Fox News
Fox News
Welcome to the official Fox News Facebook page. Get breaking news, must see videos & exclusive interviews from the #1 name in news.
  • 1 people like this
  • 149 Posts
  • 2 Photos
  • 0 Videos
  • 0 Reviews
  • News
Search
Recent Updates
  • WWW.FOXNEWS.COM
    Top 5 mistakes that could expose your financial data to cybercriminals
    Tech Top 5 mistakes that could expose your financial data to cybercriminals How budgeting apps can leave your sensitive financial data at risk Published December 22, 2024 10:00am EST close How VPNs shield your identity and secure your financial transactions from theft A VPN could be your secret weapon to protect your identity and finances. How secure is your financial information? Lets do a little test: Do you currently have a budgeting app installed on your phone? Statistically speaking, theres a good chance you do.Seventy-five percent of smartphone owners have tried at least one. It seems like a smart move to take control of your finances, right? Unfortunately, what many people dont realize is that apps like these could be exposing your sensitive financial data.Thats just one example. There are other common habits and oversights that could leave your financial data wide open to cybercriminals.Mistakes like these dont just jeopardize your bank account, they can lead to devastating consequences like identity theft, mounting debt and even shattered retirement plans. I'll walk you through the five biggest mistakes that could be putting your financial future at risk, and, more importantly, how to avoid them. A couple working on their budget (Kurt "CyberGuy" Knutsson)The 5 biggest mistakes you should avoidNavigating the digital world can be tricky, especially when avoiding common pitfalls that compromise your privacy and security. Here are the five biggest mistakes you should avoid:1. Neglecting security measuresThis is one of the biggest pitfalls many of us fall into. There are so many things we have to do these days to keep our online security up to par. Its easy to grow complacent, essentially leaving the door wide open for cybercriminals to walk through. Here are the basics you should never forget to follow:Enable two-factor authentication (2FA) everywhere you can, especially online accounts that hold your financial information.Keep your software updated. Hackers exploit known weaknesses in old versions of apps, operating systems and even browsers. So, be sure toregularly update your software on all your devices.Avoid usingpublic, unsecured networks, especially when accessing sensitive accounts like online banking or even e-commerce. If you have no other choice, use atrusted VPN to encrypt your online activity, including financial information.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on yourWindows, Mac, Android and iOS devices A woman scrolling on her phone (Kurt "CyberGuy" Knutsson)2. Reusing passwordsThough technically a security measure, this ones so bad, it deserves its own spot on the list. Arecent survey revealed thatmore than half of Americans reuse passwords on at least some of their accounts. Make sure youre not one of them.When hackers compromise one account, they dont stop there. They use a technique called credential stuffing, by which stolen login details are tested on other platforms. So, if youve reused the same password for your bank account, email and favorite shopping site, one data breach can take them all down in one fell swoop.If you dont have a perfect memory, capable of memorizing every password youll ever need, I recommend using a trustedpassword manager. They can generate and store complex, unique passwords for all your accounts so you dont have to remember them yourself. A woman working on her budget (Kurt "CyberGuy" Knutsson)3. Using budgeting appsBudgeting apps can be a convenient tool for managing your finances, but they also come with potential risks that many users overlook. These apps often share user data with third parties and may request extensive permissions, including access to sensitive personal information. This can raise concerns about privacy and data security, especially if the app lacks robust safeguards. Before using a budgeting app, its crucial to carefully review its permissions and data-sharing policies to protect your financial and personal information.Instead of relying on a budgeting app, consider utilizing your bank's online tools. Many banks offer built-in budgeting and expense-tracking features within their secure online banking platforms. These are typically more privacy-focused than third-party apps. Here are some examples:Bank of America: Offersinteractive charts that break down spending trends, highlight budget categories and show total monthly spending with customizable categories.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Wells Fargo: Features a package calledMy Money Map, which includes spending reports, personalized budget creation, goal setting and visual analysis of spending compared to budget limits.Capital One: Provides automated budgeting tools through its 360 Checking account, allowing customers to track and categorize expenses automatically. It also features Eno, a virtual assistant for transaction inquiries.Chase:Offers built-inbudgeting tools that seamlessly integrate with your accounts. This includes features like automatic expense categorization, spending insights and personalized budget tracking. With Chase, you can also set savings goals and monitor your progress directly through their mobile app or online banking platform.Huntington National Bank: Offers several in-app budgeting tools, including Spend Analysis for expense tracking,Spend Setter for setting category limits and Look Ahead Calendar for visualizing upcoming payments.Regions Bank: Provides a suite of budgeting tools calledMy GreenInsights, accessible via mobile app and desktop, allowing customers to track expenses, set spending targets and receive suggestions for reducing expenses.These bank-provided tools offer the advantage of being integrated directly with your accounts, potentially providing more accurate and up-to-date information while maintaining a higher level of privacy compared to third-party apps.If you decide to stick to a budgeting app, though, make sure to check its privacy section on the App Store or Google Play, where you can see what data it collects and shares. Then, read the app's privacy policy carefully, as tedious and often deliberately overcomplicated as that can be. A man using his phone and laptop to work on his budget (Kurt "CyberGuy" Knutsson)4. Shopping anywhere onlineOnline shopping is convenient and tempting, especially during major sales events likeBlack Friday. But diving headfirst into deals without knowing the retailer could cost you more than you bargained for.When you shop on unfamiliar websites, youre sharing sensitive information like your financial data, address and contact details. If the retailer doesnt have strong privacy or security measures in place, this data could end up in the hands of cybercriminals or be sold to data brokers.Even popular retailers arent always safe. For instance, platformslike Temu, which attract millions of shoppers, have faced scrutiny for questionable data practices. Popularity doesnt guarantee good privacy or security standards. To protect yourself, shop only on websites with a solid reputation for security and privacy. Heres how you can verify a site before making a purchase:Check theirprivacy policy to understand how they collect, use and share your data.Readconsumer reviews to spot red flags, like poor customer service or complaints of data misuse.Whenever possible, use avirtual credit card or payment service like PayPal to add an extra layer of protection for your financial information.GET FOX BUSINESS ON THE GO BY CLICKING HERE A man using his phone for budgeting purposes (Kurt "CyberGuy" Knutsson)5. Allowing data brokers to keep and sell your informationUnless you go completely off the grid digitally no internet, online accounts or smartphones its nearly impossible to avoid leaving a digital footprint. Most companies collect and share your personal information, which ends up in the hands of data brokers and people-search websites that aggregate and sell it to even more third parties.Data brokerage is a$245.8 billion industry that profits off your personal information at the expense of your privacy and security. Some data brokers have even been caughtintentionally selling information to scammers. People-search sites also provide an accessible way for anyone, including fraudsters, to get their hands on your personal information.To mitigate these risks, its crucial to periodically remove your information from these databases. While its not a perfect solution, consistent removal can significantly reduce your exposure and safeguard both your financial data and personal safety.Check out my top picks for data removal services here.Kurts key takeawaysFrom my experience, it's easy to overlook these risks in our fast-paced, convenience-driven world. But taking just a few minutes to review your security practices can save you from a world of trouble. Don't wait until its too late to protect yourself and your loved ones. Neglecting basic security like two-factor authentication, reusing passwords or shopping on untrustworthy websites can leave you exposed. Using finance apps that share your data, like allowing data brokers to profit off your personal information, also increases your risks of experiencing fraud and identity theft. By staying vigilant, you can protect both your finances and your loved ones.CLICK HERE TO GET THE FOX NEWS APPHave you made any of the mistakes on this list, or do you have others youd add? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 0 Views
  • WWW.FOXNEWS.COM
    Food tracking just got lazy in the best way possible with this wearable
    Tech Food tracking just got lazy in the best way possible with this wearable Seamlessly monitor your diet with cutting-edge AI and computer vision technology Published December 22, 2024 6:00am EST close Food tracking just got lazy in the best way possible with this wearable Counting calories just got easier. Are you tired of the endless hassle of counting calories and manually logging every meal?Say goodbye to the frustration with The Drop, the world's first fully automated nutrition tracker.This groundbreaking wearable device is designed to revolutionize how you monitor your diet, making nutrition tracking effortless and intuitive. Man wearing The Drop (Kickstarter)What is The Drop?The Drop is a wearable nutrition tracker powered by innovative Nutri Track technology.It automatically records everything you eat throughout the day and syncs seamlessly with its companion app, eliminating the need for tedious manual food logging. Whether you're tracking calories, macronutrients or overall dietary habits, The Drop does it all for you. The Drop (Kickstarter)How The Drop worksThe Drop uses advanced computer vision and artificial intelligence to detect meals with remarkable precision. When you start eating, the smart AI chip activates, and a 4K camera takes a cropped image of your meal. This image is sent to the cloud, where sophisticated algorithms analyze it to calculate calories, protein, carbs, fats and micronutrients. The nutritional breakdown is then instantly displayed in the companion app, giving you actionable insights into your diet. The Drop (Kickstarter)Say goodbye to manual logging with The DropTraditional nutrition tracking tools often rely on you manually logging every meal or snack, which can feel overwhelming and unsustainable. The Drop eliminates these challenges by providing:Automatic tracking: No more forgetting to log meals or snacks.Accurate insights: Advanced algorithms ensure precise nutritional data.Effortless use: Simply wear it and let it do the work for you.By acting as a personal nutritionist in your pocket, The Drop empowers you to understand your eating habits and make informed dietary decisions without stress or effort. The Drops companion app (Kickstarter)The companion app: Rex PremiumIncluded with The Drop is lifetime access to Rex Premium, an AI-powered nutrition app that enhances your tracking experience. The app offers personalized meal plans tailored to your specific dietary goals and seamlessly integrates with Apple Fitness and Google Fit to provide a holistic approach to health tracking.You will have access to a curated collection of recipes that match your individual preferences and dietary needs. The comprehensive dashboard allows for seamless monitoring of nutrition, workouts, sleep and overall wellness, all consolidated into a single, user-friendly interface. While the official release of the Rex app is scheduled for the second quarter of 2025, early beta testers will be granted privileged access to explore and utilize the app's features before the the general public launch. The Drops companion app (Kickstarter)The Drop: Where style meets functionalityThe Drop is designed for both functionality and style. It can be worn as a pin or pendant using a magnetic clasp or premium leather band. Weighing just 27.6 grams, its lightweight and comfortable enough for all-day wear. Available in three colors metallic blue, matte black and gold its as sleek as it is practical. The Drop in three colors (Kickstarter)Technical specificationsThe Drop packs impressive technology into its small frame. Its dual-core 32-bit processor operates at an efficient 240 MHz, providing robust performance for advanced nutrition tracking. The device features comprehensive wireless connectivity, including a complete 2.4GHz Wi-Fi subsystem and Bluetooth 5.0 for seamless data transmission and device integration.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?A high-resolution 4K camera serves as the primary sensor for capturing meal images, complemented by an integrated microphone for additional functionality. The memory configuration includes 8MB of PSRAM and Flash storage with an onboard SD card slot supporting up to 32GB of expandable memory, ensuring ample space for data storage and processing. The Drop (Kickstarter)Kickstarter campaign and rewardsThe Drop is launching through aKickstarter campaign that offers exclusive rewards to early backers. For a pledge of $199, supporters will receive The Drop device, which comes with a lifetime subscription to Rex Premium, the companion app valued at $19.99 per month.This subscription provides access to advanced features and personalized nutrition insights. Early backers will also enjoy the privilege of beta testing, gaining access to The Drop and its features before the general public release. Each backer's package will include The Drop device, a premium leather band, a magnetic pin clasp and a USB-C charging cable. The campaign anticipates shipping the Drop to backers by the fourth quarter of 2025.GET FOX BUSINESS ON THE GO BY CLICKING HERE A woman wearing The Drop (Kickstarter)Kurt's key takeawaysWith its advanced AI-powered technology and seamless integration with Rex Premium, The Drop eliminates the stress of manual logging while providing accurate insights into your diet. Whether you're looking to optimize your health or develop better eating habits, The Drop offers an effortless solution tailored to modern lifestyles. By supporting itsKickstarter campaign, you'll not only gain access to this cutting-edge device but also join a community dedicated to transforming how we understand and manage our nutrition. With its official release planned for the fourth quarter of 2025, The Drop promises to redefine the future of health technology one meal at a time.CLICK HERE TO GET THE FOX NEWS APPWould you be willing to try a device like The Drop to simplify your nutrition tracking or do you prefer sticking with traditional methods? What factors influence your decision? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 7 Views
  • WWW.FOXNEWS.COM
    Do you need a VPN at home? Here are 10 reasons you do
    Published December 21, 2024 10:00am EST close 'CyberGuy': Using VPNs without messing up your banking apps Tech expert Kurt Knutsson says a VPN enhances online banking security by encrypting data and protecting privacy. Have you ever felt a little uneasy while browsing the internet, wondering who might be watching your online activities?Well, let me introduce you to a handy tool that can put your mind at ease: the virtual private network, or VPN.Whether you're working from home, streaming your favorite shows or just exploring the web, a VPN can help ensure that your data stays secure and your privacy intact. So, lets dive into why having a VPN at home is a smart move. A VPN on a laptop. (Kurt "CyberGuy" Knutsson)What is a VPN?A virtual private network, or VPN, encrypts your internet traffic and reroutes it through a server in a different location than your own. VPNs make it appear that you are connecting to the internet from whichever location the server is hosted in rather than your actual location.When you first connect to a network using a VPN, your device will establish a secure connection with the VPN server, and your device's IP address will appear as the VPN server, meaning that only your internet service provider will see that you're connecting to a VPN server. Normally, when you connect to a website, the website or any online services you visit can see your device's technical information, including location-sensitive data such as IP addresses.Why would you want a VPN at home?While your home internet connection is more secure than apublic Wi-Fi connection, VPNs still provide a greater sense of privacy and access to content that might be restricted due to location. Here are 10 reasons I have for getting a home VPN.1. Secure communicationOnline communication can be hit or miss when it comes to security. Some messaging services, such as Whatsapp, use end-to-end device encryption, which helps keep your messages secure, but other messaging services, such as Skype, don't use end-to-end encryption. If you use a VPN with any communication apps, then all your connection and messaging data between your device and the VPN server is fully encrypted. A VPN on a smartphone. (Kurt "CyberGuy" Knutsson)2. Access region-locked contentOnline content and services like Netflix are restricted to specific geographic regions. This content can range from news websites to video streaming platforms and social media apps. Using a VPN at home can appear to be using the internet from another location, allowing you to access restricted services.3. Avoid bandwidth throttlingSometimes, an internet service provider (ISP) will slow down bandwidth or certain online activities. One of the most common reasons networks do this is to manage network congestion, especially during peak hours. You might notice that your home internet connection slows down at night, when everyone is home from work, or it might slow down when summer vacation starts. Using a VPN will prevent your service provider from identifying the type of web content you are accessing, making it impossible for your ISP to slow down your traffic.4. Keep your Wi-Fi activity hiddenA VPN also keeps your internet activity private from Wi-Fi network admins, who, if technically skilled enough, can figure out which websites you've visited. If you're worried about the Wi-Fi admin of your office, hotel, school or other public place having access to your browsing history, a VPN is the perfect solution for you. When it comes to your own home Wi-Fi network, a VPN will keep your browsing history private from other household members.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?5. Defend against cyberattacksHackers deploy large-scale cyberattacks to observe network activity and steal your information. These attacks are particularly prevalent on public Wi-Fi networks, which often have minimal security measures, but they can also target secured networks. Using a VPN can significantly enhance your security by providing encryption for your internet traffic, making it difficult for hackers to intercept and read your data. This encryption is especially crucial when using public Wi-Fi, as it secures your information from potential eavesdroppers.Additionally, a VPN masks your real IP address with that of the VPN server, helping to protect your identity online and making it harder for attackers to target you directly. However, it is essential to understand that while a VPN adds a layer of security,it is not a comprehensive solution against all cyber threats.A VPN does not prevent malware infections orphishing attacks, so you must still employstrong antivirus software and exercise caution when clicking on links or downloading files.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.Furthermore, not all VPNs are created equal; some may have vulnerabilities or questionable privacy practices. It is crucial to choose areputable provider that uses strong encryption and has a clear no-logging policy.6. Fight against internet censorshipThere's a myriad of reasons, ranging from political to economic, that countries use to justify censoring certain apps and websites. It can be incredibly frustrating for citizens and anyone traveling to that country to lose access to email, social media, news websites and other tools that keep us connected to the world around us. I've used VPNs extensively while traveling to ensure that I can always view my most important websites, no matter where I actually am. As I've mentioned, a VPN can mask your IP address and make it appear as traffic from a different country, allowing you to bypass online geographic restrictions.7. Save money by avoiding geographic price changesOne of the best reasons to have a VPN at home is that it can help you save money and find better deals while online shopping. Some online retailers change their prices depending on users' locations. However, when using a VPN while shopping for plane tickets, hotels or gifts, it's possible tofind cheaper prices just by changing your location.8. Keep your online activity private from governmentsIt's no longer the work of sci-fi. We do know that governments, nearly all of them, surveil their citizens. A VPN will add a layer of privacy, making it significantly more difficult for governments to detect your web traffic. Even if you feel that you have nothing to hide, online privacy is something you should feel free to exercise.9. Hide your browsing history from your ISPMuch like governments, your ISP can surveil your online activity with ease. While most ISPs claim that they don't sell your browsing data, they are often allowed through contracts with marketing agencies to give your data away for free to advertise to you. The simplest way to hide your online activity from your ISP is to use a VPN. When using a VPN, your ISP won't be able to see which websites you visit or which apps you use. Image of a Google search on a laptop (Kurt "CyberGuy" Knutsson)10. Experience speedy low-ping online gamingWhile it may seem counterintuitive, a VPN can offer faster connection speeds for online gaming. It can also help prevent your ISP from throttling bandwidth directly from gaming servers. By changing your VPN's location, you can connect to a server closer to your gaming server, which will give you better latency. This is also called ping, which determines how fast the server responds to your inputs.Tips for maximizing your VPN securityTo fully leverage the benefits of your VPN and enhance your online security, consider these important tips that will help protect your personal information and ensure safe browsing.1. Choose a reliable VPN:Select a reputable VPN service with strong encryption protocols.For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.2. Always use VPN on public Wi-Fi:Never access financial accounts onpublic networks without activating your VPN first.3. Enable two-factor authentication (2FA): Add an extra layer of security to your accounts byenabling 2FA.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Use strong, unique passwords:Create complex passwords for each of your accounts and consider using a password manager. Consider using apassword manager to generate and store complex passwords.5. Regularly monitor your accounts: Check your retirement accounts frequently for any suspicious activity.6. Keep software updated: Ensure your devices and apps are alwaysup-to-date with the latest security patches.7. Be cautious of phishing scams while using a VPN:Even with a VPN securing your connection, phishing scams remain a significant threat to your online safety. These scams often use deceptive emails or links to steal sensitive information like passwords or credit card numbers. To protect yourself, combine the use of a VPN withstrong antivirus software that detects and blocks phishing attempts. Additionally, always scrutinize unsolicited emails, avoid clicking on suspicious links, and never provide personal information without verifying the source.For the best protection, check out my expert reviews of the top 2024 antivirus solutions for your Windows, Mac, Android and iOS devices. Together with a VPN, this approach helps keep your personal information and digital assets safe.Kurt's key takeawaysIf you want to start taking your online privacy seriously, it's worth getting a VPN. There are a wide range of options available. You can pick up a router with a VPN or install a software VPN on your devices. I prefer to have a VPN on my laptop and smartphone, and I especially find it useful when traveling internationally.CLICK HERE TO GET THE FOX NEWS APPDo you have a reason for using a VPN we didn't feature in the list? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 1 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: Cate Blanchett 'deeply concerned'
    By Fox News Staff Fox News Published December 21, 2024 8:30am EST LONDON, ENGLAND - DECEMBER 03: Cate Blanchett attends the World Premiere of "The Lord Of The Rings: The War Of The Rohirrim" at Odeon Luxe Leicester Square on December 3, 2024 in London, England. (Photo by Jed Cullen/Dave Benett/WireImage) (Jed Cullen/Dave Benett/WireImage) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Cate Blanchett worries AI could totally replace anyone- ChatGPT CEO talks Elon Musk feud, criticizes Biden admin AI regulation- 10 things you should never tell an AI chatbot'DEEPLY CONCERNED': Cate Blanchett is one of the many actors expressing fears about artificial intelligence. In a recent interview with the BBC, the Oscar winner said the technology "deeply concerned" her. Cate Blanchett. (Rocco Spaziani/Archivio Spaziani/Mondadori Portfolio via Getty Images)ALTMAN OPENS UP: OpenAI CEO and co-founder Sam Altman opened up about Elon Musk's feud with him and his view of how regulations related toartificial intelligence development should be framed. Sam Altman, chief executive officer of OpenAI, during a panel session on day three of the World Economic Forum in Davos, Switzerland, on Jan. 18, 2024. (Stefan Wermuth/Bloomberg via Getty Images / Getty Images)CHATBOT SAFETY: This is a heartbreaking story out of Florida. Megan Garcia thought her 14-year-old son was spending all his time playing video games. She had no idea he was having abusive, in-depth and sexual conversations with a chatbot powered by the app Character AI.SPLIT STRATEGY: A recent survey found that investors and CEOs are viewingartificial intelligence (AI) investments differently. Nearly 80% of investors expect AI projects to generate a positive return on investment within the first year, while 41% CEOs of large-cap companies are willing to let AI initiatives mature over the course of one to two years before they expect positive results.TECH REVOLUTION: Congress's bipartisan task force on artificial intelligence recently released its long-anticipated report, detailing strategies for how the U.S. can protect itself against emerging AI-related threats while ensuring the nation remains a leader in innovation within this rapidly evolving sector. Congress released a long-awaited AI report recently. (iStock)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 1 Views
  • WWW.FOXNEWS.COM
    AI cameras are giving DC's air defense a major upgrade
    Published December 21, 2024 6:00am EST close AI cameras are giving DC's air defense a major upgrade More than 20 years later, the system is getting a makeover. After 9/11, Washington, D.C.'s airspace got a significant security boost.Now, over two decades later, this system is getting a cutting-edge makeover.The National Capital Region (NCR) is rolling out an advanced artificial intelligence-based visual recognition system that's taking air defense to a whole new level. Advanced artificial intelligence-based visual recognition system. (Katie Lange/DOD)The new eyes in the skyThe Enhanced Regional Situational Awareness (ERSA) system represents a dramatic upgrade from previous security technologies. These new cameras are giving air defense operators unprecedented capabilities in monitoring and protecting critical airspace. They come with some seriously cool features that take air defense to the next level.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The cameras boast infrared vision with RGB filters for heat signature detection, allowing operators to spot targets even in low visibility conditions. A laser range finder provides accurate distance and altitude measurements, enhancing the system's precision. Machine learning elements enable enhanced auto-tracking capabilities, making it easier to follow objects of interest. Additionally, a visual warning system is in place to alert non-compliant aircraft, using red and green lasers to illuminate cockpits and prompt immediate action from pilots. Advanced artificial intelligence-based visual recognition system. (Katie Lange/DOD)The brains behind the operationThe Eastern Air Defense Sector (EADS) in Rome, New York, works in close coordination with the Joint Air Defense Operations Center (JADOC) at Joint Base Anacostia-Bolling to manage the ERSA system. This integrated approach ensures comprehensive surveillance and rapid response to potential threats. Air Force Master Sgt. Kendrick Wilburn, a capabilities and requirements officer at JADOC, explains that the system allows for more precise radar data validation. When uncertain radar data is detected, operators can use the cameras as an additional resource to confirm and assess the situation. This collaborative effort between EADS and JADOC enables swift decision-making and effective threat mitigation.GET FOX BUSINESS ON THE GO BY CLICKING HERE Teleidoscope team with upgraded electro-optical/infrared cameras in 2021. (Defense Innovation Unit)Technological innovationThe ERSA system, developed by Teleidoscope, underwent rigorous testing in 2022, with air defense operators evaluating prototypes from three companies. Teleidoscope's cameras stood out due to their advanced software enhancements and significant improvements over existing systems. The Defense Innovation Unit played a crucial role in securing funding through the Air Force's Accelerate the Procurement and Fielding of Innovative Technologies (APFIT) program, demonstrating a commitment to rapidly deploying cutting-edge defense technology. Marine Corps Maj. Nicholas Ksiazek of the Defense Innovation Unit likened the upgrade to "the technological leap we saw between a 2011 iPhone and a current one," highlighting the substantial advancements in capability. Currently, two operational cameras have been installed, with plans to add seven more annually, ensuring continuous improvement of the NCR's air defense capabilities.Kurt's key takeawaysThe rollout of the ERSA system marks a significant step forward in air defense for the National Capital Region. With AI-powered cameras that enhance detection and tracking capabilities, operators are equipped to respond to potential threats more effectively than ever before. This integration of advanced technology and skilled personnel underscores our commitment to national security, ensuring that Washington, D.C.'s airspace remains safe and secure as we move into the future.CLICK HERE TO GET THE FOX NEWS APPWhat are your thoughts on expanding advanced air defense technologies like the ERSA system to other major cities across the countrydo you believe they would enhance national security, or are there potential drawbacks to consider? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 1 Views
