Fox News
Fox News
Welcome to the official Fox News Facebook page. Get breaking news, must see videos & exclusive interviews from the #1 name in news.
1 people like this
226 Posts
2 Photos
0 Videos
0 Reviews
Recent Updates
  • 10 tech upgrades to save your time, privacy and money this year
    www.foxnews.com
    close How technology has changed inauguration coverage 'Special Report' host Bret Baier looks back on the evolution of media technology in covering inaugurations dating back to George Washington. At its best, todays tech makes life easier. The trick is, you need to know the insider secrets. Luckily you have me.Win a pair of $329 Ray-Ban Meta smart glasses.Enter here, no purchase necessary!Heres one to make your AI results better. With ChatGPT or any other, the more constraints you give, the better your answer. Its called priming. Examples: "Limit your response to 250 words," "Give me the list in bullet points" and "Format the results as a table."Sweet. Lets keep going with 10 more tips and tricks.5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTER1. Ctrl + Z (undo) isnt just for Word docsDid you accidentally delete an email, close a browser tab or move a file? Ctrl + Z on a PC (Cmd + Z on a Mac) is the universal lifesaver. Use it everywhere, from editing spreadsheets to undoing changes in most apps. Its a superpower.2. Screenshots for the winForget scrambling for a pen and paper just take a screenshot! Whether its a recipe, directions or an annoying error message, capturing your screen can save time and frustration. On your PC, hold down your Windows key + Shift + S. On a Mac, its Cmd + Shift + 4.I have more time-saving keyboard tricks here. From key shortcuts to easy, on-demand podcasts and magazines, these tech tips will help save you time and money this year. (iStock)3. Use your voice moreYoull be surprised by what you can tell your phone to do. For starters, forget fumbling for an app. Just say, "Hey, Siri, open Instagram" or, for Google Assistant, "Open Spotify." You can also tell your assistant to call someone in your contacts, set a reminder, take a photo, convert milliliters to ounces, turn on the flashlight, flip a coin the list goes on.Pro tip for voice texting: To delete the last word you dictated, say, "Delete the last word." To delete the last sentence, say, "Clear sentence." If you want to get rid of everything you just said, say, "Clear all."DONT SCAM YOURSELF WITH THE TRICKS HACKERS DONT WANT ME TO SHARE4. Because you never have a penSnap a pic with your phones camera, and you can copy, search or translate the text. On iPhone:Open the image in Photos. Tap and hold the text and select an option. On Android:Open a pic in Google Photos, then tap on the Lens icon. Select the text, then tap the action you want to take.Phone photos a mess? How to delete duplicates ChromeOS Flex can help breathe new life into your old laptop. (iStock)5. Bring your old laptop back to lifeInstall ChromeOS Flex, a free, cloud-based operating system. With processing done on Googles servers and a bare-bones interface, youll get surprisingly good performance. Your PC needs to meet these minimum specs: x64 CPU, 4GB of RAM, 16GB of storage and a USB port for installation.6. Calling back a random number?Hide yours first. Punch in star, 6 and 7, followed by the number youre calling, and thats it. The caller will see "Private" or "Blocked." If you want your number hidden all the time, change the settings on your smartphone. On an iPhone, tap Settings > Phone> Show My Caller ID. Toggle it Off. On Android, the option is called Hide Number.7. Instant podcasts about anythingGoogles NotebookLM lets you upload audio files, notes, documents or anything else, then search them, find citations (from your own docs) or produce a snazzy podcast you can listen to. Its impressive. Reader Bob told me after he heard about it on my show, he used it to create training modules for his employees.Grandfluencers: Folks trading retirement for internet fame Apple AirTags can help you keep tabs on your kids and your valuables. (Photo by James D. Morgan/Getty Images)8. Track the kidsApple AirTags (iOS) orTile trackers (Android) let you keep tabs on your little ones. Attach a tracker to their backpack, shoelaces or belt loop. Pro tip: At somewhere very public, like a Disney park, give your childs tracker a unique name, like "Buzz Lightyear." That way, if someone gets a "Tracker Nearby" alert, your childs name wont pop up.9. Every mail has its dayIts a game-changer for staying organized. In Apple Mail on your iPhone or iPad, compose your email as usual, then tap and hold Send. Youll see options like "Send Later," where you can select a specific date and time for delivery. In Gmail, after drafting your email, click the small arrow next to the Send button and select Schedule Send.10. Stop getting lured in at the grocery storeWith an Amazon Prime account, you get access to a rotating library of popular magazines for free.Check them out here. Now you can read the latest weird royal rumors without paying for the magazine.CLICK HERE TO GET THE FOX NEWS APPGet tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours or get the free podcast.Daily newsletter:Join 600,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "Kim Komando Today" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved.
    0 Comments ·0 Shares ·40 Views
  • Does your Windows 11 PC keep restarting? Let's fix that frustrating problem
    www.foxnews.com
    close Windows Defender Security Center scam: How to protect your computer from fake pop-ups Tech expert Kurt "CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software. Experiencing a Windows 11 boot loop can be incredibly frustrating, transforming your computer into a seemingly endless cycle of restarts that disrupts productivity. When your system continuously fails to load the login screen and instead repeatedly attempts to restart, you're facing a critical technical issue that demands immediate attention.This persistent reboot problem can stem from various causes. So, what do you do? Let's look at some ways to diagnose and resolve the Windows 11 boot loop, helping you restore your computer's functionality and get back to work.IM GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2Enter the giveaway by signing up for myfree newsletter. Windows 11 PC (Microsoft) (Kurt "CyberGuy" Knutsson)What causes a Windows 11 PC to keep restarting?There's no single cause for a Windows 11 PC getting stuck in a reboot loop. A reboot loop can be caused by an issue with your computer's power supply, a malware infection, overheating or even hardware drivers. Here are the different things to check if your Windows 11 laptop or desktop keeps restarting.Fix #1 - Boot your PC in safe mode Step to boot your PC in safe mode (Kurt "CyberGuy" Knutsson)When you are troubleshooting any problem on your PC, you should boot your computer in safe mode. If your PC is in safe mode and no longer experiences the restart loop, this means that the default Windows 11 settings and drivers aren't causing the issue. This allows you to narrow down the sources of problems causing your Windows 11 PC to crash, making it easier to troubleshoot. Here's what you need to do to boot in safe mode:Press the Windows Logokey and R at the same timeType msconfig in the boxPress OKUnder Boot Options, click the Safe Boot checkboxWhen your computer restarts, it will automatically restart in safe mode. If your computer restarting is making it difficult to follow these steps, you can also follow these steps at the sign-in screen:Hold the Shift key while clicking the Power iconSelect RestartYour PC will restartOnce your PC restarts, you will see a Chooseoption; click it.Select Advanced OptionsSelect Startup SettingsNow, when your PC restarts, you will be presented with a list of options. Select 4or F4 to start your PC in safe mode. If you need to use the internet while the computer is in safe mode, you can select option 5or press F5.WINDOWS 11 TIPS AND TRICKS YOU DIDN'T KNOW YOU NEEDEDFix #2 - Remove any new softwareIf your automatic rebooting problem began after installing a new app, uninstall that app and monitor your PC. If you still notice your PC restarting, there's a chance that the app has infected your system settings before you uninstalled it. To fix this, you'll need to restore the system. To do a system restore, you should first boot your PC in safe mode and then follow these steps:Open the Control PanelSearch the Control Panel for Recovery Step to remove any new software (Kurt "CyberGuy" Knutsson)Select RecoveryChoose Open System RestoreClick NextNow you will click on your hard drive and select finish. Your computer will automatically restart.Fix #3 - Make sure your computer isn't overheatingAn overheating laptop or desktop will try to prevent damage to critical hardware components by shutting itself down. This is one of the leading causes of a Windows 11 PC getting stuck in a restart loop. If you've noticed your desktop giving off a lot more heat than usual or a laptop feeling hot to the touch, chances are you have an overheating issue.A computer's CPU and GPU generate the most heat, so I recommend monitoring those hardware pieces to see if they are overheating. You don't need any additional software to monitor the temperatures of your GPU, as some temperature readings are built into Windows 11. Here's how to check your hardware temperatures in Windows 11:Open the Task ManagerClick the second tile, Performance,on the left-hand side of your screenFrom here, you can click GPU, which will show you your GPU temperature. Visual to show overheating on PC (Kurt "CyberGuy" Knutsson)Unfortunately, the built-in temperature reading doesn't read your CPU temperature, and you'll need to manually go into the UEFI/BIOS to check the temperature without installing any additional software. However, there's a multitude of free-to-use apps that manufacturers have developed to measure your CPU temperature, including Core Temp, HWMonitor or Open Hardware Monitor.When you open one of these monitoring tools, you'll be able to view your PC's stats, including CPU and GPU temperatures and loads. If your CPU or GPU is running too hot, try cleaning the components to remove dust. For custom-built desktops, adding more exhaust fans to the case can improve airflow and cooling. Persistent overheating, especially in older laptops, may indicate that it's time to consider upgrading your machine.TAKE YOUR WINDOWS PC'S SECURITY TO THE NEXT LEVELFix #4 - Check for issues with your PC's power supply Image of a PCs power supply (Kurt "CyberGuy" Knutsson)A computer will randomly restart when it has a failing power supply unit (PSU). If you have an issue with your power supply, you'll know if your computer won't restart or turn on. In addition to causing shut-offs and restart loops, a faulty power supply can also cause a blue screen of death error. In severe cases, you might even smell a burning scent or witness smoke coming from your PC's power supply exhaust vent. If you use a laptop with PSU issues, you cannot send your computer to a repair shop or the manufacturer for repair.Desktop PC owners have it a bit easier, assuming they have a pre-built PC that can be altered easily. If you do have a desktop, turn off and unplug your computer before going into the case to investigate if dust build-up is affecting your PSU. If your PSU fails, you must purchase and install a new one.Fix #5 - Scan your PC for viruses Image of a woman working on a PC (Kurt "CyberGuy" Knutsson)Malware and other viruses are a common cause of a crashing or constantly restarting PC. The easiest way to do this is by using strong antivirus software. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.If your computer is stuck rebooting, you may need to boot in safe mode in order to run an antivirus application. Here's what you need to do to boot your PC in safe mode with Windows 11:When your computer restarts, at the sign-in screen, press and hold the Shift keyClick PowerClick RestartNow, your computer should act more stable after booting in safe mode, allowing you to run an antivirus scan.10 USEFUL WINDOWS KEYBOARD SHORTCUTS YOU NEED TO KNOWFix #6 - Disable automatic restart Step to disable automatic restart (Kurt "CyberGuy" Knutsson)If you have automatic restart enabled in Windows 11, your PC will restart every time it encounters a system failure. You can easily disable this future within the Windows 11 command prompt. Here's what you need to do:Press the Windows key + Ron your keyboardType sysdm.cpl and click OKSelect the Advanced tabUnder Startup and Recovery,click SettingsUnder System Failure, uncheck the box Automatically restartClick OKKeep in mind this isn't a fix for the problem, but it will help you further troubleshoot the restart loop problem by disabling automatic restarts.Fix #7 - Repair your system files Step to repair your system files (Kurt "CyberGuy" Knutsson)An issue with your Windows 11 system files may be causing your PC to constantly restart. If you think a corrupted system file is why your PC keeps restarting, there's a quick and easy fix you can do within the Windows Powershell. The System File Checker (SFC) is a built-in tool that will scan your Windows system files for corruption or any other changes. If a system file has been modified, it will automatically replace the file with the correct version. Here's how to run the SFC command:Open the Windows Powershell(or Command Prompt)Type in sfc /scannowPress EnterLeave the command prompt window open until the command completes, which could take some timeIf there's no problem with your Windows system files, after the scan, you'll see a message that says, "Windows Resource Protection did not find any integrity violations." If you instead see a message saying, "Windows Resource Protection found corrupt files but was unable to fix some of them," you should try running SFC again but in safe mode.Fix #8 - Check for RAM issues in the command promptYour PC might be restarting itself because it doesn't have access to enough random access memory (RAM). Windows 11 may become unstable without enough RAM in your computer, causing the OS to randomly reboot. You can use the built-in Memory Diagnostics Tool in Windows 11 to check your computer for issues related to RAM. Here's what you need to do:Press the Windows Keyand RType mdsched.exe in the text boxClick OKSelect Restart Now and Check for ProblemsWhen your PC restarts, the Windows Memory Diagnostics Tool will check for any RAM-related issues; if the test detects an error, take note of the error code. You can check the error code online to find the correct fix for that specific error.Kurt's key takeawaysThese are the best fixes for a computer that is constantly restarting. While you can perform these fixes at home, it might be your best bet to send your computer to a repair shop or back to the manufacturer if you continue having an issue with your Windows 11 PC being stuck in a restart loop after these fixes. It also may be time to invest in a new laptop if you are experiencing a system slowdown and random restarting on your Windows 11 PC, but I would recommend trying to fix the problem first before buying a new machine.What was the most challenging computer technical issue you've ever encountered, and how did you resolve it? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·33 Views
  • Sonys surprising entry into electric vehicle market
    www.foxnews.com
    Tech Sonys surprising entry into electric vehicle market The EV that's trying to give Tesla, Lucid Air a run for their money Published January 21, 2025 6:00am EST close 'CyberGuy': Sonys surprising entry into the electric vehicle market Sony and Honda's Afeela 1 EV launches with advanced tech and entertainment for $89,900. Tech expert Kurt Knutsson gives his takeaways. Sony has officially entered the electric vehicle (EV) market with its new model, the Afeela 1. This innovative vehicle, developed in partnership with Honda, aims to redefine the driving experience by integrating advanced technology and entertainment features. Unveiled at CES 2025, the Afeela 1 is now available for preorder, marking a significant milestone in Sony's expansion beyond consumer electronics into the automotive industry.Enter the giveaway by signing up for myfree newsletter. Exterior of the Afeela 1 (Sony) (Kurt "CyberGuy" Knutsson)Performance and rangeEquipped with a powerful 482 hp all-wheel-drive powertrain, the Afeela 1 features a 91 kWh battery that offers an EPA-estimated range of 300 miles. It supports fast charging at 150 kW and is compatible with Tesla's Supercharger network, providing convenience for long-distance travel. Exterior of the Afeela 1 at a Tesla charging station (Sony) (Kurt "CyberGuy" Knutsson)Advanced driver assistance systems (ADAS)The Afeela 1 boasts an impressive array of 40 sensors and cameras, enabling Level 2+ ADAS features. These systems include lidar assistance for tasks like automated parking and real-time environmental monitoring. The vehicle's AI processing capabilities allow it to perform up to 800 trillion operations per second, paving the way for future updates that may enhance its autonomous driving capabilities. Exterior of the Afeela 1 (Sony) (Kurt "CyberGuy" Knutsson)In-car technology and entertainmentSony emphasizes creating an interactive experience within the Afeela 1. The car features:An AI-powered personal assistant for voice interactionsA dashboard-length screen for navigation and entertainmentSurround sound systems utilizing Sony's 360 Reality Audio technologyMoreover, certain functionalities will be available through a subscription model after an initial three-year complimentary period. Interior of the Afeela 1 (Sony) (Kurt "CyberGuy" Knutsson)Design and comfortThe design of the Afeela 1 focuses on comfort and aesthetics. Its interior is crafted from high-quality materials, including plant-derived and recycled components. The cabin is optimized for entertainment, featuring strategically placed displays and noise-canceling technology to enhance the passenger experience. Interior of the Afeela 1 (Sony) (Kurt "CyberGuy" Knutsson)Pricing and availabilityThe Afeela 1 is available in two trims: the Origin, which starts at $89,900, and the Signature, priced at $102,900. Currently, preorders are open exclusively for California residents, requiring a refundable reservation fee of $200. The Signature variant is expected to ship in mid-2026, while the Origin will follow in 2027. Exterior of the Afeela 1 (Sony) (Kurt "CyberGuy" Knutsson)Kurts key takeawaysSony's entry into the electric vehicle market with the Afeela 1 represents a significant shift towards integrating technology and mobility. With its high-performance specs, advanced driver assistance systems and focus on entertainment, it aims to appeal to tech-savvy consumers looking for more than just transportation.What features are most important in an electric vehicle, and how will that affect your decision to purchase one? Let us know what you think by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·55 Views
  • How to manage photos, videos on new laptop with limited space
    www.foxnews.com
