Fox News
Fox News
Welcome to the official Fox News Facebook page. Get breaking news, must see videos & exclusive interviews from the #1 name in news.
  • 1 Sassen gefällt das
  • 463 Beiträge
  • 2 Fotos
  • 0 Videos
  • 0 Vorschau
  • News
Search
Jüngste Beiträge
  • WWW.FOXNEWS.COM
    5.5 million patients' information exposed by major healthcare data breach
    close 'CyberGuy': This year’s most devastating data breaches Kurt Knutsson: Data breaches in 2024 exposed info of millions, stressing the need for better cybersecurity. Healthcare seems to be the favorite target of attackers this year. It's been only four months, and we've already seen some of the biggest data breaches in the sector. Recently, news about the Blue Shield of California data breach came to light, leaking the personal data of 4.7 million people. But if that wasn’t enough, Connecticut’s largest healthcare system, Yale New Haven Health, has now revealed that a data breach affected more than 5.5 million people. The information leaked included patient names, dates of birth, postal and email addresses, phone numbers and more.Join the FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals — plus instant access to my  Illustration of a hacker at work. (Kurt "CyberGuy" Knutsson)What you need to knowAccording to a legally mandated disclosure with the U.S. Department of Health and Human Services, Yale New Haven Health experienced a cyberattack on March 8 that allowed malicious hackers to obtain copies of patients' personally identifiable information as well as some healthcare-related data.Yale New Haven Health is a nonprofit healthcare system based in New Haven, Connecticut. It includes five acute-care hospitals, a medical foundation, and a network of outpatient facilities and multispecialty centers across Connecticut, New York and Rhode Island.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?In a notice posted on its website, the healthcare system said the stolen data varied by individual but could include names, dates of birth, postal and email addresses, phone numbers, race and ethnicity information, Social Security numbers, types of patients and medical record numbers. Reportedly, the number of affected individuals may still change as investigations continue. Importantly, electronic medical record systems and treatment information were not accessed, and no financial account, payment or employee HR information was involved. This is not the first time healthcare systems have been in the crosshairs of cybercriminals. In recent years, attacks on institutions like UnitedHealth and Ascension Health have led to months of operational disruption, massive financial costs and prolonged investigations. Illustration of a doctor looking at data on a phone. (Kurt "CyberGuy" Knutsson)What Yale New Haven Health is doingYale New Haven Health brought in cybersecurity firm Mandiant to assist with the investigation and said a rapid response helped contain the incident and prevent any disruption to patient care. The organization noted that it regularly updates and strengthens its systems to protect sensitive data and will continue those efforts. Notification letters began going out to affected individuals on April 14, and complimentary credit monitoring and identity theft protection services have been offered to those whose Social Security numbers were compromised.The breach could have serious consequences for those impacted. The stolen data includes highly sensitive information that can be used for identity theft, financial fraud, phishing attacks or targeted scams. Healthcare data is especially valuable on the black market because it can be exploited for long periods without easy detection. Even if Social Security numbers or medical information aren’t misused right away, the long-term risk for affected individuals remains significant.We reached out to Yale New Haven Health (YNHHS), and a health system spokesperson said in part:"We take our responsibility to safeguard patient information incredibly seriously, and we regret any concern this incident may have caused. We are continuously updating and enhancing our systems to protect the data we maintain and to help prevent events such as this from occurring in the future. For more information on this incident, patients may visit YNHHS’ website at ynhhs.org or call our dedicated, toll-free call center at 1-855-549-2678, Monday through Friday, between 9:00 am and 9:00 pm Eastern Time, excluding major U.S. holidays."GET FOX BUSINESS ON THE GO BY CLICKING HERE A healthcare employee working on a laptop. (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from insurance data breachIf your information was part of the Yale New Haven Health breach or any similar one, it’s worth taking a few steps to protect yourself.1. Consider identity theft protection services: Since the Yale New Haven Health data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, social security number, and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft. 2. Use personal data removal services: The Yale New Haven Health data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.3. Have strong antivirus software: Yale New Haven Health hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses..The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts. Kurt’s key takeawayWhile Yale New Haven has been working with security experts to contain the breach and notify those affected, it is troubling that hackers were able to access the data of 5.5 million individuals before the organization detected the intrusion. The incident highlights a deeper issue, revealing gaps in the security infrastructure that many healthcare institutions are still not adequately addressing.CLICK HERE TO GET THE FOX NEWS APPDo you think companies are investing enough in their cybersecurity infrastructure? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 24 Ansichten
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: The school where AI runs the classroom
    close Texas private school integrates AI, reports students learning 'faster' Alpha School co-founder Mackenzie Price and a junior at the school Elle Kristine join ‘Fox & Friends’ to discuss the benefits of incorporating artificial intelligence into the classroom. Welcome to Fox News' Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY'S NEWSLETTER:- AI is running the classroom at this Texas school, and students say 'it's awesome'- ‘Jeopardy’ host Ken Jennings 'deeply skeptical' of AI, years after losing to supercomputer- Sam Altman's iris-scanning tech launches in US, raising alarm over privacy and global control Alpha School uses AI-powered software and devices like these to deliver personalized instruction in just two hours of classroom time per day. (Getty Images/iStock)TOP OF THE CLASS: At a time when many American students are struggling to keep up, a private school in Texas is doing more with less, much less. At Alpha School, students spend just two hours a day in class, guided by an Artificial Intelligence (AI) tutor. But results are impressive: students are testing in the top 1 to 2% nationally.MAN VS. MACHINE: "Jeopardy!" host Ken Jennings once played against a super-intelligent computer, but he says current artificial intelligence is already years ahead. 'EYE' SEE YOU: Sam Altman's biometric identity project — World, formerly known as Worldcoin — has officially launched in the United States, bringing with it a blend of sci-fi-like ambition and mounting global concern.GOOGLE FIGHTS BACK: Scammers are becoming increasingly sophisticated, leveraging advanced tools like generative AI to con unsuspecting victims. SPEAKING OUT: According to the Global Anti-Scam Alliance, mobile consumers worldwide lose over $1 trillion annually to scams. To combat this growing threat, Google is rolling out cutting-edge AI-powered scam detection features for Android users.  Scam detection in Google Messages   (Google)'SPEED AND QUALITY': Duolingo, a popular platform for learning various languages, announced it will be adding 148 new courses to its arsenal on Wednesday. The new courses were created using generative artificial intelligence (AI) and were announced shortly after the company publicly released an email from CEO Luis von Ahn stating the platform would be shifting to AI.AI CEOS FACING SENATE: Sen. Ted Cruz, R-Texas, announced Tuesday that top CEOs in artificial intelligence will be testifying before the Senate next month. WIRED FOR HOPE: Brad Smith, an Arizona husband and father with ALS, has become the third person to receive Neuralink, the brain implant made by Elon Musk’s company.POWERFUL AI ROBOT :XPENG’s humanoid robot, Iron, is not your typical factory machine. Standing 5 feet, 8 inches tall and weighing 154 pounds, Iron combines advanced artificial intelligence with human-like movement and exceptional vision.  Iron the humanoid robot  (XPENG)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff.
    0 Kommentare 0 Anteile 32 Ansichten
  • WWW.FOXNEWS.COM
    AI cyborg patrols streets with live 360-degree tracking
    Join Fox News for access to this content You have reached your maximum number of articles. Log in or create an account FREE of charge to continue reading. By entering your email and pushing continue, you are agreeing to Fox News' Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. Please enter a valid email address. The future of law enforcement is here, and it’s wearing a robotic face. Around the globe, police forces are integrating artificial intelligence-powered robots into public safety strategies, blending advanced surveillance with real-time threat detection. Thailand has emerged as a key player in this shift, deploying its first AI police robot during the chaotic Songkran festival, a move that raises critical questions about safety, privacy and the role of technology in society.Join the FREE CyberGuy Report: Get my expert tech tips, critical security alerts, and exclusive deals — plus instant access to my  AI-powered RoboCop at Songkran festival. (Royal Thai Police)Thailand’s AI police cyborgDuring the Songkran festival, Thailand unveiled AI Police Cyborg 1.0, a stationary robot stationed at Nakhon Pathom’s Tonson Road venue. Developed by Provincial Police Region 7, Nakhon Pathom Provincial Police and local authorities, the robot — officially named "Pol Col Nakhonpathom Plod Phai" (meaning "Nakhon Pathom is safe") — features 360-degree cameras, facial recognition and integration with drone and CCTV networks. Its AI analyzes crowds in real time, identifying weapons like knives while ignoring harmless items like water guns, and relays data to a command center for rapid police response. AI-powered RoboCop with fellow officers. (Royal Thai Police)How effective is Thailand’s RoboCop?While the Royal Thai Police tout the Cyborg as a "force multiplier that never tires," critics question its practicality. The robot’s wheeled base limits mobility, and its reliance on existing surveillance tools like drones and CCTV networks has led some to ask why a stationary camera couldn’t achieve similar results. Additionally, its humanoid design — complete with a police uniform — appears more symbolic than functional, as it lacks bipedal movement and requires human officers nearby to deter tampering.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? AI-powered RoboCop at Songkran festival. (Royal Thai Police)China’s humanoid police robotsChina is pushing boundaries with fully interactive humanoid robots. In Shenzhen, the PM01 model — developed by EngineAI — patrols alongside officers, waving at crowds, responding to voice commands and even performing acrobatic feats like front flips. These robots, equipped with touchscreens and open-source software, allow global developers to expand their capabilities. Meanwhile, China’s RT-G, a spherical amphibious robot, operates in extreme environments, reaching speeds of 22 mph and enduring 4-ton impacts.GET FOX BUSINESS ON THE GO BY CLICKING HERE PM01 humanoid robot. (EngineAI)The U.S. approach: AI without humanoidsU.S. law enforcement agencies are adopting AI-driven tools while avoiding humanoid robots — at least for now. The NYPD’s K5 autonomous security robot, tested in subway stations, used 360-degree cameras for surveillance but explicitly excluded facial recognition to address privacy concerns. However, the robot’s pilot program ended after criticism over transparency and fears that it could enable mass surveillance.Cities like Los Angeles and Memphis continue using predictive policing AI to analyze crime patterns and allocate resources. These systems identify crime hot spots based on historical data but face scrutiny for potential racial bias and lack of public oversight. While the U.S. focuses on AI for data analysis and surveillance, humanoid patrol robots remain absent from current deployments. K5 autonomous security robot. (Knightscope)Safety vs. privacy: The global debateProponents argue AI robots enhance safety in crowded spaces, but privacy advocates warn of mass surveillance risks. Thailand’s Cyborg and China’s PM01 both use facial recognition, raising concerns about data misuse and bias. In the U.S., the K5 robot sparked debates about Fourth Amendment rights, with critics questioning how long footage is stored and who accesses it. AI-powered RoboCop at Songkran festival. (Royal Thai Police)Kurt’s key takeawaysThailand’s AI Police Cyborg and China’s humanoid robots mark a turning point in law enforcement, blending cutting-edge technology with public safety. While these innovations promise efficiency, they also need strict rules and transparency to stop privacy violations and government overreach.So, here’s the question for you. Are these AI-powered robots making us safer, or are we stepping into a future where privacy takes a backseat? And would you feel comfortable being watched by a RoboCop on patrol here on U.S. soil? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved.  
    0 Kommentare 0 Anteile 76 Ansichten
  • WWW.FOXNEWS.COM
    5 digital cleanup hacks you didn’t know you needed
    Published May 2, 2025 6:00am EDT close Tech expert says ‘we’ve got problems’ if new Chinese robots can do this  ‘The CyberGuy’ Kurt Knutsson discusses the creation of a robot in China that can reportedly build cars and do everyday tasks on ‘Fox & Friends Weekend.’ Let’s face it, our digital lives get messy. Whether it’s thousands of unread emails, random screenshots cluttering your desktop or a downloads folder that’s basically a graveyard, the digital gunk adds up fast. But cleaning it all up doesn’t have to be overwhelming. With a few smart automations and tools, you can tidy up your tech and keep things running smoothly, without lifting a finger every week.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  A woman staring at her laptop (Kurt "CyberGuy" Knutsson)Here’s your digital detox starter pack1. Auto-archive or auto-delete old emailsStill holding on to newsletters from 2017? Set up filters to automatically archive or delete emails that are older than six months or from specific senders.For Gmail users Search for old messages:In Gmail, type "older_than:6m" in the search bar.In Outlook, sort by date or use Advanced Find to locate older emails manually.Set up automatic cleanup:In Gmail, click the sliders icon in the search bar, then select "Create filter."Choose "Skip the Inbox (Archive it)" or "Delete it."Then click "Also Apply to matching future emails."Then tap "Create Filter."For Outlook users In Outlook, go to "File" > "Manage Rules & Alerts" > "New Rule."Start from "Apply rule on messages I receive."Filter by sender or subject, then set an action like moving to a folder or deleting.For longer-term automation in Outlook:Use AutoArchive under "File" > "Options" > "Advanced."Define what counts as old and choose whether to archive or delete those messages.For AOL users Search for old messages:Use the search bar at the top of your inbox and type "before:01/01/2024" (adjust the date as needed).Then select "Search in Mail" from the dropdown menu.Set up automatic cleanup:Unfortunately, AOL Mail doesn’t offer advanced filters like Gmail or Outlook.Instead, select multiple emails manually using the checkboxes, then click Delete or Move to archive them.Pro tip: You can sort by sender or date to make bulk actions easier.For Yahoo users Search for old messages:In Yahoo Mail, type "before:2024/01/01" in the search bar to find messages before a specific date.Set up automatic cleanup:Yahoo doesn’t offer true automatic filters for deleting old emails by age, but you can:Click the three-dot icon on the left-hand menu.Go to Settings (gear icon) > Personalize your inbox > then toggle on "inbox categories."Set a filter to move certain emails to folders, then manually delete or archive from there.For manual cleanup, sort by date or sender and bulk delete/archive as needed.Click the three-dot icon on the left-hand menu.Go to Settings (gear icon) > Personalize your inbox > then toggle on "inbox categories."Set a filter to move certain emails to folders, then manually delete or archive from there.For manual cleanup, sort by date or sender and bulk delete/archive as needed.It’s out of sight, out of mind.2. Clean up your photo albumSort and delete screenshots and duplicate photosScreenshots, burst photos and accidental snaps can take up more space than you'd expect. Here's how to clean things up, whether you're on Team iPhone or Android.How to find screenshots:On iPhoneClick the Photos app.Scroll down and tap Media Types.Tap Screenshots. This will show all your screenshots in one place.Sorting screenshotsIn the Screenshots album, you can tap the up/down arrow on the bottom left to reveal sorting and filtering options.Now you can click "Sort by Oldest First," "Sort by Newest First" or "Filter."Remove duplicates:Open the Photos app.Go to Albums and scroll down to Utilities, then click on Duplicates.Tap Merge to automatically combine identical photos and save space.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?On AndroidSettings may vary depending on your Android phone’s manufacturer. Find screenshots:Open the Photos or Files appLook for a folder labeled Screenshots (location may vary by device or Android version)Open screenshots in grid view and manually long-press to select and delete multiple images at onceFind duplicates:Open the Photos or File app and go to the Clean tabTap it to review and delete duplicate photos, blurry images and other junkConfirm deletion to reclaim storageNote: Steps may vary slightly based on your iOS version or Android device. An Apple desktop computer on a desk (Kurt "CyberGuy" Knutsson)3. Automate your downloads folderSet it and forget itEvery file you’ve ever opened? Probably still hanging out in your Downloads. Luckily, both Macs and PCs offer built-in tools to keep them clean.Mac:Click on Finder in the dock.Scroll down to applications and click Automator.Choose "Folder Action" when prompted.At the top, set "Folder Action receives files and folders added to" > Downloads.In the search bar, find and drag in "Filter Finder Items."Next, add "Move Finder Items to Trash" or choose a different folder.Save the workflow. Your Mac will now automatically clean up files older than 30 days. Set it to: Date Last Opened > is not in the last > 30 days.PC: Turn on Storage Sense via Settings > System > Storage > Configure Storage Sense. Set it to clean up downloads after 30 days.You’ll never have to manually empty that folder again.4. Create a ‘junk drawer’ photo albumKeep the clutter, but corral itInstead of letting random screenshots, receipts, memes and throwaway photos pile up in your main library, give them a home you don’t need to maintain. It’s like a digital junk drawer.On iPhone:Open the Photos app.Go to the Albums tab.Tap the + in the top-left corner and select "New Album."Name it something like "Junk" or "Throwaways."When reviewing photos, tap Select, choose the ones you don’t need long term, then tap Add To and move them into your "Junk" album.GET FOX BUSINESS ON THE GO BY CLICKING HEREOn Android (Google Photos):Settings may vary depending on your Android phone’s manufacturer. Open the Google Photos app.Tap Library > + New Album.Name the album "Junk" or "Throwaways."While browsing your photos, tap and hold to select multiple images, then tap the three-dot menu and choose Add to album.Why this helps:Makes it easy to batch-delete throwaways when you’re low on space.Keeps your main photo library clean and easier to navigate.Creates a mental cue during photo reviews; if you wouldn’t miss it, send it to Junk. A man scrolling on his smartphone (Kurt "CyberGuy" Knutsson)5. Rotate and strengthen old passwordsUse a password manager to audit your loginsOld passwords are digital skeletons in the closet. A password manager can help you find weak, reused or outdated passwords and suggest stronger ones.When it comes to choosing the best password manager for you, here are some of my top tips:Deploys secure.Works seamlessly across all of your devices.Creates unique complicated passwords that are different for every account.Automatically populates login and password fields for apps and sites you revisit.It has a browser extension for all browsers you use to automatically insert passwords for you.Allows a fail-safe in case the primary password is ever lost or forgotten.Checks that your existing passwords remain safe and alerts you if ever compromised.Uses two-factor authentication security.Get more details about my best expert-reviewed password managers of 2025 here.Kurt’s key takeawaysTaking control of your digital clutter isn’t just about esthetics, it’s about efficiency and peace of mind. Setting up filters in Gmail and Outlook automatically helps clear out emails you don’t need. Renaming and organizing your screenshots keeps your folders from turning into chaos. Automating cleanup tasks in your Downloads folder saves you time and stress. Creating a "junk drawer" album for throwaway photos helps keep your camera roll clean. And rotating your passwords with the help of a password manager strengthens your security with minimal effort.CLICK HERE TO GET THE FOX NEWS APPGot a tip you’d like to share and/or what other everyday tech challenges would you like help solving? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 46 Ansichten
  • WWW.FOXNEWS.COM
    Think you can delete your data yourself? Here’s why you’re probably wrong