  • WWW.FOXNEWS.COM
    New iPhone auto-restart feature locks encrypted data after extended inactivity
    Tech New iPhone auto-restart feature locks encrypted data after extended inactivity Wiping encryption keys makes it harder for cybercriminals to access sensitive information Published December 20, 2024 10:00am EST close How to factory reset your iPhone A factory reset ensures all your personal data is wiped clean. Your iPhone data just got more secure, thanks to a new feature in iOS 18.1. This update includes an important security measure designed to protect your device and its encrypted data after long periods of inactivity. An iPhone (Kurt "CyberGuy" Knutsson)Whats new?Apple has introduced an Inactivity Reboot feature in iOS 18.1, which automatically reboots your iPhone if it has been idle and unlocked for more than three days. This feature uses the Secure Enclave Processor (SEP) to monitor when your iPhone was last unlocked.If the device stays locked for an extended period, the SEP notifies the kernel, which triggers a reboot and kills the Springboard (the core of iOS). Illustration of lock on data (Kurt "CyberGuy" Knutsson)Why this mattersThe main benefit of the inactivity reboot is better data protection. By forcing a reboot after prolonged idle time, the iPhone essentially wipes encryption keys from memory. Once rebooted, the phone enters an "at rest" state. This makes it nearly impossible for cybercriminals to decrypt the data. Even if the device is left powered on for an extended period, the feature ensures that outdated forensic tools used by cybercriminals won't be able to access sensitive information. iPhones on table (Kurt "CyberGuy" Knutsson)Impact on law enforcementAlthough this new security measure is a big win for privacy, it has raised concerns with law enforcement. Specifically, they are facing more challenges when trying to unlock phones for forensic analysis. However,researcher Jiska Classen points out that three days is still enough time to coordinate steps with analysts to access the device. A police vehicle (Kurt "CyberGuy" Knutsson)How to enable the auto-restart featureTo enable this feature, all you have to do is make sure your iPhone is running iOS 18.1. Heres how to check and update:Go toSettings and tap on itClickGeneralTap onSoftware UpdateClickUpdate Now to download and install iOS 18.1WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Steps to update iPhones software (Kurt "CyberGuy" Knutsson)More ways to keep your iPhone secureWhile the inactivity reboot feature is a valuable security tool, its not a foolproof solution. To further protect your data, consider taking these additional steps:1. Set a strong password:Create strong passwords for your accounts and devices and avoid using the same password for multiple online accounts. Using the same password across multiple platforms will always make you more vulnerable, because if one account gets hacked, they all get hacked. Consider using apassword manager to generate and store complex passwords.2. Have strong antivirus software:The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Back up your iPhone regularly: Backups prevent data loss caused by malicious attacks. It's a crucial step to protect your personal information. Here's how to do it:Go toSettingsTap iCloudClickiCloud BackupTapBack Up Now4. Turn on two-factor authentication (2FA):2FA is an extra shield that will prevent a hacker from getting into your accounts on your iPhone. Here's how to do it:Go toSettingsTap your nameClickSign-In & SecurityTapAdd a Trusted Phone NumberClickContinueAfter adding a trusted phone number, for security, when you sign in to your account on a new device or on the web, you'll need both your password and a section factor, such as a six-digit code sent to your devices or your phone numbers.5. Enable Stolen Device Protection:This feature adds an extra layer of security if your iPhone is stolen by requiring biometric authentication for sensitive actions when you're not in a familiar location. To enable it, follow these steps:Go toSettingsTap onFace ID & Passcode (or Touch ID & Passcode)Enter yourpasscode if promptedScroll down to the section for Stolen Device Protection and tap on Turn On Protection Steps to enable Stolen Device Protection on iPhone (Kurt "CyberGuy" Knutsson)Kurts key takeawaysThe new auto-restart feature is a major step forward in improving iPhone security, offering extra protection against cybercriminals. As security technology continues to evolve, its exciting to think about what future developments might look like.CLICK HERE TO GET THE FOX NEWS APPWhat other security features would you like to see on your iPhone? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:KURT'S HOLIDAY DEALS:Best gifts for: Men | Women | Kids | Teens | Pet loversFor those who love: Cooking | Coffee | Tools | Travel | Wine |Accessories: Car |Kitchen | Laptop | Keyboards | Phone | Travel | Keep It CozyCant go wrong with these: Gift Cards | Money-saving apps | Amazon Black Friday insider tips |Stocking StuffersCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 30 Views
  • WWW.FOXNEWS.COM
    Never need an EV charging station again with these rooftop solar power panels
    Tech Never need an EV charging station again with these rooftop solar power panels A solar charging solution for electric vehicles Published December 20, 2024 6:00am EST close Never need an EV charging station again with these rooftop solar power panels An inventor designed rooftop solar panels for his Tesla Model Y. Have you ever wondered how we could make our cars even greener?Well, meet Omid Sadeghpour, a forward-thinking inventor with a brilliant idea. Hes designed rooftop solar panels specifically for his Tesla Model Y.His project, DartSolar, harnesses solar energy while the car is parked, potentially adding up to 20 extra miles of driving range each day without ever needing to plug in. As he gets ready to roll out the next iteration, Beta2, lets explore what makes this innovation so groundbreaking. Rooftop solar panel system (DartSolar)The concept behind DartSolarElectric vehicles (EVs) often spend significant time parked in open spaces, making them ideal candidates for solar energy collection. Sadeghpour's vision is simple yet effective: why not utilize the sun's energy to charge EVs while they are stationary? This concept forms the foundation of the DartSolar project.DartSolar isnt just about innovation; its also about practicality. Imagine a rooftop solar panel thats aerodynamic, weatherproof, theft-resistant and easy to use. It opens in just 10 seconds with the same effort required to open your car door. These panels are tough, too, built to withstand wind, rain, sand and snow, ensuring reliable performance in all conditions. Rooftop solar panel system (DartSolar)The beta 1 prototypeOmid Sadeghpour's initial prototype, known as Beta 1, was built in collaboration with Jeran Bruce at California's Forged Makerspace. This prototype is designed with nine flexible solar panels, each rated at 175 watts, which can be deployed when the vehicle is parked. The structure is made from wood and features telescoping carbon-fiber tubes that allow for easy expansion and retraction.Weighing in at under 165 pounds, Beta 1 remains within the roof weight capacity of the Tesla Model Y and is designed to fit within a standard U.S. parking space when fully expanded.When fully deployed, Beta 1 can generate approximately 6 kWh of power per day, which translates to about 20 miles of additional driving range. When its time to drive again, the system can be collapsed into a compact rooftop box in under a minute. Rooftop solar panel system (DartSolar)Advancements with beta 2Now, lets talk about the future. Beta 2, the fifth iteration of DartSolar, takes innovation to the next level. This version swaps the wood structure for carbon fiber, cutting its height in half for better aerodynamics. The wattage capacity has also been boosted to a potential 4,000 watts, providing up to 45 miles of range per day under optimal conditions.Heres where things get exciting: Beta 2 introduces dynamic charging capabilities. This means the panels can charge the car while driving or in different configurations, like partially opened for better airflow or fully closed during high-speed travel. With a reduced drag loss of just 1%-2%, its as efficient on the road as it is when parked.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Rooftop solar panel system (DartSolar)Practical applications and future prospectsThe DartSolar system has the potential to serve multiple practical applications. First, it provides a viable charging solution for those venturing into remote areas where charging stations are scarce. Additionally, it acts as a backup energy source during power outages, allowing electric vehicles to remain operational even when traditional charging methods are unavailable.Although the project is currently a DIY initiative and not yet ready for commercial release, Sadeghpour plans to share blueprints and build files on the DartSolar website. This move aims to encourage others to explore similar innovations in solar technology.GET FOX BUSINESS ON THE GO BY CLICKING HERE Rooftop solar panel system (DartSolar)Kurt's key takeawaysDartSolar isnt just about charging cars. Its about rethinking how we use renewable energy in everyday life. As advancements continue with the Beta 2 prototype, Sadeghpour's work has the potential to revolutionize electric vehicle charging and drive sustainability forward. Whether youre commuting, adventuring off-grid or preparing for the unexpected, DartSolar could be the key to driving into a greener future.CLICK HERE TO GET THE FOX NEWS APPWould a system like DartSolar impact your decision to adopt an electric vehicle? Why or why not? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:KURT'S HOLIDAY DEALS:Best gifts for Men | Women | Kids | Teens | Pet loversFor those who love: Cooking | Coffee | Tools | Travel | Wine |Accessories: Car |Kitchen | Laptop | Keyboards | Phone | Travel | Keep It CozyCant go wrong with these: Gift Cards | Money-saving apps | Amazon Black Friday insider tips |Stocking StuffersCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 1 Views
  • WWW.FOXNEWS.COM
    How 1 man got scammed in seconds using Google
    Published December 19, 2024 6:00am EST close How 1 man got scammed in seconds using Google Scammers have become skilled at creating convincing fake websites. Online financial scams have become increasingly sophisticated, targeting unsuspecting individuals through various deceptive techniques. Cybercriminals exploit trust and create convincing scenarios to steal personal and financial information, often using well-known platforms like PayPal as their hunting ground.Take Paul from Massachusetts, for example. He recently wrote to us about his disturbing experience. It serves as a cautionary tale about the dangers of online financial transactions. Here's his account in his own words."I wanted to sign up for PayPal and used Google to get the website. After the 'website' popped up, it asked me for the usual name, address, etc. and my credit card number with the expiration and 3-digit code. Almost immediately, I received a flash message from my credit card company asking if I made a purchase at a company in OKLA. I live in MA and had the card in my lap. The information was stolen, and a purchase was made almost immediately."The credit card company tried to contact where the purchase was made but the telephone number was a fake. The thieves tried a second purchase which was declined as the credit card company closed my account. This all happened in a 10-minute span."Paul, we're sorry to hear that this happened to you. Unfortunately, your experience is not uncommon, but by sharing your story, youre helping others learn how to avoid similar scams. An X over the Google search for PayPal (Kurt "CyberGuy" Knutsson)WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Key takeaways from Paul's experiencePaul's unfortunate encounter with online fraud offers several important lessons. First, scammers have become adept at creating highly convincing fake websites that can easily fool unsuspecting users. These sites often mimic legitimate platforms down to the smallest details, making it crucial to verify the authenticity of any site requesting personal information.Second, fraudulent transactions can occur with alarming speed once scammers obtain sensitive data. In Paul's case, the thieves attempted to make purchases within minutes of acquiring his credit card information.Third, credit card companies have developed sophisticated systems to detect suspicious activity rapidly, which can help mitigate potential losses. Paul's credit card company quickly alerted him to the unauthorized transaction and took swift action to prevent further fraud.Lastly, this incident underscores the critical importance of digital vigilance and careful online navigation. Always take the time to verify the authenticity of websites before entering any personal or financial information, especially when dealing with financial services or online payments. A man typing on his laptop (Kurt "CyberGuy" Knutsson)How to protect yourself from online financial scamsProtecting your financial information online is crucial. Here are some important steps you can take to safeguard yourself against cyber threats:Verify the website's authenticity: Before entering any personal information online, always double-check the URL of the website you're visiting. Look for "https://" at the beginning of the address and a padlock icon in the address bar, which indicates a secure connection. To ensure you're on the correct site, type the web address directly into your browser instead of relying on search engine results or clicking on links from emails.Be wary of unsolicited communications:Legitimate companies will never send unsolicited emails asking for sensitive information. Avoid clicking on links in emails claiming to be from financial institutions, as these could be phishing attempts. Hover over the links to see the actual URL before clicking, as this can help you identify suspicious or misleading addresses. If you're unsure about a communication, log in to your account directly through the official website or app to check for any notifications or requests.GET FOX BUSINESS ON THE GO BY CLICKING HEREThe best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.Use strong authentication methods:Enabletwo-factor authentication on all your financial accounts to add an extra layer of security. Create unique, complex passwords for each of your accounts, avoiding the temptation to reuse passwords across multiple sites. Consider using a reputablepassword manager to help you generate and store strong passwords securely.Monitor your accounts regularly:Make it a habit to check your financial accounts frequently for any unauthorized activities or suspicious transactions. Set up alerts for transactions on your credit cards and online payment accounts so you can be immediately notified of any activity on your accounts.Be cautious with personal information: Never share your passwords or answers to security questions with anyone, no matter how trustworthy they may seem. Be skeptical of any requests for personal information, especially those that create a sense of urgency. Legitimate organizations will not pressure you to provide sensitive data immediately.Use secure payment methods: When making purchases from unknown sellers, use protected payment options that offer buyer protection. Consider using credit cards for online purchases, as they often provide better fraud protection than debit cards. If a website offers multiple payment options, choose the most secure method available.Use caution with public Wi-Fi: Avoid usingpublic Wi-Fi networks for financial transactions, as these can be easily compromised. If you must access financial accounts while away from home, use a secure VPN connection to protect against being tracked and to identify your potential location on websites that you visit.Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. A man typing on his laptop (Kurt "CyberGuy" Knutsson)What to do if you suspect a scam1. Act quickly: If you suspect your information has been compromised, change your passwords immediately.2. Contact the company: Report any suspicious activity to the security team of the affected platform.3. Alert your bank: Notify your bank or credit card company about potential fraudulent activities.4. Use an identity theft protection service:Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best partsof my No. 1 pick is that they have identity theft insurance ofup to $1 million to cover losses and legal fees and a white-glove fraud resolution team where aU.S.-based case manager helps you recover any losses.See my tips and best picks on how to protect yourself from identity theft.5. Report the incident: Forward suspicious emails to the appropriate authorities and delete them from your inbox.6. Monitor your credit: Keep a close eye on your credit reports for any unauthorized activities.Kurt's key takeawaysProtecting your financial information online is more crucial than ever. Paul's experience serves as a stark reminder of how quickly things can go wrong when we let our guard down. By following the guidelines outlined above and remaining vigilant, you can significantly reduce the risk of falling victim to online financial scams. Remember, when it comes to your financial information, it's always better to err on the side of caution. Take the extra time to verify websites, and be skeptical of unsolicited requests for information. Your financial security is worth the effort.CLICK HERE TO GET THE FOX NEWS APPHow do you think the responsibility for online security should be shared between individuals, companies and governments? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 4 Views
  • WWW.FOXNEWS.COM
    Massive data breach at federal credit union exposes 240,000 members
    Tech Massive data breach at federal credit union exposes 240,000 members Find out what information has been compromised and how to stay safe Published December 19, 2024 10:00am EST close 'CyberGuy': This years most devastating data breaches Kurt Knutsson: Data breaches in 2024 exposed info of millions, stressing the need for better cybersecurity. SRP Federal Credit Union, a South Carolina-based financial institution, had a major data breach impacting more than 240,000 people.The credit union handles highly sensitive information of hundreds of thousands of Americans, which is now in the hands of cybercriminals.SRP revealed in a notice that the data breach was part of a two-month attack by hackers, raising concerns about how it took the company so long to detect unauthorized entry into its systems. I discuss the details of the data breach, its impact on people and what you need to do to stay safe. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)What you need to knowSRP Federal Credit Union has reported a data breach that exposed the personal information of more than 240,000 individuals, according to documents filed Friday with regulators inMaine andTexas.The company said it discovered suspicious activity on its network and notified law enforcement. An investigation determined that hackers accessed the credit unions systems between Sept. 5 and Nov. 4, potentially acquiring sensitive files. The investigation concluded on Nov. 22, the company said.SRP did not specify the exact details exposed in its notice to Maine regulators, saying only that names and government-issued identification were affected in the cyberattack.However, in a filing with Texas regulators, the company said names, Social Security numbers, drivers license numbers, dates of birth and financial information, including account numbers and credit or debit card numbers, were compromised. SRP said the breach did not affect its online banking or core processing systems. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)Whos responsible for the breachSRP has not disclosed who was behind the attack or the attackers' motives. However, the ransomware group Nitrogen claimed responsibility last week, alleging it had stolen 650 GB of customer data, according toThe Record. Ransomware attacks use malicious software to block access to a victims files, systems or networks and demand payment to restore access.The credit union could face legal challenges following the data breach, as Oklahoma City-based Murphy Law Firm isinvestigating claims on behalf of individuals whose personal information was exposed. The firm is also encouraging affected individuals to join a potential class-action lawsuit.SRP will provide impacted individuals with free-of-charge identity theft protection services, so take advantage of it to safeguard your information.We reached out to SRP for comment but did not hear back by our deadline.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A person working on their laptop (Kurt "CyberGuy" Knutsson)7 ways you can protect yourself from SRP data breachIf you have received a notice from SRP Federal Credit Union about the data breach, consider taking the following steps to protect yourself.1. Monitor your accounts: Regularly check your bank accounts, credit card statements and other financial accounts for any unauthorized transactions or suspicious activity. Contact one of the three major credit bureaus (Equifax, Experian or TransUnion) to place a fraud alert on your credit report, making it harder for identity thieves to open accounts in your name.2. Freeze your credit: Consider freezing your credit to prevent new accounts from being opened without your consent. This service is free and can be lifted at any time.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Use identity theft protection services: Consider enrolling in identity theft protection services that monitor your personal information and alert you to potential threats. These services can help you detect and respond to identity theft more quickly. Some identity theft protection services also offer insurance and assistance with recovering from identity theft, providing additional peace of mind.See my tips and best picks on how to protect yourself from identity theft.4. Change your passwords: Update passwords for your online accounts, especially those related to banking and email. Use strong, unique passwords and consider using apassword manager to generate and store complex passwords. Also,enable two-factor authentication for added security.5. Beware of phishing scams: Be cautious of emails, texts or calls claiming to be from SRP or related organizations. Avoid clicking on links or providing personal information unless you verify the sender.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Keep your device's operating system updated:Make sure your cellphone and other devices automatically receive timely operating system updates. These updates often include important security patches that protect against new vulnerabilities exploited by hackers. For reference, see my guide onhow to keep all your devices updated.7. Invest in personal data removal services: Consider services that scrub your personal information from public databases. This reduces the chances of your data being exploited in phishing or other cyberattacks after a breach.Check out my top picks for data removal services here.Kurts key takeawayThe SRP Federal Credit Union data breach is a harsh reminder of how vulnerable our sensitive information can be. Over 240,000 individuals had their personal data compromised, including Social Security numbers, drivers licenses and financial details. Even more alarming is the two-month window hackers had to exploit the credit union's systems before being detected. This highlights significant gaps in cybersecurity protocols. If youre an SRP customer, monitor your accounts closely, enable fraud alerts and consider identity theft protection services to stay ahead of potential threats.CLICK HERE TO GET THE FOX NEWS APPDo you think financial institutions should be held more accountable for data breaches like this one? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 4 Views
  • WWW.FOXNEWS.COM
    10 things you should never tell an AI chatbot
    By Kim Komando The Kim Komando Show Published December 19, 2024 7:21pm EST close Would you want to chat with this creepy-looking Lego head powered by AI Dave is the world's most advanced AI Lego robotic head. This is a heartbreaking story out of Florida. Megan Garcia thought her 14-year-old son was spending all his time playing video games. She had no idea he was having abusive, in-depth and sexual conversations with a chatbot powered by the app Character AI.Sewell Setzer III stopped sleeping and his grades tanked. He ultimately committed suicide. Just seconds before his death, Megan says in a lawsuit, the bot told him, "Please come home to me as soon as possible, my love." The boy asked, "What if I told you I could come home right now?" His Character AI bot answered, "Please do, my sweet king."DONT SCAM YOURSELF WITH THE TRICKS HACKERS DONT WANT ME TO SHARE Im giving away a $500 Amazon gift card.Enter here, no purchase necessary.You have to be smartAI bots are owned by tech companies known for exploiting our trusting human nature, and theyre designed using algorithms that drive their profits. There are no guardrails or laws governing what they can and cannot do with the information they gather. A photo illustration of an AI chatbot. (iStock)When youre using a chatbot, its going to know a lot about you when you fire up the app or site. From your IP address, it gathers information about where you live, plus it tracks things youve searched for online and accesses any other permissions youve granted when you signed the chatbots terms and conditions.The best way to protect yourself is to be careful about what info you offer up.Be careful: ChatGPT likes it when you get personalTHIS CRIME SHOT UP 400% HOW TO PROTECT YOURSELF10 things not to say to AIPasswords or login credentials: A major privacy mistake. If someone gets access, they can take over your accounts in seconds.Your name, address or phone number: Chatbots arent designed to handle personally identifiable info. Once shared, you cant control where it ends up or who sees it. Plug in a fake name if you want!Sensitive financial information: Never include bank account numbers, credit card details or other money matters in docs or text you upload. AI tools arent secure vaults treat them like a crowded room.Medical or health data:AI isnt HIPAA-compliant, so redact your name and other identifying info if you ask AI for health advice. Your privacy is worth more than quick answers.Asking for illegal advice: Thats against every bots terms of service. Youll probably get flagged. Plus, you might end up with more trouble than you bargained for.Hate speech or harmful content:This, too, can get you banned. No chatbot is a free pass to spread negativity or harm others.Confidential work or business info: Proprietary data, client details and trade secrets are all no-nos.Security question answers: Sharing them is like opening the front door to all your accounts at once.Explicit content:Keep it PG. Most chatbots filter this stuff, so anything inappropriate could get you banned, too.Other peoples personal info:Uploading this isnt only a breach of trust; its a breach of data protection laws, too. Sharing private info without permission could land you in legal hot water. A person is seen using ChatGPT. (Frank Rumpenhorst/picture alliance via Getty Images)Still relying on Google?Never search for these termsReclaim a (tiny) bit of privacyMost chatbots require you to create an account. If you make one, dont use login options like "Login with Google" or "Connect with Facebook." Use your email address instead to create a truly unique login.TECH TIP: SAVE YOUR MEMORIES BEFORE ITS TOO LATEFYI, with a free ChatGPT or Perplexity account, you can turn off memory features in the app settings that remember everything you type in. For Google Gemini, you need a paid account to do this.Best AI tools for search, productivity, fun and work Google is pictured here. (AP Photo/Don Ryan)No matter what, follow this ruleDont tell a chatbot anything you wouldnt want made public. Trust me, I know its hard.Even I find myself talking to ChatGPT like its a person. I say things like, "You can do better with that answer" or "Thanks for the help!" Its easy to think your bot is a trusted ally, but its definitely not. Its a data-collecting tool like any other.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours orget the free podcast.Daily newsletter:Join 579,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "Kim Komando Today" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.
