploaded it or whether the database was part of a legitimate archive that was accidentally published. Fowler could not determine whether this was the result of negligence or an operation with malicious intent.To verify the data, Fowler contacted some individuals listed in the records. Several confirmed that the information was accurate. This confirmation turns what might seem like abstract statistics into something very real. These were not outdated or irrelevant details. These were live credentials that could allow anyone to hijack personal accounts in seconds.1.7 BILLION PASSWORDS LEAKED ON DARK WEB AND WHY YOURS IS AT RISK Login on a tablet. (Kurt "CyberGuy" Knutsson)6 ways to protect yourself after a data breach1. Change your password on every platform: If your login credentials have been exposed, it’s not enough to change the password on just one account. Cybercriminals often try the same combinations across multiple platforms, hoping to gain access through reused credentials. Start by updating your most critical accounts, email, banking, cloud storage and social media, then move on to others. Use a new, unique password for each platform and avoid variations of old passwords, as they can still be predictable. Consider using a password manager to generate and store complex passwords. Our top-rated password manager delivers powerful protection to help keep your accounts secure. It features real-time data breach monitoring to alert you if your login details have been exposed, plus a built-in data breach scanner that checks your saved emails, passwords and credit card information against known leak databases. A password health checker also highlights weak, reused or compromised passwords so you can strengthen your online defenses with just a few clicks. Get more details about my best expert-reviewed Password Managers of 2025 here.2. Enable two-factor authentication: Two-factor authentication, or 2FA, is a critical security feature that drastically reduces the risk of unauthorized access. Even if someone has your password, they won’t be able to log in without the second verification step, usually a one-time code sent to your phone or an authenticator app. Enable 2FA on all services that support it, especially your email, financial accounts and any service that stores sensitive personal data.3. Watch for unusual account activity: After a breach, it’s common for compromised accounts to be used for spam, scams, or identity theft. Pay close attention to signs such as login attempts from unfamiliar locations, password reset requests you didn’t initiate or unexpected messages sent from your accounts. Most platforms allow you to review login history and connected devices. If you see something off, take action immediately by changing your password and revoking suspicious sessions.4. Invest in personal data removal services: You should also consider a data removal service. Given the scale and frequency of breaches like the one described above, relying on personal caution alone is no longer enough. Automated data removal services can provide an essential extra layer of defense by continuously scanning for and helping eliminate your exposed information from data broker sites and other online sources. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web.5. Avoid clicking on suspicious links and use strong antivirus software: One of the most common post-breach threats is phishing. Cybercriminals often use information from leaked databases to craft convincing emails that urge you to verify your account or reset your password. Never click on links or download attachments from unknown or suspicious sources. Instead, visit websites by typing the URL directly into your browser. The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Keep your software and devices up to date: Many cyberattacks exploit known vulnerabilities in outdated software. Operating systems, browsers, antivirus programs and even apps need to be updated regularly to patch security flaws. Turn on automatic updates wherever possible so you’re protected as soon as fixes are released. Staying current with your software is one of the easiest and most effective ways to block malware, ransomware and spyware from infiltrating your system. Kurt’s key takeawaySecurity is not only the responsibility of companies and hosting providers. Users need to adopt better practices, including unique passwords, multifactor authentication and regular reviews of their digital footprint. The careless exposure of over 184 million credentials is not just a mistake. It is an example of how fragile our systems remain when even basic protection is absent. In an era where artificial intelligence, quantum computing, and global connectivity are reshaping technology, it is unacceptable that plain text files containing financial and governmental credentials are still left sitting online.CLICK HERE TO GET THE FOX NEWS APPDo you feel that companies are doing enough to protect your data from hackers and other cyber threats? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
Fox News AI Newsletter: Scammers can exploit your data from just 1 ChatGPT search
A person using ChatGPT on their phoneWelcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY'S NEWSLETTER:- Scammers can exploit your data from just one ChatGPT search- Business Insider embraces AI while laying off 21% of workforce- Nvidia, Dell partner with Trump admin to make next-gen supercomputerGUARD YOUR DATA: ChatGPT and other large language modelshave become amazing helpers for everyday tasks. Whether it's summarizing complex ideas, designing a birthday card or even planning your apartment's layout, you can get impressive results with just a simple prompt.NEWS BREAK: Business Insider announced Thursday that the company will be shrinking the size of its newsroom and making layoffs, impacting over a fifth of its staff. Business Insider CEO Barbara Peng said in an internal memo obtained by Fox News Digital that the company is "fully embracing AI," as 70% of the company’s staff currently uses Enterprise ChatGPT, with a goal of 100%. Sen. Elizabeth Warren and progressives are taking issue with what they see as Nvidia's outsized influence in the AI chip market.HIGH TECH: Nvidia and Dell on Thursday announced a breakthrough supercomputer powered by artificial intelligencewill launch next year to help drive research at the Department of Energy.SETTING THE PACE: Pace University uses AI and scannable QR codes to read graduates' names. Passengers arrive to Terminal B at Newark Liberty International Airport in Newark, New Jersey on May 7, 2025.A-'EYE' IN THE SKY: Transportation Secretary Sean Duffy recently announced that artificial intelligenceis being used to detect and address air traffic risks, following a slew of near-misses and fatal plane crashes across the country.'PROFOUND TRANSFORMATION': Nvidia, a leader in the artificial intelligencespace, saw shares rise 3% in after-hours trading following the announcement. The earnings report showed that first-quarter net income was up 26% from a year ago at nearly billion, with revenue rising to billion, up 69% from last year. Apple logo'AGRI-FICIAL' INTELLIGENCE: John Deere is turning to artificial intelligence to help farmers address labor shortages and enable them to handle other tasks associated with their business.APPLE’S AI RECKONING': OpenAI has just made a move that's turning heads across the tech world. The company is acquiring io, the AI device startup founded by Jony Ive, for nearly billion. This isn't your typical business deal. It's a collaboration between Sam Altman, who leads OpenAI, and the designer responsible for some of Apple's most iconic products, including the iPhone and Apple Watch.STANDING TALL AGAIN: For Caroline Laubach, being a Wandercraft test pilot is about more than just trying out new technology. It's about reclaiming a sense of freedom and connection that many wheelchair users miss. Laubach, a spinal stroke survivor and full-time wheelchair user, has played a key role in demonstrating the personal AI-powered prototype exoskeleton's development, and her experience highlights just how life-changing this device can be. A man using an exoskeleton to walk.BOT BLUNDER: Google’s artificial intelligence chatbot is being slammed for "anti-American" claims about the supposed White supremacist origins of Memorial Day.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff.
#fox #news #newsletter #scammers #canFox News AI Newsletter: Scammers can exploit your data from just 1 ChatGPT searchA person using ChatGPT on their phoneWelcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY'S NEWSLETTER:- Scammers can exploit your data from just one ChatGPT search- Business Insider embraces AI while laying off 21% of workforce- Nvidia, Dell partner with Trump admin to make next-gen supercomputerGUARD YOUR DATA: ChatGPT and other large language modelshave become amazing helpers for everyday tasks. Whether it's summarizing complex ideas, designing a birthday card or even planning your apartment's layout, you can get impressive results with just a simple prompt.NEWS BREAK: Business Insider announced Thursday that the company will be shrinking the size of its newsroom and making layoffs, impacting over a fifth of its staff. Business Insider CEO Barbara Peng said in an internal memo obtained by Fox News Digital that the company is "fully embracing AI," as 70% of the company’s staff currently uses Enterprise ChatGPT, with a goal of 100%. Sen. Elizabeth Warren and progressives are taking issue with what they see as Nvidia's outsized influence in the AI chip market.HIGH TECH: Nvidia and Dell on Thursday announced a breakthrough supercomputer powered by artificial intelligencewill launch next year to help drive research at the Department of Energy.SETTING THE PACE: Pace University uses AI and scannable QR codes to read graduates' names. Passengers arrive to Terminal B at Newark Liberty International Airport in Newark, New Jersey on May 7, 2025.A-'EYE' IN THE SKY: Transportation Secretary Sean Duffy recently announced that artificial intelligenceis being used to detect and address air traffic risks, following a slew of near-misses and fatal plane crashes across the country.'PROFOUND TRANSFORMATION': Nvidia, a leader in the artificial intelligencespace, saw shares rise 3% in after-hours trading following the announcement. The earnings report showed that first-quarter net income was up 26% from a year ago at nearly billion, with revenue rising to billion, up 69% from last year. Apple logo'AGRI-FICIAL' INTELLIGENCE: John Deere is turning to artificial intelligence to help farmers address labor shortages and enable them to handle other tasks associated with their business.APPLE’S AI RECKONING': OpenAI has just made a move that's turning heads across the tech world. The company is acquiring io, the AI device startup founded by Jony Ive, for nearly billion. This isn't your typical business deal. It's a collaboration between Sam Altman, who leads OpenAI, and the designer responsible for some of Apple's most iconic products, including the iPhone and Apple Watch.STANDING TALL AGAIN: For Caroline Laubach, being a Wandercraft test pilot is about more than just trying out new technology. It's about reclaiming a sense of freedom and connection that many wheelchair users miss. Laubach, a spinal stroke survivor and full-time wheelchair user, has played a key role in demonstrating the personal AI-powered prototype exoskeleton's development, and her experience highlights just how life-changing this device can be. A man using an exoskeleton to walk.BOT BLUNDER: Google’s artificial intelligence chatbot is being slammed for "anti-American" claims about the supposed White supremacist origins of Memorial Day.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff. #fox #news #newsletter #scammers #canWWW.FOXNEWS.COMFox News AI Newsletter: Scammers can exploit your data from just 1 ChatGPT searchA person using ChatGPT on their phone (Kurt "CyberGuy" Knutsson) Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY'S NEWSLETTER:- Scammers can exploit your data from just one ChatGPT search- Business Insider embraces AI while laying off 21% of workforce- Nvidia, Dell partner with Trump admin to make next-gen supercomputerGUARD YOUR DATA: ChatGPT and other large language models (LLMs) have become amazing helpers for everyday tasks. Whether it's summarizing complex ideas, designing a birthday card or even planning your apartment's layout, you can get impressive results with just a simple prompt.NEWS BREAK: Business Insider announced Thursday that the company will be shrinking the size of its newsroom and making layoffs, impacting over a fifth of its staff. Business Insider CEO Barbara Peng said in an internal memo obtained by Fox News Digital that the company is "fully embracing AI," as 70% of the company’s staff currently uses Enterprise ChatGPT, with a goal of 100%. Sen. Elizabeth Warren and progressives are taking issue with what they see as Nvidia's outsized influence in the AI chip market. (Justin Sullivan/Getty Images)HIGH TECH: Nvidia and Dell on Thursday announced a breakthrough supercomputer powered by artificial intelligence (AI) will launch next year to help drive research at the Department of Energy (DOE).SETTING THE PACE: Pace University uses AI and scannable QR codes to read graduates' names. Passengers arrive to Terminal B at Newark Liberty International Airport in Newark, New Jersey on May 7, 2025. (KENA BETANCUR/AFP via Getty Images)A-'EYE' IN THE SKY: Transportation Secretary Sean Duffy recently announced that artificial intelligence (AI) is being used to detect and address air traffic risks, following a slew of near-misses and fatal plane crashes across the country.'PROFOUND TRANSFORMATION': Nvidia, a leader in the artificial intelligence (AI) space, saw shares rise 3% in after-hours trading following the announcement. The earnings report showed that first-quarter net income was up 26% from a year ago at nearly $19 billion, with revenue rising to $44 billion, up 69% from last year. Apple logo (Kurt "CyberGuy" Knutsson)'AGRI-FICIAL' INTELLIGENCE: John Deere is turning to artificial intelligence to help farmers address labor shortages and enable them to handle other tasks associated with their business.APPLE’S AI RECKONING': OpenAI has just made a move that's turning heads across the tech world. The company is acquiring io, the AI device startup founded by Jony Ive, for nearly $6.5 billion. This isn't your typical business deal. It's a collaboration between Sam Altman, who leads OpenAI, and the designer responsible for some of Apple's most iconic products, including the iPhone and Apple Watch.STANDING TALL AGAIN: For Caroline Laubach, being a Wandercraft test pilot is about more than just trying out new technology. It's about reclaiming a sense of freedom and connection that many wheelchair users miss. Laubach, a spinal stroke survivor and full-time wheelchair user, has played a key role in demonstrating the personal AI-powered prototype exoskeleton's development, and her experience highlights just how life-changing this device can be. A man using an exoskeleton to walk. (Wandercraft)BOT BLUNDER: Google’s artificial intelligence chatbot is being slammed for "anti-American" claims about the supposed White supremacist origins of Memorial Day.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff.4 Comments 0 Shares -
Brain implant enables ALS patient to communicate using AI
Published
May 31, 2025 6:00am EDT close Brain implant enables ALS patient to communicate using AI ALS patient communicates with the world using only his thoughts. Imagine losing your ability to speak or move, yet still having so much to say. For Brad G. Smith, this became his reality after being diagnosed with ALS, a rare and progressive disease that attacks the nerves controlling voluntary muscle movement. But thanks to a groundbreaking Neuralink brain implant, Smith is now able to communicate with the world using only his thoughts. ALS patient Brad G. Smith and his family.Life before NeuralinkBefore receiving the Neuralink implant, Smith relied on eye-tracking technology to communicate. While impressive, it came with major limitations. "It is a miracle of technology, but it is frustrating. It works best in dark rooms, so I was basically Batman. I was stuck in a dark room," Smith shared in a recent post on X. Bright environments would disrupt the system, making communication slow and sometimes impossible. Now, Smith says, "Neuralink lets me go outside and ignore lighting changes."PARALYZED MAN WITH ALS IS THIRD TO RECEIVE NEURALINK IMPLANT, CAN TYPE WITH BRAIN ALS patient Brad G. Smith.How the Neuralink brain implant worksSmith is the first non-verbal person and only the third individual worldwide to receive the Neuralink Brain-Computer Interface. The device, about as thick as five stacked coins, sits in his skull and connects to the motor cortex-the part of the brain that controls movement.Tiny wires, thinner than human hair, extend into Smith's brain. These pick up signals from his neurons and transmit them wirelessly to his MacBook Pro. The computer then decodes these signals, allowing Smith to move a cursor on the screen with his thoughts alone.As Smith explains, "The Neuralink implant embedded in my brain contains 1024 electrodes that capture neuron firings every 15 milliseconds generating a vast amount of data. Artificial intelligence processes this data on a connected MacBook Pro to decode my intended movements in real time to move the cursor on my screen. Neuralink does not read my deepest thoughts or words I think about. It just reads how I wanna move and moves the cursor where I want."WHAT IS ARTIFICIAL INTELLIGENCE? Neuralink brain implant.Training the brain-computer connectionLearning to use the system took some trial and error. At first, the team tried mapping Smith's hand movements to the cursor, but it didn't work well. After more research, they discovered that signals related to his tongue were the most effective for cursor movement, and clenching his jaw worked best for clicking. "I am not actively thinking about my tongue, just like you don't think about your wrist when you move a mouse. I have done a lot of cursor movements in my life. I think my brain has switched over to subconscious control quickly so I just think about moving the cursor," Smith said. ALS patient Brad G. Smith with his wife and child.Everyday life: Communication, play, and problem-solvingThe Neuralink implant has given Smith new ways to interact with his family and the world. He can now play games like Mario Kart with his children and communicate more quickly than before. The system includes a virtual keyboard and shortcuts for common actions, making tasks like copying, pasting and navigating web pages much easier.Smith also worked with Neuralink engineers to develop a "parking spot" feature for the cursor. "Sometimes you just wanna park the cursor and watch a video. When it is in the parking spot, I can watch a show or take a nap without worrying about the cursor," he explained. ALS patient Brad G. Smith and his child.AI assistance: Keeping up with conversationTo speed up communication even more, Smith uses Grok, Elon Musk's AI chatbot. Grok helps him write responses and even suggests witty replies. "We have created a chat app that uses AI to listen to the conversation and gives me options to say in response. It uses Grok 3 and an AI clone of my old voice to generate options for me to say. It is not perfect, but it keeps me in the conversation and it comes up with some great ideas," Smith shared. One example? When a friend needed a gift idea for his girlfriend who loves horses, the AI suggested a bouquet of carrots. ALS patient Brad G. Smith and his family.The human side: Family, faith