    Tech Think you can delete your data yourself? Here’s why you’re probably wrong How to choose between doing it yourself and using a personal data removal service to protect your privacy Published May 1, 2025 10:00am EDT close TikTok's data collection of US users is 'certainly dangerous,' attorney says Cybersecurity and privacy attorney Leeza Garber breaks down concerns over Chinese ownership of TikTok on 'Fox Report.' None of us signed up for our personal info to be bought and sold online. Between data brokers, people-search sites and all the other places our details end up, it happens constantly and usually without us even realizing it. If you’ve ever Googled yourself and found your phone number or home address floating around on some shady-looking website, you know the feeling.If that’s you, you probably started looking for ways to remedy the situation and may be wondering if it’s better to remove your personal information from the web yourself or use a data removal service. I’ve tried both, and here’s what I’ve learned.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  A woman working on her laptop (Kurt "CyberGuy" Knutsson)Doing it yourself sounds doable, at firstWhen the data broker problem first got on my radar (granted, it was because data removal services started to emerge), I figured I could just opt out on my own. After all, most of them have opt-out pages with a process. Whitepages, one of the most popular people-search sites, for example, has the following process.Search for your name and address on Whitepages, find the correct listing and copy the URL of your profile.Go to the Whitepages suppression page, paste the URL into the field and send the removal request. This includes several sub-steps, like verifying your data, stating the reason for your request and providing a contact phone number.Whitepages will call you soon after to verify your identity. If you miss the call, you’ll have to start the process again.This is just one example, but other search sites have similar opt-out processes, give or take a few steps. A man working on a laptop (Kurt "CyberGuy" Knutsson)The reality check: Why manual removal becomes overwhelming fastIf you want to remove your information from all (or most) of the data brokers that have it, here’s what you’ll have to do.Find the brokers that have your data. There are hundreds out there. You can find the public-facing data brokers, or people-search sites, by doing a quick Google search. However, private data brokers that sell datasets B2B (business-to-business) require a little more digging. You may have to just figure out which ones operate in your area and send removal requests to them all.Submit opt-out requests to each one. Read through their opt-out instructions (some of which are intentionally vague or buried) and go through the process one by one.Repeat the process periodically. Data brokers often re-collect your info unless you keep checking in and submitting new requests. It’s not a one-and-done situation. If you’re committed to keeping your data private, you’ll need to keep monitoring and removing it.It’s definitely doable, but not painless. Some sites make it easier, but others require you to upload your ID (not recommended), ask you to send snail mail or outright reject your request unless you use a specific email domain, not to mention all the CAPTCHAs that feel like they were designed to break your spirit.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A woman working on her laptop (Kurt "CyberGuy" Knutsson)Data removal services automate this processI’ve since tried using a data removal service that automates the opt-out process, handling the complexities on your behalf. See below for what this gives you.Comprehensive coverage: They maintain updated lists of data brokers and their opt-out procedures, so your information is removed from more sources than you’d manage on your own.Time efficiency: Because most of them use automation, you don’t really have to do anything beyond signing up and monitoring the progress. This saves you significant time and effort.​Ongoing removals: As long as you’re subscribed, these services continue to monitor and remove your information from data broker sites, so you know it won’t pop up again.​I didn’t have to babysit the process, and I didn’t have to guess whether it was working. I just got updates when the removals were confirmed.GET FOX BUSINESS ON THE GO BY CLICKING HERELet’s break it downIf you’re still weighing your options, here’s how the two approaches stack up.Manual opt-outs demand a significant time investment, requiring you to personally navigate each data broker’s unique removal process. While free, this approach offers variable coverage depending on how diligently you track down brokers, and consistency is challenging; you’ll need to repeat the process regularly to keep your data private. Success also depends heavily on your ability to decipher vague opt-out instructions and adapt to each broker’s requirements.In contrast, data removal services save time by handling the legwork for you. They provide broad coverage by targeting numerous brokers simultaneously and maintain consistency through ongoing monitoring. While these services come with subscription fees, they eliminate the need for personal expertise, offering a hands-off solution to data privacy.The bottom line: Why personal data removal services win the privacy battleAfter testing both manual opt-outs and automated services, using a personal data removal service emerges as the clear solution for reclaiming your data. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Kurt’s key takeawaysIf you’ve got the time and patience, you can absolutely take the DIY route. But if you’re looking for a way to protect your privacy without sinking hours into research, filling out forms and monitoring, a data removal service makes things a lot quicker and more convenient. For most people, this is likely the better option. Many states have privacy laws that give you the right to request that data brokers remove your personal information, but the system seems to be rigged to make exercising those rights unreasonably difficult. While it shouldn’t be necessary, data removal services offer a way to cheat that system.CLICK HERE TO GET THE FOX NEWS APPDo you think stronger protections are needed to shield you from the challenges and risks posed by data brokers and their handling of your personal information? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 38 Ansichten
  • WWW.FOXNEWS.COM
    Google's AI unleashes powerful scam-busting features for Android
    Published May 1, 2025 6:00am EDT close Google's AI unleashes new powerful scam-busting features for Android The CyberGuy explains steps you can take to protect yourself from scams. Scammers are becoming increasingly sophisticated, leveraging advanced tools like generative AI to con unsuspecting victims. According to the Global Anti-Scam Alliance, mobile consumers worldwide lose over $1 trillion annually to scams. To combat this growing threat, Google is rolling out cutting-edge AI-powered scam detection features for Android users. However, while Google’s efforts are impressive, there are additional steps you can take to protect yourself from scams. Let’s dive into Google’s new features and explore how you can further safeguard your personal information.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  A man scrolling on his phone (Kurt "CyberGuy" Knutsson)Google’s new AI-powered scam detection featuresGoogle has introduced two innovative AI-powered scam detection features to protect Android users from increasingly sophisticated fraud attempts.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?Scam Detection in Google MessagesThe first feature, Scam Detection in Google Messages, enhances the existing Spam Protection functionality. This new tool utilizes on-device AI to identify suspicious patterns in SMS, MMS and RCS messages. When a message appears suspicious, users receive a real-time warning with options to dismiss, report or block the sender.To ensure privacy, all message processing occurs directly on the user's device, keeping conversations confidential. The feature is enabled by default for non-contacts and can be verified or disabled via Google Messages → Settings → Spam Protection. It is currently available in English for users in the United States, United Kingdom and Canada, with plans to expand to more countries soon. Scam detection in Google Messages (Google)Scam Detection for phone callsThe second feature addresses the growing issue of phone scams, with over half of Americans reporting daily scam calls in 2024. Google's Scam Detection for calls employs on-device AI models to analyze calls in real time. If a call is identified as a potential scam, users receive audio and visual warnings alerting them to the risk.Activation requirements:Pixel 9+ devices (U.S. English) leverage Gemini Nano for advanced detectionPixel 6+ models use smaller on-device AI (beta availability may vary)Manual enablement required via Phone app → Settings → Scam DetectionThis feature prioritizes user privacy by processing call audio ephemerally without storing or sharing any data. Pixel Watch integration allows Wear OS users to enable call alerts through the Phone app after updating both devices. At present, Scam Detection for calls is available to Pixel 9+ users in the United States, with plans for broader expansion in the future.Both of these AI-powered features are a big win for your mobile security, providing you with advanced protection against evolving scam tactics while keeping your privacy safe.GET FOX BUSINESS ON THE GO BY CLICKING HERE Scam Detection for phone calls (Google)How you can stay ahead of scammersWhile Google’s innovations provide robust protection, scammers are relentless in finding new ways to exploit vulnerabilities. Here are some additional steps you can take.1. Have strong antivirus software: Google Play Protect, which is built-in malware protection for Android devices, automatically removes known malware. However, it is important to note that Google Play Protect may not be enough. Historically, it isn't 100% foolproof at removing all emerging malware from Android devices. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Turn on two-factor authentication (2FA): This adds an extra layer of security by requiring a second form of verification beyond just a password. 2FA makes it significantly harder for attackers to gain unauthorized access to your accounts, even if they obtain your password.3. Regularly update your software and devices: Keeping your systems up to date ensures you have the latest security patches and protections against newly discovered vulnerabilities.4. Use strong and unique passwords: Use long, complex passphrases that are unique for each account. Consider using a password manager to help create and store strong, unique passwords for all your accounts. Get more details about my best expert-reviewed password managers of 2025 here.5. Be cautious about sharing information: Avoid sharing sensitive details like financial information or passwords over text or phone calls unless you're absolutely certain of the recipient's identity. Be cautious of phishing attempts and verify the legitimacy of requests for personal information.6. Invest in personal data removal services: Use a personal data removal service to remove your personal information from people-search websites, making it harder for scammers to find and target you. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.Kurt’s key takeawaysScammers are constantly changing their tactics, but so is technology designed to protect us. Google’s AI-powered scam detection features are a significant step forward in safeguarding Android users from fraud. However, staying safe requires a combination of tools and personal vigilance. By using strong antivirus software, removing yourself from people-search sites and being cautious with your personal information, you can stay one step ahead of scammers.CLICK HERE TO GET THE FOX NEWS APPDo you think Google and other tech companies are doing enough to prevent scammers from attacking your Android? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 59 Ansichten
  • WWW.FOXNEWS.COM
    FBI warns of scam targeting victims with fake hospitals and police
    Published April 30, 2025 10:00am EDT close Tech expert says ‘we’ve got problems’ if new Chinese robots can do this Kurt "Cyberguy" Knutsson joins "Fox & Friends Weekend" and discusses the creation of a robot in China that can reportedly build cars and do everyday tasks. The FBI warns that scammers are impersonating doctors, police and banks using spoofed numbers, while "smishing" texts impersonating toll agencies and delivery services surge nationwide.In one elaborate scheme, fraudsters posing as hospital staff claim victims' identities are linked to Chinese crime rings, then transfer calls to fake police demanding wire transfers, complete with fake IDs and encrypted app requests.These cons often target previous fraud victims through social media groups, where fake profiles like "Jaime Quin" promise fund recovery to steal more data. With AI and deepfakes making scams harder to spot, here's how to fight back.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  FBI building in Washington, D.C. (Kurt "CyberGuy" Knutsson)How these scams workThe FBI says that these scams often target people who have already been victims of fraud, which makes them especially cruel. Scammers reach out through phone calls, emails or even social media, pretending they can help you recover money you’ve lost.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?One common trick involves someone posing as an official from the FBI’s Internet Crime Complaint Center, using fake names like "Jaime Quin," who asks for sensitive information such as your Social Security number or bank details.In other cases, scammers create fake female profiles to join online support groups for fraud victims, gaining trust before directing people to contact their "recovery experts." While the details may change, the goal is always the same: to steal your personal information or money all over again. A woman working on her laptop (Kurt "CyberGuy" Knutsson)How to keep yourself safeProtecting yourself from scams starts with these critical defenses; each is designed to shut down fraudsters before they gain a foothold on your personal information or money.1. Stay calm: If you think a scammer is calling you, it's important to stay calm and not let yourself get emotional. It's very easy to get worked up when you're in the middle of this situation. If it happens, you can always say you will get back to them and hang up the phone. If they become aggressive and try to exploit you, tell them you will report them and hang up.2. Avoid unknown contact numbers: Never call phone numbers that appear in pop-ups, unsolicited texts or emails. These numbers often belong to scammers trying to trick you into sharing personal information or making payments. Instead, always verify contact details through official websites or trusted sources before reaching out.3. Download warning: Do not download software at the request of unknown individuals who contact you. Installing unknown programs can introduce malware or give scammers a way to steal your personal information.4. Security precaution: Do not allow unknown individuals access to your computer. Granting remote access can give scammers control over your files and personal information, putting your security at serious risk.5. Don't click that link and have strong antivirus software: Do not click on unsolicited pop-ups on your computer, links sent via text messages or email links and attachments. As scammers weaponize AI and deepfake technologies, strong antivirus software becomes your first line of defense. The best way to protect yourself from clicking on malicious links that install malware that may access your private information is to have strong antivirus protection installed on all your devices. This can also alert you to any phishing emails or ransomware scams. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Remove your personal information from the web: Your personal information is out on the web. If you want to make your personal information inaccessible, you might want to look into removal services. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.7. Never send money or valuables to strangers: Avoid wiring cash, sending gift cards, cryptocurrency or any other assets to people you’ve only met online or over the phone. Scammers often pressure victims for these untraceable payments, so always be cautious and verify who you’re dealing with before sending anything.8. Consider identity theft protection services: These services monitor your personal information across credit reports, the dark web and public records, alerting you quickly if your data is exposed or misused. These services offer valuable early warnings and access to experts who can help recover your identity if fraud occurs. Choose a reputable provider that offers comprehensive monitoring, timely alerts and support for resolving identity theft issues. See my tips and best picks on how to protect yourself from identity theft.GET FOX BUSINESS ON THE GO BY CLICKING HERE FBI working to stop scams (Kurt "CyberGuy" Knutsson)What to do if you’re targetedIf you believe you’ve been contacted by scammers impersonating the FBI, hospitals, police or other trusted entities, it’s crucial to act quickly.Stop all communication immediately. Do not engage further or provide any personal or financial information.Report the incident to the FBI’s Internet Crime Complaint Center (IC3) at www.ic3.gov. Provide as much detail as possible, including contact information, methods used by the scammer and any financial transactions.Notify your bank or financial institutions if you’ve shared any account information or sent money.File a police report with your local law enforcement to document the crime.If you’re an older adult or need assistance filing a complaint, contact the Department of Justice Elder Justice Hotline at 1-833-FRAUD-11 (833-372-8311).Reporting scams not only helps protect you but also assists law enforcement in identifying and stopping these criminals. Kurt's key takeawaysAs scams grow more sophisticated, your best weapons are skepticism and proactive security measures like those we listed above. When in doubt, ask yourself: Would this agency really pressure me for payments via Signal or another app? Report all attempts to ic3.gov and trust your gut. If it feels off, it probably is.Do you trust today’s cybersecurity policies to shield your identity when scammers weaponize AI and critical infrastructure remains a target? Let us know by writing us atCyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 53 Ansichten
  • WWW.FOXNEWS.COM
    Amazon takes on Elon Musk, launching 27 internet satellites
    close Amazon launches 27 satellites to expand global internet coverage Amazon has begun its journey to deliver fast, affordable internet to underserved communities and remote regions worldwide. Imagine being able to access the internet from anywhere in the world, whether you're in a city or a remote area. For many of us, reliable internet is a given, but for millions, it remains a luxury. That's why Amazon's Project Kuiper is making headlines with its ambitious plan to bridge the digital divide.On April 28, 2025, the project took a monumental step forward by successfully launching its first full batch of satellites into orbit. This mission, named "KA-01" (Kuiper Atlas 1), marked the beginning of Amazon’s journey to deliver fast, affordable internet to underserved communities and remote regions worldwide.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  Advanced satellite (Amazon)The KA-01 mission: A bold first stepThe KA-01 mission deployed 27 advanced satellites into low Earth orbit at an altitude of 280 miles (450 kilometers). This launch transitioned Project Kuiper from prototype testing to full-scale deployment. Each satellite was equipped with state-of-the-art technology, including phased array antennas for high-speed data transmission, advanced processors, electric propulsion systems for orbit adjustments and optical inter-satellite links to enable seamless communication between satellites.In addition to their technical sophistication, the satellites featured a unique dielectric mirror coating designed to scatter sunlight and reduce their visibility from Earth, a thoughtful innovation aimed at addressing concerns by astronomers about light pollution. Advanced satellite launch (Amazon)A record-breaking rocket launchTo carry out this historic mission, United Launch Alliance (ULA) launched its Atlas V rocket in its most powerful configuration. The KA-01 payload was the heaviest ever flown on an Atlas V rocket. The launch vehicle included five solid rocket boosters alongside its main booster and a massive payload fairing measuring 77 feet in height and 16.4 feet in width.The successful deployment of these satellites was just the first of many planned launches. Over the coming years, ULA will conduct additional missions using both Atlas V and Vulcan Centaur rockets. Amazon has also partnered with other launch providers, including SpaceX, Blue Origin and Arianespace, to deploy more than 3,200 satellites as part of its first-generation constellation. Advanced satellite (Amazon)From deployment to connectivityFollowing the recent launch, ULA managed the initial deployment sequence from its Advanced Spaceflight Operations Center at Cape Canaveral Space Force Station in Florida. Once the satellites separated from the rocket, control was transferred to Project Kuiper’s mission operations center in Redmond, Washington.Each satellite underwent a series of automated steps to activate onboard systems and began using electric propulsion to ascend to its final orbital altitude of 392 miles. Traveling at speeds exceeding 17,000 miles per hour, these satellites now circle Earth approximately every 90 minutes.The ultimate goal of KA-01 was not just deployment but to establish end-to-end network connectivity. This involves transmitting data through ground stations to satellites and back to customer antennas, a process that will enable high-speed internet service across even the most remote locations on Earth.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Advanced satellite launch (Amazon)What’s next for Project KuiperThe successful KA-01 mission was just the beginning for Project Kuiper. With more than 80 launches secured across multiple providers, Amazon is ramping up satellite production and deployment rates in preparation for delivering service later this year. The next mission, KA-02, is already in progress and will also use a ULA Atlas V rocket launched from Cape Canaveral.By deploying advanced satellite technology at scale, Project Kuiper aims to provide reliable internet access to millions of people who currently lack connectivity, empowering individuals and transforming communities worldwide. Satellite receiver (Amazon)How Project Kuiper stacks up against StarlinkAmazon’s Project Kuiper and SpaceX’s Starlink are at the forefront of the satellite internet revolution, aiming to provide high-speed connectivity to underserved and remote areas. While both systems share similarities, such as using low Earth orbit satellites for reduced latency, they differ in key aspects like satellite design, pricing and service goals.Satellite constellations and coverageStarlink: With over 7,000 satellites already in orbit and plans for a constellation of up to 42,000, Starlink currently leads in deployment. Its satellites orbit at approximately 248 miles, allowing for lower latency but requiring more satellites for global coverage.Project Kuiper: Kuiper plans to deploy over 3,200 satellites orbiting at 311 miles. This higher altitude provides broader coverage per satellite but results in a 40% reduction in signal strength compared to Starlink due to increased distance. To compensate, Kuiper’s satellites use larger antennas to maintain performance.GET FOX BUSINESS ON THE GO BY CLICKING HERESpeed and PerformanceStarlink: Offers speeds ranging from 50 Mbps to 250 Mbps for standard plans and up to 1 Gbps for premium users. Latency is typically 20 to 40 milliseconds.Kuiper: Plans to offer three tiers of service:Ultra-compact model: Speeds up to 100 Mbps for portable applicationsStandard model: Speeds up to 400 Mbps for residential and small business useHigh-bandwidth model: Speeds up to 1 Gbps for enterprise users. Kuiper’s use of the Ka frequency band provides higher theoretical bandwidth but may face greater signal attenuation in dense clouds compared to Starlink’s Ku bandPricingStarlink: It currently charges $599 for its standard receiver and $2,500 for its high-performance model. Monthly service costs range from $80 to $120.Kuiper: Amazon’s standard receiver is expected to cost less than $400 to produce, significantly undercutting Starlink’s hardware prices. While service pricing has not been announced, Amazon’s cost-efficient production suggests it could offer more affordable options.Deployment timelineStarlink: Already operational with millions of subscribers worldwide and a head start in deployment. See if it is available in your area by clicking here.Kuiper: Amazon began satellite launches in early 2025 with its first batch of satellites on April 9, 2025. It plans to start customer service later this year. Under FCC requirements, it must deploy half its constellation by mid 2026.Kurt's key takeawaysIt’s still early days for Project Kuiper, but Amazon’s first full-scale satellite launch shows just how serious the company is about closing the connectivity gap. While Starlink may have a head start, Kuiper is bringing fresh competition and innovation to the table. If all goes according to plan, millions more people around the world could soon have access to fast, affordable internet, no matter where they live. CLICK HERE TO GET THE FOX NEWS APPAre you excited or skeptical about the idea of global internet coverage from space? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 54 Ansichten
  • WWW.FOXNEWS.COM
    Is it safe to unsubscribe from spam you didn’t sign up for?