    0 Comments 0 Shares 4 Views
  • WWW.FOXNEWS.COM
    Half a million patients' personal info stolen in massive health care data breach
    Tech Half a million patients' personal info stolen in massive health care data breach Learn how to protect yourself from risks associated with this data breach Published December 18, 2024 6:00am EST close 'CyberGuy': This years most devastating data breaches Kurt Knutsson: Data breaches in 2024 exposed info of millions, stressing the need for better cybersecurity. Data breaches happen all the time, and while no data breach should be ignored, those involving health care institutions require special attention.These breaches can be very damaging and haunt people for life. Recently, hackers leaked the personal data of around 500,000 Americans.They breached the databases of the Center for Vein Restoration (CVR), which claims to be "Americas largest physician-led vein center," stealing not just personal data but also medical records. A doctor filling out a form (Kurt "CyberGuy" Knutsson)What you need to knowCVR, a clinic headquartered in Maryland, experienced a massive data breach where hackers stole highly sensitive personal information, including lab results and health insurance details, as reported byCybernews. The breach occurred in early October, with the clinic detecting "unusual activity" in its systems on Oct. 6.CVR has more than 110 branches across the country, from Alabama to Alaska. This breach has affected hundreds of thousands of individuals. According to anotice filed by CVR with the U.S. Department of Health and Human Services Office for Civil Rights, more than 445,000 people had their personal information compromised.As the name suggests, CVR specializes in vein restoration, a very specialized procedure aimed at improving the health and function of veins. This means the clinic keeps a very elaborate record of its patients health, and now all that is in the hands of hackers, along with copious amounts of personal information.The full list of exposed data includes addresses, dates of birth, Social Security numbers, drivers license numbers, medical record numbers, diagnoses, lab results, medications, treatment information, health insurance information, provider names, dates of treatment and financial information. The inside of a health care center (Kurt "CyberGuy" Knutsson)The risks associated with the CVR data breachThe risks of data breaches depend on the type of company affected. For instance, breaches involving companies like Ticketmaster are generally more manageable because they often expose information like contact details, addresses and, in some cases, identification documents. Even if financial data is leaked, it can typically be mitigated by replacing or blocking compromised accounts.Health care data breaches, however, are far more severe. When companies like CVR are targeted, hackers gain access to sensitive medical records that cannot be altered. Your medical history is permanent and highly sought after on the dark web. Cybercriminals can use this information to commit identity fraud, such as obtaining prescription drugs through false insurance claims. Plus, detailed knowledge of medical treatments, lab results and medications allows attackers to create highly targeted phishing scams, exploiting victims vulnerabilities with alarming precision.We reached out to CVR for a comment but did not hear back before our deadline.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? An emergency room sign (Kurt "CyberGuy" Knutsson)7 ways to keep yourself safe from such data breaches1. Regularly monitor your financial and medical accounts:Periodically review your medical records and health insurance statements for any unusual or unauthorized activity. This can help you quickly identify and address any discrepancies or fraudulent activities.Use patient portals provided by health care providers to access your medical records online. These portals often have features that allow you to track your medical history and appointments.2. Use strong passwords and two-factor authentication: Create strong, unique passwords for your online accounts, including health care portals. Avoid using easily guessable information like birthdays or common words. Consider using apassword manager to generate and store complex passwords.3. Enabletwo-factor authentication (2FA) wherever possible:2FA adds an extra layer of security by requiring a second form of verification, such as a text message code or authentication app, in addition to your password.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Dont fall for phishing scams; use strong antivirus software: Be mindful of the information you share online and with whom you share it. Avoid providing sensitive personal information, such as Social Security numbers or medical details, unless absolutely necessary. Verify the legitimacy of any requests for personal information. Scammers often pose as health care providers or insurance companies to trick you into revealing sensitive data by asking you to click on links in emails or messages.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Use identity theft protection services: Consider enrolling in identity theft protection services that monitor your personal information and alert you to potential threats. These services can help you detect and respond to identity theft more quickly. Some identity theft protection services also offer insurance and assistance with recovering from identity theft, providing additional peace of mind.See my tips and best picks on how to protect yourself from identity theft.6. Freeze your credit:A credit freeze prevents anyone from opening new credit accounts in your name without your authorization, reducing the risk of identity theft. Contact the major credit bureaus (Experian, Equifax and TransUnion) to request a credit freeze. This is often free and can be temporarily lifted when you need to apply for credit.7. Remove your personal data from the internet: After being part of a data breach, it's crucial to minimize your online presence to reduce the risk of future scams. Consider using a personal data removal service that can help you delete your information from various websites and data brokers. This can greatly diminish the chances of your data being used maliciously.Check out my top picks for data removal services here.Kurts key takeawayThe CVR data breach is deeply troubling, affecting nearly half a million individuals and exposing highly sensitive medical and personal information. What makes this breach particularly concerning is the lasting impact health care data leaks can have on victims, from identity theft to targeted phishing scams. Whether or not youve been directly affected, its a stark reminder to take proactive steps, such as monitoring your accounts, enabling multifactor authentication and staying alert to phishing attempts.CLICK HERE TO GET THE FOX NEWS APPDo you think companies are doing enough to protect sensitive data, especially in health care? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 3 Views
  • WWW.FOXNEWS.COM
    From CAPTCHA to catastrophe: How fake verification pages are spreading malware
    Tech From CAPTCHA to catastrophe: How fake verification pages are spreading malware Learn how you can protect yourself from fake verification pages Published December 18, 2024 10:00am EST close From CAPTCHA to catastrophe: How fake verification pages are spreading malware Hackers are using CAPTCHAs to infect your PC with malware. When you visit a webpage, you might see a CAPTCHA to make sure youre a real person and not a bot. These usually involve jumbled words, some recognizable images or just a box that says, "I am not a robot."CAPTCHAs are harmless, but hackers are now using them to infect your PC with malware.Security researchers have found a huge fake CAPTCHA campaign spreading the dangerous Lumma info-stealer malware, which can bypass security measures like Safe Browsing.This campaign shows how malvertising works, with more than a million ad impressions every day and thousands of victims losing their accounts and money through a network of more than 3,000 sites. Ill break down how this scam works, whos responsible and how you can protect yourself. Illustration of a scammer (Kurt "CyberGuy" Knutsson)How does the scam work?As reportedby Guardio, the fake CAPTCHA scam is a sophisticated malvertising campaign that lures you into unknowingly installing malware under the guise of routine CAPTCHA verification. The cyberattack starts when youre browsing websites, often those offering free streaming, downloads or pirated content. These sites are used by hackers to present you with what appears to be a legitimate CAPTCHA verification page.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The page mimics a real CAPTCHA, asking you to confirm you are human. However, the instructions are designed to trick you into initiating harmful actions, like triggering the Windows "Run" dialog. Users unknowingly paste and execute a crafted PowerShell command, which silently installs the Lumma info-stealer malware onto their system.The malware targets sensitive data, including social media accounts, banking credentials, saved passwords and personal files, potentially leading to financial and identity theft. Illustration of fake CAPTCHA (Guardio)Whos to blame for this?The fake CAPTCHA scam shows how messy the internets ad system has become, with everyone involved passing the buck. Guardio Labs points to ad networks like Monetag as a big part of the problem. They distribute malicious ads that are disguised during moderation using tricks like cloaking. Publishers, especially those offering free or pirated content, add to the issue by running these shady ads on their sites, often without checking what theyre actually showing users.Then there are services like BeMob, which lets scammers hide their bad links behind harmless-looking URLs. These companies call themselves analytics tools, but theyre helping the scams stay hidden. Hosting providers dont escape blame either. Theyre where these fake CAPTCHA pages live, and they often dont bother to check whats being hosted.Of course, the scammers themselves are the ones pulling the strings. But because they spread their operations across so many platforms, theyre almost impossible to track down. Guardios research shows how all these moving parts work together, creating a system where no one takes responsibility, and the scams keep running.GET FOX BUSINESS ON THE GO BY CLICKING HERE Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)6 ways to stay safe from fake CAPTCHAs1. Use reliable security software:Keeping your antivirus and anti-malware software up to date is one of the most effective ways to protect yourself from fake CAPTCHA scams. A strong antivirus software will detect and block malware like the Lumma info-stealer before it can infect your device.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Enable browser protection features:Modern browsers offer built-in security features, such as Safe Browsing and phishing protection, which warn you about potentially dangerous sites. Make sure these features are enabled in your browser settings. These tools can alert you to malicious links or fake CAPTCHAs trying to trick you into downloading malware.3. Be cautious with "free" content:Theres a saying that goes, "If something is free, youre what they are selling." Websites that offer free downloads, streaming services or pirated content are often associated with malvertising campaigns. Fake CAPTCHA scams are commonly spread through these types of sites, where users are tricked into clicking on malicious ads or links. Even if a site seems tempting, its important to be cautious. Avoid clicking on suspicious links or using "free" services, as they could be traps designed to infect your device with malware.4. Avoid clicking on suspicious ads:Always be wary of ads that appear out of nowhere or seem too good to be true. Fake CAPTCHA scams often disguise themselves as legitimate ads, asking you to click to verify you're human. Never interact with pop-up ads or unfamiliar banners, especially those that claim to give you something for free, as they may lead to malicious pages or trigger malware downloads.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.5. Check for HTTPS and look for signs of a legitimate site:Before entering any personal information or interacting with a CAPTCHA, ensure that the website is secure. Look for "https://" in the websites URL, which indicates the connection is encrypted. Legitimate websites also tend to have a professional appearance, so if something feels off or the design looks poor, trust your instincts and leave the site.6. Enable two-factor authentication:Two-factor authentication adds an extra layer of security, making it harder for attackers to access your accounts.Kurts key takeawayTheres no question that fake CAPTCHA scams are a growing threat, putting millions of us at risk of malware infections and financial loss. Whats even more concerning is that ad networks, publishers and hosting services continue to allow malicious campaigns to spread through their platforms despite the widespread awareness of the problem. The companies involved must take immediate action to improve content moderation, tighten security measures and prevent these scams from thriving. We are seeing a dangerous loophole in the digital advertising ecosystem that could have serious consequences for internet users.CLICK HERE TO GET THE FOX NEWS APPDo you think ad networks and publishers should be held accountable for the spread of malware through their platforms? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 3 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: OpenAI responds to Elon Musk's lawsuit
    By Fox News Staff Fox News Published December 18, 2024 11:59am EST close 'Real issue' with drone sightings is the greater need for government 'transparency': tech CEO, Dem strategist Raj Goyle, CEO of intelligence firm Bodhala and former Democratic Kansas state representative, told Fox News Digital it is encouraging to see members of both parties come together to try and determine the source of these drones. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- OpenAI hits back at Elon Musk lawsuit, says he suggested for-profit entity- OpenAI CEO Sam Altman to donate $1 million to Trump's inaugural fund- House AI task force says 'unreasonable' to expect immediate congressional action on AI in 250-page report SpaceX and Tesla founder Elon Musk speaks during an America PAC town hall on October 26, 2024, in Lancaster, Pennsylvania. (Samuel Corum/Getty Images)AI WARS: OpenAI is pushing back against Elon Musk's latest attempt to rework his lawsuit against theartificial intelligence giant that seeks to prevent the company from moving to a for-profit structure, noting in a blog post and legal filing that Musk had argued for it to do so years ago.AGE OF AI : OpenAI CEO Sam Altman is joining the list of U.S. tech titans donating to President-elect Trump's inaugural fund, a spokesperson exclusively told Fox News Digital. (The House task force on AI released a 253-page report. (Getty Images))ARTIFICIAL INTELLIGENCE: The House task force on artificial intelligence is urging the U.S. government to aim for "a flexible sectoral regulatory framework" for the technology in a nearly 300-page report released Tuesday morning.MAC MALWARE MESS: Artificial intelligence is making life easier not just for us but also for cybercriminals. It is enabling them to create elaborate campaigns to deceive people, efforts that would otherwise take months. Security researchers have discovered a new info stealer malware that masquerades as video-calling software. Hackers have built a whole website and set up companies using AI to make the malware appear harmless. Cybercriminals are using AI to deceive internet users. (Kurt "CyberGuy" Knutsson)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 3 Views
  • WWW.FOXNEWS.COM
    Using VPNs without messing up your banking apps
    Published December 17, 2024 6:00am EST close 'CyberGuy': Using VPNs without messing up your banking apps Tech expert Kurt Knutsson says a VPN enhances online banking security by encrypting data and protecting privacy. Using a virtual private network (VPN) can significantly enhance your online security, especially when accessing sensitive information like banking apps. However, it can also lead to complications, such as being blocked from accessing your bank's services.Melissa from Dallas wrote to us asking, "How can I use a VPN without getting locked out of my banking app? It's very frustrating, and I worry about my security when I have to turn off the VPN. Are there any specific tips to ensure I stay both secure and connected?"Melissa, we totally understand how that can be aggravating.We'll guide you through the steps to use VPNs effectively while ensuring your banking activities remain secure and accessible. A woman logging onto her VPN on her laptop (Kurt "CyberGuy" Knutsson)What is a VPN?A VPN encrypts your internet traffic and reroutes it through a server in a different location than your own. VPNs make it appear that you are connecting to the internet from whichever location the server is hosted in rather than your actual location.When you first connect to a network using a VPN, your device will establish a secure connection with the VPN server and your device's IP address will appear as the VPN server, meaning that only your internet service provider will see that you're connecting to a VPN server. Normally, when you connect to a website, the website or any online services you visit can see your device's technical information, including location-sensitive data such as IP addresses. A VPN on a laptop (Kurt "CyberGuy" Knutsson)Understanding VPNs and their benefitsA VPN creates a secure tunnel between your device and the internet, encrypting your data to protect it from prying eyes. The three key benefits of using a VPN for online banking include:1) Enhanced security: Encrypts your connection, making it difficult for hackers to intercept sensitive information.2) Privacy protection: Masks your IP address, helping you maintain anonymity while browsing.3) Access to geo-restricted content: Allows you to access banking services when traveling abroad. Illustration of how you can use a VPN worldwide (Kurt "CyberGuy" Knutsson)Steps to use a VPN safely with banking apps1) Choose the right VPNSelect a reputable VPN service that prioritizes security and privacy. Look for features such as:Military-grade encryption (256-bit AES)No-logs policy to ensure your activities are not tracked.Kill-switch functionality to prevent data leaks if the VPN connection drops.Servers in your home country to avoid triggering alerts from your bank2) Install the VPN softwareDownload and install the VPN application on your device. Most VPN services offer user-friendly interfaces compatible with various operating systems, including Windows, macOS, Android and iOS.3) Connect to a serverBefore accessing your banking app:Launch the VPN application.Connect to a server located in your home country. This helps prevent your bank from flagging your access as suspicious.4) Log into your banking appOnce connected:Open your banking app or website.Log in as you normally would. If you encounter issues, consider clearing browser cookies or switching servers within the VPN.5) Monitor for any issuesIf you experience difficulties logging in:Disable the VPN temporarily and try accessing the app again.Change the VPN city/location to match the city where you live or are currently located.When traveling, be sure to change the VPN to the city where you live to avoid issues.Contact customer support for both your bank and the VPN provider if problems persist. A woman logging onto her VPN on her tablet (Kurt "CyberGuy" Knutsson)What to do when your VPN gets blocked by your bankNow, some websites, especially banking sites, might get a little suspicious when they see you're using a VPN. They might even block you out. So, what do you do if your bank's website won't let you in with your VPN on? Don't panic. Here are a few quick fixes:Try contacting your bank's customer support. They might have a solution or be able to white-list your VPN, which basically means allowing your connection to bypass security blocks.Change theVPN city/location to match the city where you live or are currently located.If all else fails, you can always temporarily disable your VPN when accessing your banking app. Just remember to turn it back on when you're done.Now, you might be wondering, "Is it safe to turn off my VPN for banking?" Well, as long as you're on a secure, private network (notpublic Wi-Fi), you should be OK. Just make sure to enable it again as soon as you're done. Remember, while VPNs can sometimes be a bit of a hassle, the privacy and security they provide are totally worth it.Choosing the right VPN for banking security and safety tipsSecuring your financial information with reliable VPN services and following these practical safety tips are important.1) Choose a reliable VPN:Select a reputable VPN service with strong encryption protocols..2) Always use VPN on public Wi-Fi:Never access financial accounts on public networks without activating your VPN first.3) Enable two-factor authentication (2FA): Add an extra layer of security to your accounts byenabling 2FA.4) Use strong, unique passwords:Create complex passwords for each of your accounts and consider using a password manager. Consider using apassword manager to generate and store complex passwords.5) Regularly monitor your accounts: Check your retirement accounts frequently for any suspicious activity.6) Keep software updated: Ensure your devices and apps are alwaysup to date with the latest security patches.7) Be wary of phishing attempts: Don't click on suspicious links or provide personal information in response to unsolicited emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.Pro tip:Use split tunneling:This feature allows you to route only specific traffic through the VPN while keeping other traffic on a regular connection. It can be beneficial for banking apps while allowing general browsing without interference.Kurt's key takeawaysUsing a VPN can significantly enhance your online banking security by encrypting sensitive data and providing privacy protection. However, it's essential to choose a reliable service and connect appropriately to avoid access issues with banking apps. By following the outlined steps and tips, you can enjoy the benefits of a VPN without compromising your ability to manage your finances securely. Always stay vigilant about potential security threats and maintain good online habits for optimal safety while banking online.Are there any misconceptions about VPNs and online banking that youd like clarified?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 4 Views
  • WWW.FOXNEWS.COM
    Steps to protect yourself while shopping on your phone this holiday season
    Published December 17, 2024 10:00am EST close Holiday shopping fraud expected to increase due to AI The busy holiday shopping season is just around the corner and most of us will be targeted by an AI scam. The holiday season is the best time of the year. Many of us spend quality time with our families, enjoy delicious food and even go on vacations. For many, its also a time to indulge in shopping. And why not? This is when you find the best deals on your favorite products, whether its a new electronic gadget or a household essential.However, the holiday season also comes with an increased risk of mobile fraud while shopping online. Scammers often target online shoppers in more ways than you might imagine. Fortunately, with some awareness and precautions, you can protect yourself. Below, Ill discuss the rise in mobile shopping scams and how you can stay safe. A woman shopping on her smartphone (Kurt "CyberGuy" Knutsson)The rise in mobile fraudAccording toAppdome's latest U.S. Consumer Survey, 60.6% of Americans say fraud is their biggest concern. More than 40% of global consumers reported that they or someone close to them had been directly affected by mobile fraud, malware or a cyberattack. With mobile apps now being the main way people interact with brands, skepticism among users is growing. In fact, 24% of consumers believe developers dont care about app security, a massive jump of 258% since 2021.Social engineering has become a major worry, as people are becoming more aware of the many ways mobile fraud can happen. This includes things like location spoofing, scams that manipulate users and account takeovers. Almost half of the survey respondents this year said they or someone they know personally had dealt with fraud, scams or similar issues.Such scams also affect your online shopping experience. I spoke with Tom Tovar, CEO of Appdome, regarding what consumers need to know when they are shopping on their mobile devices this holiday season."Consumers should be aware of phishing, smishing and vishing scams, which exploit fake emails, deceptive SMS messages and fraudulent phone calls to steal sensitive information. More sophisticated threats include FaceID bypass attacks, such as those carried out by the GoldPickaxe malware, which uses AI-enhanced techniques to bypass biometric authentication,"Tovar said."Other significant risks include banking trojans, which infiltrate apps to steal login credentials or financial data, and accessibility malware, which exploits device accessibility features to take control of mobile interactions. The rise of these sophisticated threats highlights the need for robust in-app security." A woman shopping on her smartphone (Kurt "CyberGuy" Knutsson)4 steps to take to protect yourself while shopping on your phoneShopping scams are becoming harder to detect, but its easy to stay ahead of them. Here are some steps you can take to protect yourself while shopping on your phone.1) Shop on a safe mobile appThis might seem obvious, but sticking to trusted apps can help keep you safe while shopping. By trusted apps, I mean platforms like Amazon, eBay and Walmart."With the growing sophistication of mobile threats, its becoming increasingly challenging for consumers to identify risks independently. Threats like phishing, accessibility malware and banking trojans are designed to mimic legitimate functions, making them nearly impossible to detect at a glance. Instead of relying solely on spotting issues, consumers should look for apps that clearly communicate their commitment to security through visible privacy policies, transparent security practices and updates addressing new threats. Choosing apps from trusted sources and reading user reviews can also provide reassurance,"Tovar said.2) Watch out for phishing, smishing and vishing scamsWhen shopping on your phone, be cautious ofphishing, smishing andvishing scams, as they are common tactics used to steal your personal and financial information. Phishing involves fake emails that look like they are from trusted retailers, tricking you into sharing sensitive details like passwords or payment information. Smishing is a similar tactic but delivered through text messages, often containing links to fake websites or malicious downloads.Vishing, on the other hand, involves scammers making phone calls pretending to be customer service representatives from well-known brands, attempting to gain access to your private information. Always verify the authenticity of emails, texts or calls before clicking links or sharing details to ensure a safe shopping experience.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.3) Be cautious about the permissions you grant to appsWhen shopping online on your phone, it's important to be careful about the permissions you give to apps. A lot of apps may ask for access to things like your camera, contacts or location, even if it's not necessary for the shopping experience. Always think twice before granting these permissions."These permissions are often abused by malware to collect sensitive data or perform unauthorized actions. Before granting permissions, consider whether they align with the apps purpose. Developers can mitigate these risks by incorporating protections from Appdomes anti-fraud offering, which protects against the many abuse methods used by malicious actors to abuse mobile app permissions," Tovar said. A woman shopping on her smartphone (Kurt "CyberGuy" Knutsson)4) Protect your financial informationProtecting financial information is crucial, especially when shopping online. It's important to use secure websites, indicated by "https" in the URL, and avoid saving payment details in apps or on websites unless they are trustworthy.While consumers should stay vigilant by using trusted apps, downloading only from official app stores and monitoring for suspicious activity theres only so much they can do, Tovar said."The sophistication of modern threats often makes it impossible for users to identify or prevent all risks on their own," he said. "Consumers have a better chance of keeping their personal information secure by choosing brands that prioritize security and back it up with tangible actions, such as automating robust protections and delivering proactive, built-in security measures."Kurts key takeawayThe holiday season is a prime time for shopping and, unfortunately, for scams. As mobile shopping continues to grow, threats like AI-driven scams and advanced malware are expected to increase. However, you can keep yourself safe by staying informed about potential threats, choosing apps with robust security measures and practicing good mobile hygiene. It's also the responsibility of app developers to ensure users dont fall prey to scammers.Do you think app developers are doing enough to keep people safe from scams? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 4 Views
  • WWW.FOXNEWS.COM
    How to factory reset your Android
    close 'CyberGuy': How to factory reset your Android Tech expert Kurt Knutsson reveals how to securely back up and factory reset your Android to protect your privacy and data. Want to know how to factory reset your Android phone? Before handing over your old device, it's important to remove all traces of your personal information. This not only protects your privacy but also ensures the new owner receives a device in its original state, free from any of your custom settings or data. I've got you covered with a step-by-step guide to help you through the process, ensuring you don't miss a thing. Let's walk through it together. If you want to factory reset your iPhone, we'll take you through thesteps here. Android phone (Kurt "CyberGuy" Knutsson)How to back up your AndroidBefore we dive in, remember this golden rule: back up your data. A factory reset wipes everything clean, so let's make sure your precious memories and important files are safe and sound.Settings may vary depending on your Android phones manufacturer.Open theSettings appon your Android phoneTap onGoogleSelectManage backupToggle on where it saysBack up now Steps to back up your Android phone (Kurt "CyberGuy" Knutsson)Pro tip: You should charge your device to at least 70% before starting; you don't want your phone dying mid-reset.How to factory reset your AndroidAll right, let's get down to business. Here's how to factory reset your Android:Settings may vary depending on your Android phones manufacturer.From your Android's home screen, find and tap the Settings appScroll down and tapAdditional Settings (on some devices, this might be System orGeneral Management)TapBackup and Reset (or Reset on some models)Select Erase All Data (orFactory data reset)Scroll down and tapReset again to confirmYou may then be asked to enter yourcurrent PIN.You'll see a warning that this willdelete all your personal information and downloaded apps will be erased and can't be recovered.TapErase Data orDelete all to begin the process Steps to factory reset your Android phone (Kurt "CyberGuy" Knutsson)Your phone will restart and begin the reset, which might take a few minutes. Once it's done, you'll see the initial setup screen, just like when your phone was brand new. Also, after a factory reset, you may need to sign in with the Google account previously linked to the device for security purposes.How to factory reset your Android using Recovery ModeOK, lets say you want to factory reset your Android, but your phone is unresponsive, or you cannot access the settings. You can use "Recovery Mode."Settings may vary depending on your Android phones manufacturer.Start bypowering off your device completelyThen enter recovery mode by pressing and holding the volume up, home andpower buttons simultaneously (or justvolume up and power for some models) until you see the Android logo. Steps to factory reset your Android using Recovery Mode (Kurt "CyberGuy" Knutsson)Use thevolume buttons to scroll to Wipe Data or Perform a factory reset, then press thepower button to select it.Confirm the reset by selecting Yesdelete all user data, then confirm with thepower button.After the reset is complete, selectReboot system now. Steps to factory reset your Android using Recovery Mode (Kurt "CyberGuy" Knutsson)There you have it. By following these steps, you can successfully perform a factory reset on any Android device, ensuring a fresh start or preparing it for a new user. Once your device is clean, check out "Best ways to get rid of your old phone or tablet" for various options like trading it in for credit, donating to charity or recycling through certified e-waste programs.Kurt's key takeawaysFactory resetting your Android prepares your device for a new user or just starting fresh. Remember, it's a drastic measure that erases everything, so always back up your data first. Whether you're troubleshooting, starting fresh or passing your device on, now you've got the knowledge to do it right.Have you faced any challenges with data security, and how did you overcome them? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 6 Views