and perspectiveSmith's journey has been shaped by more than just technology. He credits his wife, Tiffany, as his "best caregiver I could ever imagine," and recognizes the support of his kids, friends and family. Despite the challenges of ALS, Smith finds meaning and hope in his faith. "I have not always understood why God afflicted me with ALS but with time I am learning to trust his plan for me. I'm a better man because of ALS. I'm a better disciple of Jesus Christ because of ALS. I'm closer to my amazing wife, literally and figuratively, because of ALS," he said. ALS patient Brad G. Smith and his family.Looking ahead: What does this mean for others?Neuralink's technology is still in its early stages, but Smith's experience is already making waves. The company recently received a "breakthrough" designation from the Food and Drug Administration for its brain implant device, which hopes to help people with severe speech impairments caused by ALS, stroke, spinal cord injury and other neurological conditions.Neuro-ethicists are watching closely, as the merging of brain implants and AI raises important questions about privacy, autonomy and the future of human communication. ALS patient Brad G. Smith and his family.Kurt's key takeawaysSmith's story is about resilience, creativity and the power of technology to restore something as fundamental as the ability to communicate. As Smith puts it,CLICK HERE TO GET THE FOX NEWS APPIf you or a family member lost the ability to speak or move, would you consider a brain implant that lets you communicate with your thoughts? Let us know by writing to us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#brain #implant #enables #als #patientBrain implant enables ALS patient to communicate using AIPublished May 31, 2025 6:00am EDT close Brain implant enables ALS patient to communicate using AI ALS patient communicates with the world using only his thoughts. Imagine losing your ability to speak or move, yet still having so much to say. For Brad G. Smith, this became his reality after being diagnosed with ALS, a rare and progressive disease that attacks the nerves controlling voluntary muscle movement. But thanks to a groundbreaking Neuralink brain implant, Smith is now able to communicate with the world using only his thoughts. ALS patient Brad G. Smith and his family.Life before NeuralinkBefore receiving the Neuralink implant, Smith relied on eye-tracking technology to communicate. While impressive, it came with major limitations. "It is a miracle of technology, but it is frustrating. It works best in dark rooms, so I was basically Batman. I was stuck in a dark room," Smith shared in a recent post on X. Bright environments would disrupt the system, making communication slow and sometimes impossible. Now, Smith says, "Neuralink lets me go outside and ignore lighting changes."PARALYZED MAN WITH ALS IS THIRD TO RECEIVE NEURALINK IMPLANT, CAN TYPE WITH BRAIN ALS patient Brad G. Smith.How the Neuralink brain implant worksSmith is the first non-verbal person and only the third individual worldwide to receive the Neuralink Brain-Computer Interface. The device, about as thick as five stacked coins, sits in his skull and connects to the motor cortex-the part of the brain that controls movement.Tiny wires, thinner than human hair, extend into Smith's brain. These pick up signals from his neurons and transmit them wirelessly to his MacBook Pro. The computer then decodes these signals, allowing Smith to move a cursor on the screen with his thoughts alone.As Smith explains, "The Neuralink implant embedded in my brain contains 1024 electrodes that capture neuron firings every 15 milliseconds generating a vast amount of data. Artificial intelligence processes this data on a connected MacBook Pro to decode my intended movements in real time to move the cursor on my screen. Neuralink does not read my deepest thoughts or words I think about. It just reads how I wanna move and moves the cursor where I want."WHAT IS ARTIFICIAL INTELLIGENCE? Neuralink brain implant.Training the brain-computer connectionLearning to use the system took some trial and error. At first, the team tried mapping Smith's hand movements to the cursor, but it didn't work well. After more research, they discovered that signals related to his tongue were the most effective for cursor movement, and clenching his jaw worked best for clicking. "I am not actively thinking about my tongue, just like you don't think about your wrist when you move a mouse. I have done a lot of cursor movements in my life. I think my brain has switched over to subconscious control quickly so I just think about moving the cursor," Smith said. ALS patient Brad G. Smith with his wife and child.Everyday life: Communication, play, and problem-solvingThe Neuralink implant has given Smith new ways to interact with his family and the world. He can now play games like Mario Kart with his children and communicate more quickly than before. The system includes a virtual keyboard and shortcuts for common actions, making tasks like copying, pasting and navigating web pages much easier.Smith also worked with Neuralink engineers to develop a "parking spot" feature for the cursor. "Sometimes you just wanna park the cursor and watch a video. When it is in the parking spot, I can watch a show or take a nap without worrying about the cursor," he explained. ALS patient Brad G. Smith and his child.AI assistance: Keeping up with conversationTo speed up communication even more, Smith uses Grok, Elon Musk's AI chatbot. Grok helps him write responses and even suggests witty replies. "We have created a chat app that uses AI to listen to the conversation and gives me options to say in response. It uses Grok 3 and an AI clone of my old voice to generate options for me to say. It is not perfect, but it keeps me in the conversation and it comes up with some great ideas," Smith shared. One example? When a friend needed a gift idea for his girlfriend who loves horses, the AI suggested a bouquet of carrots. ALS patient Brad G. Smith and his family.The human side: Family, faith and perspectiveSmith's journey has been shaped by more than just technology. He credits his wife, Tiffany, as his "best caregiver I could ever imagine," and recognizes the support of his kids, friends and family. Despite the challenges of ALS, Smith finds meaning and hope in his faith. "I have not always understood why God afflicted me with ALS but with time I am learning to trust his plan for me. I'm a better man because of ALS. I'm a better disciple of Jesus Christ because of ALS. I'm closer to my amazing wife, literally and figuratively, because of ALS," he said. ALS patient Brad G. Smith and his family.Looking ahead: What does this mean for others?Neuralink's technology is still in its early stages, but Smith's experience is already making waves. The company recently received a "breakthrough" designation from the Food and Drug Administration for its brain implant device, which hopes to help people with severe speech impairments caused by ALS, stroke, spinal cord injury and other neurological conditions.Neuro-ethicists are watching closely, as the merging of brain implants and AI raises important questions about privacy, autonomy and the future of human communication. ALS patient Brad G. Smith and his family.Kurt's key takeawaysSmith's story is about resilience, creativity and the power of technology to restore something as fundamental as the ability to communicate. As Smith puts it,CLICK HERE TO GET THE FOX NEWS APPIf you or a family member lost the ability to speak or move, would you consider a brain implant that lets you communicate with your thoughts? Let us know by writing to us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #brain #implant #enables #als #patientWWW.FOXNEWS.COMBrain implant enables ALS patient to communicate using AIPublished May 31, 2025 6:00am EDT close Brain implant enables ALS patient to communicate using AI ALS patient communicates with the world using only his thoughts. Imagine losing your ability to speak or move, yet still having so much to say. For Brad G. Smith, this became his reality after being diagnosed with ALS, a rare and progressive disease that attacks the nerves controlling voluntary muscle movement. But thanks to a groundbreaking Neuralink brain implant, Smith is now able to communicate with the world using only his thoughts. ALS patient Brad G. Smith and his family. (Bradford G. Smith/X)Life before NeuralinkBefore receiving the Neuralink implant, Smith relied on eye-tracking technology to communicate. While impressive, it came with major limitations. "It is a miracle of technology, but it is frustrating. It works best in dark rooms, so I was basically Batman. I was stuck in a dark room," Smith shared in a recent post on X. Bright environments would disrupt the system, making communication slow and sometimes impossible. Now, Smith says, "Neuralink lets me go outside and ignore lighting changes."PARALYZED MAN WITH ALS IS THIRD TO RECEIVE NEURALINK IMPLANT, CAN TYPE WITH BRAIN ALS patient Brad G. Smith. (Bradford G. Smith/X)How the Neuralink brain implant worksSmith is the first non-verbal person and only the third individual worldwide to receive the Neuralink Brain-Computer Interface (BCI). The device, about as thick as five stacked coins, sits in his skull and connects to the motor cortex-the part of the brain that controls movement.Tiny wires, thinner than human hair, extend into Smith's brain. These pick up signals from his neurons and transmit them wirelessly to his MacBook Pro. The computer then decodes these signals, allowing Smith to move a cursor on the screen with his thoughts alone.As Smith explains, "The Neuralink implant embedded in my brain contains 1024 electrodes that capture neuron firings every 15 milliseconds generating a vast amount of data. Artificial intelligence processes this data on a connected MacBook Pro to decode my intended movements in real time to move the cursor on my screen. Neuralink does not read my deepest thoughts or words I think about. It just reads how I wanna move and moves the cursor where I want."WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Neuralink brain implant. (Bradford G. Smith/X)Training the brain-computer connectionLearning to use the system took some trial and error. At first, the team tried mapping Smith's hand movements to the cursor, but it didn't work well. After more research, they discovered that signals related to his tongue were the most effective for cursor movement, and clenching his jaw worked best for clicking. "I am not actively thinking about my tongue, just like you don't think about your wrist when you move a mouse. I have done a lot of cursor movements in my life. I think my brain has switched over to subconscious control quickly so I just think about moving the cursor," Smith said. ALS patient Brad G. Smith with his wife and child. (Bradford G. Smith/X)Everyday life: Communication, play, and problem-solvingThe Neuralink implant has given Smith new ways to interact with his family and the world. He can now play games like Mario Kart with his children and communicate more quickly than before. The system includes a virtual keyboard and shortcuts for common actions, making tasks like copying, pasting and navigating web pages much easier.Smith also worked with Neuralink engineers to develop a "parking spot" feature for the cursor. "Sometimes you just wanna park the cursor and watch a video. When it is in the parking spot, I can watch a show or take a nap without worrying about the cursor," he explained. ALS patient Brad G. Smith and his child. (Bradford G. Smith/X)AI assistance: Keeping up with conversationTo speed up communication even more, Smith uses Grok, Elon Musk's AI chatbot. Grok helps him write responses and even suggests witty replies. "We have created a chat app that uses AI to listen to the conversation and gives me options to say in response. It uses Grok 3 and an AI clone of my old voice to generate options for me to say. It is not perfect, but it keeps me in the conversation and it comes up with some great ideas," Smith shared. One example? When a friend needed a gift idea for his girlfriend who loves horses, the AI suggested a bouquet of carrots. ALS patient Brad G. Smith and his family. (Bradford G. Smith/X)The human side: Family, faith and perspectiveSmith's journey has been shaped by more than just technology. He credits his wife, Tiffany, as his "best caregiver I could ever imagine," and recognizes the support of his kids, friends and family. Despite the challenges of ALS, Smith finds meaning and hope in his faith. "I have not always understood why God afflicted me with ALS but with time I am learning to trust his plan for me. I'm a better man because of ALS. I'm a better disciple of Jesus Christ because of ALS. I'm closer to my amazing wife, literally and figuratively, because of ALS," he said. ALS patient Brad G. Smith and his family. (Bradford G. Smith/X)Looking ahead: What does this mean for others?Neuralink's technology is still in its early stages, but Smith's experience is already making waves. The company recently received a "breakthrough" designation from the Food and Drug Administration for its brain implant device, which hopes to help people with severe speech impairments caused by ALS, stroke, spinal cord injury and other neurological conditions.Neuro-ethicists are watching closely, as the merging of brain implants and AI raises important questions about privacy, autonomy and the future of human communication. ALS patient Brad G. Smith and his family. (Bradford G. Smith/X)Kurt's key takeawaysSmith's story is about resilience, creativity and the power of technology to restore something as fundamental as the ability to communicate. As Smith puts it,CLICK HERE TO GET THE FOX NEWS APPIf you or a family member lost the ability to speak or move, would you consider a brain implant that lets you communicate with your thoughts? Let us know by writing to us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
5 AI prompts to put serious money in your pocket
close A majority of small businesses are using artificial intelligence A majority of small businesses are using artificial intelligence and finding out it can save time and money. So, you want to start making money using AI but you’re not trying to build Skynet or learn 15 coding languages first? Good, because neither am I. You don’t need to become the next Sam Altman or have a Ph.D. in machine learning to turn artificial intelligence into real income. What you do need is curiosity, a dash of creativity, and the right prompts. Enter to win for you and for your favorite person or charity in our Pay It Forward Sweepstakes. Hurry, ends soon!I’ve pulled together five powerful, practical prompts you can throw into ChatGPTto help you start earning extra cash this week. These aren’t pie-in-the-sky dreams or K-a-month YouTube ad schemes. They’re doable, even if your calendar is already packed.5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTERLet’s get to it.1. Fast-Track Your Freelance LifePrompt to use:"Act as a freelance business coach. Suggest 3 services I can offer on Fiverr or Upwork using AI tools like ChatGPT, Midjourney or Canva. I haveexperience."Why this works:Freelance work is exploding right now. Platforms like Upwork and Fiverr are filled with small businesses and entrepreneurs who need help—but don’t have the budget to hire full-time staff. If you’ve got any kind of professional background, you can use AI tools to turbocharge your services. Writing blog posts? ChatGPT can give you a draft. Creating logos or social media templates? Midjourney and Canva are your new best friends.You don’t need a team. You don’t need fancy software. You just need a good prompt and the confidence to say, "Yes, I can do that." AI helps you scale what you already know how to do. A man is pictured with a smartphone and laptop computer on January 31, 2019. 2. Make Product Descriptions Sexy AgainPrompt to use:"Rewrite this Etsy or Shopify product description to make it more compelling and SEO-friendly. Target audience:. Here’s the original:."Why this works:Let’s face it—most product descriptions online are a snooze. But good copy sells. Whether you’re running your own shop or helping someone else with theirs, compelling product descriptions convert clicks into customers. Use ChatGPT to punch up the language, fine-tune for SEO, and speak directly to your ideal buyer.DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARERemember: people don’t just want to buy a weird mug. They want to buy what it says about them. That’s where a smart rewrite can turn browsers into buyers.3. Social Posts That SellPrompt to use:"Create 5 attention-grabbing Instagram captions to promote this. Keep the toneand include a strong call to action."Why this works:We live in a scroll-happy world. Your social captions need to grab attention in less than three seconds. But not everyone’s a copywriter—and not everyone has time to be. AI can help you crank out engaging content in the tone and style that fits your brand. Add a great photo, post consistently, and you’re suddenly a one-person content agency without the overhead. A photo taken on October 4, 2023 in Manta, near Turin, shows a smartphone and a laptop displaying the logos of the artificial intelligence OpenAI research company and ChatGPT chatbot.If you’re managing social for clients or your own biz, this prompt is gold. Use it to build content calendars, write reels scripts, or even draft ad copy.4. Polite Emails That You MoneyPrompt to use:"Write a short, polite email to ask for a lower rate or discount on. Mention that I’m a loyal customer comparing alternatives."Why this works:Negotiating discounts doesn’t always feel comfortable but it absolutely works. Companies often have unpublished deals, especially for longtime users or small businesses. And customer service reps? They're human beings. A kind, well-written email might be all it takes to get a discount on that software you’re using every month.20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIERI’ve personally saved hundreds of dollars just by sending quick, respectful emails like this. AI can help you strike the perfect tone confident but kind, assertive but not pushy.5. Your Passive Income KitPrompt to use:"Give me 3 high-demand, low-competition ideas for a short e-book or low-content book I can sell on Amazon. I have experience in."Why this works:You have knowledge people want. Package it. Sell it. Repeat. Whether it’s a short guide on starting a backyard garden or a workbook for productivity hacks, e-books and low-content bookssell surprisingly well. And AI can help you brainstorm ideas, outline chapters, even draft content to polish up. In this photo illustration the logo of Apple Mail Programme Mail can be seen on a smartphone next to a finger on March 27, 2024 in Berlin, Germany.Upload it to Amazon KDP or Gumroad, and now you’ve got a digital product that can earn money in your sleep. People pay for convenience, and you have life experience worth sharing.Final ThoughtYou don’t need to master AI to start earning with it. You just need to start using it. These five prompts are a low-risk, high-potential way to get your feet wet. And if you need a hand turning these sparks into something bigger, I’m here.I built my multimillion-dollar business with no investors and no debt. I’ve done this without a big team or expensive consultants. And I’d love to help you do the same.Drop me a note. I read every one.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio: Airing on 500+ stations across the US - Find yours or get the free podcast.Daily newsletter: Join 650,000 people who read the CurrentWatch: On Kim’s YouTube channelCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.