    Published April 29, 2025 10:00am EDT close 'CyberGuy': Is it safe to open that spam email? Tech expert Kurt Knutsson says opening emails is safe, but risks arise from interacting with links, attachments or HTML content. We've all been there: Trying to clean out our inbox only to find that the same sketchy emails keep showing up, even after clicking "unsubscribe." Robert from Danville, Virginia, wrote in with a question that many of us can relate to."When you unsubscribe to a junk email that you know you didn't authorize, do you really unsubscribe and no longer get [emails]? I scroll to the bottom of the email and process the 'unsubscribe' function and even block the email using the block option within my email. Seems the same emails reappear. Is unsubscribing worth my time? Any remedies?" he wrote.Robert, you're not alone in asking this, and the trust is more complicated (and frustrating) than you might think. While unsubscribing can work in some cases, there are situations where it might actually make things worse. Let's break down when it's safe to unsubscribe, when it's not and what you can do instead to take back control of your inbox.Join The FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  Beware of scammers (Kurt "CyberGuy" Knutsson)The truth about unsubscribing from spam you didn’t sign up forUnsubscribing isn't always safe, especially with spam. If an email is from a legitimate business, like a store you bought something from or a newsletter you signed up for, it's usually OK to unsubscribe. These companies are bound by email marketing laws and will typically remove you. However, emails that you never signed up for are completely different. Here are the key differences.Legit emailComes from a known business or serviceUsually has a working unsubscribe linkOpt-out request is honoredSpam/scam emailComes from unknown or random sources"Unsubscribe" link might be fake or used to track clicksClicking may confirm your email is active and invite more spam Email app on smartphone (Kurt "CyberGuy" Knutsson)When not to click ‘unsubscribe’Not all unsubscribe links are safe. In fact, clicking on one in a suspicious email can make things worse by signaling to spammers that your address is active.Avoid clicking unsubscribe if:The sender is unfamiliar, or the message feels unrelated to anything you’ve signed up forThe email contains typos, bad formatting or vague greetings like "Dear customer"The sender address looks weird (e.g., winbignow@marketingzone.biz)The "unsubscribe" link redirects to a strange URLIn these cases, clicking unsubscribe might invite even more junk mail instead of stopping it.Better ways to fight spamHere's what you should do instead to counteract spam.1) Mark it as spam or phishing: Every email provider (Gmail, Outlook, Yahoo, etc.) has a "report spam" button. Use it. This feature trains your inbox to recognize and filter future junk. It also helps others by flagging known spam sources all while not tipping off the spammer.2) Block the sender (but know it's temporary): Blocking a sender can help, but temporarily, because spammers often use rotating addresses. It's a continuous game, but it still has short-term value.How to block senders on major email platforms:Gmail: Open the email > Click the three-dot menu > Block [sender]Outlook: Open the message > Click the three-dot menu > Block or ReportYahoo Mail: Open the email > Click the three-dot menu > Block senderApple Mail (iCloud): Tap the sender’s name > Block this Contact3) Use your email’s built-in alias or disposable tools: Before switching to a third-party service, it’s worth checking what your current email provider already offers. Gmail, Outlook and Yahoo have handy tricks for separating junk from legit messages without signing up for anything new.Here’s how it works with the major platforms.Gmail: Add a plus sign (+) and a keyword to your regular address when signing up (e.g., yourname+shopping@gmail.com). The email will still arrive in your inbox, but now you can see who leaked your info and create filters to organize or block it.Yahoo Mail (Plus users): You can create up to 500 disposable email addresses. These are full of alternate addresses that you can disable or remove if they start getting spammed.Outlook: Microsoft lets you create and manage "alias" addresses linked to your existing Outlook account. These aliases can be used to send and receive email and help keep your primary address private.This trick is great for organizing your inbox, tracking how your email is being used and filtering out spam before it becomes a problem. Check out the full how-to guide here: How to create a disposable email address. Gmail on a tablet (Kurt "CyberGuy" Knutsson)4) Upgrade to a spam-killer inbox service: Anonymous email tricks are a smart move, but if you want full control over spam, privacy and organization, a dedicated alias email service is the way to go. An alias email address is an additional address that forwards to your primary inbox. It lets you receive messages without ever exposing your real email. By using different aliases for online sign-ups, shopping, newsletters and more, you can easily manage incoming mail and instantly shut off spam by deleting an alias whenever needed.Creating multiple aliases also protects your real email address from being flooded with junk or compromised in a data breach. It's one of the easiest ways to stay organized and secure online.Want to find the best secure and private email services? Check out my full review here.5) Use a burner email service for short-term sign-ups: If you want an extra layer of separation from your personal inbox, burner email services are a great option. They create temporary email addresses you can use for quick sign-ups with no commitment and no spam in your real inbox.Burner emails are especially useful for:Free trialsGiveawaysSketchy sitesOne-time forms or downloadsYou can refer to a comprehensive list of popular temporary email services that generate disposable addresses lasting from minutes to hours, which offer features like anonymous inboxes, attachment support, browser extensions and easy expiration to protect your privacy and reduce spam.Kurt’s key takeawaysUnsubscribing from suspicious emails can do more harm than good, so it’s best to mark them as spam and block the sender instead. Use your email provider’s built-in tools to filter messages and create aliases to track where spam is coming from. For short-term sign-ups, disposable email services are a great way to protect your real inbox. And if you want long-term control and privacy, switching to a secure email service is the best way to keep your inbox clean.Have you found a trick that actually helps stop spam? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 63 Ansichten
  • WWW.FOXNEWS.COM
    World’s first continuous beating heart transplant
    Published April 29, 2025 6:00am EDT close 'CyberGuy': World's first nonstop beating heart transplant kicks off new chapter in organ transplants Tech expert Kurt Knutsson talks about how the first nonstop beating heart transplant, called zero ischemic time, at Taiwan hospital changes surgery. For the first time ever, surgeons at National Taiwan University Hospital (NTUH) successfully performed a heart transplant in which the donor organ never stopped beating. This revolutionary procedure eliminates the traditional pause in blood flow, known as ischemic time, dramatically reducing damage to the heart muscle and improving the chances of a successful transplant.By keeping the heart continuously pumping oxygenated blood throughout the entire process, NTUH has set a new benchmark in cardiac surgery that promises better outcomes for patients worldwide.Join The FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  A custom organ care system that acts like a portable life-support machine (NTUH) (Kurt "CyberGuy" Knutsson)Why skipping ischemic time is a big dealTraditional heart transplants rely on cold storage, which pauses blood flow to the organ. Even a few hours without oxygen can damage heart muscle, raising the risks of rejection or complications post-surgery. NTUH’s method? A custom organ care system that acts like a portable life-support machine, delivering oxygenated blood to the heart from donor to recipient; no pauses, no cold storage. Custom organ care system illustration (NTUH) (Kurt "CyberGuy" Knutsson)How it works: The ‘never-skip-a-beat’ techInspired by ECMO life support, NTUH’s organ care system keeps the heart pumping outside the body using a system of pumps, oxygenators and reservoirs. During the first surgery, the team transported a donor heart between operating rooms while it was still beating, hooked up to this device. The recipient, a 49-year-old woman with dilated cardiomyopathy, recovered smoothly and showed remarkably low cardiac enzyme levels, which is a key indicator of heart muscle health. NTUH doctor with the woman who received a new heart via NTUH organ care system (NTUH) (Kurt "CyberGuy" Knutsson)Stanford’s attempt vs NTUH’s breakthroughWhile Stanford University pioneered "beating-heart" transplants in 2023, their method still included brief ischemic periods (10–30 minutes) during organ transfer. NTUH’s zero-ischemic approach? The heart never stopped, not even for a second."The hearts were still beating before procurement, continued beating after procurement and never stopped," said Chen Yih-shurng, head of NTUH’s organ transplant team. Custom organ care system illustration (NTUH) (Kurt "CyberGuy" Knutsson)What’s next? More hearts, fewer risksWith two successful transplants under their belt, NTUH aims to refine the organ care system and expand access. Their groundbreaking findings, published in the Journal of Thoracic and Cardiovascular Surgery Techniques, could redefine global transplant protocols. As demand for donor hearts outpaces supply, this innovation offers hope for shorter wait lists and healthier recoveries.Kurt’s key takeawaysNTUH’s milestone isn’t just about technical prowess, it’s about saving lives. By cutting out ischemic time, they’ve turned "impossible" into "I’m possible." For patients awaiting transplants, this breakthrough means stronger donor hearts, fewer complications and a brighter shot at a second chance. As the team puts it, zero ischemic time equals zero unnecessary risks.After learning about this new procedure, do you feel more hopeful about organ transplants? Why or why not? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 50 Ansichten
  • WWW.FOXNEWS.COM
    FBI warns of time-traveling hackers
    Published April 28, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt Knutsson joins "Fox & Friends" to warn of new cyberscams and give his tips on how to avoid them. Cybercriminals always find new ways to scam you, whether it’s mimicking a government agency, creating a fake website or delivering malware disguised as a software update. Just when you think you’ve seen it all, they come up with a new trick.This time, the FBI has issued an alert: Hackers are using a "time-traveling" technique to bypass your device’s security measures. No, we’re not talking about actual time travel (though wouldn’t that be something?). This is a sophisticated cyberattack where hackers manipulate a system's internal clock to sneak past security defenses.Join The FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  A man working on his laptops (Kurt "CyberGuy" Knutsson)What you need to knowThe concept of "time-traveling hackers" refers not to literal time travel but to a sophisticated cyberattack technique where hackers manipulate a system's internal clock to bypass security measures. This attack is reportedly tied to the Medusa ransomware gang.In this type of attack, hackers exploit expired security certificates by altering the system date on a targeted device to a time when those certificates were still valid. For example, a security certificate that expired in, say, 2020 could be made usable again if the system's clock is set back to 2019. This allows malicious software signed with these outdated certificates to be recognized as legitimate by the system, effectively "traveling back in time" from a security perspective. This technique was notably used in the Medusa ransomware attacks, which targeted critical infrastructure and prompted an FBI cybersecurity advisory (AA25-071A) earlier in 2025. The campaign has affected over 300 critical infrastructure targets. The attackers combined this method with social engineering and exploited unpatched vulnerabilities, amplifying the threat. The FBI has warned that such attacks pose a significant risk, as they can disable modern security protections like Windows Defender by tricking the system into accepting outdated drivers or software. A woman working on her laptop and scrolling on her phone (Kurt "CyberGuy" Knutsson)What does the FBI recommend?Traditional search and rescue tools, like rigid robots and specialized cameras, often struggle in disaster zones. Cameras follow only straight paths, forcing teams to cut through debris just to see further in. Rigid robots are vulnerable in tight, unstable spaces and expensive to repair when damaged. And manual probing is slow, exhausting and risks responder safety. A man working on his laptop (Kurt "CyberGuy" Knutsson)5 ways to stay safe from Medusa malware1) Use strong antivirus software: A strong antivirus isn’t just for catching old-school viruses anymore. It can detect phishing links, block malicious downloads and stop ransomware before it gets a foothold. Since the Medusa gang uses fake updates and social engineering to trick users, having strong antivirus software adds a critical layer of protection against threats you might not see coming. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Enable two-factor authentication (2FA): The FBI specifically recommends enabling 2FA across all services, especially for high-value targets like webmail accounts, VPNs and remote access tools. 2FA makes it significantly harder for attackers to break in, even if they’ve managed to steal your username and password through phishing or other tactics.3) Use strong, unique passwords: Many ransomware groups, including Medusa, rely on reused or weak passwords to gain access. Using a strong password (think long, random and unique to each account) greatly reduces that risk. A password manager can help you generate and store complex passwords so you don’t have to remember them all yourself. Get more details about my best expert-reviewed password managers of 2025 here.4) Monitor for suspicious system time changes: The core of this "time-traveling" attack is clock manipulation: Hackers roll back a device’s clock to a time when expired security certificates were still valid. This allows outdated and potentially malicious software to appear trustworthy. Be alert to unexpected system time changes, and if you're managing an organization, use tools that flag and log these types of configuration shifts.5) Keep systems updated and patch known vulnerabilities: The Medusa ransomware campaign has a track record of exploiting unpatched systems. That means old software, outdated drivers and ignored security updates can all become entry points. Regularly installing updates for your OS, applications and drivers is one of the most effective ways to stay protected. Don't put off those system notifications; they exist for a reason.Kurt’s key takeawayThe Medusa attack is a good example of how cybercriminals are shifting tactics. Instead of relying on traditional methods like brute force or obvious exploits, they are targeting the basic logic that systems depend on to function. In this case, it is something as simple as the system clock. This kind of strategy challenges the way we think about security. It is not just about building stronger defenses but also about questioning the default assumptions built into the technology we use every day.How do you think technology companies can better support individual users in protecting their data and devices? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 81 Ansichten
  • WWW.FOXNEWS.COM
    Soft vine-like robot helps rescuers find survivors
    Published April 28, 2025 6:00am EDT close 'CyberGuy': Soft-growing robot helps rescuers find survivors in collapsed buildings Kurt Knutsson talks about a soft, vine-like robot called SPROUT that aids safe survivor rescues in collapsed buildings. When disaster strikes and buildings collapse, every second counts for emergency responders searching for survivors trapped beneath rubble. Traditional tools often fall short in these dangerous, chaotic environments, but a new breed of robot, SPROUT, is poised to make a life-saving difference.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  Soft Pathfinding Robotic Observation Unit (MIT Lincoln Laboratory) (Kurt "CyberGuy" Knutsson)What is SPROUT?SPROUT, short for Soft Pathfinding Robotic Observation Unit, is a flexible, vine-like robot developed by MIT Lincoln Laboratory in collaboration with the University of Notre Dame. Unlike rigid robots or static cameras, SPROUT can "grow" into tight, winding spaces that are otherwise inaccessible, giving first responders a new way to explore, map and assess collapsed structures. Soft Pathfinding Robotic Observation Unit (MIT Lincoln Laboratory) (Kurt "CyberGuy" Knutsson)How does SPROUT work?SPROUT is made of an airtight fabric tube that inflates with air, allowing it to extend from a fixed base. As it grows, it can flex around corners and squeeze through narrow gaps, mimicking the movement of a plant vine. Operators control SPROUT using a joystick, steering it through debris while watching a live video feed from a camera mounted at the tip. This setup lets responders see and map hidden void spaces without entering dangerous areas themselves.Three pouch motors along the vine’s length enable SPROUT to bend and turn, while an internal reel system allows the robot to be compactly stored and precisely deployed as needed. In addition to cameras, SPROUT can carry other sensors to image, map and even assess hazards within the collapsed structure. Soft Pathfinding Robotic Observation Unit (MIT Lincoln Laboratory) (Kurt "CyberGuy" Knutsson)Why traditional tools fall shortTraditional search-and-rescue gear, such as rigid robots or specialized cameras, struggles in disaster zones for several reasons. Cameras can only probe straight paths, often requiring teams to cut new access holes to see further into the rubble.Rigid robots are prone to damage in unstable, cramped environments and are expensive to repair. Manual probing is time-consuming and physically exhausting for responders.SPROUT’s soft, flexible design directly addresses these challenges, offering a safer, faster and more adaptable solution for navigating the unpredictable landscape of collapsed buildings. Soft Pathfinding Robotic Observation Unit (MIT Lincoln Laboratory) (Kurt "CyberGuy" Knutsson)Real-world testing and impactSPROUT has already been put through its paces at the Massachusetts Task Force 1 training site, where it demonstrated its ability to flex around corners and penetrate void spaces in engineered collapsed structures. These tests allowed the team to refine SPROUT’s durability, portability and steering controls, with plans for larger field studies underway.The project is a true collaboration, pairing MIT’s engineering expertise with Professor Margaret Coad’s pioneering work on vine robots at Notre Dame. This partnership has accelerated SPROUT’s development, bringing hands-on demonstrations to first responders, many of whom have limited research and development budgets. Soft Pathfinding Robotic Observation Unit (MIT Lincoln Laboratory) (Kurt "CyberGuy" Knutsson)Looking ahead: The future of SPROUTThe team behind SPROUT is continuously working to expand its capabilities. Current models can extend up to 10 feet, with future versions aiming to reach beyond 25 feet. Researchers are also exploring the use of multiple SPROUT robots to cover larger areas and expedite rescue operations in major disasters.Beyond disaster response, the technology could be adapted for inspecting military systems or critical infrastructure in hard-to-reach places, making SPROUT a versatile tool for a variety of high-stakes scenarios. Soft Pathfinding Robotic Observation Unit (MIT Lincoln Laboratory) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysSPROUT is a remarkable example of how soft robotics can make a real difference in some of the most challenging and dangerous situations. By giving first responders a flexible, easy-to-use tool for searching through rubble, SPROUT has the potential to save lives and change the way we approach disaster rescue. It’s great to see technology that’s not just innovative but truly impactful, helping those who help others when it matters most.How do you feel about robots being used to explore dangerous places where people can’t easily go? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 69 Ansichten
  • WWW.FOXNEWS.COM
    Blue Shield exposed 4.7M patients’ health data to Google