  • WWW.FOXNEWS.COM
    6 sneaky scams that could ruin your holiday season
    Published December 16, 2024 10:00am EST close CEO reveals top tips for avoiding scams this holiday giving season Avoid scammers and know who are donating to this giving season. Mary Hagen, a professional fundraiser and CEO of Colossal, is sharing her top three tips for supporting charitable organizations this holiday. The holiday season is a time filled with joy, festivities and cherished moments with family and friends. However, amidst the hustle and bustle of shopping, cooking and celebrating, it's easy to overlook a lurking danger: scams. Scammers thrive during this busy time, preying on our excitement and stress to trick us into revealing personal information or losing money. We're going to discuss six sneaky scams that could ruin your holiday spirit and provide you with essential tips on how to protect yourself from these deceptive tactics. Scam alert illustration (Kurt "CyberGuy" Knutsson)1) Package delivery scamWith the holiday season in full swing, the end-of-year sales have begun, and you probably have already started your holiday shopping and are expecting packages coming via different types of delivery services like FedEx, UPS or USPS. So, if you receive a text that mentions a package delivery, you may be likely to easily fall for a scam. I was expecting a package recently and received this text out of the blue (see image). Fake package delivery scam text (Kurt "CyberGuy" Knutsson)Even though the text says the sender is not in my contact list and that it may be junk, I almost clicked the link because I was so focused on the fact that there may have been a typo in my delivery address. But once I looked a little closer, there were a few red flags in this text message that tipped me off to it being a scam.First, the link does not lead you to usps.com. It's a fake link that scammers hope you won't notice.Notice it is uspsts.top and notusps.com. This is a common scam going around called typosquatting wherein a scammer uses a domain that looks close to a real website. Next, the text says "pls," which is lingo for "please" that you likely wouldn't see in correspondence from the USPS. Scammers often make typos or use poor grammar when communicating, so always double-check.Scammers are sending emails, texts and even occasionally there could be a phone call that is regarding an issue with package delivery. It may be something like this text I received that has a link where they'll end up asking for information, or you may be asked to pay a "shipping fee" to get your package.Be sure to always have strongantivirus software running on your devices to prevent any disasters from happening if you were to click on a malicious link.See my expert review of the best antivirus protection for your Windows, Mac, Android and iOS devices.How to avoid package delivery scamsIf you are expecting a package, and you're wondering if you've received real information or not about it, the best way to check is to go to the original confirmation you received about shipping. You most likely received an email regarding your package, and if you go to that email to get your order number, you should be able to look up the status of your order directly on any website. A woman shopping on her laptop (Kurt "CyberGuy" Knutsson)2) Charity scamsSadly, charity scams aren't new, but they are way more prevalent during the holiday season since scammers are hoping you're feeling more generous during this time of year. Sometimes, scammers may create fake names of organizations to get you to donate money, or they may reach out to you via phone/email/text posing as someone working for a legitimate charity. Social media has also become a popular place for charities to market themselves and reach more eyes in hopes of donations, so scammers may try to pose as fake charities. These schemes will try to appeal to your emotions during this season, so be sure to check where you donate your money so you don't fall for a scam.How to avoid charity scamsNever give your money to anyone immediately who approaches you or reaches out on behalf of any organization without doing your own independent research. Either do a little googling or check with a family member to see if it's real, and if it is, you should be able to donate to an official website or an official address. You can always mention this to anyone who asks you to donate somewhere. Don't fall into the pressure of donating right then and there. Also, always double-check the name of an organization. Sometimes (especially online), scammers will alter the name of a known organization slightly to trick you into donating.3)Social media gift exchange scamTheBetter Business Bureau is warning about a gift exchange scam with a new twist, which has been occurring during recent holiday seasons. It's an online version of the popular "Secret Santa" gift exchange. However, the BBB says these social media-driven gift exchanges are actually pyramid schemes, and you will most likely be disappointed if you participate.In the past few years, variations of the gift exchange have popped up, with someone asking you to select a random person and send them a gift to pay it forward. Another asks you to exchange bottles of wine with someone else, and while it seems fun and light-hearted, you don't know who is on the receiving end.How to avoid social media gift exchange scamsIt may sound nice to send a holiday gift to a stranger in turn for receiving multiple gifts yourself, but you're never going to receive many (if any) gifts at all.Don't participate in gift exchanges with anyone you don't know, or you won't be able to guarantee you'll actually be gifting someone who isn't a scammer.4) Gift card scamsGift card scams are another popular method that has been rising in popularity recently, but it's especially important to watch out for the possibilities, since you may be purchasing gift cards for friends or family for the holidays. Scammers often steal gift cards and use the information before they make it look like they didn't. They have a number of methods for tricking you using gift cards, so if you can send an online one (so that you can ensure you've purchased it on a legitimate, official website), that would be a much safer alternative.How to avoid gift card scamsIf you're getting anyone a gift card and buying it in person, be sure to check that the package hasn't been tampered with. Double-check that nothing on the packaging looks suspicious since scammers will try to make it seem like the package was sealed, but they will already have used the gift card, so you're essentially buying a useless piece of plastic. Illustration of a gift card (Kurt "CyberGuy" Knutsson)5) Home Depot email confirmation scamScammers are capitalizing on the festive spirit with a deceptive email campaign targeting people at this time of year.This scam involves a deceptive email that appears to be from Home Depot with such wording as "Confirmation needed: please confirm receipt." The email body typically contains enticing text like "Congratulations! The Home Depot - You are our winner!" along with a customer number and a blue circle that says, "Check if you won." Who couldn't use a little extra cheer or perhaps a holiday prize from Home Depot this season?The problem is this is a scam, and the goal of this scam is to lure you into clicking on an embedded link, which can lead to various malicious outcomes. These include phishing for personal and financial information, installing malware on your device, redirecting to a fake website that resembles Home Depot's or prompting you to pay a "delivery fee" for a non-existent prize.How to avoid Home Depot email scamsTo protect yourself from this and similar scams, scrutinize the sender's email address for any discrepancies. Hover over links without clicking to reveal their true destination. Be wary of unexpected "winnings" or requests for confirmation. If you receive an email that raises suspicion, contact Home Depot directly through their official website or customer service number to verify its legitimacy. Finally, remember that legitimate companies will not ask you to confirm sensitive information via email or require you to click on links to claim prizes. Fake Home Depot winning email (Kurt "CyberGuy" Knutsson)6) Fake online shopping sites scamOne of the most common scams during the holiday season is the fake online shopping site scam. Scammers create websites that look like legitimate online stores but are actually designed to steal your personal and financial information. They may offer products at very low prices or claim to have limited-time deals or exclusive items. They may also send youphishing emails or text messages with links to these fake sites. A woman shopping on her laptop (Kurt "CyberGuy" Knutsson)Some signs of a fake online shopping site are:The website address does not match the name of the store or brand.The website has poor design and/or spelling and grammar errors.The website does not have a secure connection(https) or a padlock icon in the address bar.The website asks for too much personal information, such as your Social Security number or bank account details.The website does not have a clear return policy, contact information or customer reviews.How to avoid falling victim to this scamBy following a few simple precautions, you can significantly reduce your risk of falling prey to online scams and ensure a safer shopping experience.1) Shop only from trusted and reputable online stores that you know and have used before.2) Check the website address carefully and look for any red flags.3) Do some research on the online store before making a purchase. Read customer reviews, look for ratings or search for complaints online.4) Use a credit card or a secure payment service like PayPal when shopping online. Do not use debit cards, wire transfers or gift cards.5) Keep track of your online purchases and monitor your bank statements for any unauthorized charges.6) Use strong antivirus protection software. An effective antivirus software is a must-have. The best way to protect yourself from clicking on any malicious links on fake websites or in phishing emails and text messages is to haveantivirus protection installed and actively running on all your devices.Its the best to help stop and alert you of any malware in your system and ultimately protect you from being hacked.See my expert review of the best antivirus protection for your Windows, Mac, Android and iOS devices.7) Use a personal data removal service. Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams during the busy holiday season.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.I've been scammed! What to do next?Below are some next steps if you find you or your loved one is a victim of identity theft.1) If you can regain control of your accounts, change your passwords and inform the account provider2) Look through bank statements and checking account transactions to see where outlier activity started3)Use an identity theft protection service:Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using some services is that they might include identity theft insurance ofup to $1 million to cover losses and legal fees and a white-glove fraud resolution team where aU.S.-based case manager helps you recover any losses.See my tips and best picks on how to protect yourself from identity theft.4)Report any breaches to official government agencies like the Federal Communications Commission.5) Get the professional advice of a lawyerBefore speaking to law enforcement, especially when you are dealing with criminal identity theftIf being a victim of criminal identity theft leaves you unable to secure employment or housing6)Alert all three major credit bureaus and possibly place a fraud alert on your credit report.7) Run your own background check or request a copy of one if that is how you discovered your information has been used by a criminal.If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.Kurt's key takeawaysAs we dive into the holiday season, lets keep our guard up against those sneaky scams that could spoil our celebrations. Remember to stay vigilant while shopping online or responding to unexpected messages. A little caution can go a long way in ensuring that your holidays remain joyful and stress-free. So, enjoy the festivities, cherish the moments with loved ones, and keep these tips in mind to outsmart the scammers.What are some of your personal experiences with holiday scams, and how did you protect yourself from them? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 5 Views
  • WWW.FOXNEWS.COM
    How to delete multiple emails at once on Android
    Published December 15, 2024 6:00am EST close How to delete multiple emails at once on Android Cutting through the digital clutter Are you drowning in a sea of unread emails?Lets cut through the digital clutter and help you delete multiple emails on your Android device at once. Before we get to the steps, there are some important things to consider. First, always ensure youre not deleting important emails. Second, you'll need to back up important emails.Also, be aware that some email apps require you to delete emails in each folder separately. Finally, remember that some apps have different methods for bulk deletion.So, well cover the most common techniques. OK, let's get started. Image of an Android on a desk (Kurt "CyberGuy" Knutsson)How to back up important emails on your AndroidTo back up important emails on an Android device, follow these steps:Settings may vary depending on your Android phones manufacturerOpen theSettings app on your Android device.Select"Accounts and backup."Click"Back up data."Tap"Back up now" to start the backup process.Sign in to your Google account if prompted.This will ensure your important emails and other data are safely backed up to your Google account. Steps to back up important emails on your Android (Kurt "CyberGuy" Knutsson)How to delete multiple emails at once on AndroidWant to clear out those pesky emails all at once? Here's how:Settings may vary depending on your Android phones manufacturerLaunch the email app on your Android deviceOnce you're in your inbox, tap and hold on to any email to activate the selection mode.Checkboxes will appear next to each email.Tap theempty circles to choose multiple emails you want to delete.Once you've selected the desired emails, tap the"delete" or"trash can" icon at the bottom of the screen.Confirm your decision by clicking"Move to trash." Steps to delete multiple emails at once on Android (Kurt "CyberGuy" Knutsson)How to bulk delete emails on AndroidSettings may vary depending on your Android phones manufacturerLaunch the email app on your Android deviceLong press on anemail you want to delete.Tap theAll option in the upper left corner.Hit the trash can or where it saysDelete all at the bottom of your screen and watch those emails disappear in bulk. Steps to bulk delete emails on Android (Kurt "CyberGuy" Knutsson)How to delete sender-specific emailsDo you want to target emails from a specific sender? Here's a smart hack:Settings may vary depending on your Android phones manufacturerLaunch the email app on your Android deviceUse thesearch function to find all emails from that senderLong press on anemail you want to delete or clickSelect allTap the trash can icon where it says Delete all at the bottom of the screenGET FOX BUSINESS ON THE GO BY CLICKING HERE Steps to delete sender-specific emails (Kurt "CyberGuy" Knutsson)How to delete multiple emails using the Gmail appSettings may vary depending on your Android phones manufacturerOpen theGmail appTap thesender image to start selecting the emails you want to deleteManually select eachemailyou'd like to delete or clickSelect allTap the trash can icon in the upper right of the screen. Steps to delete multiple emails using the Gmail app (Kurt "CyberGuy" Knutsson)Kurts key takeawaysDealing with an overflowing inbox doesn't have to be daunting. By following these steps, you'll be able to efficiently manage your emails and keep your Android device clutter-free. Remember to always back up important emails before you start deleting them, and stay mindful of the different methods for bulk deletion across various email apps. Clearing out those unread emails can make a world of difference in staying organized and reducing digital stress.CLICK HERE TO GET THE FOX NEWS APPWhat features do you wish your email app had to make your life easier? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 5 Views
  • WWW.FOXNEWS.COM
    AI-powered deception: The sneaky macOS malware masquerading as your next video call
    Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. Artificial intelligence (AI) is making life easier not just for us but also for cybercriminals.It is enabling them to create elaborate campaigns to deceive people, efforts that would otherwise take months. Security researchers have discovered a new info stealer malware that masquerades as video-calling software. Hackers have built a whole website and set up companies using AI to make the malware appear harmless.They have even created social media accounts to add an extra layer of legitimacy. People are tricked into installing malicious video-calling software, and once they do, it steals their personal data and cryptocurrency. A man conducting a Google search on his laptop (Kurt "CyberGuy" Knutsson)What you need to know about the malwareCado Security Labs has uncovered a new, sophisticated scam targeting people. The scam involves a crypto stealer called Realst, which has versions for both macOS and Windows and has been active for about four months.The hackers behind this malware have gone all out, setting up fake company websites complete with AI-generated blogs, product content and social media accounts on platforms like Twitter and Medium. The company they're pretending to be is called "Meetio," though they've used different names in the past few months, including Clusee, Cuesee, Meeten and Meetone.The scam works in a few different ways. Often, users are contacted on Telegram by someone pretending to be a friend or acquaintance. The scammers pitch a business opportunity and ask to schedule a call. In one case, the scammer even sent an investment presentation from the target's own company, making the scam feel more real and personal. Other victims report being on Web3-related calls, downloading the software and having their cryptocurrency stolen.Once the scammer makes contact, the target is usually directed to the Meeten website to download the malicious software. But even before the malware is installed, the website has JavaScript that can steal cryptocurrency stored in web browsers. Its a multi-step scam thats designed to trick you. A woman working on several computers (Kurt "CyberGuy" Knutsson)How the malware worksOnce victims are sent to the "Meeten" website, theyre given the option to download the software. The file they download contains a program called "fastquery," though other versions of the malware come as a different file type (DMG) with a multi-architecture setup.When the victim opens the program, two error messages pop up. The first one says, "Cannot connect to the server. Please reinstall or use a VPN," and has a "continue" button. The malware also uses a macOS tool to ask the user for a password, a common trick in macOS malware.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The malware then looks through various files on the victim's computer to find sensitive information, such as passwords and account details. It creates a folder to store this stolen data, then compresses it into a zip file. This zip file, along with some system data, is sent to a remote server. The server receives information like the system's build version, along with the stolen data.Once the data is sent, the malware deletes any temporary files it created. The stealer is capable of grabbing sensitive information like Telegram credentials, banking card details and data from web browsers (like Google Chrome, Opera, Brave, Microsoft Edge, Arc, CocCoc and Vivaldi). It can steal things like saved passwords, cookies and browsing history. A woman working on her laptop (Kurt "CyberGuy" Knutsson)6 ways you can stay safe from sneaky macOS malware1. Verify sources before downloading software: Always ensure that you are downloading software from legitimate, trusted sources. Be cautious of downloading anything from links sent via unsolicited messages or emails, especially if they involve urgent requests or business opportunities.The best way to safeguard yourself against malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my top picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Be cautious of unexpected contact: If you receive messages from unfamiliar contacts on platforms like Telegram or social media, especially those asking you to schedule calls or discuss business opportunities, verify the identity of the sender before taking any action. Cybercriminals often pose as friends or colleagues to gain trust.3. Enable two-factor authentication (2FA): Use2FA on your accounts, particularly for sensitive services like cryptocurrency wallets, banking and messaging apps. This adds an extra layer of protection in case your credentials are compromised.4.Use strong and unique passwords:To protect your Mac from malware, its also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords for different sites or services. Apassword manager can be incredibly helpful here. It generates and stores complex passwords for you, making them difficult for hackers to crack.GET FOX BUSINESS ON THE GO BY CLICKING HEREIt also keeps track of all your passwords in one place and automatically fills them in when you log into accounts so you dont have to remember them yourself. By reducing the number of passwords you need to recall, youre less likely to reuse them, which lowers the risk of security breaches. Get more details about mybest expert-reviewed Password Managers of 2024 here.5. Keep your software updated: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see myguide on keeping all your devices updated.6. Invest in personal data removal services: Consider services that scrub your personal information from public databases. This reduces the chances of your data being exploited in phishing or other cyberattacks after a breach and cuts down on the chances that potential attackers will find you or contact you in the first place.Check out my top picks for data removal services here.Kurts key takeawayAI is enabling scammers to launch malicious campaigns at a scale we've never seen before, and it's likely to get worse as AI models continue to improve. This makes it crucial to have tools that can detect AI-generated content, helping people better protect themselves against these scams. In the meantime, rely on your common sense, watch out for red flags and only install software from reputable platforms. For video calls, stick to well-known and trusted platforms like Zoom, FaceTime, Google Meet and Webex. If someone sends you a random video call link, politely ask them to schedule the call using one of these trusted platforms instead.CLICK HERE TO GET THE FOX NEWS APPShould companies be doing more to help users detect and protect themselves from AI-powered scams?Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved.
    0 Comments 0 Shares 5 Views
  • WWW.FOXNEWS.COM
    Your phone got hacked and now someone's got control of it. What to do immediately
    Data breaches are becoming alarmingly common, and its no longer just massive corporations or government agencies in the crosshairs. Hackers are setting their sights on personal devices like your smartphone. Think about it, your phone holds a staggering amount of your personal information.From emails and text messages to banking apps, social media and even your photos, it's a treasure trove for cybercriminals.The numbers back up the growing threat. The FBIs Internet Crime Complaint Center received nearly 56,000 reports of personal data breaches last year. California, the most populous state, topped the charts for the most complaints, according to the Identity Theft Resource Center (ITRC). These stats are more than just numbers theyre a wake-up call. A man realizing that his phone has been hacked. (Kurt "CyberGuy" Knutsson)So, what happens if you find your phone has been hacked?Its a nightmare scenario. Your phone feels off battery drains faster than usual, strange pop-ups appear, apps you didnt download show up, or youre suddenly locked out. Maybe its sluggish, overheating or making unexpected calls or texts. Your mind races: "What did they see? What can they do with my information? Can I even fix this?"Take a deep breath. Yes, its unsettling, but youre not powerless. Knowing what steps to take and in what order can make a huge difference in regaining control and stopping the damage. Lets walk through exactly what to do if your phone gets hacked, so you can protect yourself and bounce back stronger. Illustration of a scammer hacking into someones phone. (Kurt "CyberGuy" Knutsson)Step 1: Remove malicious softwareEven if hackers had only brief access to your device, assume theyve seen sensitive data. Your first task is to remove any malware or spyware.1. Use strong antivirus software: The easiest and most effective way to start is by installing and running strong antivirus or antivirus software. Avoid unfamiliar apps, as some pose as antivirus tools but are actually malware in disguise.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.After installation, run a full device scan. This will search for hidden threats like spyware, ransomware, or keyloggers that could compromise your information further. Once the scan identifies malicious files, follow the apps instructions to quarantine or remove them. Be sure to double-check the apps log to confirm all suspicious activity has been addressed. Most antivirus tools offer real-time protection to monitor for threats as they occur. Turn this feature on to reduce the risk of reinfection. Antivirus programs are only as effective as their latest updates. Cybercriminals continuously develop new malware, so keeping your antivirus database current ensures it can detect the newest threats.2. Factory reset if needed: If the antivirus software fails to fully restore your phones functionality such as fixing issues like freezing, slowdowns or unexpected shutdowns you may need to perform a factory reset on youriPhone orAndroid. A factory reset wipes all data from your phone, returning it to its original state when it left the manufacturer. Before resetting, create a backup of your important files. However, ensure the backup itself is free of malware. Use antivirus software to scan backups before restoring them. Most phones offer a simple reset option in their settings menu under "System" or "General Management." Consult your device manual or manufacturers website for detailed instructions.3. Seek professional help:If youre not confident in your ability to remove malware or reset your phone, reach out to a trusted professional. Visit the Apple Store, Microsoft Store or an authorized service provider for your phone brand. Explain your situation and ask for a thorough inspection and cleaning of your device. Many retailers offer comprehensive diagnostic and repair services.4. Abandon hardware only as a last resort: In rare cases, malware can deeply embed itself into a device, making complete removal nearly impossible. If your phone continues to exhibit signs of infection despite using antivirus tools, factory resets and professional help, you may need to replace it. Ensure you completelywipe the device before disposing of it to prevent any residual data from falling into the wrong hands. When setting up a new device, take extra precautions to secure it, such as enablingtwo-factor authentication and keeping allsoftware up to date. Illustration of someone trying to remove malware from their device. (Kurt "CyberGuy" Knutsson)Step 2: Dont reset passwords prematurelyResist the urge to immediately change passwords on a compromised device. Hackers might still have access and could intercept your new credentials, potentially locking you out again. Instead, follow these steps:Thoroughly clean and secure your device first:Complete all steps from Step 1 to remove malware and reset your device if necessary.Update your phone's operating system and all apps to the latest versions.Enabletwo-factor authentication (2FA) on your device and important accounts.Review and revoke any suspicious app permissions or account access.Use a trusted, secure device for password resets:Use another device you own or borrow a friend's or family member's computer to reset your password.If possible, also use a different network than your compromised phone to avoid potential network-level attacks.Prioritize critical accounts:Start with your email, as it's often used for password resets on other accounts.Move on to financial accounts, social media and other sensitive services.Create strong, unique passwords:Use a combination of uppercase and lowercase letters, numbers and symbols.Aim for at least 12 characters in length.Avoid using personal information or common phrases.Consider using apassword manager to generate and store complex, unique passwords for each account. They encrypt your password database, adding an extra layer of security.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Someone entering a password on their device. (Kurt "CyberGuy" Knutsson)Setting up passkeys on iPhone and AndroidAs weve seen, traditional passwords present numerous security challenges including susceptibility to breaches and phishing attacks along with the inconvenience of remembering complex combinations. Even with best practices in place, passwords can still be stolen or misused.This is where passkeys come into play. As data breaches become increasingly common, adopting passkeys can significantly enhance your security. Unlike passwords that require you to remember a string of characters, passkeys utilize biometric authentication or a PIN to streamline the login process while providing protection against unauthorized access.GET FOX BUSINESS ON THE GO BY CLICKING HEREBenefits of using passkeysEnhanced security: Passkeys are resistant to phishing attacks and reduce the risk of credential theft since they cannot be easily guessed or stolen like traditional passwords.Convenience: With biometric authentication, logging into apps and websites becomes faster and easier eliminating the need to remember complex passwords.Cross-device functionality: Passkeys work seamlessly across different devices linked to the same account providing a unified login experience.Here's how to set up passkeys on both iPhone and Android devices so that you can secure your personal information.Setting up a passkey on iPhoneCheck compatibility: Ensure your iPhone is running iOS 16 or later; passkeys are integrated into iCloud Keychain.Enable iCloud Keychain: Go toSettings > [Your Name] > iCloud >Under Saved to iCloud, tapPasswords. In iOS 17 or earlier, tapPasswords and Keychain. > TapSync this iPhone to turn on iCloud Passwords & Keychain. You might be asked for your passcode or Apple Account password.Ensure that two-factor authentication is also enabled for your Apple ID. OpenSettings >Tap your name at the top >Select 'Sign-In & Security' >Tap 'Turn On Two-Factor Authentication' >Follow the on-screen instructions to complete the setup.How to create a Passkey on iPhoneOpen the app or website where you want to create a passkey.Select theoption to sign in orcreate an account.When prompted for a password, choose the option touse a passkey instead.Follow theon-screen instructions to authenticate using Face ID, Touch ID, or your device passcode.Your passkeys will be stored iniCloud Keychain and automatically sync across all devices signed in with the same Apple ID.Setting up a passkey on AndroidSettings may vary depending on your Android phones manufacturer.Check compatibility: Ensure your device is running Android 9 (Pie) or later; most modern Android devices support passkeys.Set up Google Password Manager:Go to Settings > Tap yourName or initial>Google >Manage Your Google Account >Security. Then, scroll down to find the Passkeys section and tap on it.How to create a passkey on Android:Settings may vary depending on your Android phones manufacturer.When signing into an app or website, select the option for passwordless login.Follow the prompts to create a passkey; this may require biometric verification (fingerprint or facial recognition) or a PIN.Once created, your passkeys will be stored in Google Password Manager and synced across all devices linked to your Google account.Step 3: Secure your assets and prevent identity theftWith your device clean, focus on protecting your financial and personal information.Credit reports:Contact Equifax, Experian and TransUnion to place a fraud alert and security freeze on your credit reports. Regularly check your credit reports for unauthorized activity. Contacts: Equifax: 1-800-525-6285,Experian: 1-888-397-3742, TransUnion: 1-800-680-7289.Financial institutions: Update passwords and enabletwo-factor authentication (2FA) on your bank accounts. This enhances the security of your financial information. Inform your financial institutions about the breach. Some banks allow you to set up verbal passwords for added security.Drivers license: Submit a Fraud Review of Driver License/Identification form to your local Department of Motor Vehicles (DMV).Social Security account:Create amy Social Security account if you dont already have one. Monitor it for any unusual activity. Regularly review your account statements to ensure no unauthorized changes have been made.Taxes: Obtain an Identity Protection (IP) PIN from the IRS to prevent fraudulent tax filings. File your taxes early to outpace potential fraudsters. You can get an IP PIN by visiting theIRS official website.Identity theft protection: Identity theft companies can monitor personal information like your Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using some services is that they might include identity theft insurance ofup to $1 million to cover losses and legal fees and a white glove fraud resolution team where aU.S.-based case manager helps you recover any losses.See my tips and best picks on how to protect yourself from identity theft.Kurt's key takeawaysGetting your phone hacked is a sobering reminder of how vulnerable we are these days. Yet, the experience doesnt have to be catastrophic if you act quickly and methodically. Start by addressing the immediate threat of malware, secure your accounts and assets, and implement proactive measures to prevent future breaches. Think of these steps as your digital emergency kit essential tools to help you regain control when things go wrong. Remember, your digital security is only as strong as the precautions you take today.CLICK HERE TO GET THE FOX NEWS APPHave you ever experienced a phone hack or dealt with a cybersecurity breach? Share your story, your questions or the steps you took by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 8 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: Chatbot's deadly prompt