    close 'CyberGuy': Need to declutter your computer? Kurt Knutsson explains how to reduce browser clutter and save your computer's memory. We recently received an email from Sylvia, who just got a new laptop that has significantly less space than her old laptop. She emailed us wondering how to store photos and videos on a computer with only 82GB of storage space:"The newer laptop does not have as much storage space (indicates 82.1 GB free of 225GB) as the old one (indicates 322 GB free of 446 GB). What is the best way to store my photos and videos to free up space on the new laptop?"Great question, Sylvia. This is a common issue for anyone who has purchased a lightweight laptop such as a Chromebook or Windows-based ultrabook. Fortunately, there are a few easy ways to store files off your hard drive.Enter the giveaway by signing up for myfree newsletter. A woman typing on her new laptop (Kurt "CyberGuy" Knutsson)A quick breakdown of file sizes82 GB should be more than enough for basic tasks like web browsing, using office applications or streaming video. However, if you plan to store large files such as high-resolution photos, videos or games, or if youre using software that requires a lot of space, 82GB might fill up quickly. Heres a rough breakdown of how much space different types of files typically take:Text documents: A single text document is typically a few kilobytes (KB) in size. So, you could store millions of text documents in 82GB.Photos: A high-resolution image can be about 5 megabytes (MB). With 82 GB, you could store about 16,000 such photos.Videos: A one-hour HD video can be around 1-2 gigabytes (GB). So, you could store about 40-80 hours of HD video in 82GB.Games: Modern games can take up anywhere from 1GB to 100GB. So, you could store 1-82 games in 82GB, depending on their size.It's also important to leave enough space on your computer for the operating system to run smoothly. As a rule, keep at least 10%-15% of your hard drive free to prevent application slowdowns. Anexternal hard drive is an excellent option for storing photos and videos to free up space on your new laptop. Another great way to save space is by storing your photos incloud storage. Whether its a hard drive or cloud space, having a backup is a good idea.As you can see from the breakdown above, photos and videos can take up a significant amount of storage space on your laptop. If you are a photographer who deals with RAW images, this amount could be even higher, as with video professionals who work with 4K content.Even if you're not a video professional or photographer, having a lot of home videos and photographs can take up a lot of space. You will need a secondary storage solution with less than 100GB of space left. Here are a few options you might consider. A Mac laptop next to an external hard drive (Kurt "CyberGuy" Knutsson)External hard drivesAnexternal hard drive is one of the most practical and reliable solutions for expanding your laptop's storage capacity, especially if you have many media files like photos, videos or other data-intensive content. These portable storage devices connect to your computer via USB (and increasingly via USB-C for faster transfer speeds), offering the flexibility of storing and backing up massive amounts of data without consuming your laptop's internal space.Types of external hard drivesThere are two main types of external hard drives:HDD (hard disk drive) andSSD (solid state drive). HDDs are typically more affordable and come in larger capacities (up to several terabytes), making them an excellent option for those needing vast storage space on a budget. However, their mechanical components make them slightly slower in data transfer speeds and more prone to physical damage.SSDs, on the other hand, are faster, more durable and lighter, though they tend to be more expensive per gigabyte of storage than HDDs. SSDs are ideal if you frequently transfer large files, work with high-resolution media like 4K videos or require speedy access to your data. They are also less prone to damage from drops or movement, which makes them perfect for on-the-go use.Storage capacityExternal hard drives come in various sizes, from modest capacities like 256GB to massive options exceeding 10TB. The amount of storage you need will depend on the types of files youre dealing with. For example, a 1TB drive can store over 200,000 high-resolution images if you need space for photos. A larger capacity drive might be necessary for video files, especially HD or 4K, as these files can easily consume tens or even hundreds of gigabytes. An external hard drive plugged into a laptop (Kurt "CyberGuy" Knutsson)Portability and convenienceOne key advantage of external hard drives is their portability. Compact and easy to carry, they provide an excellent solution for photographers, videographers or anyone needing access to large files while moving. Some models are designed to be ultra-durable, with rugged, shockproof and waterproof features, ideal for outdoor and travel use.Many professionals label and organize their drives by project or period, allowing for easy archiving and retrieval. As mentioned earlier, a simple organizational system, such as labeling your drives with the dates or types of content they contain, can help keep your data structured and easily accessible. This is especially important when you accumulate multiple drives over time.See Kurt's picks for the best external hard drives here.Cloud storage services: Google Drive, Dropbox, Microsoft OneDriveCloud storage services likeGoogle Drive,Dropbox andMicrosoft OneDrive offer convenient, flexible options for storing large files without consuming your laptop's limited space. These services allow you to securely store your photos, videos and documents in the cloud, freeing up valuable storage on your device. One significant advantage of cloud storage is accessing files from any device with an internet connection, whether on your phone, tablet or another computer.Most cloud services provide a certain amount of free storage (typically between 2GB and 15GB) before upgrading to a paid plan. For instance,Google Drive offers 15GB of free storage shared across Google services, whileDropbox provides 2GB for free with options to upgrade for more space.OneDrive provides 5GB for free, but Microsoft users can get additional storage through Office 365 subscriptions, granting access to the Microsoft Office suite.Additionally, cloud storage services come with features like automatic syncing and backup, making it easier to organize and safeguard your files. This can be particularly helpful for large photo and video libraries, which can be set to upload automatically from your phone or computer. With features like file versioning and collaboration tools, cloud platforms offer more than just storage. They enhance productivity and allow seamless file sharing with friends, family or colleagues.Finally, many cloud storage providers offer encryption and other security measures to protect your files for added peace of mind. However, it would always be best to take extra precautions, such as enabling two-factor authentication and using strong, unique passwords, to ensure your data is safe.Kurt's favorite cloud services can be seen here.iCloud: A comprehensive cloud storage solution for Apple usersFree storage and subscription plansiCloud offers 5GB of free storage to all users, which is sufficient for basic services like iCloud Keychain, testing other features and storing some files. However, for users who need more storage, iCloud+ subscriptions are available.These plans include:50GB for $0.99/month200GB for $2.99/month2TB for $10.99/month6TB for $32.99/month12TB for $64.99/monthIntegration and usabilityiCloud is tightly integrated with Apple devices, making it highly convenient for Apple users. Files stored on the desktop and in documents folders on Macs are automatically synced to iCloud Drive, which is especially useful for devices with limited storage space like the MacBook Air. iCloud Drive can also be accessed from Windows machines through a dedicated file folder and files can be managed via icloud.com.Automatic syncing and backupiCloud provides robust automatic syncing and backup features. iCloud Backup automatically backs up important data on iPhones and iPads when connected to power and Wi-Fi, ensuring that your device's data is always up to date. This backup can be used to restore your device or set up a new one seamlessly.Security and privacyiCloud uses 128-bit AES encryption to secure all files. Additionally, iCloud+ subscriptions include advanced privacy features such as iCloud Private Relay, which protects your browsing history and identity, Hide My Email, which generates random email addresses, and Custom Email Domains for personalized email addresses.Collaboration and compatibilityWhile iCloud is highly user-friendly for Apple users, it can be less reliable and glitchy for non-Apple users. Collaboration is limited to Apple users, but files can be shared and accessed across different Apple devices using the Files app on iOS and iPadOS, the Finder on Mac or File Explorer on Windows PCs. Sign-in page for iCloud (Kurt "CyberGuy" Knutsson)Steps to protect yourself and your dataWhen storing your photos, videos and other important files, it's crucial to prioritize data security. Here are some essential steps to protect yourself and your valuable information.1)Use strong passwords: Create unique, complex passwords for all your accounts and devices. Consider using apassword manager to generate and store secure passwords.2)Enable encryption:Encrypt your external hard drives and cloud storage accounts to add an extra layer of protection to your data.3)Implement two-factor authentication (2FA): Enable 2FA on all accounts that offer this feature, especially for cloud storage services.4)Install and maintain strong antivirus software: Use a strong antivirus program and keep it updated to protect against malware and other security threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.5)Regularly update your operating system and applications: Keep your devices and softwareup to date to ensure you have the latest security patches.6)Be cautious with public Wi-Fi: Avoid accessing sensitive information when connected topublic networks or use a VPN for added security. Using aVPN (virtual private network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs dont directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies.7) Back up your data regularly: Createmultiple backups of your important files, including at least one offline copy.8)Use secure file transfer methods: When sharing files, use encrypted transfer methods orpassword-protected links.By following these steps, you can significantly enhance the security of your data and protect yourself from potential cyber threats.Kurt's key takeawaysManaging storage on a laptop with limited space requires thoughtful planning, especially when dealing with large files like photos and videos. While 82GB may be sufficient for basic tasks, media files can quickly add up. By leveraging external hard drives or cloud storage services, you can keep your laptop running efficiently while ensuring that your important files are safely stored and accessible. Whether you opt for physical or cloud-based solutions, remember to prioritize data security using strong passwords and encryption where necessary. With the right strategy, you can make the most of your laptop's storage without sacrificing performance or losing precious memories.Do you have a way of storing photos and videos that we didn't mention? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·55 Views
  • Chinese electric hypercar jumps over spikes, potholes while driving itself
    www.foxnews.com
    Tech Chinese electric hypercar jumps over spikes, potholes while driving itself The Yangwang U9's autonomous leap over obstacles Published January 20, 2025 6:00am EST close 'CyberGuy': Chinese electric hypercar can jump over potholes while driving itself Tech expert Kurt Knutsson says the $236,000 Yangwang U9 electric hypercar boasts 1,287 horsepower and can jump obstacles. The Yangwang U9 has become a sensation in the automotive world, not just for its impressive specifications but also for its remarkable capabilities. This electric hypercar from BYD's premium Yangwang brand boasts a staggering 1,287 horsepower and has recently been showcased performing extraordinary feats of autonomous driving.Enter the giveaway by signing up for myfree newsletter. Yangwang U9 (CarNewsChina) (Kurt "CyberGuy" Knutsson)A brief overview of the Yangwang U9Launched with a price tag of approximately $236,000, the Yangwang U9 is designed to redefine performance in the electric vehicle sector. Equipped with four independent electric motors, it delivers an astonishing 1,287 hp and 1,680 Nm of torque, allowing it to accelerate from 0 to 60 mph in just 2.36 seconds. The vehicle's top speed reaches an impressive 243.54 mph, making it one of the fastest electric cars on the market today. Yangwang U9 (CarNewsChina) (Kurt "CyberGuy" Knutsson)Innovative suspension technologyOne of the standout features of the U9 is its DiSus-X suspension system, which enables the car to adjust its height dynamically. This system combines Intelligent Damping Body Control with Intelligent Hydraulic Body Control, allowing for real-time adjustments that enhance handling and stability. During recent demonstrations, the U9 showcased its ability to autonomously navigate obstacles such as potholes and road spikes while maintaining high speeds. Yangwang U9 jumping (CarNewsChina) (Kurt "CyberGuy" Knutsson)Performance highlights:Acceleration: 0-60 mph in 2.36 secondsTop speed: 243.54 mphQuarter-mile time: 9.78 seconds at approximately 140 mphRange: Up to 450 km on a single charge (CLTC) Yangwang U9 jumping over pothole (CarNewsChina) (Kurt "CyberGuy" Knutsson)Autonomous capabilities and demonstrationsIn a recent demonstration, the U9 was seen autonomously jumping over various obstacles at speeds up to 74.5 mph. The car successfully cleared an 8-foot water-filled pothole and a stretch of metal spikes without any human intervention, highlighting the advanced autonomous driving technology integrated into this hypercar. This capability raises questions about the future of driving. How much autonomy can we expect from vehicles? Will jumping capabilities become standard in future models? Yangwang U9 jumping over pothole (CarNewsChina) (Kurt "CyberGuy" Knutsson)Market impact and future prospectsWith its unique features and performance metrics, the Yangwang U9 challenges traditional notions of what hypercars can achieve. However, there remains uncertainty about whether these jumping capabilities will be available to consumers or if they are merely a marketing gimmick. Stretch of metal spikes (CarNewsChina) (Kurt "CyberGuy" Knutsson)Kurts key takeawaysThe Yangwang U9 is a testament to BYD's commitment to innovation in electric vehicles. As we witness advancements like autonomous driving and dynamic suspension systems, it's clear that the future of automotive technology is rapidly evolving. The U9 may just be the beginning of a new era where hypercars not only deliver speed but also redefine mobility.What do you think about the integration of autonomous features in high-performance vehicles? Let us know what you think by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·62 Views
  • How to stop robocalls on your flip phone
    www.foxnews.com
    Tech How to stop robocalls on your flip phone Did you know you can stop robocalls on a flip phone? Here's how it's done Published January 19, 2025 10:00am EST close There's an alarming spike in scam calls originating from robocalls Many of these calls were made by scammers, often promising to eliminate your taxes. Robocalls can be a real headache, no matter what type of phone you use. If youre like many people who prefer the simplicity of a flip phone, you might be wondering how to tackle this issue.Donna reached out to us with a simple but great question, asking, "Is there a way to eliminate robocalls from a flip phone?"We've reported extensively on how to stop spam calls from coming to your smartphone, but what if you don't like using a smartphone and prefer a flip phone? While flip phones are generally harder to block spam calls from, it's not impossible, but it's not as easy as dealing with robocalls on your smartphone. Image of a flip phone (Kurt "CyberGuy" Knutsson)WHAT IS ARTIFICIAL INTELLIGENCE (AI)?How to deal with robocalls on a flip phoneDealing with robocalls on a flip phone can be challenging, but you can take a few steps to minimize them. You'll have to make some phone calls, so it won't be as simple as blocking spam callers on a smartphone. But if you're willing to place a few phone calls and do some extra work, you can live happily without spam calls on your flip phone. Here are the steps you can take:1. Avoid answering unknown numbers: If you dont recognize the number, let it go to voicemail. Legitimate callers will leave a message.2. Be cautious with your number: Be mindful of where you share your phone number to reduce the chances of it being added to robocall lists.3. Register on the Do Not Call List:Register your phone number on theNational Do Not Call Registry. This can help reduce the number of legitimate telemarketing calls you receive. You can register a phone number with the National Do Not Call Registry online at donotcall.gov or by calling 1-888-382-1222 from the phone you want to be registered with the Do Not Call Registry.GET FOX BUSINESS ON THE GO BY CLICKING HERE Man looking at a flip phone (Kurt "CyberGuy" Knutsson)4. Contact your carrier: Many carriers offer call-blocking services. Contact your carrier (e.g., Verizon, AT&T, T-Mobile) and ask if they provide robocall-blocking features for flip phones. Many carriers do, but it depends on the brand of flip phone you have and which carrier you have.5. Manual call blocking: If your flip phone has the option, you can manually block specific numbers. Check your phones user manual for instructions on how to do this. While this feature is common with all smartphones, many newer flip phones can also manually block callers, but, as we mentioned, you'll need to check your instruction manual. Flip phone (Kurt "CyberGuy" Knutsson)6. Report robocalls to the FTC:Report unwanted calls to the Federal Trade Commission (FTC). This helps authorities track and take action against robocalls. While this method doesn't block robocalls from calling your flip phone, it does help the FTC locate robocalls and prevent them from calling. It's a good way to help the FTC fight back against robo-spam callers. Here's what you need to do to report a robocall to the FTC:Go online atReportFraud.ftc.gov or call 1-877-382-4357.When filling out your report, you'll need the robocaller's number and the date and time of the call. FTC logo (Federal Trade Commission)7. Consider using a data removal service:Regrettably, there is a high probability that your phone number is readily available on many lists sold by data brokers to hundreds of people search websites. However, removing it from the web can reduce the likelihood of spammers and telemarketers obtaining your number and contacting you.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurt's key takeawaysRobocalls can be a real nuisance, especially for flip phone users. To tackle this issue, consider registering your number on the National Do Not Call List and avoid answering unknown numbers. Additionally, check with your carrier for any call-blocking services it may offer. With a few proactive steps, you can significantly reduce those pesky interruptions.CLICK HERE TO GET THE FOX NEWS APPWhat do you find most frustrating about robocalls, and how do you typically handle them? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·64 Views
  • Who's really behind that random strange text from nowhere?