    Published April 27, 2025 10:00am EDT close When a Facebook friend request turns into a hacker’s trap These scams can catch Facebook veterans and novices off guard. Healthcare institutions and insurers arguably collect the most sensitive information about you, including IDs, contact details, addresses and medical records. But they often don’t put in the same level of effort to protect that data. That’s clear from the growing number of healthcare data breaches we’ve seen recently. In most of those cases, a bad actor was involved. But in the latest news, health insurance giant Blue Shield of California confirmed that it had been sharing private health data of 4.7 million users with Google for three years without even realizing it.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW A person doing a Google search  (Kurt "CyberGuy" Knutsson))What you need to knowBlue Shield of California just admitted to a major data privacy slip that went on for almost three years, from April 2021 to January 2024. It was using Google Analytics to track how people used its member websites. This is totally normal since every business does it. But the tool was accidentally sharing sensitive info with Google Ads because it wasn’t set up properly. What I find extremely shocking is that it took the company three years to realize it was sharing its user data with Google to run ads. This says a lot about how much these healthcare giants care about protecting your data. The shared data included a broad array of protected health information (PHI), including names, zip codes, gender, medical claim dates, online account numbers, insurance plan names, group numbers, family data and even search criteria used in its "Find a Doctor" feature."Google may have used this data to conduct focused ad campaigns back to those individual members. We want to reassure our members that no bad actor was involved, and, to our knowledge, Google has not used the information for any purpose other than these ads or shared the protected information with anyone," the company said in a notice on its website.This incident is not isolated. Over the past few years, healthcare and tech companies have come under scrutiny for similar missteps. The Federal Trade Commission (FTC) and the Department of Health and Human Services (HHS) have already issued warnings about the use of tracking technologies in healthcare, especially those that might expose patient data to third parties without adequate transparency or safeguards.A Google spokesperson provided the following comment to CyberGuy when asked about the Blue Shield data breach:"Businesses, not Google, manage the data they collect and must inform users about its collection and use. By default, any data sent to Google Analytics for measurement does not identify individuals, and we have strict policies against collecting private health information (PHI) or advertising based on sensitive information." A person working on their laptop  (Kurt "CyberGuy" Knutsson)Impact on patients and the industrySince the data was only shared with Google and not any other party, the overall risk is relatively low, apart from the clear privacy violation. It’s highly unlikely that anyone else will gain access to it, so the chances of the data being misused are slim. Google says it doesn’t allow ads to be served based on sensitive information like health, so there’s a good chance your data wasn’t even used for advertising.Blue Shield's case follows a string of similar breaches. Companies like GoodRx, BetterHelp and Kaiser have all faced regulatory and legal consequences for sharing sensitive user data with advertising vendors. Some even settled for millions of dollars. Despite the risks, many healthcare organizations have continued using these tools due to the lack of clear regulatory guardrails, a situation complicated further by a federal court ruling that blocked the Biden administration’s attempts to curb the use of online trackers in healthcare settings.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A person working on a laptop (Kurt "CyberGuy" Knutsson)How to protect your health data onlineThe Blue Shield of California incident is a reminder that even well-known healthcare providers can mishandle sensitive data. While you can’t always control what happens behind the scenes, there are steps you can take to reduce your exposure and safeguard your privacy:1. Limit what you share on health portals: Avoid entering more personal details than absolutely necessary on insurance or provider websites. Tools like "Find a Doctor" might log your search terms, so keep inputs vague when possible.2. Use privacy-focused browsers: Browsers like Brave or Firefox offer built-in privacy protections, such as blocking third-party trackers that could expose health-related browsing activity.3. Turn off ad personalization: Visit Google’s Ad Settings and disable ad personalization. This won’t stop tracking, but it can reduce how your data is used for targeting.4. Opt out of tracking where possible: Many healthcare sites use cookies and tracking tools. Choose "reject all" or the strictest privacy settings in cookie banners. If a tracking opt-out tool is available, use it.5. Read privacy policies (yes, really): Look for language like "third-party sharing," "advertising," or "analytics." If a healthcare provider mentions tools like Google Analytics or Meta Pixel, that’s a cue to proceed cautiously.6. Monitor your accounts and credit: Keep an eye out for unusual insurance claims or medical charges. Set up credit alerts or monitoring services if your provider offers them, especially after a breach.7. Ask questions: Call or email your healthcare provider or insurer. Ask what tracking tools they use and how they protect your data. The more consumers push for transparency, the more pressure there is to improve standards.GET FOX BUSINESS ON THE GO BY CLICKING HEREBonus privacy steps (For extra peace of mind)If you want to go beyond the basics, here are some additional steps that can help reduce your digital footprint and catch misuse early:Use a personal data removal service: While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Consider identity theft protection services: If you’re concerned about fraud or medical identity theft, you'll want to consider using identity theft protection services. Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account.  They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Use strong antivirus software: To guard against malware or phishing attacks that could compromise access to your online health accounts, be sure to use strong antivirus software. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurt’s key takeawayIt baffles me how careless most companies are when it comes to protecting user data. Blue Shield "mistakenly" shared your data with Google, which then used it to show personalized ads. It took the company three years to realize this. While most cyber incidents involve an attacker, this breach didn’t need one. We need accountability in data practices, especially when human error or tech oversight can cause damage at scale.CLICK HERE TO GET THE FOX NEWS APPHow comfortable are you knowing that your health data might be used to target ads? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 92 Ansichten
  • WWW.FOXNEWS.COM
    Future of flying: Fuel-sipping jet promises quieter, greener skies
    Published April 27, 2025 6:00am EDT close Future of flying: New fuel-sipping jet promises quieter, greener skies The blended wing body craft reduces drag and weight, resulting in fuel efficiency improvements of up to 50% compared to today’s aircraft. Delta Air Lines is partnering with aerospace startup JetZero to introduce a revolutionary aircraft design that has the potential to transform the future of commercial flying. This new design, called the blended wing body (BWB) aircraft, differs dramatically from the traditional tube-and-wing planes in service. By combining the wings and fuselage into a single, wide, flat shape, the BWB reduces drag and weight, resulting in fuel efficiency improvements of up to 50% compared to today’s aircraft.Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my  Blended wing body aircraft  (JetZero)Driving toward net-zero emissions by 2050The blended wing body (BWB) aircraft represents a critical component of Delta’s strategy to decarbonize aviation, with its fuel efficiency gains directly supporting the airline’s 2050 net-zero target. By leveraging existing engine technology, the design avoids delays associated with developing new propulsion systems, enabling faster adoption across fleets. The aircraft’s capacity to transport over 250 passengers, matching mid-sized international jets in range and wide-body models in seating, positions it as a practical solution for reducing emissions without compromising operational needs. Its noise-reducing engine placement and compatibility with current airport infrastructure address both environmental and logistical challenges, while integration with sustainable aviation fuels amplifies its role in cutting lifecycle carbon emissions. This multifaceted approach demonstrates how innovative airframe technology can accelerate the industry’s shift toward cleaner travel. Blended wing body aircraft  (JetZero)Delta’s role: Turning innovation into realityDelta is deeply involved in the project beyond financial support. Through its Sustainable Skies Lab, the airline is contributing operational expertise to help make the BWB aircraft commercially viable. This includes advising on maintenance, airport operations and other practical considerations necessary for the aircraft’s success in everyday airline service. Amelia DeLuca, Delta’s chief sustainability officer, highlights the importance of this collaboration, stating that working with JetZero to develop a new airframe and passenger experience is an essential step toward advancing the airline industry’s fuel-saving and innovation goals.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Blended wing body aircraft  (JetZero)Rethinking the passenger experienceThe interior of the BWB aircraft is being thoughtfully redesigned to enhance comfort and accessibility. The wider and flatter shape of the plane’s body allows for new cabin layouts. Delta aims to provide dedicated overhead bin space for every passenger, more accessible seating and lavatories and fewer rows to create a less crowded environment. Additionally, the engines will be mounted on top of the aircraft, which is expected to significantly reduce cabin noise and lower noise pollution around airports. Inside a blended wing body aircraft  (JetZero)Backed by industry and government supportThis partnership follows JetZero’s receipt of a significant grant from the U.S. Air Force in 2023 to build a full-scale demonstrator aircraft, with a first flight planned for 2027. The grant, along with collaborations with aerospace leaders such as Northrop Grumman and Scaled Composites, reflects strong government and industry support for the BWB concept. Delta has been involved with JetZero since 2021, providing valuable guidance on how to bring this technology to market.GET FOX BUSINESS ON THE GO BY CLICKING HERE Blended wing body aircraft  (JetZero)The need for breakthrough technologies in aviationOver the past 50 years, the aviation industry has made impressive gains in fuel efficiency, improving by roughly 80% through innovations like winglets and lighter materials. Delta alone saved more than 40 million gallons of fuel in 2024 by optimizing operations and upgrading its fleet. Still, the industry acknowledges that incremental improvements are insufficient to meet pressing climate goals. Technologies like the BWB aircraft are necessary to achieve the significant reductions in emissions and fuel consumption that the future demands. Blended wing body aircraft  (JetZero)Kurt's key takeawaysDelta and JetZero’s collaboration marks a meaningful step toward a cleaner, quieter and more efficient future for air travel. While challenges remain, including regulatory approvals and ensuring passenger comfort with the new design, this partnership exemplifies the aviation industry’s dedication to innovation and sustainability. The future of flying is being reshaped by bold ideas like the blended wing body aircraft, which promise to make air travel more environmentally responsible while improving the overall passenger experience.CLICK HERE TO GET THE FOX NEWS APPWould you be excited to fly on a radically redesigned airplane that promises greater comfort, quieter cabins and a smaller carbon footprint — even if it means adjusting to a very different cabin layout and window view than what you’re used to?  Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 105 Ansichten
  • WWW.FOXNEWS.COM
    How secure is my password? Use this test to find out
    Published April 26, 2025 10:00am EDT close Kurt "CyberGuy" Knutsson speaks on passwords The CyberGuy shows you how to strengthen your passwords on your Google account. The RockYou2024 leak, which exposed almost 10 billion passwords in July of last year, might seem like old news, but its impact is still felt today.  It's considered the largest password compilation ever released. With such a vast collection of breached credentials circulating, the risk of credential stuffing, identity theft and unauthorized access to online accounts and systems remains high. For anyone still reusing passwords, the dangers are real — and growing. That's why password security has never been more critical, and the big question remains, how secure is my password?Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my  Username and password on tablet  (Kurt "CyberGuy" Knutsson)Why does password strength matter?Think of weak passwords as an open door for hackers. Recent reports show that many common passwords can be cracked in literally seconds. Simple or reused passwords are especially vulnerable to automated attacks, and once one account is breached, others are often quickly compromised.If a company you’re signed up with experiences a data breach and your login info is leaked, attackers can try that same password on other platforms, potentially unlocking a lot more than just one account.Strong passwords act as your first line of defense. They’re long, complex and unique, making it significantly harder for attackers to guess or force their way in. When every account has its own strong password, even if one gets leaked, the rest stay safe.Think of it this way. A weak password is like using the same key for your house, car and office and leaving it under the doormat. A strong password? It’s like a unique, high-security key for every door in your digital life. Illustration of username and password  (Kurt "CyberGuy" Knutsson)What are the top 5 passwords to avoid?The most commonly used and insecure passwords are:12345612345678912345678passwordQwerty123These passwords are extremely easy to guess and should be avoided at all costs. Illustration of password login on laptop  (Kurt "CyberGuy" Knutsson)Password strength test: 7-point self-evaluation checklistHow secure is your password, really? It’s time to put it to the test. Grab a pen (or just keep a mental tally) and score yourself based on this 7-point password strength test. Each "yes" earns you a point.1. Is your password at least 12 characters long?Length is your first line of defense. Short passwords — think six or eight characters — can be cracked in minutes by modern hacking tools. At 12 characters or more, you’re making it exponentially harder for attacks to succeed.2. Does it include a mix of upper and lowercase letters?Mixing uppercase and lowercase letters strengthens your password by increasing complexity. For example, instead of using something like "t8g5k9w2," use "T8g5K9w2" — same characters, just more variety. Mix it up.3. Does it include numbers?Adding numbers makes your password harder to crack. Instead of sticking to just letters — like "Trkplmsh" — try something like "Tr8k5Plm2sh." Randomly placed numbers increase complexity and make your password much more secure.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?4. Does it include special characters?Symbols like !, @, #, and $ add another layer of security. For example, a password like "T8g5K9w2" becomes even stronger as "T8g5#K9w2!." Special characters increase complexity and help defend against attacks.5. Is it unique (not reused across accounts)?Reusing passwords is like handing hackers a master key. If one account gets breached, and you’ve reused that password elsewhere, you’re toast. One password, one purpose. No exceptions.6. Does it avoid personal info like your birthdate?Your name, birthday or "Fluffy1990" (your dog’s name and birth year) might feel clever, but they’re goldmines for attackers who can scrape social media or breached data. Keep it impersonal and unpredictable.7. Have you changed it in the last 90 days?Even good passwords can go stale. It’s a smart move to update them every 90 days, or sooner if a site you use has a security issue. Illustration of password login on laptop  (Kurt "CyberGuy" Knutsson)How did you score? Now, let’s take a look at your score:0-2 points: Uh-oh. Your passwords are waving a welcome flag to hackers. Time for a serious upgrade.3-4 points: Not terrible, but you’re still vulnerable. Patch those weak spots pronto.5-6 points: Solid effort! You’re close to fortress-level security — tweak a bit more.7 points: Nailed it. Your password is strong and secure — just remember to keep it updated.This quick password strength test isn’t just a quiz, it’s a good reminder. Even one weak spot could be all it takes for someone to break in. In a world full of data leaks, a strong, unique password is one of the easiest ways to protect yourself. So, what’s your score? Think it’s time to level up?What should I do if my password strength is low?If your score didn’t quite hit that seven out of seven mark, no worries. The good news? You’ve already taken the first step by identifying the weak spots. Now, you’ve got two options:GET FOX BUSINESS ON THE GO BY CLICKING HEREBuild a better password yourselfTo keep your passwords secure, use ones that are at least 12 characters long with a mix of uppercase and lowercase letters, numbers and special characters. Avoid using personal information or common patterns. Always use a different password for each account, and enable two-factor authentication whenever it's available. While you can build a strong password on your own, let’s be real, it’s not always easy. Coming up with something that’s at least 12 characters long, includes uppercase and lowercase letters, numbers, special symbols and isn’t based on anything personal? That’s a tall order. And even if you do manage to craft the perfect one, you’ve still got to remember it, especially if you’re using a different strong password for every account (which you absolutely should be).Let a password generator do the heavy liftingThis is the easier, faster and frankly smarter route. A password generator creates long, complex, completely random passwords for you — no guesswork or mental gymnastics required. These tools are designed to pump out passwords that check all the boxes, making them far harder to crack. If you want an easy and secure option, many password managers include built-in password generators that follow best practices for maximum strength. Either way, the key takeaway is this: Don’t settle for weak or recycled passwords. Whether you go DIY or use a tool, upgrading your password strength is one of the simplest ways to protect yourself online. Illustration of online banking login on laptop  (Kurt "CyberGuy" Knutsson)What is the best password manager?Password security can seem like a tough thing to maintain manually. The good news is that password managers take the hassle out of it by generating, storing and autofilling strong, unique passwords for you.We recommend a password manager that is secure, user-friendly and includes features like a password health tool, data breach monitoring and a built-in password generator to help you create strong, unique passwords. Essentially, they are a digital safe designed to encrypt and store your login credentials, passkeys, credit card details, personal information and even sensitive files. It remembers everything for you, organizes your credentials neatly and fills in login forms with a single click. When you sign up for a new site, it autosaves the password with no effort required.The best part? A password manager puts an end to password reuse. Instead of leaning on that tired old "Fluffy1990" for every account, it generates strong, unique passwords tailored to each site, boosting security for both your personal and professional life. So, with a password manager, you’ll no longer have to ask yourself, how secure is my password?Get more details about my best expert-reviewed Password Managers of 2025 here.Kurt's key takeawaysWith data breaches becoming increasingly common, it's clear that password security isn't a "set it and forget it" task. It's an ongoing process. By prioritizing strong passwords and using tools to help you manage them effectively, you can significantly reduce your risk and enjoy greater peace of mind online.CLICK HERE TO GET THE FOX NEWS APPDo you feel that the companies you interact with online are doing enough to protect your data and passwords? What more could they be doing? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 107 Ansichten
  • WWW.FOXNEWS.COM
    Fox News AI Newsletter: Woman says ChatGPT saved her life
    By Fox News Staff Fox News Published April 26, 2025 8:30am EDT (Kennedy News and Media) Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- Woman says ChatGPT saved her life by helping detect cancer, which doctors missed- Tesla launches test run for FSD Supervised, an AI-powered ride hailing service- China's AI DeepSeek faces House probe over US data harvesting, CCP propaganda Lauren Bannon says ChatGPT helped diagnose her with cancer. (Kennedy News and Media)'LUCKY TO BE ALIVE': A mother of two credits ChatGPT for saving her life, claiming the artificial intelligence chatbot flagged the condition leading to her cancer when doctors missed it.AUTONOMY TEST RUN: Robotaxis are closer to becoming a reality, after Tesla launched a full self-driving (FSD) supervised ride-hailing service in Austin, Texas, and the San Francisco Bay Area "for an early set of employees." Robotaxi.  (Kurt "CyberGuy" Knutsson)HARVESTING YOUR DATA?: A powerful House Committee is demanding information from DeepSeek on what U.S. data it used to train the AI model as members accuse the company of being in the pocket of the Chinese government. DeepSeek (Reuters/Dado Ruvic/Illustration)EDUCATION REFORMS: President Donald Trump signed multiple Executive Orders relating to education Wednesday afternoon, with several tied to the theme of returning meritocracy back to the education system.WORTH THE RISKS?: If you haven’t heard the buzz about Manus yet, it's the new AI model unveiled by a Singapore-based company called Butterfly Effect. This isn’t just another chatbot. It’s one of the first truly autonomous AI agents, able to do its own research, make decisions and even carry out plans, all with barely any human oversight.FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff.