    Character.AI. (CFOTO/Future Publishing via Getty Images) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- AI chatbot encouraged teen to kill his parents, lawsuit claims- Teen deepfake pornography victim warns future generation is 'at risk' if AI crime bill fails- Lisa Kudrow began to fear AI after seeing Tom Hanks movie Artificial intelligence is being used to power the personalization of popular sports betting apps to tailor experiences to users' preferences. (iStock / iStock)SUITS MOUNTING: Two Texas parents filed a lawsuit this week against the makers of Character.AI, claiming the artificial intelligence chatbot is a "clear and present danger to minors," with one plaintiff alleging it encouraged their teen to kill his parents.GENERATION AT RISK: Senate lawmakers unanimously passed the bipartisan-led Take It Down Act that would force social media companies to speedily remove sexually explicit deepfakes, prevent them from being posted and criminalize the act.'WHAT WILL BE LEFT?': Lisa Kudrow fears an uncertain future as artificial intelligence becomes more and more prevalent in Hollywood. Lisa Kudrow with an inset of a still from Tom Hanks and Robin Wright in Here (ROBYN BECK/AFP via Getty Images; 2023 CTMG, Inc. All Rights Reserved.)FUTURISTIC ROBOCOP: Footage from the streets of China captured a scene straight from a science fiction novel spherical drones alongside patrolling law enforcement. Chinese company Logan Technology unveiled the RT-G, a spherical AI robot, aiding law enforcement with patrol. (Logan Technology)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 7 Views
  • WWW.FOXNEWS.COM
    How to thief-proof your Christmas decorations
    Published December 14, 2024 10:00am EST close 'FOX & Friends' spotlights made-in-America gift ideas perfect for the holiday season Worksport CEO Steven Rossi, A Rustic Feeling owner Mary Geitz and Metal Art of Wisconsin president Shane Henderson join 'FOX & Friends Weekend' to share their American-made products. Holiday decoration theft has become an increasingly frustrating issue for many homeowners. Karen from Los Angeles shared her experience with us in an email, stating,"We have criminals who visit our neighborhood to not only steal mail and packages but also holiday decorations. I made a Christmas decoration for our mailbox, which was promptly stolen."Were sorry to hear about the theft in your neighborhood. This highlights a problem that goes beyond mere property loss. It's a theft of holiday cheer and personal effort. Lets see how we can use technology to help secure your decorations. Outdoor decorations that were stolen. (Kurt "CyberGuy" Knutsson)Smart solutions for festive securityKaren also inquired about the effectiveness ofSamsung SmartTags, asking if these tags would work on her decorations and how far they could reach. The good news is that Samsung SmartTags can indeed be used on your holiday decorations. You can attach the SmartTag to any item you want to track. These devices are compatible with most recent Samsung Galaxy phones, including the Galaxy S9, making them accessible to many Android users.As for the distance, the range of theSamsung SmartTag uses Bluetooth to connect to your phone. If the item is within Bluetooth range, you can ring it to find it or use the "Search Nearby" feature to get directions to it. If the item is out of range, other Samsung devices near the tag will anonymously locate it for you and then let you know where it is. This is done in the background and is encrypted to ensure privacy. The SmartTag does not beep when its out of range.TheSamsung SmartTag is compatible with almost all Samsung Galaxy phones released recently. They must have 2GB of RAM and run Android 8.0 (Oreo) or higher. So, your Samsung Galaxy S9 phones should be compatible with the Samsung SmartTag. Outdoor Christmas decorations. (Kurt "CyberGuy" Knutsson)Apple AirTags: An alternative approachFor those considering a switch toApple, AirTags present another viable option. Karen asked if she would have problems tracking her decorations with an Apple AirTag. While primarily designed for iOS devices,you can use it with your Android phone as mentioned in our article here, with some limitations. It uses the Find My network, and if another Apple device passes by the AirTag, the Find My network will be notified of the lost items location.The AirTag does not beep when its out of range. However, the AirTags Precision Finding feature, which provides highly accurate tracking, is only compatible with iPhone 11 series and onwards. If youre considering purchasing an iPhone, the iPhone 11 would be a relatively inexpensive option that is compatible with the AirTags Precision Finding feature.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Outdoor Christmas decorations. (Kurt "CyberGuy" Knutsson)Samsung SmartTags vs. Apple AirTagsBothSamsung SmartTags and Apple AirTags offer extensive tracking capabilities. The SmartTag uses Bluetooth for nearby tracking and relies on other Samsung devices for long-range location. Similarly,AirTags leverage the Find My network, utilizing nearby Apple devices to relay location information.For Samsung users like Karen, theSmartTag is the natural choice, working seamlessly with Galaxy devices. Those considering Apple might look at theAirTagas an option.Please note that while these tags can help you track your items, they might not prevent theft as they are not hidden devices and can be removed by someone who recognizes what they are. Outdoor Christmas decorations. (Kurt "CyberGuy" Knutsson)Additional tips for festive security1. Use motion-activated cameras: Installmotion-activated security cameras to monitor your decorations. Many security cameras send real-time notifications to your phone, allowing you to act quickly if someone tampers with your property.2. Secure decorations: Consider physically securing your decorations with zip ties, chains or locks. While this won't deter all thieves, it can make stealing more difficult and time-consuming.3. Light it up: Well-lit areas are less appealing to thieves. Ensure your yard and decorations are adequately lit withoutdoor lights, especially in dark corners or near entry points.4. Engage your neighbors: Create a sense of community by alerting neighbors to thefts and keeping an eye out for suspicious activity. A connected neighborhood can act as a strong deterrent.5. Mark your property: Use invisible ink or engrave your decorations with a unique identifier. If stolen items are recovered, this will help law enforcement return them to you.6. Report thefts to local law enforcement: Always report thefts, no matter how small. Law enforcement can track patterns and increase patrols in areas with frequent incidents. Providing details may also help them recover stolen items.GET FOX BUSINESS ON THE GO BY CLICKING HERE Outdoor Christmas decorations. (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysIn her email, Karen expressed her frustration: "I know this seems minor... but its disheartening to see the things you spend time, money and a little love get stolen." The desire to protect holiday decorations goes beyond material value it's about safeguarding the joy and effort put into creating a festive atmosphere. As we embrace these technologies, let's also remember the importance of community vigilance and mutual respect.CLICK HERE TO GET THE FOX NEWS APPHave you ever used tracking devices, security cameras, or other gadgets to safeguard your decorations? What worked well, and what would you recommend to others? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 6 Views
  • WWW.FOXNEWS.COM
    Think you're safe? Identity theft could wipe out your entire lifes savings
    Published December 13, 2024 10:00am EST close How to protect yourself from identity theft Simple ways to stay secure Identity theft has become a pervasive issue, affecting millions of Americans each year. In 2023 alone, American adults lost a staggering $43 billion to identity fraud. The following story illustrates the devastating impact this crime can have on individuals:Paula Disberry, a former Colgate-Palmolive employee, was living a comfortable life when she discovered that her 401(k) account had been drained of $750,000. The shock came when she tried to access her account online, only to find it blocked.A fraudster had impersonated her, changing her contact details and withdrawing her entire retirement savings in a single transaction. Stories like this of financial identity theft are becoming all too common. If you live in the U.S., youve likely already encountered one, or worse, experienced it firsthand. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)Think identity theft won't happen to you? Think againThe FBI's Internet Crime Report for 2023reveals that adults 60 and above accounted for 24.08% of all identity theft claims and suffered 41.46% of the total financial losses. While they may not face a higher risk of becoming victims, the financial toll is significantly greater than any other age group. Older adults, especially those over 60, often feel the impact more deeply. Why? They typically have more assets than younger individuals and are less likely to monitor their bank accounts daily. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)An age-old scam with a high-tech makeoverIdentity theft has been a concern for centuries, with one of the most famous historical impostors beingFrank Abagnale Jr. Abagnale claims to have successfully impersonated various professionals in the 1960s, including a Pan Am pilot and a doctor, forging checks and documents to amass a small fortune. His alleged exploits were so notorious that they inspired the film "Catch Me If You Can."While Abagnale's story is a dramatic example, modern identity theft has evolved into a more pervasive threat, particularly with the rise of digital technology. The widespread availability of personal information on the web, combined with a lack of regulation preventing companies from collecting data without consent, has made it easier for criminals to exploit personal data. The scale is massive, and the impact can severely disrupt your life and that of your family. A woman working on her laptop (Kurt "CyberGuy" Knutsson)Red flags to look out forBeing aware of the warning signs of identity theft can help you take action before it's too late. Here are some red flags to watch for.Unexplained account activity: Keep an eye out for unfamiliar transactions or changes in your bank or credit card statements that you dont recognize.Credit report changes: Regularly check your credit report for new accounts that you did not open or inquiries from lenders that you did not initiate.Missing mail or bills: If you stop receiving bills or other important mail, it could indicate that someone has changed your address without your knowledge.Unexpected denials:If you're denied credit unexpectedly, it might be a sign that someone is using your information to apply for loans or credit cards.Strange communication: Be cautious of emails, texts or calls asking for personal information, especially if they create a sense of urgency or fear.Unusual password changes:If you notice changes to your online accounts that you did not make, such as password resets or security questions being altered, act quickly to secure your accounts.Alerts from identity theft protection services: If you use an identity theft protection service and receive alerts about suspicious activity, investigate immediately.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Strengthen your defenses nowIdentity theft doesnt have to be a devastating blow. You can significantly reduce your risk by being more mindful of your online habits. Heres how.1. Monitor your accounts regularly: Keep a close eye on your bank and credit card statements to spot unauthorized transactions early. This can prevent financial losses and protect your assets.2. Use strong passwords: Use complex passwords and apassword manager to secure your online accounts. Strong passwords are your first line of defense against cyber threats.3. Stop oversharing: Limit the personal information you share on social media and other platforms. Its a treasure trove for cybercriminals who use it to craft convincing fraud campaigns targeted specifically at you.4. Invest in personal data removal services:Given the alarming rise in identity theft cases, taking proactive measures to safeguard your personal information is essential. One effective strategy is to invest in personal data removal services. hile no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.5. Freeze your credit: Initiate a credit freeze on your credit file with all three major credit bureaus. This restricts access to your credit records, making it difficult for identity thieves to open new accounts in your name.6. Use an identity theft protection service:Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft.7. Use two-factor authentication: Enablethis extra layer of security on your accounts to make it more difficult for thieves to access your information, even if they obtain your password.GET FOX BUSINESS ON THE GO BY CLICKING HERE8. Be cautious with public Wi-Fi: Avoid usingpublic Wi-Fi for sensitive transactions or use a VPN to encrypt your online activity. Using aVPN (virtual private network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs dont directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies.9. Shred sensitive documents: Regularly shred financial documents, credit offers and other paperwork containing personal information before disposing of them.10. Set up bank alerts: Many financial institutions offer text or email alerts for transactions on your accounts, helping you quickly spot unauthorized activity.11. Have strong antivirus software:The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.12. Keep software updated: Ensure your devices and antivirus software are up to date.Regular updates often include security patches that protect against vulnerabilities that scammers might exploit. Keeping your software current is a critical step in safeguarding your digital assets.Kurt's key takeawaysWhile the statistics are sobering, they don't have to leave you feeling helpless. Identity theft is a serious threat, but with awareness and proactive steps, you can significantly reduce your risk. Remember, criminals are constantly evolving their tactics, which means we must stay one step ahead. The most powerful weapon against identity theft is knowledge. Understanding how these scams work, recognizing potential red flags and taking preventive measures can make all the difference.CLICK HERE TO GET THE FOX NEWS APPDo you believe that governments should impose stricter regulations on how companies collect and use personal data to better protect consumers? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 9 Views
  • WWW.FOXNEWS.COM
    Warning: This fake PayPal email scam is everywhere right now
    By Kim Komando The Kim Komando Show Published December 13, 2024 3:05pm EST close Jimmy Joins 'Fox & Friends' To Share His Thoughts On The TikTok 'Venmo Mom' During an appearance on "Fox & Friends", Jimmy Failla gives his take on a mother in Tennessee who came up with an interesting alternative for volunteering in her kids' classrooms or for their extracurricular activities. "Reminder: You've still got a money request!" That was the subject line of the messages flooding my husband Barrys inbox for weeks. The first couple were concerning, then it was just downright annoying.Enter to win a $500 Amazon gift card. No purchase required.Hes not the only one getting them; theres a sneaky scam going around that looks totally legit because it actually comes from PayPal.Lets take a closer look at how it works so you dont fall for it.DONT SCAM YOURSELF WITH THE TRICKS HACKERS DONT WANT ME TO SHAREHeres how it goes downLucky for us, scammers use the same tricks. This one is getting common enough, its easy to spot if youre careful.First, you receive an invoice via PayPal. It might say something like, "Payment due for a purchase" or tell you a payment was processed due to a technical error.It looks real because it was sent through PayPal's platform. They hope youll panic and act without thinking. PayPal is a trusted platform, so when you see their logo and familiar format, its easy to let your guard down. A woman is pictured using a phone. (iStock)Related:Dont fall for it! Hackers are trying to get you to scam yourselfIts a bogus invoice, of coursePayPal allows anyone with an account to send an invoice, which scammers exploit to make it seem legit.In the invoice notice is a phone number you can call for support. Its listed as PayPals number, but its someone ready to steal your money and info. All the scam emails Ive reviewed had different numbers attached.12 EASY, TECHY WAYS TO MAKE THE HOLIDAY SMOOTHERCalling the fake support number is the worst thing you can do. The scammer might ask for your login details or payment card information to 'resolve the issue.' In some cases, theyll install malware on your device, stealing passwords and financial details in the background."Related:How to spot and stop it This March 10, 2015, file photo, shows signage outside PayPals headquarters in San Jose, Calif. (AP Photo/Jeff Chiu, File)PayPal will never send invoices for random purchases you didnt authorize. If something seems off, trust your instincts and double-check before taking action.Check the details: Look at the senders email and transaction history. If its not a company or person you recognize, its likely a scam.Double-check the invoice recipient:Thats another glaring red flag in this case. All the emails I saw had someone other than my husband listed in small text at the top. Look carefully.Dont call any of the phone numbers listed: This is smart with any strange invoice, call, document, email, text, whatever. Dont use contact info thats included. Go to the official website to find it.I looked this one up for you: PayPals real support number is 1-888-221-1161. They take calls from 6 a.m. to 6 p.m. PT every day.THIS CRIME SHOT UP 400% HOW TO PROTECT YOURSELFWhen in doubt, your best bet is to contact customer service. Theyre much more familiar with scam patterns then most regular folks since they see them day in and day out. Plus, they can look into your account to tell you what is a legitimate request and whats not.If youre sure the invoice is fake, delete it. But first Report it to PayPal.Consider this your good deed of the day. Reporting scams doesnt just help you it helps everyone. When you flag fake invoices to PayPal, their team can track patterns, shut down scammers accounts and warn others about similar tactics.Log in to your PayPal account, then visit theResolution Center, where you can report suspicious invoices.Even easier, forward the email tophishing@paypal.com to alert their security team.Related:3 immediate steps to take if you fell for a scam A person is pictured holding a stack of twenty-dollar bills. (iStock)Lock down your account for extra securityIf you dont have two-factor authentication set up, dont wait. It only takes a minute. Now youll get a code when you log in. Annoying? A little. But its worth the extra step on any account tied to your finances.Log in to your PayPal account on a browser. Click the Settings icon > Security > 2-step verification. You can use an authenticator app or receive codes as text messages. Pro tip:An authenticator app is the more secure option.Follow the on-screen directions to finish up.Scams like this are sneaky, but theyre easy to spot if you know what to look for. Share this with your friends and family so they dont fall for it.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours or get the free podcast.Daily newsletter:Join 575,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "Kim Komando Today" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.
    0 Comments 0 Shares 9 Views
  • WWW.FOXNEWS.COM
    How to keep your holiday shopping a secret on Amazon
    Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. The holiday season is in full swing, and with it comes the joy of gift giving.If you're planning to shop on Amazon this December, you might be wondering how to keep your purchases a secret until the big reveal. Whether you're surprising a loved one or treating a friend, maintaining that element of surprise can be a challenge in todays online shopping landscape. But dont worry.Weve gathered some clever tips and tricks to help you keep your holiday shopping under wraps, ensuring your thoughtful gifts remain surprises. Amazon website on computer screen (Kurt "CyberGuy" Knutsson)1. Create a separate Amazon accountOne of the easiest ways to keep your gift purchases a secret is to create a separate Amazon account just for buying gifts. This way, you can avoid sharing your order history, recommendations and wish lists with anyone else who uses your main account.You can also use a different email address and phone number for your gift account, so you wont receive any delivery notifications or emails that might give away your gifts.If you dont already have one,heres how you can get a cheap Amazon Prime membership. A woman shopping on the Amazon app (Kurt "CyberGuy" Knutsson)2. Turn on Amazon HouseholdThis may be the simplest solution.Amazon Household is an Amazon feature that allows you to share your Prime benefits with the family. You can create up to two adult accounts, four teen and four child profiles.Amazon Household keeps all shopping purchases and notifications for shipping separate. So, no need to worry about your Christmas present being revealed before giving it out.With Amazon Household, you not only get to keep your purchases separate, you can also share eBooks, audiobooks, digital content and games.Create your Amazon Householdhere. Image of Amazon Household ad (Amazon)3. Hide or archive your ordersAnother option to keep your gift purchases a secret is to hide or archive your orders on your Amazon account. This will remove them from your default order history view, so they wont show up when you or someone else checks your recent orders. The following will only work on adesktop or laptop browser(not on a tablet or mobile device).Log In to your Amazon account.Click onReturns and Ordersin the top right corner. A list of your orders from the past three months will appear.Scroll to find the item you want to hide. Below the item, you will seeArchive Order.Archive Orderagain. If you do not seeArchive Order,selectView order details to the right of the purchased item. On the right-hand side, selectArchive Order. Steps to archive an order on Amazon (Kurt "CyberGuy" Knutsson)Even though the item will no longer appear in Your Orders, you can still view it inArchived Orders from Your Account.4. Turn off shipment notifications and trackingIf you dont want to receive any shipment notifications or tracking information for your gift purchases, you can also turn them off on your Amazon account. This will prevent you from getting any emails, texts or push notifications that might reveal your gifts.To turn off shipment notifications and tracking in Amazon, you can follow these steps:Open theAmazon app on your phone, open themenu and tapSettingsTap theNotifications option in the listDisable the types of notifications you dont want to receive, such as "Shipment Notifications," "Delivery Notifications," "Returns and Order Updates," etc.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A woman holiday shopping on her laptop (Kurt "CyberGuy" Knutsson)5. Hide from AlexaNow, if you have some real sleuths in your household, you are going to need to do more than just archive your purchases to make sure your gifts are still surprises. You can start by changing your Alexa settings.Open theAlexa appClickSettingsFind and SelectNotifications,then selectAmazon ShoppingScroll toSay or Show Item Titles.Toggle the switches off for "For items in delivery updates," "For items in return updates" and "Including items in your shopping cart marked as gifts or those that might be gifts during major holidays."Now, Alexa will still notify you when a package is being delivered, but it will not say what the item is. An Alexa device sitting on top of a laptop (Kurt "CyberGuy" Knutsson)6. Clear your Search HistoryWe all have that one relentless person, determined to find out which presents were purchased this year. Another step to keep them off your tracks is deleting your "Search History."The following will only work on adesktop or laptop browser(not on a tablet or mobile device).Go toAccount & Lists in the upper right corner of your browser,then selectRecommendationsClickYour Browsing History (text in gray strip toward top of the screen)Select the gear icon on the right-hand part of the page.This will open up a Settings window.ClickRemove items from viewbuttonAll the items you recently reviewed have been removed.7. Use Amazon Locker or Amazon HubIf you dont want your gift purchases to be delivered to your home address, you can also use Amazon Locker or Amazon Hub to pick them up at a nearby location. This way, you can avoid having your packages left on your doorstep or seen by anyone else in your household. Amazon Locker and Amazon Hub are secure, self-service kiosks where you can pick up and return your Amazon packages at your convenience. Image of an Amazon locker (Amazon)To use Amazon Locker or Amazon Hub:Go toAccount & Lists and click on Your AddressesThen, click onSearch for a Locker or Hub location and enter yourzip code orcityYou can then select alocation and add it to your address book.When you check out, you can choose the Locker or Hub location as yourshipping address.GET FOX BUSINESS ON THE GO BY CLICKING HERE8. Use gift options during checkoutWhen purchasing gifts on Amazon, you can utilize the gift options available at checkout. This feature allows you to mark items as gifts, which can help maintain secrecy in several ways.Gift wrapping: You can choose to have the item gift-wrapped, which not only adds a nice touch but also prevents anyone from seeing the product until it is unwrapped.Gift message: You can include a personalized message that will be printed on the packing slip, making it clear that its a gift and not an ordinary purchase.No price information: When you select gift options, Amazon typically does not include pricing information on the packing slip, which helps keep the cost of the gift hidden from the recipient.To use this feature, simply select the "This is a gift" checkbox during checkout and follow the prompts to customize your order accordingly. This added layer of discretion can significantly enhance your ability to keep your purchases under wraps until the big reveal. An Amazon web page Kurt's key takeawaysAs the holiday festivities approach, keeping your Amazon gift purchases a secret can add an extra layer of excitement to your celebrations. With these straightforward strategies, you can shop with confidence, knowing that your surprises will stay hidden until the perfect moment. From creating separate accounts to utilizing gift options at checkout, each tip is designed to help you preserve that magical element of surprise.CLICK HERE TO GET THE FOX NEWS APPHave you ever had a gift surprise spoiled? If so, what happened and how did you handle it? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Kurts picks:Copyright 2024 CyberGuy.com.All rights reserved.
    0 Comments 0 Shares 9 Views
  • WWW.FOXNEWS.COM
    12 easy, techy ways to make the holiday smoother
    close Amazon shopping enthusiast in Texas shocks husband with porch full of packages Sarah Ferman Baker of Texas recently participated in Amazon Prime Day without her husband's knowledge. Watch the pure panic on husband Jamie Baker's face when he counts 17 delivery boxes on his front porch! (Ring) Did you know if you turn an Amazon shipping bag inside out, theres a strip you can pull to reseal it for returns? Good to know when a holiday gift arrives and its nothing like the picture online.Enter to win a $500 Amazon gift card. No purchase required.There are all kinds of little tips and tricks that can make the busiest time of year a little easier to manage. Ive got your back.DONT SCAM YOURSELF WITH THE TRICKS HACKERS DONT WANT ME TO SHAREShoppingHo-ho-hope your packages arrive on time:Gmails package tracking now includes real-time updates. On your phone, tap Menu > Settings. Look for General settings(Android) or Data privacy(Apple) and toggle on Package tracking at the bottom.Hide-and-seek:Youre shopping online for your kiddo or spouse and they walk in. Quick! Hide your open browser windows. On a PC: Windows key + M. (Use Windows key + Shift + Mto reopen.) On a Mac: Cmd + Option + H+ M. Phew, no spoilers. A person is pictured online shopping during the holiday season. (iStock)Amazons secret 20% discount: Send your old tech to Amazon through itsTrade-in Program and get a gift card for the value. Theyll take just about anything it doesnt even need to work. But if you trade in Amazon gear like a Kindle, eero or Fire TV Stick, youll get 20% off a new, qualifying device.Drop the drop shippers:On Etsy, the whole purpose is to buy something handmade. If youre not sure what youre getting is legit, check if its genuine or mass-produced junk by doing a reverse image search. Click on the items image, then drag and drop it intoGoogle Images. Major red flag: You see the exact same thing on other sites.BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?At homeFocus! Blurry pics are a bummer. Sometimes your phones cam picks the wrong spot. For a quick reset, tap the area on your screen you want to be the clearest. Easy and effective. No ruined family photos this year.Related:Trick to take the best family portrait without a photographerIm B-side myself: Make a playlist with your fam so youre not bickering over the music on Christmas morning. ForSpotify, open the app, then head to Your Library and select the playlist. Tap the three dots in the top right > Share to send it. InApple Music, go to Library> Playlists> three dots(upper right) > Share Playlist. Jingle all the way! An Amazon courier delivers packages as a DHL van is seen behind on April 04, 2024 in Berlin, Germany. (Sean Gallup/Getty Images)Family visiting? Keep your steamy romance novels on lock by creating a passkey for your Kindle. Tap the three dots (upper right) and go to Settings> Device Options> Device Passcode. Your passcode can be up to 12 digits long. Thats hot!Related:Its smart to lock your computer down, tooOn the roadFlying away? Ubers got three new features to make your airport trips easier. The first, UberXXL, gets you a bigger car with extra trunk space for groups. The second, UberX Share, allows you to pay 25% by sharing a ride with someone heading your way. Its available now at select airports. And finally, with Uber Reserve, you can have a car waiting for you when you land.3 SECURITY AND DATA CHECKS YOU SHOULD DO ONCE A YEARSynced your phone to a rental car?Wipe your data so the next driver doesn't get your texts. On the cars infotainment system, go to Settingsand look for a factory reset option. Every cars system is different, so check the manual or ask the rental company if you cant find it.Over the river and through the woods: See the best time to leave for Grandmas house (or anywhere else) without arguing. InApple Maps, press the Nowbutton on the left to open a calendar. InGoogle Maps, tap the three dots at the top right. For both, select Leave/Depart at or Arrive by and hit Done. An Uber logo is pictured. (Getty Images)Track your luggage with your airlines app: Open the apps Menu> Track my bags. The naming will vary depending on the airline. Enter your reservation or tag number, and youll get updates along its journey.Or use a tracker:For me, this is the most reliable option.Apples AirTags are ideal if you have an iPhone, Mac or iPad.The Tile 2-pack is Android compatible and has a tracker for your luggage and one to slide into your wallet.Related:Theres one place during your travels an AirTag wont workGet tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours or get the free podcast.Daily newsletter:Join 575,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "Kim Komando Today" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.