    www.foxnews.com
    close Who's really behind that random strange text from nowhere? It's becoming increasingly difficult to distinguish between legitimate text messages and potential scams. These days, our phones are constantly buzzing with notifications, and it's becoming increasingly difficult to distinguish between legitimate messages and potential scams. Bill from Mesa, Arizona, recently shared an experience that highlights this growing concern:"Twice in the last week I've received texts supposedly sent elsewhere. The last one asked if I was 'available tomorrow evening.' I did not recognize the number but am active in an old people park so receive many calls and texts from unfamiliar numbers. I texted back that my wife thought we were available. A few minutes later, a text came asking if I was Mrs. Amy. I texted that I wasn't Mrs. Amy and had never been, but it was a problem."A return text came thanking me for being so polite and the texter's appreciation for polite people and if I were ever in LA, I would be welcome to a backyard BBQ. Looking back, there were a couple more texts ending with I like to make friends with polite people. The first text which I deleted was in a very similar vein and format. Is this a scam and why, for what?"Bill's experience is not unique. Many people receive similar messages that seem harmless at first glance but could potentially be part of a more sinister scheme. Let's dive into the world of text message scams and learn how to protect ourselves. A man texting on his phone (Kurt "CyberGuy" Knutsson)The anatomy of a text message scamText message scams, also known as"smishing," a combination of SMS and phishing, have become increasingly sophisticated. Scammers use various tactics to engage potential victims and gain their trust. Here are some common elements:Unfamiliar numbers: The message comes from a number you don't recognize. For instance, you receive a text from +1-555-123-4567, a number not in your contacts.Unsolicited contact:The text arrives unexpectedly, often with a friendly or urgent tone. Example:"Hey! Long time no see. How have you been?"Personal touch: The scammer might use your name or reference a common activity to seem legitimate. Example:"Hi Sarah, it's Mike from the book club. Are you coming to the meeting next week?"Too good to be true:Offers of prizes, invitations, or other enticing propositions are common. Example:"Congratulations! You've won a $500 gift card. Click here to claim your prize!"Requests for information: The scammer may ask for personal details, either directly or indirectly. Example:"This is your bank. We need to verify your account. Please reply with your account number and PIN."Remember, these are all examples of potential scams. Always be cautious when receiving unexpected messages, especially those asking for personal information or containing suspicious links. A person texting on a phone (Kurt "CyberGuy" Knutsson)Understanding the scammer's strategyIn Bill's case, the scammer employed a "long-play" strategy. By engaging in friendly conversation and offering invitations, the scammer aims to build trust over time. The end goal could be:Phishing for information: Gradually collecting personal details that can be used for identity theft.Malware distribution: Eventually sending a link that, when clicked, installs malicious software on your device.Financial scams: Building trust to eventually request money or financial information. A person texting on a phone (Kurt "CyberGuy" Knutsson)How to identify suspicious textsTo protect yourself from text message scams, follow these steps:Check the sender: Look at the full email address or phone number, not just the display name.Analyze the content: Be wary of messages with urgent subjects, grammatical errors, or strange URLs.Verify independently: If the message claims to be from a known entity, contact them through official channels to confirm.Trust your instincts: If something feels off, it probably is. Don't let politeness override your judgment.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? A man texting on his phone (Kurt "CyberGuy" Knutsson)What to do if you suspect a scamIf you believe you've received a scam text, here are six steps to follow:1. Don't respond: Avoid engaging with the scammer to prevent further attempts.2. Block the number:Use your phone's built-in blocking features to prevent further contact.For iPhone: Open themessage, tap thesender's name ornumber, select"Info," then "Block Caller."For Android: Open themessage, long-press theconversation, tap thethree-dot menu and select "Block" or "Block & Report Spam." You may be asked to confirm your decision by clicking Yes.Settings may vary depending on your Android phones manufacturer.GET FOX BUSINESS ON THE GO BY CLICKING HERE3. Report the message:Forward the suspicious text to7726 (SPAM). Also, report it directly to the FTC atReportFraud.ftc.gov.4. Keep your information safe: Never click on links or provide personal information in response to unsolicited texts.5. Have strong antivirus software: Install and run strong antivirus apps on your phone to scan for malware and ensure your device is secure. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.6. Invest in personal data removal services: Consider using a data removal service to eliminate your personal information from data broker sites. These services can help reduce spam, decrease the risk of identity theft and clean up your online presence by automating the removal of your data from hundreds of data broker sites.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.Kurts key takeawaysWhile it's natural to want to be polite, as Bill was, remember that your safety and personal information are paramount. Trust your instincts, verify unfamiliar contacts and never hesitate to ignore or block suspicious messages. Remember, a true friend won't mind if you take extra steps to verify their identity, and a legitimate organization will have official channels for communication.CLICK HERE TO GET THE FOX NEWS APPHow have you or someone you know been affected by text message scams, and what steps did you take to protect yourself? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·38 Views
  • Fake job interview emails installing hidden cryptocurrency mining malware
    www.foxnews.com
    Published January 18, 2025 10:00am EST close 'CyberGuy': The FBI's new warning about AI-driven scams that are after your cash Kurt Knutsson discusses some tips to keep you safe. The job market hasnt been great in the last few years, especially in tech, leaving a lot of people actively looking for jobs.Scammers are taking advantage of this. They have come up with a new trick where they pretend to be recruiters to spread crypto miners on peoples devices.It starts with an email inviting the person to schedule an interview for a job. But when they click the link, it installs a malicious app that secretly mines cryptocurrency.This app hijacks your PCs resources, like the CPU and GPU, which slows down its performance significantly. A person typing on their laptop. (Kurt "CyberGuy" Knutsson)What you need to knowThis malicious campaign begins with an email that tricks victims into thinking it is part of a recruitment process, as reported byDark Reading. In most cases, these emails are pretending to be from recruiters at the cybersecurity company CrowdStrike.The fraudulent email contains a link claiming to take the recipient to a site where they can schedule an interview. However, in reality, it redirects the victim to a malicious website that offers a download for a supposed "CRM application."WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The site provides download options for both Windows and macOS. Regardless of which option the victim selects, the download will be a Windows executable written in Rust. This executable then downloads the XMRig cryptominer.The executable performs several environmental checks to analyze the device and avoid detection. It scans running processes, checks the CPU and more. If the device passes these checks, the executable will display a fake error message while secretly downloading additional payloads needed to run the XMRig miner. Fake CrowdStrike job application download. (CrowdStrike)How does a cryptominer affect your PC?A cryptomining app can significantly impact your PCs performance. Once installed, it hijacks your computer's resources, including the CPU and GPU, to secretly mine cryptocurrency. This process requires a lot of computational power, which can cause your system to slow down drastically. You might notice your computer becoming unresponsive, running hotter than usual, or consuming more power.In some cases, prolonged use of cryptominers can also lead to hardware damage due to the increased strain on your components. Additionally, these miners often run in the background without your knowledge, making it harder to detect the issue until the damage is already done.CrowdStrike is aware of the scam and advises individuals to stay vigilant."This campaign highlights the importance of vigilance against phishing scams, particularly those targeting job seekers. Individuals in the recruitment process should verify the authenticity of CrowdStrike communications and avoid downloading unsolicited files," thecompany said in a blog post."Organizations can reduce the risk of such attacks by educating employees on phishing tactics, monitoring for suspicious network traffic and employing endpoint protection solutions to detect and block malicious activity."GET FOX BUSINESS ON THE GO BY CLICKING HERE People working on their laptops. (Kurt "CyberGuy" Knutsson)5 ways to stay safe from job interview scams1. Check if you applied for the job: If you receive an unsolicited interview invitation, think back to whether you actually applied for that job or company. Scammers often target jobseekers randomly, hoping someone takes the bait. If you didn't apply, it's likely a scam. Always confirm directly with the company before proceeding.2. Verify recruiter credentials:Always double-check the recruiters details before responding to an email or clicking any links. Verify their email address, LinkedIn profile and company association. Legitimate companies will use official email domains, not free services like Gmail or Yahoo.3. Avoid downloading unsolicited files:Be cautious of emails asking you to download any files or applications. Legitimate recruitment processes rarely require you to install software. If unsure, contact the company directly to confirm the request.4. Inspect links before clicking:Hover over any links in the email to see their actual URL. Scammers often use URLs that mimic legitimate sites but have subtle differences. If a link looks suspicious, avoid clicking on it.5. Use strong antivirus software:Use strong antivirus or endpoint protection software to detect and block malicious downloads. Regularly update your security tools to ensure they can handle new threats effectively.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurts key takeawayCybercriminals always manage to come up with new ways to exploit people. While this particular scam is more focused on using your computers resources than stealing data, it is still very dangerous. It shows that if a hacker can easily install software on your PC, they can also go ahead and steal your financial information and other personal data. Always verify the emails you receive, and try not to download anything you dont trust.Have you ever received a suspicious email that looked like a job offer? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·41 Views
  • Fox News AI Newsletter: China gains ground
    www.foxnews.com
    FILE - Chinese President Xi Jinping waves at an event to introduce new members of the Politburo Standing Committee at the Great Hall of the People in Beijing on Oct. 23, 2022. (AP Photo/Andy Wong, File) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- US must win AI race as China gains ground: 'Lead is not as big as it once was,' OpenAI exec warns- How does AI keep the US safe amid world conflict?- AI scammers pretending to be Brad Pitt con woman out of $850,000 A man is seen using the OpenAI ChatGPT artificial intelligence chat website in this illustration photo on July 18, 2023. (Jaap Arriens/NurPhoto via Getty Images)AMERICA MUST WIN: OpenAIs Chris Lehane is warning of Americas shrinking lead in the artificial intelligence space as the company releases its economic blueprint and policy proposals for the U.S.KEEPING US SAFE: Booz Allen Hamilton CEO Horacio Rozanski unpacks global unrest in the Middle East despite the Israel-Hamas deal and the impact of artificial intelligence on defense on "The Claman Countdown." Brad Pitt. (Stephane Cardinale - Corbis/Corbis via Getty Images)'ONCE UPON A TIME': A happily-ever-after with someone a woman believed was Hollywood hunk Brad Pitt quickly turned into a living nightmare.AI TRANSFORMER HOMES: AC Future, a leading developer of AI-enabled sustainable living solutions, has partnered with world-renowned Italian design house Pininfarina to create a groundbreaking collection of transformable living spaces. This innovative collaboration has resulted in three distinct products: AI-THd (AI Transformer Home Drivable), AI-THu (AI Transformer Home Unit) and AI-THt (AI Transformer Home Trailer). AI-THt (AC Future) (Kurt "CyberGuy" Knutsson)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff. Related Topics
    0 Comments ·0 Shares ·49 Views
  • That Apple ID disabled message? It's a dangerous scam
    www.foxnews.com
    close That Apple ID disabled message? It's a dangerous scam Kurt the CyberGuy breaks down why the Your Apple ID has been temporarily disabled email is most likely a scam. Let's talk about something that's been popping up in inboxes lately those sneaky "Your Apple ID has been disabled" emails.Like many people who've reached out to us, you might have gotten one that looks pretty legit, saying something like, "Your Apple ID has been temporarily disabled. Verify your Apple ID Information."Spoiler alert: It's most likely a scam, and we're going to break down why. Apple ID scam email. (Kurt "CyberGuy" Knutsson)The anatomy of the scamSo, here's how these tricksters operate. You get an email that looks totally legit with an Apple logo and creates a sense of urgency, claiming your Apple ID is in trouble. They'll say something like,"If you do not verify your account within 48 hours, it will be permanently locked." Yikes, right? That's exactly what they want you to think. So, you'll "Click the button below to verify as soon as possible." They want you to click where it says, "Go to Apple ID."Once you do that, you're directed to a fake Apple website designed to look almost identical to the real one. This fraudulent site prompts you to enter your username, password and other sensitive information, which the scammers can then use to access your Apple account and potentially steal your personal data or make unauthorized purchases. Apple ID scam email. (Kurt "CyberGuy" Knutsson)Let's play detective and look at some red flags in these scam emailsUrgent language: They're trying to scare you into acting without thinking. Classic scammer move.Vague claims: "Missing or invalid information"? That's purposely unclear to make you doubt yourself.Threats of lockout: Nothing like a good threat to get your heart racing, huh?Terms of service talk: They throw this in to sound official, but it's just smoke and mirrors.Grammar goofs: Real Apple emails are polished. Scammers? Not so much.Fishy sender address: Always check if it's actually from @apple.com (spoiler: it's probably not). Any legitimate email from Apple will come from a domain ending in "@email.apple.com. As you can see from the scam email below, it's from a fake email: mfrasier@wavecable.com, not Apple.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Apple ID scam email. (Kurt "CyberGuy" Knutsson)Why are scammers after your Apple ID?You might wonder, "Why are these scammers so obsessed with Apple IDs?" Well, there are a few reasons:iCloud goldmine: Your photos, contacts and documents are valuable for identity theft or blackmail.Shopping spree potential: Stored payment info means they could go on a spending spree on your dime.Financial account access: Many folks link their bank accounts to their Apple ID. Jackpot for hackers.Dark web data deals: Your personal info can fetch a pretty penny in shady online marketplaces.How to keep these scammers at bayTo keep scammers at bay and secure your Apple ID, follow these comprehensive steps:1. Enable Two-Factor Authentication (2FA): This crucial security feature adds an extra layer of protection to your Apple ID. Set it up by going to Settings >[your name] > Sign-In & Security on your iPhone or iPad, orApple menu>System Settings > [your name] >Sign-In & Security on your Mac.2. Use strong passcodes: Opt for alphanumeric passcodes instead of simple PINs. When in public, use biometrics (Face ID or Touch ID) and be cautious when entering your passcode.3. Enable Stolen Device Protection: If you're using iOS 17.3 or later, turn onthis feature for additional security against theft.4. Keep software updated: Regularlyupdate your operating system and apps to ensure you have the latest security patches.5. Dont click on suspicious links, use strong antivirus software: If the email asks you to click a link, dont do it right away. Hover over the link to see the actual URL. If it doesnt look like an official Apple website (or any site you trust), dont click it.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.GET FOX BUSINESS ON THE GO BY CLICKING HERE6. Use a password manager: Generate and store strong, unique passwords for all your accounts by using apassword manager.7. Enable Find My: Turn onFind My iPhone to help locate your device if it's lost or stolen.8. Use a personal data removal service: Consider using a service that finds and removes your personal information from data broker sites. These services can help reduce your digital footprint, making it harder for scammers to obtain your data to target you in the first place. Look for a service that offers automated removals from hundreds of data aggregators and provides detailed verification of removals.While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time.Check out my top picks for data removal services here.9. Dont click on suspicious links: If the email asks you to click a link, dont do it right away. Hover over the link to see the actual URL. If it doesnt look like an official Apple website (or any site you trust), dont click it.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. Apple ID scam email. (Kurt "CyberGuy" Knutsson)How Apple actually reaches outApple will never email you asking for your password or threaten to lock your account. If there's a real issue, you'll usually get a notification on your trusted device or be asked to sign in to your Apple ID account page directly. Remember, Apple will never ask for your password via email, phone or text message. Always access your account through official Apple websites or apps.Kurt's key takeawaysThese scammers are getting craftier, but with a bit of know-how and caution, you can keep your Apple ID (and all the good stuff connected to it) safe and sound. Remember, if something feels fishy, trust your gut. When in doubt, go straight to Apple's official website or give their support team a call. Keep your digital life secure, and don't let those scammers take a bite out of your Apple.CLICK HERE TO GET THE FOX NEWS APPHave you ever fallen victim to a digital scam, and what steps did you take to protect yourself afterward? Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·75 Views
  • These mistakes could tank your credit score
    www.foxnews.com
    close New high-tech tools can help purchase a home A new platform leverages AI to help potential buyers find an affordable home and earn bonus points on the purchase. Do you know the difference between 550 and 780? Yes, theyre 230 digits apart, but theyre also examples of bad and good credit scores, respectively.Win a pair of $329 Ray-Ban Meta smart glasses.Enter here, no purchase necessary!If you dont check yours regularly, nows the time to start. Small mistakes are a lot more common than you think, and they can do some serious damage to your credit score. Ill let you in on some of the most common credit report mistakes and what you can do to fix them.5-MINUTE CLEANUP FOR YOUR PHONE AND COMPUTERStep 1: Get your free credit reportThe three credit reporting agencies (TransUnion, Experian and Equifax) are required by law to provide you with one free credit report a year. Sweet. There are a few ways you can request a copy from each agency.Online is the fastest route. If you submit a request via phone or mail, expect to wait two weeks after the paperwork is received.Online:www.AnnualCreditReport.comPhone: 877-FACTACT (877-322-8228)Mail: Download and complete the Annual Credit Report Request Form. Send it to: Annual Credit Report Request Service, P.O. Box 105281, Atlanta, GA 30348-5281Pro tip: Grab your report from thefourth credit bureau, Innovis, too. Close up of a man with a smartphone and laptop computer on January 31, 2019. (Neil Godwin/Future via Getty Images)Step 2: Look for the most common mistakesTypos or wrong info: Anything from your name spelled incorrectly to your address or your birthdate off by one number. Tiny mistakes can mix up your credit with someone elses.Accounts you dont recognize: If you see something you dont recognize, dont ignore it! This includes credit cards you never applied for, loans in your name or purchases you didnt make.Duplicates: Its not normal to see a debt twice on a credit report. This includes things like the same collection account, transferred debts showing as separate accounts or paid-off debts still sitting there.Incorrect account info: Sometimes, payments can mistakenly show up as late, or closed accounts may still show as active. Other times, reports may show the wrong credit limit or mess up your payment history.AI ISNT GOING ANYWHERE: PROMPTS TO MAKE LIFE EASIEROutdated info: Bankruptcies older than 10 years, late payments older than seven years and outdated collections accounts should not be showing on your credit report.Make sure websites are following your rules: How to check permissionsStep 3: Report anything strangeDont panic! Write down and make copies of anything that looks off, then file a dispute with the credit reporting company by mail, phone or online.If youre filing online or by mail, explain in writing exactly whats wrong and why, and include copies of documents with proof. Make sure to include your contact info, credit report confirmation numbers and a copy of your version of your credit report.Equifax:Here online or call 866-349-5191Experian:Here online or call 888-397-3742TransUnion:Here online or call 800-916-8800Innovis:Here online or call 800-540-2505 Close-up of the upper corner of a consumer credit report from the credit bureau Equifax, with text reading Credit File and Personal Identification, on a light wooden surface, September 11, 2017. (Smith Collection/Gado/Getty Images)And always follow up! Bureaus are required to look into your disputes within 30 days. Track its progress until you have a resolution in writing. If your dispute is valid, the bureau has to fix it and tell the other bureaus as well.A lot of these issues boil down to good old-fashioned human error. It happens, but dont let that stop you from taking charge.Related:How to run a 5-minute privacy check on your phoneWhile youre at it, find your job numberEquifax also runs a database of 716 million income and employment records, including, potentially, yours. Its called The Work Number, and employers use it to make sure you are who you say you are.Your Employment Data Report (EDR) includes things like where youve worked, when you worked there and your exact past salary numbers.TECH TIP: SAVE YOUR MEMORIES BEFORE ITS TOO LATETrying to get a new job? An employer could use your EDR to find your past salary range and lowball you in negotiations. And, of course, Equifax will sell your EDR to anyone whos buying, including debt collectors.Money smarts:Its not just bogus calls and emails putting your bank info at riskHow to stop itYou canfreeze your EDR just like a credit report. You can also see whos tried to access it within the past two years. Youll need to make an account with The Work Number to do it.Search for your current or former employer(s) using their name or employer code (the nine-digit number on your W-2).Click their name, followed by Register Now. Heads-up: Itll ask for your Social Security number.Once you register, look over your report and make sure its accurate. Fill out thisdata dispute form if you find anything fishy. A credit card is pictured alongside a restaurant bill. (iStock)Then, head back to the dashboard and click Freeze Your Data.Fill out the Data Freeze Placement Formand submit it.The Work Number will send you a freeze confirmation letter, along with a PIN. Save your PIN in your password manager. Youll need it if you ever want to unfreeze your report.You can always log into The Work Number or call them to unfreeze your report.If you cant find your employer: They may not be registered with The Work Number. Call the freeze helpline at 1-800-367-2884 to double-check.Unless youre actively applying for a loan or government benefits, or unless an employer actively requests your EDR, its a no-brainer to freeze it. And if a potential employer insists on checking your EDR to hire you, maybe its not the right fit after all.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours or get the free podcast.Daily newsletter:Join 600,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "Kim Komando Today" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved. Related Topics