    0 Kommentare 0 Anteile 107 Ansichten
  • WWW.FOXNEWS.COM
    Chinese humanoid robot with eagle-eye vision and powerful AI
    Published April 26, 2025 6:00am EDT close Chinese humanoid robot with eagle-eye vision and powerful AI Iron stands 5 feet, 8 inches tall, weighs 154 pounds and combines advanced artificial intelligence with human-like movement and exceptional vision. XPENG’s humanoid robot, Iron, is not your typical factory machine. Standing 5 feet, 8 inches tall and weighing 154 pounds, Iron combines advanced artificial intelligence with human-like movement and exceptional vision. Already hard at work assembling electric vehicles in XPENG’s factories, this robot is designed to change how we think about robots in everyday life.Join The FREE CyberGuy Report: Get my expert tech tips, critical security alerts and exclusive deals — plus instant access to my  Iron the humanoid robot  (XPENG)From factory floors to everyday tasksIron’s design includes 60 joints and 200 degrees of freedom, allowing it to move smoothly and naturally. Unlike traditional robots that often move with jerky or stiff motions, Iron walks steadily and can manipulate objects with precision thanks to its human-like hands. XPENG has developed its mobility system using reinforcement learning and large artificial intelligence models, enabling Iron to adapt to a variety of complex tasks. While it currently helps build cars, XPENG envisions Iron performing administrative work, customer service and even household chores in the future. Iron, the humanoid robot  (XPENG)A brain like no otherAt the heart of Iron is XPENG’s proprietary Turing AI chip, a powerful processor capable of handling 3,000 trillion operations per second. This chip processes AI models with 30 billion parameters, allowing Iron to think, adapt and respond with human-like intelligence. Iron’s vision system, inspired by XPENG’s self-driving car technology, offers a remarkable 720-degree field of view, giving the robot eagle-like awareness of its surroundings. Its speech interaction system is also adapted from XPENG’s intelligent vehicle cockpits, enabling natural and logical conversations.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Iron, the humanoid robot  (XPENG)More than just a robotXPENG is not limiting Iron to factory work. The company sees Iron as a personal assistant that can support people in offices, retail environments and homes. Although the current version is priced around $150,000 and targeted mainly at businesses, XPENG plans to develop more accessible versions for everyday consumers. Iron’s advanced dexterity, powered by custom-designed robotic hands with 15 degrees of freedom each, allows it to handle delicate tasks that require fine motor skills.GET FOX BUSINESS ON THE GO BY CLICKING HERE Iron, the humanoid robot  (XPENG)Part of a bigger visionIron is a key piece of XPENG’s broader AI Tech Tree strategy, which aims to create an ecosystem of smart electric vehicles, humanoid robots and even flying vehicles. This vision is also reflected in the company’s new 2025 XPENG X9 electric SUV, which features hundreds of technical upgrades, including ultra-fast charging and AI-powered driving systems that mimic human decision-making. Together, these innovations showcase XPENG’s ambition to blend robotics and automotive technology into a seamless future.Kurt's key takeawaysBy leveraging AI technology originally developed for its electric vehicles, XPENG is creating a robot that bridges the gap between automotive innovation and humanoid robotics. With a significant investment and a clear roadmap, Iron has the potential to become much more than a factory assistant.It could soon become a helpful presence in offices and homes, changing how we interact with machines in everyday life.CLICK HERE TO GET THE FOX NEWS APPIron’s creators promise a future of seamless human-robot collaboration. But as it masters everything from car assembly to household chores, are we sleepwalking into a world where humans become obsolete, or is this the key to unlocking our greatest potential? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 91 Ansichten
  • WWW.FOXNEWS.COM
    Hertz data breach exposes customer information
    Published April 25, 2025 10:00am EDT close 'CyberGuy': This year’s most devastating data breaches Kurt Knutsson: Data breaches in 2024 exposed info of millions, stressing the need for better cybersecurity. Most companies use different vendors to run different parts of their business, such as customer management, finances, payroll and social media. To do this, they share access to customer data with these platforms. The issue is that not all vendors take cybersecurity seriously, and hackers are well aware of that. More and more, attackers are going after these weaker links in the digital supply chain. These kinds of breaches often happen quietly, exposing large amounts of customer information without touching a company’s main systems. It’s becoming a serious concern for both businesses and their customers. One of the latest cases involves Hertz, the car rental giant, which recently confirmed that customer data was exposed because of a cyberattack on one of its software vendors.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  Hertz rental location (Hertz)What happened at Hertz?Hertz, the global car rental company that also operates Dollar and Thrifty, has disclosed a data breach affecting thousands of its customers. The incident stems from a cyberattack on one of its third-party vendors, software provider Cleo, between October and December 2024. The breach did not compromise Hertz’s internal systems directly but involved data that had been shared with the vendor as part of its operational workflow.The compromised data varies by region but includes sensitive personal information such as names, dates of birth, contact details, driver’s license numbers and, in some cases, Social Security numbers and other government-issued IDs. Certain financial information, including payment card details and workers’ compensation claims, was also among the stolen records.In the U.S., disclosures were filed with regulatory bodies in California, Texas and Maine. Specifically, 3,457 individuals were affected in Maine and 96,665 in Texas. The total global impact, however, is believed to be far greater. Customers in Australia, Canada, the EU, New Zealand and the U.K. were also notified via breach notices on Hertz’s regional websites.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The breach is believed to be the work of the Clop ransomware gang, a well-known Russia-linked hacking group. Clop exploited a zero-day vulnerability in Cleo’s enterprise file transfer software, technology used by many large organizations to securely transmit sensitive business data. In 2024, the gang launched a mass-hacking campaign targeting Cleo users, ultimately stealing data from more than 60 companies, including Hertz.Interestingly, while Hertz was named on Clop’s dark web leak site in 2024, the company initially stated it had "no evidence" its systems or data had been compromised.When contacted by CyberGuy, a Hertz spokesperson said, "At Hertz, we take the privacy and security of personal information seriously. This vendor event involves Cleo, a file transfer platform used by Hertz for limited purposes. Importantly, to date, our forensic investigation has found no evidence that Hertz's own network was affected by this event. However, among many other companies affected by this event, we have confirmed that Hertz data was acquired by an unauthorized third party that we understand exploited zero-day vulnerabilities within Cleo's platform in October 2024 and December 2024." Hertz rental location (Hertz)What does this mean for customers?While Hertz’s internal systems were not breached, the exposure of personal data, including driver’s license numbers, contact details and government-issued IDs, poses serious risks. Affected individuals may be vulnerable to identity theft, fraudulent account openings and targeted phishing attempts. If Social Security numbers were involved, the potential for harm increases significantly. Anyone who rented from Hertz, Dollar or Thrifty between October and December 2024 should be on high alert. A hacker at work (Kurt "CyberGuy" Knutsson)7 ways to protect yourself after the Hertz data breachIf you think you were affected or just want to be cautious, here are some steps you can take right now to stay safe from the Hertz data breach.1. Watch out for phishing scams and use strong antivirus software: With access to your email, phone number or identification documents, attackers can craft convincing phishing emails pretending to be from healthcare providers or banks. These emails might include malicious links designed to install malware or steal login information. To defend yourself, use a strong antivirus program. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2. Scrub your data from the internet using a personal data removal service: The more exposed your personal information is online, the easier it is for scammers to use it against you. Following the Hertz breach, consider removing your information from public databases and people-search sites. Check out my top picks for data removal services here.3. Safeguard against identity theft and use identity theft protection: Hackers now have access to high-value information from the Hertz breach, including Social Security numbers, driver's license and bank information. This makes you a prime target for identity theft. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. Signing up for identity theft protection gives you 24/7 monitoring, alerts for unusual activity and support if your identity is stolen. See my tips and best picks on how to protect yourself from identity theft.GET FOX BUSINESS ON THE GO BY CLICKING HERE4. Set up fraud alerts: Requesting fraud alerts notifies creditors that they need extra verification before issuing credit in your name. You can request fraud alerts through any one of the three major credit bureaus; they’ll notify the others. This adds another layer of protection without completely freezing access to credit. 5. Monitor your credit reports: Check your credit reports regularly through AnnualCreditReport.com, where you can access free reports from each bureau once per year or more frequently if you’re concerned about fraud. Spotting unauthorized accounts early can prevent larger financial damage.6. Change passwords and use a password manager: Update passwords on any accounts tied to compromised data. Use unique passwords that are hard to guess and let a password manager do the heavy lifting by generating secure ones for you. Reused passwords are an easy target after breaches. Consider password managers for convenience and security. Get more details about my best expert-reviewed password managers of 2025 here.7. Be wary of social engineering attacks: Hackers may use stolen details like names or birth dates from breaches in phone scams or fake customer service calls designed to trick you into revealing more sensitive info. Never share personal details over unsolicited calls or emails. Social engineering attacks rely on trust, and vigilance is key. Kurt’s key takeawayCyber risk doesn’t always come from a company’s own network. It often originates in unseen corners of the digital supply chain. Even as companies double down on internal cybersecurity, they must be equally rigorous in how they vet and monitor third-party vendors. For consumers, it’s no longer enough to trust the big brand on the label. The data trail is wider, the attack surface larger and the consequences far more opaque. CLICK HERE TO GET THE FOX NEWS APPIf companies can’t protect our data, should they be allowed to collect so much of it? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 108 Ansichten
  • WWW.FOXNEWS.COM
    10 cool AirPods features you probably didn't know about
    close Apple’s AirPods Pro 2 makes hearing tests as easy as a tap Checking your hearing just got much easier. When AirPods first hit the scene in 2016, they revolutionized the way we listen to music on the go. Not only did they seamlessly integrate with the Apple ecosystem, but some models also delivered sound quality and noise-canceling capabilities that gave traditional audio brands a run for their money. But what really sets AirPods apart is the array of innovative features that go way beyond what you'd expect from typical earbuds, features that might just surprise you.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  A woman wearing AirPods (Kurt "CyberGuy" Knutsson)Top 10 hidden features of AirPodsBelow are features that you may or may not know about to take your AirPods experience to the next level. The features below are for original, second-generation and first-generation AirPods Pro. Apple Watch and AirPods (Apple)1. Go hands-free and pair your AirPods with your Apple WatchIf you want to use your AirPods but don’t want to lug around the extra weight of your iPhone, you can use your AirPods with your Apple Watch. In order to get your AirPods set up to use with your Apple Watch:Go to your Apple WatchPress the crown on the right side of your Apple WatchTap SettingsScroll down to Bluetooth and tap itThe watch is now searching for your AirPodsGrab your AirPods and lift the lid. Press and hold the button at the back of the case. This will put the AirPods in discoverable modeTap where it says AirPods are not paired on your Apple Watch. It should now say connected2. Use your AirPods as a microphoneWhen recording audio (e.g., Voice Memos, calls) or using voice-enabled apps, you can prioritize specific AirPods as the microphone. To turn on this feature:Go to settings on your iPhoneClick BluetoothUnder My Devices, tap the (i) info icon next to your AirPodsSelect MicrophoneSelect Automatically Switch AirPods (default), Always Left AirPod or Always Right AirPodWHAT IS ARTIFICIAL INTELLIGENCE (AI)? Control panel on iPhone (Apple)3. Share Audio with someone elseWith iOS 13.1 or later (required for full functionality), you can temporarily share audio from your iPhone to two sets of AirPods or Beats headphones with H1, H2 or W1 chips (e.g., AirPods Pro). Both devices must be iPhone 8 or later, iPad Pro 2nd Gen or newer, iPad Air 3rd Gen or later or iPad mini 5th Gen or later.Wear your AirPods (connected to your iPhone) and start playing audio (optional but recommended for visibility)Open Control CenterTap the AirPlay icon (triangle with circles)Select Share AudioBring the other person’s headphones near your iPhone and place AirPods in their caseOpen the lidHold the pairing button until the prompt appearsIf undetected, ensure their headphones are in pairing mode (Hold case button)Select their headphones from the Share Audio menuThe friend may need to tap Join on their device if sharing via iPhone proximityAdjust volumes separately via Control Center’s volume slider4. Find your lost AirPodsThe challenge of wireless earbuds is how easy it is to misplace or lose them or the case they are housed in. Apple has provided an easy way to help you keep track of both your case and AirPods with the "Find My" feature. To use this feature to find your AirPods or case:Open the Find My app on your iPhoneSelect the Devices tabChoose your AirPods. Under each device, you see a location or "No location found"If you think your AirPods are near you, click Play Sound5. Announce callersInstead of fumbling to find your phone to find out who is calling you, you can have your AirPods announce who is calling you. To turn on this feature:Go to Settings on your iPhoneTap on AppsTap PhoneTap Announce CallsSelect Headphones Only6. Customize controls on your AirPodsMost users know that double-pressing the AirPods stems once or twice plays or pauses whatever audio you’re listening to or answers a call. You can, however, customize AirPods settings to provide a different function. If you want to customize each stem to do something else:Go to Settings on your iPhoneTap your AirPodsUnder Press and Hold AirPods, select Left or Right and choose what happens when you double-press that AirPod: Noise Control, Siri, Answer Call, Mute & Unmute or End Call Steps to customize controls on AirPods (Kurt "CyberGuy" Knutsson)7. Find out what the different colored lights meanThe status light on your AirPods case uses colors and flashing patterns to indicate battery levels, charging status and pairing states. Location varies by model (front for AirPods Pro/3/4/Wireless cases; inside for Lightning cases on AirPods 1/2).Steady lightsGreen (AirPods in case, lid open): Both AirPods and case are fully chargedGreen (AirPods out of case, lid open): The case alone is fully chargedAmber/Orange (AirPods in case, lid open): AirPods are currently charging (not yet full)Amber/Orange (AirPods out of