    0 Comments 0 Shares 9 Views
  • WWW.FOXNEWS.COM
    7 must-have apps to save big this holiday season
    Published December 11, 2024 10:00am EST close Food delivery apps have to clean this up: senator Sen. Marsha Blackburn, R-Tenn., joins Fox & Friends Weekend to react to the report finding that food delivery apps are unlawfully paying migrants through app sharing. Imagine walking into a store or browsing online, confident that youre getting the best deals without spending hours hunting for discounts.With the right tools at your fingertips, this can be your reality. We've researched and reviewed seven fantastic options that can help you save both time and money during your holiday shopping spree.From cash-back apps to discount tools, these strategies will ensure you check off every item on your wish list without breaking the bank. Ready to save some money? Let's dive in. A woman shopping on an app (Kurt "CyberGuy" Knutsson)1. Retailer apps and manufacturer sitesDownloading big retailer apps can lead to more savings that cannot be found in stores or online. FromTarget andWalmart to your local drugstore, many offer secret app-only savings and offers.Retailers are trying to get us to shop more with their own app by combining an app purchase with an in-store pickup that can at times offer additional savings. Look for each app in the official Apple app store and Google Play Store, never from a link or other site. A woman shopping on her laptop (Kurt "CyberGuy" Knutsson)2.Cash-back shopping appsCashback shopping apps likeRakuten let you earn cash back when shopping online. According to Rakuten, thousands of retailers participate in the savings. Image of the Rakuten welcome page (Kurt "CyberGuy" Knutsson)How it works is simple.Register for free online, then use their app or website while shopping at retailers that offer a commission for sending you to their shopping site.Rakuten shares a portion of the commission it earns with you. Once you earn enough cash-back savings, you can choose to receive a check, have it paid to your PayPal account or use the American Express rewards program.I've mentioned this appbefore. Ibotta is an app that you use for couponing and gives you cash back on items youre already purchasing at your favorite stores, including grocery stores, food delivery, movie and concert tickets, and more. Image of Ibotta app (Kurt "CyberGuy" Knutsson)Some of the most popular retailers you can find deals with through Ibotta are CVS, Walgreens, Target, Lowes, Petco, Dominos Pizza, REI and more than 1,500 brands and retailers.If you scroll to the bottom of the app, youll see a section called "Special Deals." If you scroll, youll see a panel called "Free made easy: All free offers all in one place." Ibotta special deals section of app (Kurt "CyberGuy" Knutsson)Copy the code to insert into the Referral code box on Ibotta "Create account" page:mpiaurmWHAT IS ARTIFICIAL INTELLIGENCE (AI)?3. Discount and price comparison apps Image of Flipp welcome back (Kurt "CyberGuy" Knutsson)Discount appslike Flipp aggregate sales fliers and store circulars. All you do is put in your zip code and start browsing for savings from thousands of popular retailers.The Watch List lets you track items from your holiday shopping list.Make sure to create a tight shopping list of each item to track in case prices go down before or after your purchase.4. Automatic coupon code appsPayPal Honey leads the pack by automatically entering coupon codes into the promo code field when checking out at 5,500+ retail sites. Image of PayPal Honey welcome back (Kurt "CyberGuy" Knutsson)How it works: You can use the PayPal Honey app directly, but you are better off using it the way it was designed as a browser extension.Once added to your browser, it tracks where you are shopping and applies the best coupon codes without you needing to do anything.Just watch the total price drop as you are checking out when there is a match to a good discount.The PayPal Honey browser add-on is available on Safari, Chrome, Edge, Firefox, Opera and Edge browsers. Again, for security, only download directly through your browser and not from a link or email offer.GET FOX BUSINESS ON THE GO BY CLICKING HEREPayPal paid $4 billion dollars for the automated coupon code technology browser add-on.That's when Honey becamePayPal Honey you will find here.While it has come under fire by Amazon for privacy concerns, upon close examination it does not collect anything more than most other shopping technologies and says it does not resell customer shopping data.Maybe Amazon does not like that it works with Amazon, too, which can drive down prices.5. Shop refurbished and like newAmazon Warehouse has millions of open boxes, refurbished, renewed and used goods.Few know that retail giant Amazon has a renewed outlet shopping area that can save you when buying items in good-to-like-new condition.Make sure you get a very good understanding of an item's condition before buying.You are protected by Amazon's policies making it easier to return the rare dud. Image of Amazon Warehouse page (Kurt "CyberGuy" Knutsson)BookFinder.com buys and sells used textbooks. Search with your teacher or professors textbook ISBN to make sure you are getting the exact match. Watch that you have thoroughly checked the condition of any used textbook before pulling the trigger at checkout. Avoid textbooks that say there are notations on the various pages, as these may not be the notes that earn you a good grade.6. Buy discounted gift cardsYou can buydiscounted gift cards or sell unwanted gift cards for cash. I also recommend that you check the balance and expiration date of your gift cards before using them and use them as soon as possible to avoid losing them or forgetting about them.Check out the best way to buy gift cards ever by clicking here.7. Set deal alertsSetDeal Alerts at Slickdeals.net. This community of millions of fellow shoppers is looking for and sharing the best deals. When the price reaches a desired level, you'll receive a notification so you don't miss the deal.Pro tip:I like to track larger dollar items and then create a calendar entry in my phone reminding me of the last day to reprice a purchase so that I can potentially get money back when the price goes down after the sale.Make sure it's a deal by using price tracking sites likeCamelcamelcamel.com, which shows the history of sale prices.Kurts key takeawaysAs we gear up for the holiday shopping season, remember that saving money doesn't have to be a chore. With the right tools and strategies at your disposal, you can enjoy a stress-free shopping experience while keeping your budget intact. Whether you choose cash-back apps, discount tools or retailer-specific offers, there's something out there for everyone. So, why not dive in and start exploring these options?CLICK HERE TO GET THE FOX NEWS APPWhat are some of the absolute best deals you have found using these tools or other methods? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 9 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: AI app helps you turn anything into LEGO models
    Artificial Intelligence Newsletter Fox News AI Newsletter: AI app helps you turn anything into LEGO models Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents By Fox News Staff Fox News Published December 11, 2024 12:15pm EST close Ready to build your own Lego masterpieces with this new tech Turn everyday objects into Lego models. Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Get ready to build your own Lego masterpieces with this new tech- OpenAI releases text-to-video AI model Sora to certain ChatGPT users- The AI-powered grandma taking on scammers Brick My World app (Brick My World)BUILD LEGO CREATIONS : This innovative app is here to make custom Lego creation fun and accessible for everyone, whether youre a seasoned builder or just getting started. By using advanced artificial intelligence and mobile scanning technology, Brick My World opens up a world of creative possibilities.'OUR HOLIDAY GIFT': OpenAI released its text-to-video artificial intelligence model, Sora, this week after the completion of its testing phase. The OpenAI logo is being displayed on a smartphone with the Sora text-to-video generator visible in the background in this photo illustration, taken in Brussels, Belgium, on February 16, 2024. (Jonathan Raa/NurPhoto via Getty Images)GRANNY FIGHTS BACK: Daisy is an artificial intelligence-powered grandma developed by Virgin Media O2 to interact with scammers. When a scam call comes in, Daisy automatically answers and engages the caller in conversation, wasting their time.'I GOTTA FEELING': [will.i.am doesnt think true artists should worry about artificial intelligence. The Black Eyed Peas singer does think people not involved in the creative process in the music industry are the ones who should worry about AI taking away their jobs. Recording artist will.i.am speaks onstage during Day 2 of the 2024 Invest Fest at Georgia World Congress Center on Aug. 24, 2024, in Atlanta, Georgia. (Paras Griffin/Getty Images)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 9 Views
  • WWW.FOXNEWS.COM
    How to delete multiple emails at once on iPhone
    Published December 10, 2024 6:00am EST close 'CyberGuy': How to delete multiple emails at once on iPhone Tech expert Kurt Knutsson shows iPhone users how to easily delete multiple emails and manage their inboxes to reduce digital clutter. Managing your inbox can quickly become a daunting task. Many of us find ourselves drowning in a sea of unread emails, making it challenging to stay organized. Dale from Lowell, Arizona, recently reached out with a common frustration:"My iPhone 13; How do I erase multiple emails from my inbox? Deleting each one individually is time consuming and tedious. Currently 1900 plus."Dont worry, Dale. You're not alone in this struggle. Let's dive into some easy steps to declutter your inbox. If you want to delete multiple emails at once on Android,here's how to do it. Mail app on iPhone (Kurt "CyberGuy" Knutsson)The Mail app method to delete multiple emails on iPhoneThe built-in Mail app on your iPhone 13 offers a straightforward way to delete multiple emails at once:Open theMail appNavigate toyour inbox and tap on itTapSelect in top-right cornerSelect theemails you want to delete by tapping thecircles next to them.For a quick selection, tap the first email, then slide your finger down the list.Once you've chosen your emails, tapTrash at the bottom right. Steps to delete emails in the iPhone Mail app (Kurt "CyberGuy" Knutsson)Bulk deletion: Tackling thousands of emails at once on iPhoneWhen faced with an overwhelming number of emails, try this method:Open theMail appNavigate toyour inbox and tap on itTapSelect in top-right cornerTapSelect All at top-leftHitTrashConfirm your decision by clickingTrash All Steps to bulk delete emails in the iPhone Mail app (Kurt "CyberGuy" Knutsson)The web browser approach to bulk deleting emails on iPhoneFor even more control over bulk deletions, consider using your iPhone's web browser:Open SafariGo to youremail provider's websiteandlog in to your account.Look for anEdit or Select optionChooseSelect All or a similar functionFind theDelete orTrash button and tap itIt will ask you to confirm your decision by clicking Delete all.This method is particularly effective for quickly clearing out large numbers of emails. The web browser approach to bulk deleting emails on iPhone (Kurt "CyberGuy" Knutsson)Set trash or archive as the default on iPhoneTo ensure that deleted emails are automatically sent to your preferred location, follow these simple steps to configure your iPhone settings. This setting helps you efficiently organize your emails by automatically directing deleted messages to the appropriate folder, saving time and reducing inbox clutter.Go toSettingsScroll down and tapAppsClickMailClickMail AccountsSelectYour Account Steps to set trash or archive as the default on iPhone (Kurt "CyberGuy" Knutsson)Scroll down toAccount Settings and click itThen clickAdvancedSelectDeleted Mailbox orArchive Mailboxto streamline your email management Steps to set trash or archive as the default on iPhone (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysManaging a cluttered inbox can feel overwhelming, but with these techniques, you'll be on your way to a more organized inbox. Remember, it's not just about deleting emails. It's about creating habits that prevent inbox overload in the future. Consider setting up filters for recurring emails. By implementing these strategies, Dale and other iPhone users can transform their email management from a tedious chore into a quick and efficient task.What's the most overwhelming digital clutter challenge you're currently facing, and how is it impacting your daily productivity? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 10 Views
  • WWW.FOXNEWS.COM
    Chinese hackers target US telecoms: What you need to know to protect your data
    Published December 10, 2024 10:00am EST close Chinese hackers tried to breach Trump, Vance phones: report Fox News correspondent David Spunt has more on the "sophisticated penetration" of several carriers on "Special Report." U.S. telecom giants are under constant attack from Chinese hackers. A federal investigation has uncovered a massive cyber espionage campaign by the Chinese government, targeting U.S. telecommunications networks to steal Americans' information. A top White House official confirmed that at least eight U.S. telecom companies have been affected by this hacking spree.To combat this, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) have released advice for telecom companies to help them detect and block the hackers while preventing future attacks. I break down the details of this Chinese hacking campaign and share tips on how to keep your data safe. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)What you need to know about the China hacking campaignAccording to the FBI, hackers linked to Beijing have infiltrated the networks of "multiple" telecom companies, gaining access to customer call records and private communications of "a limited number of individuals." Since this is an espionage campaign, theyre not interested in the average Joes texts or call history. Instead, their targets are Americans involved in government and politics.The hackers also tried to copy "certain information that was subject to U.S. law enforcement requests pursuant to court orders," according to the FBI. This suggests they might have been attempting to breach programs like those under the Foreign Intelligence Surveillance Act, which allows U.S. spy agencies to monitor the communications of individuals suspected of working for foreign powers.Earlier this month, Deputy National Security Advisor Anne Neuberger shared new details about the scale of the Chinese hacking campaign. According to Neuberger, the U.S. believes the hackers managed to access communications from senior government officials and prominent political figures.She explained that while the hackers were focused on a relatively small group of individuals, a limited number of Americans phone calls and texts were compromised. Neuberger also mentioned that the affected telecom companies are working to address the breaches, but none have been able to completely remove the Chinese hackers from their networks yet.This campaign is believed to have started a year or two ago, according to theAssociated Press. Authorities suspect a Chinese hacking group known as Salt Typhoon to be behind the operation. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)How are hackers able to access sensitive information?Salt Typhoon managed to access call records and private communications by exploiting decades-old back doors in major telecom providers, including AT&T and Verizon, experts believe."The irony here is that the back doors exploited by the Chinese are, in fact, the same back doors that are utilized by federal law enforcement for purposes of conducting legal surveillance," John Ackerly, CEO and co-founder of Virtru, a data-centric security company, told CyberGuy.The vulnerabilities are a result of the Communications Assistance for Law Enforcement Act (CALEA), a federal law that mandates back doors in critical telecommunications infrastructure. CALEA enables law enforcement agencies to access phone records and metadata, including facilitating wiretaps, as part of authorized investigations."The problem with back doors is simple. They're not selective. A back door created for law enforcement is, by its very nature, a vulnerability in the system. And vulnerabilities, once they exist, can be exploited by anyone who discovers them. Both good guys and bad guys can enter back doors," said Ackerly, who previously served as a White House technology adviser. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)The solution is end-to-end encryptionTo protect private conversations and phone calls, cybersecurity experts recommend using end-to-end encrypted platforms. Jeff Greene, executive assistant director of cybersecurity at CISA, urged Americans to prioritize encrypted communication tools."Use your encrypted communications where you have it," Greene advised, emphasizing the importance of secure platforms. He added, "We definitely need to do that, kind of look at what it means long term, how we secure our networks."An FBI official warned that citizens should be "using a cellphone that automatically receives timely operating system updates, responsibly managed encryption and phishing resistant MFA for email, social media and collaboration tool accounts."However, cybersecurity experts warn that these measures are not foolproof. The term "responsibly managed encryption" is problematic, as it intentionally leaves room for "lawful access," such as the back doors required by CALEA."Its clear that encryption with back doors is not actually responsible at all," Ackerly said. "Its time for the U.S. government to acknowledge and support end-to-end encryption as a stronger protection against foreign adversaries." Illustration of a cybersecurity expert at work (Kurt "CyberGuy" Knutsson)10 ways to protect your personal information against cybersecurity threatsNow that we've discussed the threat, lets take a look at the solutions. Here are 10 ways you can keep your personal information safe.1) Use end-to-end encrypted platforms:For private communications, prioritize platforms that offer end-to-end encryption. This ensures that only you and the intended recipient can access your messages or calls, preventing unauthorized access by hackers or other third parties."Anyone can take control of their own data and protect themselves from security threats by using applications that provide end-to-end encryption. Whether youre emailing, sending messages and files or video chatting, the only way to truly ensure your data is safe from bad actors is to encrypt it as it travels," Ackerly said. "Choose an app or tool that is easy to use, so that you will actually use it."For texting, consider apps likeSignal or WhatsApp. For email services, look for ones that offer easy-to-use end-to-end encryption. These platforms ensure that your private communications remain secure from unauthorized access.See my review of the best secure and private email services here.2) Keep your device's operating system updated:Make sure your cellphone and other devices automatically receive timely operating system updates. These updates often include important security patches that protect against new vulnerabilities exploited by hackers. For reference, see my guide onhow to keep all your devices updated.3) Enable two-factor authentication (2FA):Set up phishing-resistant2FA on your email, social media and collaboration tool accounts. This adds an extra layer of protection, requiring more than just a password to access your accounts, making it harder for cybercriminals to steal your information.4) Use strong antivirus software: Be aware of phishing techniques and remain skeptical of suspicious links, emails or phone calls asking for personal information. Cybercriminals often use these methods to gain access to your sensitive data.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.5) Encrypt sensitive data:Encrypt data on USB drives, SIM cards and laptops to protect information if devices are lost or stolen. Also, be sure to password-protect your sensitive files or folders by followingthese steps.6) Implement strong password practices: Use unique, complex passwords for each account and consider using apassword manager.7) Regularly backup your data: Backing up your data helps protect against data loss from ransomware or device failure. You'll want to back up yourmobile device,Mac andWindows computers.8) Be cautious with public Wi-Fi: Use aVPN (virtual private network) when connecting topublic Wi-Fi networks to encrypt your internet traffic. This makes it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs dont directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies..9) Invest in personal data removal services: Consider services that scrub your personal information from public databases. This reduces the chances of your data being exploited in phishing or other cyberattacks after a breach.Check out my top picks for data removal services here.10) Use identity theft protection: Identity theft protection services monitor your accounts for unusual activity, alert you to potential threats and can even assist in resolving issues if your data is compromised.See my tips and best picks on how to protect yourself from identity theft.Kurts key takeawayTheres no denying that the U.S. is facing a serious cyberattack that puts millions at risk. Whats even more concerning is that hackers continue to exploit telecom providers even after the issue has been made public. The government and the affected companies must prioritize addressing this threat and patching the back doors these cybercriminals are using. Were witnessing one of the largest intelligence compromises in U.S. history.Do you believe the current laws around encryption and lawful access are enough to protect your privacy? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 9 Views
  • WWW.FOXNEWS.COM
    Router VPNs vs device VPNs: Which privacy solution is best for you?