    0 Comments ·0 Shares ·56 Views
  • Best ways to give your old iPhone a second life
    www.foxnews.com
    Published January 17, 2025 10:00am EST close Create custom visuals on your iPhone with Image Playground in iOS 18.2 Tool transforms simple text prompts into images or animations in seconds. Before tossing out your old iPhone, consider it a treasure trove of potential waiting to be unlocked.Your seemingly outdated device isn't just electronic waste. It's a versatile gadget ready for an exciting second life. From transforming into a smart home hub to becoming a dedicated digital companion, an old iPhone can be repurposed in countless creative ways that breathe new life into technology you may not have considered.Here are some of the best ways to use your old iPhone. A woman looking at her iPhone (Kurt "CyberGuy" Knutsson)1. Turn it into a dumb phoneSmartphones are incredibly powerful, but they can also be overwhelming. The constant notifications and social media updates can make it hard to focus or enjoy the present moment. If youre finding that your iPhone is more of a time-waster than a tool for productivity, why not transform it into a "dumb phone"?A "dumb phone" is a basic mobile device that focuses on essential communication functions like calling and texting, while minimizing digital distractions through limited internet access and app capabilities, helping you reduce screen time and stay more present.Steps to disable apps and notificationsDisable notifications:OpenSettingsTap on NotificationsSelecteach app andtoggle off Allow NotificationsDelete unwanted apps:Press and hold the app icon on the home screenTapRemove AppFactory reset (Optional):Back up your data, if neededGo toSettings >General >Transfer or Reset iPhone >Erase All Content and SettingsWHAT IS ARTIFICIAL INTELLIGENCE (AI)?2. Give it to your kidsEventually, you may want to give your child their own smartphone. While a new phone can be expensive, handing down your old iPhone is a great way to introduce them to technology while also being mindful of your budget.By using Family Sharing and parental controls, you can carefully monitor what apps and content your child accesses. Plus, its an excellent way to bring them into the Apple ecosystem.Steps to set up Family Sharing and Parental ControlsSet up Family Sharing:OpenSettings and tap on your name at the top.SelectFamily Sharing and tapAdd Family Member to invite your child.If your child does not have an Apple ID, selectCreate an Account for a Child and follow the prompts to set up their account.If they already have an Apple ID, tapInvite People and choose how you want to send the invitation (AirDrop, Messages or Mail).Enable Parental Controls:OpenSettings and scroll down to tap onScreen TimeUnder the Family section, tap onyour child's nameIf Screen Time is not already enabled, tapTurn On Screen TimeFollow the prompts to set it up as your childs device.Tap onContent & Privacy RestrictionsIf prompted, enter yourScreen Time passcode(you will need to create one if you haven't already)Toggle onContent & Privacy RestrictionsYou can nowcustomize settings such as app limits, content restrictions and downtime settings, as needed.For app limits, tap App Limits, then select categories or individual apps to set time limits.To restrict explicit content or purchases, go to therespective sections under Content & Privacy RestrictionsThis process will help you manage your child's device usage effectively while ensuring they have access to appropriate content. A child using his iPhone to play games (Kurt "CyberGuy" Knutsson)3. Repurpose it as a webcamIn recent years, Apples Continuity Camera feature has made it easy to use an iPhone as a webcam for your Mac or Apple TV. While newer models work well for this purpose, older iPhones can still serve as excellent webcams, especially for online meetings and video calls.Instead of purchasing an external webcam, your old iPhone can deliver superior video quality. iOS 18 even allows older iPhones to work as dedicated continuity cameras for Apple TV, which is ideal for FaceTime or Zoom calls with family and friends.Steps to use your iPhone as a webcamDownload webcam apps: Consider apps like EpocCam or DroidCam from the App StoreConnect your iPhone: Follow the app's instructions to connect your iPhone to your computer via USB or Wi-FiSelect your iPhone in video settings: In your video conferencing app (like Zoom or FaceTime), select your iPhone as the camera sourceInstead of purchasing an external webcam, your old iPhone can deliver superior video quality.4. Make it a dedicated music playerWhy use your main iPhone for music when you can repurpose your old one as a dedicated MP3 player? With your old iPhone set up as a music player, you can enjoy your favorite tunes or podcasts without the distractions of text messages or social media notifications. Its a perfect solution for workouts, long drives or when you just want to zone out with music.GET FOX BUSINESS ON THE GO BY CLICKING HERE A woman using her iPhone as a dedicated music player (Kurt "CyberGuy" Knutsson)5. Use it as a remote or smart home controllerIf you own an Apple TV, you already know that your iPhone can function as a remote control. However, keeping your main phone tied up with the remote can be inconvenient. By making your old iPhone a dedicated Apple TV remote, you can still enjoy controlling your TV without using your primary phone.Steps to set up your old iPhone as a remoteSet up Apple TV remote feature:Ensure both devices are connected to the same Wi-Fi networkOpen theControl Center on the old iPhone (swipe down from the upper-right corner)Tap on theApple TV remote icon and follow the prompts to connectManage smart home devices:Downloadsmart home apps likeApple Home or those specific to your devices (e.g., Philips Hue)Follow theapp instructions to add and control devicesYour old iPhone can even be a hub for all your smart home devices, from adjusting lights and thermostats to checking security cameras.6. Save it for gamingSmartphones have transformed mobile gaming, and your old iPhone could be an ideal portable gaming console. Many classic and modern games run smoothly on older iPhone models, and with subscription services like Apple Arcade, you can access a huge library of high-quality games. This is a fun, low-cost way to enjoy mobile gaming without draining your main iPhones battery life. A game app on iPhone (Kurt "CyberGuy" Knutsson)7. Convert it into an e-readerFor book lovers, using an old iPhone as a dedicated e-reader is a great option. You can install apps like Kindle or Apple Books from the App Store. The iPhone's display is perfect for reading books and graphic novels, and since youre not using your main iPhone, there are no distractions like notifications to interrupt your reading.You can disable all apps and notifications on the old device, making it a peaceful reading experience. Plus, you can still connect your AirPods to listen to audiobooks while on the go.Kurts key takeawaysJust because youve upgraded to a new iPhone doesnt mean your old one has to be discarded. There are countless ways to repurpose it, from boosting your productivity to controlling your smart home. This way, you can extend its lifespan and maximize the value of your purchase.CLICK HERE TO GET THE FOX NEWS APPWhat other devices would you like tips on breathing new life into?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·61 Views
  • Chinese tech firm shares robot training secrets with the world
    www.foxnews.com
    Tech Chinese tech firm shares robot training secrets with the world A look at the future of robotic learning with open-source data Published January 17, 2025 6:00am EST close Chinese tech firm shares robot training secrets with the world AgiBot promises to reshape our understanding of robotic learning and adaptation. AgiBot, a pioneering Chinese artificial intelligence and robotics company, has introduced a transformative open-source dataset called AgiBot World Alpha.This comprehensive collection represents a significant milestone in humanoid robot training, capturing intricate data from over 100 robots across diverse real-world scenarios.By providing an unprecedented window into robotic movement and interaction, AgiBot has created a multidimensional resource that promises to reshape our understanding of robotic learning and adaptation. Humanoid robot training (AgiBot)The comprehensive datasetTheAgiBot World Alpha dataset is more than a simple data collection. Researchers and developers can now access an extensive repository containing over 1 million robotic movement trajectories. The dataset spans multiple industries, including home environments, restaurants, industrial settings, offices and supermarkets, providing unprecedented diversity in robotic training scenarios.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? Humanoid robot training (AgiBot)Addressing critical challenges in robotics trainingHistorically, robotics training has been constrained by limited real-world data and controlled environments. AgiBot's dataset addresses this fundamental challenge by offering comprehensive, authentic scenario representations. The collection includes complex movements such as fine-grained manipulation, sophisticated tool usage and advanced multi-robot collaboration techniques. Humanoid robot training (AgiBot)Technological innovations and hardware capabilitiesAgiBot has integrated cutting-edge technological components to capture high-quality data. The dataset leverages array-based visual tactile sensors, durable six-degree-of-freedom hands and mobile dual-arm robotic systems. These advanced hardware configurations enable researchers to explore nuanced robotic learning methodologies. Humanoid robot training (AgiBot)Accessibility and licensingThe dataset is strategically hosted on GitHub and Hugging Face, ensuring broad accessibility for researchers and developers. However, the Creative Commons CC BY-NC-SA 4.0 license restricts usage to academic and research purposes, preventing commercial applications. Humanoid robot training (AgiBot)Future development roadmapAgiBot has outlined an ambitious future development strategy. Planned releases include AgiBot World Beta, expected in early 2025, which aims to expand the dataset to approximately one million high-quality robotic trajectories. The company also anticipates launching the AgiBot World Colosseum platform and a potential global robotics challenge. Humanoid robot training (AgiBot)Potential industry impactThe release of AgiBot World Alpha could fundamentally transform robotics research and development. By providing authentic, diverse training data, the dataset enables more sophisticated approaches to:Contact-rich manipulation techniquesAdvanced long-horizon planning strategiesComplex multi-robot collaborative interactionsGET FOX BUSINESS ON THE GO BY CLICKING HERE Humanoid robot training (AgiBot)Technological and philosophical implicationsGenerative AI has dramatically accelerated robotics development, allowing more intelligent software capable of understanding contextual scenarios. AgiBot's dataset represents a critical step in creating more adaptable, intelligent robotic systems that can process and respond to diverse environmental challenges. Humanoid robot training in factory setting (AgiBot)Kurt's key takeawaysBy providing a comprehensive, open-source dataset that spans multiple industries and scenarios, AgiBot has made advanced robotic learning very accessible. This means that instead of expensive, exclusive research being limited to a few well-funded labs, now more people can contribute to and learn from cutting-edge robotic data. As we look to the future, this dataset stands as a collaborative innovation, promising to bridge the gap between theoretical robotics and practical, context-aware artificial intelligence.CLICK HERE TO GET THE FOX NEWS APPDo you trust a Chinese AI robotics company with open access to advanced robotic learning data? Let us know what you think by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·59 Views
  • What to do if you think your PC has a virus
    www.foxnews.com
    Published January 16, 2025 10:00am EST close 'CyberGuy': Preventing this insidious email forwarding scam that will drain your bank account Tech expert Kurt Knutsson says business email compromise scams are a serious threat. If you suspect your PC has a virus, it's important to act quickly to remove it and protect your data.Keep reading to discover the key warning signs and the steps you can take to address the issue. Illustration of a virus on a PC (Kurt "CyberGuy" Knutsson)Signs your PC has a virusThere are several red flags that could signal your computer may have a virus. One of the most common is if your computer starts running unusually slow.Another warning sign is the appearance of unfamiliar apps or programs that you dont remember installing. Additionally, if your usual programs start crashing frequently or behaving oddly, its a cause for concern.Finally, an overheating computer is a good reason to start investigating further. A man frustrated at getting a virus on his PC (Kurt "CyberGuy" Knutsson)Steps to remove a virus from your PCRealizing you have a virus can be scary, but theres no need to panic. Heres what to do next.1. Disconnect from the internet:This helps prevent the virus from spreading or communicating with its server.2. Enter safe mode:Restart your PC and pressF8 (orShift + F8) before Windows starts to load.SelectSafe Mode with Networking. This mode loads only the essential drivers and services.3. Run a virus scan:Usestrong antivirus software to run a full system scan.Install antivirus software as early as possible to safeguard against malicious links, phishing emails, ransomware and malware that can compromise your private information.The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?4. Delete or quarantine infected files:Follow the instructions provided by your antivirus software to delete or quarantine any detected threats.5. Clear temporary files:Use the Disk Cleanup tool to delete temporary files that might harbor the virus.PressWindows + R, typecleanmgr and pressEnter. Select the drive you want to clean and follow the prompts.6. Reset browser settings:Reset your web browser to its default settings to remove any malicious extensions or settings changes.In Chrome, go toSettings >Advanced >Reset and clean up >Restore settings to their original defaults.In Firefox, go toHelp >Troubleshooting Information >Refresh Firefox.InEdge: Go toSettings > Reset settings > Restore settings to their default values.7. Check Startup ProgramsViruses often embed themselves in startup programs.Press Ctrl + Shift + Esc to open the Task Manager.Navigate to the Startup tab and disable any unfamiliar or suspicious programs.8. Update your software:Ensure your operating system, antivirus software and all other programs areup to date to protect against future threats. Updates often include security patches to protect against known vulnerabilities.9. Backup your data:Regularlyback up your important files to an external drive or cloud storage to prevent data loss in case of future infections.Tips to avoid future virusesHeres how to be proactive about protecting your PC from viruses down the road.Use safe browsing practices: Avoid clicking on suspicious links or downloading files from untrusted sources.Enable firewall: Make sure your firewall is enabled to block unauthorized access to your computer.Download apps and software from trusted sites only: Check the number of downloads, as more suggests greater reliability.Use a secure VPN connection: Mask your IP address with a trusted VPN (virtual private network) service to secure your online activity. Many sites can read your IP address and, depending on their privacy settings, may display the city from which you are corresponding. A VPN will disguise your IP address to show an alternate location. Illustration of protecting your technology (Kurt "CyberGuy" Knutsson)Kurts key takeawaysBy following these steps, you can effectively remove a virus from your PC and protect your data. Staying vigilant and practicing good cybersecurity habits will help safeguard your system from future threats.What other PC issues would you like help with? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·60 Views
  • Soft robotic armband gives prosthetic hand users natural control
    www.foxnews.com
    Tech Soft robotic armband gives prosthetic hand users natural control How haptic feedback technology is revolutionizing prosthetic hand functionality Published January 16, 2025 6:00am EST close New prosthetic hands can multitask like real ones Study participants successfully grasped and transported two objects at once without dropping them. Prosthetic hands have long struggled to replicate the dexterity and functionality of natural hands, often limiting users to a single grasp function at a time.This limitation has made everyday tasks, such as typing on a keyboard or braiding hair, challenging for those who rely on prosthetics.However, a groundbreaking study from Florida Atlantic University (FAU) offers promising advancements that could transform the experience of prosthetic hand users. Man sporting wearable soft robotic armband (Florida Atlantic University)New technology enables users to grasp two objects at onceResearchers at FAU's College of Engineering and Computer Science, in collaboration with the Charles E. Schmidt College of Science, conducted an innovative study that combined haptic feedback, electromyogram control and a wearable soft robotic armband. This study aimed to investigate whether users could control grip forces applied to two different objects simultaneously with a dexterous artificial hand.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The study's findings, published in Scientific Reports, demonstrated that multiple channels of haptic feedback allowed participants to successfully grasp and transport two objects at once without dropping them, even when visual feedback was obstructed.For example, participants managed to pinch a card between their fingers while simultaneously unscrewing a water bottle lid or toggling a light switch with their little finger. Prosthetic robot hand (Florida Atlantic University)Multichannel soft robotic armbandA key innovation in this research was the development of a multichannel soft robotic armband designed to convey artificial sensations of touch. This armband included soft actuators that provided proportional contact force feedback and vibrotactile stimulators that alerted users if they were about to drop or break an object. The armband's design allowed it to deliver haptic feedback at three critical points corresponding to the thumb, index and little fingers, effectively enhancing the user's ability to control multiple objects simultaneously.GET FOX BUSINESS ON THE GO BY CLICKING HEREParticipants in the study reported that haptic feedback was significantly more important than visual feedback, especially since visual cues often failed to indicate when an object was about to be lost. This insight underscores the necessity of integrating tactile sensations into prosthetic technology. Prosthetic robot hand (Florida Atlantic University)Implications for future prosthetic designThe implications of this study extend beyond immediate user benefits; they suggest a paradigm shift in how prosthetic hands could be controlled in the future. By enabling refined dexterous control through enhanced sensory feedback, this research opens new pathways for individuals with upper limb loss to engage in complex tasks traditionally deemed impossible with current prosthetics. This includes activities such as playing musical instruments or performing intricate surgical procedures.In addition, the researchers noted that participants with limb loss performed as well as able-bodied subjects in key performance metrics during the tasks. This finding is particularly encouraging for clinical applications and indicates that advancements in technology can bridge gaps in functionality for users. Prosthetic robot hand (Florida Atlantic University)COULD THESE EXOSKELETON 'POWERED PANTS' MAKE OUTDOOR ACTIVITIES EASIER IN THE FUTURE?Kurts key takeawaysAs researchers continue to refine these prosthetic technology systems, we may soon see prosthetic hands that not only replicate but exceed the capabilities of natural hands, empowering users to reclaim their independence and engage fully in both everyday activities and specialized tasks. This innovative approach not only addresses existing limitations but also paves the way for future developments in assistive technologies for individuals with disabilities.What personal experiences or stories do you have related to the use of prosthetics or assistive devices? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·75 Views