case, lid open): Case has less than one full charge (not necessarily "one charge left")Flashing lightsFlashing White: AirPods are in pairing mode (ready for setup)Flashing Amber/Orange: Indicates a pairing error requiring a reset, not just re-setupNo Light: Case or AirPods are completely drainedGET FOX BUSINESS ON THE GO BY CLICKING HERECharging behaviorPlugged in/Wireless charging: Amber = actively charging; Green = fully chargedOptimized Charging (Pro/3/4): Pauses charging at 80% if enabled (Settings > Bluetooth > AirPods)8. Use AirPods as a hearing aidOne of the most impressive features of AirPods is the ability to turn your iPhone into a remote listening device and AirPods into hearing aids. If you’re in a loud environment and can’t hear the person standing next to you, you can place the iPhone near the person you want to hear and the iPhone microphone will transmit whatever they say to the AirPods connected to the iPhone, making it easier for you to hear them. To enable this feature:Open the Control Center on your iPhone (usually accessed by swiping down on your phone’s screen)Tap the Hearing iconTap Live ListenPlace the iPhone near the sound source (works up to 50 feet) Step to use AirPods as a hearing aid (Kurt "CyberGuy" Knutsson)9. Reach Siri without pulling out your phoneMost AirPods let you access Siri hands-free when connected to an Apple device with Siri enabled. If your hands are full, or you don’t want to use your iPhone, just say, "Hey, Siri," to send texts, check battery life, skip songs, set timers and more. Note: On AirPods Pro 2 and AirPods 4, you can also just say "Siri" without needing to say "Hey, Siri." To use Siri with AirPods:Make sure Siri is enabled on your device (Settings > Siri)With AirPods in your ears, say "Hey Siri" (or just "Siri" on supported models)You can also activate Siri by pressing or tapping your AirPods (double-tap, press-and-hold or Digital Crown (depending on model)10. Answer or decline calls without making a sound or pressing a buttonYou can answer or decline calls without saying a word or pressing any buttons by using the Head Gestures feature with your AirPods. When this feature is on, you can nod your head up and down or shake it side to side to accept or decline calls while wearing your AirPods. To enable Head Gestures once your AirPods are connected to your iPhone:Go to SettingsTap your AirPods name at the topTap Head GesturesToggle Head Gestures onChoose your preferred motion for Accept/Reply (Up and Down or Side to Side)Choose your preferred motion for Decline/Dismiss (Up and Down or Side to Side)Now, when you get a call, Siri will announce the caller, and you can nod to answer or shake your head to decline without touching your phone or AirPods.Kurt’s key takeawaysApple has truly revolutionized the wireless listening experience with AirPods. Not only does it elevate your experience seamlessly within the Apple ecosystem, but it also makes your life better with plenty of hidden features. Whether you want to hear others more clearly or simply make your life easier, AirPods include an incredible number of features that pack a punch.Have you explored all these hidden features of AirPods? Which hidden features are your favorites? Let us know by writing us atCyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 108 Ansichten
  • WWW.FOXNEWS.COM
    Browser extensions put millions of Google Chrome users at risk
    Published April 24, 2025 10:00am EDT close 'There's no sense of privacy involved': 'CyberGuy' warns AI users' privacy could be at risk Tech expert Kurt Knutsson discusses tips on how to protect your data amid AI privacy concerns, and he talks about Ford filing a patent to bring the stick shift to electric vehicles.  Browser extensions can be a great way to boost your productivity while browsing. Chrome, which is the most popular browser out there, supports a wide range of extensions, and so do other Chromium-based browsers. However, these extensions are not always beneficial. While many are helpful for blocking ads, finding the best deals or checking grammar errors, some can end up doing more harm than good.I recently reported on a group of malicious extensions that were stealing user data, and now a new report has flagged 35 more suspicious ones. These browser extensions request unnecessary permissions and have been reported to collect and share everything you do online.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  A man using Google Chrome browser on his laptop. (Kurt "CyberGuy" Knutsson)Sketchy extensions in the wildA recent investigation by John Tuckner, founder of Secure Annex, revealed concerns about 35 Chrome extensions, posing potential privacy and security risks. These extensions, many unlisted on the Chrome Web Store, were collectively installed over 4 million times. Many of these sketchy extensions presented themselves as tools for search assistance, ad-blocking, security monitoring or extension scanning but shared a connection to a single, unused domain, suggesting coordinated behavior. They all use the same code patterns, connect to some of the same servers and require the same list of sensitive systems permissions, including the ability to interact with web traffic on all URLs visited, access cookies, manage browser tabs and execute scripts. What’s more concerning is that at least 10 of these extensions carried Google’s "Featured" badge, implying vetting for trustworthiness. This raises questions about Google’s review process, as the badge suggests compliance with high standards for user experience, privacy and security. A hacker at work. (Kurt "CyberGuy" Knutsson)Why are these extensions bad?The main concern is the level of access these extensions quietly request and how they use it. With permissions to read tabs, access cookies, intercept web requests and inject scripts into pages, they can monitor nearly everything you do in your browser. This includes tracking your browsing activity, observing login sessions and altering the content of websites you visit, all without your knowledge.These extensions are not simply misconfigured tools. They appear to be intentionally designed with surveillance in mind. Many store their configuration data locally, which allows remote servers to update their behavior at any time. This setup is commonly seen in spyware, where changes can be made after installation without alerting the user. The code is heavily obfuscated, making it difficult for researchers to understand what the extensions are actually doing.In some cases, the extensions appear to do nothing at all when clicked. However, they continue to send data in the background. For instance, the Fire Shield Extension Protection remained inactive until the researcher manually triggered it with a specific extension ID. Only then did it begin to transmit browsing activity and other data, revealing behavior that would be hard for an average user to detect. A person working on their laptop. (Kurt "CyberGuy" Knutsson)The 35 extensions to delete right nowThe 35 extensions are not publicly searchable on the Chrome Web Store, meaning they can only be installed via direct URLs. The full list of extensions is:Choose Your Chrome ToolsFire Shield Chrome SafetySafe Search for ChromeFire Shield Extension ProtectionBrowser Checkup for Chrome by DoctorProtecto for ChromeUnbiased Search by ProtectoSecurify Your BrowserWeb Privacy AssistantSecurify Kid ProtectionBing Search by SecurifyBrowse Securely for ChromeBetter Browse by SecurySearchCheck My Permissions for ChromeWebsite Safety for ChromeMultiSearch for ChromeGlobal search for ChromeMap Search for ChromeWatch Tower OverviewIncognito Shield for ChromeIn Site Search for ChromePrivacy Guard for ChromeYahoo Search by GhostPrivate Search for ChromeTotal Safety for ChromeData Shield for ChromeBrowser WatchDog for ChromeIncognito Search for ChromeWeb Results for ChromeCuponomia - Coupon and CashbackSecurify for ChromeSecurify Advanced Web ProtectionNews Search for ChromeSecuryBrowse for ChromeBrowse Securely for ChromeHow to remove an extension from Google Chrome on desktopIf you have installed one of the above-mentioned extensions on your browser, remove it as soon as possible. To remove an extension from Google Chrome on a desktop, follow these steps:Open Chrome and click the icon that looks like a piece of a puzzle. You’ll find it in the top-right corner of the browserYou can see all the active extensions now. Click the three-dots icon next to the extension you want to remove and select Remove from ChromeClick Remove to confirm Steps to remove an extension from Google Chrome. (Kurt "CyberGuy" Knutsson)5 ways to stay safe from sketchy extensionsIf you’re worried about the above extensions, here are five ways to safeguard your sensitive information and maintain your online privacy.1) Keep your browser up to date: Chrome gets regular updates that get rid of most security issues. Make sure you turn on automatic updates for your browser (e.g., Chrome, Firefox, Edge) so you’re always running the latest version without thinking about it. See my guide on keeping your devices and apps updated for more information.2) Install extensions only from trusted sources: Official browser stores like the Chrome Web Store have rules and scans to catch bad actors. They’re not perfect, but they are still a better option when compared to a random website on the internet. Extensions from unknown websites or third-party downloads are far more likely to hide malware or spyware. 3) Have strong antivirus software: A good antivirus can warn you before you install malicious software, such as sketchy browser extensions. It can also alert you to phishing emails and ransomware scams, helping keep your personal information and digital assets safe. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4) Be skeptical of extensions requesting unnecessary access: Some extensions overreach on purpose. A calculator tool asking for your browsing history or a weather app wanting your login data is a huge red flag.Before installing, ask, "Does this permission match the extension’s job?" If the answer’s no, don’t install it. Watch out for broad permissions like "Read and change all your data on websites you visit" unless it’s clearly justified (e.g., a password manager). If an update suddenly adds new permission requests, dig into why. It might mean the extension has been sold or hacked.5) Change your passwords and do it safely: If you’ve ever saved passwords in your browser (e.g., via Chrome’s built-in password manager or the "Save Password" prompt), those credentials could be at risk if a malicious extension was installed. These built-in managers store passwords locally or in your Google, Microsoft or Firefox account, and a compromised browser can give bad actors a way in.This doesn’t typically apply to dedicated password manager extensions, which encrypt your data independently and don’t rely on browser storage. However, if you're unsure whether an extension has been compromised, it's always smart to update your master password and enable two-factor authentication. For maximum safety, change your most important passwords (email, bank, shopping, cloud services) from a different, secure device, such as your phone or another computer, where the questionable extension was never installed. Avoid using the same browser that may have been exposed. Then consider switching to a password manager to create and store strong, unique logins going forward. I’ve reviewed the top options in my best password managers of 2025 guide. See which one fits your needs best.Kurt’s key takeawayThe fact that several of these extensions carried Google’s own "Featured" badge should serve as a wake-up call. It points to a serious lapse in oversight and raises concerns about how thorough Chrome’s extension review process actually is. When millions of users unknowingly install spyware under the impression that it has been vetted and approved, the issue is no longer just about bad actors. It reflects a deeper failure within the platform itself. Google needs to take stronger responsibility by improving transparency and tightening its review standards. Do you think browser makers like Google should be held more accountable for what gets published in their stores? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 141 Ansichten
  • WWW.FOXNEWS.COM
    329,000 mph nuclear rocket leading next era of space travel
    Published April 24, 2025 6:00am EDT close 'CyberGuy': 329,000 mph nuclear rocket leading next era of space travel Tech expert Kurt Knutsson says 329,000 mph fusion rocket promises to be fast, disruptive and enable deep-space missions. Get ready because the future of traveling to other planets just got a massive upgrade. Pulsar Fusion, a U.K.-based aerospace company, is developing a compact fusion engine called the Dual Direct Fusion Drive that could drastically change space exploration as we know it. This engine powers their Sunbird spacecraft, which promises to make space missions faster, cheaper and more efficient.Join the FREE "CyberGuy Report": Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my  Compact fusion engine called the Dual Direct Fusion Drive (Pulsar Fusion) (Kurt "CyberGuy" Knutsson)What makes Sunbird special?Can you imagine a spacecraft that can reach speeds of almost 329,000 mph? That's what Sunbird is aiming for. This incredible speed is due to its nuclear fusion propulsion system. The Sunbird boasts a high specific impulse and an integrated 2 MW power system, making it a reusable transfer vehicle perfect for those deep-space missions that are currently out of reach. Compact fusion engine called the Dual Direct Fusion Drive (Pulsar Fusion) (Kurt "CyberGuy" Knutsson)How does it work?The Dual Direct Fusion Drive is designed to produce thrust and continuous electrical power; think of it as the ultimate energy-efficient engine. It can deliver between 10,000 and 15,000 seconds of specific impulse while generating 2 megawatts of energy. What this really means is that missions can last longer and require much less fuel compared to traditional rockets. Compact fusion engine called the Dual Direct Fusion Drive (Pulsar Fusion) (Kurt "CyberGuy" Knutsson)What can Sunbird do?Sunbird has some pretty amazing potential uses; imagine it transporting 2,200-4,400 pounds of cargo to Mars in under six months, about 60 days faster than current systems, allowing crucial supplies to reach the Red Planet sooner. It could also carry probes to distant planets like Jupiter or Saturn in less than four years, all while powering scientific instruments in areas where solar energy is weak.As a reusable cislunar transport system, Sunbird can deliver up to 3,300 pounds of supplies to lunar orbit, which would support operations like fuel processing and spacecraft navigation. Sunbird could also facilitate trips to near-Earth asteroids for mining, reducing travel times and providing the power needed for drilling and material processing. Finally, it can deliver power to next-generation space telescopes in distant orbits, supporting cryogenics and real-time communications, opening up new possibilities for space observation. Compact fusion engine called the Dual Direct Fusion Drive (Pulsar Fusion) (Kurt "CyberGuy" Knutsson)Slashing costs and energy requirementsGetting to low Earth orbit is one of the most energy-intensive parts of space travel. Sunbird can stay stationed in orbit, allowing other spacecraft to dock and use the fusion engine for the rest of the journey. This could cut fuel storage needs by as much as 50% for missions to places like Mars or Jupiter. Compact fusion engine called the Dual Direct Fusion Drive (Pulsar Fusion) (Kurt "CyberGuy" Knutsson)When can we expect to see Sunbird in action?Pulsar Fusion plans to begin static tests this year and aims for an in-orbit demonstration by 2027. This demonstration will be a critical step toward validating the Sunbird's innovative technology in the harsh environment of space. Compact fusion engine called the Dual Direct Fusion Drive (Pulsar Fusion) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysEven with some uncertainties in government-funded space programs, companies like Pulsar Fusion are pushing forward with groundbreaking technologies. Sunbird represents a significant innovation in space propulsion and could revolutionize how we explore our solar system and beyond. This spacecraft might just reshape the future of planetary science in the years ahead, and honestly, that's pretty cool.Imagine Sunbird eventually offering crewed missions. Would you be willing to take a trip to Mars, knowing the risks and potential rewards of pioneering this new frontier? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 141 Ansichten
  • WWW.FOXNEWS.COM
    First autonomous AI agent is here, but is it worth the risks?