    Published December 9, 2024 6:00am EST close How VPNs shield your identity, secure your financial transactions from theft A VPN could be your secret weapon to protect your identity and finances. VPNs (virtual private networks) are a powerful tool for securing your internet connection. They protect your data by encrypting it, making it harder for hackers or even your internet service provider (ISP) to see what you're doing online. But how should you set up a VPN? Should you install it on each device or run it on your home network through a router? We will break down the pros and cons of both methods to help you make the right decision. Woman using a VPN on her cellphone (Kurt "CyberGuy" Knutsson)How VPNs workVPNs operate through two primary mechanisms: IP address masking and data encryption. When you connect to a VPN, it hides your real IP address by assigning you a new one from their server network, effectively preventing websites and cyber criminals from tracking your location or identifying you based on your IP address.Simultaneously, VPNs encrypt all data transmitted between your device and the internet, rendering it unreadable to anyone who might attempt to intercept it. This encryption process ensures that sensitive information, such as credit card details, remains confidential throughout your online activities. By combining these two powerful features, VPNs create a secure tunnel for your internet traffic, significantly enhancing your online privacy and security.VPN on devices vs. router: What's the difference?Understanding the difference between using a VPN on individual devices vs. setting it up on your router is crucial for maximizing your online security and privacy.VPN on a deviceMost people are familiar with using a VPN app on their phone, laptop or tablet. In this setup, the device connects directly to the internet through the VPN, keeping that device's internet activity secure.VPN on a routerWith a VPN router, instead of installing a VPN on each device, the router connects to the VPN. This means every device connected to your Wi-Fi whether a smartphone, laptop, gaming console or even a smart TV automatically uses the VPN, even if that device doesnt support VPN apps. A home router (Kurt "CyberGuy" Knutsson)Why use a VPN router?There are several advantages to running a VPN directly on your router.1) Protect all the devices on your networkA VPN router ensures that every device on your network is protected, even those that dont support VPNs, like smart home devices or certain game consoles. Once the router is set up with a VPN, it encrypts the internet traffic of all connected devices.2) Set it and forget itInstalling or managing VPN software on every device is unnecessary with a VPN router. Once the router is configured, you can sit back and enjoy a protected internet connection across your entire home network. However, its a good idea to occasionally check that the connection is working properly using tools like DNS leak tests.3) Increased privacyUsing a VPN prevents your ISP from seeing which websites or services youre using. This is particularly useful if youre concerned about privacy or want to access geo-restricted content, such as streaming services like Netflix or gaming platforms. A home router (Kurt "CyberGuy" Knutsson)Are there any downsides to VPN routers?While VPN routers are convenient, they do come with a few potential drawbacks.1) CostMost basic routers provided by your ISP dont support VPN connections. Youll likely need to purchase a more advanced, VPN-compatible router, which can be pricier, starting at around $50 and going much higher for premium models.2) Speed and performanceEncrypting all the traffic in your home network requires processing power. If you have a lot of devices connected at once, a primary router might struggle to keep up. In this case, a higher-end router with more processing power is recommended.3) Less flexibilityWhen you use a VPN app on a device, switching server locations, adjusting security settings or choosing different VPN protocols is easy. Making these changes on a VPN router requires logging into the routers settings, which can be more time-consuming and complicated.How to set up a VPN on a routerSetting up a VPN on yourrouter may seem complex, but it significantly enhances your digital security, especially when paired with a robust router. Heres how to approach this process.Choose a compatible VPN service: Select a VPN provider that supportsrouter installations. Look for services that offer comprehensive guides and customer support to assist you through the setup.Select the right router: Ensure your router is VPN compatible and has strong security features. Opt forrouters that support the latest Wi-Fi encryption standards, such as WPA3, and have built-in firewalls to protect against external threats. This will provide a solid foundation for your VPN connection.Install the VPN: Follow your VPN provider's step-by-step instructions to configure the service on yourrouter. This typically involves entering your login credentials, installing necessary certificates and selecting a server location.Test your connection: Once configured, verify that your VPN is functioning correctly by testing the connection. Ensure that all devices connected to the router are protected by the VPN.Leverage additional security features: Take advantage of your routers features such as guest networks and parental controls to enhance security further. A separate guest network prevents unauthorized access to your main network, while regular firmware updates from the manufacturer help mitigate vulnerabilities.By integrating these steps, you not only set up a VPN but also fortify your home network against potential cyber threats. Image of a VPN being used on a laptop (Kurt "CyberGuy" Knutsson)Should you use a VPN on a router or device?When to use a VPN on a device:If you only need protection on a few devices, installing the VPN directly on your devices might be easier if you mostly use the internet on your phone and laptop.If you want flexibility,using a VPN app lets you quickly switch servers, change settings or disconnect the VPN when needed.When to use a VPN on a router:If you have many devices, a VPN router is ideal if you have many devices connected to your Wi-Fi, especially if some of those devices dont support VPN apps.If you want whole-home protection,a VPN router protects every device on your network, providing seamless security without the need to install apps on each one.Find the perfect VPN softwareWhen selecting a VPN on a device, youll want to choose trusted providers known for robust encryption and no-log policies to ensure your privacy. Whether for sensitive tasks or everyday use, reputable VPN services will boost your security and speed.For the best VPN software, see my expert review of the best VPNs for browsing the web privately on yourWindows, Mac, Android and iOS devices.Kurt's key takeawaysBoth VPN routers and VPN apps have their own strengths, and the right choice depends on your specific needs. A VPN router might be the way to go if youre looking for convenience and whole-home protection. But if you prefer flexibility and more control over individual devices, sticking with a VPN app might suit you better. Either way, a VPN is a great step toward protecting your privacy and securing your online activities.What aspects of online privacy and security are most important to you when browsing the internet at home?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 10 Views
  • WWW.FOXNEWS.COM
    Protecting yourself from Microsoft tech support scams
    Published December 9, 2024 10:00am EST close 'CyberGuy': Protecting yourself from Microsoft tech support scams Tech expert Kurt Knutsson says scammers exploit fears, falsely claim computer issues to access your personal data. Tech support scammers are modern-day con artists, preying on our deepest technological fears and vulnerabilities. Tammy of Flagler Beach, Florida, recently reached out to us with a concerning email:"I think we may have been hacked by Microsoft Windowswe turned off computer after calling the Microsoft number blaring at us telling us to not touch the computer. What do we do???"Were sorry to hear that youre experiencing this issue. Tammy's experience is a classic example of a prevalent tech support scam that has been targeting unsuspecting users. Its important to note that Microsoft will never proactively reach out to you to provide unsolicited PC or technical support.These criminals have evolved their tactics to easily convince you that your computer has a critical problem needing immediate attention.Any communication they have with you must be initiated by you. If you receive a phone call or pop-up window from someone claiming to be from Microsoft, and they tell you that your computer has a problem or has been hacked, its likely a scam. Fake Microsoft support scam pop-up (Kurt "CyberGuy" Knutsson)Red flags scammers use to trick you into believing your computer is compromisedTech support scammers have become master manipulators, using psychological tactics to exploit your fears and vulnerabilities. Here are the six most common warning signs that you're being targeted by a sophisticated tech support scam:Unsolicited contact: Be wary of unexpected calls, emails or pop-ups claiming your device is compromised.Urgency and scare tactics: Scammers often create a sense of panic, claiming hackers could access your devices and data imminently.Requests for remote access: A major red flag is if someone you didn't contact asks to remotely access your computer.Pressure for immediate payment: Be suspicious of demands for payment, especially via non-reversible methods like gift cards, wire transfers or cryptocurrency.Impersonation of reputable companies: Scammers may claim to be from well-known tech companies like Microsoft or Apple.Suspicious pop-up messages: Be cautious of pop-up warnings about viruses or system issues, especially those with countdown timers. Fake Microsoft Windows scam pop-up (Kurt "CyberGuy" Knutsson)Immediate steps to take if you are targetedTo quickly secure your information and minimize potential damage, follow these steps.1) Disengage immediately: Hang up the phone or close any suspicious pop-ups.2) Disconnect from the internet: This can prevent potential remote access by scammers.3) Do not provide remote access: Never give control of your device to unsolicited callers.4) Run a security scan using strong antivirus software: Use reputable, up-to-date, strong antivirus software to check your system. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.5) Change critical passwords: Update passwords for important accounts, especially if you've shared any information.Make sure to create strong, unique passwords. Consider using apassword manager to generate and store complex passwords.6) Enable two-factor authentication: Where possible, enable multifactor authentication.This adds an extra layer of security to your accounts.7) Monitor your accounts: Keep an eye on your financial accounts, email accounts and social media for any unusual activity. If you think scammers have stolen your identity, consider identity theft protection here.Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.One of the best parts of using some services is that they might include identity theft insurance ofup to $1 million to cover losses and legal fees and a white-glove fraud resolution team where aU.S.-based case manager helps you recover any losses.See my tips and best picks on how to protect yourself from identity theft.8) Invest in personal data removal services: Using a data removal service can be an effective additional step to protect your personal information after a potential tech support scam. These services locate and remove your personal information from various online platforms, databases and data brokers. By eliminating unnecessary or outdated information, data removal services minimize your online presence, making it harder for scammers to find and exploit your data.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.9) Contact professionals: If youre unsure about any steps or if the situation seems severe, consider reaching out to a professional IT service.10) Report the incident: Report the scam to your local authorities and theFederal Trade Commission in the U.S. You can also report the scam toMicrosoft directly.Remember, its important to stay calm and take one step at a time. Hacker at work (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysTech support scams are designed to exploit fear and technical uncertainty. Remember that legitimate tech companies will never proactively contact you about computer issues. Always verify support through official channels, and when in doubt, consult with a trusted tech-savvy friend or professional.Have you or someone you know ever been targeted by a tech support scam? Share your experiences and how you dealt with it by writing to us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 11 Views
  • WWW.FOXNEWS.COM
    The AI-powered grandma taking on scammers
    Published December 7, 2024 6:00am EST close How to outsmart scammers using AI Daisy is an artificial intelligence-powered grandma created to interact with scammers. Are you tired of scammers calling your phone, trying to trick you into giving away your hard-earned money?If so, youre not alone.Many people are fed up with the constant barrage of fraudulent calls and messages. But what if you could fight back in a fun and creative way? Enter the world of scambaiting, where people waste scammers' time and resources instead of falling for their tricks. Computer-generated AI-grandma taking on scammers. (Virgin Media O2)What is scambaiting?Scambaiting is when someone interacts with a scammer to waste their time and resources. Some of these online experiences are entertaining and even hilarious to watch. Instead of falling for their sneaky tricks, scambaiters play along, knowing it's a scam, and take on the role of a potential victim to keep the scammers busy. But get this there's now some new technology to do the scambaiting for you. A woman frustrated by a call from a scammer. (Kurt "CyberGuy" Knutsson)Why scambaiting mattersSo, why should we care about scambaiting? This creative strategy offers several compelling benefits. First and foremost, it effectively wastes scammers' time. Every minute they spend on the phone with Daisy is a minute they can't use to target real victims. By keeping them occupied, we can potentially prevent them from scamming someone else.In addition to wasting time, scambaiting raises awareness about common scams. It serves as an educational tool, helping others recognize and avoid falling prey to similar tactics. The more people understand how these scams operate, the less likely they are to become victims. Moreover, watching scammers get flustered sheds light on the lengths these criminals will go to and highlights the importance of staying vigilant against their schemes.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A woman on a phone call with a scammer. (Kurt "CyberGuy" Knutsson)The AI-powered grandma taking on scammers"Hello there! I'm just trying to understand how this prize works. Can you explain it again? I'm not as tech-savvy as I used to be?"That's Daisy, an artificial intelligence-powered grandma developed by Virgin Media O2 to interact with scammers. When a scam call comes in, Daisy automatically answers and engages the caller in conversation, wasting their time. With her friendly personality and quick thinking, she keeps them on the line while gathering useful information about their tactics.Daisy combines various AI models that work together to listen and respond to fraudulent calls instantaneously. She's so lifelike that she has successfully kept numerous fraudsters on calls for 40 minutes at a time. By tricking the criminals into thinking they were defrauding a real person and playing on scammers' biases about older people, Daisy has prevented them from targeting real victims.Now, before you get too excited, Daisy is currently only available for customers of Virgin Media O2 in the U.K., but other companies in the U.S. are beginning to offer similar AI-driven solutions. For instance,Apate.ai has developed AI.Callee, which engages scammers in real-time conversations across various channels. Another U.S. company,Scamnetic, has launched an AI-based scam-detection solution that can be integrated into enterprise platforms to protect consumers from various types of scams.GET FOX BUSINESS ON THE GO BY CLICKING HERE Computer-generated AI-grandma taking on scammers. (Virgin Media O2)Protecting yourself from robocall scamsWhile scambaiting can be a fun way to fight back against scams, the best defense is simply not picking up and answering scam calls in the first place. One effective strategy is to consider investing in personal data removal services that wipe your information from public databases on the internet. By reducing your digital footprint, you can make it more difficult for scammers to contact you in the first place. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurt's key takeawaysThe introduction of AI-powered scambaiters like Daisy marks a new era in the fight against fraud. While it's entertaining to imagine scammers being outwitted by a chatty AI grandma, it's important to remember that the ultimate goal is to protect vulnerable individuals from falling victim to these schemes. As technology evolves, so do the tactics of scammers, making it crucial for everyone to stay informed and vigilant. Whether it's Daisy keeping scammers occupied or individuals taking steps to protect their personal information, every effort counts in the ongoing battle against fraud.CLICK HERE TO GET THE FOX NEWS APPWould you consider trying scambaiting or using AI technology to fight back against scammers, and what are your thoughts on these innovative approaches to protecting yourself from fraud? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 14 Views
  • WWW.FOXNEWS.COM
    Quick fixes to stop your Windows PC from crashing
    close Improve your password security with your Windows PC From face recognition to dynamic lock, there are options you may be unfamiliar with. Are you dealing with a Windows PC or laptop that won't stop crashing? Maybe your PC is constantly freezing or displaying error messages.We know how frustrating a PC that won't work right can be. Luckily, there are some easy ways to fix a Windows PC that is consistently crashing.Today, we'll review nine easy fixes you can do at home if you have a Windows PC that won't stop crashing on you. Let's get into it. A man working on a PC (Kurt "CyberGuy" Knutsson)1. Check all of your cable connectionsWhile it might sound obvious, the first step to troubleshooting a computer that constantly crashes is ensuring everything is firmly plugged in. It's often the most overlooked step, so if you're using a desktop, you'll want to look behind your PC and ensure everything is plugged in. It would be best to try using a different electrical outlet to first rule out any electrical issues in your home.If you feel comfortable opening up your desktop PC, you can also go inside the case and ensure all your PCI connections are firmly plugged in. You'll want to ensure all your cables going to the power supply are firmly connected, and the same is true with the PCI power cables that supply electricity to the GPU and CPU. Wires coming out of a desktop PC tower (Kurt "CyberGuy" Knutsson)2. Make sure your computer isn't overheatingComputer overheating is a common cause of intermittent shutdowns and crashes. If your CPU (central processing unit), essentially the brain of your computer, or graphics card gets too hot, your computer might shut down to ensure the components aren't damaged. If you notice that your laptop or desktop is giving off a lot of heat, or in the case of a laptop, it is hot to the touch, or if you notice your fans running louder than usual, these are all signs of overheating.If your computer is overheating, the first step is to clean it thoroughly. I recommend blowing dust out of the interior fans with compressed air and keeping your PC in an area where it can receive proper airflow. If you have a desktop PC, try not to keep it under your desk. Keeping a PC under a desk can cause issues with dust build-up and lack of airflow. It's best to keep your desktop in a part of your home or office where it can receive a decent amount of airflow. A man working on a PC (Kurt "CyberGuy" Knutsson)3. Boot your PC into safe modeIf your cables are all plugged in correctly and your computer isn't overheating, it's time to boot your Windows PC into safe mode. Booting into safe mode allows you to run your PC with the necessary files and drivers turned on to make the PC run. That way, you can determine if new software or hardware conflicts with your PC, causing it to crash. While in safe mode, you can access Windows error logs and run other diagnostics to figure out what is causing your PC to crash.How to boot into safe mode (Windows 10)There are a few different ways to boot into Windows safe mode, and it is a bit different depending on whether you are using Windows 10 or 11. To start, here's how you can boot into safe mode on Windows 10 from the settings panel:Press theWindows keyClickSettings Steps to boot into safe mode (Windows 10) (Kurt "CyberGuy" Knutsson)ClickSystem Steps to boot into safe mode (Windows 10) (Kurt "CyberGuy" Knutsson)Scroll down and clickRecoveryClickAdvanced Startup - Restart Now Steps to boot into safe mode (Windows 10) (Kurt "CyberGuy" Knutsson)Once your computer restarts, you'll clickTroubleshootClickAdvanced optionsClickStartup settingsClickRestart againYour computer will restart again, and this time, your computer will boot into safe mode.How to boot into safe mode (Windows 11)The process is slightly different if you use a Windows 11 PC instead of a Windows 10 machine. Here's what to do if you are using a Windows 11 PC:Press theWindows key orclick on theStart buttonWhile holding theShift key,click the power icon in the bottom left cornerWhile continuing to hold theshift key, pressrestart Steps to boot into safe mode (Windows 11) (Kurt "CyberGuy" Knutsson)Once your computer restarts, it will automatically boot into safe mode.4. Check the Windows logs for errorsNow that you're in safe mode, you should look at the Windows logs. You can access the Windows error logs through theEvent Viewer. Here's how to access the Windows Event Viewer:Press theWindows icon in the start barSearch forEvent Viewer Steps to boot into safe mode (Windows 11) (Kurt "CyberGuy" Knutsson)Open theEvent Viewer appIn the left panel, double-clickWindows logsClick eitherApplication orSystemApplicationwill show you Windows logs and errors related to applicationsSystem will show you Windows logs and errors related to the operating systemApplicationwill show you Windows logs and errors related to applicationsSystem will show you Windows logs and errors related to the operating system Steps to boot into safe mode (Windows 11) (Kurt "CyberGuy" Knutsson)In both the Application and System, read through and write down theerror code for any errors when your PC last crashed.You can access the error code bydouble-clicking any error in the log.Run a Google search for any error codes that come up.5. Perform an OS updateAn outdated version of Windows can cause conflicts with both your software and even hardware components in your PC. This is a major cause of PC crashes, so you'll want to ensure your Windows operating system is entirely up to date. Here's how to run a system update on Windows:Click theWindows icon in the taskbarClick theGear (Settings) icon in the start menuClickWindows UpdatePress theCheck for Updates button Steps to perform an OS update Steps to perform an OS update (Kurt "CyberGuy" Knutsson)Download and install any new updates available for your PC6. Run an antivirus scanEven if you don't own any antivirus software, you should at least run a scan with the built-in Windows Defender. Here's how to access Windows Defender and run an antivirus scan:Click theWindows icon in the taskbarClick theGear (settings) icon in the start menuClickPrivacy & Security Steps to run an antivirus scan (Kurt "CyberGuy" Knutsson)At the top, clickWindows SecurityClickVirus & Threat protectionClick theScan options button underneathQuick scan Steps to run an antivirus scan (Kurt "CyberGuy" Knutsson)SelectFull scanQuarantine any threats detected during the virus scan.Is Windows Defender enough to protect you?While Windows Defender offers robust, built-in security for Windows users, it has limitations in areas like phishing and spam protection and may not update as swiftly as some premium solutions. To stay protected from malicious links, phishing scams and ransomware, consider investing in strong antivirus software. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.7. Check the hard drive for errorsYou can use the Windows Command Prompt to check your hard drive for errors. If your hard drive has an error, you might need to perform a system restore, which we'll discuss later. For now, here's how to use the command prompt to check for hard drive errors:Click theWindows icon in the taskbarTypeCMD and open theCommand Prompt Steps to check the hard drive for errors (Kurt "CyberGuy" Knutsson)Right-click on the Command Prompt box and clickRun as administratorType sfc/scannow and press enter Steps to check the hard drive for errors (Kurt "CyberGuy" Knutsson)The command prompt will now check your hard drive for corrupt files and replace them. This may take some time. Once the process is complete, and you have errors that cannot be automatically replaced, you will unfortunately need to replace your hard drive and reinstall Windows.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?8. Check for issues with your RAMIssues with your PC's RAM can also cause your Windows PC to crash randomly. More often than not, if you have an issue with your RAM, you'll need to replace the RAM modules on the motherboard. This can be done at home quickly if you have the technical knowledge, but you can also go into any computer shop to get your RAM replaced for a small fee. Here's how to check for issues with your RAM on your Windows PC:At the same time, press theWindows Key + Ron your keyboardThis will execute theRunapplication in WindowsType Mdsched.exe and press enter; this will launch theWindow Memory Diagnostics repair tool Steps to check for issues with your RAM (Kurt "CyberGuy" Knutsson)ClickRestart now and check for memory problemsNow, your computer will run through a memory check, and if you encounter an issue, beware that you might have to replace your RAM.GET FOX BUSINESS ON THE GO BY CLICKING HERE9. Perform a system restoreIf your PC just started crashing, you might be able to fix the issue by performing a system restore. A system restore will restore your Windows operating system to a specific date and time of your choosing. This way, you can restore your OS to a point before the crash begins and troubleshoot from there. It's important to note that when you perform a system restore, your computer will be restored as it was on the date and time you chose. This means you will lose any recent files or settings, so this should be a last-step solution in your troubleshooting process.How to perform a system restoreClick the Windows icon in the taskbarTypesystem restoreClickCreate a Restore Point Steps to perform a system restore (Kurt "CyberGuy" Knutsson)Once thesystem restore wizard opens, you will see a notification telling you what the system restore will do, clicknextSelect a time and date for the system restore and clicknextClickFinishKurt's key takeawaysHaving a Windows PC that won't stop crashing can be a massive headache. Luckily, there's a lot of information out there on how to troubleshoot a PC that just won't stop crashing. I've gone over nine of the most commonly used tips to fix a crashing Windows PC, but there's other reset options out there, many of which require a higher degree of technical ability than what we've gone through today.CLICK HERE TO GET THE FOX NEWS APPWhat do you find most challenging about using a Windows PC today? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 22 Views
  • WWW.FOXNEWS.COM
    Don't get fooled by fake phone updates and notifications
    Published December 8, 2024 10:00am EST close Don't get fooled by fake updates and notifications on your phone Updating apps is essential for maintaining your device's performance. When it comes to updating apps on your phone, caution is key. Michelle from New Jersey recently reached out with a common concern:"When you click on an app on your phone, and you get a message that it needs to be updated, click here, can you trust that this is legit? Or should you close out and go to the App Store?"Great question, Michelle. App updates are essential for maintaining your device's performance and security. They often include bug fixes, new features and security patches that protect against vulnerabilities. However, scammers have become increasingly sophisticated in their tactics, often using fake update notifications to trick you into downloading malware or providing personal information. App Store icon on an iPhone (Kurt "CyberGuy" Knutsson)Identifying red flagsBeing able to spot suspicious update notifications is crucial for maintaining your device's security. Here are some specific signs that an update notification may be fraudulent:1. Unexpected alerts from unknown appsIf you receive a notification from an app you don't recognize, it is best not to engage with it. You should be especially wary of alerts claiming to be from system apps or security software that you didn't install. To verify the legitimacy of the app, check your installed apps list to see if the app actually exists on your device.For iPhoneTap theApp Store icon on your iPhone's home screen.Tap yourprofile icon in the top right corner.SelectApps,then tapMy Appsto see a list of all apps youve downloaded.You will see"All" the apps currently installed on your device listed, and you can also see apps that are not currently installed by tapping"Not on This iPhone."When you tap on"Not on This iPhone," you will see a list of apps that you have previously downloaded or purchased but have since removed from your device.For AndroidSettings may vary depending on your Android phones manufacturer.Tap theGoogle Play Store icon on your Android.Tap yourprofile icon in the top right corner.Select"Manage apps & devices" from the menu options.Tap on the"Manage" tab, then select"Installed" to see all apps currently on your device. You can also check for anyunknown apps here.Regularly reviewing this list of apps helps you stay aware of what is installed on your device and allows you to identify any unfamiliar applications that may pose a security risk.2. Requests for personal informationLegitimate updates will never ask for sensitive data like passwords, credit card information or Social Security numbers. You should be suspicious of any update process that requires you to input personal details. Official updates are typically handled through your device's operating system or app store, which already has your account information. Fake iPhone update notification text (Kurt "CyberGuy" Knutsson)3. Pop-ups asking to subscribe to calendarsPop-ups requesting you to subscribe to calendars can fill your calendar withspam andphishing messages. Legitimate apps rarely, if ever, request calendar access through pop-ups during updates. Therefore, you should be cautious of any unexpected requests for access to your device's features or data.4. Urgent or threatening languageScammers often use fear tactics to prompt immediate action. You should be skeptical of messages claiming your device is at immediate risk or that you'll lose data if you don't update immediately. Legitimate updates are typically communicated in a calm and informative manner without using high-pressure tactics to rush users into making decisions. A man received a fake update notification on his phone (Kurt "CyberGuy" Knutsson)5. Unusual update sourcesBe cautious of updates that direct you to websites outside your official app store. Legitimate updates for mobile apps are typically conducted through the Google Play Store or Apple App Store, which helps ensure that you receive safe and verified software. System updates should always come through your device's built-in update mechanism, like the one below, to maintain security and integrity. Legitimate iOS update (Kurt "CyberGuy" Knutsson)6. Spelling and grammatical errorsOfficial updates from reputable companies are usually well-written and free of obvious errors. If you notice poor spelling, grammar or formatting in an update notification, it can be a sign of a hastily created scam.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?7. Unexpected permissions requestsIf an update suddenly asks for permissions that seem unrelated to the app's function, this could be a red flag. For example, a calculator app shouldn't need access to your contacts or camera. A woman scrolling on her phone (Kurt "CyberGuy" Knutsson)8. Mismatched branding or visual elementsPay attention to the visual details of update notifications. Scammers may use logos or color schemes that are slightly off from the official branding. Look for inconsistencies in font, styling or overall design compared to legitimate notifications you've seen before.Tips for protecting yourself from fake notificationsTo ensure your safety while navigating app updates, here are some simple tips to follow:1. Be wary of email and text alerts; protect yourself with strong antivirus softwareManufacturers will not send you emails or texts prompting you to update your apps. Always treat such messages as suspicious and avoid clicking on any links as they may contain malware. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Close the app and verifyIf you receive an unexpected update notification:Close theapp immediately.Open your device'sofficial app store (Google Play Store for Android or App Store for iOS).Search for the app in question to check forany available updates.This method ensures that you are only downloading updates from legitimate sources.3. Check your device settingsYou can also verify if there are any system updates available by checking your phone's settings:For iPhone: Navigate toSettings > General >Software UpdateFor Android: Go toSettings >System >System Update.Settings may vary depending on your Android phones manufacturerRegularly checking for system updates can also enhance your device's overall security. Before performing major updates, especially system updates, ensure that yourdata is backed up. This protects your information in case something goes wrong during the update process.4. Enable automatic updatesMost smartphones allow you to enable automatic updates for apps and system software. This feature helps ensure that your applications are always up-to-date without requiring manual intervention.For iPhoneOpen theSettings app.TapGeneral.SelectSoftware Update.TapAutomatic Updates and turn it on by swiping the button to the right.Go back toSettings, tapApp Store.In the Automatic Downloads section, turn onApp Updatesby swiping the button to the right.For AndroidSettings may vary depending on your Android phones manufacturerOpen theGoogle Play Store app.Tap your profile iconin the top right corner.SelectManage apps & devices.Tap on theManagetab, then selectInstalled.Tap thethree vertical dots in the top right corner and selectAuto-update apps.Choose your preferred option:Over any network orOver Wi-Fi only.GET FOX BUSINESS ON THE GO BY CLICKING HEREEven if you have automatic updates enabled, it's a good practice to manually check for updates periodically. This ensures that you dont miss any important updates that might not have been automatically installed.5. Verify sourcesAlways ensure that updates are coming from verified sources. Only download software from official websites or app stores to avoid malware and phishing attempts.6. Monitor app permissionsAfter updating apps, review the permissions they request. If an app asks for permissions that seem unnecessary for its function, consider whether you want to keep it installed.7. Uninstall unused appsRegularly review and uninstall apps that you no longer use. This reduces potential vulnerabilities and keeps your device clutter-free.For iPhoneFindthe app you want to uninstall on your home screen.Press and hold the app icon until a menu appears, then tapRemove App.SelectDelete App to confirm.For AndroidFind theapp you want to uninstall in your app drawer or home screen.Press and hold theapp icon until a menu appears, then tap Uninstall.TapOK to confirm the uninstallation.Kurt's key takeawaysWhile keeping your apps updated is crucial for security and performance, it's equally important to approach update notifications with skepticism. Verifying through official channels is always the safest route. By following these tips and staying informed about potential scams, you can protect yourself from cyberthreats while enjoying the benefits of updated applications.CLICK HERE TO GET THE FOX NEWS APPWhat specific measures do you think the App Store and Google Play should implement to better protect users from fraudulent update notifications? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 22 Views
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: 'Trump will be very good at' AI infrastructure
    Sam Altman, chief executive officer of OpenAI, during a panel session on day three of the World Economic Forum (WEF) in Davos, Switzerland, on Thursday, January 18, 2024. (Stefan Wermuth/Bloomberg via Getty Images / Getty Images) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- OpenAI CEO Sam Altman looking forward to working with Trump admin, says US must build best AI infrastructure- Meta to build $10 billion AI data center in Louisiana as Elon Musk expands his Tennessee AI facility- LA Times owner announces planned AI-powered 'bias meter' for stories, columnsREADY AND WILLING: Sam Altman, CEO of OpenAI, the creator of ChatGPT, on Sunday said he is looking forward to working with the incoming Trump administration, adding that he thinks President-elect Trump will succeed at helping to make America a world-leading force in artificial intelligence (AI) infrastructure.'NEW CHAPTER': Louisiana Gov. Jeff Landry praised Metas plans to build a new artificial intelligence data center in the Pelican State, calling it the "largest private capital announcement." Louisiana Gov. Jeff Landry. (Getty Images)PRESS FOR FAIRNESS: LA Times owner Dr. Patrick Soon-Shiong announced the upcoming AI feature on Wednesday in an interview with conservative commentator and newly appointed Times editorial board member Scott Jennings on "The Mike Gallagher Show," which Jennings was guest-hosting. Los Angeles Times owner Dr. Patrick Soon-Shiong explains what direction he wants to take the paper. (Patrick T. Fallon / AFP | Marco Tacca/Getty Images | Fox News Digital)'NOT THAT WORRIED': Elon Musk's possible political influence under the incoming Trump administration is not a concern for OpenAI CEO Sam Altman, who dismissed claims that the X owner would use lawfare to stifle competition. ((Getty Images / Getty Images))NO TENNIS PARTNER?: Imagine having a personal tennis coach who never gets tired, always hits the perfect shot, adapts to your skill level and is available 24/7. Enter the PongBot, a groundbreaking artificial intelligence-powered tennis robot that's turning heads in the tennis world. AI tennis robots (PongBot)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff.