  • Powerful Webb Telescope captures photos of one of the earliest supernova ever seen
    www.foxnews.com
    By Greg Wehner Fox News Published January 15, 2025 9:47pm EST close James Webb Telescope captures timelapse of the supernova remnant Cassiopeia A This timelapse video using data from NASAs James Webb Space Telescope highlights the evolution of one light echo in the vicinity of the supernova remnant Cassiopeia A. NASA's James Webb Space Telescope (JWST) has captured photos of one of the earliest supernovas ever seen, with features appearing like grains and knots found in a cut of wood."Once upon a time, the core of a massive star collapsed, creating a shockwave that blasted outward, ripping the star apart as it went," NASA said on its website. "When the shockwave reached the stars surface, it punched through, generating a brief, intense pulse of X-rays and ultraviolet light that traveled outward into the surrounding space."Now, nearly 350 years later, scientists are getting a view of the aftermath as the pulse of light reaches interstellar material and causes it to glow.The infrared glow created was captured by JWST, revealing details that look like knots and whorls found in wood grain.POWERFUL WEBB TELESCOPE CAPTURES MOST DISTANT KNOWN GALAXY, SCIENTISTS SAY This background image of the region around supernova remnant Cassiopeia A was released by NASAs Spitzer Space Telescope in 2008. By taking multiple images of this region over three years with Spitzer, researchers were able to examine a number of light echoes. Now, NASAs James Webb Space Telescope has imaged some of these light echoes in much greater detail. Insets at lower right show one epoch of Webb observations, while the inset at left shows a Webb image of the central supernova remnant released in 2023. (Spitzer Image: NASA/JPL-Caltech/Y. Kim (Univ. of Arizona/Univ. of Chicago). Cassiopeia A Inset: NASA, ESA, CSA, STScI, Danny Milisavljevic (Purdue University), Ilse De Looze (UGent), Tea Temim (Princeton University). Light Echoes Inset: NASA, ESA, CSA, STScI, J. Jencson (Caltech/IPAC).)"Even as a star dies, its light enduresechoing across the cosmos. Its been an extraordinary three years since we launched NASAs James Webb Space Telescope.Every image, every discovery, shows a portrait not only of the majesty of the universe but the power of the NASA team and the promise of international partnerships. This groundbreaking mission, NASAs largest international space science collaboration, is a true testament to NASAs ingenuity, teamwork, and pursuit of excellence," NASA Administrator Bill Nelson said. "What a privilege it has been to oversee this monumental effort, shaped by the tireless dedication of thousands of scientists and engineers around the globe. This latest image beautifully captures the lasting legacy of Webba keyhole into the past and a mission that will inspire generations to come."While beautiful in nature, the observations also give astronomers the ability to map the 3-dimensional structure of the interstellar dust and gas for the first time."We were pretty shocked to see this level of detail," Jacob Jencson of Caltech/IPAC in Pasadena, the principal investigator of the science program, said.Josh Peek of the Space Telescope Science Institute in Baltimore is also a member of the team and said they see layers like those of an onion. These shimmering cosmic curtains show interstellar gas and dust that has been heated by the flashbulb explosion of a long-ago supernova. (NASA, ESA, CSA, STScI, J. Jencson (Caltech/IPAC))"We think every dense, dusty region that we see, and most of the ones we dont see, look like this on the inside," he said. "We just have never been able to look inside them before."The images produced from the JWST near-infrared camera (NIRCam) highlight a phenomenon called light echo, NASA said, which is created when a star explodes or erupts before flashing light into surrounding masses of dust and causing them to shine.The visible light echoes are caused when the light reflects off interstellar material, where those at infrared wavelengths are caused when the dust is warmed by energetic radiation, causing it to glow.Scientists targeted a light echo previously observed by NASAs retired Spitzer Space Telescope, and it is one of dozens found near remains of the Cassiopeia A supernova. FILE - In this April 13, 2017 photo provided by NASA, technicians lift the mirror of the James Webb Space Telescope using a crane at the Goddard Space Flight Center in Greenbelt, Md. (Laura Betz/NASA via AP, File)The Webb images show tightly packed sheets, with filaments displaying structures on what NASA called "remarkably small scales," of about 400 astronomical units, or less than one-hundredth of a light year. One astronomical unit is the average distance between the Earth and the Sun, and Neptune's orbit is 60 astronomical units in diameter."We did not know that the interstellar medium had structures on that small of a scale, let alone that it was sheet-like," Peek said.The discovery was compared by scientists to a medical CT scan."We have three slices taken at three different times, which will allow us to study the true 3D structure. It will completely change the way we study the interstellar medium," Armin Rest of the Space Telescope Science Institute, and member of the team, said.The team's findings will be presented this week at the 245th American Astronomical Society meeting in Washington, D.C.The Webb Telescope, the successor to the Hubble and the largest telescope ever launched into space, is a joint project of NASA and the European Space Agency. Greg Wehner is a breaking news reporter for Fox News Digital.Story tips and ideas can be sent to Greg.Wehner@Fox.com and on Twitter @GregWehner. Related Topics
    0 Comments ·0 Shares ·96 Views
  • Fox News AI Newsletter: AI health tech will transform your fitness routine
    www.foxnews.com
    Artificial Intelligence Newsletter Fox News AI Newsletter: AI health tech will transform your fitness routine Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents By Fox News Staff Fox News Published January 15, 2025 12:40pm EST close US company using 'secret weapon' for its artificial intelligence Fox News chief national security correspondent Jennifer Griffin reports on what the United States and Israel are doing to stay ahead of adversaries in A.I. on 'Special Report.' Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAYS NEWSLETTER:- Best cutting-edge health and fitness tech from CES 2025- Nvidia pushes back on Biden admin's 'misguided' AI order- Biden White House announces 'final rule' on AI chip exports before Trump hand-off, drawing industry blowback ISleePad (ITRI)FUTURE HEALTH TECH: CES 2025 has once again showcased a remarkable array of health and fitness technology that promises to transform our well-being.'UNPRECEDENTED AND MISGUIDED': Tech giant Nvidia is pushing back on a new executive order by the Biden administration that seeks to preventartificial intelligence technologies developed in the U.S. from falling into the hands of adversarial countries.'CHIP' ON THEIR SHOULDER: The Biden White House on Monday announced its "final rule" placing export controls on artificial intelligence chips before President-elect Donald Trump takes office next week, drawing swift condemnation from industry leaders who argue the Democratic administration is effectively undermining America's leadership in the emerging technology. FILE - Amazon Web Services data center is seen on Thursday, Aug. 22, 2024, in Boardman, Ore. (AP Photo/Jenny Kane, File)'LEAD THE WORLD': President Biden on Tuesday signed an ambitious executive order that he says will keep both national security and climate change in mind while fast-tracking the build-out of large-scale artificial intelligence infrastructure in the United States.HOTTEST TICKET IN TOWN: A select group of tech industry titans and venture capitalists will gather in Washington, D.C., this week to welcome the incoming Trump administration and celebrate new opportunities for global innovation in artificial intelligence and entrepreneurship.CUTTING-EDGE HUMANOID TECH: Chinese startup Pudu Robotics has unveiled its latest creation, the D9 humanoid robot, designed to revolutionize the way we work and interact with machines. D9 humanoid robot (Pudu Robotics)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff. Related Topics
    0 Comments ·0 Shares ·94 Views
  • Mac malware mayhem as 100 million Apple users at risk of having personal data stolen
    www.foxnews.com
    Published January 15, 2025 10:00am EST close 'CyberGuy': Illegal movie downloads could be hiding dangerous new malware Researchers found Peaklight malware targeting illegal movie downloaders. Tech expert Kurt Knutsson provides tips to protect yourself from malware. Apples Macs are generally considered more secure than Windows PCs, but they are not immune to hackers. Numerous incidents demonstrate that Macs are not impenetrable, and a new one has recently been added to the list. Security researchers have discovered a new variant of stealer malware that targets browser credentials, cryptocurrency wallets and other personal data. Ireported on this malware in 2024 as well. Previously, it relied on macOS browser extensions to steal data. Now, it uses phishing websites and fake GitHub repositories to target Macs, which have a user base of 100 million people.Enter the giveaway by signing up for myfree newsletter. A person working on their Apple laptop (Kurt "CyberGuy" Knutsson)The evolution of info-stealer Mac malwareCybersecurity companyCheck Point has discovered a new variant of info-stealer malware, BanShee. Elastic Security Labs first highlighted this malware in mid-2024, noting that it operates as malware-as-a-service, a business model in which cybercriminals provide access to malicious software and related infrastructure for a fee. At that time, it was available for as much as $3,000 per month.Check Point says this malware evolved in September after being exposed. This time, its developers had "stolen" a string encryption algorithm from Apples own XProtect antivirus engine, which replaced the plain text strings used in the original version. Since antivirus programs expect to see this kind of encryption from Apples legitimate security tools, they werent flagged as suspicious, allowing the BanShee to remain undetected and quietly steal data from targeted devices. A woman working on her Apple desktop and Apple laptop (Kurt "CyberGuy" Knutsson)How the Mac malware operatesBanShee Stealer is a prime example of how advanced malware has become. Once its on a system, it gets straight to work stealing all kinds of sensitive information. It goes after data from browsers like Chrome, Brave, Edge and Vivaldi, as well as cryptocurrency wallet extensions. It even takes advantage of two-factor authentication (2FA) extensions to grab credentials. On top of that, it collects details about the devices software and hardware, as well as the external IP address.The Mac malware also tricks users with fake pop-ups that look like real system prompts, tricking victims into entering their macOS passwords. Once it has gathered the stolen information, BanShee exfiltrates it to command-and-control servers, using encrypted and encoded files to ensure the data remains secure.The malwares creators used GitHub repositories to spread BanShee. They set up fake repositories that looked like they hosted popular software, complete with stars and reviews, to seem trustworthy. These campaigns didnt just target macOS users with BanShee. They also hit Windows users with a differentmalware called Lumma Stealer. Over three waves, the attackers used these fake repositories to trick people into downloading their malicious files. A woman working on her laptop (Kurt "CyberGuy" Knutsson)5 tips to protect yourself from Mac malwareFollow these essential tips to safeguard your Mac from the latest malware threats, including the notorious BanShee Stealer.1) Have strong antivirus software:The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.2)Be cautious with downloads and links: Only download software from reputable sources such as the Mac App Store or official websites of trusted developers. Be wary of unsolicited emails or messages prompting you to download or install updates, especially if they contain links. Phishing attempts often disguise themselves as legitimate update notifications or urgent messages.3)Keep your software updated: Ensure that both macOS and all installed applications are up to date. Apple frequently releases security patches and updates that address vulnerabilities. Enable automatic updates for macOS and your apps to stay protected without having to manually check for updates. If you need more help, see myguide on keeping all your devices updated.4)Use strong and unique passwords:To protect your Mac from malware, its also crucial to use strong, unique passwords for all your accounts and devices. Avoid reusing passwords across different sites or services. Apassword manager can be incredibly helpful here; it generates and stores complex passwords for you, making them difficult for hackers to crack.It also keeps track of all your passwords in one place and automatically fills them in when you log into accounts, so you dont have to remember them yourself. By reducing the number of passwords you need to recall, youre less likely to reuse them, which lowers the risk of security breaches. Get more details about mybest expert-reviewed password managers of 2025 here.5)Use two-factor authentication (2FA): Enable2FA for your important accounts, including your Apple ID, email and any financial services. This adds an extra step to the login process, making it harder for attackers to gain access even if they have your password.Kurts key takeawayNo device is immune to cyberattacks when a human operator is involved. Take the BanShee Stealer, for example. It managed to target Macs not due to weak cybersecurity measures by Apple but because it successfully tricked users into installing it and granting the required permissions. Most breaches, hacks and other cyberattacks stem from human error. This highlights the importance of maintaining basic cybersecurity hygiene. It's crucial to know what youre downloading, ensure its from a trusted source and carefully review the permissions you grant to any online service or application.When downloading new software, how do you determine if its safe to install? Do you rely on app store ratings, reviews or something else? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·96 Views
  • Get ready to experience thrill of eVTOL racing
    www.foxnews.com
    Tech Get ready to experience thrill of eVTOL racing Discover future of aerial sports with electric vertical takeoff and landing races Published January 15, 2025 6:00am EST close 'CyberGuy': Get ready to experience the thrill of eVTOL racing The Jetson One eVTOL showcases air racing potential, ushering in a new aviation era. Tech expert Kurt Knutsson says the race for eVTOL supremacy is just beginning. You might have heard about electric vertical takeoff and landing aircraft (eVTOL). Well, there's some exciting news coming from Jetson, a Swedish startup thats making waves in the air racing scene. While Australia's Airspeeder has been working on crewed eVTOL races, Jetson founder and CTO Tomasz Patan recently took the spotlight with a demonstration that many are calling the start of the world's first eVTOL air racing.Enter the giveaway by signing up for myfree newsletter. Jetson eVTOL air racing demonstration (Jetson) (Kurt "CyberGuy" Knutsson)Airspeeder's ambitionsAirspeeder has been building momentum since 2017, aiming to establish world championship races with their striking eVTOL aircraft. However, their current races involve remote-controlled vehicles, with pilots safely on the ground. Enter Jetson, who has now demonstrated a crewed flight around a racing pylon, albeit with just one aircraft. Jetson eVTOL air racing demonstration (Jetson) (Kurt "CyberGuy" Knutsson)The Jetson One: A game changerThe star of this show is the Jetson One, a personal eVTOL designed for agility and performance. In a recent video, Patan showcases the aircraft's nimble capabilities by navigating around a 26-foot-tall pylon. While this demonstration does not quite constitute a full race, it offers a tantalizing preview of what eVTOL racing could look like. Here are some key features of the Jetson One:Dimensions: 8.86 x 5.25 x 3.67 feetTop speed: Software-limited to 63 mphFlight time: 20 minutes per chargePower source: High-discharge Li-ion batteriesControl: Joystick-operatedMaximum altitude: Over 1,500 feet (~460 m)Pilot requirements: No license needed in the U.S. Jetson eVTOL air racing demonstration (Jetson) (Kurt "CyberGuy" Knutsson)Market response and future plansThe market response to the Jetson One has been remarkable. The company has already confirmed sales of more than 470 units and is now taking orders for the 2026 batch. To secure your place in line, you'll need to make a non-refundable deposit of $8,000, with the full price tag coming in at $128,000.Jetson claims that their eVTOL is user-friendly, stating that pilots can master the aircraft in under 60 minutes of flight practice, along with eight simulator sessions. This accessibility could be a game-changer in the personal aviation market. Jetson eVTOL air racing demonstration (Jetson) (Kurt "CyberGuy" Knutsson)Safety and regulatory considerationsWhile the prospect of personal eVTOLs and air racing is thrilling, it also raises important safety and regulatory questions. Jetson has implemented several safety features, including:A race car-inspired safety cell designThe ability to fly safely with the loss of one motorHands-free hover and emergency functionsA ballistic parachute with rapid deploymentIn terms of regulations, Jetson has made progress, securing two flight permits in Italy for personal eVTOL travel in uncontrolled airspace in fall 2023. However, comprehensive racing regulations are yet to be defined. Jetson eVTOL air racing demonstration (Jetson) (Kurt "CyberGuy" Knutsson)The competition: Airspeeder and beyondWhile Jetson has made headlines with this demonstration, it's worth noting that Airspeeder isn't far behind. They have already created teams and held aerial events, albeit with remote-controlled eVTOLs. Their aircraft boasts impressive specifications, including a top speed of 124 mph and a power-to-weight ratio comparable to Formula 1 cars. Jetson eVTOL air racing demonstration (Jetson) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysThe demonstration by Jetson marks a significant milestone in the evolution of personal aviation and air racing. While it does not yet represent a full-fledged race, it is a tangible step towards a future where eVTOL racing could become a reality. As we look to the skies, it is clear that the race for eVTOL supremacy is just beginning.What are your thoughts on the future of eVTOL racing and personal aviation after reading about Jetson and Airspeeder? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·49 Views
  • Hackers claim massive breach of company that tracks and sells Americans' location data
    www.foxnews.com
    When we talk about data privacy, tech giants like Google and Facebook are often blamed for using personal data to show ads and recommendations. Less discussed are the businesses whose entire business model revolves around collecting your data and selling it to other companies and governments. These companies often operate in legal gray areas, with the consent required to collect user data buried deep in the fine print.Whats even more concerning is that these data brokers fail to adequately protect the data they collect. Last year, National Public Data made headlines forfailing to secure 2.7 billion records of individuals whose data it had harvested. Now, hackers have reportedly stolen data from Gravy Analytics, the parent company of Venntel, which has sold vast amounts of smartphone location data to the U.S. government.Enter the giveaway by signing up for myfree newsletter. A woman working on her laptop (Kurt "CyberGuy" Knutsson)What you need to know about the breachHackers claim to have breached Gravy Analytics, a major location data broker and parent company of Venntel, a firm known for selling smartphone location data to U.S. government agencies. The compromise is massive, including sensitive location data that tracks precise smartphone movements, customer information and even internal infrastructure, according to a404 Media report.The hackers are threatening to make the stolen data public. The files contain precise latitude and longitude coordinates of the phone and the time at which the phone was there. Some even indicate what country the data has been collected from.Hackers have claimed access to Gravy's systems since 2018. If true, this represents a serious security lapse on the companys part. It is baffling how companies that collect and sell user data (a practice that arguably shouldnt be allowed in the first place) failed to protect it from being leaked.404 Media also suggests that the hackers gained deep access to the companys infrastructure, including Amazon S3 buckets and server root access. The exposed customer list reportedly includes major companies like Uber, Apple and Equifax as well as government contractors like Babel Street. A hacker (Kurt "CyberGuy" Knutsson)What this breach means for peopleThis data breach highlights the serious security flaws in the location data industry. Companies like Gravy Analytics and Venntel have been profiting from collecting and selling sensitive location data, often without proper user consent. They've prioritized profit over security, and now the privacy of millions is at risk. This data could end up on black markets, endangering individuals, especially those in vulnerable situations, by making them targets for harassment or worse.The FTC's recent crackdown on Gravy, announced in December, underscores their negligence. The proposed order will prohibit these companies from selling or using location data, except in specific cases like national security or law enforcement. The implications are worrying. Sensitive locations like schools and workplaces could become easy targets for those with malicious intent. A person using their cellphone and working on their laptop (Kurt "CyberGuy" Knutsson)5 ways to stay safe in the age of data breachesThe Gravy Analytics breach serves as a sobering reminder of the vulnerabilities in the digital age. While its impossible to control how every company handles data, you can take steps to minimize your exposure and protect your privacy. Here are five actionable tips to stay safe.1) Limit app permissions: Many apps request access to location data, contacts and more, even when it's not necessary for their functionality. Regularly review the permissions for apps on your smartphone and revoke access to anything that feels excessive. For instance, a weather app doesnt need access to your microphone or camera.2) Use a VPN:Virtual private networks (VPNs) can mask your IP address and encrypt your internet activity, making it harder for data brokers and hackers to track your online behavior. A good VPN adds an extra layer of security, especially when using public Wi-Fi networks.3) Opt out of data sharing where possible:Some companies allow you to opt out of having your data collected or shared. Services like Your Ad Choices and privacy settings within platforms like Google can help you reduce the amount of data collected. Check for opt-out options with any apps or services you use frequently.4)Avoid free apps that monetize data: Free apps often generate revenue by selling user data. Instead, consider paid versions of apps that explicitly prioritize privacy. Research the company behind the app to understand its data handling policies before downloading.5) Invest in data removal services:Data removal services can help you regain some control over your personal information by identifying and removing it from people-search websites, data broker platforms and other online databases.Check out my top picks for data removal services here.Kurts key takeawayCompanies that collect and sell user data pose a significant threat to privacy, and when they fail to protect this data, it often ends up in the hands of even worse actors. Cybercriminals, and even some governments, can exploit this information to target individuals. It is crucial to implement stringent repercussions for these companies when they fail in their duty to safeguard user data. A mere slap on the wrist is not enough. We need real accountability to deter negligence and protect individual privacy rights.Should companies face stronger penalties for failing to protect personal data? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·54 Views