    Published April 23, 2025 10:00am EDT close Can AI decipher your political affiliation? "The Big Weekend Show" analyzes the possibilities of artificial intelligence when it comes to influencing voters. If you haven’t heard the buzz about Manus yet, it's the new AI model unveiled by a Singapore-based company called Butterfly Effect. This isn’t just another chatbot. It’s one of the first truly autonomous AI agents, able to do its own research, make decisions and even carry out plans, all with barely any human oversight.Sounds impressive, right? But here’s the thing: While all this innovation opens up exciting possibilities, it also brings some serious privacy and security questions. Whether you’re eager to try out the latest AI or you’d rather steer clear, it’s worth understanding what Manus could mean for your personal data and digital safety.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW First truly autonomous AI agent (Manus) (Kurt "CyberGuy" Knutsson)Your data could be used to train AI, even if you go nowhere near itThis has already been happening for a while with other AI models. There have been several class-action lawsuits against tech companies for scraping personal data for use in AI training, with one lawsuit claiming that OpenAI uses "stolen private information, including personally identifiable information, from hundreds of millions of internet users, including children of all ages, without their informed knowledge or consent."Many companies also sell or share data with third parties, including for the purposes of AI training. For example, X has been using personal data to train its AI, Grok, and is also sharing user data with third parties to train AI models. So whether you use AI (including Manus AI when it’s released to the public) or not, there’s still a good chance that they have your personal information. First truly autonomous AI agent (Manus) (Kurt "CyberGuy" Knutsson)Why should you care if AI has your data?It boils down to data privacy and security. When AI companies collect personal information – things like your name, email address, home location, social media posts and even photos – they often store it in large databases to train their models. If those databases aren’t properly secured, they can become gold mines for hackers. Think of them as digital "honey pots": sweet and tempting to cybercriminals because of all the personal data inside.This isn’t just a theoretical risk. Just this year, another AI company, DeepSeek, experienced a major leak that exposed more than a million sensitive records. When this kind of information gets out, it can end up on the dark web where scammers and identity thieves are more than happy to scoop it up. That’s how people end up dealing with everything from identity theft and impersonation to tons of spam calls, phishing emails and targeted scams.But data leaks aren’t the only danger. Even when the information is secure, it can be misused or manipulated in ways that are hard to detect. One of the biggest new threats is something called a prompt injection attack.In simple terms, prompt injection is a way for attackers to trick an AI into doing something it wasn’t supposed to. Researchers recently found that attackers can embed hidden commands in seemingly harmless text, like a website bio, email signature or even a social media post. When the AI reads that text during training or browsing, it can accidentally follow the hidden instructions, which might tell it to leak information, change how it behaves or give unauthorized access to private data. First truly autonomous AI agent (Manus) (Kurt "CyberGuy" Knutsson)Manus AI poses even bigger risksUnlike most AI tools that respond to commands you give them directly, Manus is autonomous, meaning it can act on its own, follow links, read content and make decisions without human approval. While that sounds pretty cool, it’s also what makes it a lot harder to spot when something goes wrong.If Manus encounters malicious content, it could unknowingly follow a hidden prompt, compromise your data or alter its behavior, and there may be no obvious sign that anything has happened until it’s too late. There are also some concerns about where Manus sends and stores data. Security researchers have traced data back to servers in Shenzhen, China, raising red flags about surveillance, jurisdiction and who might ultimately have access to your information.So even if Manus isn’t scraping anything too sensitive today, the combination of weak oversight, powerful automation and questionable data practices makes it far riskier than your average AI assistant.We reached out to Manus AI for a comment on this article but did not hear back before our deadline. First truly autonomous AI agent (Manus) (Kurt "CyberGuy" Knutsson)So, how can you protect yourself?As I’ve mentioned, whether you use Manus AI or not, your personal information will still likely end up in its datasets, so the best way to protect yourself is to make your information difficult to find. Here are some things you can do.1) Be cautious about using Manus: With that level of autonomy, especially since it’s a very new AI (not to mention the inconsistency in its privacy policy regarding governance), I wouldn’t recommend using it quite yet. There’s just too much damage it can do if it malfunctions or is subject to a prompt injection attack.2) Keep your personal information under wraps: With so many companies selling and trading personal information, many of them to tech companies to train AI, it’s a good idea to withhold your data unless you absolutely can’t avoid sharing it.3) Actively remove your personal information from the internet so your data can’t be scraped by AI models like Manus: Set your social media to private, limit data collection through privacy settings and remove your information from data brokers and people-search sites. Autonomous cloud-based agents such as Manus are designed to extract and analyze vast amounts of online data, and your publicly available information can be swept into their training datasets without your knowledge or consent.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.4) Use strong antivirus software to help defend against the broader attack surface created by autonomous AI systems: Manus’ ability to act independently and interact with external systems increases the risk of adversarial attacks and malware transmission, so robust endpoint security is essential to protect your devices and data.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5) Use privacy-focused products and services: Whenever you cannot avoid sharing personal information, opt for companies that prioritize your privacy. For example, use the DuckDuckGo browser instead of Chrome and Brave or Proton Mail instead of Gmail. Check out the best private and safe browser alternatives to Google.6) Keep all software updated, including your operating system, browsers and security tools, to patch vulnerabilities that attackers might exploit: As AI agents like Manus operate in the cloud and may interact with your systems, unpatched software can become an easy target for exploitation or unauthorized access. Therefore, it's always a good idea to keep software, operating systems, browsers and security tools updated at all times.7) Enable multifactor authentication (MFA) on all your accounts: As AI-driven attacks and automated data extraction become more common, MFA adds a crucial layer of defense, making it much harder for attackers to compromise your accounts, even if an AI system leaks or scrapes your credentials.8) Use strong, unique passwords for every account: As cloud-based AI agents like Manus can interact with external systems and potentially access sensitive data, unique passwords help prevent a breach of one account from leading to a broader compromise. Consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.Kurt's key takeawaysAs we move forward with AI like Manus, it’s exciting to think about the possibilities, but it's also important to keep our eyes open about what it means for our personal data. Even if you never use Manus yourself, your info could still end up in its training data.So what can you do? Stay informed, take charge of your digital footprint and choose tools that prioritize your privacy. As AI keeps evolving, being proactive about your data is the best way to enjoy the benefits of innovation while keeping your personal info safe.Do you think companies behind powerful AI agents like Manus should be required to follow stricter privacy rules and independent oversight before they’re allowed to collect and use people’s data? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 119 Ansichten
  • WWW.FOXNEWS.COM
    FoxNews AI Newsletter: Swarm of helpful robots can pack your groceries
    By Fox News Staff Fox News Published April 23, 2025 12:04pm EDT close AI-powered robot army that packs your groceries in minutes A fully automated warehouse system is changing the way we shop for groceries. Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY’S NEWSLETTER:- The AI-powered robot army that packs your groceries in minutes- Anthropic anticipates AI virtual employees coming in next year, security leader says- Discover the world’s first hydrogen outboard engine-powered boat Fleet of robots (Ocado)GROCERIES IN 5 MIN: Imagine a grocery store where your entire order is picked, packed and ready for delivery in just five minutes without a single human hand touching your food.BRAVE NEW WORLD: Anthropic – the company behind the artificial intelligence platform Claude – anticipates that digital AI employees will appear on corporate networks in the next year, the organization's top security leader informed Axios.THESE FUELS ARE OUT: ​​Imagine powering your boat not with gasoline but with clean hydrogen fuel. That’s exactly what Yamaha, together with Roush Industries and Regulator Marine, is working on right now. They’re developing the world’s first hydrogen-combustion outboard engine, aiming to make boating greener and more sustainable. Education experts are warning parents that teens are now using AI apps and websites to create nude images of their peers.  (Catherine McQueen/Moor Studio/Getty)AI BULLY: A troubling trend has emerged in schools across the United States, with young students falling victim to the increasing use of artificial intelligence (AI)-powered "nudify" apps that have the power to create fake pornography of classmates.DATA CENTER DEMAND: The world, particularly the United States, is projected to see a massive jump in data center and artificial intelligence demand for electricity by 2030, per a recently released International Energy Agency report.END TO RECYCLING: At the heart of AMP's innovation is its artificial intelligence platform, which uses deep learning to analyze millions of images of waste. This technology enables robots to identify recyclable materials by recognizing patterns in colors, textures, shapes and logos, spotting a stray plastic bottle in a sea of trash faster than any human. AI robot recycling platform  (AMP Robotics)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here. This article was written by Fox News staff.
    0 Kommentare 0 Anteile 112 Ansichten
  • WWW.FOXNEWS.COM
    Robotic and drone tech make fruit picking and handling easier
    Tech Robotic and drone tech make fruit picking and handling easier How drones and robotics are changing farming and what it means for workers Published April 23, 2025 6:00am EDT close 'CyberGuy': Robotic and drone tech make fruit picking and handling easier Tech expert Kurt Knutsson discusses how robots and drones are revolutionizing fruit farming with faster picking and smarter handling. Farming is undergoing a remarkable transformation thanks to cutting-edge technologies reshaping how fruit is picked and handled. While autonomous drones like Tevel’s Flying Robots are already harvesting fruit globally, innovations like UC San Diego’s GRIP-tape gripper represent the next frontier in gentle produce handling. Together, these advancements promise to make fruit production more efficient and precise, though one is a proven solution and the other is a glimpse into farming’s future.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW Flying autonomous robot drone (Tevel) (Kurt "CyberGuy" Knutsson)Flying robots bring precision and efficiency to harvestingTevel’s Flying Autonomous Robots (FARs) are redefining fruit harvesting by combining artificial intelligence with advanced computer vision. These drones navigate through orchards, identifying and picking only the fruit that has reached peak ripeness. Their ability to maneuver carefully around branches allows them to harvest without bruising or harming the trees. Unlike human pickers, these drones can operate continuously, working day and night to get the job done faster and more consistently.Farmers benefit from detailed, real-time information about the harvest, including the size, color and ripeness of each fruit, all accessible through a mobile app. This data helps optimize harvesting schedules and reduce waste. FARs have already been deployed in orchards across the United States, Italy, Chile and Israel, where they have helped reduce labor costs by up to 30% while improving harvest accuracy. Multiple drones work together from a mobile platform, covering large orchard areas efficiently.Beyond picking, these robots also detect diseases and track the location of each fruit bin, providing farmers with valuable insights to manage their crops better. Flying autonomous robot drone (Tevel) (Kurt "CyberGuy" Knutsson)GRIP-tape: A soft, adaptive touch for handling fruitWhile Tevel’s drones tackle harvesting, UC San Diego’s GRIP-tape gripper remains in the experimental stage as a solution for post-harvest handling. Inspired by steel measuring tapes, this prototype uses layered "fingers" to grasp delicate fruits gently. Early tests show promise in handling objects like lemons and tomatoes without damage, but it has yet to be widely adopted in farming.The gripper’s motorized reels allow its tape-based fingers to extend, rotate and convey items like a conveyor belt. Researchers highlight its low cost and safety around humans, but further development is needed to integrate it into commercial packing lines or harvesters. GRIP-tape gripper (UC San Diego) (Kurt "CyberGuy" Knutsson)The future of farming: Proven and emerging techTevel’s drones are already transforming orchards, while the GRIP-tape gripper offers a vision of how delicate produce handling could evolve. The combination of real-world automation and experimental robotics highlights both the immediate benefits and long-term potential of agritech innovation. GRIP-tape gripper (UC San Diego) (Kurt "CyberGuy" Knutsson)Kurt’s key takeawaysAs we watch technology take on more roles in farming, it’s clear that drones like Tevel’s are already making a real difference in how fruit gets harvested. Meanwhile, concepts like the GRIP-tape gripper show us what might be just around the corner, a gentler, smarter way to handle delicate produce. There’s plenty of potential ahead, and it will be interesting to see how these technologies continue to evolve and work together to support farmers and the food we all enjoy.Are we willing to sacrifice human jobs for the sake of progress, or can we find a balance that protects both livelihoods and innovation? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 131 Ansichten
  • WWW.FOXNEWS.COM
    Insurance data breach exposes sensitive info of 1.6 million people
    Published April 22, 2025 10:00am EDT close 'CyberGuy' warns of cyberscams costing Americans billions a year Tech expert Kurt "CyberGuy" Knutsson joins "Fox & Friends" to warn of new cyberscams and give his tips on how to avoid them. If there’s one thing I’ve learned from covering data breaches over the years, it’s that you should never take a company’s initial numbers at face value. When a breach becomes public, most companies try to minimize the damage by reporting fewer victims or staying vague about what kind of data was exposed.Sometimes, to be fair, they genuinely don’t have the full picture yet. But that rarely gets communicated clearly. The same thing just happened again with an insurtech company that has now doubled the number of people affected by a breach it disclosed last year.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW A woman working on her laptop (Kurt "CyberGuy" Knutsson)What you need to knowTexas-based insurance administrative services provider Landmark Admin has revised the scope of its May 2024 cyberattack, revealing that nearly twice as many people were impacted as initially reported. Back in October 2024, Landmark disclosed that suspicious activity was detected in its network on May 13, prompting an investigation. At the time, it was estimated that the breach affected 806,519 individuals. But in a recent update filed with the Maine Attorney General’s office, that number has now jumped to 1,613,773.Landmark serves as a third-party administrator offering backend support to major insurers like Liberty Bankers Life and American Benefit Life. This means millions of sensitive insurance policy records flow through its systems, making it a tempting target for cybercriminals.The compromised information varies for each individual but may include a wide range of sensitive personal data. This includes full names, home addresses, Social Security numbers, tax identification numbers, driver's license or state-issued identification numbers, passport numbers and bank account details. In some cases, medical information, dates of birth, health insurance policy numbers and details related to life and annuity policies may also have been exposed. A hacker at work (Kurt "CyberGuy" Knutsson)What is Landmark doing now?The company says the forensic investigation is still ongoing and that the total number of affected individuals may continue to rise. Personalized notification letters are being mailed out in phases, detailing exactly what type of data was compromised in each case."Landmark began reviewing the affected systems to identify the specific individuals and the types of information that may have been compromised," reads the latest notice. "While this process remains ongoing, Landmark will notify affected individuals by mail as the information becomes available."To help mitigate the fallout, Landmark is offering 12 months of free credit monitoring and identity theft protection. The notice also advises recipients to monitor their credit reports and consider placing fraud alerts or a security freeze for extra protection. A dedicated helpline is available for 90 days after notification to address questions and concerns. A man working on his laptop and scrolling on his phone (Kurt "CyberGuy" Knutsson)6 ways you can stay safe from insurance data breachIf your information was part of the Landmark breach or any similar one, it’s worth taking a few steps to protect yourself.1) Consider identity theft protection services: Since the Landmark data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs.Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. They often include up to $1 million to cover losses and legal fees and a white-glove fraud resolution team in which a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.2) Monitor your accounts and transactions: The Landmark data breach revealed bank details to attackers, which means they can misuse those details to steal your money. You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.3) Contact your bank and credit card companies: Since Landmark hackers obtained bank and credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you. You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification. 4) Use personal data removal services: The data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you. One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.5) Have strong antivirus software: Landmark hackers have people's email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you're not careful. However, you’re not without defenses.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6) Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.Kurt’s key takeawayThe real risk with breaches like this isn't just the initial leak. It's the slow drip of consequences that follow. As more names and numbers surface, the fallout becomes harder to contain, and the people impacted are left scrambling to protect themselves. Landmark’s delayed clarity is a reminder that in the world of cyberattacks, timelines rarely work in the public’s favor. By the time the full picture emerges, the damage may already be done. Do you think companies are investing enough in their cybersecurity infrastructure? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 137 Ansichten
  • WWW.FOXNEWS.COM
    Discover the world’s first hydrogen outboard engine-powered boat
    Tech Discover the world’s first hydrogen outboard engine-powered boat How you’ll pick from gasoline, diesel, electric and now hydrogen fuel in near future Published April 22, 2025 6:00am EDT close 'CyberGuy': World’s first hydrogen outboard engine powers a cleaner marine future Tech expert Kurt Knutsson talks about how Yamaha’s hydrogen outboard motor could revolutionize boating with zero emissions. ​​Imagine powering your boat not with gasoline but with clean hydrogen fuel. That’s exactly what Yamaha, together with Roush Industries and Regulator Marine, is working on right now. They’re developing the world’s first hydrogen-combustion outboard engine, aiming to make boating greener and more sustainable.This is part of Yamaha’s big plan to reach carbon neutrality by 2050, using a mix of electric, alternative fuels and now hydrogen technology.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW Hydrogen fuel motor (Yamaha) (Kurt "CyberGuy" Knutsson)The big, big moment: First hydrogen fill-upTo reach their goal, a specially modified Regulator Marine 26XO boat was taken to a hydrogen fueling station. The team filled its tanks with hydrogen for the very first time, which was a huge milestone. This 26-foot boat runs on a tweaked version of Yamaha’s powerful 450hp XTO outboard engine, but instead of gasoline, it’s fueled by gaseous hydrogen.Matt Van Benschoten from Roush, who’s been deeply involved in the project, called it "a big moment." He handled the tricky job of designing and integrating the hydrogen fuel system, making sure everything was safe and worked smoothly. Hydrogen fuel tanks (Yamaha) (Kurt "CyberGuy" Knutsson)What’s different about this hydrogen outboard?Yamaha started with their largest offshore outboard, the XTO 450, and made some smart changes to handle hydrogen. They adjusted parts like the cylinder heads, fuel lines and injectors to work with hydrogen’s unique properties. But most of the engine is still the same as the gasoline version.The boat itself was modified to fit three high-pressure hydrogen tanks, each holding fuel at 700 bar (that’s super-high pressure). These tanks are designed to expand as they fill up, so Yamaha’s engineers had to come up with clever mounting solutions that let the tanks move a bit without causing problems. Though Yamaha hasn't disclosed the gasoline equivalency of the hydrogen tanks, they are striving to achieve optimal capacity for marine industry applications. Hydrogen fuel tanks (Yamaha) (Kurt "CyberGuy" Knutsson)Safety first: Smart systems on boardSafety is a huge focus here. The boat uses a standard hydrogen refueling connector and follows strict protocols to make sure filling up is safe and efficient. There’s even tank monitoring feedback between the boat and the fueling station that monitors tank conditions and can stop refueling if things get too hot.Inside the boat, multiple hydrogen detectors keep an eye on gas levels. If hydrogen starts to build up, the system alerts the captain. If it gets too high, the engine shuts down and vents the gas safely. Plus, Roush designed a special ventilation system to make sure any leaked hydrogen escapes from the highest points on the boat, since hydrogen is lighter than air and rises. Hydrogen fuel motor (Yamaha) (Kurt "CyberGuy" Knutsson)Showing off the tech and what’s nextYamaha first showed off this hydrogen outboard at the Miami Boat Show, then took it to the SEMA Show in Las Vegas to get the automotive and marine industries talking about hydrogen infrastructure. They’ve built two boats so far: one for display and one for real-world testing. Now, the team is focused on fine-tuning the system, running safety tests and figuring out how far the boat can go on a tank of hydrogen. They’re also working on making refueling faster and more convenient. Hydrogen fuel motor (Yamaha) (Kurt "CyberGuy" Knutsson)Challenges and possibilities of hydrogen technologyRight now, the tanks are cylindrical and take up a lot of space, limiting how much hydrogen the boat can carry. However, in the future, Yamaha hopes to use other tank alternatives to integrate more efficiently and fit better inside the boat hull. Finding the right parts for these super-high-pressure hydrogen systems isn’t easy either; the supply chain is still catching up. However, with partners like Roush and Regulator Marine, Yamaha is pushing through these challenges.And it’s not stopping there. Yamaha recently acquired electric outboard maker Torqeedo, showing they’re serious about exploring all kinds of clean marine propulsion technologies.Ben Speciale, president of Yamaha's U.S. Marine Business Unit, tells Cyberguy, "Our hydrogen outboard concept is on the water now, and we’re learning more about how to optimize its performance every day. We believe a multiple-technology solution is the best way to achieve cleaner products on the water, and hydrogen represents one of those pathways within our product line. We’re optimistic about the future of hydrogen in the marine industry, and we look forward to sharing specific performance data as it becomes available." Hydrogen fuel motor (Yamaha) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysYamaha’s hydrogen outboard project is about rethinking how we power our boats in a way that’s safe, practical and sustainable. While there’s still work to do, this collaboration is making real progress toward cleaner waters and greener adventures. If hydrogen can take off in boating, it could change the game for the entire marine industry.Do you think hydrogen-powered outboard engines are the real future of boating or just an idea that still has a long way to go? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 133 Ansichten