    0 Comments 0 Shares 27 Views
  • WWW.FOXNEWS.COM
    Struggling to hear TV dialogue? Try these simple fixes
    Published December 7, 2024 10:00am EST close Audiologist offers tips for veterans to protect their hearing health Hearing loss and other complications are prevalent among U.S. military veterans. Audiologist Dr. Tom Tedeschi shares why it's such a big issue and how vets should properly care for their ears. Have you ever found yourself needing to constantly turn the volume up on your TV because it sounds like the actors onscreen are speaking in whispers, but then whenever action is onscreen, your TV feels deafening? It's not just you.This is one of the most common issues people have with their TV audio, but, fortunately, you can change a few settings on your TV to make the dialogue sound clearer.Read on for three easy fixes to help your TV audio sound better.1. Check out your TV's audio settings A viewer adjusting TV audio settings with a remote control. (Kurt "CyberGuy" Knutsson)WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Most modern TVs feature preset audio settings that you can adjust on the fly to make things sound better, depending on whether you're gaming, watching a live concert or watching a slow-burn drama. Too much bass will often obscure spoken dialogue in TV shows and movies, and I suggest going through your TV's preset audio settings to see if you can make the audio clearer. Most TVs feature a movie, music and standard mode for TV audio. You can find your TV's audio presets by navigating to the settings from your remote and selecting "sound."Some TVs will also feature audio presets explicitly designed for dialogue. Check to see if you have a setting for "Dialogue," "News," "Speech" or even "Speech Boost" in your TV audio settings. Any three of these should help your TV dialogue come through more clearly. You might also want to consider disabling settings for surround sound or bass boost, as these can cover up the sound of dialogue by increasing the bass too much.Increasing the treble might be worth it if you have access to EQ settings on your TV and are struggling to hear TV dialogue. It's an easy fix that can improve audio quality without taking too much away from non-dialogue sound in a movie or TV show.2. Adjust dynamic range compression A floor-standing speaker. (Kurt "CyberGuy" Knutsson)Dynamic range compression, or "volume leveling," is useful for tailoring audio sound to personal needs. Volume leveling reduces the gulf between the loudest and quietest sounds onscreen, making it easier to hear and understand onscreen dialogue, especially in action movies, where the dialogue is often much quieter than the preceding action sequence. You'll find the settings for volume leveling or dynamic range compression in your TV audio settings, which, on most TVs, you can access directly from the remote.My TV features volume leveling, and I love to use it when I watch TV late at night at a low volume. It helps me to understand everything easily without having the speakers loud enough to wake anyone else up. It's also a great way to keep the audio level when commercials come on if you watch cable.3. Look into speakers or a soundbar A speaker. (Kurt "CyberGuy" Knutsson)GET FOX BUSINESS ON THE GO BY CLICKING HEREThe default speakers built into TVs aren't the best. While a few high-level TVs come with a built-in soundbar, you'll still have the best experience with your own independent speakers or a soundbar. If you followed the two tips above but are still having trouble hearing movie or TV dialogue, it might be time to look into and invest in a set of speakers or, if you want a single unit,a soundbar.I prefer using a soundbar with a TV over speakers for a cleaner setup because they often come with built-in subwoofers that enhance the bass, making action scenes and music sound more immersive. Additionally, modern soundbars are sleek and can easily blend with your home decor. Many of them also support advanced audio technologies like Dolby Atmos, which provides a surround sound experience without the need for multiple speakers scattered around the room.4. Connecting headphones to your TVIf you're having trouble hearing dialogue clearly while watching TV, connecting headphones can provide a private listening experience that enhances audio clarity. Heres how to easily connect both wired and wireless headphones to your TV:Check for a 3.5mm jack: Most TVs, especially older models, have a headphone jack located on the back or side panel. If your TV has this port, simply plug in your wired headphones for instant audio.Using adapters: If your TV lacks a headphone jack but has RCA outputs (the red and white ports), you can use an RCA-to-3.5mm adapter to connect your headphones.Bluetooth connection: Many modern TVs support Bluetooth. To connect:Put your headphones in pairing mode (usually by holding down a button until a light blinks).Navigate to the TV's settings menu, find the Bluetooth option, and activate it.Select your headphones from the list of available devices to pair them.Bluetooth transmitter: If your TV doesnt have Bluetooth, consider using a Bluetooth transmitter. This device plugs into the TVs audio output (like the headphone jack or RCA ports) and sends audio wirelessly to your Bluetooth headphones.Media streamers: If you use devices like Roku or Apple TV, they often support Bluetooth connections for headphones, allowing you to listen privately through those devices instead.By connecting headphones, you can enjoy clearer dialogue without disturbing others, making it easier to follow along with your favorite shows and movies.5. Explore Professional-Grade Hearing solutionsIf you're consistently struggling to hear dialogue on your TV, it might be time to consider professional-grade hearing solutions. For those with mild to moderate hearing loss, products like theAirPods Pro 2 can double as hearing aids with customizable sound settings designed to enhance speech clarity. These devices are particularly useful when paired with your TVs Bluetooth, allowing for a clear and immersive listening experience.For more severe hearing loss,our top hearing aid pick offers advanced technology tailored for the hearing-impaired. This device uses cutting-edge dual-processing to separate speech from background noise, delivering exceptional clarity. Designed for comfort and discretion, these nearly invisible hearing aids fit snugly behind or inside the ear, ensuring a seamless and natural listening experience.The best hearing aids today featureBluetooth accessibility and user-friendly smartphone apps, allowing you to adjust settings, switch modes and even take calls directly through the device. Along with innovative technology, many options also come with access to expert support from licensed specialists, either in person or virtually, ensuring a personalized experience and ongoing assistance.Investing in a professional-grade hearing aid can significantly improve your ability to hear dialogue clearly, transforming your TV-watching experience into a more enjoyable and stress-free activity.Kurt's key takeawaysIf you find yourself straining to catch every word during your favorite shows, you're not alone. Many people struggle with audio clarity, but by implementing these simple fixes, you can significantly enhance your TV viewing experience. Whether it's adjusting your TV's audio settings, utilizing dynamic range compression, investing in better speakers or soundbars, or connecting headphones for a more personal listening experience, there are effective solutions at your fingertips.CLICK HERE TO SIGN UP FOR THE ENTERTAINMENT NEWSLETTERHave you ever invested in external audio equipment, such as soundbars or speakers? If so, how has that changed your viewing experience? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 26 Views
  • WWW.FOXNEWS.COM
    Get ready to build your own Lego masterpieces with this new tech
    Tech Get ready to build your own Lego masterpieces with this new tech Discover your full creativity with this cutting-edge Lego technology Published December 6, 2024 6:00am EST close A bunch of Lego fanatics use a whopping 342,817 Lego Technic pieces to build a sports car Lego and McLaren collaborated on a fully drivable, life-sized replica of the McLaren P1 hypercar made almost entirely out of Lego Technic pieces. Imagine being able to turn any object into a Lego masterpiece with just your phone.Sounds cool, right?Well, thats exactly what Brick My World offers.This innovative app is here to make custom Lego creation fun and accessible for everyone, whether youre a seasoned builder or just getting started. By using advanced artificial intelligence and mobile scanning technology, Brick My World opens up a world of creative possibilities. Brick My World app. (Brick My World)From scan to creation: The effortless Lego building processThe process of creating Lego models withBrick My World is pretty simple. First, you snap a photo of any object using your Android or iPhone. Next, you will brick it, as they call it, with the app transforming the scan into a Lego model. Finally, you can build it by following the detailed instructions generated by the app, bringing your creation to life.Gone are the days when advanced 3D modeling skills were necessary or when building custom models required painstaking manual design. Brick My World makes custom Lego creation accessible to everyone, regardless of your technical expertise. Brick My World app. (Brick My World)The technology behind the magicBrick My World combines several cutting-edge technologies:Mobile scanning:Utilizes ARCore (Android) and ARKit (iOS) for precise object capture.Photogrammetry: Creates detailed 3D models from 2D scans.Voxelization: Converts 3D models into brick-compatible structures.AI optimization: Refines the model for accuracy and structural integrity. Brick My World app. (Brick My World)Endless possibilitiesWithBrick My World, your creativity knows no bounds. Create a scale model of your house, immortalize your pet in bricks or craft unique souvenirs from your travels. The app handles models of various sizes, from small objects using 500-1,000 bricks to larger creations requiring several thousand pieces. Creations by Brick My World app. (Brick My World)Sourcing your bricksWorried about finding the right pieces? Brick My World has partnered with BrickOwl, an independent Lego marketplace. The app generates a detailed parts list, allowing you to easily source the bricks you need for your custom creation.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Brick My World app. (Brick My World)The team behind the innovationBrick My World is the brainchild of a diverse team of Lego enthusiasts and tech innovators. Their combined expertise in software development, AI engineering and UX design has resulted in this revolutionary app.GET FOX BUSINESS ON THE GO BY CLICKING HEREThe team has ambitious plans for the future, including adding support for non-traditional bricks (plates, slopes, transparent pieces), incorporating wheels and other specialized elements, and expanding the app's capabilities based on user feedback and technological advancements. A woman building her creation with Lego bricks. (Brick My World)The Brick My World Kickstarter campaignThroughout theKickstarter campaign, supporters are being offered exclusive early-bird pricing for lifetime access to the premium version of the app, allowing them to be among the first to experience this groundbreaking tool. The funds raised will be instrumental in further developing the app's features and expanding its capabilities, including the addition of non-traditional bricks and enhanced design options.The overwhelming support from backers demonstrates a collective desire to make custom Lego creation accessible to all. As Brick My World moves forward, the team is committed to delivering on its promises and pushing the boundaries of what can be achieved in the world of Lego building. Stay tuned for updates on new features and enhancements as they continue to innovate and inspire creativity in builders everywhere. Brick My World app. (Brick My World)Kurt's key takeawaysBy making the design process accessible to everyone, Brick My World opens up new possibilities for creativity and expression through Lego. Whether you're a seasoned builder or new to the world of bricks, this app promises to bring your ideas to life in a way that's both fun and rewarding.What unique objects would you love to see transformed into Lego creations using the Brick My World app? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 18 Views
  • WWW.FOXNEWS.COM
    Dont scam yourself with the tricks hackers dont want me to share
    By Kim Komando The Kim Komando Show Published December 6, 2024 3:07pm EST close CEO reveals top tips for avoiding scams this holiday giving season Avoid scammers and know who you are donating to this giving season. Mary Hagen, a professional fundraiser and CEO of Colossal, is sharing her top three tips for supporting charitable organizations this holiday. You're pulling your hair out, trying to fix something on your computer. You Google it and find what looks like a helpful website or a tutorial with easy step-by-step instructions.Phew, youre finally solving your problem, but hold up! Youve just walked into a "scam-yourself" attack. Cybercreeps use this clever strategy to trick you into compromising your tech so they dont have to do the dirty work.BIOMETRIC DATA: IS IT SAFE TO HAND IT OVER TO ANY COMPANY THAT ASKS?Im giving away a $500 Amazon gift card.Enter here, no purchase necessary!How bad is it?Bad. Really bad. "Scam-yourself" attacks shot up614% in the third quarter of this year alone. Lumma Stealer, the top data-stealing malware type that grabs banking info and browser extensions, spiked by 1,154%. A 12-year-old boy types as he uses a laptop computer. (Matt Cardy/Getty Images)Why do these scams work so well? When somethings broken, our instinct is to rush and fix it as quickly as possible. Now, add to this the fact youre going through the steps yourself so it feels like youre in control. Thats exactly what makes these tricks so dangerous.Scammers are also shockingly good at mimicking trusted sources with professional-looking websites or tutorials, making it easy to believe youre on safe ground. Add frustration and impatience to the mix, and its no wonder so many folks take the bait.TALK TECHY TO ME: GET YOUR WORK DONE FASTER WITH THIS PRO TIPRELATED:How to spot a fake retail website before you buyHow they snag youFake CAPTCHA:You verify ("Im not a robot"), then youre asked to download a README file for instructions. Those instructions install malware.YouTube tutorials:You click a download link in the description of a YouTube video that promises to fix your tech issue. You guessed it! Its malware in disguise.ClickFix scams:You copy and paste commands into your computer while following a step-by-step guide. Oops Youve commanded it to obey its new hacker overlords.Phony updates:Quick! A pop-up says you need to install a security update right now! Its malware pretending to be your app, operating system or browser. Computer code on a screen with a skull representing a computer virus / malware attack. (iStock)How to protect yourselfThese scammers are savvy, but you can outsmart them.Think twice before downloading: If a tutorial tells you to turn off antivirus software or download a random link, bail. Rely on big names like Google, Apple and Microsoft that publish steps for help online or, you know, me!Check URLs and sources:Cybercriminals mimic legitimate sites. Always double-check the web address, especially when youre looking at updates or troubleshooting guides. If the URL feels off, trust your gut and close it.3 SECURITY AND DATA CHECKS YOU SHOULD DO ONCE A YEARBe careful what you copy and paste:Never copy commands from unknown sources into your computers terminal or command prompt. Thats a classic malware delivery tactic.Update the right way:Dont click random pop-ups to update your software. Always go through your device settings or the app store.RELATED: Hackers have a sneaky trick to get you to click their fake links -See it in actionLets say the worst happens. A person is pictured using Google on their laptop. (Serene Lee/SOPA Images/LightRocket via Getty Images)Despite being careful, you fell for it. Dont panic, just act fast to limit the damage:Run a virus scan: Use antivirus software you trust to detect and remove any malware installed on your device. The free stuff isnt good enough anymore.Change your passwords: Update passwords for any accounts you suspect are compromised. Email and financial accounts should be your first priority. And no password reusing! Every one should be unique. Yes, I know its a pain.Monitor your bank accounts: Keep an eye on your accounts for unauthorized charges or transactions. Notify your bank immediately if you see anything suspicious. I have the alerts in my banking app turned on so I get a buzz every time something out of the ordinary happens.Check for unusual activity: Look for strange logins or changes in your online accounts, too. Many sites and services have a section in the settings where you can see what devices are logged into your accounts and where theyre coming from.Reinstall your system if necessary: You may need to reset your device or reinstall your operating system.Steps here to complete a factory reset. Please, please back up your data first.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours orget the free podcast.Daily newsletter:Join 559,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "Kim Komando Today" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.
    0 Comments 0 Shares 17 Views
  • WWW.FOXNEWS.COM
    8 phishing email scams to watch out for this holiday season
    Published December 5, 2024 10:00am EST close Windows bug leaves computer Wi-Fi vulnerable to hackers Kurt The Cyberguy Knutsson explains how to keep your Windows computer safe and security risks of online retail giant Temu. The holiday season is upon us, bringing joy and celebration. But it also comes with a surge in cybercrime. As we focus on shopping and connecting with loved ones, scammers are hard at work using phishing emails to trick us into revealing personal and financial information.These deceptive messages often look like theyre from trusted sources such as banks or delivery services, making it easy to fall for their traps.Below are some phishing attempts that have ended up in CyberGuy's inboxes. By examining these examples of fake phishing emails, youll be better equipped to spot the red flags and protect yourself from potential scams this holiday season. A woman typing on her laptop. (Kurt "CyberGuy" Knutsson)Apple free iPhone fake email Apple free iPhone fake email. (Kurt "CyberGuy" Knutsson)This phishing email claims to be from Apple and promises you a free iPhone 15 Pro.It says, "NO CATCH, NO COST, WIN IN MINUTES." It uses the official Apple logo and the word FREE in capital letters to catch your attention. It asks you to confirm your shipping address to receive your prize and says, "Just answer a few questions, WIN a iPhone 15 Pro. It is that simple!"It even shows you a picture of an iPhone 15 to make it look authentic. Youll notice it has two green buttons for you to click that say, "GET STARTED."TEMU fake phishing email Temu fake phishing email. (Kurt "CyberGuy" Knutsson)This scammer tries to fool you by using the words "Temu Confirmation," which sounds like a legitimate email confirming that your package is on its way. They urge you to click on the link that says, "Please Confirm Receipt," implying that you need to do so to receive your package.They also add a deceptive message that says, "If you cannot see the images below, Click show images," highlighted in red. This is another way to trick you into clicking on the link.Moreover, they use a sneaky tactic of labeling the message as "This message is from a trusted sender" and highlighting it in green, as if to reassure you that it is safe and authentic.TEMU fake survey email Temu fake survey email. (Kurt "CyberGuy" Knutsson)This email is a fake one that tries to imitate the Chinese shopping platform Temu.It uses the phrase "YOUR OPINION IS IMPORTANT!" in capital letters to get your attention. It then offers you a tempting reward: "a pallet of products from TEMU" with a picture to make it look real. It asks you to take a short survey to claim your reward by clicking on the big orange button that says "CLICK HERE" in capital letters. Dont do it!Target fake giveaway email Target fake giveaway email. (Kurt "CyberGuy" Knutsson)The scam email pretending to be from Target wants you to believe that you are a lucky winner.It uses the words "GIVEAWAY ENTRY WINNER" in large and bold capital letters.It also puts "Final notice" in the subject header, giving you a sense of urgency. The email asks you to take a short survey about your Black Friday shopping experience to claim your prize and wants you to click on the GET STARTED button. Dont do it.How scammers try to trick you with a series of urgent messagesAs youll see in the "Delivery" messages below, the scammers are getting clever by sending aseries of emails to make you think that you have a real package on its way to you, and/or you keep missing the delivery of this package. The emails say things like "We tried delivering your package," "Uncompleted Dispatch," "Third attempt," "Delivery unsuccessful" and "Your order will be canceled in the next 24 hours." Fake shipping email. (Kurt "CyberGuy" Knutsson)These emails are designed to create a sense of urgency and pressure you into clicking on the links that they provide. They want you to think that this company is really trying to reach you, so it must be real.But its a scam! However, these links are not from legitimate delivery companies but from scammers who want to steal your information or infect your device. If you are expecting a package, check the tracking number and the senders address carefully. Do not click on any links or attachments that you do not recognize.UPS fake delivery notification emailThis email claims to be from UPS, but it is actually a scam. It uses the UPS logo and colors to look authentic and is designed to trick you into clicking on malicious links. It starts with the alarming phrase "Delivery Unsuccessful" and tells you that you have one package waiting for delivery.It then asks you to confirm your shipping details by clicking on either the "CONTINUE" or the "SCHEDULE YOUR DELIVERY" buttons, both in capital letters. Dont do it!UPS fake order pending email UPS fake order pending email. (Kurt "CyberGuy" Knutsson)This is another email pretending to be from UPS. It uses the words "order pending" to catch your attention, and it shows a picture of a package to make you think you have a delivery.It then tells you that your parcel is stuck at a distribution center because you need to pay more postage. It asks you to go to a link to pay the fee. And it warns you that you have only 48 hours to do so, or else your package will be returned to the sender. It tries to create a sense of urgency by making you click on the yellow button that says "SCHEDULE FOR DELIVERY" in capital letters. Dont do it! Fake delivery email. (Kurt "CyberGuy" Knutsson)Fake Rachel Ray Cookware Set scam disguised as Kohls emailOne of the phishing scams we encountered recently is an email claiming that you've won a Rachel Ray Cucina Cookware Set. This email is particularly deceptive because it appears to come from a reputable retailer, Kohl's, but there are several red flags to watch out for. The email falsely claims to be from "Kohl's Department" instead of the official "Kohl's." This slight alteration is a common tactic used by scammers to trick recipients into believing the email is legitimate.The email's reply-to address is tech@student.lvusd.org, which is clearly unrelated to Kohl's. Official emails from Kohl's would not use a student email address. The message includes phrases like "You have won a Rachel Ray Cucina Cookware Set" to create a sense of urgency and excitement, prompting you to click on the provided link without proper verification. Fake Kohls email. (Kurt "CyberGuy" Knutsson)Additional red flags to spot phishing emailsAs you can see, phishing emails can be hard to distinguish from genuine ones, especially during the busy holiday season when you may receive many emails from various sources. However, there are some additional red flags beyond the ones we've already mentioned that can help you identify a fake email. Here are some of them:Check the senders address and domain name. Fake emails often use spoofed or similar-looking addresses and domain names to deceive you. For example, an email from support@amaz0n.com or info@fedex.delivery.com is likely a phishing attempt. You'll notice in the Apple phishing email below the email address has just a bunch of letters and numbers. Always verify the senders address and domain name before opening or responding to an email.Check the spelling and grammar. Phishing emails often contain spelling and grammar errors or use poor or unnatural language. For example, an email that says, "Dear Customer, Your order has been shipped. Please confirm your delivery address by clicking here." It is suspicious because it does not address you by name, uses a generic greeting and asks you to click on a link. Always read the email carefully and look for any mistakes or inconsistencies.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Check the links and attachments. Fake emails often contain links and attachments that lead to malicious websites or download malware to your device. For example, an email that says, "You have won a $100 gift card from Walmart. Click here to claim your prize." It is likely a scam. On a laptop or desktop, always carefully hover your mouse over the links and check the URL before clicking on them, and never open or download any attachments from unknown or suspicious sources.How to handle spam emailsUse strong antivirus software: The first and most crucial step to protect yourself from accidentally clicking on fake links in spam emails is to have strong antivirus software installed on your device. This software can detect and block malicious emails and links, providing an extra layer of security.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.Do not open or reply to spam emails.This can confirm your email address to the sender and encourage them to send you more spam. It can also expose you to malicious links or attachments that can harm your device or data.Mark spam email as junk or spam. Most email providers have afeature that allows you to flag spam emails and move them to a separate folder. This can help you filter out spam emails from your inbox and also improve the spam detection of your email provider.Do not share your email address publicly or with unknown sources.This can reduce the chances of your email address being collected by spammers. You can also use a disposable oremail alias for signing up for online services that you do not trust or need.Use a personal data removal service: Scammers can obtain your information from various online sources, including data brokers, people search sites and public records. Using a data removal service can help reduce your digital footprint, making it harder for scammers to access your personal information. This proactive step can be crucial in preventing identity theft and minimizing the chances of falling victim to scams during the busy holiday season.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.What to do if you accidentally click on a link or open an attachment from a fake emailIf you realize that you have clicked on a link or opened an attachment from a fake email, dont panic. Here are some steps that you can take to minimize the damage and protect yourself:1. Disconnect your device from the internet.This will prevent any further communication or data transfer between your device and the malicious website ormalware. You can do this by turning off your Wi-Fi or unplugging your ethernet cable.2. Scan your device for malware. Use a reputableantivirus software to scan your device and remove any potential threats. Having good antivirus software actively running on your devices will alert you of any malware in your system, warn you against clicking on any malicious links in phishing emails, and ultimately protect you from being hacked. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.3. Change your passwords. If you have entered or provided any passwords or personal information on the malicious website, you should change them as soon as possible. Consider using apassword manager to generate and store complex passwords.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. You should alsoenabletwo-factor authentication for your online accounts, which adds an extra layer of security by requiring a code or a device confirmation in addition to your password.5. Monitor your accounts and credit reports.If you have entered or provided any financial information on the malicious website or link you clicked on, you should monitor your bank accounts, credit cards and credit reports for any suspicious or unauthorized activity.6. You should alsocontact your bank or credit card company and inform them of the incident. You may need to cancel or freeze your cards or accounts to prevent any further fraud.7. Report the phishing email.You should also report the phishing email to the senders legitimate organization, such as your bank, retailer or delivery service, and to the authorities, such as theFederal Trade Commission (FTC) or theAnti-Phishing Working Group (APWG). This will help them to take action and prevent others from falling for the same scam.8. Use identity theft protection servicesif you entered your personal information on any links you clicked on or websites that you were directed to. Identity theft protection companies can monitor your personal information (home title, Social Security number, phone number, email address) and alert you in the event they become breached. It can also alert you if any of these are being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft.Kurt's key takeawaysUnfortunately, as the holiday season unfolds, cybercriminals are also getting into the "holiday spirit" by increasing their efforts to exploit your trust and distractions. By staying alert and applying the tips weve discussed, you can enjoy the season without falling victim to their schemes. Remember, phishing emails are designed to play on your emotions whether it's excitement, urgency or curiosity. Always take a moment to verify the authenticity of any message before clicking on links or sharing personal information. When in doubt, reach out directly to the company or service in question through its official website or app.CLICK HERE TO GET THE FOX NEWS APPDo you feel that companies are doing enough to protect consumers from phishing scams? Why or why not? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments 0 Shares 29 Views
More Stories