  • First 15 things to do or try first when you get a new iPhone
    www.foxnews.com
    Published January 14, 2025 10:00am EST close How to factory reset your iPhone A factory reset ensures all your personal data is wiped clean. Apple announces new iPhones every year, and I often wonder if that's truly necessary. A launch every two years seems more reasonable, especially since the new iPhones are often only marginally better than the ones released the year before. This has been the case since the iPhone 12.However, in 2024, Apple introduced a range of interesting features with theiPhone 16. While these features dont necessarily justify an upgrade if you already own the iPhone 15 or even the iPhone 14, they make theiPhone 16 a worthy purchase if youre using an older model or an Android phone.If you've already made the purchase, or if you've bought another iPhone, here are the first things you should do and try when you fire up your new phone.(First things to do if you got a new Android)Enter the giveaway by signing up for myfree newsletter. iPhone packaging (Kurt "CyberGuy" Knutsson)1) How to update your software to iOS 18.2 or laterFirst things first, let's update your software to iOS 18.2 or later:OpenSettingsTapGeneralSelectSoftware UpdateTap Update NowEnter your passcode and agree to termsWait for theinstallation to complete Steps to update your iPhones software (Kurt "CyberGuy" Knutsson)2) How to add a passcode or biometric authenticationTo add a passcode or biometric authentication to your new iPhone after updating to iOS 18.2 or later, follow these steps:Setting up a passcodeOpenSettings on your iPhoneTap on Face ID & Passcode (for iPhone X and later) orTouch ID & Passcode (for earlier models)TapTurn Passcode OnEnter asix-digit passcode. If you prefer, tapPasscode Options to choose a four-digit numeric code, a custom numeric code or a custom alphanumeric code.Re-enter yourpasscode to confirm it and activate itSetting up biometric authenticationFor Face ID:Go toSettingsTap on Face ID & PasscodeEnter yourpasscode, if promptedTap on Set Up Face IDHold your device in portrait orientation and position your face in front of the device, then tap Get Started.Follow theon-screen instructions to complete the setup Face ID & Passcode on iPhone (Kurt "CyberGuy" Knutsson)3) Setting up Apple ID and iCloudCreate or sign in to Apple ID:Open theSettings appTap onSign in to your iPhone at the topIf you dont have an Apple ID, selectDont have an Apple ID or forgot it? and follow the prompts to create one.If you have an Apple ID, enter yourcredentials and sign in.Enable iCloud:After signing in, go back to SettingsTap on yournameat the top, then select iCloudChoose which services you want to enable (e.g., Photos, Contacts, Calendars)Tap iCloud Backup andtoggle it on to automatically back up your data. Create a Free Apple Account on iPhone (Kurt "CyberGuy" Knutsson)4) Personalizing settings on iPhoneCustomize Display:OpenSettingsThen go toDisplay & BrightnessTapLightor Dark for the background you'd likeYou can tap onText Size to adjust text sizeThen use theslider to adjust the brightness you prefer. How to personalize your iPhones display and brightness (Kurt "CyberGuy" Knutsson)Customize sound preferences:Tap onSounds & HapticsAdjust the sliderwhere it says Ringtone and alerts to customize from quieter to louder.Scroll down and tap the following to adjust the sounds for each:Ringtone, Text Tone, New Voicemail, New Mail, Sent Mail, Calendar Alerts and Reminder Alerts. Steps to change your iPhones sounds and haptics (Kurt "CyberGuy" Knutsson)5) Configuring privacy settingsManage Privacy Settings:Go toSettingsScroll down and click appsSelect the app you want to review the privacy settings forAdjust thepermissions as needed for location services, camera, microphone, allow tracking and other settings. Adjust as necessary for individual apps.6) Pick your own lock screen shortcutsBy default in iOS 18, you get flashlight and camera shortcuts on the lock screen, but now you can finally customize them.Long-press on the Lock ScreenTapCustomizeThen choose Lock ScreenYou can tap on theexisting shortcuts to change them to your preferred apps or features by selecting thedesired app or feature from the list that appears.If you prefer, you can remove them entirely to keep your lock screen clean and simple by tapping the deleteorremove option next to the shortcut. Steps to customize your iPhones lock screen (Kurt "CyberGuy" Knutsson)7) Setting up Family SharingHere's how to enable Family Sharing on your iPhone:Open yourSettings appTapyour nameGo toFamily SharingSet Up Your FamilyPressContinueSelectfamily members that you want to inviteTo create an account for a child, selectCreate Child Account at the bottom and provide their name and birthday.8) Download some useful appsThere are millions of apps available, such asApple Maps,Google Maps andeven apps to plan a party in the App Store. To download useful apps on your new iPhone, follow these straightforward steps:Locate theApp Store icon on your home screen and tap to open it.You can explore various categories by tapping onApps at the bottom of the screen or using theSearch tab to find specific apps.Once you find an app you want, tap on it to view more details, including descriptions, ratings and screenshots.Tap theGet button (or the price if it's a paid app) next to the app you wish to download.If prompted,authenticate your download using Face ID, Touch ID or your Apple ID password.The app will begindownloading and installing automatically. You can monitor its progress on your home screen.Once installed, the app willappear on your home screen.Tap its icon to open and start using it.You can press and hold any app icon until they start wiggling, allowing you to drag them into folders or rearrange their positions. Image of the App Store icon on iPhone (Kurt "CyberGuy" Knutsson)9) Activate spam filters for text messagesHaving a strong spam filter on your iPhone is beneficial to protect yourself from unwanted text messages and scams.But beware that this may also filter out some legitimate messages from people who are not in your contacts list.OpenSettingsScroll down and tap onAppsThen, scroll down and tap onMessagesToggle onFilter Unknown Senders to filter text messages from unknown contacts into a separate list Steps to activate filters for text messages (Kurt "CyberGuy" Knutsson)10) Use visual intelligenceOn all iPhone 16 models, you can use Camera Control with visual intelligence to quickly learn more about the stuff around you. Just press and hold the Camera Control, which is a new button on the right side of the device, and you can do things like look up info about a restaurant or business, translate text, get a summary, have it read out loud and more.You can even use it to find details about a business, like its hours, services and contact info. Depending on the place, you might also be able to check reviews, make a reservation or order for delivery.To use this feature, point your iPhone camera at the business in front of you, then press and hold the Camera Control. Next, either tap the Camera Control again or select the business name at the top of the screen. Depending on the business, you can:View the hours of operation by tappingSchedulePlace a delivery order by tappingOrderBrowse the menu or available services by tappingMenuMake a reservation by tappingReserveTo call the business, visit its website or access other options, tap theMore button. iPhone using visual intelligence (Kurt "CyberGuy" Knutsson)11) Log how youre feelingApple made several changes to the iPhones with its iOS 18 update, including updates to the Journal app. You dont need the latest iPhone 16 to try the apps mindfulness option for journal entries; any iPhone with iOS 18 will do. When you open the Journal app, tap the icon that looks like a tiny tree, and youll be able to log your mood for each day and see how it changes over time. Journal app on iPhone (Kurt "CyberGuy" Knutsson)12) Give Action Button a tryTheAction Button is part of the iOS 17 operating system for the iPhone 15 series and continues into iOS 18 for the iPhone 16 series. This customizable side button lets you choose a specific function to perform when pressed, such as turning on silent mode, focus, camera, flashlight, voice memo, recognize music, translate, magnifier, controls, shortcut and accessibility, depending on your settings. Essentially, it acts as a quick access key for a chosen action. Here are the steps to customize the Action button on supported iPhone models:Go toSettingsTapAction ButtonAn image of the side of the iPhone will appear showing icons representing actions you can assign to the Action button.Swipeleft orright to choose an action. Thename of the action will appear below the dots.If additional options are available for the selected action, abutton will appear below the action.Tap it to see the list of options.For Controls, Shortcut and Accessibility actions, you need to tap the button below the action and select aspecific option. Otherwise, the Action button won't do anything. Action button on iPhone (Kurt "CyberGuy" Knutsson)13) Try out the new Passwords appI always stress the importance of using a password manager to store your passwords. Lets be honest, we all have a ton of apps and services that require an account and password. If you use the same password everywhere, you risk having your important info stolen by cybercriminals. But its also impossible to come up with a unique password for every app and remember them all.Password managers make life easier by storing your passwords and filling them in when you log into apps. But they usually charge a monthly or yearly fee. Thats where Apples Passwords app comes in. It works just like a password manager but without the extra cost. Open the app from the App Library, and itll keep your login details encrypted and synced across all your devices.While Apple's new Passwords app in iOS 18 offers a convenient and cost-free solution for password management, it's important to consider its limitations. These include its exclusivity to the Apple ecosystem, lack of compatibility with Android or Linux devices and limited functionality outside of Safari and Apple apps. For those seeking a more comprehensive password management solution that works across various browsers and apps, check out mybest expert-reviewed password managers of 2025 here.14) Use ChatGPT and writing toolsApple introduced Apple Intelligence for iPhone 15 Pro and newer models running iOS 18.2, bringing a range of AI tools and ChatGPT support. ChatGPT is now built into various parts of iOS, and if you have an iPhone 15 Pro or above, you can take full advantage of this integration.You can use Apple's enhanced Writing Tools to access ChatGPT directly in apps like Notes, Mail and any other text input field. Whether you need help spicing up your notes or generating complex programming scripts, ChatGPT is up for the task. Here's how to get started; youll need to enable ChatGPT integration.Head toSettingsClickApple Intelligence & SiriTap ChatGPT and toggle on next to where it says Use ChatGPT.From there, you can scroll down and Sign In to your own ChatGPT account or even upgrade toChatGPT Plus. ChatGPT and writing tools on iPhone (Kurt "CyberGuy" Knutsson)15) Install strong antivirus protectionAntivirus software can help protect your new iPhone from malware, phishing and other threats. The best way to protect yourself from having your data breached is to install antivirus protection on all your devices. Having strong antivirus software on your devices will alert you of any known malware that is targeting you, warn you against clicking on any known malicious links in phishing emails and ultimately help protect you from being hacked.Get my picks for the best 2025 antivirus protection winners for your iPhone, Mac, Windows and Android devices.Pro tip:Prioritize regular backups to safeguard your dataMaking databackups a regular part of your iPhone maintenance is crucial. This way, you can protect yourself against uncertainties. Whether it's a hardware malfunction or a security breach, having a recent backup will let you recover quickly.Kurts key takeawaysWhen you get your new iPhone, there are several essential steps to take to ensure you're getting the most out of your device. Start by updating to iOS 18.2 or later to access the latest features. Next, security measures like a passcode or biometric authentication should be set up for added protection. Personalize your settings by customizing your display and sound preferences, and dont forget to enable Family Sharing if you want to connect with loved ones. Also, explore the App Store to download useful apps. Additionally, make sure to give the Action Button a test run for quick access to your favorite functions. With these tips, you'll be well on your way to maximizing your new iPhone's capabilities.How do you feel about the annual iPhone releases? Do you think they provide enough value each year? Let us know by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·118 Views
  • Shape-shifting AI Transformer homes will leave you wanting one
    www.foxnews.com
    Tech Shape-shifting AI Transformer homes will leave you wanting one Revolutionizing living spaces with cutting-edge AI and adaptive design Published January 14, 2025 6:00am EST close 'CyberGuy': Shape-shifting AI Transformer homes will leave you wanting one AC Future and Pininfarina unveil AI Transformer homes, merging sustainability and innovation. Kurt Knutsson says this could change the way we think about home. AC Future, a leading developer of AI-enabled sustainable living solutions, has partnered with world-renowned Italian design house Pininfarina to create a groundbreaking collection of transformable living spaces. This innovative collaboration has resulted in three distinct products: AI-THd (AI Transformer Home Drivable), AI-THu (AI Transformer Home Unit) and AI-THt (AI Transformer Home Trailer).Enter the giveaway by signing up for myfree newsletter. AI-THt (AC Future) (Kurt "CyberGuy" Knutsson)AI-THd: The ultimate mobile living spaceThe AI-THd is an intelligent, self-sufficient, drivable version of the AI Transformer Home that provides unprecedented mobility and flexibility. Drivers can expand the vehicle from a compact recreational vehicle into a large mobile living space with remarkable ease. The innovative design allows the cockpit to convert into a mobile office or secondary bedroom, creating a versatile living environment. Advanced AI-enabled smart technologies enhance the overall living experience, supporting a range of lifestyle needs and preferences. AI-THd (AC Future) (Kurt "CyberGuy" Knutsson)AI-THu: The smart home reinventedThe AI-THu represents a stationary AI-enabled sustainable smart home that transforms to offer 400 square feet of intelligent living space. Its flexible main living area can seamlessly shift between a comfortable lounge, productive office or additional bedroom, maximizing functional utility. The design includes a convertible front expansion for additional living space and a private primary bedroom with extendable wardrobe options. Integrated AI smart home technology, solar panels, energy storage systems and a water generator ensure sustainable and efficient living. Priced starting at $98,000, the AI-THu can be installed anywhere on-grid or off-grid while maintaining the comforts of a traditional home. AI-THu (AC Future) (Kurt "CyberGuy" Knutsson)AI-THt: The Transformer Home trailerThe AI-THt is a 24-foot-long transformer home trailer that expands to offer up to 400 square feet of sophisticated internal living space. Utilizing patented expansion living technologies, this trailer provides flexible living spaces that adapt to various lifestyle needs. Smart AI enhancements and an aerodynamic design distinguish the AI-THt from traditional trailer homes. The unique construction eliminates the need for a front driving cabin, resulting in a more premium and spacious interior environment that doubles in size when fully expanded. AI-THt (AC Future) (Kurt "CyberGuy" Knutsson)Innovation meets designAll three AI-TH products exemplify a commitment to cutting-edge engineering, sustainable innovation and refined design. They push the boundaries of conventional standards and elevate the concept of adaptable living. Francisco Barboza, Pininfarina's senior design manager, emphasizes the challenge of maintaining an efficient floor plan while accommodating complex opening systems, resulting in an iconic design that authentically embraces the future. AI-THt (AC Future) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysThe AI-THd, AI-THu and AI-THt are more than just innovative products. They're like a crystal ball showing us how we might live, work and explore the world without compromising our environment. AC Future and Pininfarina aren't just thinking outside the box. They're creating an entirely new box. Or should we say, an expandable, AI-powered, eco-friendly box on wheels? Their partnership is laying the groundwork for a revolution in housing and mobility that could change the way we think about home in the future.What worries, if any, do you have about using AI in our homes? Let us know what you think by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·96 Views
  • 5-minute cleanup for your phone and computer
    www.foxnews.com
    close Kevin OLeary lays out the very complicated battle for TikToks future OLeary Ventures chairman Kevin OLeary discusses his bid to purchase TikTok and shares his perspective on U.S.-Canada relations on Sunday Night in America. Digital junk piles up faster than clutter in real life. There are files you dont need, all those random screenshots, apps you downloaded and used once, and blurry photos clogging up your camera roll.Win a pair of $329 Ray-Ban Meta smart glasses.Enter here, no purchase necessary!It all adds up, slowing your devices down and making everything feel messy. The good news? Cleaning it up is easier than you think. Lets do a quick declutter that will make you say, "Ahhh, that feels better."Step 1: Update your devicesHOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIAThere are too many dangerous bugs out there to skip security patches.On a Windows PC, head to Settings> Windows Update.On a Mac, go to General> Software Update.On an Android, tap Settings> System > Software.On an iPhone, tap Settings> General> Software Update. (iStock)Start with your phoneApps are space hogsScroll through your app list and delete any youre not using anymore. If its been months, youre not going to use it. Trust me. And even if you do want it later, great, download it again.YOUR SSN IS ON THE DARK WEB HERES WHAT TO DO ABOUT ITWhile youre at it, move the apps you want to spend less time using (Instagram for me) off your phones home screen. You can hide the app or just move it to another page or folder.On iPhone:Swipe left to get past all your app screens and open the App Library.To delete, touch and hold an app icon > Delete App > Delete to confirm. (Photo by Sean Gallup/Getty Images)On Android:Open the Google Play Store app, and tap your Profile icon.Tap Manage apps & devices > Manage.Select the name of the app you want to delete, then tap Uninstall.TECH TIP: SAVE YOUR MEMORIES BEFORE ITS TOO LATETheres time for a quick photo cleanupOn iPhone or iPad, the Photos app makes this a breeze.Open your Photos app and select Albums.Scroll down and choose Duplicates. (Last time I checked, I had 2,933 duplicate photos and 49 videos!)Hit Select > Select all, then tap the Trash icon to delete them. You can also select Merge to combine your dupes into one great shot.On an Android, open theFiles by Google app, select Clean, then: (SeongJoon Cho/Bloomberg via Getty Images)Tap Confirm and free up > See junk files and select what you want to clear.When youre ready, tap Clear > Clear. Thats all it takes to remove screenshots, memes, duplicates and other junk mixed in with your important photos.Onto your computerStart with the desktopHeres the quick and dirty way. Create a new folder, then drag all the random files, screenshots and whatever else into it.Pro tip: Sensitive documents have no place on your desktop. If you do insist on saving private docs locally, at least give a snoop a more challenging time by naming the folder something off-base like "Vacation Photos." Be sure your computer automatically locks when youre away and requires a password on startup, too.Quick lock:For Windows, hit the Windows key+ L. On a Mac, use Ctrl + Cmd + Q.Kick out programs you dont need or useThey take up a decent amount of space, so regularly clear out anything youre not using. Beyond that, outdated apps could put you at risk. By keeping old programs on your computer, youre potentially leaving a door wide open for cybercriminals to slip in.On a Windows PC:Click the Start buttonand look for the app or program. Press and hold (or right-click) the app and select Uninstall.On a Mac:Click the Finder iconin the Dock, then Applications.If an app is in a folder, open it to look for an Uninstaller. Double-click it, then follow the onscreen instructions.If an app isnt in a folder or doesnt have an Uninstaller, drag it from the Applications folder to the Trash.Dont forget the outsideWere aiming for quick, so lets tackle those fingerprint-covered screens.On your phone, remove the case and accessories. You want to reach every nook and cranny. For a computer monitor, dust the back top, sides and any ledges that collect dirt before you start cleaning.A microfiber cloth works, but I prefer screen-cleaning wipes. Theyre just so easy. Skip paper towels. Theyre too rough for delicate jobs like this.I always come back to this210-pack of screen cleaning wipes. Use them on smartphones, tablets, monitors, TVs, remote controls and even glasses. Theyre scratch-free and made with anti-static tissue that cleans without leaving behind streaks or lint.Get tech-smarter on your scheduleAward-winning host Kim Komando is your secret weapon for navigating tech.National radio:Airing on 500+ stations across the US -Find yours or get the free podcast.Daily newsletter:Join 600,000 people who read the Current (free!)Watch: OnKims YouTube channelPodcast: "Kim Komando Today" - Listen wherever you get podcastsCopyright 2025, WestStar Multimedia Entertainment. All rights reserved. Related Topics