#prompts #put #serious #money #your5 AI prompts to put serious money in your pocketclose A majority of small businesses are using artificial intelligence A majority of small businesses are using artificial intelligence and finding out it can save time and money. So, you want to start making money using AI but you’re not trying to build Skynet or learn 15 coding languages first? Good, because neither am I. You don’t need to become the next Sam Altman or have a Ph.D. in machine learning to turn artificial intelligence into real income. What you do need is curiosity, a dash of creativity, and the right prompts.💸 Enter to win for you and for your favorite person or charity in our Pay It Forward Sweepstakes. Hurry, ends soon!I’ve pulled together five powerful, practical prompts you can throw into ChatGPTto help you start earning extra cash this week. These aren’t pie-in-the-sky dreams or K-a-month YouTube ad schemes. They’re doable, even if your calendar is already packed.5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTERLet’s get to it.1. Fast-Track Your Freelance LifePrompt to use:"Act as a freelance business coach. Suggest 3 services I can offer on Fiverr or Upwork using AI tools like ChatGPT, Midjourney or Canva. I haveexperience."Why this works:Freelance work is exploding right now. Platforms like Upwork and Fiverr are filled with small businesses and entrepreneurs who need help—but don’t have the budget to hire full-time staff. If you’ve got any kind of professional background, you can use AI tools to turbocharge your services. Writing blog posts? ChatGPT can give you a draft. Creating logos or social media templates? Midjourney and Canva are your new best friends.You don’t need a team. You don’t need fancy software. You just need a good prompt and the confidence to say, "Yes, I can do that." AI helps you scale what you already know how to do. A man is pictured with a smartphone and laptop computer on January 31, 2019. 2. Make Product Descriptions Sexy AgainPrompt to use:"Rewrite this Etsy or Shopify product description to make it more compelling and SEO-friendly. Target audience:. Here’s the original:."Why this works:Let’s face it—most product descriptions online are a snooze. But good copy sells. Whether you’re running your own shop or helping someone else with theirs, compelling product descriptions convert clicks into customers. Use ChatGPT to punch up the language, fine-tune for SEO, and speak directly to your ideal buyer.DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARERemember: people don’t just want to buy a weird mug. They want to buy what it says about them. That’s where a smart rewrite can turn browsers into buyers.3. Social Posts That SellPrompt to use:"Create 5 attention-grabbing Instagram captions to promote this. Keep the toneand include a strong call to action."Why this works:We live in a scroll-happy world. Your social captions need to grab attention in less than three seconds. But not everyone’s a copywriter—and not everyone has time to be. AI can help you crank out engaging content in the tone and style that fits your brand. Add a great photo, post consistently, and you’re suddenly a one-person content agency without the overhead. A photo taken on October 4, 2023 in Manta, near Turin, shows a smartphone and a laptop displaying the logos of the artificial intelligence OpenAI research company and ChatGPT chatbot.If you’re managing social for clients or your own biz, this prompt is gold. Use it to build content calendars, write reels scripts, or even draft ad copy.4. Polite Emails That You MoneyPrompt to use:"Write a short, polite email to ask for a lower rate or discount on. Mention that I’m a loyal customer comparing alternatives."Why this works:Negotiating discounts doesn’t always feel comfortable but it absolutely works. Companies often have unpublished deals, especially for longtime users or small businesses. And customer service reps? They're human beings. A kind, well-written email might be all it takes to get a discount on that software you’re using every month.20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIERI’ve personally saved hundreds of dollars just by sending quick, respectful emails like this. AI can help you strike the perfect tone confident but kind, assertive but not pushy.5. Your Passive Income KitPrompt to use:"Give me 3 high-demand, low-competition ideas for a short e-book or low-content book I can sell on Amazon. I have experience in."Why this works:You have knowledge people want. Package it. Sell it. Repeat. Whether it’s a short guide on starting a backyard garden or a workbook for productivity hacks, e-books and low-content bookssell surprisingly well. And AI can help you brainstorm ideas, outline chapters, even draft content to polish up. In this photo illustration the logo of Apple Mail Programme Mail can be seen on a smartphone next to a finger on March 27, 2024 in Berlin, Germany.Upload it to Amazon KDP or Gumroad, and now you’ve got a digital product that can earn money in your sleep. People pay for convenience, and you have life experience worth sharing.Final ThoughtYou don’t need to master AI to start earning with it. You just need to start using it. These five prompts are a low-risk, high-potential way to get your feet wet. And if you need a hand turning these sparks into something bigger, I’m here.I built my multimillion-dollar business with no investors and no debt. I’ve done this without a big team or expensive consultants. And I’d love to help you do the same.Drop me a note. I read every one.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio: Airing on 500+ stations across the US - Find yours or get the free podcast.Daily newsletter: Join 650,000 people who read the CurrentWatch: On Kim’s YouTube channelCopyright 2025, WestStar Multimedia Entertainment. All rights reserved. #prompts #put #serious #money #yourWWW.FOXNEWS.COM5 AI prompts to put serious money in your pocketclose A majority of small businesses are using artificial intelligence A majority of small businesses are using artificial intelligence and finding out it can save time and money. So, you want to start making money using AI but you’re not trying to build Skynet or learn 15 coding languages first? Good, because neither am I. You don’t need to become the next Sam Altman or have a Ph.D. in machine learning to turn artificial intelligence into real income. What you do need is curiosity, a dash of creativity, and the right prompts.💸 Enter to win $500 for you and $500 for your favorite person or charity in our Pay It Forward Sweepstakes. Hurry, ends soon!I’ve pulled together five powerful, practical prompts you can throw into ChatGPT (or your AI tool of choice) to help you start earning extra cash this week. These aren’t pie-in-the-sky dreams or $10K-a-month YouTube ad schemes. They’re doable, even if your calendar is already packed.5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTERLet’s get to it.1. Fast-Track Your Freelance LifePrompt to use:"Act as a freelance business coach. Suggest 3 services I can offer on Fiverr or Upwork using AI tools like ChatGPT, Midjourney or Canva. I have [insert skill: writing/design/admin/accounting/managerial] experience."Why this works:Freelance work is exploding right now. Platforms like Upwork and Fiverr are filled with small businesses and entrepreneurs who need help—but don’t have the budget to hire full-time staff. If you’ve got any kind of professional background, you can use AI tools to turbocharge your services. Writing blog posts? ChatGPT can give you a draft. Creating logos or social media templates? Midjourney and Canva are your new best friends.You don’t need a team. You don’t need fancy software. You just need a good prompt and the confidence to say, "Yes, I can do that." AI helps you scale what you already know how to do. A man is pictured with a smartphone and laptop computer on January 31, 2019. (Neil Godwin/Future via Getty Images)2. Make Product Descriptions Sexy AgainPrompt to use:"Rewrite this Etsy or Shopify product description to make it more compelling and SEO-friendly. Target audience: [insert group]. Here’s the original: [paste description]."Why this works:Let’s face it—most product descriptions online are a snooze. But good copy sells. Whether you’re running your own shop or helping someone else with theirs, compelling product descriptions convert clicks into customers. Use ChatGPT to punch up the language, fine-tune for SEO, and speak directly to your ideal buyer.DON’T SCAM YOURSELF WITH THE TRICKS HACKERS DON’T WANT ME TO SHARERemember: people don’t just want to buy a weird mug. They want to buy what it says about them. That’s where a smart rewrite can turn browsers into buyers.3. Social Posts That SellPrompt to use:"Create 5 attention-grabbing Instagram captions to promote this [product/service]. Keep the tone [fun, confident, expert] and include a strong call to action."Why this works:We live in a scroll-happy world. Your social captions need to grab attention in less than three seconds. But not everyone’s a copywriter—and not everyone has time to be. AI can help you crank out engaging content in the tone and style that fits your brand. Add a great photo, post consistently, and you’re suddenly a one-person content agency without the overhead (or endless Zoom meetings). A photo taken on October 4, 2023 in Manta, near Turin, shows a smartphone and a laptop displaying the logos of the artificial intelligence OpenAI research company and ChatGPT chatbot. (MARCO BERTORELLO/AFP via Getty Images)If you’re managing social for clients or your own biz, this prompt is gold. Use it to build content calendars, write reels scripts, or even draft ad copy.4. Polite Emails That Save You MoneyPrompt to use:"Write a short, polite email to ask for a lower rate or discount on [tool/service/platform]. Mention that I’m a loyal customer comparing alternatives."Why this works:Negotiating discounts doesn’t always feel comfortable but it absolutely works. Companies often have unpublished deals, especially for longtime users or small businesses. And customer service reps? They're human beings. A kind, well-written email might be all it takes to get a discount on that software you’re using every month.20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIERI’ve personally saved hundreds of dollars just by sending quick, respectful emails like this. AI can help you strike the perfect tone confident but kind, assertive but not pushy.5. Your Passive Income KitPrompt to use:"Give me 3 high-demand, low-competition ideas for a short e-book or low-content book I can sell on Amazon. I have experience in [insert topic]."Why this works:You have knowledge people want. Package it. Sell it. Repeat. Whether it’s a short guide on starting a backyard garden or a workbook for productivity hacks, e-books and low-content books (like journals or planners) sell surprisingly well. And AI can help you brainstorm ideas, outline chapters, even draft content to polish up. In this photo illustration the logo of Apple Mail Programme Mail can be seen on a smartphone next to a finger on March 27, 2024 in Berlin, Germany. (Photo Illustration by Thomas Trutschel/Photothek via Getty Images)Upload it to Amazon KDP or Gumroad, and now you’ve got a digital product that can earn money in your sleep. People pay for convenience, and you have life experience worth sharing.Final ThoughtYou don’t need to master AI to start earning with it. You just need to start using it. These five prompts are a low-risk, high-potential way to get your feet wet. And if you need a hand turning these sparks into something bigger, I’m here.I built my multimillion-dollar business with no investors and no debt. I’ve done this without a big team or expensive consultants. And I’d love to help you do the same.Drop me a note. I read every one.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio: Airing on 500+ stations across the US - Find yours or get the free podcast.Daily newsletter: Join 650,000 people who read the Current (free!)Watch: On Kim’s YouTube channelCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.0 Comments 0 Shares -
How to access and download your Facebook data
close Meta launches community notes for Facebook to replace fact-checking Founder and Hedgehog CEO John Matze joined 'FOX & Friends First' to discuss his optimism surrounding the community notes program, staying competitive globally with AI and the possibility of Oracle buying TikTok. Reviewing your Facebook data allows you to see what personal information Facebook has collected about you, helping you make informed decisions about your privacy settings. You might also need a copy of your data, which serves as a backup of your photos, messages and memories in case you lose access to your account or decide to delete it. Additionally, understanding what data Facebook stores can help you better comprehend how the platform uses your information for advertising and content personalization. Here's how to do it. A person logging onto Facebook.What data can you access on Facebook?Facebook collects a wide range of data from you, including your profile information, posts, photos, comments, likes, friends list, location data, search history and interactions with ads and pages. The company uses this data to personalize your experience and show you targeted ads. It also uses the data and shares it with third-party partners to improve its services.When you request your data, you can access files containing the information you've providedas well as account activity such as posts, photos, messages and data logs. These logs include your interactions, device information and connections to third-party apps, websites and services.Keep in mind that not all data Facebook collects about you will be included in your download. How to download your Facebook data on desktopThe process of accessing and downloading your data from Facebook can change. As of May 2025, you can access and download your information on Facebook using the steps below:Click your profile picture icon in the top-right corner of the screen. When the menu appears, clickSettings & Privacy. Steps to download your Facebook data on desktop.Click Settings in the submenu that appears.WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE Steps to download your Facebook data on desktop.Click Accounts Center in the left sidebar. Steps to download your Facebook data on desktop.In the left menu, click Your information and permissions. Then, click Access your information in the right panel.5 MOBILE PRIVACY TERMS YOU NEED TO KNOW TO PROTECT YOURSELF Steps to download your Facebook data on desktop.After verifying that all the information you need is there, scroll to the bottom and click Download your information. Steps to download your Facebook data on desktop In the pop-up, click Download or transfer information. Steps to download your Facebook data on desktop.Select your Facebook account from the list of accounts and click Next. Steps to download your Facebook data on desktop.Now you need to select how much information you want to receive. We recommend clicking Available information to get a complete copy of everything you need. Steps to download your Facebook data on desktop.Click Download to device so that it's downloaded to your computer. Steps to download your Facebook data on desktop.Now you need to select your file options. In the Date range field, select the period from which you want Facebook to send your data. The default is Last year, but you can choose Last 3 years or All time for a more comprehensive dataset. In the Notify field, verify that your email address is correct. Keep the Format and Media quality fields set to HTML and Medium, respectively. Then, click Create files. Steps to download your Facebook data on desktop.Wait for an email notification from Facebook that your requested file is ready to download. That can take up to an hour. Once you receive it, you have four days until the download request expires. When you receive the notification, log into your Facebook account and follow the steps below to download the requested information:Click the bell icon in the top-right corner. In the menu, click the notification that says "The files you requested are ready to download." Steps to download your Facebook data on desktop.Click Download in the pop-up. Steps to download your Facebook data on desktop.Enter your Facebook password and click Continue to download the file to your computer. Steps to download your Facebook data on desktop.How to download your Facebook data on mobileThe steps below are for iPhone, but they will also work on Android. However, some menu items may appear in slightly different locations or use slightly different names compared to the iPhone. Follow the steps below:Tap Menuin the bottom-right corner of the screen. Steps to download your Facebook data on mobile.Tap Settings & Privacy to expand it and then tap Settings. Steps to download your Facebook data on mobile.Tap Accounts Center. Steps to download your Facebook data on mobile.Tap Your information and permissions. Steps to download your Facebook data on mobile.Tap Access your information. Steps to download your Facebook data on mobile.You can review the information to see if it includes everything you need. Afterward, scroll to the bottom and tap Download your information.Tap Download or transfer information.Select the Facebook accountyou want to download the information from and tap Next.On the screen for selecting how much information you want, tap Available information to get a complete copy. Steps to download your Facebook data on mobile.Next, tap Download to device to store the information on your phone. Steps to download your Facebook data on mobile.Next, you will need to create the file to download. Set Date range to Last 3 years or All time. Ensure the email address in the Notify field is the one where you want the notification to be sent. Keep the Format and Media quality fields as they are: HTML and Medium, respectively. Finally, tap the Create files button. Steps to download your Facebook data on mobile.Wait for an email notification from Facebook that your requested file is ready to download. That can take up to an hour. Once you receive it, you have four days until the download request expires. When you receive the notification, follow the steps below to download the requested information:Open the Facebook app and tap the Notificationsin the bottom-right corner. Steps to download your Facebook data on mobile.In the Notifications screen, tap the notification that says "The files you requested are ready to download." Steps to download your Facebook data on mobile.Tap Download in the pop-up. Steps to download your Facebook data on mobile.Enter your Facebook password and tap Continue to download the file to your phone. Steps to download your Facebook data on mobile.Kurt's key takeawaysDownloading your Facebook data helps you understand what information the platform holds about you. While it may take some time to compile, especially for longer periods, it's worth doing periodically so you’re aware of your digital footprint on the platform and keep a personal backup in case something happens to the online version.CLICK HERE TO GET THE FOX NEWS APPDid you find any surprising information that made you reconsider your social media usage? Let us know by writing to us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#how #access #download #your #facebookHow to access and download your Facebook dataclose Meta launches community notes for Facebook to replace fact-checking Founder and Hedgehog CEO John Matze joined 'FOX & Friends First' to discuss his optimism surrounding the community notes program, staying competitive globally with AI and the possibility of Oracle buying TikTok. Reviewing your Facebook data allows you to see what personal information Facebook has collected about you, helping you make informed decisions about your privacy settings. You might also need a copy of your data, which serves as a backup of your photos, messages and memories in case you lose access to your account or decide to delete it. Additionally, understanding what data Facebook stores can help you better comprehend how the platform uses your information for advertising and content personalization. Here's how to do it. A person logging onto Facebook.What data can you access on Facebook?Facebook collects a wide range of data from you, including your profile information, posts, photos, comments, likes, friends list, location data, search history and interactions with ads and pages. The company uses this data to personalize your experience and show you targeted ads. It also uses the data and shares it with third-party partners to improve its services.When you request your data, you can access files containing the information you've providedas well as account activity such as posts, photos, messages and data logs. These logs include your interactions, device information and connections to third-party apps, websites and services.Keep in mind that not all data Facebook collects about you will be included in your download. How to download your Facebook data on desktopThe process of accessing and downloading your data from Facebook can change. As of May 2025, you can access and download your information on Facebook using the steps below:Click your profile picture icon in the top-right corner of the screen. When the menu appears, clickSettings & Privacy. Steps to download your Facebook data on desktop.Click Settings in the submenu that appears.WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE Steps to download your Facebook data on desktop.Click Accounts Center in the left sidebar. Steps to download your Facebook data on desktop.In the left menu, click Your information and permissions. Then, click Access your information in the right panel.5 MOBILE PRIVACY TERMS YOU NEED TO KNOW TO PROTECT YOURSELF Steps to download your Facebook data on desktop.After verifying that all the information you need is there, scroll to the bottom and click Download your information. Steps to download your Facebook data on desktop In the pop-up, click Download or transfer information. Steps to download your Facebook data on desktop.Select your Facebook account from the list of accounts and click Next. Steps to download your Facebook data on desktop.Now you need to select how much information you want to receive. We recommend clicking Available information to get a complete copy of everything you need. Steps to download your Facebook data on desktop.Click Download to device so that it's downloaded to your computer. Steps to download your Facebook data on desktop.Now you need to select your file options. In the Date range field, select the period from which you want Facebook to send your data. The default is Last year, but you can choose Last 3 years or All time for a more comprehensive dataset. In the Notify field, verify that your email address is correct. Keep the Format and Media quality fields set to HTML and Medium, respectively. Then, click Create files. Steps to download your Facebook data on desktop.Wait for an email notification from Facebook that your requested file is ready to download. That can take up to an hour. Once you receive it, you have four days until the download request expires. When you receive the notification, log into your Facebook account and follow the steps below to download the requested information:Click the bell icon in the top-right corner. In the menu, click the notification that says "The files you requested are ready to download." Steps to download your Facebook data on desktop.Click Download in the pop-up. Steps to download your Facebook data on desktop.Enter your Facebook password and click Continue to download the file to your computer. Steps to download your Facebook data on desktop.How to download your Facebook data on mobileThe steps below are for iPhone, but they will also work on Android. However, some menu items may appear in slightly different locations or use slightly different names compared to the iPhone. Follow the steps below:Tap Menuin the bottom-right corner of the screen. Steps to download your Facebook data on mobile.Tap Settings & Privacy to expand it and then tap Settings. Steps to download your Facebook data on mobile.Tap Accounts Center. Steps to download your Facebook data on mobile.Tap Your information and permissions. Steps to download your Facebook data on mobile.Tap Access your information. Steps to download your Facebook data on mobile.You can review the information to see if it includes everything you need. Afterward, scroll to the bottom and tap Download your information.Tap Download or transfer information.Select the Facebook accountyou want to download the information from and tap Next.On the screen for selecting how much information you want, tap Available information to get a complete copy. Steps to download your Facebook data on mobile.Next, tap Download to device to store the information on your phone. Steps to download your Facebook data on mobile.Next, you will need to create the file to download. Set Date range to Last 3 years or All time. Ensure the email address in the Notify field is the one where you want the notification to be sent. Keep the Format and Media quality fields as they are: HTML and Medium, respectively. Finally, tap the Create files button. Steps to download your Facebook data on mobile.Wait for an email notification from Facebook that your requested file is ready to download. That can take up to an hour. Once you receive it, you have four days until the download request expires. When you receive the notification, follow the steps below to download the requested information:Open the Facebook app and tap the Notificationsin the bottom-right corner. Steps to download your Facebook data on mobile.In the Notifications screen, tap the notification that says "The files you requested are ready to download." Steps to download your Facebook data on mobile.Tap Download in the pop-up. Steps to download your Facebook data on mobile.Enter your Facebook password and tap Continue to download the file to your phone. Steps to download your Facebook data on mobile.Kurt's key takeawaysDownloading your Facebook data helps you understand what information the platform holds about you. While it may take some time to compile, especially for longer periods, it's worth doing periodically so you’re aware of your digital footprint on the platform and keep a personal backup in case something happens to the online version.CLICK HERE TO GET THE FOX NEWS APPDid you find any surprising information that made you reconsider your social media usage? Let us know by writing to us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #how #access #download #your #facebookWWW.FOXNEWS.COMHow to access and download your Facebook dataclose Meta launches community notes for Facebook to replace fact-checking Founder and Hedgehog CEO John Matze joined 'FOX & Friends First' to discuss his optimism surrounding the community notes program, staying competitive globally with AI and the possibility of Oracle buying TikTok. Reviewing your Facebook data allows you to see what personal information Facebook has collected about you, helping you make informed decisions about your privacy settings. You might also need a copy of your data, which serves as a backup of your photos, messages and memories in case you lose access to your account or decide to delete it. Additionally, understanding what data Facebook stores can help you better comprehend how the platform uses your information for advertising and content personalization. Here's how to do it. A person logging onto Facebook. (Kurt "CyberGuy" Knutsson)What data can you access on Facebook?Facebook collects a wide range of data from you, including your profile information, posts, photos, comments, likes, friends list, location data, search history and interactions with ads and pages. The company uses this data to personalize your experience and show you targeted ads. It also uses the data and shares it with third-party partners to improve its services.When you request your data, you can access files containing the information you've provided (like your name, email and address) as well as account activity such as posts, photos, messages and data logs. These logs include your interactions, device information and connections to third-party apps, websites and services.Keep in mind that not all data Facebook collects about you will be included in your download. How to download your Facebook data on desktopThe process of accessing and downloading your data from Facebook can change. As of May 2025, you can access and download your information on Facebook using the steps below:Click your profile picture icon in the top-right corner of the screen. When the menu appears, clickSettings & Privacy. Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)Click Settings in the submenu that appears.WHAT HACKERS CAN LEARN ABOUT YOU FROM A DATA BROKER FILE Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)Click Accounts Center in the left sidebar. Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)In the left menu, click Your information and permissions. Then, click Access your information in the right panel.5 MOBILE PRIVACY TERMS YOU NEED TO KNOW TO PROTECT YOURSELF Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)After verifying that all the information you need is there, scroll to the bottom and click Download your information. Steps to download your Facebook data on desktop (Kurt "CyberGuy" Knutsson)In the pop-up, click Download or transfer information. Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)Select your Facebook account from the list of accounts and click Next. Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)Now you need to select how much information you want to receive. We recommend clicking Available information to get a complete copy of everything you need. Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)Click Download to device so that it's downloaded to your computer. Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)Now you need to select your file options. In the Date range field, select the period from which you want Facebook to send your data. The default is Last year, but you can choose Last 3 years or All time for a more comprehensive dataset (note that longer periods take more time to prepare the data). In the Notify field, verify that your email address is correct. Keep the Format and Media quality fields set to HTML and Medium, respectively. Then, click Create files. Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)Wait for an email notification from Facebook that your requested file is ready to download. That can take up to an hour. Once you receive it, you have four days until the download request expires. When you receive the notification, log into your Facebook account and follow the steps below to download the requested information:Click the bell icon in the top-right corner. In the menu, click the notification that says "The files you requested are ready to download." Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)Click Download in the pop-up. Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)Enter your Facebook password and click Continue to download the file to your computer. Steps to download your Facebook data on desktop. (Kurt "CyberGuy" Knutsson)How to download your Facebook data on mobileThe steps below are for iPhone, but they will also work on Android. However, some menu items may appear in slightly different locations or use slightly different names compared to the iPhone. Follow the steps below:Tap Menu (the profile picture icon) in the bottom-right corner of the screen. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Tap Settings & Privacy to expand it and then tap Settings. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Tap Accounts Center. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Tap Your information and permissions. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Tap Access your information. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)You can review the information to see if it includes everything you need. Afterward, scroll to the bottom and tap Download your information.Tap Download or transfer information.Select the Facebook account(s) you want to download the information from and tap Next.On the screen for selecting how much information you want, tap Available information to get a complete copy. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Next, tap Download to device to store the information on your phone. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Next, you will need to create the file to download. Set Date range to Last 3 years or All time (might take longer to create). Ensure the email address in the Notify field is the one where you want the notification to be sent. Keep the Format and Media quality fields as they are: HTML and Medium, respectively. Finally, tap the Create files button. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Wait for an email notification from Facebook that your requested file is ready to download. That can take up to an hour. Once you receive it, you have four days until the download request expires. When you receive the notification, follow the steps below to download the requested information:Open the Facebook app and tap the Notifications (the bell icon) in the bottom-right corner. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)In the Notifications screen, tap the notification that says "The files you requested are ready to download." Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Tap Download in the pop-up. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Enter your Facebook password and tap Continue to download the file to your phone. Steps to download your Facebook data on mobile. (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysDownloading your Facebook data helps you understand what information the platform holds about you. While it may take some time to compile, especially for longer periods, it's worth doing periodically so you’re aware of your digital footprint on the platform and keep a personal backup in case something happens to the online version.CLICK HERE TO GET THE FOX NEWS APPDid you find any surprising information that made you reconsider your social media usage? Let us know by writing to us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
Clean up your phone: Speed, storage and privacy boost in minutes
close New tech helps travelers save on smartphone charges Artificial intelligence is now being used to personalize eSIMS, potentially saving hundreds of dollars for travelers overseas. Your smartphone works hard, but it doesn't always stay in top shape on its own. Over time, storage fills up, apps collect background data and privacy settings fall behind. You might notice slower performance, random glitches or just a general sense that things aren't running as smoothly as they used to. The good news is that a quick digital and physical cleanup can help your device run like new. These simple steps will help you free up space, improve speed and keep your personal data better protected. Woman looking at apps on smartphoneDigital cleanup tips1. Clear out apps and files you forgot existedIf your phone is low on storage or feeling sluggish, start by clearing out apps and files you no longer use. This is one of the fastest ways to improve speed and battery life.For iPhone usersOffload unused apps: Go to Settings > Apps > App Store > Turn on Offload Unused Apps.Review app storage usage: Go to Settings > General > iPhone Storage > Scroll down and select an offload or delete. Delete large message attachments: Go to Messages > Open a conversation > Tap contact name > Info > See All under Photos > Tap Select > Tap photos you want to delete > Tap Delete on the bottom right > Confirm by tapping Delete Attachment.Enable iCloud photos: Go to Settings > > iCloud > Photos > Turn on Sync this iPhone and Optimize iPhone Storage to save space on your device by storing full-resolution photos in iCloud and smaller versions locally.For Android usersSettings may vary depending on your Android phone’s manufacturer. Delete unused apps: Go to Settings > Apps > > Uninstall.Clean out downloads: Open the Files app > Downloads > Select files > Tap Delete.Use Files by Google: Open the Files by Google app > Tap Clean > Use options like Delete downloaded files or Delete duplicate files to free up space. Person viewing storage space on their smartphone5 DIGITAL CLEANUP HACKS YOU DIDN’T KNOW YOU NEEDED2. Disable background app activity to save power and speed things upMany apps continue running in the background even when you're not using them, draining battery and slowing down your phone. Limiting or disabling background activity can noticeably boost performance and help your device last longer between charges.For iPhone usersLimit background activity:Go to Settings > General > Background App Refresh > Choose Off or Wi-Fi only > Or toggle off individual apps that don't need to refresh in the background.For Android usersSettings may vary depending on your Android phone’s manufacturer.Restrict background activity:Go to Settings > Apps > Select the app > Tap Battery > Choose Restricted or Optimize to limit background usage.Or go to Settings > Battery > Battery usage > Tap on apps using high power > Adjust settings to restrict background activity.Get a free scan to find out if your personal information is already out on the web 3. Organize and remove unnecessary filesDigital clutter adds up quickly. Screenshots, old PDFs, duplicate photos and downloads that were only meant to be temporary. Regular file maintenance helps you stay organized and keep your phone running smoothly.For iPhone usersFind duplicate photos: Go to Photos > Scroll to Utilities > Duplicates> Tap Merge to combine duplicates > Confirm your decision by clicking Merge # Exact Copies.Sort screenshots: Go to Photos > Scroll to Media Types > Screenshots > Tap Select in the upper right > Tap the photo/photos you want to delete and a blue check mark will appear in the bottom right of the image > Then tap the trashcan in the bottom right of the screen > Confirm your decision by clicking Delete or Delete # Photos.Delete old downloads: Open the Files app > Browse > Downloads > Tap the circle with the three horizontal dots in the upper right > Tap Select > Click the files you'd like to delete and a blue circle with a check mark will appear > Tap the trash can icon in the bottom right of the screen.For Android usersSettings may vary depending on your Android phone’s manufacturer.Find duplicate photos: Open Files by Google > Tap Clean > Under Duplicate files, select files to delete.Sort screenshots: Open Photos > Albums or Collections > Screenshots > Tap and hold to select > Delete or the trashcan icon > Click Move to trash.Delete old downloads: Open the Files app > Downloads > Select files by tapping and holding > Tap Delete or the trash can icon.For email cleanupBulk delete emails in Gmail: In the search bar, type older_than:6m > Select all > Delete.Set email rules in Outlook: Go to File > Manage Rules & Alerts > New Rule > Choose criteria like sender, age or subject > Set action to archive or delete.Find old emails in Yahoo: Use the search bar to type before:2025/01/01 messages by clicking the square box next to the message > Delete or click the trashcan icon.Physical cleaning tipsPhones collect bacteria from nearly every surface you touch. From gym equipment to bathroom counters, your phone needs regular cleaning to stay safe and functional.Clean the exteriorUse a dry microfiber cloth to wipe the screen, case and back.For tougher smudges, slightly dampen the cloth with 70% isopropyl alcohol.Never spray liquid directly on the screen or into ports.Avoid harsh chemicals like bleach, ammonia or glass cleaner.Do not use paper towels or abrasive materials that can scratch the screen.Clean ports and speakersUse a soft-bristled brush or wooden toothpick to remove lint and debris from charging ports and speaker grills.Avoid using metal objects or compressed air directly into the port.Clean your caseFor plastic or silicone: Wash with warm soapy water, rinse and air dry.For leather or fabric: Use a surface-appropriate cleaning solution and follow the manufacturer’s care instructions.Before cleaning, always power off your phone and unplug any accessories.GET FOX BUSINESS ON THE GO BY CLICKING HERE Man cleaning smartphone with microfiber clothPrivacy and security sweepDigital cleaning also means reviewing your privacy settings. Make sure your apps are not accessing more than they need and keep your sensitive data secure.For iPhoneHide private photos: Go to Photos > Select image > Click the three horizontal dots in the circle in the upper right of the screen > Hide > Confirm by clicking Hide Photo.Control lock screen access: Go to Settings > Face ID & Passcode > Adjust Allow Access When Locked settings.Use iCloud Keychain to manage and autofill secure passwords: Go to Settings > > iCloud > Passwords. Tap Sync This iPhone to enable iCloud Keychain.For AndroidSettings may vary depending on your Android phone’s manufacturer.Review app permissions: Go to Settings > Privacy > Permission Manager > Choose a permission type > Review and adjust access.Enable Find Hub: Go to Settings > Google > All services > Personal & device safety > Find Hub > Turn on Allow device to be located.Set a secure screen lock: Go to Settings > Security > Screen Lock > Choose a PIN, password or pattern.Back up your dataData loss can happen without warning. Whether it is due to damage, theft or an unexpected software issue, having a recent backup can save your photos, contacts and important files.For iPhoneBack up to iCloud: Go to Settings > > iCloud > iCloud Backup > Turn on.Back up using a computer: Connect to Finderor iTunesand select Back Up Now.For AndroidSettings may vary depending on your Android phone’s manufacturer.Back up to Google: Go to Settings > Google > Backup > Turn on Backup by Google One > Confirm your backups in the Google One app under Storage > Device Backup.Use smart tools to automate cleanupInstead of constantly managing your phone manually, let trusted tools do the heavy lifting. A top-tier antivirus app doesn’t just protect against malware; it often includes powerful performance boosters designed to keep your device running smoothly. Look for apps that offer:Junk file and cache cleanupApp uninstaller for unused programsDuplicate file finderBrowser cleanup toolsStartup manager to improve device boot timeReal-time protection against malware, phishing and unsafe linksThese features help keep your device fast, secure and clutter-free without constant manual maintenance. Many top-rated antivirus apps offer a combination of security and performance optimization tools to simplify device management and protection. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurt’s key takeawayTaking a little time to clean up your phone can really pay off. Whether you're freeing up space, boosting speed or tightening your privacy, these small steps help your device work better and keep your information safer. Plus, a quick physical clean keeps your phone looking and feeling fresh.What are some of your favorite tips or habits for keeping your phone clean, organized and secure? Let us know by writing us atCyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#clean #your #phone #speed #storageClean up your phone: Speed, storage and privacy boost in minutesclose New tech helps travelers save on smartphone charges Artificial intelligence is now being used to personalize eSIMS, potentially saving hundreds of dollars for travelers overseas. Your smartphone works hard, but it doesn't always stay in top shape on its own. Over time, storage fills up, apps collect background data and privacy settings fall behind. You might notice slower performance, random glitches or just a general sense that things aren't running as smoothly as they used to. The good news is that a quick digital and physical cleanup can help your device run like new. These simple steps will help you free up space, improve speed and keep your personal data better protected. Woman looking at apps on smartphoneDigital cleanup tips1. Clear out apps and files you forgot existedIf your phone is low on storage or feeling sluggish, start by clearing out apps and files you no longer use. This is one of the fastest ways to improve speed and battery life.For iPhone usersOffload unused apps: Go to Settings > Apps > App Store > Turn on Offload Unused Apps.Review app storage usage: Go to Settings > General > iPhone Storage > Scroll down and select an offload or delete. Delete large message attachments: Go to Messages > Open a conversation > Tap contact name > Info > See All under Photos > Tap Select > Tap photos you want to delete > Tap Delete on the bottom right > Confirm by tapping Delete Attachment.Enable iCloud photos: Go to Settings > > iCloud > Photos > Turn on Sync this iPhone and Optimize iPhone Storage to save space on your device by storing full-resolution photos in iCloud and smaller versions locally.For Android usersSettings may vary depending on your Android phone’s manufacturer. Delete unused apps: Go to Settings > Apps > > Uninstall.Clean out downloads: Open the Files app > Downloads > Select files > Tap Delete.Use Files by Google: Open the Files by Google app > Tap Clean > Use options like Delete downloaded files or Delete duplicate files to free up space. Person viewing storage space on their smartphone5 DIGITAL CLEANUP HACKS YOU DIDN’T KNOW YOU NEEDED2. Disable background app activity to save power and speed things upMany apps continue running in the background even when you're not using them, draining battery and slowing down your phone. Limiting or disabling background activity can noticeably boost performance and help your device last longer between charges.For iPhone usersLimit background activity:Go to Settings > General > Background App Refresh > Choose Off or Wi-Fi only > Or toggle off individual apps that don't need to refresh in the background.For Android usersSettings may vary depending on your Android phone’s manufacturer.Restrict background activity:Go to Settings > Apps > Select the app > Tap Battery > Choose Restricted or Optimize to limit background usage.Or go to Settings > Battery > Battery usage > Tap on apps using high power > Adjust settings to restrict background activity.Get a free scan to find out if your personal information is already out on the web 3. Organize and remove unnecessary filesDigital clutter adds up quickly. Screenshots, old PDFs, duplicate photos and downloads that were only meant to be temporary. Regular file maintenance helps you stay organized and keep your phone running smoothly.For iPhone usersFind duplicate photos: Go to Photos > Scroll to Utilities > Duplicates> Tap Merge to combine duplicates > Confirm your decision by clicking Merge # Exact Copies.Sort screenshots: Go to Photos > Scroll to Media Types > Screenshots > Tap Select in the upper right > Tap the photo/photos you want to delete and a blue check mark will appear in the bottom right of the image > Then tap the trashcan in the bottom right of the screen > Confirm your decision by clicking Delete or Delete # Photos.Delete old downloads: Open the Files app > Browse > Downloads > Tap the circle with the three horizontal dots in the upper right > Tap Select > Click the files you'd like to delete and a blue circle with a check mark will appear > Tap the trash can icon in the bottom right of the screen.For Android usersSettings may vary depending on your Android phone’s manufacturer.Find duplicate photos: Open Files by Google > Tap Clean > Under Duplicate files, select files to delete.Sort screenshots: Open Photos > Albums or Collections > Screenshots > Tap and hold to select > Delete or the trashcan icon > Click Move to trash.Delete old downloads: Open the Files app > Downloads > Select files by tapping and holding > Tap Delete or the trash can icon.For email cleanupBulk delete emails in Gmail: In the search bar, type older_than:6m > Select all > Delete.Set email rules in Outlook: Go to File > Manage Rules & Alerts > New Rule > Choose criteria like sender, age or subject > Set action to archive or delete.Find old emails in Yahoo: Use the search bar to type before:2025/01/01 messages by clicking the square box next to the message > Delete or click the trashcan icon.Physical cleaning tipsPhones collect bacteria from nearly every surface you touch. From gym equipment to bathroom counters, your phone needs regular cleaning to stay safe and functional.Clean the exteriorUse a dry microfiber cloth to wipe the screen, case and back.For tougher smudges, slightly dampen the cloth with 70% isopropyl alcohol.Never spray liquid directly on the screen or into ports.Avoid harsh chemicals like bleach, ammonia or glass cleaner.Do not use paper towels or abrasive materials that can scratch the screen.Clean ports and speakersUse a soft-bristled brush or wooden toothpick to remove lint and debris from charging ports and speaker grills.Avoid using metal objects or compressed air directly into the port.Clean your caseFor plastic or silicone: Wash with warm soapy water, rinse and air dry.For leather or fabric: Use a surface-appropriate cleaning solution and follow the manufacturer’s care instructions.Before cleaning, always power off your phone and unplug any accessories.GET FOX BUSINESS ON THE GO BY CLICKING HERE Man cleaning smartphone with microfiber clothPrivacy and security sweepDigital cleaning also means reviewing your privacy settings. Make sure your apps are not accessing more than they need and keep your sensitive data secure.For iPhoneHide private photos: Go to Photos > Select image > Click the three horizontal dots in the circle in the upper right of the screen > Hide > Confirm by clicking Hide Photo.Control lock screen access: Go to Settings > Face ID & Passcode > Adjust Allow Access When Locked settings.Use iCloud Keychain to manage and autofill secure passwords: Go to Settings > > iCloud > Passwords. Tap Sync This iPhone to enable iCloud Keychain.For AndroidSettings may vary depending on your Android phone’s manufacturer.Review app permissions: Go to Settings > Privacy > Permission Manager > Choose a permission type > Review and adjust access.Enable Find Hub: Go to Settings > Google > All services > Personal & device safety > Find Hub > Turn on Allow device to be located.Set a secure screen lock: Go to Settings > Security > Screen Lock > Choose a PIN, password or pattern.Back up your dataData loss can happen without warning. Whether it is due to damage, theft or an unexpected software issue, having a recent backup can save your photos, contacts and important files.For iPhoneBack up to iCloud: Go to Settings > > iCloud > iCloud Backup > Turn on.Back up using a computer: Connect to Finderor iTunesand select Back Up Now.For AndroidSettings may vary depending on your Android phone’s manufacturer.Back up to Google: Go to Settings > Google > Backup > Turn on Backup by Google One > Confirm your backups in the Google One app under Storage > Device Backup.Use smart tools to automate cleanupInstead of constantly managing your phone manually, let trusted tools do the heavy lifting. A top-tier antivirus app doesn’t just protect against malware; it often includes powerful performance boosters designed to keep your device running smoothly. Look for apps that offer:Junk file and cache cleanupApp uninstaller for unused programsDuplicate file finderBrowser cleanup toolsStartup manager to improve device boot timeReal-time protection against malware, phishing and unsafe linksThese features help keep your device fast, secure and clutter-free without constant manual maintenance. Many top-rated antivirus apps offer a combination of security and performance optimization tools to simplify device management and protection. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurt’s key takeawayTaking a little time to clean up your phone can really pay off. Whether you're freeing up space, boosting speed or tightening your privacy, these small steps help your device work better and keep your information safer. Plus, a quick physical clean keeps your phone looking and feeling fresh.What are some of your favorite tips or habits for keeping your phone clean, organized and secure? Let us know by writing us atCyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #clean #your #phone #speed #storageWWW.FOXNEWS.COMClean up your phone: Speed, storage and privacy boost in minutesclose New tech helps travelers save on smartphone charges Artificial intelligence is now being used to personalize eSIMS, potentially saving hundreds of dollars for travelers overseas. Your smartphone works hard, but it doesn't always stay in top shape on its own. Over time, storage fills up, apps collect background data and privacy settings fall behind. You might notice slower performance, random glitches or just a general sense that things aren't running as smoothly as they used to. The good news is that a quick digital and physical cleanup can help your device run like new. These simple steps will help you free up space, improve speed and keep your personal data better protected. Woman looking at apps on smartphone (Kurt "CyberGuy" Knutsson)Digital cleanup tips1. Clear out apps and files you forgot existedIf your phone is low on storage or feeling sluggish, start by clearing out apps and files you no longer use. This is one of the fastest ways to improve speed and battery life.For iPhone usersOffload unused apps: Go to Settings > Apps > App Store > Turn on Offload Unused Apps.Review app storage usage: Go to Settings > General > iPhone Storage > Scroll down and select an offload or delete. (Note: Offloading an app will preserve the app’s data and documents, allowing you to reinstall the app later and pick up where you left off. While deleting an app will remove both the app and all its data from your device permanently, unless that data is backed up elsewhere.)Delete large message attachments: Go to Messages > Open a conversation > Tap contact name > Info > See All under Photos > Tap Select > Tap photos you want to delete > Tap Delete on the bottom right > Confirm by tapping Delete Attachment.Enable iCloud photos: Go to Settings > [Your Name] > iCloud > Photos > Turn on Sync this iPhone and Optimize iPhone Storage to save space on your device by storing full-resolution photos in iCloud and smaller versions locally.For Android usersSettings may vary depending on your Android phone’s manufacturer. Delete unused apps: Go to Settings > Apps > [App Name] > Uninstall.Clean out downloads: Open the Files app > Downloads > Select files > Tap Delete.Use Files by Google: Open the Files by Google app > Tap Clean > Use options like Delete downloaded files or Delete duplicate files to free up space. Person viewing storage space on their smartphone (Kurt "CyberGuy" Knutsson)5 DIGITAL CLEANUP HACKS YOU DIDN’T KNOW YOU NEEDED2. Disable background app activity to save power and speed things upMany apps continue running in the background even when you're not using them, draining battery and slowing down your phone. Limiting or disabling background activity can noticeably boost performance and help your device last longer between charges.For iPhone usersLimit background activity:Go to Settings > General > Background App Refresh > Choose Off or Wi-Fi only > Or toggle off individual apps that don't need to refresh in the background.For Android usersSettings may vary depending on your Android phone’s manufacturer.Restrict background activity:Go to Settings > Apps > Select the app > Tap Battery > Choose Restricted or Optimize to limit background usage.Or go to Settings > Battery > Battery usage > Tap on apps using high power > Adjust settings to restrict background activity.Get a free scan to find out if your personal information is already out on the web 3. Organize and remove unnecessary filesDigital clutter adds up quickly. Screenshots, old PDFs, duplicate photos and downloads that were only meant to be temporary. Regular file maintenance helps you stay organized and keep your phone running smoothly.For iPhone usersFind duplicate photos: Go to Photos > Scroll to Utilities > Duplicates (if applicable) > Tap Merge to combine duplicates > Confirm your decision by clicking Merge # Exact Copies.Sort screenshots: Go to Photos > Scroll to Media Types > Screenshots > Tap Select in the upper right > Tap the photo/photos you want to delete and a blue check mark will appear in the bottom right of the image > Then tap the trashcan in the bottom right of the screen > Confirm your decision by clicking Delete or Delete # Photos.Delete old downloads: Open the Files app > Browse > Downloads > Tap the circle with the three horizontal dots in the upper right > Tap Select > Click the files you'd like to delete and a blue circle with a check mark will appear > Tap the trash can icon in the bottom right of the screen.For Android usersSettings may vary depending on your Android phone’s manufacturer.Find duplicate photos: Open Files by Google > Tap Clean > Under Duplicate files, select files to delete.Sort screenshots: Open Photos > Albums or Collections > Screenshots > Tap and hold to select > Delete or the trashcan icon > Click Move to trash.Delete old downloads: Open the Files app > Downloads > Select files by tapping and holding > Tap Delete or the trash can icon.For email cleanupBulk delete emails in Gmail: In the search bar, type older_than:6m > Select all > Delete.Set email rules in Outlook: Go to File > Manage Rules & Alerts > New Rule > Choose criteria like sender, age or subject > Set action to archive or delete.Find old emails in Yahoo: Use the search bar to type before:2025/01/01 messages by clicking the square box next to the message > Delete or click the trashcan icon.Physical cleaning tipsPhones collect bacteria from nearly every surface you touch. From gym equipment to bathroom counters, your phone needs regular cleaning to stay safe and functional.Clean the exteriorUse a dry microfiber cloth to wipe the screen, case and back.For tougher smudges, slightly dampen the cloth with 70% isopropyl alcohol.Never spray liquid directly on the screen or into ports.Avoid harsh chemicals like bleach, ammonia or glass cleaner.Do not use paper towels or abrasive materials that can scratch the screen.Clean ports and speakersUse a soft-bristled brush or wooden toothpick to remove lint and debris from charging ports and speaker grills.Avoid using metal objects or compressed air directly into the port.Clean your caseFor plastic or silicone: Wash with warm soapy water, rinse and air dry.For leather or fabric: Use a surface-appropriate cleaning solution and follow the manufacturer’s care instructions.Before cleaning, always power off your phone and unplug any accessories.GET FOX BUSINESS ON THE GO BY CLICKING HERE Man cleaning smartphone with microfiber cloth (Kurt "CyberGuy" Knutsson)Privacy and security sweepDigital cleaning also means reviewing your privacy settings. Make sure your apps are not accessing more than they need and keep your sensitive data secure.For iPhoneHide private photos: Go to Photos > Select image > Click the three horizontal dots in the circle in the upper right of the screen > Hide > Confirm by clicking Hide Photo.Control lock screen access: Go to Settings > Face ID & Passcode > Adjust Allow Access When Locked settings.Use iCloud Keychain to manage and autofill secure passwords: Go to Settings > [your name] > iCloud > Passwords. Tap Sync This iPhone to enable iCloud Keychain.For AndroidSettings may vary depending on your Android phone’s manufacturer.Review app permissions: Go to Settings > Privacy > Permission Manager > Choose a permission type > Review and adjust access.Enable Find Hub: Go to Settings > Google > All services > Personal & device safety > Find Hub > Turn on Allow device to be located.Set a secure screen lock: Go to Settings > Security > Screen Lock > Choose a PIN, password or pattern.Back up your dataData loss can happen without warning. Whether it is due to damage, theft or an unexpected software issue, having a recent backup can save your photos, contacts and important files.For iPhoneBack up to iCloud: Go to Settings > [Your Name] > iCloud > iCloud Backup > Turn on.Back up using a computer: Connect to Finder (on Mac) or iTunes (on PC) and select Back Up Now.For AndroidSettings may vary depending on your Android phone’s manufacturer.Back up to Google: Go to Settings > Google > Backup > Turn on Backup by Google One > Confirm your backups in the Google One app under Storage > Device Backup.Use smart tools to automate cleanupInstead of constantly managing your phone manually, let trusted tools do the heavy lifting. A top-tier antivirus app doesn’t just protect against malware; it often includes powerful performance boosters designed to keep your device running smoothly. Look for apps that offer:Junk file and cache cleanupApp uninstaller for unused programsDuplicate file finderBrowser cleanup toolsStartup manager to improve device boot timeReal-time protection against malware, phishing and unsafe linksThese features help keep your device fast, secure and clutter-free without constant manual maintenance. Many top-rated antivirus apps offer a combination of security and performance optimization tools to simplify device management and protection. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurt’s key takeawayTaking a little time to clean up your phone can really pay off. Whether you're freeing up space, boosting speed or tightening your privacy, these small steps help your device work better and keep your information safer. Plus, a quick physical clean keeps your phone looking and feeling fresh.What are some of your favorite tips or habits for keeping your phone clean, organized and secure? Let us know by writing us atCyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
Windows PCs at risk as new tool disarms built-in security
Published
May 29, 2025 10:00am EDT close Windows Defender Security Center scam: How to protect your computer from fake pop-ups Tech expert Kurt "CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software. All modern Windows PCs come with Microsoft Defender built in. For the unaware, this tool is Windows’ native antivirus. Over time, it has matured into a reliable security tool capable of blocking a wide range of threats. However, a tool called Defendnot can shut down Microsoft Defender completely, without exploiting a bug or using malware. It simply convinces Windows that another antivirus is already running.The implications are serious. This tool does not break into the system or use advanced code injection. It uses Windows features the way they were designed to be used. And that makes the problem harder to detect and harder to fix. Windows software on a PCThe tool works by pretending to be an antivirusWindows is built to avoid running multiple antivirus products at once. When a third-party antivirus registers itself, Windows disables Microsoft Defender to prevent conflicts. Defendnot exploits this system using an undocumented API that security software uses to communicate with the Windows Security Center.The tool registers a fake antivirus that appears legitimate to the system. It uses a dummy DLL and injects it into Task Manager, a trusted Windows process. By operating inside this signed process, Defendnot avoids signature checks and permission blocks. Once the fake antivirus is registered, Windows disables Microsoft Defender without warning or confirmation.WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLENo security alert is shown to the user. No visible changes are made to indicate that the system is unprotected. Unless someone checks manually, the machine remains open to attacks with no real-time protection running.The tool also includes options to set a custom antivirus name, enable logging and configure automatic startup. It achieves persistence by creating a scheduled task that runs whenever the user logs in. Windows software on a laptopFrom GitHub takedown to a fresh buildDefendnot is based on an earlier project called No-Defender. That project used code from an actual antivirus product to fake registration. It gained attention quickly and was removed after a copyright complaint from the vendor whose code had been reused. The developer took the project down and walked away from it.With Defendnot, the creator rebuilt the core features using original code. This version avoids copyright issues and uses a new method to achieve the same effect. It does not rely on another antivirus or third-party binaries. It was written from scratch to demonstrate how simple it is to manipulate Windows security from inside the system.Microsoft Defender currently flags the tool as a threat. It detects and quarantines it under the name Win32/Sabsik.FL.!ml. However, the fact that it works at all points to a weakness in how Windows handles antivirus registration and trust.WHAT IS ARTIFICIAL INTELLIGENCE? Windows laptop showing the home screen6 ways to protect yourself from malicious programsWhile Defendnot is a research project, there’s a chance that similar tools are already out there and could be used to compromise your PC. Here are a few tips to help you stay safe:1. Use strong antivirus software: Even with regular updates, Windows systems can be left exposed by tools like Defendnot that silently disable built-in defenses. A strong third-party antivirus with real-time protection and frequent updates provides essential backup security. Look for solutions with real-time protection and frequent updates to tackle emerging threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Limit exposure: Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments and use a browser with built-in security features.3. Avoid running unexpected commands: Never paste or run commandsyou don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.4. Keep your software updated: Regularly update your operating system, browsers and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.5. Use two-factor authentication: Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.6. Invest in personal data removal services: Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites. These services collect and publish details like your name, address and phone number, making you an easier target for identity theft or phishing. Automated data removal services track down these sites and submit removal requests on your behalf, helping to reduce your digital footprint and increase your online anonymity. While they can't erase every trace of your information, they make it significantly harder for attackers to find and exploit your personal data, which saves you time and reduces unwanted spam in the process.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayDefendnot points to a bigger issue with how Windows handles security. It takes a feature meant to prevent software conflicts and turns it into a way to completely disable protection. The system assumes any registered antivirus is legitimate, so if attackers can fake that, they get in without much resistance.We often think of security as blocking the bad and trusting the good. But this case shows what happens when that trust is misplaced. Defendnot doesn’t sneak past Windows defenses. It walks right in using valid credentials. The solution isn’t just more patches or stronger malware signatures. What we need is a smarter way for systems to tell what is actually safe.CLICK HERE TO GET THE FOX NEWS APPDo you think companies like Microsoft need to rethink how Windows handles antivirus registration and trust, given that tools like Defendnot can so easily disable built-in protections without using malware or exploiting a bug? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#windows #pcs #risk #new #toolWindows PCs at risk as new tool disarms built-in securityPublished May 29, 2025 10:00am EDT close Windows Defender Security Center scam: How to protect your computer from fake pop-ups Tech expert Kurt "CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software. All modern Windows PCs come with Microsoft Defender built in. For the unaware, this tool is Windows’ native antivirus. Over time, it has matured into a reliable security tool capable of blocking a wide range of threats. However, a tool called Defendnot can shut down Microsoft Defender completely, without exploiting a bug or using malware. It simply convinces Windows that another antivirus is already running.The implications are serious. This tool does not break into the system or use advanced code injection. It uses Windows features the way they were designed to be used. And that makes the problem harder to detect and harder to fix. Windows software on a PCThe tool works by pretending to be an antivirusWindows is built to avoid running multiple antivirus products at once. When a third-party antivirus registers itself, Windows disables Microsoft Defender to prevent conflicts. Defendnot exploits this system using an undocumented API that security software uses to communicate with the Windows Security Center.The tool registers a fake antivirus that appears legitimate to the system. It uses a dummy DLL and injects it into Task Manager, a trusted Windows process. By operating inside this signed process, Defendnot avoids signature checks and permission blocks. Once the fake antivirus is registered, Windows disables Microsoft Defender without warning or confirmation.WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLENo security alert is shown to the user. No visible changes are made to indicate that the system is unprotected. Unless someone checks manually, the machine remains open to attacks with no real-time protection running.The tool also includes options to set a custom antivirus name, enable logging and configure automatic startup. It achieves persistence by creating a scheduled task that runs whenever the user logs in. Windows software on a laptopFrom GitHub takedown to a fresh buildDefendnot is based on an earlier project called No-Defender. That project used code from an actual antivirus product to fake registration. It gained attention quickly and was removed after a copyright complaint from the vendor whose code had been reused. The developer took the project down and walked away from it.With Defendnot, the creator rebuilt the core features using original code. This version avoids copyright issues and uses a new method to achieve the same effect. It does not rely on another antivirus or third-party binaries. It was written from scratch to demonstrate how simple it is to manipulate Windows security from inside the system.Microsoft Defender currently flags the tool as a threat. It detects and quarantines it under the name Win32/Sabsik.FL.!ml. However, the fact that it works at all points to a weakness in how Windows handles antivirus registration and trust.WHAT IS ARTIFICIAL INTELLIGENCE? Windows laptop showing the home screen6 ways to protect yourself from malicious programsWhile Defendnot is a research project, there’s a chance that similar tools are already out there and could be used to compromise your PC. Here are a few tips to help you stay safe:1. Use strong antivirus software: Even with regular updates, Windows systems can be left exposed by tools like Defendnot that silently disable built-in defenses. A strong third-party antivirus with real-time protection and frequent updates provides essential backup security. Look for solutions with real-time protection and frequent updates to tackle emerging threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Limit exposure: Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments and use a browser with built-in security features.3. Avoid running unexpected commands: Never paste or run commandsyou don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.4. Keep your software updated: Regularly update your operating system, browsers and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.5. Use two-factor authentication: Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.6. Invest in personal data removal services: Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites. These services collect and publish details like your name, address and phone number, making you an easier target for identity theft or phishing. Automated data removal services track down these sites and submit removal requests on your behalf, helping to reduce your digital footprint and increase your online anonymity. While they can't erase every trace of your information, they make it significantly harder for attackers to find and exploit your personal data, which saves you time and reduces unwanted spam in the process.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayDefendnot points to a bigger issue with how Windows handles security. It takes a feature meant to prevent software conflicts and turns it into a way to completely disable protection. The system assumes any registered antivirus is legitimate, so if attackers can fake that, they get in without much resistance.We often think of security as blocking the bad and trusting the good. But this case shows what happens when that trust is misplaced. Defendnot doesn’t sneak past Windows defenses. It walks right in using valid credentials. The solution isn’t just more patches or stronger malware signatures. What we need is a smarter way for systems to tell what is actually safe.CLICK HERE TO GET THE FOX NEWS APPDo you think companies like Microsoft need to rethink how Windows handles antivirus registration and trust, given that tools like Defendnot can so easily disable built-in protections without using malware or exploiting a bug? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #windows #pcs #risk #new #toolWWW.FOXNEWS.COMWindows PCs at risk as new tool disarms built-in securityPublished May 29, 2025 10:00am EDT close Windows Defender Security Center scam: How to protect your computer from fake pop-ups Tech expert Kurt "CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software. All modern Windows PCs come with Microsoft Defender built in. For the unaware, this tool is Windows’ native antivirus. Over time, it has matured into a reliable security tool capable of blocking a wide range of threats. However, a tool called Defendnot can shut down Microsoft Defender completely, without exploiting a bug or using malware. It simply convinces Windows that another antivirus is already running.The implications are serious. This tool does not break into the system or use advanced code injection. It uses Windows features the way they were designed to be used. And that makes the problem harder to detect and harder to fix. Windows software on a PC (Kurt "CyberGuy" Knutsson)The tool works by pretending to be an antivirusWindows is built to avoid running multiple antivirus products at once. When a third-party antivirus registers itself, Windows disables Microsoft Defender to prevent conflicts. Defendnot exploits this system using an undocumented API that security software uses to communicate with the Windows Security Center.The tool registers a fake antivirus that appears legitimate to the system. It uses a dummy DLL and injects it into Task Manager, a trusted Windows process. By operating inside this signed process, Defendnot avoids signature checks and permission blocks. Once the fake antivirus is registered, Windows disables Microsoft Defender without warning or confirmation.WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLENo security alert is shown to the user. No visible changes are made to indicate that the system is unprotected. Unless someone checks manually, the machine remains open to attacks with no real-time protection running.The tool also includes options to set a custom antivirus name, enable logging and configure automatic startup. It achieves persistence by creating a scheduled task that runs whenever the user logs in. Windows software on a laptop (Kurt "CyberGuy" Knutsson)From GitHub takedown to a fresh buildDefendnot is based on an earlier project called No-Defender. That project used code from an actual antivirus product to fake registration. It gained attention quickly and was removed after a copyright complaint from the vendor whose code had been reused. The developer took the project down and walked away from it.With Defendnot, the creator rebuilt the core features using original code. This version avoids copyright issues and uses a new method to achieve the same effect. It does not rely on another antivirus or third-party binaries. It was written from scratch to demonstrate how simple it is to manipulate Windows security from inside the system.Microsoft Defender currently flags the tool as a threat. It detects and quarantines it under the name Win32/Sabsik.FL.!ml. However, the fact that it works at all points to a weakness in how Windows handles antivirus registration and trust.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Windows laptop showing the home screen (Kurt "CyberGuy" Knutsson)6 ways to protect yourself from malicious programsWhile Defendnot is a research project, there’s a chance that similar tools are already out there and could be used to compromise your PC. Here are a few tips to help you stay safe:1. Use strong antivirus software: Even with regular updates, Windows systems can be left exposed by tools like Defendnot that silently disable built-in defenses. A strong third-party antivirus with real-time protection and frequent updates provides essential backup security. Look for solutions with real-time protection and frequent updates to tackle emerging threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Limit exposure: Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments and use a browser with built-in security features (like Microsoft Edge or Chrome with Safe Browsing enabled).3. Avoid running unexpected commands: Never paste or run commands (like PowerShell scripts) you don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.4. Keep your software updated: Regularly update your operating system, browsers and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.5. Use two-factor authentication (2FA): Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.6. Invest in personal data removal services: Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites. These services collect and publish details like your name, address and phone number, making you an easier target for identity theft or phishing. Automated data removal services track down these sites and submit removal requests on your behalf, helping to reduce your digital footprint and increase your online anonymity. While they can't erase every trace of your information, they make it significantly harder for attackers to find and exploit your personal data, which saves you time and reduces unwanted spam in the process.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Get a free scan to find out if your personal information is already out on the web.Kurt’s key takeawayDefendnot points to a bigger issue with how Windows handles security. It takes a feature meant to prevent software conflicts and turns it into a way to completely disable protection. The system assumes any registered antivirus is legitimate, so if attackers can fake that, they get in without much resistance.We often think of security as blocking the bad and trusting the good. But this case shows what happens when that trust is misplaced. Defendnot doesn’t sneak past Windows defenses. It walks right in using valid credentials. The solution isn’t just more patches or stronger malware signatures. What we need is a smarter way for systems to tell what is actually safe.CLICK HERE TO GET THE FOX NEWS APPDo you think companies like Microsoft need to rethink how Windows handles antivirus registration and trust, given that tools like Defendnot can so easily disable built-in protections without using malware or exploiting a bug? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