  • WWW.FOXNEWS.COM
    How to manage a deceased loved one’s Facebook account
    close 'CyberGuy': Save loved ones' voicemails with Android Preserving voicemails securely on Android: Tech expert Kurt Knutsson reveals easy methods to keep memories alive forever. Losing a loved one is never easy, and dealing with their digital life can add another layer of stress during an already difficult time.John from Northampton, Pennsylvania, reached out with a question that many people face but few know how to handle: "Please explain how to remove a deceased person’s Facebook account."John, we're very sorry for your loss, and you're not alone in wondering what to do next. Managing a deceased person’s Facebook presence can feel overwhelming, especially if you’re not sure where to start. Facebook does offer a few options depending on whether you'd like to preserve their account as a memorial or have it removed entirely. Here's what you need to know, along with how to protect their digital legacy from misuse.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW A woman scrolling on Facebook (Kurt "CyberGuy" Knutsson)What is a memorialized Facebook account?When Facebook is made aware that someone has passed away, their policy is to memorialize the account. This turns the profile into a digital tribute, serving as a space where friends and family can gather, share memories and view photos and posts. A memorialized account:Displays the word "Remembering" next to the person’s namePreserves content they posted during their lifetimePrevents anyone from logging into the accountCan only be managed by a legacy contact (if one was assigned)Memorializing an account not only honors the person’s memory but also adds a layer of security by locking the account from unauthorized access. Anyone can request a Facebook account be memorialized if they believe the user has passed away, but only verified immediate family or a legacy contact can manage the account afterward.Option 1: Request memorializationIf Facebook hasn’t already memorialized the account, you can request it yourself. While anyone can submit a memorialization request, Facebook may require proof if you're not a close family member. Here's how to request memorialization:Provide the deceased’s full name and date of deathUpload proof of death (like an obituary, death certificate or memorial card)Submit the form and wait for Facebook to review and process the requestIf a legacy contact was assigned by the deceased before they passed, that person will be notified and may be able to manage the memorialized profile.If you're unsure what a legacy contact is or how to set one up for your own account, go to Facebook > Settings > Memorialization Settings and choose someone you trust.For more on legacy contacts and digital legacy planning, check out: One day you’ll leave this Earth, but your data will live on in a messy future.Option 2: Request account removalIf you'd prefer to have the account permanently deleted rather than memorialized, Facebook provides a separate process for that, but only for immediate family members or legal representatives. Here are the steps to remove the account:Select the option: Please remove this accountUpload documentation, including a copy of the deceased’s death certificate and proof that you’re a close family member or have legal authority to act on their behalfNote: Even if you know the person’s login information, Facebook’s terms prohibit logging into someone else’s account, even after death. In cases where the deceased did not use their legal name on Facebook or was a minor, Facebook may request additional documentation to verify their identity. Facebook app on a smartphone (Kurt "CyberGuy" Knutsson)Check for a legacy contactFacebook allows users to assign a legacy contact, someone they trust to manage their memorialized profile. If your loved one set this up before passing, their legacy contact may be able to:Accept new friend requestsPin tribute postsUpdate the profile or cover photoRequest account deletionHowever, they cannot log into the account, read messages or make posts as the deceased. To assign a legacy contact on your own profile, go to your Facebook settings, then choose "Memorialization Settings." From there, you can select a trusted contact to manage your memorialized account when the time comes. To learn more about how to check or assign a legacy contact, see: How to be remembered forever on Facebook.Other Facebook options you should know aboutIn addition to memorializing or removing an account, Facebook offers a few other tools for handling a deceased person’s profile.Request a copy of content: Verified family members or legal representatives can request content such as photos or messages. Note: While Facebook does not grant full access, in some cases it allows you to request a download of shared content like photos, posts and videos.Report an account that should be memorialized: Even if you’re not immediate family, you can report an account if you believe it belongs to someone who has passed.Can't access or log into a memorialized account?: Facebook doesn’t allow login to memorialized profiles, even with credentials. If you’re running into access issues, they’re likely related to this restriction.Why it's important to take actionUnfortunately, the digital world doesn’t stop after someone passes away. Unattended accounts can become vulnerable to ghost hacking, a type of cybercrime that targets the deceased. Scammers have been known to impersonate the deceased to exploit grieving friends and family.And beware of scam artists who target families with fake funeral-related schemes: How impostors try to exploit your grief and wallet in new funeral scam. An online scammer (Kurt "CyberGuy" Knutsson)Protecting your loved one’s digital legacy: Essential steps to takeManaging a deceased person’s Facebook account is just one part of safeguarding their digital presence. To ensure their online life remains secure and respected, here are five important steps you can take to protect passwords, accounts and personal information after a loved one passes away.1) Use a password manager: Use a password manager to generate and store complex passwords. Use one that offers emergency access features and designate a trusted contact who can request access to your accounts after a waiting period, ensuring your passwords remain secure but accessible to the right person when needed. Get more details about my best expert-reviewed password managers of 2025 here.2) Enable multifactor authentication: Enable multifactor authentication on all important accounts and provide your emergency contact with backup codes or alternative authentication methods to prevent lockouts while maintaining strong security.3) Assign legacy contacts: Assign legacy contacts not only on Facebook but also on other major platforms such as Google, Apple and Microsoft, so your trusted person can manage or retrieve your digital data according to your wishes after your passing.4) Maintain an updated account list: Keep an updated and encrypted list of all critical accounts, including financial services, subscriptions, email and social media credentials, along with instructions on how to handle each one and store them securely, either digitally or physically.5) Regularly review and communicate: Review and update your digital legacy plan regularly, at least once a year, and communicate clearly with your designated contacts to ensure they understand how to access and manage your accounts when the time comes.Kurt's key takeawaysHandling a loved one’s Facebook account after they’ve passed can feel overwhelming, but you don’t have to go through it alone. Whether you choose to preserve their memory through a memorialized page or remove the account entirely, Facebook has clear steps in place to help you do it respectfully and securely.How do you think social media platforms should handle accounts of deceased users? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 151 Ansichten
  • WWW.FOXNEWS.COM
    Apple Watch alerts woman to life-threatening leukemia diagnosis
    Tech Apple Watch alerts woman to life-threatening leukemia diagnosis How smartwatches are changing the way we look after our health Published April 21, 2025 6:00am EDT close 'CyberGuy': Apple Watch alerts woman to life-threatening leukemia diagnosis Tech expert Kurt Knutsson says an Apple Watch saved psychiatrist Amanda Faulkner by detecting deadly leukemia early. In recent years, smartwatches have gone far beyond just telling the time or tracking steps. These little gadgets on our wrists are becoming powerful health tools, quietly monitoring our bodies and sometimes even alerting us to serious medical issues before we realize something’s wrong. From tracking heart rate and sleep patterns to measuring blood oxygen levels, smartwatches are helping people stay more in tune with their health than ever before.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS – SIGN UP FOR KURT’S ‘THE CYBERGUY REPORT’ NOW Apple Watch saves woman’s life (Amanda Faulkner) (Kurt "CyberGuy" Knutsson)The life-saving power of wearable technologyTake Amanda Faulkner’s story, for example. Amanda, a consultant psychiatrist from New Zealand, was feeling unusually tired and hot one summer, but she just put it down to the heat or maybe perimenopause. She was busy with over 60 patients and didn’t think much of it. But her new Apple Watch kept sending alerts that her resting heart rate was way higher than normal, jumping from her usual 55 beats per minute up into the 90s.At first, she thought the watch was wrong. She was fit and healthy, after all, and she had even recently been hiking. However, the notifications kept coming every morning, and eventually Amanda decided to see her GP. That decision probably saved her life.Within hours of tests, she was diagnosed with acute myeloid leukemia, a rare and aggressive blood cancer. Doctors told her that if she had waited another 48 hours, she might not have survived. Apple Watch saves woman’s life (Amanda Faulkner) (Kurt "CyberGuy" Knutsson)The wider impact of Amanda’s storyAmanda’s experience shows just how powerful these wearable devices can be, not as medical diagnosis tools but as early warning systems that encourage people to seek help sooner. Apple, for instance, is clear that its heart monitoring features aren’t meant to replace doctors but to provide useful information that can prompt users to get checked out. Elevated heart rates can signal many things, from infections to allergic reactions, and catching these signs early can make all the difference.Amanda's husband, Mike, told us, "The positive press from this story has also led to many friends and family members deciding to act on health concerns and/or buy an Apple Watch, and I have seen many similar comments on social media where the post has been replicated. She has also had complete strangers come to see her in the hospital to discuss their own cancer journeys, and as Amanda cannot work in her role as a psychiatrist, these interactions have been great, allowing Amanda to ‘help’ people again, which, after all, is her vocation in life."Amanda remains in treatment, including chemotherapy and an upcoming stem cell transplant, but she remains optimistic and grateful for the smartwatch that gave her a fighting chance. She urges others, especially women who often have their symptoms dismissed, to trust their instincts and advocate for their health. Apple Watch saves woman’s life (Amanda Faulkner) (Kurt "CyberGuy" Knutsson)Limitations and risks of smartwatch health monitoringWhile smartwatches offer incredible benefits, it’s important to recognize their limitations. These devices are not medical-grade tools and can sometimes produce false positives or miss critical health issues. Overreliance on smartwatch data may lead to unnecessary anxiety or, conversely, false reassurance. Additionally, not everyone’s body responds the same way, and factors like skin tone, movement or device placement can affect accuracy. Privacy and data security are also concerns, as sensitive health information is transmitted and stored digitally. It’s essential to view smartwatches as supplementary tools that can prompt users to seek professional medical advice rather than definitive diagnoses. Apple Watch saves woman’s life (Amanda Faulkner) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysSmartwatches are more than just tech accessories; they’re becoming essential health companions. While they don’t replace professional medical advice, their ability to monitor vital signs continuously and alert users to potential problems is transforming how we approach health. Amanda Faulkner’s story is a powerful reminder that sometimes the smallest devices can make the biggest difference, literally saving lives by catching warning signs early. So, if your smartwatch starts "nagging" you about your health, it might just be worth paying attention to it.Has a wearable device ever alerted you to a health issue or helped you take action? We’d love to hear your story: How has technology changed the way you manage your health? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 130 Ansichten
  • WWW.FOXNEWS.COM
    Hackers using malware to steal data from USB flash drives
    close Don’t be so quick to click that Google calendar invite. It could be a hacker’s trap Cybercriminals are sending fake meeting invitations that seem legitimate. Cybercriminals are constantly finding new ways to steal your data. As people become more aware of common threats like phishing links, fake websites, fraudulent emails and impersonation scams, attackers are becoming more creative in their approach.One of the newer methods they are using involves targeting USB flash drives. It may seem surprising that they would focus on something as simple as a flash drive, but the data it holds can be valuable. Plus, flash drives can be used to spread malware to other devices.STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW A person plugging in a USB flash drive to a laptop (Kurt "CyberGuy" Knutsson)Why target USB flash drives?USB drives are ubiquitous in workplaces, especially in environments with air-gapped systems or restricted internet access, such as those in government and energy sectors. This makes them an easy target for data theft and malware propagation. Often, these drives store sensitive files that are not available on networked systems. WHAT IS ARTIFICIAL INTELLIGENCE (AI)?When infected, USB drives can spread malware not just within a single organization but also across multiple entities if shared. These attacks don’t rely on network vulnerabilities, allowing them to bypass traditional security tools.  USB Flash drive plugged into a laptop  (Kurt "CyberGuy" Knutsson)How hackers are targeting your USB drivesAs reported by Kaspersky's Securelist, a cybersecurity research platform, hackers are using USB drives to spread malware in ways that can easily bypass traditional security systems. One group, known as GOFFEE, kicks off its attacks with targeted phishing emails. These emails often carry infected RAR files or Office documents with harmful macros. Once opened, they install sneaky programs like PowerModul and PowerTaskel on the victim’s system.These tools don’t just sit around. They lay the groundwork for more attacks. PowerModul, in particular, plays a big role. It’s a PowerShell script introduced in 2024 that talks to a command-and-control (C2) server. From there, it can download and run other tools, including two especially dangerous ones, FlashFileGrabber and USB Worm.FlashFileGrabber is made to steal data from USB drives. It can either save stolen files locally or send them back to the hacker's server. Then there’s USB Worm, which infects any USB drive it finds with PowerModul, turning that drive into a tool for spreading malware to other systems.What makes this method effective is that USB drives are often shared between people and offices. That physical movement allows the malware to spread even without an internet connection. The malware hides original files on the USB and replaces them with malicious scripts disguised as normal-looking shortcuts. When someone clicks one of these, they unknowingly trigger the infection.GET FOX BUSINESS ON THE GO BY CLICKING HERE Illustration of a hacker at work  (Kurt "CyberGuy" Knutsson)4 practical ways to stay safe from USB-targeted attacks1. Don’t plug in unknown USB drives: It might sound obvious, but this is one of the most common ways malware spreads. If you find a USB drive lying around or someone gives you one you weren’t expecting, avoid plugging it into your system. Attackers often rely on human curiosity to get the malware onto your machine.2. Be extra cautious with email attachments: GOFFEE’s campaigns often begin with phishing emails carrying malicious RAR files or Office documents with macros. Always double-check the sender’s address and never open unexpected attachments, especially if they ask you to "enable macros" or come from unknown contacts. When in doubt, confirm through a different channel.3. Avoid clicking on suspicious links and use strong antivirus software: Many attacks like GOFFEE’s start with emails that look legitimate but contain malicious links. These links might lead you to fake login pages or silently download malware that sets the stage for USB-targeting tools like PowerModul.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.4. Scan USB drives before use: The USB Worm infects USB drives by hiding original files and planting malicious scripts disguised as shortcuts, which trigger PowerModul when clicked. FlashFileGrabber also steals files silently from USBs, often going unnoticed. Always scan USB drives with updated antivirus software before opening any files. Use a reputable security tool to check for hidden scripts, unusual shortcuts or unexpected executables. If files appear renamed or hidden, don’t click them until verified safe. Kurt’s key takeawayCybercriminals thrive where convenience meets oversight. However, it’s worth considering why USBs remain such a soft target. They’re not just storage but a cultural artifact of workplaces, especially in high-stakes sectors like energy or government, where offline data transfer feels safer than the cloud. But that trust is a blind spot. Attackers like GOFFEE don’t need zero days because they can exploit human habits such as sharing drives, skipping scans and clicking without thinking.How often do you plug in a USB drive without scanning it first? Let us know by writing us atCyberguy.com/ContactCLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 158 Ansichten
  • WWW.FOXNEWS.COM
    The AI-powered robot army that packs your groceries in minutes
    Tech The AI-powered robot army that packs your groceries in minutes The future of fast, efficient and contactless grocery fulfillment Published April 20, 2025 6:00am EDT close AI-powered robot army that packs your groceries in minutes A fully automated warehouse system is changing the way we shop for groceries. Imagine a grocery store where your entire order is picked, packed and ready for delivery in just five minutes without a single human hand touching your food. This is exactly what’s happening inside Ocado’s revolutionary Hive, a fully automated warehouse system that’s changing the way we shop for groceries. Fleet of robots (Ocado)What is the Hive?At the core of Ocado’s Customer Fulfilment Centres, or CFCs, is The Hive, a massive 3D grid filled with thousands of grocery products. STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOWPicture fleets of robots or "bots" zipping around at speeds up to about 9 miles per hour, all coordinated by an AI-powered "air traffic control" system that talks to each bot ten times every second. These bots work together to pick and transport items, which are then packed by robotic arms with incredible precision and speed.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Fleet of robots  (Ocado)How does it all come together?The magic behind the Hive is Ocado’s smart platform, which combines artificial intelligence, robotics and automation to tackle the unique challenges of online grocery shopping. Factors like tight profit margins, the wide variety of items customers order and the need to handle products at different temperatures all make online groceries a tough nut to crack. But Ocado has been developing this technology for over 20 years, and it shows.Thanks to this platform, a 50-item grocery order can be picked and packed in just five minutes, six times faster than traditional methods. The robotic arms don’t just blindly pack items. They use advanced computer vision and deep learning to make smart decisions on the fly, packing groceries densely and safely even without knowing what’s coming next. And behind the scenes, Ocado uses digital twin technology, essentially a virtual replica of the warehouse, to simulate and optimize everything from customer demand to delivery routes. This means it can innovate quickly and reduce risks before making changes in the real world.GET FOX BUSINESS ON THE GO BY CLICKING HERE Fleet of robots  (Ocado)What makes this so revolutionary?The speed and scale of the Hive are truly game-changing. Orders that used to take over an hour to pick manually are now done in minutes, and many orders can be processed at the same time. Plus, Ocado’s warehouses can offer up to 78% more products than a typical supermarket, giving customers a much wider selection tailored to their preferences. The system also helps reduce food waste dramatically. Ocado’s waste rate is just a tiny fraction of the industry average, thanks to smart forecasting and precise inventory management.Another big advantage is flexibility. The Hive’s modular design means retailers can scale their operations up or down depending on their needs. Whether it’s a huge warehouse serving an entire region or a smaller fulfillment center closer to customers for faster delivery, the technology adapts. Groceries picked and packed by an AI robot  (Ocado)So, how do you actually use this robot-powered grocery tech?If you live in an area served by Kroger’s delivery network in the U.S., you can order groceries through the Kroger website or app. Behind the scenes, your order is picked and packed by hundreds of AI-driven robots at a fulfillment center known as the Hive. Then, a Kroger associate delivers your groceries straight to your door, often in less time than a traditional delivery. This system is the result of a partnership between Ocado and Kroger, bringing advanced automation to American grocery delivery.Beyond just groceriesWhat’s exciting is that Ocado’s innovations don’t stop at grocery shopping. The same robotics, AI and automation principles are being explored for other uses, like vertical farming, assisted living, car parking and even airport baggage handling. The Hive is paving the way for smarter, more automated logistics across many industries. AI robot  (Ocado)Kurt's key takeawaysIt’s pretty incredible to imagine your entire grocery order being picked and packed in just five minutes, without anyone actually handling your food. That’s exactly what Ocado’s Hive is doing, using smart robots and AI to make grocery shopping faster, easier and more reliable than ever before.CLICK HERE TO GET THE FOX NEWS APPDo you like the idea of a robot picking and packing your groceries, or do you prefer things to stay the way they are with human hands involved? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.  All rights reserved.   Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Kommentare 0 Anteile 142 Ansichten
Mehr Artikel