    0 Comments ·0 Shares ·107 Views
  • 800,000 VW electric vehicle owners' data exposed by software bug
    www.foxnews.com
    Published January 13, 2025 3:00pm EST close Lawsuit accuses automakers of spying on drivers, selling data without consent Fox News' Douglas Kennedy on millions of Americans impacted by surveillance data collection in some cars. German automaker Volkswagen isn't having a great time. The company is planning to cut capacity at five factories, reducing production by about 700,000 vehicles, while also laying off more than 35,000 workers in its home country. Now, reports suggest the company had a massive data leak at its subsidiary software company Cariad, which exposed personal data, including geolocation data, of around 800,000 EV owners online and accessible for months. Such information could be valuable to criminals for extortion purposes. What's interesting is that a hacker association informed the company about this data leak after receiving a tip from an anonymous hacker.Enter the giveaway by signing up for myfree newsletter. Image of VW signage (Kurt "CyberGuy" Knutsson)What you need to know about the data leakAs reported by Germanys Der Spiegel magazine, Volkswagen is facing a major data security issue after movement data from 800,000 electric cars and the personal contact information of their owners were left exposed on the internet. This data revealed sensitive details, such as the precise locations where cars were parked, including private locations like peoples homes, government buildings and even questionable spots like brothels.The exposed data includes detailed movement patterns of these vehicles, allowing for the creation of comprehensive profiles of individuals' daily activities. This could be particularly concerning for public figures or anyone with privacy concerns.Several car brands under the Volkswagen group, including VW, Audi, Seat and Skoda, were affected by the breach, which exposed sensitive data across multiple countries. The information was stored on Amazon cloud servers without adequate protection, leaving it vulnerable for months before the issue was discovered.For around 466,000 of the 800,000 affected vehicles, the location data was detailed enough to map out drivers daily routines. Spiegel reported that the list of affected users included German politicians, business leaders, the entire EV fleet used by Hamburg police and even suspected intelligence agents.The breach came to light when an anonymous hacker tipped off the Chaos Computer Club. While Volkswagen left the data easily accessible during this time, there is no indication so far that anyone misused or accessed it maliciously.We reached out to Volkswagen for comment but did not hear back by our deadline. VW emblem on vehicle (Kurt "CyberGuy" Knutsson)How can this data leak affect you?The Volkswagen data leak is more than just a tech issue. It is a real concern for anyone who values their privacy. With precise location data out in the open, someone could figure out where you live, work or spend your free time. This information could be misused in many ways, from targeted scams where hackers pretend to be Volkswagen or its partners to trick you into giving up sensitive information, to more personal threats like stalking or harassment.Imagine someone knowing your daily routine or identifying places you visit that you would prefer to keep private. Visits to clinics, legal offices or other sensitive locations could expose you to embarrassment or blackmail.The breach also raises concerns for business leaders, government officials and military personnel as their movements linked to high-security or restricted areas could be exposed, increasing the risk of corporate espionage or national security threats. Moreover, when paired with other vulnerabilities, such as app credentials, hackers could potentially exploit the data to unlock or even control vehicles remotely. VW electric SUV (Kurt "CyberGuy" Knutsson)6 ways you can stay safe after this leakIn light of the recent Volkswagen data breach, it is crucial to take proactive measures to safeguard your personal data. Here are 6 ways you can stay safe after this leak:1) Check your app settings:Review the permissions and data-sharing settings in your car's companion app. Disable features that track or share your location if they are not essential for your use. Regularly update the app to ensure you have the latest security patches.2) Be alert to scams:Keep an eye out for suspicious emails, messages or calls pretending to be from Volkswagen or related services. Avoid clicking on links or sharing sensitive information without verifying the sender.3) Consider data opt-out options:Many vehicles with online features allow you to limit or disable certain data-sharing functionalities. Check your cars settings to reduce the amount of personal data being collected.4) Strengthen your online accounts:If you use the same email or password across multiple accounts, update them immediately. Enabletwo-factor authentication wherever possible to add an extra layer of security to your accounts.5) Beware of snail mail scams: While most people focus on digital threats, physical mail scams can also follow a data breach like this. If your contact information was exposed, you might receive fraudulent letters pretending to be from Volkswagen or related services. These could ask for payments, personal details or even encourage you to visit fake websites.6) Install strong antivirus software: Ensure that you have strong antivirus software installed on all your devices, especially those connected to your vehicle or its apps. This can help protect you from malicious links that install malware, potentially accessing your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurts key takeawayThe Volkswagen data leak is a glaring example of how companies need to take user data security more seriously. Exposing personal details and precise locations is not just a technical mistake. It is a massive breach of trust. While VW has patched the issue, the damage shows how important it is for businesses to be more responsible with the data they collect. People deserve to know their information is safe and used only when necessary. If companies cannot protect their customers privacy, they risk losing their confidence altogether. It is time for the industry to step up and do better.Do you think stricter regulations should be in place for companies that handle user data? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·87 Views
  • The future of trucking rolls forward in Shell's experimental big rig
    www.foxnews.com
    Tech The future of trucking rolls forward in Shell's experimental big rig How Shell's Starship 3.0 is revolutionizing commercial trucking Published January 13, 2025 6:00am EST close 'CyberGuy': The future of trucking rolls forward in Shell's experimental big rig Tech expert Kurt Knutsson takes a closer look at Shell's Starship 3.0: A natural gas big rig boosting efficiency 2.5 times, proving greener trucking. The Shell Starship Initiative has been on an interesting journey since its inception in 2018, with a mission to redefine energy efficiency in the commercial trucking sector. Starting with diesel engines, the first two versions of the Starship made impressive strides in fuel efficiency, but now with the introduction of the Starship 3.0, we're witnessing a remarkable shift towards sustainability. This latest iteration features the innovative Cummins X15N natural gas engine, which not only enhances performance but also significantly reduces emissions.Enter the giveaway by signing up for myfree newsletter. Starship 3.0 (Shell) (Kurt "CyberGuy" Knutsson)Evolution of the Starship initiativeThe ShellStarship Initiative began with a clear goal: to set new benchmarks for energy efficiency in commercial trucking. The first two versions of the Starship were powered by diesel engines, achieving notable fuel efficiencies compared to industry standards. However, the introduction of the Cummins X15N natural gas engine in the Starship 3.0 represents a pivotal shift away from diesel, addressing both environmental concerns and operational efficiency.The X15N engine, launched in 2024, is designed specifically for heavy-duty applications and overcomes previous limitations associated with natural gas as a fuel source. It provides similar power outputs to diesel engines but does so with enhanced fuel efficiency and significantly lower emissions. This is particularly important as the trucking industry faces increasing pressure to meet stricter environmental regulations. Starship 3.0 (Shell) (Kurt "CyberGuy" Knutsson)Key features of Starship 3.0The Starship 3.0 is packed with cutting-edge features that set it apart in the world of trucking. From its innovative natural gas power train to its sleek aerodynamic design, every aspect of this vehicle has been meticulously crafted to enhance efficiency and reduce emissions. Lets dive into some of the standout features that make the Starship 3.0 a game-changer for the industry.Natural gas power train: The switch to the Cummins X15N engine allows the Starship 3.0 to operate on various forms of natural gas, including renewable natural gas. This adaptability not only enhances its eco-friendliness but also positions it as a practical option for fleets looking to transition away from traditional fuels.Weight reduction: The new engine is approximately 500 pounds lighter than its diesel counterpart, which increases the potential freight-carrying capacity of the truck. This weight reduction is complemented by other lightweight materials used in the truck's construction, contributing to an impressive ton-miles per gallon efficiency of 183, compared to an industry average of 72.Aerodynamic design: The Starship 3.0 features a sleek design with curved edges and optimized aerodynamics that reduce wind resistance. Additional enhancements like low rolling resistance tires and integrated aerodynamic panels further contribute to its efficiency.Advanced lubricants: Shell has developed specialized lubricants tailored for the higher temperatures generated by natural gas engines. The truck uses Shell Rotella NG Plus SAE 5W-30 synthetic oil, formulated specifically for this purpose, alongside advanced transmission lubricants that improve overall performance.Real-world testing: The input from experienced truck drivers, such as brothers Brian and Eric Rector, has been invaluable in refining the Starship's design and functionality. Their hands-on experience with all three iterations of the truck has provided critical data that informs ongoing improvements. Starship 3.0 (Shell) (Kurt "CyberGuy" Knutsson)Performance metricsThe performance metrics achieved by the Starship 3.0 are impressive. It surpassed its predecessors with a freight ton efficiency that is 2.542 times better on a ton-miles per gallon basis, while also achieving an average fuel consumption of 9 mpg (diesel gallon equivalent) while hauling an industry maximum load of 80,000 pounds. Additionally, the emissions reductions associated with using renewable natural gas further enhance its environmental credentials, making it a viable option for fleets aiming for sustainability. Starship 3.0 (Shell) (Kurt "CyberGuy" Knutsson)Kurts key takeawaysThe Starship 3.0, with its innovative natural gas engine and impressive performance metrics, showcases how technology can transform the industry while addressing environmental concerns. This initiative not only sets new benchmarks for energy efficiency but also offers a practical roadmap for fleets looking to reduce their carbon footprint.Do you believe that transitioning to natural gas and other eco-friendly technologies is the key to addressing environmental challenges, or do you think there are other solutions that should be explored? Let us know what you think by writing us atCyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Ask Kurt a question or let us know what stories you'd like us to cover.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·82 Views
  • PowerSchool data breach exposes millions of student and teacher records
    www.foxnews.com
    Tech PowerSchool data breach exposes millions of student and teacher records PowerSchool serves 60M-plus students and teachers globally Published January 12, 2025 10:00am EST close When a Facebook friend request turns into a hackers trap These scams can catch Facebook veterans and novices off guard. Cybercriminals spare no industry, targeting sectors like health care, insurance, automotive and education. Health care has been a frequent target, with attacks like the Ascension breach last year and the CVR incident in late 2024.Now, education technology giant PowerSchool has become the latest target, with records of millions of students and teachers stolen.While the exact number of affected individuals remains unknown, the scale of the breach is alarming.PowerSchool serves 18,000 customers worldwide, including schools in the U.S. and Canada, managing grading, attendance and personal information for over 60 million K-12 students and teachers. Kids working on their laptops (Kurt "CyberGuy" Knutsson)How did hackers target PowerSchoolPowerSchool revealed a cybersecurity breach to its customers Jan. 7, as reported byBleepingComputer. The company said it discovered the breach Dec. 28, after customer data from its PowerSchool SIS platform was stolen through the PowerSource support portal.PowerSchool SIS is a student information system used for managing grades, attendance, enrollment and other student records. Hackers accessed the PowerSource portal using stolen credentials and used an "export data manager" tool to steal information.The company said this wasnt a ransomware attack or a result of software flaws, but rather a straightforward network break-in. The company has hired a third-party cybersecurity firm to investigate the breach, figure out what happened and determine who was affected. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)What data got stolenThe PowerSource portal includes a feature that allows PowerSchool engineers to access customer systems for support and troubleshooting. The attacker exploited this feature to export the PowerSchool SIS "students" and "teachers" database tables to a CSV file, which was then stolen.PowerSchool confirmed the stolen data primarily includes contact details like names and addresses. However, for some districts, the data may also include sensitive information such as Social Security numbers, personally identifiable information, medical records and grades.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The company said customer support tickets, credentials and forum data were not accessed or stolen during the breach. PowerSchool also emphasized that not all SIS customers were affected and expects only a subset of customers will need to notify those affected."We do not anticipate the data being shared or made public, and we believe it has been deleted without any further replication or dissemination," the developer told customers in a notice."We have also deactivated the compromised credential and restricted all access to the affected portal. Lastly, we have conducted a full password reset and further tightened password and access control for all PowerSource customer support portal accounts."PowerSchool said affected adults will be offered free credit monitoring, while minors will receive subscriptions to an unspecified identity protection service. Illustration of a hacker at work (Kurt "CyberGuy" Knutsson)5 ways you can stay safe from PowerSchool data breachThe PowerSchool data breach has highlighted the importance of staying vigilant about your personal information. Here are five steps you can take to protect yourself:1. Monitor your accounts regularly:Keep a close eye on your bank accounts, credit cards and any online services linked to your personal information. Watch for unauthorized transactions or changes to your accounts that could signal misuse of your data.2. Freeze your credit: If your Social Security number or other sensitive details were compromised, consider placing a credit freeze with major credit bureaus like Equifax, Experian and TransUnion. This prevents potential identity thieves from opening new accounts in your name.3. Use identity theft protection services:Take advantage of any identity protection services offered by PowerSchool as part of its breach response. These services can alert you to suspicious activity and provide support if your identity is stolen.GET FOX BUSINESS ON THE GO BY CLICKING HEREOne of the best parts of some identity protection services is that they have identity theft insurance ofup to $1 million to cover losses and legal fees and a white glove fraud resolution team where aU.S.-based case manager helps you recover any losses.See my tips and best picks on how to protect yourself from identity theft.4. Enable two-factor authentication (2FA): Wherever possible, enable2FA for your online accounts. This adds an extra layer of security by requiring a second form of verification, such as a text code or app-generated token, to access your accounts.5. Be aware of phishing links and use strong antivirus software: Cybercriminals often use phishing scams to exploit data breaches. Avoid clicking on suspicious links in emails or text messages, especially those claiming to be from PowerSchool or your school district.The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.Kurts key takeawayYou can blame hackers for this breach, but PowerSchool shares the responsibility for failing to adequately protect sensitive data. The company may also be in violation of data privacy agreements it signed with school districts, as well as federal and state laws designed to safeguard student privacy. Whats more concerning is that PowerSchool took nearly two weeks to notify its customers about the breach. Schools are now left scrambling to assess the full extent of the intrusion. This delay is not just irresponsible; it puts students, parents and teachers at heightened risk of cyberattacks and identity theft.CLICK HERE TO GET THE FOX NEWS APPDo you think companies like PowerSchool should face stricter regulations for handling sensitive data? Let us know by writing us atFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·103 Views
  • Best cutting-edge health and fitness tech from CES 2025
    www.foxnews.com