AI cybersecurity risks and deepfake scams on the rise
Published
May 27, 2025 10:00am EDT close Deepfake technology 'is getting so easy now': Cybersecurity expert Cybersecurity expert Morgan Wright breaks down the dangers of deepfake video technology on 'Unfiltered.' Imagine your phone rings and the voice on the other end sounds just like your boss, a close friend, or even a government official. They urgently ask for sensitive information, except it's not really them. It's a deepfake, powered by AI, and you're the target of a sophisticated scam. These kinds of attacks are happening right now, and they're getting more convincing every day.That's the warning sounded by the 2025 AI Security Report, unveiled at the RSA Conference, one of the world's biggest gatherings for cybersecurity experts, companies, and law enforcement. The report details how criminals are harnessing artificial intelligence to impersonate people, automate scams, and attack security systems on a massive scale.From hijacked AI accounts and manipulated models to live video scams and data poisoning, the report paints a picture of a rapidly evolving threat landscape, one that's touching more lives than ever before. Illustration of cybersecurity risks.AI tools are leaking sensitive dataOne of the biggest risks of using AI tools is what users accidentally share with them. A recent analysis by cybersecurity firm Check Point found that 1 in every 80 AI prompts includes high-risk data, and about 1 in 13 contains sensitive information that could expose users or organizations to security or compliance risks.This data can include passwords, internal business plans, client information, or proprietary code. When shared with AI tools that are not secured, this information can be logged, intercepted, or even leaked later.Deepfake scams are now real-time and multilingualAI-powered impersonation is getting more advanced every month. Criminals can now fake voices and faces convincingly in real time. In early 2024, a British engineering firm lost 20 million pounds after scammers used live deepfake video to impersonate company executives during a Zoom call. The attackers looked and sounded like trusted leaders and convinced an employee to transfer funds.Real-time video manipulation tools are now being sold on criminal forums. These tools can swap faces and mimic speech during video calls in multiple languages, making it easier for attackers to run scams across borders. Illustration of a person video conferencing on their laptop.AI is running phishing and scam operations at scaleSocial engineering has always been a part of cybercrime. Now, AI is automating it. Attackers no longer need to speak a victim’s language, stay online constantly, or manually write convincing messages.Tools like GoMailPro use ChatGPT to create phishing and spam emails with perfect grammar and native-sounding tone. These messages are far more convincing than the sloppy scams of the past. GoMailPro can generate thousands of unique emails, each slightly different in language and urgency, which helps them slip past spam filters. It is actively marketed on underground forums for around per month, making it widely accessible to bad actors.Another tool, the X137 Telegram Console, leverages Gemini AI to monitor and respond to chat messages automatically. It can impersonate customer support agents or known contacts, carrying out real-time conversations with multiple targets at once. The replies are uncensored, fast, and customized based on the victim’s responses, giving the illusion of a human behind the screen.AI is also powering large-scale sextortion scams. These are emails that falsely claim to have compromising videos or photos and demand payment to prevent them from being shared. Instead of using the same message repeatedly, scammers now rely on AI to rewrite the threat in dozens of ways. For example, a basic line like "Time is running out" might be reworded as "The hourglass is nearly empty for you," making the message feel more personal and urgent while also avoiding detection.By removing the need for language fluency and manual effort, these AI tools allow attackers to scale their phishing operations dramatically. Even inexperienced scammers can now run large, personalized campaigns with almost no effort. Stolen AI accounts are sold on the dark webWith AI tools becoming more popular, criminals are now targeting the accounts that use them. Hackers are stealing ChatGPT logins, OpenAI API keys, and other platform credentials to bypass usage limits and hide their identity. These accounts are often stolen through malware, phishing, or credential stuffing attacks. The stolen credentials are then sold in bulk on Telegram channels and underground forums. Some attackers are even using tools that can bypass multi-factor authentication and session-based security protections. These stolen accounts allow criminals to access powerful AI tools and use them for phishing, malware generation, and scam automation. Illustration of a person signing into their laptop.Jailbreaking AI is now a common tacticCriminals are finding ways to bypass the safety rules built into AI models. On the dark web, attackers share techniques for jailbreaking AI so it will respond to requests that would normally be blocked. Common methods include:Telling the AI to pretend it is a fictional character that has no rules or limitationsPhrasing dangerous questions as academic or research-related scenariosAsking for technical instructions using less obvious wording so the request doesn’t get flaggedSome AI models can even be tricked into jailbreaking themselves. Attackers prompt the model to create input that causes it to override its own restrictions. This shows how AI systems can be manipulated in unexpected and dangerous ways.AI-generated malware is entering the mainstreamAI is now being used to build malware, phishing kits, ransomware scripts, and more. Recently, a group called FunkSac was identified as the leading ransomware gang using AI. Its leader admitted that at least 20% of their attacks are powered by AI. FunkSec has also used AI to help launch attacks that flood websites or services with fake traffic, making them crash or go offline. These are known as denial-of-service attacks. The group even created its own AI-powered chatbot to promote its activities and communicate with victims on its public website..Some cybercriminals are even using AI to help with marketing and data analysis after an attack. One tool called Rhadamanthys Stealer 0.7 claimed to use AI for "text recognition" to sound more advanced, but researchers later found it was using older technology instead. This shows how attackers use AI buzzwords to make their tools seem more advanced or trustworthy to buyers.Other tools are more advanced. One example is DarkGPT, a chatbot built specifically to sort through huge databases of stolen information. After a successful attack, scammers often end up with logs full of usernames, passwords, and other private details. Instead of sifting through this data manually, they use AI to quickly find valuable accounts they can break into, sell, or use for more targeted attacks like ransomware.Get a free scan to find out if your personal information is already out on the web Poisoned AI models are spreading misinformationSometimes, attackers do not need to hack an AI system. Instead, they trick it by feeding it false or misleading information. This tactic is called AI poisoning, and it can cause the AI to give biased, harmful, or completely inaccurate answers. There are two main ways this happens:Training poisoning: Attackers sneak false or harmful data into the model during developmentRetrieval poisoning: Misleading content online gets planted, which the AI later picks up when generating answersIn 2024, attackers uploaded 100 tampered AI models to the open-source platform Hugging Face. These poisoned models looked like helpful tools, but when people used them, they could spread false information or output malicious code.A large-scale example came from a Russian propaganda group called Pravda, which published more than 3.6 million fake articles online. These articles were designed to trick AI chatbots into repeating their messages. In tests, researchers found that major AI systems echoed these false claims about 33% of the time. Illustration of a hacker at workHow to protect yourself from AI-driven cyber threatsAI-powered cybercrime blends realism, speed, and scale. These scams are not just harder to detect. They are also easier to launch. Here’s how to stay protected:1) Avoid entering sensitive data into public AI tools: Never share passwords, personal details, or confidential business information in any AI chat, even if it seems private. These inputs can sometimes be logged or misused.2) Use strong antivirus software: AI-generated phishing emails and malware can slip past outdated security tools. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices.3) Turn on two-factor authentication: 2FA adds an extra layer of protection to your accounts, including AI platforms. It makes it much harder for attackers to break in using stolen passwords.4) Be extra cautious with unexpected video calls or voice messages: If something feels off, even if the person seems familiar, verify before taking action. Deepfake audio and video can sound and look very real.5) Use a personal data removal service: With AI-powered scams and deepfake attacks on the rise, criminals are increasingly relying on publicly available personal information to craft convincing impersonations or target victims with personalized phishing. By using a reputable personal data removal service, you can reduce your digital footprint on data broker sites and public databases. This makes it much harder for scammers to gather the details they need to convincingly mimic your identity or launch targeted AI-driven attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap - and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 6) Consider identity theft protection: If your data is leaked through a scam, early detection is key. Identity protection services can monitor your information and alert you to suspicious activity. Identity Theft companies can monitor personal information like your Social Security Number, phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.7) Regularly monitor your financial accounts: AI-generated phishing, malware, and account takeover attacks are now more sophisticated and widespread than ever, as highlighted in the 2025 AI Security Report. By frequently reviewing your bank and credit card statements for suspicious activity, you can catch unauthorized transactions early, often before major damage is done. Quick detection is crucial, especially since stolen credentials and financial information are now being traded and exploited at scale by cybercriminals using AI.8) Use a secure password manager: Stolen AI accounts and credential stuffing attacks are a growing threat, with hackers using automated tools to break into accounts and sell access on the dark web. A secure password manager helps you create and store strong, unique passwords for every account, making it far more difficult for attackers to compromise your logins, even if some of your information is leaked or targeted by AI-driven attacks. Get more details about my best expert-reviewed Password Managers of 2025 here.9) Keep your software updated: AI-generated malware and advanced phishing kits are designed to exploit vulnerabilities in outdated software. To stay ahead of these evolving threats, ensure all your devices, browsers, and applications are updated with the latest security patches. Regular updates close security gaps that AI-powered malware and cybercriminals are actively seeking to exploit. Kurt's key takeawaysCybercriminals are now using AI to power some of the most convincing and scalable attacks we’ve ever seen. From deepfake video calls and AI-generated phishing emails to stolen AI accounts and malware written by chatbots, these scams are becoming harder to detect and easier to launch. Attackers are even poisoning AI models with false information and creating fake tools that look legitimate but are designed to do harm. To stay safe, it’s more important than ever to use strong antivirus protection, enable multi-factor authentication, and avoid sharing sensitive data with AI tools you do not fully trust.Have you noticed AI scams getting more convincing? Let us know your experience or questions by writing us at Cyberguy.com/Contact. Your story could help someone else stay safe.For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#cybersecurity #risks #deepfake #scams #riseAI cybersecurity risks and deepfake scams on the risePublished May 27, 2025 10:00am EDT close Deepfake technology 'is getting so easy now': Cybersecurity expert Cybersecurity expert Morgan Wright breaks down the dangers of deepfake video technology on 'Unfiltered.' Imagine your phone rings and the voice on the other end sounds just like your boss, a close friend, or even a government official. They urgently ask for sensitive information, except it's not really them. It's a deepfake, powered by AI, and you're the target of a sophisticated scam. These kinds of attacks are happening right now, and they're getting more convincing every day.That's the warning sounded by the 2025 AI Security Report, unveiled at the RSA Conference, one of the world's biggest gatherings for cybersecurity experts, companies, and law enforcement. The report details how criminals are harnessing artificial intelligence to impersonate people, automate scams, and attack security systems on a massive scale.From hijacked AI accounts and manipulated models to live video scams and data poisoning, the report paints a picture of a rapidly evolving threat landscape, one that's touching more lives than ever before. Illustration of cybersecurity risks.AI tools are leaking sensitive dataOne of the biggest risks of using AI tools is what users accidentally share with them. A recent analysis by cybersecurity firm Check Point found that 1 in every 80 AI prompts includes high-risk data, and about 1 in 13 contains sensitive information that could expose users or organizations to security or compliance risks.This data can include passwords, internal business plans, client information, or proprietary code. When shared with AI tools that are not secured, this information can be logged, intercepted, or even leaked later.Deepfake scams are now real-time and multilingualAI-powered impersonation is getting more advanced every month. Criminals can now fake voices and faces convincingly in real time. In early 2024, a British engineering firm lost 20 million pounds after scammers used live deepfake video to impersonate company executives during a Zoom call. The attackers looked and sounded like trusted leaders and convinced an employee to transfer funds.Real-time video manipulation tools are now being sold on criminal forums. These tools can swap faces and mimic speech during video calls in multiple languages, making it easier for attackers to run scams across borders. Illustration of a person video conferencing on their laptop.AI is running phishing and scam operations at scaleSocial engineering has always been a part of cybercrime. Now, AI is automating it. Attackers no longer need to speak a victim’s language, stay online constantly, or manually write convincing messages.Tools like GoMailPro use ChatGPT to create phishing and spam emails with perfect grammar and native-sounding tone. These messages are far more convincing than the sloppy scams of the past. GoMailPro can generate thousands of unique emails, each slightly different in language and urgency, which helps them slip past spam filters. It is actively marketed on underground forums for around per month, making it widely accessible to bad actors.Another tool, the X137 Telegram Console, leverages Gemini AI to monitor and respond to chat messages automatically. It can impersonate customer support agents or known contacts, carrying out real-time conversations with multiple targets at once. The replies are uncensored, fast, and customized based on the victim’s responses, giving the illusion of a human behind the screen.AI is also powering large-scale sextortion scams. These are emails that falsely claim to have compromising videos or photos and demand payment to prevent them from being shared. Instead of using the same message repeatedly, scammers now rely on AI to rewrite the threat in dozens of ways. For example, a basic line like "Time is running out" might be reworded as "The hourglass is nearly empty for you," making the message feel more personal and urgent while also avoiding detection.By removing the need for language fluency and manual effort, these AI tools allow attackers to scale their phishing operations dramatically. Even inexperienced scammers can now run large, personalized campaigns with almost no effort. Stolen AI accounts are sold on the dark webWith AI tools becoming more popular, criminals are now targeting the accounts that use them. Hackers are stealing ChatGPT logins, OpenAI API keys, and other platform credentials to bypass usage limits and hide their identity. These accounts are often stolen through malware, phishing, or credential stuffing attacks. The stolen credentials are then sold in bulk on Telegram channels and underground forums. Some attackers are even using tools that can bypass multi-factor authentication and session-based security protections. These stolen accounts allow criminals to access powerful AI tools and use them for phishing, malware generation, and scam automation. Illustration of a person signing into their laptop.Jailbreaking AI is now a common tacticCriminals are finding ways to bypass the safety rules built into AI models. On the dark web, attackers share techniques for jailbreaking AI so it will respond to requests that would normally be blocked. Common methods include:Telling the AI to pretend it is a fictional character that has no rules or limitationsPhrasing dangerous questions as academic or research-related scenariosAsking for technical instructions using less obvious wording so the request doesn’t get flaggedSome AI models can even be tricked into jailbreaking themselves. Attackers prompt the model to create input that causes it to override its own restrictions. This shows how AI systems can be manipulated in unexpected and dangerous ways.AI-generated malware is entering the mainstreamAI is now being used to build malware, phishing kits, ransomware scripts, and more. Recently, a group called FunkSac was identified as the leading ransomware gang using AI. Its leader admitted that at least 20% of their attacks are powered by AI. FunkSec has also used AI to help launch attacks that flood websites or services with fake traffic, making them crash or go offline. These are known as denial-of-service attacks. The group even created its own AI-powered chatbot to promote its activities and communicate with victims on its public website..Some cybercriminals are even using AI to help with marketing and data analysis after an attack. One tool called Rhadamanthys Stealer 0.7 claimed to use AI for "text recognition" to sound more advanced, but researchers later found it was using older technology instead. This shows how attackers use AI buzzwords to make their tools seem more advanced or trustworthy to buyers.Other tools are more advanced. One example is DarkGPT, a chatbot built specifically to sort through huge databases of stolen information. After a successful attack, scammers often end up with logs full of usernames, passwords, and other private details. Instead of sifting through this data manually, they use AI to quickly find valuable accounts they can break into, sell, or use for more targeted attacks like ransomware.Get a free scan to find out if your personal information is already out on the web Poisoned AI models are spreading misinformationSometimes, attackers do not need to hack an AI system. Instead, they trick it by feeding it false or misleading information. This tactic is called AI poisoning, and it can cause the AI to give biased, harmful, or completely inaccurate answers. There are two main ways this happens:Training poisoning: Attackers sneak false or harmful data into the model during developmentRetrieval poisoning: Misleading content online gets planted, which the AI later picks up when generating answersIn 2024, attackers uploaded 100 tampered AI models to the open-source platform Hugging Face. These poisoned models looked like helpful tools, but when people used them, they could spread false information or output malicious code.A large-scale example came from a Russian propaganda group called Pravda, which published more than 3.6 million fake articles online. These articles were designed to trick AI chatbots into repeating their messages. In tests, researchers found that major AI systems echoed these false claims about 33% of the time. Illustration of a hacker at workHow to protect yourself from AI-driven cyber threatsAI-powered cybercrime blends realism, speed, and scale. These scams are not just harder to detect. They are also easier to launch. Here’s how to stay protected:1) Avoid entering sensitive data into public AI tools: Never share passwords, personal details, or confidential business information in any AI chat, even if it seems private. These inputs can sometimes be logged or misused.2) Use strong antivirus software: AI-generated phishing emails and malware can slip past outdated security tools. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices.3) Turn on two-factor authentication: 2FA adds an extra layer of protection to your accounts, including AI platforms. It makes it much harder for attackers to break in using stolen passwords.4) Be extra cautious with unexpected video calls or voice messages: If something feels off, even if the person seems familiar, verify before taking action. Deepfake audio and video can sound and look very real.5) Use a personal data removal service: With AI-powered scams and deepfake attacks on the rise, criminals are increasingly relying on publicly available personal information to craft convincing impersonations or target victims with personalized phishing. By using a reputable personal data removal service, you can reduce your digital footprint on data broker sites and public databases. This makes it much harder for scammers to gather the details they need to convincingly mimic your identity or launch targeted AI-driven attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap - and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 6) Consider identity theft protection: If your data is leaked through a scam, early detection is key. Identity protection services can monitor your information and alert you to suspicious activity. Identity Theft companies can monitor personal information like your Social Security Number, phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.7) Regularly monitor your financial accounts: AI-generated phishing, malware, and account takeover attacks are now more sophisticated and widespread than ever, as highlighted in the 2025 AI Security Report. By frequently reviewing your bank and credit card statements for suspicious activity, you can catch unauthorized transactions early, often before major damage is done. Quick detection is crucial, especially since stolen credentials and financial information are now being traded and exploited at scale by cybercriminals using AI.8) Use a secure password manager: Stolen AI accounts and credential stuffing attacks are a growing threat, with hackers using automated tools to break into accounts and sell access on the dark web. A secure password manager helps you create and store strong, unique passwords for every account, making it far more difficult for attackers to compromise your logins, even if some of your information is leaked or targeted by AI-driven attacks. Get more details about my best expert-reviewed Password Managers of 2025 here.9) Keep your software updated: AI-generated malware and advanced phishing kits are designed to exploit vulnerabilities in outdated software. To stay ahead of these evolving threats, ensure all your devices, browsers, and applications are updated with the latest security patches. Regular updates close security gaps that AI-powered malware and cybercriminals are actively seeking to exploit. Kurt's key takeawaysCybercriminals are now using AI to power some of the most convincing and scalable attacks we’ve ever seen. From deepfake video calls and AI-generated phishing emails to stolen AI accounts and malware written by chatbots, these scams are becoming harder to detect and easier to launch. Attackers are even poisoning AI models with false information and creating fake tools that look legitimate but are designed to do harm. To stay safe, it’s more important than ever to use strong antivirus protection, enable multi-factor authentication, and avoid sharing sensitive data with AI tools you do not fully trust.Have you noticed AI scams getting more convincing? Let us know your experience or questions by writing us at Cyberguy.com/Contact. Your story could help someone else stay safe.For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #cybersecurity #risks #deepfake #scams #riseWWW.FOXNEWS.COMAI cybersecurity risks and deepfake scams on the risePublished May 27, 2025 10:00am EDT close Deepfake technology 'is getting so easy now': Cybersecurity expert Cybersecurity expert Morgan Wright breaks down the dangers of deepfake video technology on 'Unfiltered.' Imagine your phone rings and the voice on the other end sounds just like your boss, a close friend, or even a government official. They urgently ask for sensitive information, except it's not really them. It's a deepfake, powered by AI, and you're the target of a sophisticated scam. These kinds of attacks are happening right now, and they're getting more convincing every day.That's the warning sounded by the 2025 AI Security Report, unveiled at the RSA Conference (RSAC), one of the world's biggest gatherings for cybersecurity experts, companies, and law enforcement. The report details how criminals are harnessing artificial intelligence to impersonate people, automate scams, and attack security systems on a massive scale.From hijacked AI accounts and manipulated models to live video scams and data poisoning, the report paints a picture of a rapidly evolving threat landscape, one that's touching more lives than ever before. Illustration of cybersecurity risks. (Kurt "CyberGuy" Knutsson)AI tools are leaking sensitive dataOne of the biggest risks of using AI tools is what users accidentally share with them. A recent analysis by cybersecurity firm Check Point found that 1 in every 80 AI prompts includes high-risk data, and about 1 in 13 contains sensitive information that could expose users or organizations to security or compliance risks.This data can include passwords, internal business plans, client information, or proprietary code. When shared with AI tools that are not secured, this information can be logged, intercepted, or even leaked later.Deepfake scams are now real-time and multilingualAI-powered impersonation is getting more advanced every month. Criminals can now fake voices and faces convincingly in real time. In early 2024, a British engineering firm lost 20 million pounds after scammers used live deepfake video to impersonate company executives during a Zoom call. The attackers looked and sounded like trusted leaders and convinced an employee to transfer funds.Real-time video manipulation tools are now being sold on criminal forums. These tools can swap faces and mimic speech during video calls in multiple languages, making it easier for attackers to run scams across borders. Illustration of a person video conferencing on their laptop. (Kurt "CyberGuy" Knutsson)AI is running phishing and scam operations at scaleSocial engineering has always been a part of cybercrime. Now, AI is automating it. Attackers no longer need to speak a victim’s language, stay online constantly, or manually write convincing messages.Tools like GoMailPro use ChatGPT to create phishing and spam emails with perfect grammar and native-sounding tone. These messages are far more convincing than the sloppy scams of the past. GoMailPro can generate thousands of unique emails, each slightly different in language and urgency, which helps them slip past spam filters. It is actively marketed on underground forums for around $500 per month, making it widely accessible to bad actors.Another tool, the X137 Telegram Console, leverages Gemini AI to monitor and respond to chat messages automatically. It can impersonate customer support agents or known contacts, carrying out real-time conversations with multiple targets at once. The replies are uncensored, fast, and customized based on the victim’s responses, giving the illusion of a human behind the screen.AI is also powering large-scale sextortion scams. These are emails that falsely claim to have compromising videos or photos and demand payment to prevent them from being shared. Instead of using the same message repeatedly, scammers now rely on AI to rewrite the threat in dozens of ways. For example, a basic line like "Time is running out" might be reworded as "The hourglass is nearly empty for you," making the message feel more personal and urgent while also avoiding detection.By removing the need for language fluency and manual effort, these AI tools allow attackers to scale their phishing operations dramatically. Even inexperienced scammers can now run large, personalized campaigns with almost no effort. Stolen AI accounts are sold on the dark webWith AI tools becoming more popular, criminals are now targeting the accounts that use them. Hackers are stealing ChatGPT logins, OpenAI API keys, and other platform credentials to bypass usage limits and hide their identity. These accounts are often stolen through malware, phishing, or credential stuffing attacks. The stolen credentials are then sold in bulk on Telegram channels and underground forums. Some attackers are even using tools that can bypass multi-factor authentication and session-based security protections. These stolen accounts allow criminals to access powerful AI tools and use them for phishing, malware generation, and scam automation. Illustration of a person signing into their laptop. (Kurt "CyberGuy" Knutsson)Jailbreaking AI is now a common tacticCriminals are finding ways to bypass the safety rules built into AI models. On the dark web, attackers share techniques for jailbreaking AI so it will respond to requests that would normally be blocked. Common methods include:Telling the AI to pretend it is a fictional character that has no rules or limitationsPhrasing dangerous questions as academic or research-related scenariosAsking for technical instructions using less obvious wording so the request doesn’t get flaggedSome AI models can even be tricked into jailbreaking themselves. Attackers prompt the model to create input that causes it to override its own restrictions. This shows how AI systems can be manipulated in unexpected and dangerous ways.AI-generated malware is entering the mainstreamAI is now being used to build malware, phishing kits, ransomware scripts, and more. Recently, a group called FunkSac was identified as the leading ransomware gang using AI. Its leader admitted that at least 20% of their attacks are powered by AI. FunkSec has also used AI to help launch attacks that flood websites or services with fake traffic, making them crash or go offline. These are known as denial-of-service attacks. The group even created its own AI-powered chatbot to promote its activities and communicate with victims on its public website..Some cybercriminals are even using AI to help with marketing and data analysis after an attack. One tool called Rhadamanthys Stealer 0.7 claimed to use AI for "text recognition" to sound more advanced, but researchers later found it was using older technology instead. This shows how attackers use AI buzzwords to make their tools seem more advanced or trustworthy to buyers.Other tools are more advanced. One example is DarkGPT, a chatbot built specifically to sort through huge databases of stolen information. After a successful attack, scammers often end up with logs full of usernames, passwords, and other private details. Instead of sifting through this data manually, they use AI to quickly find valuable accounts they can break into, sell, or use for more targeted attacks like ransomware.Get a free scan to find out if your personal information is already out on the web Poisoned AI models are spreading misinformationSometimes, attackers do not need to hack an AI system. Instead, they trick it by feeding it false or misleading information. This tactic is called AI poisoning, and it can cause the AI to give biased, harmful, or completely inaccurate answers. There are two main ways this happens:Training poisoning: Attackers sneak false or harmful data into the model during developmentRetrieval poisoning: Misleading content online gets planted, which the AI later picks up when generating answersIn 2024, attackers uploaded 100 tampered AI models to the open-source platform Hugging Face. These poisoned models looked like helpful tools, but when people used them, they could spread false information or output malicious code.A large-scale example came from a Russian propaganda group called Pravda, which published more than 3.6 million fake articles online. These articles were designed to trick AI chatbots into repeating their messages. In tests, researchers found that major AI systems echoed these false claims about 33% of the time. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)How to protect yourself from AI-driven cyber threatsAI-powered cybercrime blends realism, speed, and scale. These scams are not just harder to detect. They are also easier to launch. Here’s how to stay protected:1) Avoid entering sensitive data into public AI tools: Never share passwords, personal details, or confidential business information in any AI chat, even if it seems private. These inputs can sometimes be logged or misused.2) Use strong antivirus software: AI-generated phishing emails and malware can slip past outdated security tools. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices.3) Turn on two-factor authentication (2FA): 2FA adds an extra layer of protection to your accounts, including AI platforms. It makes it much harder for attackers to break in using stolen passwords.4) Be extra cautious with unexpected video calls or voice messages: If something feels off, even if the person seems familiar, verify before taking action. Deepfake audio and video can sound and look very real.5) Use a personal data removal service: With AI-powered scams and deepfake attacks on the rise, criminals are increasingly relying on publicly available personal information to craft convincing impersonations or target victims with personalized phishing. By using a reputable personal data removal service, you can reduce your digital footprint on data broker sites and public databases. This makes it much harder for scammers to gather the details they need to convincingly mimic your identity or launch targeted AI-driven attacks.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap - and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 6) Consider identity theft protection: If your data is leaked through a scam, early detection is key. Identity protection services can monitor your information and alert you to suspicious activity. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.7) Regularly monitor your financial accounts: AI-generated phishing, malware, and account takeover attacks are now more sophisticated and widespread than ever, as highlighted in the 2025 AI Security Report. By frequently reviewing your bank and credit card statements for suspicious activity, you can catch unauthorized transactions early, often before major damage is done. Quick detection is crucial, especially since stolen credentials and financial information are now being traded and exploited at scale by cybercriminals using AI.8) Use a secure password manager: Stolen AI accounts and credential stuffing attacks are a growing threat, with hackers using automated tools to break into accounts and sell access on the dark web. A secure password manager helps you create and store strong, unique passwords for every account, making it far more difficult for attackers to compromise your logins, even if some of your information is leaked or targeted by AI-driven attacks. Get more details about my best expert-reviewed Password Managers of 2025 here.9) Keep your software updated: AI-generated malware and advanced phishing kits are designed to exploit vulnerabilities in outdated software. To stay ahead of these evolving threats, ensure all your devices, browsers, and applications are updated with the latest security patches. Regular updates close security gaps that AI-powered malware and cybercriminals are actively seeking to exploit. Kurt's key takeawaysCybercriminals are now using AI to power some of the most convincing and scalable attacks we’ve ever seen. From deepfake video calls and AI-generated phishing emails to stolen AI accounts and malware written by chatbots, these scams are becoming harder to detect and easier to launch. Attackers are even poisoning AI models with false information and creating fake tools that look legitimate but are designed to do harm. To stay safe, it’s more important than ever to use strong antivirus protection, enable multi-factor authentication, and avoid sharing sensitive data with AI tools you do not fully trust.Have you noticed AI scams getting more convincing? Let us know your experience or questions by writing us at Cyberguy.com/Contact. Your story could help someone else stay safe.For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.1 Comments 0 Shares -
Delivery robot autonomously lifts, transports heavy cargo
Tech Delivery robot autonomously lifts, transports heavy cargo Versatile robot autonomously walks, rolls, lifts for deliveries across any terrain
Published
May 26, 2025 6:00am EDT close 'CyberGuy': Delivery robot autonomously lifts, transports heavy cargo Tech expert Kurt Knutsson discusses LEVA, the autonomous robot that walks, rolls and lifts 187 pounds of cargo for all-terrain deliveries. Autonomous delivery robots are already starting to change the way goods move around cities and warehouses, but most still need humans to load and unload their cargo. That's where LEVA comes in. Developed by engineers and designers from ETH Zurich and other Swiss universities, LEVA is a robot that can not only navigate tricky environments but also lift and carry heavy boxes all on its own, making deliveries smoother and more efficient. Delivery robotWhat makes LEVA different?Most delivery robots either roll on wheels or walk on legs, but LEVA combines both. It has four legs, and each leg ends with a motorized, steerable wheel. This means on smooth surfaces like sidewalks, LEVA can roll quickly and efficiently, almost like a little car. When it encounters stairs, curbs or rough ground, it locks its wheels and walks or climbs like a four-legged animal. This unique design lets LEVA handle both flat urban streets and uneven terrain with ease. Delivery robotHow LEVA sees and moves aroundLEVA uses a mix of GPS, lidar sensors and five cameras placed around its body to understand its surroundings. These tools help it navigate city streets or indoor hallways while avoiding obstacles. One camera even looks downward to help LEVA line itself up perfectly when it's time to pick up or drop off cargo. Delivery robotThe big deal: Loading and unloading itselfWhat really sets LEVA apart is its ability to load and unload cargo boxes without any human help. It spots a standard cargo box, moves right over it, lowers itself by bending its legs and then locks onto the box using powered hooks underneath its body. After securing the box, LEVA lifts itself back up and carries the load to its destination. It can handle boxes weighing up to 187 pounds, which is pretty impressive for a robot of its size. Delivery robot’s wheelsLEVA's specsLEVA is about 4 feet long and 2.5 feet wide, with an adjustable height between 2 and 3 feet. It weighs around 187 pounds and can carry the same amount of cargo. Thanks to its wheels and legs, it can move smoothly on flat surfaces, climb stairs and handle rough terrain. Its sensors and cameras give it a sharp sense of where it is and what's around it. Delivery robotWhere could you see LEVA in action?LEVA's flexibility makes it useful in many places. It could deliver packages right to your doorstep, even if you live in a building with stairs. Farmers might use it to move supplies across fields. On construction sites, it could carry tools and materials over uneven ground. It might even assist in emergency situations by bringing supplies through rubble or rough terrain. Delivery robotWhat does this mean for you?For folks like us, LEVA could mean faster, more reliable deliveries, especially in tricky urban areas where stairs and curbs often slow things down. For businesses, it means cutting down on the need for manual labor to load and unload heavy items, which can reduce injuries and lower costs.It also means deliveries and material handling could happen around the clock without breaks, boosting efficiency. In industries like farming, construction and emergency response, LEVA's ability to get through tough terrain while carrying heavy loads could make a big difference in how quickly and safely supplies get where they need to go. Delivery robotWhat's next for LEVA?The first LEVA prototype has shown it can do a lot, but there's still work to be done. The team is improving its energy use, making it better at climbing stairs, and enhancing its ability to operate fully on its own. The goal is to have LEVA become a reliable part of automated delivery systems that work smoothly in real-world settings. Delivery robotKurt's key takeawaysLEVA blends the best of wheels and legs with the unique ability to load and unload itself. This makes it a promising tool for industries that need robots to be flexible, strong and smart. As LEVA continues to develop, it could change the way deliveries and material transport happen, making them faster, safer and more efficient for everyone.How much would you trust a robot to handle your valuable or fragile shipments without human supervision? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#delivery #robot #autonomously #lifts #transportsDelivery robot autonomously lifts, transports heavy cargoTech Delivery robot autonomously lifts, transports heavy cargo Versatile robot autonomously walks, rolls, lifts for deliveries across any terrain Published May 26, 2025 6:00am EDT close 'CyberGuy': Delivery robot autonomously lifts, transports heavy cargo Tech expert Kurt Knutsson discusses LEVA, the autonomous robot that walks, rolls and lifts 187 pounds of cargo for all-terrain deliveries. Autonomous delivery robots are already starting to change the way goods move around cities and warehouses, but most still need humans to load and unload their cargo. That's where LEVA comes in. Developed by engineers and designers from ETH Zurich and other Swiss universities, LEVA is a robot that can not only navigate tricky environments but also lift and carry heavy boxes all on its own, making deliveries smoother and more efficient. Delivery robotWhat makes LEVA different?Most delivery robots either roll on wheels or walk on legs, but LEVA combines both. It has four legs, and each leg ends with a motorized, steerable wheel. This means on smooth surfaces like sidewalks, LEVA can roll quickly and efficiently, almost like a little car. When it encounters stairs, curbs or rough ground, it locks its wheels and walks or climbs like a four-legged animal. This unique design lets LEVA handle both flat urban streets and uneven terrain with ease. Delivery robotHow LEVA sees and moves aroundLEVA uses a mix of GPS, lidar sensors and five cameras placed around its body to understand its surroundings. These tools help it navigate city streets or indoor hallways while avoiding obstacles. One camera even looks downward to help LEVA line itself up perfectly when it's time to pick up or drop off cargo. Delivery robotThe big deal: Loading and unloading itselfWhat really sets LEVA apart is its ability to load and unload cargo boxes without any human help. It spots a standard cargo box, moves right over it, lowers itself by bending its legs and then locks onto the box using powered hooks underneath its body. After securing the box, LEVA lifts itself back up and carries the load to its destination. It can handle boxes weighing up to 187 pounds, which is pretty impressive for a robot of its size. Delivery robot’s wheelsLEVA's specsLEVA is about 4 feet long and 2.5 feet wide, with an adjustable height between 2 and 3 feet. It weighs around 187 pounds and can carry the same amount of cargo. Thanks to its wheels and legs, it can move smoothly on flat surfaces, climb stairs and handle rough terrain. Its sensors and cameras give it a sharp sense of where it is and what's around it. Delivery robotWhere could you see LEVA in action?LEVA's flexibility makes it useful in many places. It could deliver packages right to your doorstep, even if you live in a building with stairs. Farmers might use it to move supplies across fields. On construction sites, it could carry tools and materials over uneven ground. It might even assist in emergency situations by bringing supplies through rubble or rough terrain. Delivery robotWhat does this mean for you?For folks like us, LEVA could mean faster, more reliable deliveries, especially in tricky urban areas where stairs and curbs often slow things down. For businesses, it means cutting down on the need for manual labor to load and unload heavy items, which can reduce injuries and lower costs.It also means deliveries and material handling could happen around the clock without breaks, boosting efficiency. In industries like farming, construction and emergency response, LEVA's ability to get through tough terrain while carrying heavy loads could make a big difference in how quickly and safely supplies get where they need to go. Delivery robotWhat's next for LEVA?The first LEVA prototype has shown it can do a lot, but there's still work to be done. The team is improving its energy use, making it better at climbing stairs, and enhancing its ability to operate fully on its own. The goal is to have LEVA become a reliable part of automated delivery systems that work smoothly in real-world settings. Delivery robotKurt's key takeawaysLEVA blends the best of wheels and legs with the unique ability to load and unload itself. This makes it a promising tool for industries that need robots to be flexible, strong and smart. As LEVA continues to develop, it could change the way deliveries and material transport happen, making them faster, safer and more efficient for everyone.How much would you trust a robot to handle your valuable or fragile shipments without human supervision? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #delivery #robot #autonomously #lifts #transportsWWW.FOXNEWS.COMDelivery robot autonomously lifts, transports heavy cargoTech Delivery robot autonomously lifts, transports heavy cargo Versatile robot autonomously walks, rolls, lifts for deliveries across any terrain Published May 26, 2025 6:00am EDT close 'CyberGuy': Delivery robot autonomously lifts, transports heavy cargo Tech expert Kurt Knutsson discusses LEVA, the autonomous robot that walks, rolls and lifts 187 pounds of cargo for all-terrain deliveries. Autonomous delivery robots are already starting to change the way goods move around cities and warehouses, but most still need humans to load and unload their cargo. That's where LEVA comes in. Developed by engineers and designers from ETH Zurich and other Swiss universities, LEVA is a robot that can not only navigate tricky environments but also lift and carry heavy boxes all on its own, making deliveries smoother and more efficient. Delivery robot (LEVA) (Kurt "CyberGuy" Knutsson)What makes LEVA different?Most delivery robots either roll on wheels or walk on legs, but LEVA combines both. It has four legs, and each leg ends with a motorized, steerable wheel. This means on smooth surfaces like sidewalks, LEVA can roll quickly and efficiently, almost like a little car. When it encounters stairs, curbs or rough ground, it locks its wheels and walks or climbs like a four-legged animal. This unique design lets LEVA handle both flat urban streets and uneven terrain with ease. Delivery robot (LEVA) (Kurt "CyberGuy" Knutsson)How LEVA sees and moves aroundLEVA uses a mix of GPS, lidar sensors and five cameras placed around its body to understand its surroundings. These tools help it navigate city streets or indoor hallways while avoiding obstacles. One camera even looks downward to help LEVA line itself up perfectly when it's time to pick up or drop off cargo. Delivery robot (LEVA) (Kurt "CyberGuy" Knutsson)The big deal: Loading and unloading itselfWhat really sets LEVA apart is its ability to load and unload cargo boxes without any human help. It spots a standard cargo box, moves right over it, lowers itself by bending its legs and then locks onto the box using powered hooks underneath its body. After securing the box, LEVA lifts itself back up and carries the load to its destination. It can handle boxes weighing up to 187 pounds, which is pretty impressive for a robot of its size. Delivery robot’s wheels (LEVA) (Kurt "CyberGuy" Knutsson)LEVA's specsLEVA is about 4 feet long and 2.5 feet wide, with an adjustable height between 2 and 3 feet. It weighs around 187 pounds and can carry the same amount of cargo. Thanks to its wheels and legs, it can move smoothly on flat surfaces, climb stairs and handle rough terrain. Its sensors and cameras give it a sharp sense of where it is and what's around it. Delivery robot (LEVA) (Kurt "CyberGuy" Knutsson)Where could you see LEVA in action?LEVA's flexibility makes it useful in many places. It could deliver packages right to your doorstep, even if you live in a building with stairs. Farmers might use it to move supplies across fields. On construction sites, it could carry tools and materials over uneven ground. It might even assist in emergency situations by bringing supplies through rubble or rough terrain. Delivery robot (LEVA) (Kurt "CyberGuy" Knutsson)What does this mean for you?For folks like us, LEVA could mean faster, more reliable deliveries, especially in tricky urban areas where stairs and curbs often slow things down. For businesses, it means cutting down on the need for manual labor to load and unload heavy items, which can reduce injuries and lower costs.It also means deliveries and material handling could happen around the clock without breaks, boosting efficiency. In industries like farming, construction and emergency response, LEVA's ability to get through tough terrain while carrying heavy loads could make a big difference in how quickly and safely supplies get where they need to go. Delivery robot (LEVA) (Kurt "CyberGuy" Knutsson)What's next for LEVA?The first LEVA prototype has shown it can do a lot, but there's still work to be done. The team is improving its energy use, making it better at climbing stairs, and enhancing its ability to operate fully on its own. The goal is to have LEVA become a reliable part of automated delivery systems that work smoothly in real-world settings. Delivery robot (LEVA) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysLEVA blends the best of wheels and legs with the unique ability to load and unload itself. This makes it a promising tool for industries that need robots to be flexible, strong and smart. As LEVA continues to develop, it could change the way deliveries and material transport happen, making them faster, safer and more efficient for everyone.How much would you trust a robot to handle your valuable or fragile shipments without human supervision? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares -
FBI warns of hackers exploiting outdated routers. Check yours now
Published
May 26, 2025 10:00am EDT close Smart routers offer more parental control over social media In the ongoing debate over regulating social media, one company is urging parents to take matters into their own hands. We stay on top of updates for our phones and laptops. Some of us even make sure our smartwatches and security cameras are running the latest firmware. But routers often get overlooked. If it's working, we assume it's fine, but that mindset can be risky.Now, the FBI has issued a warning that cybercriminals are actively exploiting old, unpatched and outdated routers. The alert, released in May 2025, explains how aging network devices with known flaws are being hijacked by malware and used to power anonymous cybercrime operations. A forgotten device in your home can silently become a tool for attackers. A routerThe FBI alertThe FBI's Internet Crime Complaint Center published a public service announcement on May 7, 2025, cautioning both individuals and organizations that criminals are taking advantage of outdated routers that no longer receive security patches.Devices manufactured around 2010 or earlier are especially vulnerable, as vendors have long ceased providing firmware updates for them. According to the FBI, such end-of-life routers have been breached by cyber actors using a variant of the "TheMoon" malware, allowing attackers to install proxy services on the devices and conduct illicit activities anonymously.In essence, home and small-office routers are being quietly conscripted into proxy networks that mask the perpetrators' identities online. The alert notes that through networks like "5socks" and "Anyproxy," criminals have been selling access to the infected routers as proxy nodes. In these schemes, paying customers can route their internet traffic through unwitting victims' routers, obscuring their own location while the victim's devicebears the blame. A routerWhich routers are affected?The FBI bulletin even names specific router models as frequent targets, including:Cisco M10Cisco Linksys E1500Cisco Linksys E1550Cisco Linksys WRT610NCisco Linksys E1000Cradlepoint E100Cradlepoint E300Linksys E1200Linksys E2500Linksys E3200Linksys WRT320NLinksys E4200Linksys WRT310NAll of these devices are roughly a decade or more old and have known security vulnerabilities that were never patched once support ended. With their firmware updates long discontinued, any still in use are soft targets for attackers.How hackers exploit these routersMany recent infections stem from devices with remote administration exposed to the internet. Attackers scan for such routers, exploiting known firmware flaws without needing passwords. A single crafted web request can trick an older device into running malicious code. Once inside, malware often alters settings, opening ports or disabling security features, to maintain control and connect to external command-and-control servers.One prominent threat is TheMoon, a malware strain first seen in 2014 that exploited flaws in Linksys routers. It has since evolved into a stealthy botnet builder, transforming infected routers into proxy nodes. Instead of launching direct attacks, TheMoon reroutes third-party traffic, masking hackers' identities behind everyday home networks. Cybercrime platforms like Faceless and 5socks sell access to these infected routers as "residential proxies," making them valuable assets in the digital underground.For users, a compromised router means slower connections, exposure to phishing and spyware, and potential legal trouble if criminals abuse their IP address. For businesses, the risk is even higher: Outdated routers can be exploited for deeper network intrusions, data theft and ransomware attacks. In critical sectors, the consequences can be severe, affecting safety and compliance. A woman working on her laptop6 ways to stay safe from router hackersGiven the serious threats posed by outdated and compromised routers, taking proactive measures is essential. Here are six practical steps you can follow to protect your network and keep hackers at bay.1) Replace your old router if it's no longer supported: If your router is more than five to seven years old, or if you can't find any recent updates for it on the manufacturer's website, it might be time to upgrade. Older routers often stop getting security fixes, which makes them an easy target for hackers. To check, look at the label on your router for the model number, then search online for "firmware update." If the last update was years ago, consider replacing it with a newer model from a trusted brand.If you're not sure which router to get, check out my list of top routers for the best security. It includes models with strong security features and compatibility with VPN services.2) Keep your router's firmware updated: Your router runs software called firmware, which needs to be updated just like your phone or computer. To do this, open a web browser and type your router's IP address, then log in using the username and password. Once inside, look for a section called "Firmware Update," "System" or "Administration," and check if an update is available. Apply it if there is one. Some newer routers also have apps that make this even easier.3) Turn off remote access: Remote access lets you control your router from outside your home network, but it also opens the door for hackers. You can turn this off by logging into your router's settings, then finding a setting called "Remote Management," "Remote Access" or "WAN Access." Make sure this feature is disabled, then save the changes and restart your router.4) Use a strong password for your router settings: Don't leave your router using the default login, like "admin" and "password." That's the first thing hackers try. Change it to a long, strong password with a mix of letters, numbers and symbols. A good example would be something like T#8r2k!sG91xm4vL. Try to avoid using the same password you use elsewhere. You can usually change the login password in the "Administration" or "Security" section of the router settings. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.5) Look out for strange behavior and act quickly: If your internet feels unusually slow, your devices randomly disconnect or your streaming buffers more than usual, it could mean something is wrong. Go into your router settings and check the list of connected devices. If you see something you don't recognize, it could be a sign of a breach. In that case, update the firmware, change your passwords and restart the router. If you're not comfortable doing this yourself, call your internet provider for help.6) Reporting to authorities: The FBI asks that victims or those who suspect a compromise report incidents to the Internet Crime Complaint Center, which can help authorities track and mitigate broader threats.Kurt's key takeawayThis isn't just about asking everyone to upgrade their old gear. It's about the bigger issue of who's actually responsible when outdated devices turn into security risks. Most people don't think twice about the router sitting in a corner, quietly doing its job years past its prime. But attackers do. They see forgotten hardware as easy targets. The real challenge isn't just technical. It's about how manufacturers, service providers and users all handle the long tail of aging tech that still lives on in the real world.Should manufacturers be held accountable for keeping routers secure against cyber threats? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
#fbi #warns #hackers #exploiting #outdatedFBI warns of hackers exploiting outdated routers. Check yours nowPublished May 26, 2025 10:00am EDT close Smart routers offer more parental control over social media In the ongoing debate over regulating social media, one company is urging parents to take matters into their own hands. We stay on top of updates for our phones and laptops. Some of us even make sure our smartwatches and security cameras are running the latest firmware. But routers often get overlooked. If it's working, we assume it's fine, but that mindset can be risky.Now, the FBI has issued a warning that cybercriminals are actively exploiting old, unpatched and outdated routers. The alert, released in May 2025, explains how aging network devices with known flaws are being hijacked by malware and used to power anonymous cybercrime operations. A forgotten device in your home can silently become a tool for attackers. A routerThe FBI alertThe FBI's Internet Crime Complaint Center published a public service announcement on May 7, 2025, cautioning both individuals and organizations that criminals are taking advantage of outdated routers that no longer receive security patches.Devices manufactured around 2010 or earlier are especially vulnerable, as vendors have long ceased providing firmware updates for them. According to the FBI, such end-of-life routers have been breached by cyber actors using a variant of the "TheMoon" malware, allowing attackers to install proxy services on the devices and conduct illicit activities anonymously.In essence, home and small-office routers are being quietly conscripted into proxy networks that mask the perpetrators' identities online. The alert notes that through networks like "5socks" and "Anyproxy," criminals have been selling access to the infected routers as proxy nodes. In these schemes, paying customers can route their internet traffic through unwitting victims' routers, obscuring their own location while the victim's devicebears the blame. A routerWhich routers are affected?The FBI bulletin even names specific router models as frequent targets, including:Cisco M10Cisco Linksys E1500Cisco Linksys E1550Cisco Linksys WRT610NCisco Linksys E1000Cradlepoint E100Cradlepoint E300Linksys E1200Linksys E2500Linksys E3200Linksys WRT320NLinksys E4200Linksys WRT310NAll of these devices are roughly a decade or more old and have known security vulnerabilities that were never patched once support ended. With their firmware updates long discontinued, any still in use are soft targets for attackers.How hackers exploit these routersMany recent infections stem from devices with remote administration exposed to the internet. Attackers scan for such routers, exploiting known firmware flaws without needing passwords. A single crafted web request can trick an older device into running malicious code. Once inside, malware often alters settings, opening ports or disabling security features, to maintain control and connect to external command-and-control servers.One prominent threat is TheMoon, a malware strain first seen in 2014 that exploited flaws in Linksys routers. It has since evolved into a stealthy botnet builder, transforming infected routers into proxy nodes. Instead of launching direct attacks, TheMoon reroutes third-party traffic, masking hackers' identities behind everyday home networks. Cybercrime platforms like Faceless and 5socks sell access to these infected routers as "residential proxies," making them valuable assets in the digital underground.For users, a compromised router means slower connections, exposure to phishing and spyware, and potential legal trouble if criminals abuse their IP address. For businesses, the risk is even higher: Outdated routers can be exploited for deeper network intrusions, data theft and ransomware attacks. In critical sectors, the consequences can be severe, affecting safety and compliance. A woman working on her laptop6 ways to stay safe from router hackersGiven the serious threats posed by outdated and compromised routers, taking proactive measures is essential. Here are six practical steps you can follow to protect your network and keep hackers at bay.1) Replace your old router if it's no longer supported: If your router is more than five to seven years old, or if you can't find any recent updates for it on the manufacturer's website, it might be time to upgrade. Older routers often stop getting security fixes, which makes them an easy target for hackers. To check, look at the label on your router for the model number, then search online for "firmware update." If the last update was years ago, consider replacing it with a newer model from a trusted brand.If you're not sure which router to get, check out my list of top routers for the best security. It includes models with strong security features and compatibility with VPN services.2) Keep your router's firmware updated: Your router runs software called firmware, which needs to be updated just like your phone or computer. To do this, open a web browser and type your router's IP address, then log in using the username and password. Once inside, look for a section called "Firmware Update," "System" or "Administration," and check if an update is available. Apply it if there is one. Some newer routers also have apps that make this even easier.3) Turn off remote access: Remote access lets you control your router from outside your home network, but it also opens the door for hackers. You can turn this off by logging into your router's settings, then finding a setting called "Remote Management," "Remote Access" or "WAN Access." Make sure this feature is disabled, then save the changes and restart your router.4) Use a strong password for your router settings: Don't leave your router using the default login, like "admin" and "password." That's the first thing hackers try. Change it to a long, strong password with a mix of letters, numbers and symbols. A good example would be something like T#8r2k!sG91xm4vL. Try to avoid using the same password you use elsewhere. You can usually change the login password in the "Administration" or "Security" section of the router settings. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.5) Look out for strange behavior and act quickly: If your internet feels unusually slow, your devices randomly disconnect or your streaming buffers more than usual, it could mean something is wrong. Go into your router settings and check the list of connected devices. If you see something you don't recognize, it could be a sign of a breach. In that case, update the firmware, change your passwords and restart the router. If you're not comfortable doing this yourself, call your internet provider for help.6) Reporting to authorities: The FBI asks that victims or those who suspect a compromise report incidents to the Internet Crime Complaint Center, which can help authorities track and mitigate broader threats.Kurt's key takeawayThis isn't just about asking everyone to upgrade their old gear. It's about the bigger issue of who's actually responsible when outdated devices turn into security risks. Most people don't think twice about the router sitting in a corner, quietly doing its job years past its prime. But attackers do. They see forgotten hardware as easy targets. The real challenge isn't just technical. It's about how manufacturers, service providers and users all handle the long tail of aging tech that still lives on in the real world.Should manufacturers be held accountable for keeping routers secure against cyber threats? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. #fbi #warns #hackers #exploiting #outdatedWWW.FOXNEWS.COMFBI warns of hackers exploiting outdated routers. Check yours nowPublished May 26, 2025 10:00am EDT close Smart routers offer more parental control over social media In the ongoing debate over regulating social media, one company is urging parents to take matters into their own hands. We stay on top of updates for our phones and laptops. Some of us even make sure our smartwatches and security cameras are running the latest firmware. But routers often get overlooked. If it's working, we assume it's fine, but that mindset can be risky.Now, the FBI has issued a warning that cybercriminals are actively exploiting old, unpatched and outdated routers. The alert, released in May 2025, explains how aging network devices with known flaws are being hijacked by malware and used to power anonymous cybercrime operations. A forgotten device in your home can silently become a tool for attackers. A router (Kurt "CyberGuy" Knutsson)The FBI alertThe FBI's Internet Crime Complaint Center published a public service announcement on May 7, 2025, cautioning both individuals and organizations that criminals are taking advantage of outdated routers that no longer receive security patches.Devices manufactured around 2010 or earlier are especially vulnerable, as vendors have long ceased providing firmware updates for them. According to the FBI, such end-of-life routers have been breached by cyber actors using a variant of the "TheMoon" malware, allowing attackers to install proxy services on the devices and conduct illicit activities anonymously.In essence, home and small-office routers are being quietly conscripted into proxy networks that mask the perpetrators' identities online. The alert notes that through networks like "5socks" and "Anyproxy," criminals have been selling access to the infected routers as proxy nodes. In these schemes, paying customers can route their internet traffic through unwitting victims' routers, obscuring their own location while the victim's device (and IP address) bears the blame. A router (Kurt "CyberGuy" Knutsson)Which routers are affected?The FBI bulletin even names specific router models as frequent targets, including:Cisco M10Cisco Linksys E1500Cisco Linksys E1550Cisco Linksys WRT610NCisco Linksys E1000Cradlepoint E100Cradlepoint E300Linksys E1200Linksys E2500Linksys E3200Linksys WRT320NLinksys E4200Linksys WRT310NAll of these devices are roughly a decade or more old and have known security vulnerabilities that were never patched once support ended. With their firmware updates long discontinued, any still in use are soft targets for attackers.How hackers exploit these routersMany recent infections stem from devices with remote administration exposed to the internet. Attackers scan for such routers, exploiting known firmware flaws without needing passwords. A single crafted web request can trick an older device into running malicious code. Once inside, malware often alters settings, opening ports or disabling security features, to maintain control and connect to external command-and-control servers.One prominent threat is TheMoon, a malware strain first seen in 2014 that exploited flaws in Linksys routers. It has since evolved into a stealthy botnet builder, transforming infected routers into proxy nodes. Instead of launching direct attacks, TheMoon reroutes third-party traffic, masking hackers' identities behind everyday home networks. Cybercrime platforms like Faceless and 5socks sell access to these infected routers as "residential proxies," making them valuable assets in the digital underground.For users, a compromised router means slower connections, exposure to phishing and spyware, and potential legal trouble if criminals abuse their IP address. For businesses, the risk is even higher: Outdated routers can be exploited for deeper network intrusions, data theft and ransomware attacks. In critical sectors, the consequences can be severe, affecting safety and compliance. A woman working on her laptop (Kurt "CyberGuy" Knutsson)6 ways to stay safe from router hackersGiven the serious threats posed by outdated and compromised routers, taking proactive measures is essential. Here are six practical steps you can follow to protect your network and keep hackers at bay.1) Replace your old router if it's no longer supported: If your router is more than five to seven years old, or if you can't find any recent updates for it on the manufacturer's website, it might be time to upgrade. Older routers often stop getting security fixes, which makes them an easy target for hackers. To check, look at the label on your router for the model number, then search online for "[model number] firmware update." If the last update was years ago, consider replacing it with a newer model from a trusted brand.If you're not sure which router to get, check out my list of top routers for the best security. It includes models with strong security features and compatibility with VPN services.2) Keep your router's firmware updated: Your router runs software called firmware, which needs to be updated just like your phone or computer. To do this, open a web browser and type your router's IP address (often 192.168.0.1 or 192.168.1.1), then log in using the username and password (usually found on a sticker on the router). Once inside, look for a section called "Firmware Update," "System" or "Administration," and check if an update is available. Apply it if there is one. Some newer routers also have apps that make this even easier.3) Turn off remote access: Remote access lets you control your router from outside your home network, but it also opens the door for hackers. You can turn this off by logging into your router's settings (using the same steps as above), then finding a setting called "Remote Management," "Remote Access" or "WAN Access." Make sure this feature is disabled, then save the changes and restart your router.4) Use a strong password for your router settings: Don't leave your router using the default login, like "admin" and "password." That's the first thing hackers try. Change it to a long, strong password with a mix of letters, numbers and symbols. A good example would be something like T#8r2k!sG91xm4vL. Try to avoid using the same password you use elsewhere. You can usually change the login password in the "Administration" or "Security" section of the router settings. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.5) Look out for strange behavior and act quickly: If your internet feels unusually slow, your devices randomly disconnect or your streaming buffers more than usual, it could mean something is wrong. Go into your router settings and check the list of connected devices. If you see something you don't recognize, it could be a sign of a breach. In that case, update the firmware, change your passwords and restart the router. If you're not comfortable doing this yourself, call your internet provider for help.6) Reporting to authorities: The FBI asks that victims or those who suspect a compromise report incidents to the Internet Crime Complaint Center, which can help authorities track and mitigate broader threats.Kurt's key takeawayThis isn't just about asking everyone to upgrade their old gear. It's about the bigger issue of who's actually responsible when outdated devices turn into security risks. Most people don't think twice about the router sitting in a corner, quietly doing its job years past its prime. But attackers do. They see forgotten hardware as easy targets. The real challenge isn't just technical. It's about how manufacturers, service providers and users all handle the long tail of aging tech that still lives on in the real world.Should manufacturers be held accountable for keeping routers secure against cyber threats? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Comments 0 Shares
More Stories