    Published January 12, 2025 8:00am EST close Jillian Michaels explains why people fall off their diets, fitness routines after summer The Biggest Loser star Jillian Michaels shared her thoughts on why people fall off their diet and fitness routines during the fall and winter seasons and explained how they can get back on track. CES 2025 has once again showcased a remarkable array of health and fitness technology that promises to transform our well-being.From artificial intelligence-powered sleep aids to smart ear-cleaning devices, this year's event highlights cutting-edge solutions designed to enhance our health and fitness routines.These groundbreaking innovations are sure to offer something for everyone. Kurt giving a thumbs up to CES 2025 (Kurt "CyberGuy" Knutsson)1. AI sleep wearable promises better rest and sharper focus Frenz Brainband (Earable Neuroscience)The Frenz Brainband is this cool new AI-powered sleep headband that not only tracks your sleep, but actually helps you sleep better and focus more during the day. The Frenz Brainband uses some seriously advanced tech to monitor your brain waves, eye movements and even tiny facial twitches while you snooze.The Brainband uses all that info to play personalized audio through bone-conduction speakers, helping you fall asleep faster and sleep more deeply. The folks at Earable Neuroscience, the company behind Frenz, have done their homework. They've got research backing up their claims, and they've even snagged a CES Innovation Award. So, whether you're struggling with insomnia or just want to optimize your sleep and daytime focus, the Frenz Brainband might be worth checking out. It'savailable for purchase at a price of $680 or through a rental option for $45 per month.2. The smart ear-cleaning device that lets you watch in real time EarSight Flow (Bebird)The Bebird EarSight Flow is an innovative ear care device that combines high-resolution imaging with advanced cleaning technology. Featuring a 1 million-pixel camera and Aquatic Ear Canal Cleaning Technology, this device allows you to safely remove earwax while providing a live view through a smartphone app. As a CES 2025 Innovation Awards honoree in the digital health category, the EarSight Flow offers a modern solution to ear hygiene, enabling you to see inside your ear canal during the cleaning process.The device comes equipped with a high-definition camera with over 1 million pixels and a Ball Axis Adjustment Megapixel Lens for precise positioning. You can easily integrate the device with your smartphone, using compatible Android and iOS apps to stream the real-time cleaning process. The advanced cleaning technology gently removes earwax and debris, providing a safe and interactive ear care experience. You can buy a Bebird EarSight Flow byclicking here.Note: Health care professionals recommend consulting with a medical expert before using any ear-cleaning device to ensure safe and proper usage.3. Next-gen smart ring offers digital sizing Circular Ring 2 (Circular)The Circular Ring 2 introduces a groundbreaking digital sizing method that allows you to determine your ring size using only a smartphone camera and a dedicated app. This innovative approach eliminates the traditional plastic sizing kit used by competitors like Oura Ring and Samsung Galaxy Ring.A standout feature of the Circular Ring 2 is its FDA-approved atrial fibrillation detection algorithm, which marks the first such certification in the smart ring market. The Circular Ring 2 willlaunch in mid-to-late January 2025 with an expected retail price of $349 to $380, depending on the finish selected (gold, silver, black or rose gold). The ring will ship in March 2025 and is notable for being subscription-free.4. The AI-powered home gymThe Amp Fitness machine is a groundbreaking $1,795 home gym powered by advanced artificial intelligence that transforms strength training. Featuring adjustable cable machine weights, an integrated camera and a smart companion app, the device provides dynamic workouts that adapt in real time to maximize your fitness gains.You can access hundreds of workout variations, participate in fitness challenges and even compete on a global leaderboard that tracks strength and progress. The machine's AI technology continuously analyzes performance, adjusting resistance and workout intensity to ensure you are constantly challenged and making consistent progress. The Amp Fitness machine is priced at $1,795 and is available with a $99 deposit. It is expected to ship in early 2025.5. Revolutionizing hearing technology with AI-powered features Elehear Beyond Pro (Elehear)The Elehear Beyond Pro is an innovative over-the-counter hearing aid that combines cutting-edge AI technology with user-friendly features. This smart hearing wearable offers real-time translation capabilities across multiple languages, making it an invaluable tool for global communication.The device also provides customizable tinnitus relief, addressing a common concern for many individuals with hearing issues. At the heart of the Beyond Pro is Elehear's proprietary Vocclear technology, which significantly enhances sound clarity and speech intelligibility. The Elehear Beyond Pro hearing aid is expected to be released later in 2025.6. Shocking your taste buds with an electric salt spoon Electric salt spoon (Kirin Holdings)Kirin Holdings has unveiled an innovative electric salt spoon that uses a mild electrical current to enhance food flavor without adding sodium. This $127 device concentrates sodium ions on the tongue, making low-sodium foods taste up to 1.5 times saltier. The spoon offers four adjustable intensity levels, ranging from mild (yellow light) to intense (blue light).Developed in collaboration with Meiji University, the device addresses critical health concerns by helping people enjoy flavorful meals while reducing salt intake. First-time users are recommended to start at the lowest intensity setting to acclimate to the unique sensory experience. You can purchase the electric salt spoon through Kirin'sofficial online store.7. The smart air purifier that pampers your feline friend AeroCatTower (LG)LG's innovative AeroCatTower is a device that seamlessly blends pet comfort with air purification technology. The tower features a dome-shaped seat where cats can relax, complete with a built-in heater and an attachable stepper to help older cats climb.Its intelligent air purification system automatically adjusts airflow when a cat is present, ensuring minimal disturbance to your furry companion. Through the LG ThinQ app, pet owners can track their cat's weight and sleep patterns, adding an extra layer of pet care technology. Pricing and availability remain undisclosed byLG.8. Your personal AI yoga instructor YoctoMat (Yocto)The YoctoMat is a smart yoga mat that transforms your practice through cutting-edge embedded sensor technology, providing real-time feedback on your posture, balance and weight distribution. By creating a visual map of your movements, this intelligent mat acts like a personal yoga instructor, helping you perfect your alignment and technique with precision and ease.The mat's advanced IoT capabilities allow you to track your progress, analyze your performance and receive instant corrections, making every yoga session an opportunity for growth and mindfulness. Lightweight and portable, the YoctoMat brings the expertise of a professional yoga studio directly to your home, enabling practitioners of all levels to enhance their practice.Its AI-powered system not only improves physical technique but also supports stress reduction and mental well-being, turning your yoga routine into a holistic wellness experience. Whether you're a beginner seeking guidance or an experienced yogi looking to refine your skills, the YoctoMat offers an interactive, data-driven approach to yoga that adapts to your individual needs. The YoctoMat is available for purchasethrough the company's inquiry form here.9. Digital glasses for enhanced vision ESight Go (eSight)ESight, renowned for its medical vision enhancement devices, is showcasing its latest innovation, eSight Go, at CES. These cutting-edge digital glasses are designed to assist individuals with central vision loss caused by conditions like macular degeneration and diabetic retinopathy. The eSight Go features a high-definition camera on the nosepiece that captures continuous video footage, which is then optimized and displayed on HD OLED screens for enhanced viewing.Users can integrate their prescription lenses for further visual optimization. Engineered for all-day wear, these lightweight glasses come equipped with built-in controls and a neck-worn battery pack that provides up to three hours of continuous use. The eSight Go is priced at $4,950, and you can get a free consultationhere.10. The contactless sleep-tracking solution ISleePad (ITRI)WHAT IS ARTIFICIAL INTELLIGENCE (AI)?The iSleePad is a contactless sleep-tracking solution designed to monitor vital health data without the discomfort of wearable devices. Utilizing advanced low-power microwave sensor technology, the lightweight and foldable pad can track essential sleep metrics, including heart rate, breathing and sleep position with remarkable precision.Positioned conveniently under the shoulders and torso, the iSleePad offers a unique feature set that goes beyond traditional sleep tracking, including real-time alerts for bed exits and a Schumann wave mode that promotes deep, restful sleep. Its flexible pressure-sensitive antenna provides over 95% accuracy in monitoring sleep activities, making it especially beneficial for elderly users, medical care settings and families with infants. The device seamlessly integrates with a smartphone app, allowing users to access real-time data and long-term physiological records. Nospecific information is available regarding its price or availability.11. AI smart mirror reveals what's beyond reflection Omnia (Withings)Withings has unveiled the Omnia, an innovative AI-powered smart mirror that provides comprehensive health screening through advanced sensor technology. The full-length mirror, equipped with a sophisticated base, can capture an extensive range of health metrics, including weight, heart health, metabolic data and body composition.Using integrated AI, the Omnia not only displays health data but also offers personalized insights through a voice assistant that can provide recommendations and potentially connect users with health care professionals. The device seamlessly integrates data from multiple Withings devices and third-party health apps, creating a holistic health monitoring ecosystem. The Omnia is still a concept product and is not yet available for purchase. It is in development with no clear pricing details provided at this time.12. Sleep smarter and rest better with intelligent biosensing earbuds Tone Buds (NextSense)GET FOX BUSINESS ON THE GO BY CLICKING HERENextSense has unveiled the Tone Buds, a groundbreaking biosensing smart earbud that goes far beyond traditional sleep technology by actively monitoring and improving sleep quality. These innovative earbuds use clinical-grade EEG technology to precisely assess sleep stages and depth, providing unprecedented insights into a user's nocturnal experience.When the Tone Buds detect stage N3 sleep, the deepest stage of non-rapid eye movement sleep, they emit subtle pink noise stimulation to enhance rest. The AI-powered, closed-loop audio system responds dynamically to the user's brain waves, providing comforting audio for falling asleep and sound-neutralizing tracks to help users stay asleep.With sleep disorders affecting approximately 70 million Americans and poor sleep linked to serious health risks like heart disease, stroke and cognitive decline, the Tone Buds represent a significant advancement in personal sleep technology. By continuously monitoring brain activity and actively improving sleep in real time, NextSense is offering a sophisticated solution for those struggling to achieve restful, high-quality sleep. Tone Buds areavailable for preorder and will retail for $349.13. Smart glasses with built-in hearing aids to help hear better Nuance Audio glasses (EssilorLuxottica)EssilorLuxottica's Nuance Audio glasses feature six strategically placed microphones that capture sound with remarkable precision and directional accuracy. These innovative glasses offer users two distinct listening modes a focused directional setting that amplifies the voice of the person directly in front of you and a 360-degree audio mode that enhances surrounding sounds for complete environmental awareness.The embedded micro-speakers, positioned discreetly above the ears, deliver crystal-clear audio directly to the user, creating an invisible and stylish hearing solution for individuals with mild to moderate hearing loss. With a companion app and remote control, users can easily customize volume levels, switch between sound modes and fine-tune their listening experience in real time.The glasses not only provide exceptional sound clarity but also eliminate the traditional stigma associated with hearing aids by seamlessly integrating advanced audio technology into a sleek, fashionable eyewear design. The launch timeline is pending FDA approval here in the U.S., butthe glasses are expected to be available for purchase starting in Q1 202514. Nutritional tracking just got easier V1tal device (Amazfit)Amazfit has unveiled its V1tal device, a compact gadget designed to revolutionize nutritional tracking. The V1tal uses a built-in camera to record your meals, automatically logging food intake and providing detailed nutritional information without manual input.This innovative device analyzes eating behavior, offering insights and tips to improve dietary habits. The V1tal integrates seamlessly with the Zepp app, creating a comprehensive health ecosystem when used alongside Amazfit's smartwatches and fitness trackers. While in the prototype stage,Amazfit plans to launch the V1tal in the United States during the first or second quarter of 2025.15. Never miss a pill again with this smart pillbox Smart Pillbox (HealthBuddy)The Smart Pillbox HealthBuddy app, recently launched on both Apple and Google Play stores, will transform how users manage their medications. This innovative app offers features such as medication tracking, pill reminders and the ability to log missed or taken doses, making it an essential tool for medication adherence. The app can be used independently or in conjunction with the upcoming Smart Pillbox device, which is in its pilot program phase.When paired with the device, the app will sync effortlessly, providing real-time tracking and automated logging of medication intake. The Smart Pillbox device, expected to be widely available in the coming months, will feature built-in sensors to detect when pill compartments are opened, as well as cellular connectivity to transmit adherence data securely to health care providers.This comprehensive system aims to improve medication management for users and enable health care providers to monitor patient adherence remotely, potentially enhancing overall health outcomes. The Smart Pillbox HealthBuddy app is available for free oniOS andAndroid, with thecompanion device available for preorder and expected to be widely available in the coming months.The content of this article is intended solely for educational and informational purposes. It should not be considered a substitute for professional health or medical advice. We strongly recommend consulting a qualified health care provider or physician with any questions or concerns you may have regarding your medical conditions or health goals.Kurts key takeawaysThese health and fitness advancements not only highlight the increasing synergy between technology and wellness, but also empower individuals to take control of their well-being in transformative ways. As these products hit the market, they have the potential to change how we approach fitness, nutrition and overall health, marking a pivotal moment for personal wellness. Embracing these innovations can lead to more informed choices and enhanced quality of life, making it an opportune time to explore what these technologies have to offer.CLICK HERE TO GET THE FOX NEWS APPWhich of the innovative health and fitness technologies from CES 2025 are you most excited about and why?Let us know by writing us at Cyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·106 Views
  • Hydrogen-powered rescue truck just smashed a world record, and it only spits out water
    www.foxnews.com
    Tech Hydrogen-powered rescue truck just smashed a world record, and it only spits out water Breaking records with zero emissions Published January 12, 2025 6:00am EST close Hydrogen-powered rescue truck just smashed a world record, and it only spits out water The vehicle traveled 1,806 miles on a single tank of hydrogen. Hydrogen-powered trucks are making waves in the world of clean transportation, and the H2Rescue truck just set a new Guinness World Record to prove it.This impressive vehicle, developed by Cummins Accelera in collaboration with the U.S. Department of Energy and Department of Defense, traveled an astounding 1,806 miles on a single tank of hydrogen. H2Rescue truck (Department of Homeland Security)The record-breaking journeyThe H2Rescue truck embarked on its record-setting trip in California, carrying 386 pounds of hydrogen fuel. Throughout the journey, it navigated rush hour traffic, maintained speeds between 50 and 55 mph and operated in temperatures ranging from 60 to 80 degrees Fahrenheit.The truck's performance was closely monitored by a Guinness World Records adjudicator, who ensured the integrity of the test by sealing the hydrogen tank before departure. H2Rescue truck (Cummins Accelera)Impressive technologyThe H2Rescue truck is powered by a Cummins Accelera fuel cell engine and a 250-kilowatt traction motor. During its record-breaking run, it consumed 370 pounds of hydrogen, demonstrating the efficiency of hydrogen fuel cell technology. The most striking aspect of this journey? The truck emitted absolutely nothing but water vapor from its tailpipe. H2Rescue truck (Cummins Accelera)Environmental impactBy using hydrogen instead of gasoline, the H2Rescue truck saved a whopping 664 pounds of carbon dioxide emissions compared to a conventional truck of the same size covering the same distance. This showcases the potential of hydrogen-powered vehicles in reducing greenhouse gas emissions and combating climate change. H2Rescue truck (Cummins Accelera)More than just a record breakerThe H2Rescue truck isn't just about setting records. It's designed for real-world emergency response scenarios. The vehicle can provide 25 kilowatts of power from its fuel cells for up to 72 hours without refueling, which is sufficient to power multiple FEMA trailers during critical emergency operations.Weighing 33,000 pounds, the truck is robustly built to carry essential supplies directly into disaster zones where infrastructure might be compromised. As an added innovative feature, the truck produces about a gallon of water per hour as a byproduct, which, while not a massive water source, represents a small but intriguing potential benefit in emergency situations where resources can be scarce.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? H2Rescue truck (Cummins Accelera)The bigger pictureThe DOE estimates that replacing traditional emergency response vehicles with H2Rescue trucks could save about 1,825 gallons of gasoline per year and reduce annual greenhouse gas emissions by 2.8 tons. This demonstrates the significant potential of hydrogen fuel cell technology in heavy-duty transportation and emergency response applications. H2Rescue truck (Cummins Accelera)Kurts key takeawaysAs we look to the future, hydrogen-powered trucks like the H2Rescue are paving the way for cleaner, more efficient transportation. With zero carbon emissions and impressive range capabilities, they're proving to be a viable alternative to traditional fossil fuel-powered vehicles, especially in sectors that are challenging to decarbonize.CLICK HERE TO GET THE FOX NEWS APPWhat are your thoughts on the potential of hydrogen-powered vehicles like the H2Rescue on disaster response and environmental sustainability? Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterAsk Kurt a question or let us know what stories you'd like us to coverFollow Kurt on his social channelsAnswers to the most asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·97 Views
  • Chinas newest humanoid robot is ready to serve like never before
    www.foxnews.com
    close Chinas newest humanoid robot is ready to serve like never before The new robot is designed to revolutionize the way we work and interact with machines. Chinese startup Pudu Robotics has unveiled its latest creation, the D9 humanoid robot, designed to revolutionize the way we work and interact with machines.Standing at an impressive 5.57 feet tall, this bipedal machine is not just another robot it's a versatile assistant ready to tackle a wide range of tasks in various settings. D9 humanoid robot. (Pudu Robotics)Capabilities and features of the humanoid robotThe D9 is no ordinary robot. With its ability to walk upright and carry loads up to 44 pounds, it's built to handle real-world challenges. But what sets it apart from its predecessors?Advanced mobility:The D9 can walk at speeds of up to 4.5 mph, outpacing the average human stroll. It's not just about speed, though. This robot can navigate stairs, slopes and even maintain balance when knocked off-kilter.Intelligent navigation: Equipped with high-accuracy sensors, the D9 creates real-time 3D semantic maps of its surroundings. This allows for autonomous route planning and precise self-positioning.GET FOX BUSINESS ON THE GO BY CLICKING HEREVersatile applications:From performing ground cleaning tasks with the Pudu SH1 to carrying boxes in warehouses and stocking shelves in stores, the D9's potential applications are vast.Natural interaction: Perhaps most impressively, the D9 boasts "human-level multimodal natural interactions," thanks to its sophisticated artificial intelligence processing frameworks. D9 humanoid robot. (Pudu Robotics)The evolution of Pudu roboticsThe D9 isn't Pudu's first foray into robotics. In September, they introduced the D7, a semi-humanoid robot on wheels designed for tasks like sorting components, serving in restaurants and operating elevators. The D9 builds on this foundation, expanding the range of possible applications.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? D9 humanoid robot. (Pudu Robotics)Competitive landscapeWith the introduction of the D9, Pudu Robotics enters a competitive field alongside giants like Tesla and Unitree. While pricing details for the D9 are yet to be announced, it's speculated to fall in the $20,000 to $30,000 range, similar toTesla's Optimus. D9 humanoid robot. (Pudu Robotics)Kurt's key takeawaysThe Pudu D9 showcases advanced mobility and intelligent interaction capabilities. As it prepares to enter the market, its potential impact on various industries could be profound, transforming how we approach tasks across sectors. The future looks promising for humanoid robots like the D9 as they pave the way for more efficient and interactive work environments.CLICK HERE TO GET THE FOX NEWS APPWhat concerns do you have about the potential impact of humanoid robots like the Pudu D9 on the future of work and everyday life?Let us know by writing us atCyberguy.com/ContactFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading toCyberguy.com/NewsletterFollow Kurt on his social channels:Answers to the most-asked CyberGuy questions:New from Kurt:Copyright 2025 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com. Related Topics
    0 Comments ·0 Shares ·85 Views
  • Fox News AI Newsletter: Tech leaders' message to Biden
    www.foxnews.com
    Nvidia is developing real-world robots that are equipped with artificial intelligence capabilities. (Justin Sullivan/Getty Images) Welcome to Fox News Artificial Intelligence newsletter with the latest AI technology advancements.IN TODAY'S NEWSLETTER:- Tech industry leaders urge Biden not to cement rule they say could diminish US global leadership on AI- Sam Altman responds to lawsuit, allegations of abuse from sister- As a Berkeley professor, I see the impact H-1B visas and AI have on students' job opportunities- Top tech stealing the show at CES 2025PUSH BACK: The new rule, which industry leaders say could come as early as the end of this week, effectively seeks to shore up the U.S. economy and national security efforts by adding new restrictions on how many U.S.-made artifical intelligence products can be deployed across the globe. Jensen Huang, co-founder and chief executive officer of Nvidia Corp., speaks during the Nvidia GPU Technology Conference (GTC) in San Jose, Calif., on Monday, March 18, 2024. (David Paul Morris/Bloomberg via Getty Images)'UTTERLY UNTRUE': Open AI CEO Sam Altman on Tuesday responded to a lawsuit in which his sister accused him of sexually abusing her for nearly a decade. Altman, along with his mother and two brothers, issued a joint statement denying the claims of his sister, Ann Altman. Sam Altman, chief executive officer of OpenAI, speaks during the Bloomberg Technology Summit in San Francisco on Thursday, June 22, 2023. (David Paul Morris/Bloomberg via Getty Images)LOW COST LABOR: The H-1B visa program was intended to bring in specialized talent from abroad, but instead it has become a tool for employers to hire lower-cost labor for ordinary jobs. Illustrative picture showing an application for the United States of America work visa H1B with a pen. BEST OF CES: Get ready for some pretty cool innovations that are lighting up CES 2025, the world's biggest annual tech event. From AI-powered smart glasses to revolutionary TVs and mind-blowing gadgets, this year's show is proving that the future isn't just knocking. It's bursting through the door. Samsung Food app. (Kurt "CyberGuy" Knutsson)FOLLOW FOX NEWS ON SOCIAL MEDIASIGN UP FOR OUR OTHER NEWSLETTERSDOWNLOAD OUR APPSWATCH FOX NEWS ONLINEFox News GoSTREAM FOX NATIONFox NationStay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox Newshere. This article was written by Fox News staff. Related Topics
    0 Comments ·0 Shares ·100 Views
More Stories